Lines Matching refs:data

530 	/* set the public key data in the TSS object */
551 BYTE *data;
560 capArea, 0, NULL, &datalen, &data)) != 0 || datalen == 0 ||
561 data == NULL) {
567 Tspi_Context_FreeMemory(hContext, data);
571 (void) memcpy(&tpmvinfo, (void *)data, datalen);
592 Tspi_Context_FreeMemory(hContext, data);
716 /* set the private key data in the TSS object */
1242 * auth data associated with the key to be stored in PS so
1323 * PINs are verified by attempting to bind/unbind random data using a
1344 /* Use some random data */
1356 /* unbind the junk data to test the key's auth data */
1827 * random data.
2076 * Wrap the 20 bytes of auth data and store in an attribute of the two
2101 /* create the encrypted data object */
2116 /* pull the encrypted data out of the encrypted data object */
2164 /* unbind the data, receiving the plaintext back */
2235 /* get a random SHA1 hash for the auth data */
2247 /* get a random SHA1 hash for the auth data */
2349 * A public key cannot use the OPAQUE data attribute so they
2351 * have its "opaque" data defined and needs to be created
2395 /* auth data may be required */
2480 /* push the data into the encrypted data object */
2489 * Figure out the modulus size so we can break the data
2515 /* unbind the data, receiving the plaintext back */
2590 /* Insert the data into the hash object */
2643 /* Insert the data into the hash object */
2694 * Figure out the modulus size so we can break the data
2708 * Max input data size varies depending on the key type and
2809 * already contains the data stream to be decrypted and is already
2864 /* use RSA_NO_PADDING because the data is already padded (PKCS1) */