Lines Matching full:symmetric
143 15 Symmetric Primitives ......................................................................................................................... 116
355 Table 55 ? Symmetric Chaining Process ................................................................................................ 117
1071 TPM_RC_MODE a parameter that should be a symmetric encryption mode selection does not have
1077 TPM_RC_SYMMETRIC a parameter that should be a symmetric algorithm selection does not have a
2097 for all symmetric algorithms.
2110 EXAMPLE A symmetric algorithm remains untested until it is tested with all its modes.
2318 This command allows injection of a secret into the TPM using either asymmetric or symmetric encryption.
2339 If symmetric specifies a block cipher, then TPM_ALG_CFB is the only allowed value for the mode field in
2340 the symmetric parameter (TPM_RC_MODE).
2372 c) tpmKey references a symmetric block cipher or a keyedHash object and encryptedSalt contains a
2439 TPMT_SYM_DEF+ symmetric
2481 TPM_RC_MODE symmetric specifies a block cipher but the mode is not
2558 64 // If 'symmetric' is a symmetric block cipher (not TPM_ALG_NULL or TPM_ALG_XOR)
2560 66 if( in->symmetric.algorithm != TPM_ALG_NULL
2561 67 && in->symmetric.algorithm != TPM_ALG_XOR
2562 68 && in->symmetric.mode.sym != TPM_ALG_CFB)
2574 80 &in->nonceCaller, &in->symmetric,
2707 symmetric object, an optional initial data value (inSensitive.data). The TPM shall validate the consistency
2718 a) For a symmetric key:
2748 symmetric key.
2779 For TPM2_Load(), the TPM will apply normal symmetric protections to the created TPMT_SENSITIVE to
2782 NOTE 4 The encryption key is derived from the symmetric seed in the sensitive area of the parent.
2802 EXAMPLE If the inPublic.parameters.ecc.symmetric.algorithm does not match the parent, the TPM shall return
2877 for an asymmetric key; attempt to create a symmetric cipher key that
2883 TPM_RC_KEY_SIZE key size in public area for symmetric key differs from the size in the
2893 TPM_RC_SYMMETRIC a storage key with no symmetric algorithm specified; or non-storage
2894 key with symmetric algorithm different from TPM_ALG_NULL
3010 After inPrivate.buffer is decrypted using the symmetric key of the parent, the integrity value shall be
3031 EXAMPLE 1 For a symmetric object, the unique value in the public area shall be the digest of the sensitive key
3113 TPM_RC_SYMMETRIC symmetric algorithm not provided when required
3357 TPM_RC_SYMMETRIC symmetric algorithm not provided when required
3564 recover the symmetric key. The recovered seed (but not the Name) is used in a KDF to recover the
3813 22 // NOTE: Needs to be restricted to have a symmetric value.
4187 optional symmetric encryption key
4190 definition for the symmetric algorithm to be used for the
4205 generated, symmetric encryption key for the inner
4240 symmetric algorithm
4241 TPM_RC_SYMMETRIC encryptedDuplication is SET but no symmetric algorithm is provided
4304 58 // If provided the input symmetric key must match the size of the algorithm
4360 use of the oldParent is provided, then an HMAC key and a symmetric key are recovered from inSymSeed
4363 computed. The re-encrypted blob is returned in outDuplicate and the symmetric key returned in
4397 an object encrypted using symmetric key derived from
4401 seed for symmetric key
4403 generate the symmetric key
4413 an object encrypted using symmetric key derived from
4416 seed for a symmetric key protected by newParent
4444 TPM_RC_KEY_SIZE the decrypted input symmetric key size does not matches the
4445 symmetric algorithm key size of oldParent
4460 13 TPM2B_DATA data; // symmetric key
4572 This command allows an object to be encrypted using the symmetric encryption values of a Storage Key.
4593 3) The symmetric key recovered in 1) (2)is used to decrypt the inner data blob.
4630 NOTE 5 The symmetric re-encryption is the normal integrity generation and symmetric encryption applied to
4655 the optional symmetric encryption key used as the inner
4669 contain an inner symmetric wrapper
4670 symmetric key used to encrypt duplicate
4673 definition for the symmetric algorithm to use for the inner
4687 the sensitive area encrypted with the symmetric key of
4750 TPM_RC_SYMMETRIC objectPublic is either a storage key with no symmetric algorithm or a
4751 non-storage key with symmetric algorithm different from
4767 the symmetric key referenced by parentHandle
4778 14 TPM2B_DATA data; // symmetric key
4802 38 // Input symmetric key must match the size of algorithm.
4808 44 // If input symmetric algorithm is NULL, input symmetric key size must
5336 used in a KDF to generate a symmetric key and that key is used to encrypt the data. Once the data
5337 is encrypted and the symmetric key discarded, only the ob ject with the private portion of the
5889 15 Symmetric Primitives
5893 The commands in this clause provide low-level primitives for access to the symmetric algorithms
5894 implemented in the TPM that operate on blocks of data. These include symmetric encryption and
5899 Some of the symmetric encryption/decryption modes use an IV. When an IV is used, it may be an
5910 Table 55 ? Symmetric Chaining Process
5969 This command performs symmetric encryption or decryption.
5970 keyHandle shall reference a symmetric cipher object (TPM_RC_KEY).
5998 the symmetric key used for the operation
6005 symmetric mode
6041 TPM_RC_KEY is not a symmetric decryption key with both public and private
6063 19 // The input key should be a symmetric decrypt key.
6072 28 // If the key is restricted, the input symmetric mode should match the key's
6073 29 // symmetric mode
6102 52 // the symmetric algorithm's block size
6115 65 // For symmetric encryption, the cipher data size is the same as plain data
6316 handle for the symmetric signing key providing the
8948 keyHandle references a symmetric key, both the public and private portions need to be loaded.
8950 NOTE 2 The sensitive area of the symmetric object is required to allow verification of the symmetric
9084 This command causes the TPM to sign an externally provided hash with the specified symmetric or
9087 NOTE 1 Symmetric ?signing? is done with the TPM HMAC commands.
13516 signed (symmetric or asymmetric) by keySign. That signature is then checked by the TPM in
14270 for an asymmetric key; attempt to create a symmetric cipher key that
14280 TPM_RC_SYMMETRIC a storage key with no symmetric algorithm specified; or non-storage
14281 key with symmetric algorithm different from TPM_ALG_NULL