Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 19 of 19) sorted by relevance

/optee_os/scripts/
A Dsign_helper_kms.py46 algorithm: typing.Union[asym_utils.Prehashed,
49 if isinstance(algorithm, asym_utils.Prehashed):
61 if (isinstance(algorithm._algorithm, hashes.SHA256) or
62 isinstance(algorithm, hashes.SHA256)):
64 elif (isinstance(algorithm._algorithm, hashes.SHA384) or
65 isinstance(algorithm, hashes.SHA384)):
67 elif (isinstance(algorithm._algorithm, hashes.SHA512) or
68 isinstance(algorithm, hashes.SHA512)):
82 self, padding: AsymmetricPadding, algorithm: hashes.HashAlgorithm
/optee_os/core/lib/libtomcrypt/src/pk/asn1/x509/
A Dx509_decode_public_key_from_certificate.c33 enum ltc_oid_id algorithm, ltc_asn1_type param_type, in x509_decode_public_key_from_certificate() argument
84 if (algorithm == LTC_OID_EC) { in x509_decode_public_key_from_certificate()
88 algorithm, tmpbuf, &tmpbuf_len, in x509_decode_public_key_from_certificate()
A Dx509_encode_subject_public_key_info.c35 unsigned int algorithm, const void* public_key, unsigned long public_key_len, in x509_encode_subject_public_key_info() argument
46 if ((err = pk_get_oid(algorithm, &OID)) != CRYPT_OK) { in x509_encode_subject_public_key_info()
A Dx509_decode_subject_public_key_info.c35 unsigned int algorithm, void* public_key, unsigned long* public_key_len, in x509_decode_subject_public_key_info() argument
60 err = pk_get_oid(algorithm, &oid); in x509_decode_subject_public_key_info()
/optee_os/lib/libmbedtls/mbedtls/include/psa/
A Dcrypto_extra.h950 psa_algorithm_t algorithm);
1719 psa_algorithm_t algorithm; member
1729 return cipher_suite->algorithm; in psa_pake_cs_get_algorithm()
1734 psa_algorithm_t algorithm) in psa_pake_cs_set_algorithm() argument
1736 if (!PSA_ALG_IS_PAKE(algorithm)) { in psa_pake_cs_set_algorithm()
1737 cipher_suite->algorithm = 0; in psa_pake_cs_set_algorithm()
1739 cipher_suite->algorithm = algorithm; in psa_pake_cs_set_algorithm()
A Dcrypto_se_driver.h176 psa_algorithm_t algorithm);
382 psa_algorithm_t algorithm,
481 psa_algorithm_t algorithm,
726 psa_algorithm_t algorithm,
768 psa_algorithm_t algorithm,
/optee_os/lib/libutee/
A Dtee_api_operations.c39 uint32_t algorithm, uint32_t mode, in TEE_AllocateOperation() argument
53 if (algorithm == TEE_ALG_AES_XTS || algorithm == TEE_ALG_SM2_KEP || in TEE_AllocateOperation()
54 algorithm == TEE_ALG_SM4_XTS) in TEE_AllocateOperation()
58 switch (algorithm) { in TEE_AllocateOperation()
136 switch (algorithm) { in TEE_AllocateOperation()
317 op->info.algorithm = algorithm; in TEE_AllocateOperation()
320 if (algorithm == TEE_ALG_RSASSA_PKCS1_V1_5) in TEE_AllocateOperation()
532 op_info->algorithm = op->info.algorithm; in TEE_GetOperationInfoMultiple()
825 if (dst_op->info.algorithm != src_op->info.algorithm) in TEE_CopyOperation()
1598 if (operation->info.algorithm == TEE_ALG_AES_GCM) { in TEE_AEInit()
[all …]
/optee_os/lib/libutee/include/
A Dtee_api_types.h153 uint32_t algorithm; member
169 uint32_t algorithm; member
A Dtee_internal_api.h294 uint32_t algorithm, uint32_t mode,
/optee_os/lib/libmbedtls/mbedtls/library/
A Dpsa_crypto_invasive.h73 psa_algorithm_t algorithm,
A Dssl_tls13_generic.c231 uint16_t algorithm; in ssl_tls13_parse_certificate_verify() local
251 algorithm = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_certificate_verify()
270 if (!mbedtls_ssl_sig_alg_is_offered(ssl, algorithm)) { in ssl_tls13_parse_certificate_verify()
274 (unsigned int) algorithm)); in ssl_tls13_parse_certificate_verify()
279 algorithm, &sig_alg, &md_alg) != 0) { in ssl_tls13_parse_certificate_verify()
289 (unsigned int) algorithm)); in ssl_tls13_parse_certificate_verify()
A Dpsa_crypto_pake.c221 operation->alg = cipher_suite.algorithm; in mbedtls_psa_pake_setup()
224 if (cipher_suite.algorithm == PSA_ALG_JPAKE) { in mbedtls_psa_pake_setup()
A Dpsa_crypto.c680 psa_algorithm_t algorithm, in psa_mac_key_can_do() argument
683 if (PSA_ALG_IS_HMAC(algorithm)) { in psa_mac_key_can_do()
689 if (PSA_ALG_IS_BLOCK_CIPHER_MAC(algorithm)) { in psa_mac_key_can_do()
8456 if (inputs->cipher_suite.algorithm == PSA_ALG_NONE) { in psa_crypto_driver_pake_get_cipher_suite()
8476 if (PSA_ALG_IS_PAKE(cipher_suite->algorithm) == 0 || in psa_pake_setup()
8484 operation->alg = cipher_suite->algorithm; in psa_pake_setup()
/optee_os/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_private.h454 enum ltc_oid_id algorithm, ltc_asn1_type param_type,
460 unsigned int algorithm, const void* public_key, unsigned long public_key_len,
464 unsigned int algorithm, void* public_key, unsigned long* public_key_len,
/optee_os/ta/pkcs11/src/
A Dprocessing_ec.c850 switch (info.algorithm) { in ecdsa_get_input_max_byte_size()
862 DMSG("Unexpected ECDSA algorithm %#"PRIx32, info.algorithm); in ecdsa_get_input_max_byte_size()
/optee_os/lib/libutils/isoc/
A Dbget.doc43 The basic algorithm underlying BGET has withstood the test of time; more
330 #define BestFit 1 /* Use a best fit algorithm when
/optee_os/lib/libmbedtls/mbedtls/
A DChangeLog423 primary algorithm of the wrapped PSA key.
558 * Add support for the FFDH algorithm and DH key types in PSA, with
715 symmetric encryption algorithm and the PSA configuration enabled.
803 - Only a single digest algorithm per message is supported.
1717 enabling the SHA512 algorithm. Fixes #4034.
1788 specified hash algorithm.
2261 agreement algorithm in use matches the algorithm the key was declared with.
2787 unsupported algorithm. Fixes ARMmbed/mbed-crypto#254.
4087 * Fix insufficient support for signature-hash-algorithm extension,
5666 * Added blowfish algorithm (Generic and cipher layer)
[all …]
A DREADME.md288 * The interface to algorithms is generic, favoring algorithm agility.
/optee_os/
A DCHANGELOG.md1003 * crypto: do not restrict hash size when algorithm is ECDSA ([#1497])
1385 * Fix incorrect algorithm passed to cipher.final()

Completed in 94 milliseconds