Lines Matching refs:symmetric

1651 a parameter that should be a symmetric encryption mode selection does not have
1669 a parameter that should be a symmetric algorithm selection does not have a
3497 This command allows injection of a secret into the TPM using either asymmetric or symmetric encrypt…
3520 If symmetric specifies a block cipher, then TPM_ALG_CFB is the only allowed value for the mode fiel…
3521 the symmetric parameter (TPM_RC_MODE).
3581 c) tpmKey references a symmetric block cipher or a keyedHash object and encryptedSalt contains a
3708 symmetric
3790 symmetric specifies a block cipher but the mode is not
3981 // If 'symmetric' is a symmetric block cipher (not TPM_ALG_NULL or TPM_ALG_XOR)
3984 in->symmetric.algorithm != TPM_ALG_NULL
3985 && in->symmetric.algorithm != TPM_ALG_XOR
3986 && in->symmetric.mode.sym != TPM_ALG_CFB)
3996 &in->nonceCaller, &in->symmetric,
4194 a symmetric object, an optional initial data value (inSensitive.data). The TPM shall validate the
4205 a) For a symmetric key:
4283 For TPM2_Load(), the TPM will apply normal symmetric protections to the created TPMT_SENSITIVE to
4287 The encryption key is derived from the symmetric seed in the sensitive area of the parent.
4302 If the inPublic.parameters.ecc.symmetric.algorithm does not match the parent, the TPM shall return
4460 for an asymmetric key; attempt to create a symmetric cipher key that
4478 key size in public area for symmetric key differs from the size in the
4500 a storage key with no symmetric algorithm specified; or non-storage
4501 key with symmetric algorithm different from TPM_ALG_NULL
4713 After inPrivate.buffer is decrypted using the symmetric key of the parent, the integrity value shal…
4739 For a symmetric object, the unique value in the public area shall be the digest of the sensitive key
4910 symmetric algorithm not provided when required
5340 symmetric algorithm not provided when required
5721 recover the symmetric key. The recovered seed (but not the Name) is used is used in a KDF to recover
6232 // NOTE: Needs to be restricted to have a symmetric value.
6862 optional symmetric encryption key
6870 definition for the symmetric algorithm to be used for the
6901 the Empty Buffer; otherwise, it shall contain the TPMgenerated, symmetric encryption key for the in…
6955 symmetric algorithm
6959 encryptedDuplication is SET but no symmetric algorithm is provided
7137 // If provided the input symmetric key must match the size of the algorithm
7190 use of the oldParent is provided, then an HMAC key and a symmetric key are recovered from inSymSeed
7193 computed. The re-encrypted blob is returned in outDuplicate and the symmetric key returned in
7253 an object encrypted using symmetric key derived from
7266 seed for symmetric key
7268 generate the symmetric key
7300 an object encrypted using symmetric key derived from
7302 seed for a symmetric key protected by newParent
7342 the decrypted input symmetric key size does not matches the
7343 symmetric algorithm key size of oldParent
7418 // symmetric key
7619 This command allows an object to be encrypted using the symmetric encryption values of a Storage Ke…
7629 If present, the outer layer of symmetric encryption is removed. If inSymSeed has a non-zero size, t…
7652 If present, the inner layer of symmetric encryption is removed. If encryptionKey and symmetricAlg a…
7682 Before duplicate.buffer is decrypted using the symmetric key of the parent, the integrity value sha…
7705 The symmetric re-encryption is the normal integrity generation and symmetric encryption applied to
7751 the optional symmetric encryption key used as the inner
7778 contain an inner symmetric wrapper
7782 symmetric key used to encrypt duplicate
7788 definition for the symmetric algorithm to use for the inner
7823 the sensitive area encrypted with the symmetric key of
7920 objectPublic is either a storage key with no symmetric algorithm or a
7921 non-storage key with symmetric algorithm different from
7937 the symmetric key referenced by parentHandle
8038 // symmetric key
8063 // Input symmetric key must match the size of algorithm.
8069 // If input symmetric algorithm is NULL, input symmetric key size must
8990 used in a KDF to generate a symmetric key and that key is used to encrypt the data. Once the data
8991 is encrypted and the symmetric key discarded, only the ob ject with the private portion of the
9952 The commands in this clause provide low-level primitives for access to the symmetric algorithms
9953 implemented in the TPM that operate on blocks of data. These include symmetric encryption and
9958 Some of the symmetric encryption/decryption modes use an IV. When an IV is used, it may be an
10056 This command performs symmetric encryption or decryption.
10057 keyHandle shall reference a symmetric cipher object (TPM_RC_KEY).
10104 the symmetric key used for the operation
10119 symmetric mode
10190 is not a symmetric decryption key with both public and private
10279 // The input key should be a symmetric decrypt key.
10366 // the symmetric algorithm's block size
10377 // For symmetric encryption, the cipher data size is the same as plain data
10715 handle for the symmetric signing key providing the
15638 keyHandle references a symmetric key, both the public and private portions need to be loaded.
15641 The sensitive area of the symmetric object is required to allow verification of the symmetric
23807 signed (symmetric or asymmetric) by keySign. That signature is then checked by the TPM in
25169 for an asymmetric key; attempt to create a symmetric cipher key that
25194 a storage key with no symmetric algorithm specified; or non-storage
25195 key with symmetric algorithm different from TPM_ALG_NULL