Lines Matching refs:symmetric

2890 symmetric algorithm standardized by OSCCA
3037 Counter mode – if implemented, all symmetric block
3048 symmetric block ciphers (S type) implemented shall be
3058 symmetric block ciphers (S type) implemented shall be
3064 the object type for a symmetric block cipher
3093 symmetric block ciphers (S type) implemented shall be
3103 symmetric block ciphers (S type) implemented shall be
3145 S – symmetric algorithm with only a private key
4819 the protection algorithms (hash and symmetric) are
4822 symmetric algorithm.
5116 unsupported symmetric algorithm or key size, or
7851 Each algorithm has a fundamental attribute: asymmetric, symmetric, or hash. In some cases (e.g.,
7853 A mode, method, or scheme may have an associated asymmetric, symmetric, or hash algorithm.
7870 symmetric
7872 SET (1): a symmetric block cipher
7873 CLEAR (0): not a symmetric block cipher
7897 SET (1): a signing algorithm. The setting of asymmetric, symmetric, and hash
7906 symmetric, and hash will indicate the type of encryption/decryption algorithm.
9973 A TPMI_ALG_SYM is an interface type of all the symmetric algorithms that have an algorithm ID assig…
10008 A TPMI_ALG_SYM_OBJECT is an interface type of all the TCG-defined symmetric algorithms that may
10009 be used as companion symmetric encryption algorithm for an asymmetric object. All algorithms in thi…
10611 This structure is used for passing an initial value for a symmetric block cipher to or from the TPM…
10612 size is set to be the largest block size of any implemented symmetric cipher implemented on the TPM.
12409 This clause defines the parameters and structures for describing symmetric algorithms.
12469 This union is used to collect the symmetric encryption key sizes.
12504 symmetric block ciphers
12567 symmetric block ciphers
12595 This union allows additional parameters to be added for a symmetric cipher. Currently, no additional
12596 parameters are required for any of the symmetric algorithms.
12623 symmetric block ciphers
12635 those cases when different symmetric algorithms may be selected.
12647 indicates a symmetric algorithm
12673 This structure is used when different symmetric block cipher (not XOR) algorithms may be selected.
12685 selects a symmetric block cipher
12724 This structure is used to hold a symmetric key in the sensitive area of an asymmetric object.
12749 This structure contains the parameters for a symmetric block cipher object.
12761 a symmetric block cipher
12876 data to be sealed or a symmetric key value.
13261 These structures are used to define the key derivation for symmetric secret sharing using asymmetric
13265 Each scheme includes a symmetric algorithm and a KDF selection.
14131 When a symmetric algorithm is used for signing, the signing algorithm is assumed to be an HMAC based
14229 Table 173 shows the basic algorithm-agile structure when a symmetric or asymmetric signature is
14261 TPM2_Duplicate(), TPM2_Import, or TPM2_Rewrap() where the secret is the symmetric encryption
14266 TPM2_ActivateIdentity() or TPM2_CreateIdentity() where the secret is the symmetric encryption key
14298 symmetric[sizeof(TPM2B_DIGEST)]
14385 structures for symmetric keys, and
14440 For a symmetric key (type == TPM_ALG_SYMCIPHER), HMAC key (type == TPM_ALG_KEYEDHASH)
14456 the digest-sized obfuscation value in the sensitive area of a symmetric
14459 symmetric
14579 symmetric
14583 the companion symmetric algorithm for a restricted
14584 decryption key and shall be set to a supported symmetric
14619 symmetric
14622 supported symmetric algorithm, key size, and mode.
14689 symmetric
14694 symmetric algorithm, key size. and mode.
14723 an optional key derivation scheme for generating a symmetric
14763 a symmetric block cipher
14940 A TPM2B_PRIVATE area may be encrypted by different symmetric algorithms or, in some cases, not
15031 the symmetric key
16036 The context data of sessions and objects shall be protected by symmetric encryption using CFB. The
16618 REQUIRED, at least one symmetric algorithm shall be implemented
17346 The definitions in this table are derived from the implemented symmetric algorithms.