Searched refs:TPM_ALG_NULL (Results 1 – 10 of 10) sorted by relevance
/system/tpm/trunks/ |
D | trunks_client_test.cc | 124 result = utility->Sign(signing_key, TPM_ALG_NULL, TPM_ALG_NULL, in SignTest() 131 result = utility->Verify(signing_key, TPM_ALG_NULL, TPM_ALG_NULL, in SignTest() 466 result = utility->Sign(scoped_key.get(), TPM_ALG_NULL, TPM_ALG_NULL, in PolicyAuthValueTest() 473 result = utility->Verify(scoped_key.get(), TPM_ALG_NULL, TPM_ALG_NULL, in PolicyAuthValueTest() 480 result = utility->AsymmetricEncrypt(scoped_key.get(), TPM_ALG_NULL, in PolicyAuthValueTest() 481 TPM_ALG_NULL, "plaintext", in PolicyAuthValueTest() 496 result = utility->AsymmetricDecrypt(scoped_key.get(), TPM_ALG_NULL, in PolicyAuthValueTest() 497 TPM_ALG_NULL, ciphertext, in PolicyAuthValueTest() 599 result = utility->Sign(scoped_key.get(), TPM_ALG_NULL, TPM_ALG_NULL, in PolicyAndTest() 631 result = utility->Sign(scoped_key.get(), TPM_ALG_NULL, TPM_ALG_NULL, in PolicyAndTest() [all …]
|
D | tpm_utility_test.cc | 507 TPM_ALG_NULL, in TEST_F() 508 TPM_ALG_NULL, in TEST_F() 530 TPM_ALG_NULL, in TEST_F() 531 TPM_ALG_NULL, in TEST_F() 549 TPM_ALG_NULL, in TEST_F() 576 TPM_ALG_NULL, in TEST_F() 577 TPM_ALG_NULL, in TEST_F() 607 TPM_ALG_NULL, in TEST_F() 636 TPM_ALG_NULL, in TEST_F() 637 TPM_ALG_NULL, in TEST_F() [all …]
|
D | tpm_utility_impl.cc | 416 if (hash_alg == TPM_ALG_NULL) { in AsymmetricEncrypt() 421 } else if (scheme == TPM_ALG_OAEP || scheme == TPM_ALG_NULL) { in AsymmetricEncrypt() 479 if (hash_alg == TPM_ALG_NULL) { in AsymmetricDecrypt() 484 } else if (scheme == TPM_ALG_OAEP || scheme == TPM_ALG_NULL) { in AsymmetricDecrypt() 548 if (hash_alg == TPM_ALG_NULL) { in Sign() 554 } else if (scheme == TPM_ALG_RSASSA || scheme == TPM_ALG_NULL) { in Sign() 641 if (hash_alg == TPM_ALG_NULL) { in Verify() 650 } else if (scheme == TPM_ALG_NULL || scheme == TPM_ALG_RSASSA) { in Verify() 693 in_scheme.scheme = TPM_ALG_NULL; in CertifyCreation() 1709 public_area.parameters.rsa_detail.scheme.scheme = TPM_ALG_NULL; in CreateDefaultPublicArea() [all …]
|
D | tpm_generated_test.cc | 424 null_scheme.scheme = TPM_ALG_NULL; in TEST_F()
|
D | tpm_generated.cc | 2315 if (selector == TPM_ALG_NULL) { in Serialize_TPMU_HA() 2398 if (selector == TPM_ALG_NULL) { in Parse_TPMU_HA() 5229 if (selector == TPM_ALG_NULL) { in Serialize_TPMU_SYM_KEY_BITS() 5264 if (selector == TPM_ALG_NULL) { in Parse_TPMU_SYM_KEY_BITS() 5307 if (selector == TPM_ALG_NULL) { in Serialize_TPMU_SYM_MODE() 5339 if (selector == TPM_ALG_NULL) { in Parse_TPMU_SYM_MODE() 5866 if (selector == TPM_ALG_NULL) { in Serialize_TPMU_SCHEME_KEYEDHASH() 5894 if (selector == TPM_ALG_NULL) { in Parse_TPMU_SCHEME_KEYEDHASH() 6066 if (selector == TPM_ALG_NULL) { in Serialize_TPMU_SIG_SCHEME() 6150 if (selector == TPM_ALG_NULL) { in Parse_TPMU_SIG_SCHEME() [all …]
|
D | tpm_generated.h | 472 const TPM_ALG_ID TPM_ALG_NULL = 0x0010; variable
|
/system/tpm/trunks/generator/ |
D | raw_commands.txt | 969 Types" in Part 2). The null value is usually TPM_RH_NULL for a handle or TPM_ALG_NULL for 3517 If both tpmKey and bind are TPM_ALG_NULL, then sessionKey is set to the Empty Buffer. If tpmKey is 3518 not TPM_ALG_NULL, then encryptedSalt is used in the computation of sessionKey. If bind is not 3519 TPM_ALG_NULL, the authValue of bind is used in the sessionKey computation. 3550 If tpmKey is not TPM_ALG_NULL then encryptedSalt shall be a TPM2B_ENCRYPTED_SECRET of the 3711 may select TPM_ALG_NULL 3719 not TPM_ALG_NULL 3981 // If 'symmetric' is a symmetric block cipher (not TPM_ALG_NULL or TPM_ALG_XOR) 3984 in->symmetric.algorithm != TPM_ALG_NULL 4253 requires that the kdf in the template be set to TPM_ALG_NULL or TPM_RC_KDF is [all …]
|
D | raw_commands_fixed.txt | 969 Types" in Part 2). The null value is usually TPM_RH_NULL for a handle or TPM_ALG_NULL for 3517 If both tpmKey and bind are TPM_ALG_NULL, then sessionKey is set to the Empty Buffer. If tpmKey is 3518 not TPM_ALG_NULL, then encryptedSalt is used in the computation of sessionKey. If bind is not 3519 TPM_ALG_NULL, the authValue of bind is used in the sessionKey computation. 3550 If tpmKey is not TPM_ALG_NULL then encryptedSalt shall be a TPM2B_ENCRYPTED_SECRET of the 3713 may select TPM_ALG_NULL 3721 not TPM_ALG_NULL 3983 // If 'symmetric' is a symmetric block cipher (not TPM_ALG_NULL or TPM_ALG_XOR) 3986 in->symmetric.algorithm != TPM_ALG_NULL 4255 requires that the kdf in the template be set to TPM_ALG_NULL or TPM_RC_KDF is [all …]
|
D | raw_structures.txt | 1607 because one collection allows TPM_ALG_NULL and the other does not, it is preferred that the re not … 1609 added to a TPM_ALG_NULL value in the table defining the type. When the use of that type allows 1610 TPM_ALG_NULL to be in the set, the use would append a “+” to the instance. 2714 TPM_ALG_KEYEDHASH and TPM_ALG_NULL are required of all TPM implementations. 2870 TPM_ALG_NULL 8039 TPM_ALG_NULL and newParentHandle shall not be TPM_RH_NULL. 8452 TPM_ALG_NULL and newParentHandle may not be TPM_RH_NULL. 9943 +TPM_ALG_NULL 9956 +TPM_ALG_NULL 10001 +TPM_ALG_NULL [all …]
|
D | raw_structures_fixed.txt | 1607 because one collection allows TPM_ALG_NULL and the other does not, it is preferred that the re not … 1609 added to a TPM_ALG_NULL value in the table defining the type. When the use of that type allows 1610 TPM_ALG_NULL to be in the set, the use would append a “+” to the instance. 2716 TPM_ALG_KEYEDHASH and TPM_ALG_NULL are required of all TPM implementations. 2864 TPM_ALG_NULL 8067 TPM_ALG_NULL and newParentHandle shall not be TPM_RH_NULL. 8480 TPM_ALG_NULL and newParentHandle may not be TPM_RH_NULL. 9971 +TPM_ALG_NULL 9984 +TPM_ALG_NULL 10029 +TPM_ALG_NULL [all …]
|