| /mbedtls/scripts/mbedtls_dev/ |
| A D | psa_storage.py | 108 usage: Exprable, alg: Exprable, alg2: Exprable, 118 self.alg2 = as_expr(alg2) #type: Expr 157 self.usage, self.alg, self.alg2) 183 usage=0x00000300, alg=0x05500200, alg2=0x04c01000, 194 usage=0, alg=0, alg2=0, 202 usage=0, alg=0, alg2=0,
|
| /mbedtls/programs/ssl/ |
| A D | ssl_test_lib.c | 184 int key_opaque_alg_parse(const char *arg, const char **alg1, const char **alg2) in key_opaque_alg_parse() argument 193 *alg2 = separator + 1; in key_opaque_alg_parse() 206 if (strcmp(*alg2, "rsa-sign-pkcs1") != 0 && in key_opaque_alg_parse() 207 strcmp(*alg2, "rsa-sign-pss") != 0 && in key_opaque_alg_parse() 211 strcmp(*alg2, "rsa-decrypt") != 0 && in key_opaque_alg_parse() 212 strcmp(*alg2, "ecdsa-sign") != 0 && in key_opaque_alg_parse() 213 strcmp(*alg2, "ecdh") != 0 && in key_opaque_alg_parse() 214 strcmp(*alg2, "none") != 0) { in key_opaque_alg_parse() 222 int key_opaque_set_alg_usage(const char *alg1, const char *alg2, in key_opaque_set_alg_usage() argument 229 const char *algs[] = { alg1, alg2 }; in key_opaque_set_alg_usage()
|
| A D | ssl_test_lib.h | 215 int key_opaque_alg_parse(const char *arg, const char **alg1, const char **alg2); 233 int key_opaque_set_alg_usage(const char *alg1, const char *alg2,
|
| /mbedtls/tests/scripts/ |
| A D | generate_psa_tests.py | 496 key.alg.string, key.alg2.string, 515 key.alg.string, key.alg2.string, 534 usage=['PSA_KEY_USAGE_EXPORT'], alg=0, alg2=0, 567 usage=usage_flags, alg=0, alg2=0, 607 alg2 = 0 618 usage=usage_flags, alg=alg1, alg2=alg2, 662 usage=usage, alg=alg, alg2=0, 669 usage=usage, alg=0, alg2=alg, 734 alg2 = 0 747 alg=alg, alg2=alg2,
|
| /mbedtls/include/psa/ |
| A D | crypto_extra.h | 60 psa_algorithm_t alg2) in psa_set_key_enrollment_algorithm() argument 62 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg2) = alg2; in psa_set_key_enrollment_algorithm() 74 return attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg2); in psa_get_key_enrollment_algorithm()
|
| A D | crypto_struct.h | 245 psa_algorithm_t MBEDTLS_PRIVATE(alg2);
|
| /mbedtls/tests/suites/ |
| A D | test_suite_psa_crypto_storage_format.current.data | 8843 save alg2: CCM 8859 save alg2: CFB 8875 save alg2: CMAC 8883 save alg2: CTR 9171 save alg2: ECDH 9299 save alg2: FFDH 9307 save alg2: GCM 9667 save alg2: JPAKE 9779 save alg2: MD5 9787 save alg2: OFB [all …]
|
| A D | test_suite_psa_crypto_storage_format.v0.data | 8931 read alg2: CCM 8947 read alg2: CFB 8963 read alg2: CMAC 8971 read alg2: CTR 9259 read alg2: ECDH 9387 read alg2: FFDH 9395 read alg2: GCM 9755 read alg2: JPAKE 9867 read alg2: MD5 9875 read alg2: OFB [all …]
|
| A D | test_suite_psa_crypto_storage_format.function | 236 psa_algorithm_t alg2 = alg2_arg; 250 psa_set_key_enrollment_algorithm(&attributes, alg2); 280 psa_algorithm_t alg2 = alg2_arg; 294 psa_set_key_enrollment_algorithm(&attributes, alg2);
|
| A D | test_suite_psa_crypto_slot_management.function | 200 psa_algorithm_t alg2 = alg2_arg; 227 psa_set_key_enrollment_algorithm(&attributes, alg2); 244 TEST_EQUAL(psa_get_key_enrollment_algorithm(&attributes), alg2); 264 TEST_EQUAL(psa_get_key_enrollment_algorithm(&attributes), alg2);
|
| A D | test_suite_psa_crypto.function | 2705 psa_algorithm_t alg2 = alg2_arg; 2711 psa_set_key_enrollment_algorithm(&attributes, alg2); 2721 TEST_EQUAL(psa_get_key_enrollment_algorithm(&got_attributes), alg2); 2726 if (!mbedtls_test_psa_exercise_key(key, usage, alg2, 0)) {
|
| /mbedtls/library/ |
| A D | psa_crypto_storage.c | 252 MBEDTLS_PUT_UINT32_LE(attr->policy.alg2, storage_format->policy, 2 * sizeof(uint32_t)); in psa_format_key_data_for_storage() 312 attr->policy.alg2 = MBEDTLS_GET_UINT32_LE(storage_format->policy, 2 * sizeof(uint32_t)); in psa_parse_key_data_from_storage()
|
| A D | psa_crypto.c | 815 psa_algorithm_t alg2) in psa_key_policy_algorithm_intersection() argument 818 if (alg1 == alg2) { in psa_key_policy_algorithm_intersection() 824 PSA_ALG_IS_SIGN_HASH(alg2) && in psa_key_policy_algorithm_intersection() 827 return alg2; in psa_key_policy_algorithm_intersection() 838 PSA_ALG_AEAD_WITH_SHORTENED_TAG(alg2, 0))) { in psa_key_policy_algorithm_intersection() 852 return alg2; in psa_key_policy_algorithm_intersection() 862 if (PSA_ALG_IS_MAC(alg1) && PSA_ALG_IS_MAC(alg2) && in psa_key_policy_algorithm_intersection() 864 PSA_ALG_FULL_LENGTH_MAC(alg2))) { in psa_key_policy_algorithm_intersection() 893 return (alg1_len <= alg2_len) ? alg2 : 0; in psa_key_policy_algorithm_intersection() 1063 if (intersection_alg2 == 0 && policy->alg2 != 0 && constraint->alg2 != 0) { in psa_restrict_key_policy() [all …]
|