Lines Matching refs:nonceTPM
1903 181 TPM2B_NONCE nonceTPM; // last TPM-generated nonce for
4370 481 // Determine if extra nonceTPM values are going to be required.
4385 496 nonceDecrypt = &decryptSession->nonceTPM;
4401 506 nonceEncrypt = &encryptSession->nonceTPM;
4455 560 // Add nonceTPM
4456 561 CryptUpdateDigest2B(&hmacState, &session->nonceTPM.b);
4458 563 // If needed, add nonceTPM for decrypt session
4467 567 // If needed, add nonceTPM for encrypt session
5691 1529 TPM2B_NONCE *nonceTPM, // IN: nonceTPM
5748 1580 CryptUpdateDigest2B(&hmacState, &nonceTPM->b);
5802 1622 &session->nonceTPM,
5819 1633 TPM2B_NONCE nonces[] // OUT: nonceTPM
5834 1648 // Update nonceTPM in both internal session and response.
5835 1649 CryptGenerateRandom(session->nonceTPM.t.size, session->nonceTPM.t.buffer);
5836 1650 nonces[i] = session->nonceTPM;
6422 common parameters are nonceTPM, expiration, and cpHashA.
6437 19 // Validate that input nonceTPM is correct if present
6446 22 if(!Memory2BEqual(&nonce->b, &session->nonceTPM.b))
6456 32 // at the nonceTPM value.
14553 281 session->nonceTPM.t.size = nonceCaller->t.size;
14554 282 CryptGenerateRandom(session->nonceTPM.t.size, session->nonceTPM.t.buffer);
14563 291 // sessionKey = KDFa(hash, (authValue || seed), "ATH", nonceTPM,
14594 317 KDFa(session->authHashAlg, &key.b, "ATH", &session->nonceTPM.b,
22521 2226 &(session->nonceTPM.b),
22526 2231 nonceCaller, &(session->nonceTPM.b),
22600 2289 &(session->nonceTPM.b), cipherSize, buffer);
22605 2294 &key.b, nonceCaller, &session->nonceTPM.b,