/external/tpm2/ |
H A D | HMAC_Start.c | 17 // TPM_RC_VALUE hashAlg is not compatible with the hash algorithm of the scheme of 28 TPM_ALG_ID hashAlg; local 51 hashAlg = in->hashAlg; 55 hashAlg 56 = publicArea->parameters.keyedHashDetail.scheme.details.hmac.hashAlg; 58 if(in->hashAlg != TPM_ALG_NULL && in->hashAlg != hashAlg) 59 hashAlg [all...] |
H A D | HMAC.c | 16 // TPM_RC_VALUE hashAlg is not compatible with the hash algorithm of the scheme of 27 TPMI_ALG_HASH hashAlg; local 51 hashAlg = in->hashAlg; 55 hashAlg 56 = publicArea->parameters.keyedHashDetail.scheme.details.hmac.hashAlg; 58 if(in->hashAlg != TPM_ALG_NULL && in->hashAlg != hashAlg) 59 hashAlg [all...] |
H A D | HashSequenceStart.c | 24 if(in->hashAlg == TPM_ALG_NULL) 31 return ObjectCreateHashSequence(in->hashAlg, &in->auth, &out->sequenceHandle);
|
H A D | Quote.c | 27 TPMI_ALG_HASH hashAlg; local 54 hashAlg = in->inScheme.details.any.hashAlg; 56 if(hashAlg == TPM_ALG_NULL) 60 PCRComputeCurrentDigest(hashAlg,
|
H A D | EventSequenceComplete.c | 26 TPM_ALG_ID hashAlg; local 67 hashAlg = CryptGetHashAlgByIndex(i); 71 out->results.digests[out->results.count].hashAlg = hashAlg; 73 CryptGetHashDigestSize(hashAlg), 78 PCRExtend(in->pcrHandle, hashAlg, 79 CryptGetHashDigestSize(hashAlg),
|
H A D | CpriHash_fp.h | 20 _cpri__HashBlock(TPM_ALG_ID hashAlg, // IN: The hash algorithm 28 _cpri__GetDigestSize(TPM_ALG_ID hashAlg // IN: hash algorithm to look up 31 _cpri__GetHashDER(TPM_ALG_ID hashAlg, // IN: the algorithm to look up 34 _cpri__KDFa(TPM_ALG_ID hashAlg, // IN: hash algorithm used in HMAC 48 _cpri__KDFe(TPM_ALG_ID hashAlg, // IN: hash algorithm used in HMAC 59 TPM_ALG_ID hashAlg, // IN: hash to use 64 _cpri__StartHMAC(TPM_ALG_ID hashAlg, // IN: the algorithm to use 72 _cpri__StartHash(TPM_ALG_ID hashAlg, // IN: hash algorithm 95 _cpri__GetHashBlockSize(TPM_ALG_ID hashAlg // IN: hash algorithm to look up
|
H A D | PCR_SetAuthPolicy.c | 35 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->hashAlg)) 45 gp.pcrPolicies.hashAlg[groupIndex] = in->hashAlg;
|
H A D | CpriRSA_fp.h | 18 TPM_ALG_ID hashAlg, // IN: in case this is needed for the scheme 28 TPM_ALG_ID hashAlg, // IN: in case this is needed 37 hashAlg, // IN: hash algorithm to use in the key generation proce 49 TPM_ALG_ID hashAlg, // IN: hash algorithm for PKSC1v1_5 64 TPM_ALG_ID hashAlg, // IN: hash algorithm
|
H A D | SetPrimaryPolicy.c | 27 if(in->authPolicy.t.size != CryptGetHashDigestSize(in->hashAlg)) 44 gp.ownerAlg = in->hashAlg; 50 gp.endorsementAlg = in->hashAlg; 56 gc.platformAlg = in->hashAlg; 62 gp.lockoutAlg = in->hashAlg;
|
H A D | PCR_Extend.c | 57 PCRExtend(in->pcrHandle, in->digests.digests[i].hashAlg, 58 CryptGetHashDigestSize(in->digests.digests[i].hashAlg),
|
H A D | PolicyAuthorize.c | 29 TPM_ALG_ID hashAlg; local 38 hashAlg = BYTE_ARRAY_TO_UINT16(in->keySign.t.name); 42 digestSize = CryptGetHashDigestSize(hashAlg); 62 authHash.t.size = CryptStartHash(hashAlg, &hashState);
|
H A D | RSAKeySieve_fp.h | 16 hashAlg, // IN: hash algorithm to use in the key generation process
|
H A D | CpriHash.c | 34 TPM_ALG_ID hashAlg 37 switch (hashAlg) 133 TPM_ALG_ID hashAlg 141 if(g_hashData[i].alg == hashAlg) 210 TPM_ALG_ID hashAlg // IN: hash algorithm to look up 213 return GetHashInfoPointer(hashAlg)->blockSize; 223 TPM_ALG_ID hashAlg, // IN: the algorithm to look up 228 q = GetHashInfoPointer(hashAlg); 245 TPM_ALG_ID hashAlg // IN: hash algorithm to look up 248 return GetHashInfoPointer(hashAlg) 222 _cpri__GetHashDER( TPM_ALG_ID hashAlg, const BYTE **p ) argument 299 _cpri__StartHash( TPM_ALG_ID hashAlg, BOOL sequence, CPRI_HASH_STATE *hashState ) argument 501 _cpri__HashBlock( TPM_ALG_ID hashAlg, UINT32 dataSize, BYTE *data, UINT32 digestSize, BYTE *digest ) argument 564 _cpri__StartHMAC( TPM_ALG_ID hashAlg, BOOL sequence, CPRI_HASH_STATE *state, UINT16 keySize, BYTE *key, TPM2B *oPadKey ) argument 664 _cpri__MGF1( UINT32 mSize, BYTE *mask, TPM_ALG_ID hashAlg, UINT32 sSize, BYTE *seed ) argument 747 _cpri__KDFa( TPM_ALG_ID hashAlg, TPM2B *key, const char *label, TPM2B *contextU, TPM2B *contextV, UINT32 sizeInBits, BYTE *keyStream, UINT32 *counterInOut, BOOL once ) argument 849 _cpri__KDFe( TPM_ALG_ID hashAlg, TPM2B *Z, const char *label, TPM2B *partyUInfo, TPM2B *partyVInfo, UINT32 sizeInBits, BYTE *keyStream ) argument [all...] |
H A D | Attest_spt.c | 72 TPMI_ALG_HASH hashAlg; local 76 hashAlg = CONTEXT_INTEGRITY_HASH_ALG; 82 hashAlg = signObject->publicArea.nameAlg; 84 KDFa(hashAlg, &gp.shProof.b, "OBFUSCATE", 132 TPMI_ALG_HASH hashAlg; local 160 hashAlg = scheme->details.any.hashAlg; 161 digest.t.size = CryptStartHash(hashAlg, &hashState); 168 CryptStartHash(hashAlg, &hashState);
|
H A D | stubs_hash.c | 10 TPM_ALG_ID hashAlg, // IN: the algorithm to use 19 UINT16 blockSize = _cpri__GetHashBlockSize(hashAlg); 28 if((digestSize = _cpri__StartHash(hashAlg, FALSE, &localState)) == 0) 51 if((digestSize = _cpri__StartHash(hashAlg, sequence, state)) > 0) 71 UINT16 digestSize = _cpri__GetDigestSize(state->hashAlg); 74 if(_cpri__StartHash(state->hashAlg, FALSE, &localState) != digestSize) 82 TPM_ALG_ID hashAlg, // IN: hash algorithm used in HMAC 118 if((hLen = (INT16) _cpri__GetDigestSize(hashAlg)) == 0) 131 if(_cpri__StartHMAC(hashAlg, 167 TPM_ALG_ID hashAlg, // I 9 _cpri__StartHMAC( TPM_ALG_ID hashAlg, BOOL sequence, CPRI_HASH_STATE * state, UINT16 keySize, BYTE * key, TPM2B * oPadKey ) argument 81 _cpri__KDFa( TPM_ALG_ID hashAlg, TPM2B * key, const char *label, TPM2B * contextU, TPM2B * contextV, UINT32 sizeInBits, BYTE * keyStream, UINT32 * counterInOut, BOOL once ) argument 166 _cpri__KDFe( TPM_ALG_ID hashAlg, TPM2B * Z, const char *label, TPM2B * partyUInfo, TPM2B * partyVInfo, UINT32 sizeInBits, BYTE * keyStream ) argument 243 _cpri__GenerateSeededRandom( INT32 randomSize, BYTE * random, TPM_ALG_ID hashAlg, TPM2B * seed, const char *label, TPM2B * partyU, TPM2B * partyV ) argument [all...] |
H A D | Hash.c | 22 out->outHash.t.size = CryptStartHash(in->hashAlg, &hashState); 48 TicketComputeHashCheck(in->hierarchy, in->hashAlg,
|
H A D | CryptUtil_fp.h | 117 CryptGetHashDigestSize(TPM_ALG_ID hashAlg // IN: hash algorithm 149 TPM_ALG_ID hashAlg, // IN: hash algorithm for the KDF 157 CryptGetHashDigestSize(TPM_ALG_ID hashAlg // IN: hash algorithm 185 #define CryptKDFa(hashAlg, key, label, contextU, contextV, sizeInBits, \ 187 TEST_HASH(hashAlg); \ 188 _cpri__KDFa(((TPM_ALG_ID)hashAlg), ((TPM2B *)key), ((const char *)label), \ 202 #define CryptKDFaOnce(hashAlg, key, label, contextU, contextV, sizeInBits, \ 204 TEST_HASH(hashAlg); \ 205 _cpri__KDFa(((TPM_ALG_ID)hashAlg), ((TPM2B *)key), ((const char *)label), \ 217 #define CryptKDFe(hashAlg, [all...] |
H A D | PCR_SetAuthPolicy_fp.h | 15 TPMI_ALG_HASH hashAlg; member in struct:__anon16977
|
H A D | SetPrimaryPolicy_fp.h | 15 TPMI_ALG_HASH hashAlg; member in struct:__anon17021
|
H A D | CpriRSA.c | 328 // CRYPT_PARAMETER hashAlg is not valid 335 TPM_ALG_ID hashAlg, // IN: algorithm to use for padding 349 INT32 hLen = _cpri__GetDigestSize(hashAlg); 371 retVal = _cpri__HashBlock(hashAlg, lSize, (BYTE *)label, hLen, pp); 389 if((retVal = _cpri__MGF1(dbSize, mask, hashAlg, hLen, seed)) < 0) 398 if((retVal = _cpri__MGF1(hLen, &padded[1], hashAlg, dbSize, pp)) < 0) 429 TPM_ALG_ID hashAlg, // IN: algorithm to use for padding 438 INT32 hLen = _cpri__GetDigestSize(hashAlg); 459 if((retVal = _cpri__MGF1(hLen, seedMask, hashAlg, 468 if((retVal = _cpri__MGF1(paddedSize-hLen-1, mask, hashAlg, 332 OaepEncode( UINT32 paddedSize, BYTE *padded, TPM_ALG_ID hashAlg, const char *label, UINT32 messageSize, BYTE *message , BYTE *testSeed ) argument 426 OaepDecode( UINT32 *dataOutSize, BYTE *dataOut, TPM_ALG_ID hashAlg, const char *label, UINT32 paddedSize, BYTE *padded ) argument 603 PssEncode( UINT32 eOutSize, BYTE *eOut, TPM_ALG_ID hashAlg, UINT32 hashInSize, BYTE *hashIn , BYTE *saltIn ) argument 690 PssDecode( TPM_ALG_ID hashAlg, UINT32 dInSize, BYTE *dIn, UINT32 eInSize, BYTE *eIn, UINT32 saltSize ) argument 790 RSASSA_Encode( UINT32 eOutSize, BYTE *eOut, TPM_ALG_ID hashAlg, UINT32 hInSize, BYTE *hIn ) argument 838 RSASSA_Decode( TPM_ALG_ID hashAlg, UINT32 hInSize, BYTE *hIn, UINT32 eInSize, BYTE *eIn ) argument 916 _cpri__EncryptRSA( UINT32 *cOutSize, BYTE *cOut, RSA_KEY *key, TPM_ALG_ID padType, UINT32 dInSize, BYTE *dIn, TPM_ALG_ID hashAlg, const char *label ) argument 989 _cpri__DecryptRSA( UINT32 *dOutSize, BYTE *dOut, RSA_KEY *key, TPM_ALG_ID padType, UINT32 cInSize, BYTE *cIn, TPM_ALG_ID hashAlg, const char *label ) argument 1043 _cpri__SignRSA( UINT32 *sigOutSize, BYTE *sigOut, RSA_KEY *key, TPM_ALG_ID scheme, TPM_ALG_ID hashAlg, UINT32 hInSize, BYTE *hIn ) argument 1099 _cpri__ValidateSignatureRSA( RSA_KEY *key, TPM_ALG_ID scheme, TPM_ALG_ID hashAlg, UINT32 hInSize, BYTE *hIn, UINT32 sigInSize, BYTE *sigIn, UINT16 saltSize ) argument 1152 _cpri__GenerateKeyRSA( TPM2B *n, TPM2B *p, UINT16 keySizeInBits, UINT32 e, TPM_ALG_ID hashAlg, TPM2B *seed, const char *label, TPM2B *extra, UINT32 *counter ) argument [all...] |
H A D | CpriECC_fp.h | 61 hashAlg, // IN: hash algorithm to use in the key generation process 78 TPM_ALG_ID hashAlg, // IN: the hash algorithm if need 90 hashAlg, // IN: the hash algorithm used (not used in all schemes)
|
H A D | SequenceComplete.c | 44 TPM_ALG_ID hashAlg = hashObject->state.hashState[0].state.hashAlg; local 82 TicketComputeHashCheck(out->validation.hierarchy, hashAlg,
|
H A D | CpriRNG_fp.h | 16 TPM_ALG_ID hashAlg, // IN: used by KDF version but not here
|
H A D | Entity.c | 252 TPMI_ALG_HASH hashAlg = TPM_ALG_NULL; local 262 hashAlg = gp.ownerAlg; 267 hashAlg = gp.endorsementAlg; 272 hashAlg = gc.platformAlg; 277 hashAlg = gp.lockoutAlg; 291 hashAlg = object->publicArea.nameAlg; 300 hashAlg = nvIndex.publicArea.nameAlg; 305 hashAlg = PCRGetAuthPolicy(handle, authPolicy); 312 return hashAlg;
|
/external/libchrome/crypto/third_party/nss/ |
H A D | chromium-nss.h | 52 HASH_HashType hashAlg,
|