Lines Matching full:symmetric
268 Symmetric Primitives ......................................................................................................................... 113
673 Table 55 ? Symmetric Chaining Process ................................................................................................ 114
1674 a parameter that should be a symmetric encryption mode selection does not have
1692 a parameter that should be a symmetric algorithm selection does not have a
3548 This command allows injection of a secret into the TPM using either asymmetric or symmetric encryption.
3571 If symmetric specifies a block cipher, then TPM_ALG_CFB is the only allowed value for the mode field in
3572 the symmetric parameter (TPM_RC_MODE).
3633 c) tpmKey references a symmetric block cipher or a keyedHash object and encryptedSalt contains a
3761 symmetric
3844 symmetric specifies a block cipher but the mode is not
4036 // If 'symmetric' is a symmetric block cipher (not TPM_ALG_NULL or TPM_ALG_XOR)
4039 in->symmetric.algorithm != TPM_ALG_NULL
4040 && in->symmetric.algorithm != TPM_ALG_XOR
4041 && in->symmetric.mode.sym != TPM_ALG_CFB)
4051 &in->nonceCaller, &in->symmetric,
4253 a symmetric object, an optional initial data value (inSensitive.data). The TPM shall validate the
4264 a) For a symmetric key:
4343 For TPM2_Load(), the TPM will apply normal symmetric protections to the created TPMT_SENSITIVE to
4347 The encryption key is derived from the symmetric seed in the sensitive area of the parent.
4362 If the inPublic.parameters.ecc.symmetric.algorithm does not match the parent, the TPM shall return
4522 for an asymmetric key; attempt to create a symmetric cipher key that
4540 key size in public area for symmetric key differs from the size in the
4562 a storage key with no symmetric algorithm specified; or non-storage
4563 key with symmetric algorithm different from TPM_ALG_NULL
4777 After inPrivate.buffer is decrypted using the symmetric key of the parent, the integrity value shall be
4803 For a symmetric object, the unique value in the public area shall be the digest of the sensitive key
4976 symmetric algorithm not provided when required
5411 symmetric algorithm not provided when required
5797 recover the symmetric key. The recovered seed (but not the Name) is used is used in a KDF to recover
6314 // NOTE: Needs to be restricted to have a symmetric value.
6953 optional symmetric encryption key
6961 definition for the symmetric algorithm to be used for the
6992 the Empty Buffer; otherwise, it shall contain the TPMgenerated, symmetric encryption key for the inner
7047 symmetric algorithm
7051 encryptedDuplication is SET but no symmetric algorithm is provided
7230 // If provided the input symmetric key must match the size of the algorithm
7284 use of the oldParent is provided, then an HMAC key and a symmetric key are recovered from inSymSeed
7287 computed. The re-encrypted blob is returned in outDuplicate and the symmetric key returned in
7348 an object encrypted using symmetric key derived from
7361 seed for symmetric key
7363 generate the symmetric key
7395 an object encrypted using symmetric key derived from
7397 seed for a symmetric key protected by newParent
7438 the decrypted input symmetric key size does not matches the
7439 symmetric algorithm key size of oldParent
7514 // symmetric key
7718 This command allows an object to be encrypted using the symmetric encryption values of a Storage Key.
7728 If present, the outer layer of symmetric encryption is removed. If inSymSeed has a non-zero size, the
7751 If present, the inner layer of symmetric encryption is removed. If encryptionKey and symmetricAlg are
7781 Before duplicate.buffer is decrypted using the symmetric key of the parent, the integrity value shall be
7805 The symmetric re-encryption is the normal integrity generation and symmetric encryption applied to
7852 the optional symmetric encryption key used as the inner
7879 contain an inner symmetric wrapper
7883 symmetric key used to encrypt duplicate
7889 definition for the symmetric algorithm to use for the inner
7924 the sensitive area encrypted with the symmetric key of
8022 objectPublic is either a storage key with no symmetric algorithm or a
8023 non-storage key with symmetric algorithm different from
8039 the symmetric key referenced by parentHandle
8141 // symmetric key
8166 // Input symmetric key must match the size of algorithm.
8172 // If input symmetric algorithm is NULL, input symmetric key size must
9104 used in a KDF to generate a symmetric key and that key is used to encrypt the data. Once the data
9105 is encrypted and the symmetric key discarded, only the ob ject with the private portion of the
10075 Symmetric Primitives
10078 The commands in this clause provide low-level primitives for access to the symmetric algorithms
10079 implemented in the TPM that operate on blocks of data. These include symmetric encryption and
10084 Some of the symmetric encryption/decryption modes use an IV. When an IV is used, it may be an
10100 Table 55 ? Symmetric Chaining Process
10184 This command performs symmetric encryption or decryption.
10185 keyHandle shall reference a symmetric cipher object (TPM_RC_KEY).
10233 the symmetric key used for the operation
10248 symmetric mode
10320 is not a symmetric decryption key with both public and private
10409 // The input key should be a symmetric decrypt key.
10497 // the symmetric algorithm's block size
10508 // For symmetric encryption, the cipher data size is the same as plain data
10851 handle for the symmetric signing key providing the
15838 keyHandle references a symmetric key, both the public and private portions need to be loaded.
15841 The sensitive area of the symmetric object is required to allow verification of the symmetric
16120 Symmetric ?signing? is done with an HMAC.
24107 signed (symmetric or asymmetric) by keySign. That signature is then checked by the TPM in
25488 for an asymmetric key; attempt to create a symmetric cipher key that
25513 a storage key with no symmetric algorithm specified; or non-storage
25514 key with symmetric algorithm different from TPM_ALG_NULL