Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 13 of 13) sorted by relevance

/optee_os-3.20.0/scripts/
A Dsign_helper_kms.py46 algorithm: typing.Union[asym_utils.Prehashed,
49 if isinstance(algorithm, asym_utils.Prehashed):
61 if (isinstance(algorithm._algorithm, hashes.SHA256) or
62 isinstance(algorithm, hashes.SHA256)):
64 elif (isinstance(algorithm._algorithm, hashes.SHA384) or
65 isinstance(algorithm, hashes.SHA384)):
67 elif (isinstance(algorithm._algorithm, hashes.SHA512) or
68 isinstance(algorithm, hashes.SHA512)):
82 self, padding: AsymmetricPadding, algorithm: hashes.HashAlgorithm
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/asn1/x509/
A Dx509_decode_public_key_from_certificate.c33 enum ltc_oid_id algorithm, ltc_asn1_type param_type, in x509_decode_public_key_from_certificate() argument
84 if (algorithm == LTC_OID_EC) { in x509_decode_public_key_from_certificate()
88 algorithm, tmpbuf, &tmpbuf_len, in x509_decode_public_key_from_certificate()
A Dx509_encode_subject_public_key_info.c35 unsigned int algorithm, const void* public_key, unsigned long public_key_len, in x509_encode_subject_public_key_info() argument
46 if ((err = pk_get_oid(algorithm, &OID)) != CRYPT_OK) { in x509_encode_subject_public_key_info()
A Dx509_decode_subject_public_key_info.c35 unsigned int algorithm, void* public_key, unsigned long* public_key_len, in x509_decode_subject_public_key_info() argument
60 err = pk_get_oid(algorithm, &oid); in x509_decode_subject_public_key_info()
/optee_os-3.20.0/lib/libutee/
A Dtee_api_operations.c33 uint32_t algorithm, uint32_t mode, in TEE_AllocateOperation() argument
47 if (algorithm == TEE_ALG_AES_XTS || algorithm == TEE_ALG_SM2_KEP || in TEE_AllocateOperation()
48 algorithm == TEE_ALG_SM4_XTS) in TEE_AllocateOperation()
52 switch (algorithm) { in TEE_AllocateOperation()
119 switch (algorithm) { in TEE_AllocateOperation()
284 op->info.algorithm = algorithm; in TEE_AllocateOperation()
287 if (algorithm == TEE_ALG_RSASSA_PKCS1_V1_5) in TEE_AllocateOperation()
485 op_info->algorithm = op->info.algorithm; in TEE_GetOperationInfoMultiple()
729 if (dst_op->info.algorithm != src_op->info.algorithm) in TEE_CopyOperation()
951 if (op->info.algorithm == TEE_ALG_AES_CTS) in tee_buffer_update()
[all …]
/optee_os-3.20.0/lib/libutee/include/
A Dtee_api_types.h131 uint32_t algorithm; member
147 uint32_t algorithm; member
A Dtee_internal_api.h212 uint32_t algorithm, uint32_t mode,
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_private.h429 enum ltc_oid_id algorithm, ltc_asn1_type param_type,
435 unsigned int algorithm, const void* public_key, unsigned long public_key_len,
439 unsigned int algorithm, void* public_key, unsigned long* public_key_len,
/optee_os-3.20.0/ta/pkcs11/src/
A Dprocessing_ec.c833 switch (info.algorithm) { in ecdsa_get_input_max_byte_size()
845 DMSG("Unexpected ECDSA algorithm %#"PRIx32, info.algorithm); in ecdsa_get_input_max_byte_size()
/optee_os-3.20.0/lib/libutils/isoc/
A Dbget.doc43 The basic algorithm underlying BGET has withstood the test of time; more
330 #define BestFit 1 /* Use a best fit algorithm when
/optee_os-3.20.0/lib/libmbedtls/mbedtls/
A DChangeLog177 This algorithm now accepts only the same salt length for verification
178 that it produces when signing, as documented. Use the new algorithm
181 for algorithm values that fully encode the hashing step, as per the PSA
353 that PSA_ALG_RSA_PSS uses the same hash throughout the algorithm.)
373 the specified hash algorithm.
462 * In the PSA API, the policy for a MAC or AEAD algorithm can specify a
565 agreement algorithm in use matches the algorithm the key was declared with.
1091 unsupported algorithm. Fixes ARMmbed/mbed-crypto#254.
2391 * Fix insufficient support for signature-hash-algorithm extension,
3970 * Added blowfish algorithm (Generic and cipher layer)
[all …]
A DREADME.md222 * The interface to algorithms is generic, favoring algorithm agility.
/optee_os-3.20.0/
A DCHANGELOG.md763 * crypto: do not restrict hash size when algorithm is ECDSA ([#1497])
1145 * Fix incorrect algorithm passed to cipher.final()

Completed in 30 milliseconds