Home | History | Annotate | Download | only in tpm2

Lines Matching defs:scheme

334 //      TPM_RC_SCHEME                   inconsistent attributes decrypt, sign, restricted and key's scheme ID;
335 // or hash algorithm is inconsistent with the scheme ID for keyed hash
354 keyScheme = &publicArea->parameters.asymDetail.scheme;
362 // for scheme
365 && keyScheme->scheme != TPM_ALG_NULL)
367 // A restrict sign key must have a non-NULL scheme
370 && keyScheme->scheme == TPM_ALG_NULL)
372 // Keys must have a valid sign or decrypt scheme, or a TPM_ALG_NULL
373 // scheme
380 if( keyScheme->scheme != TPM_ALG_NULL
382 && !CryptIsSignScheme(keyScheme->scheme)
385 && !CryptIsDecryptScheme(keyScheme->scheme)
398 // If the curveID requires a specific scheme, then the key must select
399 // the same scheme
400 if(curveScheme->scheme != TPM_ALG_NULL)
402 if(keyScheme->scheme != curveScheme->scheme)
404 // The scheme can allow any hash, or not...
413 if(publicArea->parameters.eccDetail.kdf.scheme != TPM_ALG_NULL)
425 // A storage key must have a null scheme
426 if(publicArea->parameters.asymDetail.scheme.scheme != TPM_ALG_NULL)
452 TPMT_KEYEDHASH_SCHEME *scheme
453 = &publicArea->parameters.keyedHashDetail.scheme;
454 // If both sign and decrypt are set the scheme must be TPM_ALG_NULL
455 // and the scheme selected when the key is used.
456 // If neither sign nor decrypt is set, the scheme must be TPM_ALG_NULL
461 if(scheme->scheme != TPM_ALG_NULL)
469 if( scheme->scheme != TPM_ALG_XOR
470 || scheme->details.xor_.hashAlg == TPM_ALG_NULL)
472 if(scheme->details.xor_.kdf == TPM_ALG_NULL)
476 // only supported signing scheme for keyedHash object is HMAC
477 if( scheme->scheme != TPM_ALG_HMAC
478 || scheme->details.hmac.hashAlg == TPM_ALG_NULL)
515 // TPM_RC_SCHEME inconsistent attributes decrypt, sign, restricted and key's scheme ID;
516 // or hash algorithm is inconsistent with the scheme ID for keyed hash