| Package | Description |
|---|---|
| tss | |
| tss.tpm |
| Modifier and Type | Method and Description |
|---|---|
static TPM_ALG_ID |
Crypto.getSigningHashAlg(TPMT_PUBLIC pub)
Extract the signing hash algorithm from various supported schemes
|
TPM_ALG_ID[] |
Tpm.IncrementalSelfTest(TPM_ALG_ID[] toTest)
This command causes the TPM to perform a test of the selected algorithms.
|
| Modifier and Type | Method and Description |
|---|---|
static byte[] |
Crypto.cfbEncrypt(boolean _encrypt,
TPM_ALG_ID _algId,
byte[] _key,
byte[] _iv,
byte[] _x) |
static Crypto.ECCKeyPair |
Crypto.createECCKey(TPM_ECC_CURVE curveId,
TPM_ALG_ID alg) |
static int |
Crypto.digestSize(TPM_ALG_ID alg)
Return the size in bytes of a hash algorithm based on the TPM algId
|
EncryptDecryptResponse |
Tpm.EncryptDecrypt(TPM_HANDLE keyHandle,
byte decrypt,
TPM_ALG_ID mode,
byte[] ivIn,
byte[] inData)
NOTE 1 This command is deprecated, and TPM2_EncryptDecrypt2() is preferred.
|
EncryptDecrypt2Response |
Tpm.EncryptDecrypt2(TPM_HANDLE keyHandle,
byte[] inData,
byte decrypt,
TPM_ALG_ID mode,
byte[] ivIn)
This command is identical to TPM2_EncryptDecrypt(), except that the inData parameter is the first parameter.
|
static org.bouncycastle.crypto.Digest |
Crypto.getDigest(TPM_ALG_ID alg)
Gets a Bouncy Castle Digest object that matches the TPM_ALG_ID hash algId
|
HashResponse |
Tpm.Hash(byte[] data,
TPM_ALG_ID hashAlg,
TPM_HANDLE hierarchy)
This command performs a hash operation on a data buffer and returns the results.
|
static byte[] |
Crypto.hash(TPM_ALG_ID alg,
byte[] data)
Hash data
|
TPM_HANDLE |
Tpm.HashSequenceStart(byte[] auth,
TPM_ALG_ID hashAlg)
This command starts a hash or an Event Sequence.
|
TPM_HANDLE |
Tpm.HMAC_Start(TPM_HANDLE handle,
byte[] auth,
TPM_ALG_ID hashAlg)
This command starts an HMAC sequence.
|
static byte[] |
Crypto.hmac(TPM_ALG_ID alg,
byte[] key,
byte[] data)
hmac data
|
byte[] |
Tpm.HMAC(TPM_HANDLE handle,
byte[] buffer,
TPM_ALG_ID hashAlg)
This command performs an HMAC on the supplied data using the indicated hash algorithm.
|
TPM_ALG_ID[] |
Tpm.IncrementalSelfTest(TPM_ALG_ID[] toTest)
This command causes the TPM to perform a test of the selected algorithms.
|
static byte[] |
Crypto.KDFa(TPM_ALG_ID hmacHash,
byte[] hmacKey,
String label,
byte[] contextU,
byte[] contextV,
int numBitsRequired)
Perform the TPM key derivation procedure KDFa
|
TPM_HANDLE |
Tpm.MAC_Start(TPM_HANDLE handle,
byte[] auth,
TPM_ALG_ID inScheme)
This command starts a MAC sequence.
|
byte[] |
Tpm.MAC(TPM_HANDLE handle,
byte[] buffer,
TPM_ALG_ID inScheme)
This command performs an HMAC or a block cipher MAC on the supplied data using the indicated algorithm.
|
static byte[] |
Crypto.oaepEncrypt(TPMS_RSA_PARMS parms,
TPM2B_PUBLIC_KEY_RSA key,
byte[] data,
TPM_ALG_ID hashAlg,
String encodingLabel)
RSA encrypt using the OAEP encoding
|
void |
Tpm.PCR_SetAuthPolicy(TPM_HANDLE authHandle,
byte[] authPolicy,
TPM_ALG_ID hashAlg,
TPM_HANDLE pcrNum)
This command is used to associate a policy with a PCR or group of PCR.
|
void |
Tpm.SetCommandCodeAuditStatus(TPM_HANDLE auth,
TPM_ALG_ID auditAlg,
TPM_CC[] setList,
TPM_CC[] clearList)
This command may be used by the Privacy Administrator or platform to change the audit status of a command or to set the hash algorithm used for the audit digest, but not both at the same time.
|
void |
Tpm.SetPrimaryPolicy(TPM_HANDLE authHandle,
byte[] authPolicy,
TPM_ALG_ID hashAlg)
This command allows setting of the authorization policy for the lockout (lockoutPolicy), the platform hierarchy (platformPolicy), the storage hierarchy (ownerPolicy), and the endorsement hierarchy (endorsementPolicy).
|
StartAuthSessionResponse |
Tpm.StartAuthSession(TPM_HANDLE tpmKey,
TPM_HANDLE bind,
byte[] nonceCaller,
byte[] encryptedSalt,
TPM_SE sessionType,
TPMT_SYM_DEF symmetric,
TPM_ALG_ID authHash)
This command is used to start an authorization session using alternative methods of establishing the session key (sessionKey).
|
ZGen_2PhaseResponse |
Tpm.ZGen_2Phase(TPM_HANDLE keyA,
TPMS_ECC_POINT inQsB,
TPMS_ECC_POINT inQeB,
TPM_ALG_ID inScheme,
int counter)
This command supports two-phase key exchange protocols.
|
| Modifier and Type | Field and Description |
|---|---|
static TPM_ALG_ID |
TPM_ALG_ID.AES |
TPM_ALG_ID |
TPMS_ALG_PROPERTY.alg
an algorithm identifier
|
TPM_ALG_ID |
TPMS_ALGORITHM_DESCRIPTION.alg
an algorithm
|
TPM_ALG_ID |
TPMT_SYM_DEF_OBJECT.algorithm
symmetric algorithm
|
TPM_ALG_ID |
TPMT_SYM_DEF.algorithm
symmetric algorithm
|
TPM_ALG_ID[] |
TPML_ALG.algorithms
a list of algorithm IDs The maximum only applies to an algorithm list in a command.
|
static TPM_ALG_ID |
TPM_ALG_ID.ANY |
static TPM_ALG_ID |
TPM_ALG_ID.ANY2 |
TPM_ALG_ID |
TPM2_SetCommandCodeAuditStatus_REQUEST.auditAlg
hash algorithm for the audit digest; if TPM_ALG_NULL, then the hash is not changed
|
TPM_ALG_ID |
TPM2_StartAuthSession_REQUEST.authHash
hash algorithm to use for the session Shall be a hash algorithm supported by the TPM and not TPM_ALG_NULL
|
static TPM_ALG_ID |
TPM_ALG_ID.CAMELLIA |
static TPM_ALG_ID |
TPM_ALG_ID.CBC |
static TPM_ALG_ID |
TPM_ALG_ID.CFB |
static TPM_ALG_ID |
TPM_ALG_ID.CMAC |
static TPM_ALG_ID |
TPM_ALG_ID.CTR |
TPM_ALG_ID |
TPMS_COMMAND_AUDIT_INFO.digestAlg
hash algorithm used for the command audit
|
static TPM_ALG_ID |
TPM_ALG_ID.ECB |
static TPM_ALG_ID |
TPM_ALG_ID.ECC |
static TPM_ALG_ID |
TPM_ALG_ID.ECDAA |
static TPM_ALG_ID |
TPM_ALG_ID.ECDH |
static TPM_ALG_ID |
TPM_ALG_ID.ECDSA |
static TPM_ALG_ID |
TPM_ALG_ID.ECMQV |
static TPM_ALG_ID |
TPM_ALG_ID.ECSCHNORR |
static TPM_ALG_ID |
TPM_ALG_ID.ERROR |
static TPM_ALG_ID |
TPM_ALG_ID.FIRST |
TPM_ALG_ID |
TPMS_SIGNATURE_SM2.hash
the hash algorithm used in the signature process TPM_ALG_NULL is not allowed.
|
TPM_ALG_ID |
TPMS_SIGNATURE_RSASSA.hash
the hash algorithm used to digest the message TPM_ALG_NULL is not allowed.
|
TPM_ALG_ID |
TPMS_SIGNATURE_RSAPSS.hash
the hash algorithm used to digest the message TPM_ALG_NULL is not allowed.
|
TPM_ALG_ID |
TPMS_SIGNATURE_RSA.hash
the hash algorithm used to digest the message TPM_ALG_NULL is not allowed.
|
TPM_ALG_ID |
TPMS_SIGNATURE_ECSCHNORR.hash
the hash algorithm used in the signature process TPM_ALG_NULL is not allowed.
|
TPM_ALG_ID |
TPMS_SIGNATURE_ECDSA.hash
the hash algorithm used in the signature process TPM_ALG_NULL is not allowed.
|
TPM_ALG_ID |
TPMS_SIGNATURE_ECDAA.hash
the hash algorithm used in the signature process TPM_ALG_NULL is not allowed.
|
TPM_ALG_ID |
TPMS_SIGNATURE_ECC.hash
the hash algorithm used in the signature process TPM_ALG_NULL is not allowed.
|
TPM_ALG_ID |
TPMS_PCR_SELECTION.hash
the hash algorithm associated with the selection
|
TPM_ALG_ID |
TPMT_HA.hashAlg
Algorithm
|
TPM_ALG_ID |
TPMS_SIG_SCHEME_SM2.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SIG_SCHEME_RSASSA.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SIG_SCHEME_RSAPSS.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SIG_SCHEME_ECSCHNORR.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SIG_SCHEME_ECDSA.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SIG_SCHEME_ECDAA.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_XOR.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_SM2.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_RSASSA.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_RSAPSS.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_OAEP.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_MGF1.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_KDF2.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_KDF1_SP800_56A.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_KDF1_SP800_108.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_HMAC.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_HASH.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_ECSCHNORR.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_ECMQV.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_ECDSA.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_ECDH.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_SCHEME_ECDAA.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_KEY_SCHEME_ECMQV.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_KEY_SCHEME_ECDH.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPMS_ENC_SCHEME_OAEP.hashAlg
the hash algorithm used to digest the message
|
TPM_ALG_ID |
TPM2_SetPrimaryPolicy_REQUEST.hashAlg
the hash algorithm to use for the policy If the authPolicy is an Empty Buffer, then this field shall be TPM_ALG_NULL.
|
TPM_ALG_ID |
TPM2_PCR_SetAuthPolicy_REQUEST.hashAlg
the hash algorithm of the policy
|
TPM_ALG_ID |
TPM2_HMAC_Start_REQUEST.hashAlg
the hash algorithm to use for the HMAC
|
TPM_ALG_ID |
TPM2_HMAC_REQUEST.hashAlg
algorithm to use for HMAC
|
TPM_ALG_ID |
TPM2_Hash_REQUEST.hashAlg
algorithm for the hash being computed shall not be TPM_ALG_NULL
|
TPM_ALG_ID |
TPM2_HashSequenceStart_REQUEST.hashAlg
the hash algorithm to use for the hash sequence An Event Sequence starts if this is TPM_ALG_NULL.
|
static TPM_ALG_ID |
TPM_ALG_ID.HMAC |
TPM_ALG_ID |
TPM2_ZGen_2Phase_REQUEST.inScheme
the key exchange scheme
|
TPM_ALG_ID |
TPM2_MAC_Start_REQUEST.inScheme
the algorithm to use for the MAC
|
TPM_ALG_ID |
TPM2_MAC_REQUEST.inScheme
algorithm to use for MAC
|
TPM_ALG_ID |
TPMS_SCHEME_XOR.kdf
the key derivation function
|
static TPM_ALG_ID |
TPM_ALG_ID.KDF1_SP800_108 |
static TPM_ALG_ID |
TPM_ALG_ID.KDF1_SP800_56A |
static TPM_ALG_ID |
TPM_ALG_ID.KDF2 |
static TPM_ALG_ID |
TPM_ALG_ID.KEYEDHASH |
static TPM_ALG_ID |
TPM_ALG_ID.LAST |
static TPM_ALG_ID |
TPM_ALG_ID.MGF1 |
TPM_ALG_ID |
TPMT_SYM_DEF_OBJECT.mode
encryption mode
|
TPM_ALG_ID |
TPMT_SYM_DEF.mode
encryption mode
|
TPM_ALG_ID |
TPM2_EncryptDecrypt_REQUEST.mode
symmetric encryption/decryption mode this field shall match the default mode of the key or be TPM_ALG_NULL.
|
TPM_ALG_ID |
TPM2_EncryptDecrypt2_REQUEST.mode
symmetric mode this field shall match the default mode of the key or be TPM_ALG_NULL.
|
TPM_ALG_ID |
TPMT_PUBLIC.nameAlg
algorithm used for computing the Name of the object NOTE The "+" indicates that the instance of a TPMT_PUBLIC may have a "+" to indicate that the nameAlg may be TPM_ALG_NULL.
|
TPM_ALG_ID |
TPMS_NV_PUBLIC.nameAlg
hash algorithm used to compute the name of the Index and used for the authPolicy.
|
static TPM_ALG_ID |
TPM_ALG_ID.NULL |
static TPM_ALG_ID |
TPM_ALG_ID.OAEP |
static TPM_ALG_ID |
TPM_ALG_ID.OFB |
TPM_ALG_ID |
TPMS_CREATION_DATA.parentNameAlg
nameAlg of the parent
|
static TPM_ALG_ID |
TPM_ALG_ID.RSA |
static TPM_ALG_ID |
TPM_ALG_ID.RSAES |
static TPM_ALG_ID |
TPM_ALG_ID.RSAPSS |
static TPM_ALG_ID |
TPM_ALG_ID.RSASSA |
static TPM_ALG_ID |
TPM_ALG_ID.SHA |
static TPM_ALG_ID |
TPM_ALG_ID.SHA1 |
static TPM_ALG_ID |
TPM_ALG_ID.SHA256 |
static TPM_ALG_ID |
TPM_ALG_ID.SHA384 |
static TPM_ALG_ID |
TPM_ALG_ID.SHA512 |
static TPM_ALG_ID |
TPM_ALG_ID.SM2 |
static TPM_ALG_ID |
TPM_ALG_ID.SM3_256 |
static TPM_ALG_ID |
TPM_ALG_ID.SM4 |
static TPM_ALG_ID |
TPM_ALG_ID.SYMCIPHER |
static TPM_ALG_ID |
TPM_ALG_ID.TDES |
TPM_ALG_ID[] |
IncrementalSelfTestResponse.toDoList
list of algorithms that need testing
|
TPM_ALG_ID[] |
TPM2_IncrementalSelfTest_REQUEST.toTest
list of algorithms that should be tested
|
static TPM_ALG_ID |
TPM_ALG_ID.XOR |
| Modifier and Type | Method and Description |
|---|---|
static TPM_ALG_ID |
TPM_ALG_ID.fromInt(int value) |
static TPM_ALG_ID |
TPM_ALG_ID.fromTpm(byte[] buf) |
static TPM_ALG_ID |
TPM_ALG_ID.fromTpm(InByteBuf buf) |
| Modifier and Type | Method and Description |
|---|---|
static Collection<TPM_ALG_ID> |
TPM_ALG_ID.values() |
| Modifier and Type | Method and Description |
|---|---|
static TPMS_PCR_SELECTION[] |
TPMS_PCR_SELECTION.CreateSelectionArray(TPM_ALG_ID pcrAlg,
int pcrIndex)
Create a PCR_SELECTION[] from a single PCR
|
static TPMT_HA |
TPMT_HA.fromHashOf(TPM_ALG_ID hashAlg,
byte[] data)
Create a TPMT_HA from the hash of data
|
static TPMT_HA |
TPMT_HA.fromHashOf(TPM_ALG_ID hashAlg,
String s)
Create a TPMT_HA from the hash of a UTF8 encoded string
|
static TPMT_HA |
TPMT_HA.zeroHash(TPM_ALG_ID alg)
Create an all zero hash object
|
| Constructor and Description |
|---|
IncrementalSelfTestResponse(TPM_ALG_ID[] _toDoList)
This command causes the TPM to perform a test of the selected algorithms.
|
TPM2_EncryptDecrypt_REQUEST(TPM_HANDLE _keyHandle,
byte _decrypt,
TPM_ALG_ID _mode,
byte[] _ivIn,
byte[] _inData)
NOTE 1 This command is deprecated, and TPM2_EncryptDecrypt2() is preferred.
|
TPM2_EncryptDecrypt2_REQUEST(TPM_HANDLE _keyHandle,
byte[] _inData,
byte _decrypt,
TPM_ALG_ID _mode,
byte[] _ivIn)
This command is identical to TPM2_EncryptDecrypt(), except that the inData parameter is the first parameter.
|
TPM2_Hash_REQUEST(byte[] _data,
TPM_ALG_ID _hashAlg,
TPM_HANDLE _hierarchy)
This command performs a hash operation on a data buffer and returns the results.
|
TPM2_HashSequenceStart_REQUEST(byte[] _auth,
TPM_ALG_ID _hashAlg)
This command starts a hash or an Event Sequence.
|
TPM2_HMAC_REQUEST(TPM_HANDLE _handle,
byte[] _buffer,
TPM_ALG_ID _hashAlg)
This command performs an HMAC on the supplied data using the indicated hash algorithm.
|
TPM2_HMAC_Start_REQUEST(TPM_HANDLE _handle,
byte[] _auth,
TPM_ALG_ID _hashAlg)
This command starts an HMAC sequence.
|
TPM2_IncrementalSelfTest_REQUEST(TPM_ALG_ID[] _toTest)
This command causes the TPM to perform a test of the selected algorithms.
|
TPM2_MAC_REQUEST(TPM_HANDLE _handle,
byte[] _buffer,
TPM_ALG_ID _inScheme)
This command performs an HMAC or a block cipher MAC on the supplied data using the indicated algorithm.
|
TPM2_MAC_Start_REQUEST(TPM_HANDLE _handle,
byte[] _auth,
TPM_ALG_ID _inScheme)
This command starts a MAC sequence.
|
TPM2_PCR_SetAuthPolicy_REQUEST(TPM_HANDLE _authHandle,
byte[] _authPolicy,
TPM_ALG_ID _hashAlg,
TPM_HANDLE _pcrNum)
This command is used to associate a policy with a PCR or group of PCR.
|
TPM2_SetCommandCodeAuditStatus_REQUEST(TPM_HANDLE _auth,
TPM_ALG_ID _auditAlg,
TPM_CC[] _setList,
TPM_CC[] _clearList)
This command may be used by the Privacy Administrator or platform to change the audit status of a command or to set the hash algorithm used for the audit digest, but not both at the same time.
|
TPM2_SetPrimaryPolicy_REQUEST(TPM_HANDLE _authHandle,
byte[] _authPolicy,
TPM_ALG_ID _hashAlg)
This command allows setting of the authorization policy for the lockout (lockoutPolicy), the platform hierarchy (platformPolicy), the storage hierarchy (ownerPolicy), and the endorsement hierarchy (endorsementPolicy).
|
TPM2_StartAuthSession_REQUEST(TPM_HANDLE _tpmKey,
TPM_HANDLE _bind,
byte[] _nonceCaller,
byte[] _encryptedSalt,
TPM_SE _sessionType,
TPMT_SYM_DEF _symmetric,
TPM_ALG_ID _authHash)
This command is used to start an authorization session using alternative methods of establishing the session key (sessionKey).
|
TPM2_ZGen_2Phase_REQUEST(TPM_HANDLE _keyA,
TPMS_ECC_POINT _inQsB,
TPMS_ECC_POINT _inQeB,
TPM_ALG_ID _inScheme,
int _counter)
This command supports two-phase key exchange protocols.
|
TPML_ALG(TPM_ALG_ID[] _algorithms)
This list is returned by TPM2_IncrementalSelfTest().
|
TPMS_ALG_PROPERTY(TPM_ALG_ID _alg,
TPMA_ALGORITHM _algProperties)
This structure is used to report the properties of an algorithm identifier.
|
TPMS_ALGORITHM_DESCRIPTION(TPM_ALG_ID _alg,
TPMA_ALGORITHM _attributes)
This structure is a return value for a TPM2_GetCapability() that reads the installed algorithms.
|
TPMS_COMMAND_AUDIT_INFO(long _auditCounter,
TPM_ALG_ID _digestAlg,
byte[] _auditDigest,
byte[] _commandDigest)
This is the attested data for TPM2_GetCommandAuditDigest().
|
TPMS_CREATION_DATA(TPMS_PCR_SELECTION[] _pcrSelect,
byte[] _pcrDigest,
TPMA_LOCALITY _locality,
TPM_ALG_ID _parentNameAlg,
byte[] _parentName,
byte[] _parentQualifiedName,
byte[] _outsideInfo)
This structure provides information relating to the creation environment for the object.
|
TPMS_ENC_SCHEME_OAEP(TPM_ALG_ID _hashAlg)
These are the RSA encryption schemes that only need a hash algorithm as a controlling parameter.
|
TPMS_KEY_SCHEME_ECDH(TPM_ALG_ID _hashAlg)
These are the ECC schemes that only need a hash algorithm as a controlling parameter.
|
TPMS_KEY_SCHEME_ECMQV(TPM_ALG_ID _hashAlg)
These are the ECC schemes that only need a hash algorithm as a controlling parameter.
|
TPMS_NV_PUBLIC(TPM_HANDLE _nvIndex,
TPM_ALG_ID _nameAlg,
TPMA_NV _attributes,
byte[] _authPolicy,
int _dataSize)
This structure describes an NV Index.
|
TPMS_PCR_SELECTION(TPM_ALG_ID _hash,
byte[] _pcrSelect)
Table 87 Definition of TPMS_PCR_SELECTION Structure
|
TPMS_PCR_SELECTION(TPM_ALG_ID pcrAlg,
int pcrIndex)
Create a PCR_SELECTION naming a single PCR
|
TPMS_PCR_SELECTION(TPM_ALG_ID pcrAlg,
int[] pcrIndices)
Create a PCR_SELECTION from an array of PCRs in the same bank
|
TPMS_SCHEME_ECDAA(TPM_ALG_ID _hashAlg,
int _count)
This definition is for split signing schemes that require a commit count.
|
TPMS_SCHEME_ECDH(TPM_ALG_ID _hashAlg)
Underlying type comment: These are the ECC schemes that only need a hash algorithm as a controlling parameter.
|
TPMS_SCHEME_ECDSA(TPM_ALG_ID _hashAlg)
Underlying type comment: Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
TPMS_SCHEME_ECMQV(TPM_ALG_ID _hashAlg)
Underlying type comment: These are the ECC schemes that only need a hash algorithm as a controlling parameter.
|
TPMS_SCHEME_ECSCHNORR(TPM_ALG_ID _hashAlg)
Underlying type comment: Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
TPMS_SCHEME_HASH(TPM_ALG_ID _hashAlg)
This structure is the scheme data for schemes that only require a hash to complete their definition.
|
TPMS_SCHEME_HMAC(TPM_ALG_ID _hashAlg)
Table 145 Definition of Types for HMAC_SIG_SCHEME
|
TPMS_SCHEME_KDF1_SP800_108(TPM_ALG_ID _hashAlg)
These structures are used to define the key derivation for symmetric secret sharing using asymmetric methods.
|
TPMS_SCHEME_KDF1_SP800_56A(TPM_ALG_ID _hashAlg)
These structures are used to define the key derivation for symmetric secret sharing using asymmetric methods.
|
TPMS_SCHEME_KDF2(TPM_ALG_ID _hashAlg)
These structures are used to define the key derivation for symmetric secret sharing using asymmetric methods.
|
TPMS_SCHEME_MGF1(TPM_ALG_ID _hashAlg)
These structures are used to define the key derivation for symmetric secret sharing using asymmetric methods.
|
TPMS_SCHEME_OAEP(TPM_ALG_ID _hashAlg)
Underlying type comment: These are the RSA encryption schemes that only need a hash algorithm as a controlling parameter.
|
TPMS_SCHEME_RSAPSS(TPM_ALG_ID _hashAlg)
Underlying type comment: These are the RSA schemes that only need a hash algorithm as a scheme parameter.
|
TPMS_SCHEME_RSASSA(TPM_ALG_ID _hashAlg)
Underlying type comment: These are the RSA schemes that only need a hash algorithm as a scheme parameter.
|
TPMS_SCHEME_SM2(TPM_ALG_ID _hashAlg)
Underlying type comment: Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
TPMS_SCHEME_XOR(TPM_ALG_ID _hashAlg,
TPM_ALG_ID _kdf)
This structure is for the XOR encryption scheme.
|
TPMS_SIG_SCHEME_ECDAA(TPM_ALG_ID _hashAlg,
int _count)
Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
TPMS_SIG_SCHEME_ECDSA(TPM_ALG_ID _hashAlg)
Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
TPMS_SIG_SCHEME_ECSCHNORR(TPM_ALG_ID _hashAlg)
Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
TPMS_SIG_SCHEME_RSAPSS(TPM_ALG_ID _hashAlg)
These are the RSA schemes that only need a hash algorithm as a scheme parameter.
|
TPMS_SIG_SCHEME_RSASSA(TPM_ALG_ID _hashAlg)
These are the RSA schemes that only need a hash algorithm as a scheme parameter.
|
TPMS_SIG_SCHEME_SM2(TPM_ALG_ID _hashAlg)
Most of the ECC signature schemes only require a hash algorithm to complete the definition and can be typed as TPMS_SCHEME_HASH.
|
TPMS_SIGNATURE_ECC(TPM_ALG_ID _hash,
byte[] _signatureR,
byte[] _signatureS)
Table 177 Definition of {ECC} TPMS_SIGNATURE_ECC Structure
|
TPMS_SIGNATURE_ECDAA(TPM_ALG_ID _hash,
byte[] _signatureR,
byte[] _signatureS)
Table 177 Definition of {ECC} TPMS_SIGNATURE_ECC Structure
|
TPMS_SIGNATURE_ECDSA(TPM_ALG_ID _hash,
byte[] _signatureR,
byte[] _signatureS)
Table 177 Definition of {ECC} TPMS_SIGNATURE_ECC Structure
|
TPMS_SIGNATURE_ECSCHNORR(TPM_ALG_ID _hash,
byte[] _signatureR,
byte[] _signatureS)
Table 177 Definition of {ECC} TPMS_SIGNATURE_ECC Structure
|
TPMS_SIGNATURE_RSA(TPM_ALG_ID _hash,
byte[] _sig)
Table 175 Definition of {RSA} TPMS_SIGNATURE_RSA Structure
|
TPMS_SIGNATURE_RSAPSS(TPM_ALG_ID _hash,
byte[] _sig)
Table 175 Definition of {RSA} TPMS_SIGNATURE_RSA Structure
|
TPMS_SIGNATURE_RSASSA(TPM_ALG_ID _hash,
byte[] _sig)
Table 175 Definition of {RSA} TPMS_SIGNATURE_RSA Structure
|
TPMS_SIGNATURE_SM2(TPM_ALG_ID _hash,
byte[] _signatureR,
byte[] _signatureS)
Table 177 Definition of {ECC} TPMS_SIGNATURE_ECC Structure
|
TPMT_HA(TPM_ALG_ID _hashAlg,
byte[] _digest)
TPM Hash structure
|
TPMT_PUBLIC(TPM_ALG_ID _nameAlg,
TPMA_OBJECT _objectAttributes,
byte[] _authPolicy,
TPMU_PUBLIC_PARMS _parameters,
TPMU_PUBLIC_ID _unique)
Table 191 defines the public area structure.
|
TPMT_SYM_DEF_OBJECT(TPM_ALG_ID _algorithm,
int _keyBits,
TPM_ALG_ID _mode)
This structure is used when different symmetric block cipher (not XOR) algorithms may be selected.
|
TPMT_SYM_DEF(TPM_ALG_ID _algorithm,
int _keyBits,
TPM_ALG_ID _mode)
The TPMT_SYM_DEF structure is used to select an algorithm to be used for parameter encryption in those cases when different symmetric algorithms may be selected.
|
Copyright © 2017. All rights reserved.