Home | History | Annotate | Download | only in tpm2

Lines Matching refs:BYTE

256    BYTE               *dInOut,               // OUT: the encrypted data
261 BYTE exponent[4];
292 BYTE *dInOut, // IN/OUT: the decrypted data
334 BYTE *padded, // OUT: the pad data
338 BYTE *message // IN: the message being padded
340 , BYTE *testSeed // IN: optional seed used for testing.
347 BYTE mySeed[MAX_DIGEST_SIZE];
348 BYTE *seed = mySeed;
350 BYTE mask[MAX_RSA_KEY_BYTES];
351 BYTE *pp;
352 BYTE *pm;
369 // Offset into padded leaving room for masked seed and byte of zero
371 retVal = _cpri__HashBlock(hashAlg, lSize, (BYTE *)label, hLen, pp);
406 // Set the first byte to zero
428 BYTE *dataOut, // OUT: the recovered data
432 BYTE *padded // IN: the padded data
437 BYTE seedMask[MAX_DIGEST_SIZE];
439 BYTE mask[MAX_RSA_KEY_BYTES];
440 BYTE *pp;
441 BYTE *pm;
478 if((retVal=_cpri__HashBlock(hashAlg, lSize,(BYTE *)label, hLen, seedMask)) < 0)
524 BYTE *padded, // OUT: the pad data
526 BYTE *message // IN: the message being padded
534 // Set the first byte to 0x00 and the second to 0x02
566 BYTE *message, // OUT: the recovered message
568 BYTE *coded // IN: the encoded message
605 BYTE *eOut, // OUT: encoded data buffer
608 BYTE *hashIn // IN: the digest
610 , BYTE *saltIn // IN: optional parameter for testing
615 BYTE salt[MAX_RSA_KEY_BYTES - 1];
617 BYTE *ps = salt;
658 // Before we mess up the eOut value, set the last byte to 0xbc
660 // XOR a byte of 0x01 at the position just before where the salt will be XOR'ed
693 BYTE *dIn, // In: the digest to compare
695 BYTE *eIn, // IN: the encoded data
700 BYTE mask[MAX_RSA_KEY_BYTES];
701 BYTE *pm = mask;
702 BYTE pad[8] = {0};
715 // last byte must be 0xbc
718 // Doesn't start at the end which is a flag byte
731 // Find the first byte of 0x01 after a string of all 0x00
792 BYTE *eOut, // OUT: the encoded block
795 BYTE *hIn // IN: hash buffer
798 const BYTE *der;
814 *eOut++ = 0; // initial byte of zero
815 *eOut++ = 1; // byte of 0x01
841 BYTE *hIn, // In: the digest to compare
843 BYTE *eIn // IN: the encoded data
847 const BYTE *der;
862 fail |= (*eIn++ != 0); // initial byte of zero
863 fail |= (*eIn++ != 1); // byte of 0x01
918 BYTE *cOut, // OUT: the encrypted data
922 BYTE *dIn, // IN: the data to encrypt
991 BYTE *dOut, // OUT: the decrypted data
995 BYTE *cIn, // IN: the data to decrypt
1045 BYTE *sigOut, // OUT: signature
1050 BYTE *hIn // IN: digest buffer
1104 BYTE *hIn, // IN: digest buffer
1106 BYTE *sigIn, // IN: signature
1172 BYTE swapped[4];
1176 BYTE *pb;
1257 _cpri__UpdateHash(&h, lLen, (BYTE *)label);
1265 _cpri__UpdateHash(&h, 2, (BYTE *)&keySizeInBits);