Searched refs:algorithm (Results 1 – 13 of 13) sorted by relevance
/optee_os-3.20.0/scripts/ |
A D | sign_helper_kms.py | 46 algorithm: typing.Union[asym_utils.Prehashed, 49 if isinstance(algorithm, asym_utils.Prehashed): 61 if (isinstance(algorithm._algorithm, hashes.SHA256) or 62 isinstance(algorithm, hashes.SHA256)): 64 elif (isinstance(algorithm._algorithm, hashes.SHA384) or 65 isinstance(algorithm, hashes.SHA384)): 67 elif (isinstance(algorithm._algorithm, hashes.SHA512) or 68 isinstance(algorithm, hashes.SHA512)): 82 self, padding: AsymmetricPadding, algorithm: hashes.HashAlgorithm
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/asn1/x509/ |
A D | x509_decode_public_key_from_certificate.c | 33 enum ltc_oid_id algorithm, ltc_asn1_type param_type, in x509_decode_public_key_from_certificate() argument 84 if (algorithm == LTC_OID_EC) { in x509_decode_public_key_from_certificate() 88 algorithm, tmpbuf, &tmpbuf_len, in x509_decode_public_key_from_certificate()
|
A D | x509_encode_subject_public_key_info.c | 35 unsigned int algorithm, const void* public_key, unsigned long public_key_len, in x509_encode_subject_public_key_info() argument 46 if ((err = pk_get_oid(algorithm, &OID)) != CRYPT_OK) { in x509_encode_subject_public_key_info()
|
A D | x509_decode_subject_public_key_info.c | 35 unsigned int algorithm, void* public_key, unsigned long* public_key_len, in x509_decode_subject_public_key_info() argument 60 err = pk_get_oid(algorithm, &oid); in x509_decode_subject_public_key_info()
|
/optee_os-3.20.0/lib/libutee/ |
A D | tee_api_operations.c | 33 uint32_t algorithm, uint32_t mode, in TEE_AllocateOperation() argument 47 if (algorithm == TEE_ALG_AES_XTS || algorithm == TEE_ALG_SM2_KEP || in TEE_AllocateOperation() 48 algorithm == TEE_ALG_SM4_XTS) in TEE_AllocateOperation() 52 switch (algorithm) { in TEE_AllocateOperation() 119 switch (algorithm) { in TEE_AllocateOperation() 284 op->info.algorithm = algorithm; in TEE_AllocateOperation() 287 if (algorithm == TEE_ALG_RSASSA_PKCS1_V1_5) in TEE_AllocateOperation() 485 op_info->algorithm = op->info.algorithm; in TEE_GetOperationInfoMultiple() 729 if (dst_op->info.algorithm != src_op->info.algorithm) in TEE_CopyOperation() 951 if (op->info.algorithm == TEE_ALG_AES_CTS) in tee_buffer_update() [all …]
|
/optee_os-3.20.0/lib/libutee/include/ |
A D | tee_api_types.h | 131 uint32_t algorithm; member 147 uint32_t algorithm; member
|
A D | tee_internal_api.h | 212 uint32_t algorithm, uint32_t mode,
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_private.h | 429 enum ltc_oid_id algorithm, ltc_asn1_type param_type, 435 unsigned int algorithm, const void* public_key, unsigned long public_key_len, 439 unsigned int algorithm, void* public_key, unsigned long* public_key_len,
|
/optee_os-3.20.0/ta/pkcs11/src/ |
A D | processing_ec.c | 833 switch (info.algorithm) { in ecdsa_get_input_max_byte_size() 845 DMSG("Unexpected ECDSA algorithm %#"PRIx32, info.algorithm); in ecdsa_get_input_max_byte_size()
|
/optee_os-3.20.0/lib/libutils/isoc/ |
A D | bget.doc | 43 The basic algorithm underlying BGET has withstood the test of time; more 330 #define BestFit 1 /* Use a best fit algorithm when
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 177 This algorithm now accepts only the same salt length for verification 178 that it produces when signing, as documented. Use the new algorithm 181 for algorithm values that fully encode the hashing step, as per the PSA 353 that PSA_ALG_RSA_PSS uses the same hash throughout the algorithm.) 373 the specified hash algorithm. 462 * In the PSA API, the policy for a MAC or AEAD algorithm can specify a 565 agreement algorithm in use matches the algorithm the key was declared with. 1091 unsupported algorithm. Fixes ARMmbed/mbed-crypto#254. 2391 * Fix insufficient support for signature-hash-algorithm extension, 3970 * Added blowfish algorithm (Generic and cipher layer) [all …]
|
A D | README.md | 222 * The interface to algorithms is generic, favoring algorithm agility.
|
/optee_os-3.20.0/ |
A D | CHANGELOG.md | 763 * crypto: do not restrict hash size when algorithm is ECDSA ([#1497]) 1145 * Fix incorrect algorithm passed to cipher.final()
|
Completed in 22 milliseconds