.\" Copyright (C) 2004 International Business Machines Corporation .\" Written by Kathy Robertson based on the Trusted Computing Group Software Stack Specification Version 1.1 Golden .\" .de Sh \" Subsection .br .if t .Sp .ne 5 .PP \fB\\$1\fR .PP .. .de Sp \" Vertical space (when we can't use .PP) .if t .sp .5v .if n .sp .. .de Ip \" List item .br .ie \\n(.$>=3 .ne \\$3 .el .ne 3 .IP "\\$1" \\$2 .. .TH "Tspi_ChangeAuthAsym" 3 "2004-05-26" "TSS 1.1" "TCG Software Stack Developer's Reference" .SH NAME Tspi_ChangeAuthAsym \- change the authorization data of an entity using asymmetric change protocol. .SH "SYNOPSIS" .ad l .hy 0 .nf .B #include .B #include .B #include .B #include .B #include .B #include .B #include .sp .BI "TSS_RESULT Tspi_ChangeAuthAsym(TSS_HOBJECT " hObjectToChange ", TSS_HOBJECT " hParentObject "," .BI " TSS_HKEY " hIdentKey ", TSS_HPOLICY " hNewPolicy ");" .fi .sp .ad .hy .SH "DESCRIPTION" .PP \fBTspi_ChangeAuthAsym\fR changes the authorization data (secret) of an entity (object) utilizing the asymmetric change protocol and assigns the object to the policy object. All classes using secrets provide this method for changing their authorization data. This method changes the authorization data of an object ensuring that the parent of the object does not get knowledge of the new secret. .SH "PARAMETERS" .PP .SS hObjectToChange Handle of the object the authorization data should be changed. .PP .SS hParentObject Handle of the parent object wrapping the object addressed by \fIhObjectToChange\fR. .PP .SS hIdentKey Handle of the identity key object required to proof the internally created temporary key. .PP .SS hNewPolicy Handle of the policy object providing the new authorization data. .SH "RETURN CODES" .PP \fBTspi_ChangeAuthAsym\fR returns TSS_SUCCESS on success, otherwise one of the following values are returned: .TP .SM TSS_E_INVALID_HANDLE - Either \fIhObjectToChange\fR, \fIhParentObject\fR, or \fIhIdentKey\fR is an invalid handle. .TP .SM TSS_E_INTERNAL_ERROR - An error occurred internal to the TSS. .SH "CONFORMING TO" .PP \fBTspi_ChangeAuthAsym\fR conforms to the Trusted Computing Group Software Specification version 1.1 Golden .SH "SEE ALSO" .PP \fBTspi_ChangeAuth\fR(3).