Lines Matching refs:HMAC
108 …5.8.3.3 Hash and HMAC State Structures ....................................................…
626 …10.2.4 Hash/HMAC Functions .......................................................................…
831 …B.8.5. HMAC Functions .......................................................................…
1621 5.8.3.3 Hash and HMAC State Structures
1633 or HMAC_STATE_SEQUENCE then state is followed by the HMAC key in oPad format.
1649 An HMAC_STATE structure contains an opaque HMAC stack state. A caller would use this structure
1650 … when performing incremental HMAC operations. This structure contains a hash state and an HMAC key
1651 and allows slightly better stack optimization than adding an HMAC key to each hash state.
1656 37 TPM2B_HASH_BLOCK hmacKey; // the HMAC key
1681 hash, HMAC, or event.
1719 //8) SET for an HMAC sequence object
1848 139 // for computing the session HMAC.
1882 168 // in the response HMAC computation.
1908 186 // generating HMAC and encrypt…
2693 Array of authorization values (HMAC's or passwords) for the corresponding sessions
2857 Container for HMAC or policy session tracking information
3897 TPM_RH_NULL. The binding only occurs if the session is an HMAC session. The bind value is a
4346 This function computes the HMAC for an authorization session in a command.
4352 463 TPM2B_DIGEST *hmac // OUT: authorization HMAC
4372 483 // session that uses an HMAC, then check if additional session nonces are to be
4405 510 // Continue with the HMAC processing.
4408 513 // Generate HMAC key.
4413 518 // this entity to the HMAC key.
4415 520 // with no authValue required, do not include the authValue in the HMAC key.
4430 535 // add the authValue to the HMAC key
4438 543 // if the HMAC key size is 0, a NULL string HMAC is allowed
4446 551 // Start HMAC
4477 577 // Complete the HMAC computation
4486 This function checks the HMAC of in a session. It uses ComputeCommandHMAC() to compute the
4487 … expected HMAC value and then compares the result with the HMAC in the authorization session. The
4508 593 // Compare the input HMAC with the authHMAC computed above.
4511 596 // If an HMAC session has a failure, invoke the anti-hammering
4770 796 // Fourth parameter: authValue (PW or HMAC).
4802 828 // Check if the session is an HMAC/policy session.
4990 … TPM_RC_AUTH_FAIL HMAC or PW authorization failed with DA side-effects (can be a
4992 …TPM_RC_BAD_AUTH HMAC or PW authorization failed without DA side-effects (can be a
5088 1052 // going to be used in an HMAC because it is bound.
5092 1056 // At this point, the session must be either a policy or an HMAC session.
5103 1067 // For other policy or HMAC sessions, have its HMAC checked.
5297 1222 // check HMAC for encrypt/decrypt/audit only sessions
5410 HMAC authorization session and the return code is TPM_RC_SUCCESS.
5684 Function to compute HMAC for authorization session in a response.
5698 1536 TPM2B_KEY key; // HMAC key
5715 1547 // Generate HMAC key
5720 1552 // If not bound, add the authValue of this entity to the HMAC key.
5733 1565 // if the HMAC key size for a policy session is 0, the response HMAC is
5734 1566 // computed according to the input HMAC
5743 1575 // Start HMAC computation.
5756 1588 // Finalize HMAC.
5789 1609 // Fill in policy/HMAC based session response.
5798 1618 // Compute response HMAC.
6343 68 // Start HMAC
6360 85 // Adding sequence number to the HMAC to make sure that it doesn't
6378 98 // Complete HMAC
6896 133 // Determine the HMAC key bits
6899 136 // KDFa to generate HMAC key
6903 140 // Start HMAC and get the size of the digest which will become the integrity
6912 149 // Compute HMAC
7258 406 // only supported signing scheme for keyedHash object is HMAC
7475 … Get a seed for KDF. The KDF for encryption and HMAC key use the same seed. It returns a pointer to
7517 …c) add HMAC integrity at the beginning of the buffer It returns the total size of blob with outer …
7779 808 //Produce outer wrap, including encryption and HMAC
7791 a) check the integrity HMAC of the input private area
8051 a) check the integrity HMAC of the input private area
8181 b) encrypt the private buffer, excluding the leading integrity HMAC area
8182 c) compute integrity HMAC and append to the beginning of the buffer.
8233 a) check the integrity HMAC of the input credential area
11413 TRUE object is an HMAC, hash, or event sequence object
11414 FALSE object is not an HMAC, hash, or event sequence object
11822 This function creates an internal HMAC sequence object.
11839 350 TPMI_DH_OBJECT *newHandle // OUT: HMAC sequence object handle
11849 360 // Set HMAC sequence bit
11852 363 // Get pointer to the HMAC key object
14565 293 // The HMAC key for generating the sessionSecret can be the concatenation
14578 301 // associated with HMAC session
14598 321 // Copy the name of the entity that the HMAC session is bound to
15010 628 // assume that this is going to be an HMAC session
16646 66 // For an HMAC session, see if the session is loaded
16648 68 // an HMAC session.
16653 73 // Check if the session is a HMAC session
19437 10.2.4 Hash/HMAC Functions
19528 … This function starts an HMAC sequence and returns the size of the digest that will be produced.
19540 138 UINT16 keySize, // IN: the size of HMAC key in byte
19541 139 BYTE *key, // IN: HMAC key
19542 140 HMAC_STATE *hmacState // OUT: the state of HMAC stack. It will be us…
19543 141 // in HMAC update and completion
19574 … This function starts an HMAC sequence and returns the size of the digest that will be produced.
19577 This call is used to start a sequence HMAC that spans multiple TPM commands.
19587 166 UINT16 keySize, // IN: the size of HMAC key in byte
19588 167 BYTE *key, // IN: HMAC key
19589 168 HMAC_STATE *hmacState // OUT: the state of HMAC stack. It will be …
19590 169 // in HMAC update and completion
19610 This function starts an HMAC and returns the size of the digest that will be produced.
19611 This function is provided to support the most common use of starting an HMAC with a TPM2B key.
19631 188 TPM2B *key, // IN: HMAC key
19632 189 HMAC_STATE *hmacState // OUT: the state of HMAC stack. It will be used
19633 190 // in HMAC update and completion
19642 … This function starts an HMAC sequence and returns the size of the digest that will be produced.
19643 This function is provided to support the most common use of starting an HMAC with a TPM2B key.
19655 198 TPM2B *key, // IN: HMAC key
19656 199 HMAC_STATE *hmacState // OUT: the state of HMAC stack. It will be used
19657 200 // in HMAC update and completion
19666 This function updates a digest (hash or HMAC) with an array of octets.
19667 …This function can be used for both HMAC and hash functions so the digestState is void so that eith…
19697 This function updates a digest (hash or HMAC) with a TPM2B.
19698 …This function can be used for both HMAC and hash functions so the digestState is void so that eith…
19777 …This function can be called to complete either an HMAC or hash sequence. The state type determines…
19778 … the context type is a hash or HMAC. If an HMAC, then the call is forwarded to CryptCompleteHash().
19779 …If digestSize is smaller than the digest size of hash/HMAC algorithm, the most significant bytes of
19795 291 // If the session type is HMAC, then could forward this to
19796 292 // the HMAC processing and not cause an error. However, if no
19799 295 // the type == HMAC and fix anything that makes the wrong call.
19870 …This function completes a HMAC sequence and returns the digest. If digestSize is smaller than the …
19871 size of the HMAC algorithm, the most significant bytes of required size will be returned.
19879 333 HMAC_STATE *hmacState, // IN: the state of HMAC stack
19881 335 BYTE *digest // OUT: HMAC digest
19906 …This function is the same as CryptCompleteHMAC() but the HMAC result is returned in a TPM2B which …
19915 353 HMAC_STATE *hmacState, // IN: the state of HMAC stack
19916 354 TPM2B *digest // OUT: HMAC
20009 Sign a digest using an HMAC key. This an HMAC of a digest, not an HMAC of a message.
20015 396 OBJECT *signKey, // IN: HMAC key sign the hash
20030 405 // HMAC algorithm self testing code may be inserted here
20044 419 // Set HMAC algorithm
20053 This function will verify a signature signed by a HMAC key.
20061 426 OBJECT *signKey, // IN: HMAC key signed the hash
20133 481 // HMAC function.
20222 540 TPM_ALG_ID hash, // IN: hash algorithm used in HMAC
20223 541 TPM2B *key, // IN: HMAC key
21458 1394 TPM2B *key, // IN: KDF HMAC key
21504 1429 TPM2B *key, // IN: KDF HMAC key
21546 …This function creates the sensitive symmetric values for an HMAC or symmetric key. If the sensitiv…
21733 … TPM can accept HMAC authorization or return any result that relies on a hash algorithm.
22553 2247 // The HMAC key is going to be the concatenation of the session key and any
23298 … Sign a digest with asymmetric key or HMAC. This function is called by attestation commands and the
23388 … TPM_RC_HANDLE an HMAC key was selected but the private part of the key is not
23777 41 // Start HMAC
23790 54 // complete HMAC
23827 80 // Start HMAC
23846 99 // Compute HMAC
23894 135 // Compute HMAC
23935 170 // Compute HMAC
26840 Add data to a hash or HMAC stack.
26892 …Complete a hash or HMAC computation. This function will place the smaller of digestSize or the siz…
27069 B.8.5. HMAC Functions
27073 …This function is used to start an HMAC using a temp hash context. The function does the initializa…
27074 the hash with the HMAC key XOR iPad and updates the HMAC key XOR oPad.
27087 412 UINT16 keySize, // IN: the size of the HMAC key
27088 413 BYTE *key, // IN: the HMAC key
27127 452 // Start a new hash with the HMAC key
27151 …This function is called to complete an HMAC. It will finish the current digest, and start a new di…
27162 470 TPM2B *oPadKey, // IN: the HMAC key in oPad format
27286 …sizeInBits will be used in the HMAC computation but only one iteration of the KDF is performed. Th…
27299 562 TPM_ALG_ID hashAlg, // IN: hash algorithm used in HMAC
27300 563 TPM2B *key, // IN: HMAC key
27361 618 // Start HMAC
27390 647 // Compute HMAC. At the start of each iteration, hLen is set
27426 662 TPM_ALG_ID hashAlg, // IN: hash algorithm used in HMAC
30223 1031 // HMAC key w/ iPad
30225 1033 // HMAC key w/ oPad
30316 1119 // Initialize the HMAC with saved state
30319 1122 // Hash the inner counter (the one that changes on each HMAC iteration)
30348 1146 // gives a completed HMAC
30767 …tructure that contains pointers to a pre-computed set of hash contexts that are set up for the HMAC
30798 105 // Initialize the HMAC with saved state
30801 108 // Hash the inner counter (the one that changes on each HMAC iteration)
30831 133 // gives a completed HMAC