Lines Matching full:symmetric
268 Symmetric Primitives ......................................................................................................................... 113
673 Table 55 ? Symmetric Chaining Process ................................................................................................ 114
1674 a parameter that should be a symmetric encryption mode selection does not have
1692 a parameter that should be a symmetric algorithm selection does not have a
3548 This command allows injection of a secret into the TPM using either asymmetric or symmetric encryption.
3571 If symmetric specifies a block cipher, then TPM_ALG_CFB is the only allowed value for the mode field in
3572 the symmetric parameter (TPM_RC_MODE).
3633 c) tpmKey references a symmetric block cipher or a keyedHash object and encryptedSalt contains a
3763 symmetric
3846 symmetric specifies a block cipher but the mode is not
4038 // If 'symmetric' is a symmetric block cipher (not TPM_ALG_NULL or TPM_ALG_XOR)
4041 in->symmetric.algorithm != TPM_ALG_NULL
4042 && in->symmetric.algorithm != TPM_ALG_XOR
4043 && in->symmetric.mode.sym != TPM_ALG_CFB)
4053 &in->nonceCaller, &in->symmetric,
4255 a symmetric object, an optional initial data value (inSensitive.data). The TPM shall validate the
4266 a) For a symmetric key:
4345 For TPM2_Load(), the TPM will apply normal symmetric protections to the created TPMT_SENSITIVE to
4349 The encryption key is derived from the symmetric seed in the sensitive area of the parent.
4364 If the inPublic.parameters.ecc.symmetric.algorithm does not match the parent, the TPM shall return
4524 for an asymmetric key; attempt to create a symmetric cipher key that
4542 key size in public area for symmetric key differs from the size in the
4564 a storage key with no symmetric algorithm specified; or non-storage
4565 key with symmetric algorithm different from TPM_ALG_NULL
4779 After inPrivate.buffer is decrypted using the symmetric key of the parent, the integrity value shall be
4805 For a symmetric object, the unique value in the public area shall be the digest of the sensitive key
4978 symmetric algorithm not provided when required
5413 symmetric algorithm not provided when required
5799 recover the symmetric key. The recovered seed (but not the Name) is used is used in a KDF to recover
6318 // NOTE: Needs to be restricted to have a symmetric value.
6957 optional symmetric encryption key
6965 definition for the symmetric algorithm to be used for the
6996 the Empty Buffer; otherwise, it shall contain the TPMgenerated, symmetric encryption key for the inner
7053 symmetric algorithm
7057 encryptedDuplication is SET but no symmetric algorithm is provided
7236 // If provided the input symmetric key must match the size of the algorithm
7290 use of the oldParent is provided, then an HMAC key and a symmetric key are recovered from inSymSeed
7293 computed. The re-encrypted blob is returned in outDuplicate and the symmetric key returned in
7354 an object encrypted using symmetric key derived from
7369 seed for symmetric key
7371 generate the symmetric key
7405 an object encrypted using symmetric key derived from
7407 seed for a symmetric key protected by newParent
7448 the decrypted input symmetric key size does not matches the
7449 symmetric algorithm key size of oldParent
7524 // symmetric key
7728 This command allows an object to be encrypted using the symmetric encryption values of a Storage Key.
7738 If present, the outer layer of symmetric encryption is removed. If inSymSeed has a non-zero size, the
7761 If present, the inner layer of symmetric encryption is removed. If encryptionKey and symmetricAlg are
7791 Before duplicate.buffer is decrypted using the symmetric key of the parent, the integrity value shall be
7815 The symmetric re-encryption is the normal integrity generation and symmetric encryption applied to
7864 the optional symmetric encryption key used as the inner
7889 contain an inner symmetric wrapper
7894 symmetric key used to encrypt duplicate
7902 definition for the symmetric algorithm to use for the inner
7935 the sensitive area encrypted with the symmetric key of
8033 objectPublic is either a storage key with no symmetric algorithm or a
8034 non-storage key with symmetric algorithm different from
8050 the symmetric key referenced by parentHandle
8152 // symmetric key
8177 // Input symmetric key must match the size of algorithm.
8183 // If input symmetric algorithm is NULL, input symmetric key size must
9115 used in a KDF to generate a symmetric key and that key is used to encrypt the data. Once the data
9116 is encrypted and the symmetric key discarded, only the ob ject with the private portion of the
10086 Symmetric Primitives
10089 The commands in this clause provide low-level primitives for access to the symmetric algorithms
10090 implemented in the TPM that operate on blocks of data. These include symmetric encryption and
10095 Some of the symmetric encryption/decryption modes use an IV. When an IV is used, it may be an
10111 Table 55 ? Symmetric Chaining Process
10195 This command performs symmetric encryption or decryption.
10196 keyHandle shall reference a symmetric cipher object (TPM_RC_KEY).
10244 the symmetric key used for the operation
10259 symmetric mode
10331 is not a symmetric decryption key with both public and private
10420 // The input key should be a symmetric decrypt key.
10508 // the symmetric algorithm's block size
10519 // For symmetric encryption, the cipher data size is the same as plain data
10862 handle for the symmetric signing key providing the
15849 keyHandle references a symmetric key, both the public and private portions need to be loaded.
15852 The sensitive area of the symmetric object is required to allow verification of the symmetric
16131 Symmetric ?signing? is done with an HMAC.
24118 signed (symmetric or asymmetric) by keySign. That signature is then checked by the TPM in
25499 for an asymmetric key; attempt to create a symmetric cipher key that
25524 a storage key with no symmetric algorithm specified; or non-storage
25525 key with symmetric algorithm different from TPM_ALG_NULL