Home | History | Annotate | Download | only in tpm2

Lines Matching defs:NULL

71    OBJECT                   *protector = NULL; // Pointer to the protector object
108 // parameter should be NULL
114 TPM2B_SEED *seed = NULL;
115 OBJECT *protector = NULL; // Pointer to the protector
137 KDFa(hashAlg, (TPM2B *)seed, "STORAGE", (TPM2B *)name, NULL,
138 symKey->t.size * 8, symKey->t.buffer, NULL);
161 // blob, this parameter should be NULL
169 TPM2B_SEED *seed = NULL;
175 KDFa(hashAlg, (TPM2B *)seed, "INTEGRITY", NULL, NULL,
176 hmacKey.t.size * 8, hmacKey.t.buffer, NULL);
367 // A restrict sign key must have a non-NULL scheme
397 pAssert(curveScheme != NULL);
425 // A storage key must have a null scheme
533 OBJECT *parentObject = NULL;
547 if( parentObject == NULL
573 if( ( parentObject != NULL
664 OBJECT *protector = NULL; // Pointer to the protector
669 if(seedIn != NULL)
695 // b) encrypt sensitive data, if iv is required, encrypt by iv. otherwise, encrypted by a NULL iv
708 // blob, this parameter should be NULL
721 TPM2B_IV *iv = NULL;
793 // blob, this parameter should be NULL.
806 TPM2B_IV *iv = NULL;
865 // NULL, in which case the object is
877 pAssert(name != NULL && name->t.size != 0);
912 outPrivate->t.size = ProduceOuterWrap(parentHandle, name, hashAlg, NULL,
956 OBJECT *parent = NULL;
960 pAssert(name != NULL && name->t.size != 0);
973 result = UnwrapOuter(parentHandle, name, hashAlg, NULL, TRUE,
998 pAssert( (parent == NULL)
1036 // symmetric key algorithm is NULL,
1054 pAssert(name != NULL && name->t.size != 0);
1055 // Make sure symDef and innerSymKey are not NULL
1056 pAssert(symDef != NULL && innerSymKey != NULL);
1091 BYTE *innerBuffer = NULL;
1115 innerSymKey->t.buffer, NULL, dataSize,
1160 // symmetric key algorithm is NULL,
1175 pAssert(name != NULL && name->t.size != 0);
1176 // Make sure symDef and innerSymKey are not NULL
1177 pAssert(symDef != NULL && innerSymKey != NULL);
1204 innerSymKey->t.buffer, NULL, dataSize,
1264 pAssert(secret != NULL && outIDObject != NULL);