Home | History | Annotate | Download | only in tpm2

Lines Matching refs:ecc

1220 //      10.2.6     ECC Functions
1256 // This function returns a pointer to an ECC curve parameter. The parameter is selected by a single
1319 // This function will validate that an ECC point is on the curve of given curveID.
1328 TPM_ECC_CURVE curveID, // IN: ECC curve ID
1329 TPMS_ECC_POINT *Q // IN: ECC point
1335 // Call crypto engine function to check if a ECC public point is on the
1346 // This function creates a random ECC key that is not derived from other parameters as is a Primary Key.
1350 TPM_ECC_CURVE curveID, // IN: ECC curve
1371 // TPM_RC_ECC_POINT invalid optional ECC point pIn
1402 // This function generates an ECC key from a seed value.
1424 // The iteration counter has no meaning for ECC key generation. The parameter
1434 retVal = _cpri__GenerateKeyEcc(&publicArea->unique.ecc,
1435 &sensitive->sensitive.ecc,
1437 hashAlg, &seed->b, "ECC key by vendor",
1446 // This function is used for ECC signing operations. If the signing scheme is a split scheme, and the signing
1458 OBJECT *signKey, // IN: ECC key to sign the hash
1467 // Run a test of the ECC sign and verify if it has not already been run
1488 &signKey->sensitive.sensitive.ecc,
1501 // This function is used to verify a signature created with an ECC key.
1510 OBJECT *signKey, // IN: ECC key signed the hash
1518 // This implementation uses the fact that all the defined ECC signing
1526 &signKey->publicArea.unique.ecc,
1689 // This function returns the ECC parameter details of the given curve
1694 // FALSE Unsupported ECC curve ID
1698 TPM_ECC_CURVE curveId, // IN: ECC curve ID
1699 TPMS_ALGORITHM_DETAIL_ECC *parameters // OUT: ECC parameter
2390 // TPM_RC_KEY invalid ECC key (public point is not on the curve)
2439 &encryptKey->publicArea.unique.ecc))
2443 // Call crypto engine to create an auxiliary ECC key
2448 // Marshal ECC public to secret structure. This will be used by the
2454 // because the auxiliary ECC key is just created according to the
2455 // parameters of input ECC encrypt key.
2459 &encryptKey->publicArea.unique.ecc)
2478 &encryptKey->publicArea.unique.ecc.x.b,
2503 // TPM_RC_ECC_POINT ECC point in the secret is not on the curve
2504 // TPM_RC_INSUFFICIENT failed to retrieve ECC point from the secret
2505 // TPM_RC_NO_RESULT multiplication resulted in ECC point at infinity
2557 // Retrieve ECC point from secret buffer
2563 &decryptKey->sensitive.sensitive.ecc,
2586 &decryptKey->publicArea.unique.ecc.x.b,
2885 // parameters for an RSA key; unsupported name algorithm for an ECC
2938 // Create ECC key
3022 &publicArea->unique.ecc);
3028 // The input ECC curve must be a supported curve
3094 if( publicArea->unique.ecc.x.t.size
3095 != sensitive->sensitive.ecc.t.size)
3100 // Compute ECC public key
3103 &sensitive->sensitive.ecc, NULL);
3104 // Compare ECC public key
3105 if( (!Memory2BEqual(&publicArea->unique.ecc.x.b,
3107 || (!Memory2BEqual(&publicArea->unique.ecc.y.b,
3217 // If ECC is implemented ECDSA is required
3260 // If ECC is implemented ECDH is required
3382 // key); invalid commit status or failed to generate r value (for an ECC
3590 // This function returns the list of implemented ECC curves.
3594 // YES if no more ECC curve is available
3595 // NO if there are more ECC curves not reported
3600 TPM_ECC_CURVE curveID, // IN: the starting ECC curve
3602 TPML_ECC_CURVE *curveList // OUT: ECC curve list
3641 // This function returns the number of ECC curves supported by the TPM.
3689 && publicArea->unique.ecc.x.t.size <= keySizeInBytes
3690 && publicArea->unique.ecc.y.t.size <= keySizeInBytes;