/external/tpm2/ |
D | CryptUtil_fp.h | 47 TPM2B *digest // OUT: HMAC 56 TPM2B *digest // IN: the size of the buffer Out: requested number of byte 76 TPM2B *numerator, // IN: numerator 77 TPM2B *denominator, // IN: denominator 78 TPM2B *quotient, // OUT: quotient = numerator / denominator. 79 TPM2B *remainder // OUT: numerator mod denominator. 119 LIB_EXPORT const TPM2B *CryptEccGetParameter( 188 _cpri__KDFa(((TPM_ALG_ID)hashAlg), ((TPM2B *)key), ((const char *)label), \ 189 ((TPM2B *)contextU), ((TPM2B *)contextV), ((UINT32)sizeInBits), \ 205 _cpri__KDFa(((TPM_ALG_ID)hashAlg), ((TPM2B *)key), ((const char *)label), \ [all …]
|
D | CpriDataEcc.h | 14 const TPM2B *p; // a prime number 15 const TPM2B *a; // linear coefficient 16 const TPM2B *b; // constant term 17 const TPM2B *x; // generator x coordinate 18 const TPM2B *y; // generator y coordinate 19 const TPM2B *n; // the order of the curve 20 const TPM2B *h; // cofactor
|
D | CpriRSA_fp.h | 32 TPM2B *n, // OUT: The public modulu 33 TPM2B *p, // OUT: One of the prime factors of n 38 TPM2B *seed, // IN: the seed to use 40 TPM2B *extra, // IN: Party 1 data for the KDF 54 TPM2B *d, // OUT: the address to receive the private exponent 56 TPM2B *publicKey, // IN/OUT: an input if only one prime is provided. an 58 TPM2B *prime1, // IN: a first prime 59 TPM2B *prime2 // IN: an optional second prime
|
D | CpriHash_fp.h | 35 TPM2B *key, // IN: HMAC key 37 TPM2B *contextU, // IN: context U 38 TPM2B *contextV, // IN: context V 49 TPM2B *Z, // IN: Z 51 TPM2B *partyUInfo, // IN: PartyUInfo 52 TPM2B *partyVInfo, // IN: PartyVInfo 69 TPM2B *oPadKey // OUT: the key prepared for the oPad round 85 TPM2B *oPadKey, // IN: the HMAC key in oPad format
|
D | MemoryLib_fp.h | 15 LIB_EXPORT BOOL Memory2BEqual(const TPM2B *aIn, // IN: compare value 16 const TPM2B *bIn // IN: compare value 20 LIB_EXPORT INT16 MemoryCopy2B(TPM2B *dest, // OUT: receiving TPM2B 21 const TPM2B *source, // IN: source TPM2B 36 TPM2B *aInOut, // IN/OUT: destination 2B 37 TPM2B *bIn, // IN: second 2B
|
D | stubs_hash.c | 15 TPM2B * oPadKey // OUT: the key prepared for the oPad round in _cpri__StartHMAC() 63 TPM2B * oPadKey, // IN: the HMAC key in oPad format in _cpri__CompleteHMAC() 83 TPM2B * key, // IN: HMAC key in _cpri__KDFa() 85 TPM2B * contextU, // IN: context U in _cpri__KDFa() 86 TPM2B * contextV, // IN: context V in _cpri__KDFa() 168 TPM2B * Z, // IN: Z in _cpri__KDFe() 170 TPM2B * partyUInfo, // IN: PartyUInfo in _cpri__KDFe() 171 TPM2B * partyVInfo, // IN: PartyVInfo in _cpri__KDFe() 247 TPM2B * seed, // IN: the seed value in _cpri__GenerateSeededRandom() 249 TPM2B * partyU, // IN: other data (oprtional) in _cpri__GenerateSeededRandom() [all …]
|
D | MathFunctions_fp.h | 15 LIB_EXPORT CRYPT_RESULT _math__Div(const TPM2B *n, // IN: numerator 16 const TPM2B *d, // IN: denominator 17 TPM2B *q, // OUT: quotient 18 TPM2B *r // OUT: remainder 31 LIB_EXPORT UINT16 _math__Normalize2B(TPM2B *b // IN/OUT: number to normalize
|
D | CpriMisc_fp.h | 11 const TPM2B *in // IN: the TPM2B to copy 13 BOOL BnTo2B(TPM2B *outVal, // OUT: place for the result 17 void Copy2B(TPM2B *out, // OUT: The TPM2B to receive the copy 18 TPM2B *in // IN: the TPM2B to copy
|
D | RSAKeySieve_fp.h | 11 TPM2B *n, // OUT: The public modulus 12 TPM2B *p, // OUT: One of the prime factors of n 17 TPM2B *seed, // IN: the seed to use 19 TPM2B *extra, // IN: Party 1 data for the KDF
|
D | MemoryLib.c | 100 TPM2B *dest, // OUT: receiving TPM2B in MemoryCopy2B() 101 const TPM2B *source, // IN: source TPM2B in MemoryCopy2B() 125 TPM2B *aInOut, // IN/OUT: destination 2B in MemoryConcat2B() 126 TPM2B *bIn, // IN: second 2B in MemoryConcat2B() 152 const TPM2B *aIn, // IN: compare value in Memory2BEqual() 153 const TPM2B *bIn // IN: compare value in Memory2BEqual()
|
D | CpriMisc.c | 26 TPM2B *outVal, // OUT: place for the result in BnTo2B() 53 TPM2B *out, // OUT: The TPM2B to receive the copy in Copy2B() 54 TPM2B *in // IN: the TPM2B to copy in Copy2B() 74 const TPM2B *in // IN: the TPM2B to copy in BnFrom2B()
|
D | tpm_types.h | 626 TPM2B b; 635 TPM2B b; 653 TPM2B b; 662 TPM2B b; 671 TPM2B b; 680 TPM2B b; 689 TPM2B b; 704 TPM2B b; 811 TPM2B b; 952 TPM2B b; [all …]
|
D | CpriRNG_fp.h | 17 TPM2B *seed, // IN: the seed value 19 TPM2B *partyU, // IN: other data (oprtional) 20 TPM2B *partyV // IN: still more (optional)
|
D | CpriECC_fp.h | 62 TPM2B *seed, // IN: the seed to use 64 TPM2B *extra, // IN: Party 1 data for the KDF 81 TPM2B *digest, // IN: the digest to sign 93 TPM2B *digest // IN: the digest that was signed
|
D | CpriRNG.c | 136 TPM2B *seed, // IN: the seed value in _cpri__GenerateSeededRandom() 138 TPM2B *partyU, // IN: other data (oprtional) in _cpri__GenerateSeededRandom() 139 TPM2B *partyV // IN: still more (optional) in _cpri__GenerateSeededRandom()
|
D | CryptUtil.c | 285 TPM2B *key, // IN: HMAC key in CryptStartHMAC2B() 309 TPM2B *key, // IN: HMAC key in CryptStartHMACSequence2B() 351 TPM2B *bIn // IN: 2B containing the data in CryptUpdateDigest2B() 461 TPM2B *digest // IN: the size of the buffer Out: requested in CryptCompleteHash2B() 533 TPM2B *digest // OUT: HMAC in CryptCompleteHMAC2B() 757 TPM2B *key, // IN: HMAC key in KDFa() 759 TPM2B *contextU, // IN: context U in KDFa() 760 TPM2B *contextV, // IN: context V in KDFa() 817 TPM2B *d, // OUT: receives the private exponent in CryptTestKeyRSA() 819 TPM2B *n, // IN/OUT: public modulu in CryptTestKeyRSA() [all …]
|
D | MathFunctions.c | 30 TPM2B *b // IN/OUT: number to normalize in _math__Normalize2B() 57 TPM2B *in, // IN:OUT TPM2B number to de-normalize in _math__Denormalize2B() 280 const TPM2B *n, // IN: numerator in _math__Div() 281 const TPM2B *d, // IN: denominator in _math__Div() 282 TPM2B *q, // OUT: quotient in _math__Div() 283 TPM2B *r // OUT: remainder in _math__Div()
|
D | CpriHash.c | 571 TPM2B *oPadKey // OUT: the key prepared for the oPad round in _cpri__StartHMAC() 631 TPM2B *oPadKey, // IN: the HMAC key in oPad format in _cpri__CompleteHMAC() 749 TPM2B *key, // IN: HMAC key in _cpri__KDFa() 751 TPM2B *contextU, // IN: context U in _cpri__KDFa() 752 TPM2B *contextV, // IN: context V in _cpri__KDFa() 851 TPM2B *Z, // IN: Z in _cpri__KDFe() 853 TPM2B *partyUInfo, // IN: PartyUInfo in _cpri__KDFe() 854 TPM2B *partyVInfo, // IN: PartyVInfo in _cpri__KDFe()
|
D | RSAKeySieve.c | 150 TPM2B *p // OUT: the pseudo random result in RandomForRsa() 681 TPM2B *p, in GenerateRandomPrime() 719 TPM2B *seed, // IN: the seed for the digest proce in KDFaContextStart() 721 TPM2B *extra, // IN: the extra data in KDFaContextStart() 777 TPM2B *n, // OUT: The public modulus in _cpri__GenerateKeyRSA() 778 TPM2B *p, // OUT: One of the prime factors of n in _cpri__GenerateKeyRSA() 783 TPM2B *seed, // IN: the seed to use in _cpri__GenerateKeyRSA() 785 TPM2B *extra, // IN: Party 1 data for the KDF in _cpri__GenerateKeyRSA()
|
D | CpriECC.c | 294 const TPM2B *pIn // IN: the maximum value for the key in GetRandomPrivate() 670 TPM2B *seed, // IN: the seed to use in _cpri__GenerateKeyEcc() 673 TPM2B *extra, // IN: Party 1 data for the KDF in _cpri__GenerateKeyEcc() 798 TPM2B *digest // IN: the value to sign in SignEcdsa() 954 TPM2B *tIn, // IN: the value to sign in EcDaa() 960 const TPM2B *n; in EcDaa() 1023 TPM2B *x, // IN/OUT: value to reduce in Mod2B() 1024 const TPM2B *n // IN: mod in Mod2B() 1068 TPM2B *digest, // IN: the digest to sign in SchnorrEcc() 1075 const TPM2B *n; in SchnorrEcc() [all …]
|
D | CryptoEngine.h | 181 TPM2B *publicKey; // Pointer to the public modulus 182 TPM2B *privateKey; // The private exponent (not a prime)
|
D | Commit.c | 35 TPM2B *p; in TPM2_Commit() 62 p = (TPM2B *)CryptEccGetParameter('p', parms->curveID); in TPM2_Commit()
|
D | CpriRSA.c | 132 TPM2B *d, // OUT: the address to receive the private in _cpri__TestKeyRSA() 135 TPM2B *publicKey, // IN/OUT: an input if only one prime is in _cpri__TestKeyRSA() 138 TPM2B *prime1, // IN: a first prime in _cpri__TestKeyRSA() 139 TPM2B *prime2 // IN: an optional second prime in _cpri__TestKeyRSA() 1166 TPM2B *n, // OUT: The public modulu in _cpri__GenerateKeyRSA() 1167 TPM2B *p, // OUT: One of the prime factors of n in _cpri__GenerateKeyRSA() 1172 TPM2B *seed, // IN: the seed to use in _cpri__GenerateKeyRSA() 1174 TPM2B *extra, // IN: Party 1 data for the KDF in _cpri__GenerateKeyRSA()
|
D | BaseTypes.h | 30 } TPM2B; typedef
|
D | TPMB.h | 20 TPM2B b; \
|