Lines Matching defs:sensitive

61 //     Get the size of TPM2B_IV in canonical form that will be append to the start of the sensitive data. It
96 // This function retrieves the symmetric protection key parameters for the sensitive data The parameters
99 // requires encrypting or decrypting of the sensitive area of an object or a credential blob
145 // The sensitive area parameter is a buffer that holds a space for the integrity value and the marshaled
146 // sensitive area. The caller should skip over the area set aside for the integrity value and compute the hash
147 // of the remainder of the object. The size field of sensitive is in unmarshaled form and the sensitive area
162 UINT32 sensitiveSize, // IN: size of the marshaled sensitive data
163 BYTE *sensitiveData, // IN: sensitive area
179 // Adding the marshaled sensitive area to the integrity value
197 UINT16 dataSize, // IN: the size of sensitive data
198 BYTE *sensitiveData, // IN: sensitive data
205 // Adding the marshaled sensitive area to the integrity value
218 // sensitive data being marshaled to the innerBuffer, with the leading bytes reserved for integrity hash. It
219 // assume the sensitive data starts at address (innerBuffer + integrity size). This function integrity at the
226 UINT16 dataSize, // IN: the size of sensitive data, excluding the
228 BYTE *innerBuffer // IN/OUT: inner buffer with sensitive data in
233 BYTE *sensitiveData; // pointer to the sensitive data
238 // sensitiveData points to the beginning of sensitive data in innerBuffer
263 UINT16 dataSize, // IN: the size of sensitive data, including the
265 BYTE *innerBuffer // IN/OUT: inner buffer with sensitive data in
309 // the authorization is checked, both the public and sensitive
328 // TPM_RC_ATTRIBUTES attempt to inject sensitive data for an asymmetric key; or attempt to
509 // sensitive data for an asymmetric key; attempt to create a symmetric
680 return (TPM2B_SEED *) &protector->sensitive.seedValue;
688 // This function produce outer wrap for a buffer containing the sensitive data. It requires the sensitive data
690 // space should be reserved at the beginning of the buffer. It assumes the sensitive data starts at address
692 // a) Add IV before sensitive area if required
693 // b) encrypt sensitive data, if iv is required, encrypt by iv. otherwise, encrypted by a NULL iv
708 UINT16 dataSize, // IN: the size of sensitive data, excluding the
711 BYTE *outerBuffer // IN/OUT: outer buffer with sensitive data in
721 BYTE *sensitiveData; // pointer to the sensitive data
726 // Compute the beginning of sensitive data. The outer integrity should
730 // If iv is used, adjust the pointer of sensitive data and add iv before it
742 // adjust sensitive data starting after IV area
770 // This function remove the outer wrap of a blob containing sensitive data This function performs:
776 // TPM_RC_INSUFFICIENT error during sensitive data unmarshaling
777 // TPM_RC_INTEGRITY sensitive data integrity is broken
778 // TPM_RC_SIZE error during sensitive data unmarshaling
793 UINT16 dataSize, // IN: size of sensitive data in outerBuffer,
796 BYTE *outerBuffer // IN/OUT: sensitive data
805 BYTE *sensitiveData; // pointer to the sensitive data
853 // b) apply encryption to the sensitive area.
858 TPMT_SENSITIVE *sensitive, // IN: sensitive structure
870 BYTE *sensitiveData; // pointer to the sensitive data
887 // Starting of sensitive data without wrappers
897 // Marshal sensitive area, leaving the leading 2 bytes for size
900 dataSize = TPMT_SENSITIVE_Marshal(sensitive, &buffer, &bufferSize);
918 // Unwrap a input private area. Check the integrity, decrypt and retrieve data to a sensitive structure. The
944 TPMT_SENSITIVE *sensitive // OUT: sensitive structure
950 BYTE *sensitiveData; // pointer to the sensitive data
979 // The starting of sensitive data and data size without outer wrapper
992 // Unmarshal sensitive buffer to sensitive structure
993 result = TPMT_SENSITIVE_Unmarshal(sensitive, &buffer, &size);
1005 MemoryRemoveTrailingZeros(&(sensitive->authValue));
1015 // This function prepare the duplication blob from the sensitive area. The operations in this function:
1017 // b) apply inner wrap to the sensitive area if required
1022 TPMT_SENSITIVE *sensitive, // IN: sensitive structure
1045 BYTE *sensitiveData; // pointer to the sensitive data
1055 // Starting of sensitive data without wrappers
1063 // Adjust sensitive data pointer
1072 // Adjust sensitive data pointer
1075 // Marshal sensitive area, leaving the leading 2 bytes for size
1078 dataSize = TPMT_SENSITIVE_Marshal(sensitive, &buffer, &bufferSize);
1135 // Unwrap a duplication blob. Check the integrity, decrypt and retrieve data to a sensitive structure. The
1143 // TPM_RC_INSUFFICIENT unmarshaling sensitive data from inPrivate failed
1145 // TPM_RC_SIZE unmarshaling sensitive data from inPrivate failed
1163 TPMT_SENSITIVE *sensitive // OUT: sensitive structure
1169 BYTE *sensitiveData; // pointer to the sensitive data
1176 // Starting of sensitive data
1189 // Adjust sensitive data pointer and size
1210 // Adjust sensitive data pointer and size
1224 // Unmarshal sensitive buffer to sensitive structure
1225 result = TPMT_SENSITIVE_Unmarshal(sensitive, &buffer, &size);
1234 MemoryRemoveTrailingZeros(&(sensitive->authValue));
1259 BYTE *sensitiveData; // pointer to the sensitive data
1312 BYTE *sensitiveData; // pointer to the sensitive data
1321 // Compute the beginning of sensitive data