Lines Matching refs:symmetric

2884 symmetric algorithm standardized by OSCCA
3031 Counter mode – if implemented, all symmetric block
3042 symmetric block ciphers (S type) implemented shall be
3052 symmetric block ciphers (S type) implemented shall be
3058 the object type for a symmetric block cipher
3087 symmetric block ciphers (S type) implemented shall be
3097 symmetric block ciphers (S type) implemented shall be
3139 S – symmetric algorithm with only a private key
4815 the protection algorithms (hash and symmetric) are
4818 symmetric algorithm.
5110 unsupported symmetric algorithm or key size, or
7879 Each algorithm has a fundamental attribute: asymmetric, symmetric, or hash. In some cases (e.g.,
7881 A mode, method, or scheme may have an associated asymmetric, symmetric, or hash algorithm.
7898 symmetric
7900 SET (1): a symmetric block cipher
7901 CLEAR (0): not a symmetric block cipher
7925 SET (1): a signing algorithm. The setting of asymmetric, symmetric, and hash
7934 symmetric, and hash will indicate the type of encryption/decryption algorithm.
10001 A TPMI_ALG_SYM is an interface type of all the symmetric algorithms that have an algorithm ID assig…
10036 A TPMI_ALG_SYM_OBJECT is an interface type of all the TCG-defined symmetric algorithms that may
10037 be used as companion symmetric encryption algorithm for an asymmetric object. All algorithms in thi…
10639 This structure is used for passing an initial value for a symmetric block cipher to or from the TPM…
10640 size is set to be the largest block size of any implemented symmetric cipher implemented on the TPM.
12447 This clause defines the parameters and structures for describing symmetric algorithms.
12507 This union is used to collect the symmetric encryption key sizes.
12542 symmetric block ciphers
12583 symmetric block ciphers
12607 This union allows additional parameters to be added for a symmetric cipher. Currently, no additional
12608 parameters are required for any of the symmetric algorithms.
12635 symmetric block ciphers
12647 those cases when different symmetric algorithms may be selected.
12659 indicates a symmetric algorithm
12685 This structure is used when different symmetric block cipher (not XOR) algorithms may be selected.
12697 selects a symmetric block cipher
12736 This structure is used to hold a symmetric key in the sensitive area of an asymmetric object.
12761 This structure contains the parameters for a symmetric block cipher object.
12773 a symmetric block cipher
12888 data to be sealed or a symmetric key value.
13278 These structures are used to define the key derivation for symmetric secret sharing using asymmetric
13282 Each scheme includes a symmetric algorithm and a KDF selection.
14146 When a symmetric algorithm is used for signing, the signing algorithm is assumed to be an HMAC based
14241 Table 173 shows the basic algorithm-agile structure when a symmetric or asymmetric signature is
14273 TPM2_Duplicate(), TPM2_Import, or TPM2_Rewrap() where the secret is the symmetric encryption
14278 TPM2_ActivateIdentity() or TPM2_CreateIdentity() where the secret is the symmetric encryption key
14310 symmetric[sizeof(TPM2B_DIGEST)]
14397 structures for symmetric keys, and
14452 For a symmetric key (type == TPM_ALG_SYMCIPHER), HMAC key (type == TPM_ALG_KEYEDHASH)
14468 the digest-sized obfuscation value in the sensitive area of a symmetric
14471 symmetric
14591 symmetric
14595 the companion symmetric algorithm for a restricted
14596 decryption key and shall be set to a supported symmetric
14630 symmetric
14635 supported symmetric algorithm, key size, and mode.
14687 symmetric
14692 symmetric algorithm, key size. and mode.
14752 a symmetric block cipher
14932 A TPM2B_PRIVATE area may be encrypted by different symmetric algorithms or, in some cases, not
15023 the symmetric key
16027 The context data of sessions and objects shall be protected by symmetric encryption using CFB. The
16601 REQUIRED, at least one symmetric algorithm shall be implemented
17328 The definitions in this table are derived from the implemented symmetric algorithms.