Home | History | Annotate | Download | only in tpm2

Lines Matching defs:sensitive

638                                  &signKey->sensitive.sensitive.bits.b,
669 &signKey->sensitive.sensitive.bits.b, &hmacState);
690 // TPM_RC_SIZE sensitive data size is larger than allowed for the scheme
696 TPMS_SENSITIVE_CREATE *sensitiveCreate, // IN: sensitive creation data
697 TPMT_SENSITIVE *sensitive, // OUT: sensitive area
731 sensitive->sensitive.sym.t.size = CryptGetHashDigestSize(hashAlg);
734 // Fill in the sensitive area
735 CryptGenerateNewSymmetric(sensitiveCreate, sensitive, kdfHashAlg,
739 sensitive, &publicArea->unique.sym);
853 TPMT_SENSITIVE *sensitive, // OUT: the sensitive area will be
874 sensitive->sensitive.rsa.b,
902 TPMT_SENSITIVE *sensitive = &rsaKey->sensitive;
908 &(sensitive->sensitive.rsa.b),
1346 TPM2B_ECC_PARAMETER *sensitive // OUT: private area
1351 if(_cpri__GetEphemeralEcc(publicPoint, sensitive, curveID) != CRYPT_SUCCESS)
1408 TPMT_SENSITIVE *sensitive, // IN/OUT: the sensitive area
1429 &sensitive->sensitive.ecc,
1482 &signKey->sensitive.sensitive.ecc,
1856 // This function creates the sensitive symmetric values for an HMAC or symmetric key. If the sensitive area
1857 // is zero, then the sensitive creation key data is copied. If it is not zero, then the TPM will generate a
1862 TPMS_SENSITIVE_CREATE *sensitiveCreate, // IN: sensitive creation data
1863 TPMT_SENSITIVE *sensitive, // OUT: sensitive area
1871 // in sensitive->sensitive will hold either. When we call the function
1872 // to copy the input value or generated value to the sensitive->sensitive
1877 (MAX(sizeof(sensitive->sensitive.bits.t.buffer), \
1878 sizeof(sensitive->sensitive.sym.t.buffer)))
1880 sensitive->seedValue.t.size = CryptGetHashDigestSize(hashAlg);
1881 // If the input sensitive size is zero, then create both the sensitive data
1890 requestSize = sensitive->sensitive.sym.t.size
1891 + sensitive->seedValue.t.size;
1895 "symmetric sensitive", &name->b,
1899 MemoryCopy(sensitive->sensitive.sym.t.buffer,
1900 symValues, sensitive->sensitive.sym.t.size,
1903 MemoryCopy(sensitive->seedValue.t.buffer,
1904 &symValues[sensitive->sensitive.sym.t.size],
1905 sensitive->seedValue.t.size,
1906 sizeof(sensitive->seedValue.t.buffer));
1910 // Copy input symmetric key to sensitive area as long as it will fit
1911 MemoryCopy2B(&sensitive->sensitive.sym.b, &sensitiveCreate->data.b,
1914 _cpri__GenerateSeededRandom(sensitive->seedValue.t.size,
1915 sensitive->seedValue.t.buffer,
1929 // TPM_RC_KEY_SIZE key size in the public area does not match the size in the sensitive
1936 TPMS_SENSITIVE_CREATE *sensitiveCreate, // IN: sensitive creation data
1937 TPMT_SENSITIVE *sensitive, // OUT: sensitive area
1958 sensitive->sensitive.sym.t.size
1962 // Fill in the sensitive area
1963 CryptGenerateNewSymmetric(sensitiveCreate, sensitive, hashAlg,
1967 sensitive, &publicArea->unique.sym);
2551 &decryptKey->sensitive.sensitive.ecc,
2601 &decryptKey->sensitive.sensitive.bits.b,
2631 decryptKey->sensitive.sensitive.sym.t.buffer,
2785 TPMT_SENSITIVE *sensitive, // IN: sensitive area
2790 pAssert(sensitive != NULL && unique != NULL);
2791 // Compute the public value as the hash of sensitive.symkey || unique.buffer
2795 CryptUpdateDigest2B(&hashState, &sensitive->seedValue.b);
2796 // Add sensitive value
2797 CryptUpdateDigest2B(&hashState, &sensitive->sensitive.any.b);
2807 // This function computes the seedValue field in asymmetric sensitive areas.
2813 TPMT_SENSITIVE *sensitive, // IN: sensitive area
2836 sensitive->seedValue.t.size = 0;
2841 sensitive->seedValue.t.size = CryptGetHashDigestSize(publicArea->nameAlg);
2843 _cpri__GenerateSeededRandom(sensitive->seedValue.t.size,
2844 sensitive->seedValue.t.buffer,
2858 // a) fills in the created key in public and sensitive area;
2859 // b) creates a random number in sensitive area for symmetric keys; and
2867 // TPM_RC_KEY_SIZE key size in the public area does not match the size in the sensitive
2870 // TPM_RC_SIZE sensitive data size is larger than allowed for the scheme for a keyed
2881 TPMS_SENSITIVE_CREATE *sensitiveCreate, // IN: sensitive creation
2882 TPMT_SENSITIVE *sensitive // OUT: sensitive area
2896 // Set the sensitive type for the object
2897 sensitive->sensitiveType = publicArea->type;
2900 sensitive->authValue = sensitiveCreate->userAuth;
2921 result = CryptGenerateKeyRSA(publicArea, sensitive,
2928 result = CryptGenerateKeyECC(publicArea, sensitive,
2935 sensitive, hashAlg, seed, &name);
2939 sensitive, hashAlg, seed, &name);
2960 sensitive->seedValue.t.size
2963 _cpri__GenerateSeededRandom(sensitive->seedValue.t.size,
2964 sensitive->seedValue.t.buffer,
2973 sensitive->seedValue.t.size = 0;
3041 // This function checks the cryptographic binding between the public and sensitive areas.
3055 TPMT_SENSITIVE *sensitive;
3060 sensitive = &object->sensitive;
3061 if(publicArea->type != sensitive->sensitiveType)
3069 if(sensitive->sensitive.rsa.t.size != publicArea->unique.rsa.t.size/2)
3083 != sensitive->sensitive.ecc.t.size)
3091 &sensitive->sensitive.ecc, NULL);
3106 != sensitive->sensitive.sym.t.size)
3122 CryptComputeSymmetricUnique(publicArea->nameAlg, sensitive,