Home
last modified time | relevance | path

Searched refs:TPM2B (Results 1 – 25 of 29) sorted by relevance

12

/external/tpm2/
DCryptUtil_fp.h47 TPM2B *digest // OUT: HMAC
56 TPM2B *digest // IN: the size of the buffer Out: requested number of byte
76 TPM2B *numerator, // IN: numerator
77 TPM2B *denominator, // IN: denominator
78 TPM2B *quotient, // OUT: quotient = numerator / denominator.
79 TPM2B *remainder // OUT: numerator mod denominator.
119 LIB_EXPORT const TPM2B *CryptEccGetParameter(
188 _cpri__KDFa(((TPM_ALG_ID)hashAlg), ((TPM2B *)key), ((const char *)label), \
189 ((TPM2B *)contextU), ((TPM2B *)contextV), ((UINT32)sizeInBits), \
205 _cpri__KDFa(((TPM_ALG_ID)hashAlg), ((TPM2B *)key), ((const char *)label), \
[all …]
DCpriDataEcc.h14 const TPM2B *p; // a prime number
15 const TPM2B *a; // linear coefficient
16 const TPM2B *b; // constant term
17 const TPM2B *x; // generator x coordinate
18 const TPM2B *y; // generator y coordinate
19 const TPM2B *n; // the order of the curve
20 const TPM2B *h; // cofactor
DCpriRSA_fp.h32 TPM2B *n, // OUT: The public modulu
33 TPM2B *p, // OUT: One of the prime factors of n
38 TPM2B *seed, // IN: the seed to use
40 TPM2B *extra, // IN: Party 1 data for the KDF
54 TPM2B *d, // OUT: the address to receive the private exponent
56 TPM2B *publicKey, // IN/OUT: an input if only one prime is provided. an
58 TPM2B *prime1, // IN: a first prime
59 TPM2B *prime2 // IN: an optional second prime
DCpriHash_fp.h35 TPM2B *key, // IN: HMAC key
37 TPM2B *contextU, // IN: context U
38 TPM2B *contextV, // IN: context V
49 TPM2B *Z, // IN: Z
51 TPM2B *partyUInfo, // IN: PartyUInfo
52 TPM2B *partyVInfo, // IN: PartyVInfo
69 TPM2B *oPadKey // OUT: the key prepared for the oPad round
85 TPM2B *oPadKey, // IN: the HMAC key in oPad format
DMemoryLib_fp.h15 LIB_EXPORT BOOL Memory2BEqual(const TPM2B *aIn, // IN: compare value
16 const TPM2B *bIn // IN: compare value
20 LIB_EXPORT INT16 MemoryCopy2B(TPM2B *dest, // OUT: receiving TPM2B
21 const TPM2B *source, // IN: source TPM2B
36 TPM2B *aInOut, // IN/OUT: destination 2B
37 TPM2B *bIn, // IN: second 2B
Dstubs_hash.c15 TPM2B * oPadKey // OUT: the key prepared for the oPad round in _cpri__StartHMAC()
63 TPM2B * oPadKey, // IN: the HMAC key in oPad format in _cpri__CompleteHMAC()
83 TPM2B * key, // IN: HMAC key in _cpri__KDFa()
85 TPM2B * contextU, // IN: context U in _cpri__KDFa()
86 TPM2B * contextV, // IN: context V in _cpri__KDFa()
168 TPM2B * Z, // IN: Z in _cpri__KDFe()
170 TPM2B * partyUInfo, // IN: PartyUInfo in _cpri__KDFe()
171 TPM2B * partyVInfo, // IN: PartyVInfo in _cpri__KDFe()
247 TPM2B * seed, // IN: the seed value in _cpri__GenerateSeededRandom()
249 TPM2B * partyU, // IN: other data (oprtional) in _cpri__GenerateSeededRandom()
[all …]
DMathFunctions_fp.h15 LIB_EXPORT CRYPT_RESULT _math__Div(const TPM2B *n, // IN: numerator
16 const TPM2B *d, // IN: denominator
17 TPM2B *q, // OUT: quotient
18 TPM2B *r // OUT: remainder
31 LIB_EXPORT UINT16 _math__Normalize2B(TPM2B *b // IN/OUT: number to normalize
DCpriMisc_fp.h11 const TPM2B *in // IN: the TPM2B to copy
13 BOOL BnTo2B(TPM2B *outVal, // OUT: place for the result
17 void Copy2B(TPM2B *out, // OUT: The TPM2B to receive the copy
18 TPM2B *in // IN: the TPM2B to copy
DRSAKeySieve_fp.h11 TPM2B *n, // OUT: The public modulus
12 TPM2B *p, // OUT: One of the prime factors of n
17 TPM2B *seed, // IN: the seed to use
19 TPM2B *extra, // IN: Party 1 data for the KDF
DMemoryLib.c100 TPM2B *dest, // OUT: receiving TPM2B in MemoryCopy2B()
101 const TPM2B *source, // IN: source TPM2B in MemoryCopy2B()
125 TPM2B *aInOut, // IN/OUT: destination 2B in MemoryConcat2B()
126 TPM2B *bIn, // IN: second 2B in MemoryConcat2B()
152 const TPM2B *aIn, // IN: compare value in Memory2BEqual()
153 const TPM2B *bIn // IN: compare value in Memory2BEqual()
DCpriMisc.c26 TPM2B *outVal, // OUT: place for the result in BnTo2B()
53 TPM2B *out, // OUT: The TPM2B to receive the copy in Copy2B()
54 TPM2B *in // IN: the TPM2B to copy in Copy2B()
74 const TPM2B *in // IN: the TPM2B to copy in BnFrom2B()
Dtpm_types.h626 TPM2B b;
635 TPM2B b;
653 TPM2B b;
662 TPM2B b;
671 TPM2B b;
680 TPM2B b;
689 TPM2B b;
704 TPM2B b;
811 TPM2B b;
952 TPM2B b;
[all …]
DCpriRNG_fp.h17 TPM2B *seed, // IN: the seed value
19 TPM2B *partyU, // IN: other data (oprtional)
20 TPM2B *partyV // IN: still more (optional)
DCpriECC_fp.h62 TPM2B *seed, // IN: the seed to use
64 TPM2B *extra, // IN: Party 1 data for the KDF
81 TPM2B *digest, // IN: the digest to sign
93 TPM2B *digest // IN: the digest that was signed
DCpriRNG.c136 TPM2B *seed, // IN: the seed value in _cpri__GenerateSeededRandom()
138 TPM2B *partyU, // IN: other data (oprtional) in _cpri__GenerateSeededRandom()
139 TPM2B *partyV // IN: still more (optional) in _cpri__GenerateSeededRandom()
DCryptUtil.c285 TPM2B *key, // IN: HMAC key in CryptStartHMAC2B()
309 TPM2B *key, // IN: HMAC key in CryptStartHMACSequence2B()
351 TPM2B *bIn // IN: 2B containing the data in CryptUpdateDigest2B()
461 TPM2B *digest // IN: the size of the buffer Out: requested in CryptCompleteHash2B()
533 TPM2B *digest // OUT: HMAC in CryptCompleteHMAC2B()
757 TPM2B *key, // IN: HMAC key in KDFa()
759 TPM2B *contextU, // IN: context U in KDFa()
760 TPM2B *contextV, // IN: context V in KDFa()
817 TPM2B *d, // OUT: receives the private exponent in CryptTestKeyRSA()
819 TPM2B *n, // IN/OUT: public modulu in CryptTestKeyRSA()
[all …]
DMathFunctions.c30 TPM2B *b // IN/OUT: number to normalize in _math__Normalize2B()
57 TPM2B *in, // IN:OUT TPM2B number to de-normalize in _math__Denormalize2B()
280 const TPM2B *n, // IN: numerator in _math__Div()
281 const TPM2B *d, // IN: denominator in _math__Div()
282 TPM2B *q, // OUT: quotient in _math__Div()
283 TPM2B *r // OUT: remainder in _math__Div()
DCpriHash.c571 TPM2B *oPadKey // OUT: the key prepared for the oPad round in _cpri__StartHMAC()
631 TPM2B *oPadKey, // IN: the HMAC key in oPad format in _cpri__CompleteHMAC()
749 TPM2B *key, // IN: HMAC key in _cpri__KDFa()
751 TPM2B *contextU, // IN: context U in _cpri__KDFa()
752 TPM2B *contextV, // IN: context V in _cpri__KDFa()
851 TPM2B *Z, // IN: Z in _cpri__KDFe()
853 TPM2B *partyUInfo, // IN: PartyUInfo in _cpri__KDFe()
854 TPM2B *partyVInfo, // IN: PartyVInfo in _cpri__KDFe()
DRSAKeySieve.c150 TPM2B *p // OUT: the pseudo random result in RandomForRsa()
681 TPM2B *p, in GenerateRandomPrime()
719 TPM2B *seed, // IN: the seed for the digest proce in KDFaContextStart()
721 TPM2B *extra, // IN: the extra data in KDFaContextStart()
777 TPM2B *n, // OUT: The public modulus in _cpri__GenerateKeyRSA()
778 TPM2B *p, // OUT: One of the prime factors of n in _cpri__GenerateKeyRSA()
783 TPM2B *seed, // IN: the seed to use in _cpri__GenerateKeyRSA()
785 TPM2B *extra, // IN: Party 1 data for the KDF in _cpri__GenerateKeyRSA()
DCpriECC.c294 const TPM2B *pIn // IN: the maximum value for the key in GetRandomPrivate()
670 TPM2B *seed, // IN: the seed to use in _cpri__GenerateKeyEcc()
673 TPM2B *extra, // IN: Party 1 data for the KDF in _cpri__GenerateKeyEcc()
798 TPM2B *digest // IN: the value to sign in SignEcdsa()
954 TPM2B *tIn, // IN: the value to sign in EcDaa()
960 const TPM2B *n; in EcDaa()
1023 TPM2B *x, // IN/OUT: value to reduce in Mod2B()
1024 const TPM2B *n // IN: mod in Mod2B()
1068 TPM2B *digest, // IN: the digest to sign in SchnorrEcc()
1075 const TPM2B *n; in SchnorrEcc()
[all …]
DCryptoEngine.h181 TPM2B *publicKey; // Pointer to the public modulus
182 TPM2B *privateKey; // The private exponent (not a prime)
DCommit.c35 TPM2B *p; in TPM2_Commit()
62 p = (TPM2B *)CryptEccGetParameter('p', parms->curveID); in TPM2_Commit()
DCpriRSA.c132 TPM2B *d, // OUT: the address to receive the private in _cpri__TestKeyRSA()
135 TPM2B *publicKey, // IN/OUT: an input if only one prime is in _cpri__TestKeyRSA()
138 TPM2B *prime1, // IN: a first prime in _cpri__TestKeyRSA()
139 TPM2B *prime2 // IN: an optional second prime in _cpri__TestKeyRSA()
1166 TPM2B *n, // OUT: The public modulu in _cpri__GenerateKeyRSA()
1167 TPM2B *p, // OUT: One of the prime factors of n in _cpri__GenerateKeyRSA()
1172 TPM2B *seed, // IN: the seed to use in _cpri__GenerateKeyRSA()
1174 TPM2B *extra, // IN: Party 1 data for the KDF in _cpri__GenerateKeyRSA()
DBaseTypes.h30 } TPM2B; typedef
DTPMB.h20 TPM2B b; \

12