Lines Matching refs:symmetric

1651 a parameter that should be a symmetric encryption mode selection does not have
1669 a parameter that should be a symmetric algorithm selection does not have a
3497 This command allows injection of a secret into the TPM using either asymmetric or symmetric encrypt…
3520 If symmetric specifies a block cipher, then TPM_ALG_CFB is the only allowed value for the mode fiel…
3521 the symmetric parameter (TPM_RC_MODE).
3581 c) tpmKey references a symmetric block cipher or a keyedHash object and encryptedSalt contains a
3710 symmetric
3792 symmetric specifies a block cipher but the mode is not
3983 // If 'symmetric' is a symmetric block cipher (not TPM_ALG_NULL or TPM_ALG_XOR)
3986 in->symmetric.algorithm != TPM_ALG_NULL
3987 && in->symmetric.algorithm != TPM_ALG_XOR
3988 && in->symmetric.mode.sym != TPM_ALG_CFB)
3998 &in->nonceCaller, &in->symmetric,
4196 a symmetric object, an optional initial data value (inSensitive.data). The TPM shall validate the
4207 a) For a symmetric key:
4285 For TPM2_Load(), the TPM will apply normal symmetric protections to the created TPMT_SENSITIVE to
4289 The encryption key is derived from the symmetric seed in the sensitive area of the parent.
4304 If the inPublic.parameters.ecc.symmetric.algorithm does not match the parent, the TPM shall return
4462 for an asymmetric key; attempt to create a symmetric cipher key that
4480 key size in public area for symmetric key differs from the size in the
4502 a storage key with no symmetric algorithm specified; or non-storage
4503 key with symmetric algorithm different from TPM_ALG_NULL
4715 After inPrivate.buffer is decrypted using the symmetric key of the parent, the integrity value shal…
4741 For a symmetric object, the unique value in the public area shall be the digest of the sensitive key
4912 symmetric algorithm not provided when required
5342 symmetric algorithm not provided when required
5723 recover the symmetric key. The recovered seed (but not the Name) is used is used in a KDF to recover
6236 // NOTE: Needs to be restricted to have a symmetric value.
6866 optional symmetric encryption key
6874 definition for the symmetric algorithm to be used for the
6905 the Empty Buffer; otherwise, it shall contain the TPMgenerated, symmetric encryption key for the in…
6961 symmetric algorithm
6965 encryptedDuplication is SET but no symmetric algorithm is provided
7143 // If provided the input symmetric key must match the size of the algorithm
7196 use of the oldParent is provided, then an HMAC key and a symmetric key are recovered from inSymSeed
7199 computed. The re-encrypted blob is returned in outDuplicate and the symmetric key returned in
7259 an object encrypted using symmetric key derived from
7274 seed for symmetric key
7276 generate the symmetric key
7310 an object encrypted using symmetric key derived from
7312 seed for a symmetric key protected by newParent
7352 the decrypted input symmetric key size does not matches the
7353 symmetric algorithm key size of oldParent
7428 // symmetric key
7629 This command allows an object to be encrypted using the symmetric encryption values of a Storage Ke…
7639 If present, the outer layer of symmetric encryption is removed. If inSymSeed has a non-zero size, t…
7662 If present, the inner layer of symmetric encryption is removed. If encryptionKey and symmetricAlg a…
7692 Before duplicate.buffer is decrypted using the symmetric key of the parent, the integrity value sha…
7715 The symmetric re-encryption is the normal integrity generation and symmetric encryption applied to
7763 the optional symmetric encryption key used as the inner
7788 contain an inner symmetric wrapper
7793 symmetric key used to encrypt duplicate
7801 definition for the symmetric algorithm to use for the inner
7834 the sensitive area encrypted with the symmetric key of
7931 objectPublic is either a storage key with no symmetric algorithm or a
7932 non-storage key with symmetric algorithm different from
7948 the symmetric key referenced by parentHandle
8049 // symmetric key
8074 // Input symmetric key must match the size of algorithm.
8080 // If input symmetric algorithm is NULL, input symmetric key size must
9001 used in a KDF to generate a symmetric key and that key is used to encrypt the data. Once the data
9002 is encrypted and the symmetric key discarded, only the ob ject with the private portion of the
9963 The commands in this clause provide low-level primitives for access to the symmetric algorithms
9964 implemented in the TPM that operate on blocks of data. These include symmetric encryption and
9969 Some of the symmetric encryption/decryption modes use an IV. When an IV is used, it may be an
10067 This command performs symmetric encryption or decryption.
10068 keyHandle shall reference a symmetric cipher object (TPM_RC_KEY).
10115 the symmetric key used for the operation
10130 symmetric mode
10201 is not a symmetric decryption key with both public and private
10290 // The input key should be a symmetric decrypt key.
10377 // the symmetric algorithm's block size
10388 // For symmetric encryption, the cipher data size is the same as plain data
10726 handle for the symmetric signing key providing the
15649 keyHandle references a symmetric key, both the public and private portions need to be loaded.
15652 The sensitive area of the symmetric object is required to allow verification of the symmetric
23818 signed (symmetric or asymmetric) by keySign. That signature is then checked by the TPM in
25180 for an asymmetric key; attempt to create a symmetric cipher key that
25205 a storage key with no symmetric algorithm specified; or non-storage
25206 key with symmetric algorithm different from TPM_ALG_NULL