'\" te .\" Copyright (C) 2004 International Business Machines Corporation .\" Written by Kathy Robertson based on the Trusted Computing Group Software Stack Specification Version 1.1 Golden .\" .de Sh \" Subsection .br .if t .Sp .ne 5 .PP \fB\\$1\fR .PP .. .de Sp \" Vertical space (when we can't use .PP) .if t .sp .5v .if n .sp .. .de Ip \" List item .br .ie \\n(.$>=3 .ne \\$3 .el .ne 3 .IP "\\$1" \\$2 .. .TH "Tspi_ChangeAuthAsym" 3 "2004-05-26" "TSS 1.1" "TCG Software Stack Developer's Reference" .SH NAME Tspi_ChangeAuthAsym \- change the authorization data of an entity using asymmetric change protocol. .SH "SYNOPSIS" .ad l .hy 0 .nf .B #include .B #include .B #include .B #include .B #include .B #include .B #include .sp .BI "TSS_RESULT Tspi_ChangeAuthAsym(TSS_HOBJECT " hObjectToChange ", TSS_HOBJECT " hParentObject "," .BI " TSS_HKEY " hIdentKey ", TSS_HPOLICY " hNewPolicy ");" .fi .sp .ad .hy .SH "DESCRIPTION" .PP \fBTspi_ChangeAuthAsym\fR changes the authorization data (secret) of an entity (object) utilizing the asymmetric change protocol and assigns the object to the policy object. All classes using secrets provide this method for changing their authorization data. This method changes the authorization data of an object ensuring that the parent of the object does not get knowledge of the new secret. .SH "PARAMETERS" .PP .SS hObjectToChange Handle of the object the authorization data should be changed. .PP .SS hParentObject Handle of the parent object wrapping the object addressed by \fIhObjectToChange\fR. .PP .SS hIdentKey Handle of the identity key object required to proof the internally created temporary key. .PP .SS hNewPolicy Handle of the policy object providing the new authorization data. .SH "RETURN CODES" .PP \fBTspi_ChangeAuthAsym\fR returns TSS_SUCCESS on success, otherwise one of the following values are returned: .TP .SM TSS_E_INVALID_HANDLE - Either \fIhObjectToChange\fR, \fIhParentObject\fR, or \fIhIdentKey\fR is an invalid handle. .TP .SM TSS_E_INTERNAL_ERROR - An error occurred internal to the TSS. .SH "CONFORMING TO" .PP \fBTspi_ChangeAuthAsym\fR conforms to the Trusted Computing Group Software Specification version 1.1 Golden .\" Oracle has added the ARC stability level to this manual page .SH ATTRIBUTES See .BR attributes (5) for descriptions of the following attributes: .sp .TS box; cbp-1 | cbp-1 l | l . ATTRIBUTE TYPE ATTRIBUTE VALUE = Availability library/security/trousers = Stability Uncommitted .TE .PP .SH "SEE ALSO" .PP \fBTspi_ChangeAuth\fR(3). .SH NOTES .\" Oracle has added source availability information to this manual page This software was built from source available at https://java.net/projects/solaris-userland. The original community source was downloaded from http://sourceforge.net/projects/trousers/files/trousers/0.3.6/trousers-0.3.6.tar.gz Further information about this software can be found on the open source community website at http://sourceforge.net/projects/trousers/files/trousers/.