#################################################################################
#										#
#			TPM2 regression test Directory of files			#
#			     Written by Ken Goldman				#
#		       IBM Thomas J. Watson Research Center			#
#		$Id: Policies.txt 961 2017-03-10 21:53:29Z kgoldman $		#
#										#
# (c) Copyright IBM Corporation 2015, 2016					#
# 										#
# All rights reserved.								#
# 										#
# Redistribution and use in source and binary forms, with or without		#
# modification, are permitted provided that the following conditions are	#
# met:										#
# 										#
# Redistributions of source code must retain the above copyright notice,	#
# this list of conditions and the following disclaimer.				#
# 										#
# Redistributions in binary form must reproduce the above copyright		#
# notice, this list of conditions and the following disclaimer in the		#
# documentation and/or other materials provided with the distribution.		#
# 										#
# Neither the names of the IBM Corporation nor the names of its			#
# contributors may be used to endorse or promote products derived from		#
# this software without specific prior written permission.			#
# 										#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS		#
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT		#
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR		#
# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT		#
# HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,	#
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT		#
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,		#
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY		#
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT		#
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE		#
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.		#
#										#
#################################################################################

Note that PolicySecret uses a double hash, with the second hash being
the policyRef.  An empty policyRef is represented by a blank line.

aaa					the characters aaa
bits48321601.bin			uint64 with those bits set
msgtpmgen.bin				message with TPM_GENERATED
policyauthorize.txt			policy authorize
policyauthorizenv.txt			policy authorize NV
policycccertify.txt			policy command code certify
policycccreate-auth.txt			policy command code create + policy authvalue
policyccnvchangeauth-auth.txt		policy command code nvchangeauth
policyccquote.txt			policy command code quote
policyccsign-auth.txt			policy command code sign + policy authvalue
policyccsign.txt			policy command code sign
policycountertimer.txt			policy counter timer
policycountertimerargs.txt		policy counter timer arguments input
policycphash.txt			policy cphash
policycphashhash.txt			policy cphash data
policynvargs.txt			policy nv arguments
policynvnv.txt				policy nv has name and args			
policyor.txt				policy command code sign | quote
policypcr.txt				policy pcr intermediate file
policypcr0.txt				20 zeros
policypcraaasha1.txt			sha1 PCR extend of aaa
policypcraaasha256.txt			sha256 PCR extend of aaa
policysecretp.txt			policy secret using platform auth
policysecretnv.txt			policy secret using nv index
policysecretnvppp.txt			policy secret using NV PIN pass index
policysecretnvppf.txt			policy secret using NV PIN fail index
policysigned.txt			policy signed using pubkey.pem Name
policywrittenset.txt			policy nv written with written set
policyccundefinespacespecial-auth.bin	policy command code undefinespacespecial + policy authvalue

privkey.pem				private key for policy signed
pubkey.pem				public key for policy signed

sha1aaa.bin		sha1   of aaa
sha1extaaa.bin		sha1   extend of aaa
sha1extaaa0.bin		sha1   extend of aaa zero padded	
sha1exthaaa.bin		sha1   extend of hash of aaa

sha256aaa.bin		sha256 of aaa
sha256extaaa.bin	sha256 extend of aaa
sha256extaaa0.bin	sha256 extend of aaa zero padded
sha256exthaaa.bin	sha256 extend of hash of aaa

sha384aaa.bin		sha384 of aaa
sha384extaaa.bin	sha384 extend of aaa
sha384exthaaa.bin	sha384 extend of hash of aaa
sha384extaaa0.bin	sha384 extend of aaa zero padded

zero8.bin		8 bytes of zero
sha1.bin		big endian sha1 algorithm ID, for policyAuthorizeNV
sha256.bin		big endian sha256 algorithm ID, for policyAuthorizeNV
