/optee_os/scripts/ |
A D | sign_helper_kms.py | 46 algorithm: typing.Union[asym_utils.Prehashed, 49 if isinstance(algorithm, asym_utils.Prehashed): 61 if (isinstance(algorithm._algorithm, hashes.SHA256) or 62 isinstance(algorithm, hashes.SHA256)): 64 elif (isinstance(algorithm._algorithm, hashes.SHA384) or 65 isinstance(algorithm, hashes.SHA384)): 67 elif (isinstance(algorithm._algorithm, hashes.SHA512) or 68 isinstance(algorithm, hashes.SHA512)): 82 self, padding: AsymmetricPadding, algorithm: hashes.HashAlgorithm
|
/optee_os/core/lib/libtomcrypt/src/pk/asn1/x509/ |
A D | x509_decode_public_key_from_certificate.c | 33 enum ltc_oid_id algorithm, ltc_asn1_type param_type, in x509_decode_public_key_from_certificate() argument 84 if (algorithm == LTC_OID_EC) { in x509_decode_public_key_from_certificate() 88 algorithm, tmpbuf, &tmpbuf_len, in x509_decode_public_key_from_certificate()
|
A D | x509_encode_subject_public_key_info.c | 35 unsigned int algorithm, const void* public_key, unsigned long public_key_len, in x509_encode_subject_public_key_info() argument 46 if ((err = pk_get_oid(algorithm, &OID)) != CRYPT_OK) { in x509_encode_subject_public_key_info()
|
A D | x509_decode_subject_public_key_info.c | 35 unsigned int algorithm, void* public_key, unsigned long* public_key_len, in x509_decode_subject_public_key_info() argument 60 err = pk_get_oid(algorithm, &oid); in x509_decode_subject_public_key_info()
|
/optee_os/lib/libmbedtls/mbedtls/include/psa/ |
A D | crypto_extra.h | 950 psa_algorithm_t algorithm); 1719 psa_algorithm_t algorithm; member 1729 return cipher_suite->algorithm; in psa_pake_cs_get_algorithm() 1734 psa_algorithm_t algorithm) in psa_pake_cs_set_algorithm() argument 1736 if (!PSA_ALG_IS_PAKE(algorithm)) { in psa_pake_cs_set_algorithm() 1737 cipher_suite->algorithm = 0; in psa_pake_cs_set_algorithm() 1739 cipher_suite->algorithm = algorithm; in psa_pake_cs_set_algorithm()
|
A D | crypto_se_driver.h | 176 psa_algorithm_t algorithm); 382 psa_algorithm_t algorithm, 481 psa_algorithm_t algorithm, 726 psa_algorithm_t algorithm, 768 psa_algorithm_t algorithm,
|
/optee_os/lib/libutee/ |
A D | tee_api_operations.c | 39 uint32_t algorithm, uint32_t mode, in TEE_AllocateOperation() argument 53 if (algorithm == TEE_ALG_AES_XTS || algorithm == TEE_ALG_SM2_KEP || in TEE_AllocateOperation() 54 algorithm == TEE_ALG_SM4_XTS) in TEE_AllocateOperation() 58 switch (algorithm) { in TEE_AllocateOperation() 136 switch (algorithm) { in TEE_AllocateOperation() 317 op->info.algorithm = algorithm; in TEE_AllocateOperation() 320 if (algorithm == TEE_ALG_RSASSA_PKCS1_V1_5) in TEE_AllocateOperation() 532 op_info->algorithm = op->info.algorithm; in TEE_GetOperationInfoMultiple() 825 if (dst_op->info.algorithm != src_op->info.algorithm) in TEE_CopyOperation() 1598 if (operation->info.algorithm == TEE_ALG_AES_GCM) { in TEE_AEInit() [all …]
|
/optee_os/lib/libutee/include/ |
A D | tee_api_types.h | 153 uint32_t algorithm; member 169 uint32_t algorithm; member
|
A D | tee_internal_api.h | 294 uint32_t algorithm, uint32_t mode,
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | psa_crypto_invasive.h | 73 psa_algorithm_t algorithm,
|
A D | ssl_tls13_generic.c | 231 uint16_t algorithm; in ssl_tls13_parse_certificate_verify() local 251 algorithm = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_certificate_verify() 270 if (!mbedtls_ssl_sig_alg_is_offered(ssl, algorithm)) { in ssl_tls13_parse_certificate_verify() 274 (unsigned int) algorithm)); in ssl_tls13_parse_certificate_verify() 279 algorithm, &sig_alg, &md_alg) != 0) { in ssl_tls13_parse_certificate_verify() 289 (unsigned int) algorithm)); in ssl_tls13_parse_certificate_verify()
|
A D | psa_crypto_pake.c | 221 operation->alg = cipher_suite.algorithm; in mbedtls_psa_pake_setup() 224 if (cipher_suite.algorithm == PSA_ALG_JPAKE) { in mbedtls_psa_pake_setup()
|
A D | psa_crypto.c | 680 psa_algorithm_t algorithm, in psa_mac_key_can_do() argument 683 if (PSA_ALG_IS_HMAC(algorithm)) { in psa_mac_key_can_do() 689 if (PSA_ALG_IS_BLOCK_CIPHER_MAC(algorithm)) { in psa_mac_key_can_do() 8456 if (inputs->cipher_suite.algorithm == PSA_ALG_NONE) { in psa_crypto_driver_pake_get_cipher_suite() 8476 if (PSA_ALG_IS_PAKE(cipher_suite->algorithm) == 0 || in psa_pake_setup() 8484 operation->alg = cipher_suite->algorithm; in psa_pake_setup()
|
/optee_os/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_private.h | 454 enum ltc_oid_id algorithm, ltc_asn1_type param_type, 460 unsigned int algorithm, const void* public_key, unsigned long public_key_len, 464 unsigned int algorithm, void* public_key, unsigned long* public_key_len,
|
/optee_os/ta/pkcs11/src/ |
A D | processing_ec.c | 850 switch (info.algorithm) { in ecdsa_get_input_max_byte_size() 862 DMSG("Unexpected ECDSA algorithm %#"PRIx32, info.algorithm); in ecdsa_get_input_max_byte_size()
|
/optee_os/lib/libutils/isoc/ |
A D | bget.doc | 43 The basic algorithm underlying BGET has withstood the test of time; more 330 #define BestFit 1 /* Use a best fit algorithm when
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 423 primary algorithm of the wrapped PSA key. 558 * Add support for the FFDH algorithm and DH key types in PSA, with 715 symmetric encryption algorithm and the PSA configuration enabled. 803 - Only a single digest algorithm per message is supported. 1717 enabling the SHA512 algorithm. Fixes #4034. 1788 specified hash algorithm. 2261 agreement algorithm in use matches the algorithm the key was declared with. 2787 unsupported algorithm. Fixes ARMmbed/mbed-crypto#254. 4087 * Fix insufficient support for signature-hash-algorithm extension, 5666 * Added blowfish algorithm (Generic and cipher layer) [all …]
|
A D | README.md | 288 * The interface to algorithms is generic, favoring algorithm agility.
|
/optee_os/ |
A D | CHANGELOG.md | 1003 * crypto: do not restrict hash size when algorithm is ECDSA ([#1497]) 1385 * Fix incorrect algorithm passed to cipher.final()
|