Lines Matching full:which
16 PTT, which is a software TPM running inside a software environment
17 close to the CPU, which are subject to different attacks, but right at
19 hardware TPM, which is the use case discussed here.
25 interposer which is a simple external device that can be installed in
46 which would be an annoying denial of service attack. However, there
56 the PCRs and then send down their own measurements which would
64 on some sort of mechanism for protection which would change over TPM
72 interception which HMAC protection alone cannot protect against, so
80 asymmetric secret must be established which must also be unknown to
82 and storage seeds, which can be used to derive asymmetric keys.
84 them into the kernel would be on the command line, which requires
98 we have to create and read the initial public key which could, of
102 certifying the null seed primary with that key) which is too complex
104 name, which is what is exported via sysfs so user-space can run the
116 hands to user-space the name of the derived null seed key which can
138 which thus provides a cryptographic input into the session key
164 template from the `TCG EK Credential Profile`_ which allows comparison
171 root (which should be published on the manufacturer website). Once
174 TPM2_MakeCredential. The TPM then runs TPM2_ActivateCredential which
189 decryption HMAC session salted to the EK primary (which also does not