/external/tpm2/ |
HMAC_Start.c | 49 if(publicArea->parameters.keyedHashDetail.scheme.scheme == TPM_ALG_NULL) 57 // and verify that the input was either the TPM_ALG_NULL or the default 58 if(in->hashAlg != TPM_ALG_NULL && in->hashAlg != hashAlg) 59 hashAlg = TPM_ALG_NULL; 62 if(hashAlg == TPM_ALG_NULL)
|
HMAC.c | 49 if(publicArea->parameters.keyedHashDetail.scheme.scheme == TPM_ALG_NULL) 57 // and verify that the input was either the TPM_ALG_NULL or the default 58 if(in->hashAlg != TPM_ALG_NULL && in->hashAlg != hashAlg) 59 hashAlg = TPM_ALG_NULL; 62 if(hashAlg == TPM_ALG_NULL)
|
HashSequenceStart.c | 24 if(in->hashAlg == TPM_ALG_NULL)
|
ChangePPS.c | 36 gc.platformAlg = TPM_ALG_NULL; 52 gp.pcrPolicies.hashAlg[i] = TPM_ALG_NULL;
|
CpriHashData.c | 31 {TPM_ALG_NULL,0,0,0,{0}}
|
Duplicate.c | 50 if(object->publicArea.nameAlg == TPM_ALG_NULL) 62 if(in->symmetricAlg.algorithm == TPM_ALG_NULL) 68 if(in->symmetricAlg.algorithm == TPM_ALG_NULL) 70 // if algorithm is TPM_ALG_NULL, input key size must be 0
|
ChangeEPS.c | 43 gp.endorsementAlg = TPM_ALG_NULL;
|
Quote.c | 56 if(hashAlg == TPM_ALG_NULL)
|
SetCommandCodeAuditStatus.c | 29 if( in->auditAlg != TPM_ALG_NULL
|
VerifySignature.c | 50 || signObject->publicArea.nameAlg == TPM_ALG_NULL) 53 // TPM_ALG_NULL
|
ZGen_2Phase.c | 19 // TPM_RC_SCHEME the scheme of the key referenced by keyA is not TPM_ALG_NULL, 47 // if the scheme of keyA is TPM_ALG_NULL, then use the input scheme; otherwise 50 if(scheme != TPM_ALG_NULL) 57 if(scheme == TPM_ALG_NULL)
|
Object_spt.c | 338 // key with symmetric algorithm different from TPM_ALG_NULL 361 // Keys that are both signing and decrypting must have TPM_ALG_NULL 365 && keyScheme->scheme != TPM_ALG_NULL) 370 && keyScheme->scheme == TPM_ALG_NULL) 372 // Keys must have a valid sign or decrypt scheme, or a TPM_ALG_NULL 380 if( keyScheme->scheme != TPM_ALG_NULL 400 if(curveScheme->scheme != TPM_ALG_NULL) 405 if( curveScheme->details.anySig.hashAlg != TPM_ALG_NULL 412 // For now, the KDF must be TPM_ALG_NULL 413 if(publicArea->parameters.eccDetail.kdf.scheme != TPM_ALG_NULL) [all...] |
Hierarchy.c | 38 gp.ownerAlg = TPM_ALG_NULL; 40 gp.endorsementAlg = TPM_ALG_NULL; 42 gp.lockoutAlg = TPM_ALG_NULL;
|
EncryptDecrypt.c | 41 // If the input mode is TPM_ALG_NULL, use the key's mode 42 if( in->mode == TPM_ALG_NULL) 53 // TPM_ALG_NULL so setting in->mode to the mode of the key should have 55 if(in->mode == TPM_ALG_NULL)
|
ECDH_ZGen.c | 18 // TPM_RC_SCHEME the scheme of the key referenced by keyA is not TPM_ALG_NULL, 45 && eccKey->publicArea.parameters.eccDetail.scheme.scheme != TPM_ALG_NULL)
|
LoadExternal.c | 77 skipChecks = (in->inPublic.t.publicArea.nameAlg == TPM_ALG_NULL);
|
Sign.c | 68 in->inScheme.details.any.hashAlg != TPM_ALG_NULL &&
|
Object.c | 147 if(object->publicArea.nameAlg == TPM_ALG_NULL) 186 if(object->publicArea.nameAlg == TPM_ALG_NULL) 422 // The type is TPM_ALG_NULL 423 (*object)->type = TPM_ALG_NULL; 425 (*object)->nameAlg = TPM_ALG_NULL; 526 for(count = 0; (hash = CryptGetHashAlgByIndex(count)) != TPM_ALG_NULL; count++) 559 for(count = 0; CryptGetHashAlgByIndex(count) != TPM_ALG_NULL; count++) 728 if(publicArea->nameAlg == TPM_ALG_NULL)
|
CpriDataEcc.c | 344 {TPM_ALG_NULL,TPM_ALG_NULL}, 354 {TPM_ALG_NULL,TPM_ALG_NULL}, 364 {TPM_ALG_NULL,{{TPM_ALG_NULL}}}, 374 {TPM_ALG_NULL,{{TPM_ALG_NULL}}}, 384 {TPM_ALG_NULL,TPM_ALG_NULL}, [all...] |
StartAuthSession.c | 89 // If 'symmetric' is a symmetric block cipher (not TPM_ALG_NULL or TPM_ALG_XOR) 91 if( in->symmetric.algorithm != TPM_ALG_NULL
|
Clear.c | 58 gp.ownerAlg = gp.endorsementAlg = gp.lockoutAlg = TPM_ALG_NULL;
|
/system/tpm/trunks/ |
trunks_client_test.cc | 125 utility->Sign(signing_key, TPM_ALG_NULL, TPM_ALG_NULL, 131 result = utility->Verify(signing_key, TPM_ALG_NULL, TPM_ALG_NULL, 462 result = utility->Sign(scoped_key.get(), TPM_ALG_NULL, TPM_ALG_NULL, 469 result = utility->Verify(scoped_key.get(), TPM_ALG_NULL, TPM_ALG_NULL, 477 utility->AsymmetricEncrypt(scoped_key.get(), TPM_ALG_NULL, TPM_ALG_NULL, [all...] |
tpm_utility_test.cc | 485 utility_.AsymmetricEncrypt(key_handle, TPM_ALG_NULL, TPM_ALG_NULL, 506 utility_.AsymmetricEncrypt(key_handle, TPM_ALG_NULL, TPM_ALG_NULL, 521 utility_.AsymmetricEncrypt(key_handle, TPM_ALG_RSAES, TPM_ALG_NULL, 545 utility_.AsymmetricEncrypt(key_handle, TPM_ALG_NULL, TPM_ALG_NULL, 571 utility_.AsymmetricEncrypt(key_handle, TPM_ALG_RSAES, TPM_ALG_NULL, 597 key_handle, TPM_ALG_NULL, TPM_ALG_NULL, ciphertext [all...] |
/device/linaro/bootloader/edk2/SecurityPkg/Library/HashLibTpm2/ |
HashLibTpm2.c | 57 return TPM_ALG_NULL;
187 if (AlgoId == TPM_ALG_NULL) {
252 if ((AlgoId == TPM_ALG_NULL) && (DataToHashLen <= sizeof(EventData.buffer))) {
288 if (AlgoId == TPM_ALG_NULL) {
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
Tpm2Capability.c | 591 case TPM_ALG_NULL:
613 case TPM_ALG_NULL:
635 case TPM_ALG_NULL:
661 case TPM_ALG_NULL:
683 case TPM_ALG_NULL:
709 case TPM_ALG_NULL:
|