TPM_NONCE_SIZE 39 crypto/asymmetric_keys/asym_tpm.c unsigned char nonceodd[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 40 crypto/asymmetric_keys/asym_tpm.c unsigned char enonce[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 57 crypto/asymmetric_keys/asym_tpm.c ret = tpm_get_random(NULL, nonceodd, TPM_NONCE_SIZE); TPM_NONCE_SIZE 78 crypto/asymmetric_keys/asym_tpm.c storebytes(tb, nonceodd, TPM_NONCE_SIZE); TPM_NONCE_SIZE 123 crypto/asymmetric_keys/asym_tpm.c unsigned char nonceodd[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 124 crypto/asymmetric_keys/asym_tpm.c unsigned char enonce[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 143 crypto/asymmetric_keys/asym_tpm.c ret = tpm_get_random(NULL, nonceodd, TPM_NONCE_SIZE); TPM_NONCE_SIZE 166 crypto/asymmetric_keys/asym_tpm.c storebytes(tb, nonceodd, TPM_NONCE_SIZE); TPM_NONCE_SIZE 209 crypto/asymmetric_keys/asym_tpm.c unsigned char nonceodd[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 210 crypto/asymmetric_keys/asym_tpm.c unsigned char enonce[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 229 crypto/asymmetric_keys/asym_tpm.c ret = tpm_get_random(NULL, nonceodd, TPM_NONCE_SIZE); TPM_NONCE_SIZE 252 crypto/asymmetric_keys/asym_tpm.c storebytes(tb, nonceodd, TPM_NONCE_SIZE); TPM_NONCE_SIZE 30 include/keys/trusted.h unsigned char enonce[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 166 security/keys/trusted.c paramdigest, TPM_NONCE_SIZE, h1, TPM_NONCE_SIZE 167 security/keys/trusted.c TPM_NONCE_SIZE, h2, 1, &c, 0, 0); TPM_NONCE_SIZE 211 security/keys/trusted.c enonce = continueflag - TPM_NONCE_SIZE; TPM_NONCE_SIZE 246 security/keys/trusted.c TPM_NONCE_SIZE, enonce, TPM_NONCE_SIZE, ononce, TPM_NONCE_SIZE 303 security/keys/trusted.c enonce1 = continueflag1 - TPM_NONCE_SIZE; TPM_NONCE_SIZE 304 security/keys/trusted.c enonce2 = continueflag2 - TPM_NONCE_SIZE; TPM_NONCE_SIZE 340 security/keys/trusted.c paramdigest, TPM_NONCE_SIZE, enonce1, TPM_NONCE_SIZE 341 security/keys/trusted.c TPM_NONCE_SIZE, ononce, 1, continueflag1, 0, 0); TPM_NONCE_SIZE 349 security/keys/trusted.c paramdigest, TPM_NONCE_SIZE, enonce2, TPM_NONCE_SIZE 350 security/keys/trusted.c TPM_NONCE_SIZE, ononce, 1, continueflag2, 0, 0); TPM_NONCE_SIZE 401 security/keys/trusted.c unsigned char enonce[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 402 security/keys/trusted.c unsigned char ononce[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 405 security/keys/trusted.c ret = tpm_get_random(chip, ononce, TPM_NONCE_SIZE); TPM_NONCE_SIZE 406 security/keys/trusted.c if (ret != TPM_NONCE_SIZE) TPM_NONCE_SIZE 415 security/keys/trusted.c storebytes(tb, ononce, TPM_NONCE_SIZE); TPM_NONCE_SIZE 423 security/keys/trusted.c TPM_NONCE_SIZE); TPM_NONCE_SIZE 425 security/keys/trusted.c TPM_NONCE_SIZE]), TPM_NONCE_SIZE); TPM_NONCE_SIZE 426 security/keys/trusted.c return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, TPM_NONCE_SIZE 427 security/keys/trusted.c enonce, TPM_NONCE_SIZE, ononce, 0, 0); TPM_NONCE_SIZE 450 security/keys/trusted.c TPM_NONCE_SIZE); TPM_NONCE_SIZE 460 security/keys/trusted.c unsigned char nonceodd[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 504 security/keys/trusted.c ret = tpm_get_random(chip, td->nonceodd, TPM_NONCE_SIZE); TPM_NONCE_SIZE 505 security/keys/trusted.c if (ret != TPM_NONCE_SIZE) TPM_NONCE_SIZE 549 security/keys/trusted.c storebytes(tb, td->nonceodd, TPM_NONCE_SIZE); TPM_NONCE_SIZE 588 security/keys/trusted.c unsigned char nonceodd[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 589 security/keys/trusted.c unsigned char enonce1[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 590 security/keys/trusted.c unsigned char enonce2[TPM_NONCE_SIZE]; TPM_NONCE_SIZE 614 security/keys/trusted.c ret = tpm_get_random(chip, nonceodd, TPM_NONCE_SIZE); TPM_NONCE_SIZE 615 security/keys/trusted.c if (ret != TPM_NONCE_SIZE) { TPM_NONCE_SIZE 619 security/keys/trusted.c ret = TSS_authhmac(authdata1, keyauth, TPM_NONCE_SIZE, TPM_NONCE_SIZE 624 security/keys/trusted.c ret = TSS_authhmac(authdata2, blobauth, TPM_NONCE_SIZE, TPM_NONCE_SIZE 638 security/keys/trusted.c storebytes(tb, nonceodd, TPM_NONCE_SIZE); TPM_NONCE_SIZE 642 security/keys/trusted.c storebytes(tb, nonceodd, TPM_NONCE_SIZE);