Lines Matching refs:publicArea
694 TPMT_PUBLIC *publicArea, // IN/OUT: the public area template in CryptGenerateKeyedHash() argument
706 scheme = &publicArea->parameters.keyedHashDetail.scheme; in CryptGenerateKeyedHash()
707 pAssert(publicArea->type == TPM_ALG_KEYEDHASH); in CryptGenerateKeyedHash()
710 hashAlg = publicArea->nameAlg; in CryptGenerateKeyedHash()
720 if(publicArea->objectAttributes.sensitiveDataOrigin == CLEAR) in CryptGenerateKeyedHash()
722 if( ( publicArea->objectAttributes.decrypt in CryptGenerateKeyedHash()
723 || publicArea->objectAttributes.sign) in CryptGenerateKeyedHash()
738 CryptComputeSymmetricUnique(publicArea->nameAlg, in CryptGenerateKeyedHash()
739 sensitive, &publicArea->unique.sym); in CryptGenerateKeyedHash()
782 key->exponent = rsaKey->publicArea.parameters.rsaDetail.exponent; in BuildRSA()
785 key->publicKey = &rsaKey->publicArea.unique.rsa.b; in BuildRSA()
847 TPMT_PUBLIC *publicArea, // IN/OUT: The public area template for in CryptGenerateKeyRSA() argument
863 UINT32 exponent = publicArea->parameters.rsaDetail.exponent; in CryptGenerateKeyRSA()
872 retVal = _cpri__GenerateKeyRSA(&publicArea->unique.rsa.b, in CryptGenerateKeyRSA()
874 publicArea->parameters.rsaDetail.keyBits, in CryptGenerateKeyRSA()
900 TPMT_PUBLIC *publicArea = &rsaKey->publicArea; in CryptLoadPrivateRSA() local
905 publicArea->parameters.rsaDetail.exponent, in CryptLoadPrivateRSA()
906 &(publicArea->unique.rsa.b), in CryptLoadPrivateRSA()
938 keyScheme = &rsaObject->publicArea.parameters.asymDetail.scheme; in CryptSelectRSAScheme()
1004 pAssert( (rsaKey->publicArea.type == TPM_ALG_RSA in CryptDecryptRSA()
1005 && rsaKey->publicArea.objectAttributes.decrypt == SET)); in CryptDecryptRSA()
1019 if(cipherInSize != rsaKey->publicArea.unique.rsa.t.size) in CryptDecryptRSA()
1079 pAssert( rsaKey->publicArea.type == TPM_ALG_RSA in CryptEncryptRSA()
1080 && rsaKey->publicArea.objectAttributes.decrypt == SET); in CryptEncryptRSA()
1085 && *cipherOutSize >= rsaKey->publicArea.unique.rsa.t.size); in CryptEncryptRSA()
1137 && (signKey->publicArea.objectAttributes.sign == SET)); in CryptSignRSA()
1405 TPMT_PUBLIC *publicArea, // IN/OUT: The public area template for the new in CryptGenerateKeyECC() argument
1424 *counter = (UINT32)(publicArea->objectAttributes.sign == SET); in CryptGenerateKeyECC()
1427 retVal = _cpri__GenerateKeyEcc(&publicArea->unique.ecc, in CryptGenerateKeyECC()
1429 publicArea->parameters.eccDetail.curveID, in CryptGenerateKeyECC()
1469 signKey->publicArea.parameters.eccDetail.curveID, in CryptSignECC()
1480 signKey->publicArea.parameters.eccDetail.curveID, in CryptSignECC()
1518 signKey->publicArea.parameters.eccDetail.curveID, in CryptECCVerifySignature()
1519 &signKey->publicArea.unique.ecc, in CryptECCVerifySignature()
1933 TPMT_PUBLIC *publicArea, // IN/OUT: The public area template in CryptGenerateKeySymmetric() argument
1943 if(publicArea->objectAttributes.sensitiveDataOrigin == CLEAR) in CryptGenerateKeySymmetric()
1946 != publicArea->parameters.symDetail.sym.keyBits.sym) in CryptGenerateKeySymmetric()
1951 if(publicArea->parameters.symDetail.sym.keyBits.sym % 8 != 0) in CryptGenerateKeySymmetric()
1958 = publicArea->parameters.symDetail.sym.keyBits.sym / 8; in CryptGenerateKeySymmetric()
1965 CryptComputeSymmetricUnique(publicArea->nameAlg, in CryptGenerateKeySymmetric()
1966 sensitive, &publicArea->unique.sym); in CryptGenerateKeySymmetric()
2394 data->t.size = CryptGetHashDigestSize(encryptKey->publicArea.nameAlg); in CryptSecretEncrypt()
2395 pAssert(encryptKey->publicArea.objectAttributes.decrypt == SET); in CryptSecretEncrypt()
2396 switch(encryptKey->publicArea.type) in CryptSecretEncrypt()
2404 scheme.details.oaep.hashAlg = encryptKey->publicArea.nameAlg; in CryptSecretEncrypt()
2425 encryptKey->publicArea.parameters.eccDetail.curveID, in CryptSecretEncrypt()
2426 &encryptKey->publicArea.unique.ecc)) in CryptSecretEncrypt()
2433 CryptNewEccKey(encryptKey->publicArea.parameters.eccDetail.curveID, in CryptSecretEncrypt()
2444 encryptKey->publicArea.parameters.eccDetail.curveID, in CryptSecretEncrypt()
2446 &encryptKey->publicArea.unique.ecc) in CryptSecretEncrypt()
2463 CryptKDFe(encryptKey->publicArea.nameAlg, &eccSecret.x.b, in CryptSecretEncrypt()
2465 &encryptKey->publicArea.unique.ecc.x.b, in CryptSecretEncrypt()
2515 switch(decryptKey->publicArea.type) in CryptSecretDecrypt()
2523 scheme.details.oaep.hashAlg = decryptKey->publicArea.nameAlg; in CryptSecretDecrypt()
2532 > CryptGetHashDigestSize(decryptKey->publicArea.nameAlg))) in CryptSecretDecrypt()
2549 decryptKey->publicArea.parameters.eccDetail.curveID, in CryptSecretDecrypt()
2557 CryptGetHashDigestSize(decryptKey->publicArea.nameAlg); in CryptSecretDecrypt()
2571 CryptKDFe(decryptKey->publicArea.nameAlg, &eccSecret.x.b, label, in CryptSecretDecrypt()
2573 &decryptKey->publicArea.unique.ecc.x.b, in CryptSecretDecrypt()
2583 CryptGetHashDigestSize(decryptKey->publicArea.nameAlg)) in CryptSecretDecrypt()
2599 CryptXORObfuscation(decryptKey->publicArea.nameAlg, in CryptSecretDecrypt()
2613 CryptGetHashDigestSize(decryptKey->publicArea.nameAlg)) in CryptSecretDecrypt()
2617 symDef = &decryptKey->publicArea.parameters.symDetail.sym; in CryptSecretDecrypt()
2811 TPMT_PUBLIC *publicArea, // IN/OUT: the public area template
2819 if(CryptIsAsymAlgorithm(publicArea->type))
2822 if(publicArea->objectAttributes.decrypt == SET
2823 && publicArea->objectAttributes.restricted == SET)
2830 && publicArea->objectAttributes.fixedTPM == SET)
2840 sensitive->seedValue.t.size = CryptGetHashDigestSize(publicArea->nameAlg);
2879 TPMT_PUBLIC *publicArea, // IN/OUT: public area in CryptCreateObject() argument
2896 sensitive->sensitiveType = publicArea->type; in CryptCreateObject()
2897 ObjectComputeName(publicArea, &name); in CryptCreateObject()
2909 hashAlg = parent->publicArea.nameAlg; in CryptCreateObject()
2915 switch(publicArea->type) in CryptCreateObject()
2920 result = CryptGenerateKeyRSA(publicArea, sensitive, in CryptCreateObject()
2927 result = CryptGenerateKeyECC(publicArea, sensitive, in CryptCreateObject()
2933 return CryptGenerateKeySymmetric(publicArea, sensitiveCreate, in CryptCreateObject()
2937 return CryptGenerateKeyedHash(publicArea, sensitiveCreate, in CryptCreateObject()
2947 if(publicArea->objectAttributes.decrypt == SET in CryptCreateObject()
2948 && publicArea->objectAttributes.restricted == SET) in CryptCreateObject()
2955 && publicArea->objectAttributes.fixedTPM == SET) in CryptCreateObject()
2960 = CryptGetHashDigestSize(publicArea->nameAlg); in CryptCreateObject()
2991 TPMT_PUBLIC *publicArea // IN: public area in CryptObjectIsPublicConsistent() argument
2995 switch (publicArea->type) in CryptObjectIsPublicConsistent()
2999 OK = CryptAreKeySizesConsistent(publicArea); in CryptObjectIsPublicConsistent()
3008 publicArea->parameters.eccDetail.curveID, in CryptObjectIsPublicConsistent()
3009 &publicArea->unique.ecc); in CryptObjectIsPublicConsistent()
3013 publicArea->parameters.eccDetail.curveID); in CryptObjectIsPublicConsistent()
3019 || ( publicArea->parameters.eccDetail.scheme.scheme in CryptObjectIsPublicConsistent()
3021 OK = OK && CryptAreKeySizesConsistent(publicArea); in CryptObjectIsPublicConsistent()
3053 TPMT_PUBLIC *publicArea; in CryptObjectPublicPrivateMatch() local
3058 publicArea = &object->publicArea; in CryptObjectPublicPrivateMatch()
3060 if(publicArea->type != sensitive->sensitiveType) in CryptObjectPublicPrivateMatch()
3062 switch(publicArea->type) in CryptObjectPublicPrivateMatch()
3068 if(sensitive->sensitive.rsa.t.size != publicArea->unique.rsa.t.size/2) in CryptObjectPublicPrivateMatch()
3081 if( publicArea->unique.ecc.x.t.size in CryptObjectPublicPrivateMatch()
3084 else if(publicArea->nameAlg != TPM_ALG_NULL) in CryptObjectPublicPrivateMatch()
3089 publicArea->parameters.eccDetail.curveID, in CryptObjectPublicPrivateMatch()
3092 if( (!Memory2BEqual(&publicArea->unique.ecc.x.b, in CryptObjectPublicPrivateMatch()
3094 || (!Memory2BEqual(&publicArea->unique.ecc.y.b, in CryptObjectPublicPrivateMatch()
3104 if( (publicArea->parameters.symDetail.sym.keyBits.sym + 7)/8 in CryptObjectPublicPrivateMatch()
3117 && publicArea->nameAlg != TPM_ALG_NULL) in CryptObjectPublicPrivateMatch()
3121 CryptComputeSymmetricUnique(publicArea->nameAlg, sensitive, in CryptObjectPublicPrivateMatch()
3124 if(!Memory2BEqual(&publicArea->unique.sym.b, in CryptObjectPublicPrivateMatch()
3292 TPMT_PUBLIC *publicArea; in CryptSelectSignScheme() local
3306 publicArea = &signObject->publicArea; in CryptSelectSignScheme()
3308 if(!publicArea->objectAttributes.sign) in CryptSelectSignScheme()
3313 TPMU_PUBLIC_PARMS *parms = &publicArea->parameters; in CryptSelectSignScheme()
3314 if(CryptIsAsymAlgorithm(publicArea->type)) in CryptSelectSignScheme()
3383 pAssert(signKey->publicArea.objectAttributes.sign == SET); in CryptSign()
3399 switch (signKey->publicArea.type) in CryptSign()
3449 TPMT_PUBLIC *publicArea = &authObject->publicArea; in CryptVerifySignature() local
3455 switch (publicArea->type) in CryptVerifySignature()
3656 TPMT_PUBLIC *publicArea // IN: the public area to check in CryptAreKeySizesConsistent() argument
3660 switch (publicArea->type) in CryptAreKeySizesConsistent()
3665 consistent = ( ((publicArea->parameters.rsaDetail.keyBits+7)/8) in CryptAreKeySizesConsistent()
3666 == publicArea->unique.rsa.t.size); in CryptAreKeySizesConsistent()
3673 TPM_ECC_CURVE curveId = publicArea->parameters.eccDetail.curveID; in CryptAreKeySizesConsistent()
3676 && publicArea->unique.ecc.x.t.size <= keySizeInBytes in CryptAreKeySizesConsistent()
3677 && publicArea->unique.ecc.y.t.size <= keySizeInBytes; in CryptAreKeySizesConsistent()