• Home
  • Raw
  • Download

Lines Matching full:in

4  * found in the LICENSE file.
11 TPMT_PUBLIC *publicArea // IN: the public area to check
14 TPM_ECC_CURVE curveID, // IN: the starting ECC curve
15 UINT32 maxCount, // IN: count of returned curve
20 LIB_EXPORT int CryptCompare(const UINT32 aSize, // IN: size of a
21 const BYTE *a, // IN: a buffer
22 const UINT32 bSize, // IN: size of b
23 const BYTE *b // IN: b buffer
29 TPM_ECC_CURVE curveID, // IN: The curve for the computation
30 TPMS_ECC_POINT *M, // IN: M (P1)
31 TPMS_ECC_POINT *B, // IN: B (x2, y2)
32 TPM2B_ECC_PARAMETER *d, // IN: the private scalar
33 TPM2B_ECC_PARAMETER *r // IN: the computed r value
35 int CryptCompareSigned(UINT32 aSize, // IN: size of a
36 BYTE *a, // IN: a buffer
37 UINT32 bSize, // IN: size of b
38 BYTE *b // IN: b buffer
41 TPMI_ALG_HASH nameAlg, // IN: object name algorithm
42 TPMT_SENSITIVE *sensitive, // IN: sensitive area
46 CryptCompleteHMAC2B(HMAC_STATE *hmacState, // IN: the state of HMAC stack
50 CryptCompleteHash(void *state, // IN: the state of hash stack
51 UINT16 digestSize, // IN: size of digest buffer
55 void *state, // IN: the state of hash stack
56 TPM2B *digest // IN: the size of the buffer Out: requested number of byte
59 TPM_HANDLE parentHandle, // IN/OUT: indication of the seed source
60 TPMT_PUBLIC *publicArea, // IN/OUT: public area
61 TPMS_SENSITIVE_CREATE *sensitiveCreate, // IN: sensitive creation
64 void CryptDrbgGetPutState(GET_PUT direction // IN: Get from or put to DRBG
67 UINT16 *dataOutSize, // OUT: size of plain text in byte
69 OBJECT *rsaKey, // IN: internal RSA key
70 TPMT_RSA_DECRYPT *scheme, // IN: selects the padding scheme
71 UINT16 cipherInSize, // IN: size of cipher text in byte
72 BYTE *cipherIn, // IN: cipher text
73 const char *label // IN: a label, when needed
76 TPM2B *numerator, // IN: numerator
77 TPM2B *denominator, // IN: denominator
81 void CryptDrbgGetPutState(GET_PUT direction // IN: Get from or put to DRBG
87 // This macro returns the size of the ECC key in bytes. It uses
96 TPM_ALG_ID scheme, // IN: the key exchange scheme
97 TPM_ECC_CURVE curveId, // IN: the curve for the computation
98 TPM2B_ECC_PARAMETER *dsA, // IN: static private TPM key
99 TPM2B_ECC_PARAMETER *deA, // IN: ephemeral private TPM key
100 TPMS_ECC_POINT *QsB, // IN: static public party B key
101 TPMS_ECC_POINT *QeB // IN: ephemeral public party B key
104 UINT16 *cipherOutSize, // OUT: size of cipher text in byte
106 OBJECT *rsaKey, // IN: internal RSA key
107 TPMT_RSA_DECRYPT *scheme, // IN: selects the padding scheme
108 UINT16 dataInSize, // IN: size of plain text in byte
109 BYTE *dataIn, // IN: plain text
110 const char *label // IN: an optional label
112 TPM_ALG_ID CryptGetContextAlg(void *state // IN: the context to check
114 LIB_EXPORT TPM_ALG_ID CryptGetHashAlgByIndex(UINT32 index // IN: the index
117 CryptGetHashDigestSize(TPM_ALG_ID hashAlg // IN: hash algorithm
120 char p, // IN: the parameter selector
121 TPM_ECC_CURVE curveId // IN: the curve id
124 TPM_ECC_CURVE curveId, // IN: ECC curve ID
128 TPM_ECC_CURVE curveId, // IN: curve selector
129 TPM2B_ECC_PARAMETER *dIn, // IN: public scalar
130 TPMS_ECC_POINT *pIn // IN: optional point
132 BOOL CryptEccIsPointOnCurve(TPM_ECC_CURVE curveID, // IN: ECC curve ID
133 TPMS_ECC_POINT *Q // IN: ECC point
135 void CryptEndCommit(UINT16 c // IN: the counter value of the commitment
139 UINT16 *c, // IN/OUT: count value.
140 TPMI_ECC_CURVE curveID, // IN: the curve for the value
141 TPM2B_NAME *name // IN: optional name of a key to associate with 'r'
143 UINT16 CryptGenerateRandom(UINT16 randomSize, // IN: size of random number
147 TPMS_SENSITIVE_CREATE *sensitiveCreate, // IN: sensitive creation data
149 TPM_ALG_ID hashAlg, // IN: hash algorithm for the KDF
150 TPM2B_SEED *seed, // IN: seed used in creation
151 TPM2B_NAME *name // IN: name of the object
154 TPM_ECC_CURVE curveId // IN: The curve selector
157 CryptGetHashDigestSize(TPM_ALG_ID hashAlg // IN: hash algorithm
159 TPMI_ALG_HASH CryptGetSignHashAlg(TPMT_SIGNATURE *auth // IN: signature
162 TPMI_ALG_SYM algorithm, // IN: symmetric algorithm
163 UINT16 keySize // IN: key size in bit
168 CryptHashBlock(TPM_ALG_ID algId, // IN: the hash algorithm to use
169 UINT16 blockSize, // IN: size of the data block
170 BYTE *block, // IN: address of the block to hash
171 UINT16 retSize, // IN: size of the return buffer
179 // This function generates a key using the KDFa() formulation in Part 1 of the
180 // TPM specification. In this implementation, this is a macro invocation of
181 // _cpri__KDFa() in the hash module of the CryptoEngine(). This macro sets
196 // This function generates a key using the KDFa() formulation in Part 1 of the
197 // TPM specification. In this implementation, this is a macro invocation of
198 // _cpri__KDFa() in the hash module of the CryptoEngine(). This macro will
213 // This function generates a key using the KDFa() formulation in Part 1 of
214 // the TPM specification. In this implementation, this is a macro invocation
215 // of _cpri__KDFe() in the hash module of the CryptoEngine().
225 HASH_STATE *internalFmt, // IN: state to LIB_EXPORT
229 BOOL CryptIsAsymAlgorithm(TPM_ALG_ID algID // IN: algorithm ID
233 TPM_ALG_ID scheme // IN: the scheme algorithm to test
236 BOOL CryptIsSplitSign(TPM_ALG_ID scheme // IN: the algorithm selector
238 TPM_RC CryptNewEccKey(TPM_ECC_CURVE curveID, // IN: ECC curve
242 BOOL CryptObjectIsPublicConsistent(TPMT_PUBLIC *publicArea // IN: public area
244 TPM_RC CryptObjectPublicPrivateMatch(OBJECT *object // IN: the object to check
247 TPM_HANDLE handle, // IN: encrypted session handle
248 TPM2B *nonceCaller, // IN: nonce caller
249 UINT32 bufferSize, // IN: size of parameter buffer
251 leadingSizeInByte, // IN: the size of the leading size field in byte
252 TPM2B_AUTH *extraKey, // IN: the authValue
253 BYTE *buffer // IN/OUT: parameter buffer to be decrypted
256 TPM_HANDLE handle, // IN: encrypt session handle
257 TPM2B *nonceCaller, // IN: nonce caller
258 UINT16 leadingSizeInByte, // IN: the size of the leading size field in byte
260 extraKey, // IN: additional key material other than session auth
261 BYTE *buffer // IN/OUT: parameter buffer to be encrypted
264 TPM_HANDLE tpmKey, // IN: decrypt key
265 TPM2B_NONCE *nonceCaller, // IN: nonceCaller. It is needed for symmetric
268 const char *label, // IN: a null-terminated string as L
269 TPM2B_ENCRYPTED_SECRET *secret, // IN: input secret
273 TPMI_DH_OBJECT keyHandle, // IN: encryption key handle
274 const char *label, // IN: a null-terminated string as L
279 TPMI_DH_OBJECT rsaHandle, // IN: handle of sign key
280 TPMT_RSA_DECRYPT *scheme // IN: a sign or decrypt scheme
283 TPMI_DH_OBJECT signHandle, // IN: handle of signing key
284 TPMT_SIG_SCHEME *scheme // IN/OUT: signing scheme
286 TPM_RC CryptSign(TPMI_DH_OBJECT signHandle, // IN: The handle of sign key
287 TPMT_SIG_SCHEME *signScheme, // IN: sign scheme.
288 TPM2B_DIGEST *digest, // IN: The digest being signed
292 CryptStartHMAC2B(TPMI_ALG_HASH hashAlg, // IN: hash algorithm
293 TPM2B *key, // IN: HMAC key
295 // be used in HMAC update and completion
297 UINT16 CryptStartHMACSequence2B(TPMI_ALG_HASH hashAlg, // IN: hash algorithm
298 TPM2B *key, // IN: HMAC key
301 // in HMAC update and
304 UINT16 CryptStartHashSequence(TPMI_ALG_HASH hashAlg, // IN: hash algorithm
307 // in hash update and
310 void CryptStirRandom(UINT32 entropySize, // IN: size of entropy buffer
311 BYTE *buffer // IN: entropy buffer
316 TPM_ALG_ID algorithm, // IN: algorithm for encryption
317 UINT16 keySizeInBits, // IN: key size in bit
318 TPMI_ALG_SYM_MODE mode, // IN: symmetric encryption mode
319 BYTE *key, // IN: encryption key
320 TPM2B_IV *ivIn, // IN/OUT: IV for next block
321 UINT32 dataSize, // IN: data size in byte
322 BYTE *data // IN/OUT: data buffer
326 TPM_ALG_ID algorithm, // IN: algorithm for encryption
327 UINT16 keySizeInBits, // IN: key size in bit
328 TPMI_ALG_SYM_MODE mode, // IN: symmetric encryption mode
329 BYTE *key, // IN: encryption key
330 TPM2B_IV *ivIn, // IN/OUT: Input IV and output chaining value for the
332 UINT32 dataSize, // IN: data size in byte
333 BYTE *data // IN/OUT: data buffer
335 UINT16 CryptStartHash(TPMI_ALG_HASH hashAlg, // IN: hash algorithm
337 // will be used in hash update and
340 void CryptUpdateDigest(void *digestState, // IN: the state of hash stack
341 UINT32 dataSize, // IN: the size of data
342 BYTE *data // IN: data to be hashed
344 LIB_EXPORT void CryptUpdateDigest2B(void *digestState, // IN: the digest state
345 TPM2B *bIn // IN: 2B containing the data
347 void CryptUpdateDigestInt(void *state, // IN: the state of hash stack
348 UINT32 intSize, // IN: the size of 'intValue' in byte
349 void *intValue // IN: integer value to be hashed
351 BOOL CryptUtilStartup(STARTUP_TYPE type // IN: the startup type
354 TPMI_DH_OBJECT keyHandle, // IN: The handle of sign key
355 TPM2B_DIGEST *digest, // IN: The digest being validated
356 TPMT_SIGNATURE *signature // IN: signature
358 void KDFa(TPM_ALG_ID hash, // IN: hash algorithm used in HMAC
359 TPM2B *key, // IN: HMAC key
360 const char *label, // IN: a null-terminated label for KDF
361 TPM2B *contextU, // IN: context U
362 TPM2B *contextV, // IN: context V
363 UINT32 sizeInBits, // IN: size of generated key in bit
365 UINT32 *counterInOut // IN/OUT: caller may provide the iteration