Lines Matching refs:sessionIndex

82    UINT32                sessionIndex
85 TPM_HANDLE handle = s_associatedHandles[sessionIndex];
86 TPM_HANDLE sessionHandle = s_sessionHandles[sessionIndex];
211 UINT32 sessionIndex // IN: session index
214 AUTH_ROLE role = CommandAuthRole(commandCode, sessionIndex);
215 TPM_HT type = HandleGetType(s_associatedHandles[sessionIndex]);
222 OBJECT *object = ObjectGet(s_associatedHandles[sessionIndex]);
231 if(PCRPolicyIsAvailable(s_associatedHandles[sessionIndex]))
235 policyAlg = PCRGetAuthPolicy(s_associatedHandles[sessionIndex],
262 UINT32 sessionIndex // IN: session index
269 pAssert(!IsPolicySessionRequired(commandCode, sessionIndex));
316 || (CommandAuthRole(commandCode, sessionIndex) == AUTH_ADMIN
368 UINT32 sessionIndex // IN: session index
425 if(IsPolicySessionRequired(commandCode, sessionIndex))
519 // authValue of the authorized entity. Argument sessionIndex is used to get handles handle of the
529 UINT32 sessionIndex // IN: index of session to be processed
533 TPM_HANDLE associatedHandle = s_associatedHandles[sessionIndex];
535 MemoryRemoveTrailingZeros(&s_inputAuthValues[sessionIndex]);
539 if(Memory2BEqual(&s_inputAuthValues[sessionIndex].b, &authValue.b))
546 return IncrementLockout(sessionIndex);
557 UINT32 sessionIndex, // IN: index of session to be processed
573 HandleGetType(s_sessionHandles[sessionIndex]);
577 // If this is the first session (sessionIndex = 0) and it is an authorization
580 if( sessionIndex == 0
581 && s_associatedHandles[sessionIndex] != TPM_RH_UNASSIGNED)
586 && s_decryptSessionIndex != sessionIndex)
595 && s_encryptSessionIndex != sessionIndex
606 session = SessionGet(s_sessionHandles[sessionIndex]);
617 if(s_associatedHandles[sessionIndex] != TPM_RH_UNASSIGNED)
624 && !IsSessionBindEntity(s_associatedHandles[sessionIndex], session))
630 + EntityGetAuthValue(s_associatedHandles[sessionIndex],
636 && s_inputAuthValues[sessionIndex].t.size == 0)
646 CryptUpdateDigest2B(&hmacState, &s_nonceCaller[sessionIndex].b);
658 marshalSize = TPMA_SESSION_Marshal(&(s_attributes[sessionIndex]),
682 UINT32 sessionIndex, // IN: index of session to be processed
688 ComputeCommandHMAC(sessionIndex, cpHash, &hmac);
690 if(!Memory2BEqual(&s_inputAuthValues[sessionIndex].b, &hmac.b))
695 return IncrementLockout(sessionIndex);
727 UINT32 sessionIndex, // IN: index of session to be processed
740 session = SessionGet(s_sessionHandles[sessionIndex]);
748 if( !SessionPCRValueIsCurrent(s_sessionHandles[sessionIndex]) )
751 policyAlg = EntityGetAuthPolicy(s_associatedHandles[sessionIndex],
781 AUTH_ROLE role = CommandAuthRole(commandCode, sessionIndex);
843 if(HandleGetType(s_associatedHandles[sessionIndex])!= TPM_HT_NV_INDEX)
846 NvGetIndexInfo(s_associatedHandles[sessionIndex], &nvIndex);
875 int sessionIndex;
883 for(sessionIndex = 0; bufferSize > 0; sessionIndex++)
888 if(sessionIndex == MAX_SESSION_NUM)
889 return TPM_RC_SIZE + TPM_RC_S + g_rcIndex[sessionIndex+1];
892 s_associatedHandles[sessionIndex] = TPM_RH_UNASSIGNED;
894 result = TPMI_SH_AUTH_SESSION_Unmarshal(&s_sessionHandles[sessionIndex],
897 return result + TPM_RC_S + g_rcIndex[sessionIndex];
899 result = TPM2B_NONCE_Unmarshal(&s_nonceCaller[sessionIndex],
902 return result + TPM_RC_S + g_rcIndex[sessionIndex];
904 result = TPMA_SESSION_Unmarshal(&s_attributes[sessionIndex],
907 return result + TPM_RC_S + g_rcIndex[sessionIndex];
909 result = TPM2B_AUTH_Unmarshal(&s_inputAuthValues[sessionIndex],
912 return result + TPM_RC_S + g_rcIndex[sessionIndex];
913 if(s_sessionHandles[sessionIndex] == TPM_RS_PW)
917 if( s_attributes[sessionIndex].encrypt
918 || s_attributes[sessionIndex].decrypt
919 || s_attributes[sessionIndex].audit
920 || s_attributes[sessionIndex].auditExclusive
921 || s_attributes[sessionIndex].auditReset
923 return TPM_RC_ATTRIBUTES + TPM_RC_S + g_rcIndex[sessionIndex];
925 if(s_nonceCaller[sessionIndex].t.size != 0)
926 return TPM_RC_NONCE + TPM_RC_S + g_rcIndex[sessionIndex];
931 if(!SessionIsLoaded(s_sessionHandles[sessionIndex]))
932 return TPM_RC_REFERENCE_S0 + sessionIndex;
933 sessionType = HandleGetType(s_sessionHandles[sessionIndex]);
934 session = SessionGet(s_sessionHandles[sessionIndex]);
943 return TPM_RC_HANDLE + TPM_RC_S + g_rcIndex[sessionIndex];
945 for(i = 0; i < sessionIndex; i++)
947 if(s_sessionHandles[i] == s_sessionHandles[sessionIndex])
948 return TPM_RC_HANDLE + TPM_RC_S + g_rcIndex[sessionIndex];
953 if(s_attributes[sessionIndex].decrypt)
957 return TPM_RC_ATTRIBUTES + TPM_RC_S + g_rcIndex[sessionIndex];
960 return TPM_RC_ATTRIBUTES + TPM_RC_S + g_rcIndex[sessionIndex];
963 return TPM_RC_SYMMETRIC + TPM_RC_S + g_rcIndex[sessionIndex];
966 s_decryptSessionIndex = sessionIndex;
969 if(s_attributes[sessionIndex].encrypt)
973 return TPM_RC_ATTRIBUTES + TPM_RC_S + g_rcIndex[sessionIndex];
976 return TPM_RC_ATTRIBUTES + TPM_RC_S + g_rcIndex[sessionIndex];
979 return TPM_RC_SYMMETRIC + TPM_RC_S + g_rcIndex[sessionIndex];
982 s_encryptSessionIndex = sessionIndex;
985 if(s_attributes[sessionIndex].audit)
989 return TPM_RC_ATTRIBUTES + TPM_RC_S + g_rcIndex[sessionIndex];
991 if( HandleGetType(s_sessionHandles[sessionIndex])
993 return TPM_RC_ATTRIBUTES + TPM_RC_S + g_rcIndex[sessionIndex];
997 if( s_attributes[sessionIndex].auditReset == CLEAR
1002 if( s_attributes[sessionIndex].auditExclusive == SET
1003 && g_exclusiveAuditSession != s_sessionHandles[sessionIndex])
1006 s_auditSessionIndex = sessionIndex;
1010 s_associatedHandles[sessionIndex] = TPM_RH_UNASSIGNED;
1013 *sessionCount = sessionIndex;
1101 UINT32 sessionIndex, // IN: index of session to be processed
1109 TPM_HANDLE sessionHandle = s_sessionHandles[sessionIndex];
1110 TPM_HANDLE associatedHandle = s_associatedHandles[sessionIndex];
1143 if( IsPolicySessionRequired(commandCode, sessionIndex)
1149 if(IsAuthValueAvailable(associatedHandle, commandCode, sessionIndex))
1150 return CheckPWAuthSession(sessionIndex);
1158 if( !IsAuthPolicyAvailable(associatedHandle, commandCode, sessionIndex))
1161 result = CheckPolicyAuthSession(sessionIndex, commandCode,
1171 if(!IsAuthValueAvailable(associatedHandle, commandCode, sessionIndex))
1175 session = SessionGet(s_sessionHandles[sessionIndex]);
1180 return CheckPWAuthSession(sessionIndex);
1185 return CheckSessionHMAC(sessionIndex, cpHash);
1260 UINT32 sessionIndex;
1296 for(sessionIndex = 0; sessionIndex < s_sessionNum; sessionIndex++)
1299 if(s_sessionHandles[sessionIndex] == TPM_RS_PW )
1301 if(s_associatedHandles[sessionIndex] == TPM_RH_UNASSIGNED)
1302 return TPM_RC_HANDLE + g_rcIndex[sessionIndex];
1306 session = SessionGet(s_sessionHandles[sessionIndex]);
1310 return TPM_RC_ATTRIBUTES + TPM_RC_S + g_rcIndex[sessionIndex];
1330 if(s_attributes[sessionIndex].audit)
1334 if(s_associatedHandles[sessionIndex] != TPM_RH_UNASSIGNED)
1336 result = CheckAuthSession(commandCode, sessionIndex,
1340 TPM_RC_S + g_rcIndex[sessionIndex]);
1346 if( s_attributes[sessionIndex].audit == CLEAR
1347 && s_attributes[sessionIndex].encrypt == CLEAR
1348 && s_attributes[sessionIndex].decrypt == CLEAR)
1349 return TPM_RC_ATTRIBUTES + TPM_RC_S + g_rcIndex[sessionIndex];
1351 result = CheckSessionHMAC(sessionIndex, &cpHash);
1354 TPM_RC_S + g_rcIndex[sessionIndex]);
1674 UINT32 sessionIndex, // IN: session index to be processed
1700 if( s_associatedHandles[sessionIndex] != TPM_RH_UNASSIGNED
1701 && !( HandleGetType(s_sessionHandles[sessionIndex])
1708 EntityGetAuthValue(s_associatedHandles[sessionIndex],
1713 if(HandleGetType(s_sessionHandles[sessionIndex]) == TPM_HT_POLICY_SESSION
1715 && s_inputAuthValues[sessionIndex].t.size == 0)
1725 CryptUpdateDigest2B(&hmacState, &s_nonceCaller[sessionIndex].b);
1729 marshalSize = TPMA_SESSION_Marshal(&s_attributes[sessionIndex], &buffer, &bufferSize);
1743 UINT32 sessionIndex, // IN: session index to be processed
1752 if(s_sessionHandles[sessionIndex] == TPM_RS_PW)
1759 SESSION *session = SessionGet(s_sessionHandles[sessionIndex]);
1762 if(HandleGetType(s_sessionHandles[sessionIndex]) == TPM_HT_POLICY_SESSION
1767 ComputeResponseHMAC(sessionIndex,