Searched defs:sensitive (Results 1 - 17 of 17) sorted by relevance

/external/tpm2/
H A DCreatePrimary.c16 // TPM_RC_ATTRIBUTES sensitiveDataOrigin is CLEAR when 'sensitive.data' is an Empty
17 // Buffer, or is SET when 'sensitive.data' is not empty; fixedTPM,
20 // restricted, decrypt and sign attributes; attempt to inject sensitive data
28 // TPM_RC_SIZE size of public auth policy or sensitive auth value does not match
29 // digest size of the name algorithm sensitive data size for the keyed
43 TPMT_SENSITIVE sensitive; local
49 != (in->inSensitive.t.sensitive.data.t.size == 0 ))
61 // Validate the sensitive area values
62 if( MemoryRemoveTrailingZeros(&in->inSensitive.t.sensitive.userAuth)
75 &in->inSensitive.t.sensitive,
[all...]
H A DECDH_KeyGen.c25 TPM2B_ECC_PARAMETER sensitive; local
46 &out->pubPoint.t.point, &sensitive);
54 &sensitive, &eccKey->publicArea.unique.ecc);
H A DLoadExternal.c16 // both public and sensitive portions are loaded
38 TPMT_SENSITIVE *sensitive; local
53 // For loading an object with both public and sensitive
59 // An external object with a sensitive area must have fixedTPM == CLEAR
79 // If a sensitive area was provided, load it
81 sensitive = &in->inPrivate.t.sensitiveArea;
83 sensitive = NULL;
88 sensitive, &out->name, TPM_RH_NULL, skipChecks,
H A DCreate.c17 // TPM_RC_ATTRIBUTES sensitiveDataOrigin is CLEAR when 'sensitive.data' is an Empty
18 // Buffer, or is SET when 'sensitive.data' is not empty; fixedTPM,
21 // restricted, decrypt and sign attributes; attempt to inject sensitive data
29 // sensitive creation area; may also be returned if the TPM does not
35 // TPM_RC_SIZE size of public auth policy or sensitive auth value does not match
36 // digest size of the name algorithm sensitive data size for the keyed
42 // decryption key in the storage hierarchy with both public and sensitive
57 TPMT_SENSITIVE sensitive; local
73 != (in->inSensitive.t.sensitive.data.t.size == 0))
85 // Validate the sensitive are
[all...]
H A DDuplicate.c33 TPMT_SENSITIVE sensitive; local
106 // Copy sensitive area
107 sensitive = object->sensitive;
109 // Prepare output private data from sensitive
110 SensitiveToDuplicate(&sensitive, &object->name, in->newParentHandle,
H A DLoad.c39 TPMT_SENSITIVE sensitive; local
79 // Retrieve sensitive data. PrivateToSensitive() may return TPM_RC_INTEGRITY or
84 &sensitive);
96 result = ObjectLoad(hierarchy, &in->inPublic.t.publicArea, &sensitive,
H A DObjectChangeAuth.c26 TPMT_SENSITIVE sensitive; local
60 // Copy internal sensitive area
61 sensitive = object->sensitive;
63 sensitive.authValue = in->newAuth;
65 // Prepare output private data from sensitive
66 SensitiveToPrivate(&sensitive, &object->name, in->parentHandle,
H A DImport.c35 // secret; or unmarshaling sensitive value from duplicate failed the
52 // type of parentHandle; or unmarshaling sensitive value from duplicate
77 TPMT_SENSITIVE sensitive; local
141 // Retrieve sensitive from private.
146 &in->encryptionKey, &sensitive);
168 &sensitive, NULL, in->parentHandle, FALSE,
180 // Prepare output private data from sensitive
181 SensitiveToPrivate(&sensitive, &name, in->parentHandle,
H A DObject.c287 // TPM_RC_BINDING if the public and sensitive parts of the object are not matched
296 TPMT_SENSITIVE *sensitive, // IN: sensitive area (may be null)
313 if(sensitive != NULL)
314 object->sensitive = *sensitive;
324 if(sensitive != NULL)
326 // Check if public type matches sensitive type
332 object->attributes.publicOnly = (sensitive == NULL);
470 CryptStartHMACSequence2B(hashAlg, &keyObject->sensitive
293 ObjectLoad( TPMI_RH_HIERARCHY hierarchy, TPMT_PUBLIC *publicArea, TPMT_SENSITIVE *sensitive, TPM2B_NAME *name, TPM_HANDLE parentHandle, BOOL skipChecks, TPMI_DH_OBJECT *handle ) argument
[all...]
H A DObject_spt.c61 // Get the size of TPM2B_IV in canonical form that will be append to the start of the sensitive data. It
96 // This function retrieves the symmetric protection key parameters for the sensitive data The parameters
99 // requires encrypting or decrypting of the sensitive area of an object or a credential blob
145 // The sensitive area parameter is a buffer that holds a space for the integrity value and the marshaled
146 // sensitive area. The caller should skip over the area set aside for the integrity value and compute the hash
147 // of the remainder of the object. The size field of sensitive is in unmarshaled form and the sensitive area
162 UINT32 sensitiveSize, // IN: size of the marshaled sensitive data
163 BYTE *sensitiveData, // IN: sensitive area
179 // Adding the marshaled sensitive are
859 SensitiveToPrivate( TPMT_SENSITIVE *sensitive, TPM2B_NAME *name, TPM_HANDLE parentHandle, TPM_ALG_ID nameAlg, TPM2B_PRIVATE *outPrivate ) argument
1023 SensitiveToDuplicate( TPMT_SENSITIVE *sensitive, TPM2B_NAME *name, TPM_HANDLE parentHandle, TPM_ALG_ID nameAlg, TPM2B_SEED *seed, TPMT_SYM_DEF_OBJECT *symDef, TPM2B_DATA *innerSymKey, TPM2B_PRIVATE *outPrivate ) argument
[all...]
H A DCryptUtil.c638 &signKey->sensitive.sensitive.bits.b,
669 &signKey->sensitive.sensitive.bits.b, &hmacState);
690 // TPM_RC_SIZE sensitive data size is larger than allowed for the scheme
697 TPMS_SENSITIVE_CREATE *sensitiveCreate, // IN: sensitive creation data
698 TPMT_SENSITIVE *sensitive, // OUT: sensitive area
737 sensitive->sensitive
694 CryptGenerateKeyedHash( TPMT_PUBLIC *publicArea, TPMS_SENSITIVE_CREATE *sensitiveCreate, TPMT_SENSITIVE *sensitive, TPM_ALG_ID kdfHashAlg, TPM2B_SEED *seed, TPM2B_NAME *name ) argument
852 CryptGenerateKeyRSA( TPMT_PUBLIC *publicArea, TPMT_SENSITIVE *sensitive, TPM_ALG_ID hashAlg, TPM2B_SEED *seed, TPM2B_NAME *name, UINT32 *counter ) argument
907 TPMT_SENSITIVE *sensitive = &rsaKey->sensitive; local
1410 CryptGenerateKeyECC( TPMT_PUBLIC *publicArea, TPMT_SENSITIVE *sensitive, TPM_ALG_ID hashAlg, TPM2B_SEED *seed, TPM2B_NAME *name, UINT32 *counter ) argument
1866 CryptGenerateNewSymmetric( TPMS_SENSITIVE_CREATE *sensitiveCreate, TPMT_SENSITIVE *sensitive, TPM_ALG_ID hashAlg, TPM2B_SEED *seed, TPM2B_NAME *name ) argument
1939 CryptGenerateKeySymmetric( TPMT_PUBLIC *publicArea, TPMS_SENSITIVE_CREATE *sensitiveCreate, TPMT_SENSITIVE *sensitive, TPM_ALG_ID hashAlg, TPM2B_SEED *seed, TPM2B_NAME *name ) argument
2794 CryptComputeSymmetricUnique( TPMI_ALG_HASH nameAlg, TPMT_SENSITIVE *sensitive, TPM2B_DIGEST *unique ) argument
3066 TPMT_SENSITIVE *sensitive; local
[all...]
H A DGlobal.h168 // An OBJECT structure holds the object public, sensitive, and meta-data associated. This structure is
180 TPMT_SENSITIVE sensitive; // sensitive area of an object member in struct:__anon27061
H A Dtpm_types.h1058 TPMS_SENSITIVE_CREATE sensitive; member in struct:__anon27277::__anon27278
1508 TPMU_SENSITIVE_COMPOSITE sensitive; member in struct:__anon27323
1524 TPMT_SENSITIVE sensitive; member in struct:__anon27326
/external/fio/
H A Dgfio.c180 static const char *get_button_tooltip(struct button_spec *s, int sensitive) argument
182 if (s->tooltiptext[sensitive])
183 return s->tooltiptext[sensitive];
/external/webrtc/webrtc/base/
H A Dhttpcommon.cc772 // TODO: convert sensitive to a secure buffer that gets securely deleted
775 char * sensitive = new char[len]; local
776 size_t pos = strcpyn(sensitive, len, username.data(), username.size());
777 pos += strcpyn(sensitive + pos, len - pos, ":");
778 password.CopyTo(sensitive + pos, true);
782 // TODO: create a sensitive-source version of Base64::encode
783 response.append(Base64::Encode(sensitive));
784 memset(sensitive, 0, len);
785 delete [] sensitive;
816 // TODO: convert sensitive t
819 char * sensitive = new char[len]; // A1 local
960 char * sensitive = new char[len]; local
[all...]
/external/guice/extensions/struts2/lib/
H A Dcommons-io-1.3.2.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/commons/ org/apache/commons/io/ ...
/external/libphonenumber/demo/war/WEB-INF/lib/
H A Dcommons-io-1.4.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/commons/ org/apache/commons/io/ ...

Completed in 354 milliseconds