Lines Matching refs:signature
630 TPMT_SIGNATURE *signature // OUT: signature
644 (BYTE *) &signature->signature.hmac.digest);
646 signature->signature.hmac.hashAlg = scheme->details.hmac.hashAlg;
653 // This function will verify a signature signed by a HMAC key.
657 // TPM_RC_SIGNATURE if invalid input or signature is not genuine
663 TPMT_SIGNATURE *signature // IN: signature to be verified
668 digestToCompare.t.size = CryptStartHMAC2B(signature->signature.hmac.hashAlg,
674 (BYTE *) &signature->signature.hmac.digest,
1127 TPMT_SIGNATURE *sig // OUT: signature
1147 TEST_HASH(sig->signature.any.hashAlg);
1152 sig->signature.rsassa.sig.t.buffer,
1155 sig->signature.any.hashAlg,
1158 sig->signature.rsassa.sig.t.size = (UINT16)signSize;
1168 // This function is used to verify signature signed by a RSA key.
1172 // TPM_RC_SIGNATURE if signature is not genuine
1173 // TPM_RC_SCHEME signature scheme not supported
1179 TPMT_SIGNATURE *sig // IN: signature to be verified
1187 TEST_HASH(sig->signature.any.hashAlg);
1191 // Call crypto engine to verify signature
1195 sig->signature.any.hashAlg,
1198 sig->signature.rsassa.sig.t.size,
1199 sig->signature.rsassa.sig.t.buffer,
1455 TPMT_SIGNATURE *signature // OUT: signature
1477 retVal = _cpri__SignEcc(&signature->signature.ecdsa.signatureR,
1478 &signature->signature.ecdsa.signatureS,
1495 // This function is used to verify a signature created with an ECC key.
1499 // TPM_RC_SIGNATURE if signature is not valid
1506 TPMT_SIGNATURE *signature // IN: signature to be verified
1510 TEST_HASH(signature->signature.any.hashAlg);
1511 TEST(signature->sigAlg);
1515 retVal = _cpri__ValidateSignatureEcc(&signature->signature.ecdsa.signatureR,
1516 &signature->signature.ecdsa.signatureS,
1517 signature->sigAlg,
1518 signature->signature.any.hashAlg,
3135 // Get the hash algorithm of signature from a TPMT_SIGNATURE structure. It assumes the signature is not
3140 TPMT_SIGNATURE *auth // IN: signature
3149 return auth->signature.rsassa.hash;
3151 return auth->signature.rsapss.hash;
3155 return auth->signature.ecdsa.hash;
3158 return auth->signature.hmac.hashAlg;
3269 // signature scheme to use in signing. This function requires that the signing key either be TPM_RH_NULL
3378 TPMT_SIGNATURE *signature // OUT: signature
3388 // Initialize signature scheme
3389 signature->sigAlg = signScheme->scheme;
3390 // If the signature algorithm is TPM_ALG_NULL, then we are done
3391 if(signature->sigAlg == TPM_ALG_NULL)
3395 // Initialize signature hash
3398 signature->signature.any.hashAlg = signScheme->details.any.hashAlg;
3404 result = CryptSignRSA(signKey, signScheme, digest, signature);
3409 result = CryptSignECC(signKey, signScheme, digest, signature);
3413 result = CryptSignHMAC(signKey, signScheme, digest, signature);
3424 // This function is used to verify a signature. It is called by TPM2_VerifySignature() and
3427 // signature type because a caller can load any public key that they like with any scheme that they like. This
3428 // routine simply makes sure that the signature is correct, whatever the type.
3433 // TPM_RC_SIGNATURE the signature is not genuine
3442 TPMT_SIGNATURE *signature // IN: signature
3452 // The input unmarshaling should prevent any input signature from being
3453 // a NULL signature, but just in case
3454 if(signature->sigAlg == TPM_ALG_NULL)
3460 result = CryptRSAVerifySignature(authObject, digest, signature);
3465 result = CryptECCVerifySignature(authObject, digest, signature);
3472 result = CryptHMACVerifySignature(authObject, digest, signature);