/external/tpm2/ |
HMAC_Start.c | 17 // TPM_RC_VALUE hashAlg is not compatible with the hash algorithm of the scheme of 28 TPM_ALG_ID hashAlg; 51 hashAlg = in->hashAlg; 55 hashAlg 56 = publicArea->parameters.keyedHashDetail.scheme.details.hmac.hashAlg; 58 if(in->hashAlg != TPM_ALG_NULL && in->hashAlg != hashAlg) 59 hashAlg = TPM_ALG_NULL [all...] |
HMAC.c | 16 // TPM_RC_VALUE hashAlg is not compatible with the hash algorithm of the scheme of 27 TPMI_ALG_HASH hashAlg; 51 hashAlg = in->hashAlg; 55 hashAlg 56 = publicArea->parameters.keyedHashDetail.scheme.details.hmac.hashAlg; 58 if(in->hashAlg != TPM_ALG_NULL && in->hashAlg != hashAlg) 59 hashAlg = TPM_ALG_NULL [all...] |
HashSequenceStart.c | 24 if(in->hashAlg == TPM_ALG_NULL) 31 return ObjectCreateHashSequence(in->hashAlg, &in->auth, &out->sequenceHandle);
|
Quote.c | 27 TPMI_ALG_HASH hashAlg; 54 hashAlg = in->inScheme.details.any.hashAlg; 56 if(hashAlg == TPM_ALG_NULL) 60 PCRComputeCurrentDigest(hashAlg,
|
EventSequenceComplete.c | 26 TPM_ALG_ID hashAlg; 67 hashAlg = CryptGetHashAlgByIndex(i); 71 out->results.digests[out->results.count].hashAlg = hashAlg; 73 CryptGetHashDigestSize(hashAlg), 78 PCRExtend(in->pcrHandle, hashAlg, 79 CryptGetHashDigestSize(hashAlg),
|
CpriHash_fp.h | 20 _cpri__HashBlock(TPM_ALG_ID hashAlg, // IN: The hash algorithm 28 _cpri__GetDigestSize(TPM_ALG_ID hashAlg // IN: hash algorithm to look up 31 _cpri__GetHashDER(TPM_ALG_ID hashAlg, // IN: the algorithm to look up 34 _cpri__KDFa(TPM_ALG_ID hashAlg, // IN: hash algorithm used in HMAC 48 _cpri__KDFe(TPM_ALG_ID hashAlg, // IN: hash algorithm used in HMAC 59 TPM_ALG_ID hashAlg, // IN: hash to use 64 _cpri__StartHMAC(TPM_ALG_ID hashAlg, // IN: the algorithm to use 72 _cpri__StartHash(TPM_ALG_ID hashAlg, // IN: hash algorithm 95 _cpri__GetHashBlockSize(TPM_ALG_ID hashAlg // IN: hash algorithm to look up
|
PCR_SetAuthPolicy.c | 35 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->hashAlg)) 45 gp.pcrPolicies.hashAlg[groupIndex] = in->hashAlg;
|
CpriRSA_fp.h | 18 TPM_ALG_ID hashAlg, // IN: in case this is needed for the scheme 28 TPM_ALG_ID hashAlg, // IN: in case this is needed 37 hashAlg, // IN: hash algorithm to use in the key generation proce 49 TPM_ALG_ID hashAlg, // IN: hash algorithm for PKSC1v1_5 64 TPM_ALG_ID hashAlg, // IN: hash algorithm
|
SetPrimaryPolicy.c | 27 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->hashAlg)) 44 gp.ownerAlg = in->hashAlg; 50 gp.endorsementAlg = in->hashAlg; 56 gc.platformAlg = in->hashAlg; 62 gp.lockoutAlg = in->hashAlg;
|
PCR_Extend.c | 57 PCRExtend(in->pcrHandle, in->digests.digests[i].hashAlg, 58 CryptGetHashDigestSize(in->digests.digests[i].hashAlg),
|
PolicyAuthorize.c | 29 TPM_ALG_ID hashAlg; 38 hashAlg = BYTE_ARRAY_TO_UINT16(in->keySign.t.name); 42 digestSize = CryptGetHashDigestSize(hashAlg); 62 authHash.t.size = CryptStartHash(hashAlg, &hashState);
|
RSAKeySieve_fp.h | 16 hashAlg, // IN: hash algorithm to use in the key generation process
|
CpriHash.c | 34 TPM_ALG_ID hashAlg 37 switch (hashAlg) 133 TPM_ALG_ID hashAlg 141 if(g_hashData[i].alg == hashAlg) 210 TPM_ALG_ID hashAlg // IN: hash algorithm to look up 213 return GetHashInfoPointer(hashAlg)->blockSize; 223 TPM_ALG_ID hashAlg, // IN: the algorithm to look up 228 q = GetHashInfoPointer(hashAlg); 245 TPM_ALG_ID hashAlg // IN: hash algorithm to look up 248 return GetHashInfoPointer(hashAlg)->digestSize [all...] |
Attest_spt.c | 72 TPMI_ALG_HASH hashAlg; 76 hashAlg = CONTEXT_INTEGRITY_HASH_ALG; 82 hashAlg = signObject->publicArea.nameAlg; 84 KDFa(hashAlg, &gp.shProof.b, "OBFUSCATE", 132 TPMI_ALG_HASH hashAlg; 160 hashAlg = scheme->details.any.hashAlg; 161 digest.t.size = CryptStartHash(hashAlg, &hashState); 168 CryptStartHash(hashAlg, &hashState);
|
stubs_hash.c | 10 TPM_ALG_ID hashAlg, // IN: the algorithm to use 19 UINT16 blockSize = _cpri__GetHashBlockSize(hashAlg); 28 if((digestSize = _cpri__StartHash(hashAlg, FALSE, &localState)) == 0) 51 if((digestSize = _cpri__StartHash(hashAlg, sequence, state)) > 0) 71 UINT16 digestSize = _cpri__GetDigestSize(state->hashAlg); 74 if(_cpri__StartHash(state->hashAlg, FALSE, &localState) != digestSize) 82 TPM_ALG_ID hashAlg, // IN: hash algorithm used in HMAC 118 if((hLen = (INT16) _cpri__GetDigestSize(hashAlg)) == 0) 131 if(_cpri__StartHMAC(hashAlg, 167 TPM_ALG_ID hashAlg, // IN: hash algorithm used in HMA [all...] |
Hash.c | 22 out->outHash.t.size = CryptStartHash(in->hashAlg, &hashState); 48 TicketComputeHashCheck(in->hierarchy, in->hashAlg,
|
CryptUtil_fp.h | 117 CryptGetHashDigestSize(TPM_ALG_ID hashAlg // IN: hash algorithm 149 TPM_ALG_ID hashAlg, // IN: hash algorithm for the KDF 157 CryptGetHashDigestSize(TPM_ALG_ID hashAlg // IN: hash algorithm 185 #define CryptKDFa(hashAlg, key, label, contextU, contextV, sizeInBits, \ 187 TEST_HASH(hashAlg); \ 188 _cpri__KDFa(((TPM_ALG_ID)hashAlg), ((TPM2B *)key), ((const char *)label), \ 202 #define CryptKDFaOnce(hashAlg, key, label, contextU, contextV, sizeInBits, \ 204 TEST_HASH(hashAlg); \ 205 _cpri__KDFa(((TPM_ALG_ID)hashAlg), ((TPM2B *)key), ((const char *)label), \ 217 #define CryptKDFe(hashAlg, Z, label, partyUInfo, partyVInfo, sizeInBits, [all...] |
PCR_SetAuthPolicy_fp.h | 15 TPMI_ALG_HASH hashAlg;
|
SetPrimaryPolicy_fp.h | 15 TPMI_ALG_HASH hashAlg;
|
Sign.c | 54 in->inScheme.details.any.hashAlg, 62 // is the size of the scheme hashAlg digest. 68 in->inScheme.details.any.hashAlg != TPM_ALG_NULL && 71 != CryptGetHashDigestSize(in->inScheme.details.any.hashAlg))
|
CpriRSA.c | 333 // CRYPT_PARAMETER hashAlg is not valid 340 TPM_ALG_ID hashAlg, // IN: algorithm to use for padding 354 INT32 hLen = _cpri__GetDigestSize(hashAlg); 376 retVal = _cpri__HashBlock(hashAlg, lSize, (BYTE *)label, hLen, pp); 394 if((retVal = _cpri__MGF1(dbSize, mask, hashAlg, hLen, seed)) < 0) 403 if((retVal = _cpri__MGF1(hLen, &padded[1], hashAlg, dbSize, pp)) < 0) 434 TPM_ALG_ID hashAlg, // IN: algorithm to use for padding 443 INT32 hLen = _cpri__GetDigestSize(hashAlg); 464 if((retVal = _cpri__MGF1(hLen, seedMask, hashAlg, 473 if((retVal = _cpri__MGF1(paddedSize-hLen-1, mask, hashAlg, [all...] |
CpriECC_fp.h | 61 hashAlg, // IN: hash algorithm to use in the key generation process 78 TPM_ALG_ID hashAlg, // IN: the hash algorithm if need 90 hashAlg, // IN: the hash algorithm used (not used in all schemes)
|
SequenceComplete.c | 44 TPM_ALG_ID hashAlg = hashObject->state.hashState[0].state.hashAlg; 82 TicketComputeHashCheck(out->validation.hierarchy, hashAlg,
|
CpriRNG_fp.h | 16 TPM_ALG_ID hashAlg, // IN: used by KDF version but not here
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
Tpm2Help.c | 195 @param HashAlg Hash algorithm to be checked.
204 IN TPMI_ALG_HASH HashAlg,
208 switch (HashAlg) {
265 if (!IsHashAlgSupportedInHashAlgorithmMask(DigestList->digests[Index].hashAlg, HashAlgorithmMask)) {
266 DEBUG ((EFI_D_ERROR, "WARNING: TPM2 Event log has HashAlg unsupported by PCR bank (0x%x)\n", DigestList->digests[Index].hashAlg));
269 CopyMem (Buffer, &DigestList->digests[Index].hashAlg, sizeof(DigestList->digests[Index].hashAlg));
270 Buffer = (UINT8 *)Buffer + sizeof(DigestList->digests[Index].hashAlg);
271 DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg);
[all...] |