Home | History | Annotate | Download | only in tpm2

Lines Matching full:ecc

680        10.2.6 ECC Functions ................................................................................................. 294
781 B.3.5.1. ECC-related Structures ............................................................................... 362
6272 generate r value (for an ECC key)
7273 313 // Special checks for an ECC key
17860 for RSA and ECC keys
19054 373 // number of loaded ECC curves
21105 10.2.6 ECC Functions
21143 This macro returns the size of the ECC key in bytes. It uses CryptEccGetKeySizeInBits().
21152 This function returns a pointer to an ECC curve parameter. The parameter is selected by a single
21223 This function will validate that an ECC point is on the curve of given curveID.
21232 1020 TPM_ECC_CURVE curveID, // IN: ECC curve ID
21233 1021 TPMS_ECC_POINT *Q // IN: ECC point
21246 1028 // Call crypto engine function to check if a ECC public point is on the
21257 This function creates a random ECC key that is not derived from other parameters as is a Primary Key.
21261 1037 TPM_ECC_CURVE curveID, // IN: ECC curve
21283 TPM_RC_ECC_POINT invalid optional ECC point pIn
21324 This function generates an ECC key from a seed value.
21348 1093 // The iteration counter has no meaning for ECC key generation. The parameter
21359 1104 retVal = _cpri__GenerateKeyEcc(&publicArea->unique.ecc,
21360 1105 &sensitive->sensitive.ecc,
21362 1107 hashAlg, &seed->b, "ECC key by vendor",
21371 This function is used for ECC
21389 1114 OBJECT *signKey, // IN: ECC key to sign the hash
21399 1124 // Run a test of the ECC sign and verify if it has not already been run
21421 1146 &signKey->sensitive.sensitive.ecc,
21434 This function is used to verify a signature created with an ECC key.
21443 1157 OBJECT *signKey, // IN: ECC key signed the hash
21459 1167 // This implementation uses the fact that all the defined ECC signing
21467 1175 &signKey->publicArea.unique.ecc,
21661 This function returns the ECC parameter details of the given curve
21666 FALSE Unsupported ECC curve ID
21670 1306 TPM_ECC_CURVE curveId, // IN: ECC curve ID
21671 1307 TPMS_ALGORITHM_DETAIL_ECC *parameters // OUT: ECC parameter
22474 TPM_RC_KEY invalid ECC key (public point is not on the curve)
22537 1962 &encryptKey->publicArea.unique.ecc))
22542 1967 // Call crypto engine to create an auxiliary ECC key
22548 1973 // Marshal ECC public to secret structure. This will be used by the
22555 1980 // because the auxiliary ECC key is just created according to the
22556 1981 // parameters of input ECC encrypt key.
22560 1985 &encryptKey->publicArea.unique.ecc)
22587 2006 &encryptKey->publicArea.unique.ecc.x.b,
22614 TPM_RC_ECC_POINT ECC point in the secret is not on the curve
22615 TPM_RC_INSUFFICIENT failed to retrieve ECC point from the secret
22616 TPM_RC_NO_RESULT multiplication resulted in ECC point at infinity
22681 2071 // Retrieve ECC point from secret buffer
22687 2077 &decryptKey->sensitive.sensitive.ecc,
22719 2103 &decryptKey->publicArea.unique.ecc.x.b,
23070 parameters for an RSA key; unsupported name algorithm for an ECC
23138 2432 // Create ECC key
23236 2512 &publicArea->unique.ecc);
23243 2519 // The input ECC curve must be a supported curve
23318 2575 if( publicArea->unique.ecc.x.t.size
23319 2576 != sensitive->sensitive.ecc.t.size)
23324 2581 // Compute ECC public key
23327 2584 &sensitive->sensitive.ecc, NULL);
23328 2585 // Compare ECC public key
23329 2586 if( (!Memory2BEqual(&publicArea->unique.ecc.x.b,
23331 2588 || (!Memory2BEqual(&publicArea->unique.ecc.y.b,
23467 2691 // If ECC is implemented ECDSA is required
23518 2730 // If ECC is implemented ECDH is required
23659 key); invalid commit status or failed to generate r value (for an ECC
23910 This function returns the list of implemented ECC curves.
23914 YES if no more ECC curve is available
23915 NO if there are more ECC curves not reported
23920 2981 TPM_ECC_CURVE curveID, // IN: the starting ECC curve
23922 2983 TPML_ECC_CURVE *curveList // OUT: ECC curve list
23974 ECC curves supported by the TPM.
24026 3061 && publicArea->unique.ecc.x.t.size <= keySizeInBytes
24027 3062 && publicArea->unique.ecc.y.t.size <= keySizeInBytes;
25023 From TCG Algorithm Registry: Table 4 - Defines for NIST_P192 ECC Values Data in CrpiEccData.c From
25024 TCG Algorithm Registry: Table 5 - Defines for NIST_P224 ECC Values Data in CrpiEccData.c From TCG
25025 Algorithm Registry: Table 6 - Defines for NIST_P256 ECC Values Data in CrpiEccData.c From TCG
25026 Algorithm Registry: Table 7 - Defines for NIST_P384 ECC Values Data in CrpiEccData.c From TCG
25034 Algorithm Registry: Table 8 - Defines for NIST_P521 ECC Values Data in CrpiEccData.c From TCG
25035 Algorithm Registry: Table 9 - Defines for BN_P256 ECC Values Data in CrpiEccData.c From TCG
25036 Algorithm Registry: Table 10 - Defines for BN_P638 ECC Values Data in CrpiEccData.c From TCG
25037 Algorithm Registry: Table 11 - Defines for SM2_P256 ECC Values Data in CrpiEccData.c From TCG
25648 30 UINT32 ecc;
25763 B.3.5.1. ECC-related Structures
25800 105 # else // RSA but no ECC
27879 700 // Z the X coordinate of the product of a public ECC key and a
27880 701 // different private ECC key.
33087 Defines for the sizes of ECC parameters
33550 Need to include OsslCryptEngine.h to determine if ECC is defined for this Implementation
33868 This function gets a random value (d) to use as a private ECC key and then qualifies the key so that it is
34329 This function generates an ECC key pair based on the input parameters. This routine uses KDFa() to
34463 This function creates an ephemeral ECC. It is ephemeral in that is expected that the private part of the
35166 This function is the dispatch function for the various ECC-based signing schemes.
35705 This function performs the key exchange defined in SP800-56A 6.1.1.4 Full MQV, C(2, 2, ECC MQV).
36038 C(2, 2, ECC CDH).