| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_sizes.h | 188 #define PSA_AEAD_TAG_LENGTH(key_type, key_bits, alg) \ argument 189 (PSA_AEAD_NONCE_LENGTH(key_type, alg) != 0 ? \ 328 #define PSA_MAC_LENGTH(key_type, key_bits, alg) \ argument 331 PSA_ALG_IS_BLOCK_CIPHER_MAC(alg) ? PSA_BLOCK_CIPHER_BLOCK_LENGTH(key_type) : \ 332 ((void) (key_type), (void) (key_bits), 0u)) 360 #define PSA_AEAD_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext_length) \ argument 361 (PSA_AEAD_NONCE_LENGTH(key_type, alg) != 0 ? \ 413 #define PSA_AEAD_DECRYPT_OUTPUT_SIZE(key_type, alg, ciphertext_length) \ argument 414 (PSA_AEAD_NONCE_LENGTH(key_type, alg) != 0 && \ 465 #define PSA_AEAD_NONCE_LENGTH(key_type, alg) \ argument [all …]
|
| H A D | crypto_compat.h | 220 #define PSA_KEY_DOMAIN_PARAMETERS_SIZE(key_type, key_bits) \ argument
|
| /optee_os/core/drivers/crypto/caam/ |
| H A D | caam_key.c | 89 uint32_t key_type; /* Black key type */ member 141 return key->key_type; in get_key_type() 202 switch (key->key_type) { in caam_key_get_alloc_size() 229 if (key->key_type >= CAAM_KEY_MAX_VALUE) in caam_key_dump() 233 caam_key_type_to_str[key->key_type], trace, key->sec_size, in caam_key_dump() 301 if (out_key->key_type == CAAM_KEY_PLAIN_TEXT || in caam_key_operation_blob() 302 in_key->key_type == CAAM_KEY_PLAIN_TEXT) { in caam_key_operation_blob() 308 if (out_key->key_type != in_key->key_type) { in caam_key_operation_blob() 320 switch (out_key->key_type) { in caam_key_operation_blob() 431 blob.key_type = get_key_type(data, size); in caam_key_deserialize_from_bin() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_cipher.c | 31 psa_key_type_t key_type) in mbedtls_cipher_validate_values() argument 36 MBEDTLS_ASSUME(key_type != PSA_KEY_TYPE_AES); in mbedtls_cipher_validate_values() 39 MBEDTLS_ASSUME(key_type != PSA_KEY_TYPE_ARIA); in mbedtls_cipher_validate_values() 42 MBEDTLS_ASSUME(key_type != PSA_KEY_TYPE_CAMELLIA); in mbedtls_cipher_validate_values() 45 MBEDTLS_ASSUME(key_type != PSA_KEY_TYPE_CHACHA20); in mbedtls_cipher_validate_values() 48 MBEDTLS_ASSUME(key_type != PSA_KEY_TYPE_DES); in mbedtls_cipher_validate_values() 89 if (key_type == PSA_KEY_TYPE_CHACHA20) { in mbedtls_cipher_validate_values() 97 if (key_type == PSA_KEY_TYPE_AES || in mbedtls_cipher_validate_values() 98 key_type == PSA_KEY_TYPE_ARIA || in mbedtls_cipher_validate_values() 99 key_type == PSA_KEY_TYPE_CAMELLIA) { in mbedtls_cipher_validate_values() [all …]
|
| H A D | psa_crypto_driver_wrappers_no_static.c | 91 psa_key_type_t key_type = psa_get_key_type(attributes); in psa_driver_wrapper_get_key_buffer_size() local 109 *key_buffer_size = mbedtls_test_opaque_size_function( key_type, in psa_driver_wrapper_get_key_buffer_size() 116 (void)key_type; in psa_driver_wrapper_get_key_buffer_size()
|
| H A D | ssl_ticket.c | 95 psa_set_key_type(&attributes, key->key_type); in ssl_ticket_gen_key() 184 psa_set_key_type(&attributes, key->key_type); in mbedtls_ssl_ticket_rotate() 224 psa_key_type_t key_type; in mbedtls_ssl_ticket_setup() local 231 &alg, &key_type, &key_bits) != PSA_SUCCESS) { in mbedtls_ssl_ticket_setup() 261 ctx->keys[0].key_type = key_type; in mbedtls_ssl_ticket_setup() 265 ctx->keys[1].key_type = key_type; in mbedtls_ssl_ticket_setup()
|
| H A D | psa_crypto_cipher.h | 32 psa_status_t mbedtls_cipher_values_from_psa(psa_algorithm_t alg, psa_key_type_t key_type, 50 psa_algorithm_t alg, psa_key_type_t key_type, size_t key_bits,
|
| H A D | ssl_tls13_generic.c | 1496 uint16_t tls_id, size_t *bits, psa_key_type_t *key_type) in mbedtls_ssl_get_psa_ffdh_info_from_tls_id() argument 1502 *key_type = PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919); in mbedtls_ssl_get_psa_ffdh_info_from_tls_id() 1508 *key_type = PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919); in mbedtls_ssl_get_psa_ffdh_info_from_tls_id() 1514 *key_type = PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919); in mbedtls_ssl_get_psa_ffdh_info_from_tls_id() 1520 *key_type = PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919); in mbedtls_ssl_get_psa_ffdh_info_from_tls_id() 1526 *key_type = PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919); in mbedtls_ssl_get_psa_ffdh_info_from_tls_id() 1548 psa_key_type_t key_type = PSA_KEY_TYPE_NONE; in mbedtls_ssl_tls13_generate_and_write_xxdh_key_exchange() local 1557 named_group, &key_type, &bits) == PSA_SUCCESS) { in mbedtls_ssl_tls13_generate_and_write_xxdh_key_exchange() 1563 &key_type) == PSA_SUCCESS) { in mbedtls_ssl_tls13_generate_and_write_xxdh_key_exchange() 1568 if (key_type == PSA_KEY_TYPE_NONE) { in mbedtls_ssl_tls13_generate_and_write_xxdh_key_exchange() [all …]
|
| H A D | pk.c | 866 psa_key_type_t key_type; in copy_from_psa() local 892 key_type = psa_get_key_type(&key_attr); in copy_from_psa() 894 key_type = PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(key_type); in copy_from_psa() 899 if ((key_type == PSA_KEY_TYPE_RSA_KEY_PAIR) || in copy_from_psa() 900 (key_type == PSA_KEY_TYPE_RSA_PUBLIC_KEY)) { in copy_from_psa() 907 if (key_type == PSA_KEY_TYPE_RSA_KEY_PAIR) { in copy_from_psa() 934 if (PSA_KEY_TYPE_IS_ECC_KEY_PAIR(key_type) || in copy_from_psa() 935 PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY(key_type)) { in copy_from_psa() 943 grp_id = mbedtls_ecc_group_from_psa(PSA_KEY_TYPE_ECC_GET_FAMILY(key_type), key_bits); in copy_from_psa() 949 if (PSA_KEY_TYPE_IS_ECC_KEY_PAIR(key_type)) { in copy_from_psa()
|
| H A D | psa_crypto_invasive.h | 74 psa_key_type_t key_type);
|
| /optee_os/core/drivers/crypto/caam/acipher/ |
| H A D | caam_rsa.c | 497 enum caam_key_type key_type = caam_key_default_key_gen_type(); in do_black_key_encapsulation() local 499 ret = caam_key_black_encapsulation(&rsa_keypair->p, key_type); in do_black_key_encapsulation() 505 ret = caam_key_black_encapsulation(&rsa_keypair->q, key_type); in do_black_key_encapsulation() 533 enum caam_key_type key_type = caam_key_default_key_gen_type(); in do_gen_keypair() local 554 genkey.p.key_type = CAAM_KEY_PLAIN_TEXT; in do_gen_keypair() 564 genkey.q.key_type = CAAM_KEY_PLAIN_TEXT; in do_gen_keypair() 581 genkey.d.key_type = key_type; in do_gen_keypair() 598 genkey.dp.key_type = key_type; in do_gen_keypair() 608 genkey.dq.key_type = key_type; in do_gen_keypair() 618 genkey.qp.key_type = key_type; in do_gen_keypair() [all …]
|
| H A D | caam_dh.c | 229 enum caam_key_type key_type = caam_key_default_key_gen_type(); in do_gen_keypair() local 260 caam_dh_key.x.key_type = key_type; in do_gen_keypair() 312 switch (key_type) { in do_gen_keypair() 463 switch (caam_dh_key.x.key_type) { in do_shared_secret()
|
| H A D | caam_ecc.c | 264 enum caam_key_type key_type = caam_key_default_key_gen_type(); in do_gen_keypair() local 288 d.key_type = key_type; in do_gen_keypair() 311 switch (key_type) { in do_gen_keypair() 547 switch (ecckey.d.key_type) { in do_sign() 565 switch (ecckey.d.key_type) { in do_sign() 847 switch (ecckey.d.key_type) { in do_shared_secret()
|
| /optee_os/core/kernel/ |
| H A D | otp_stubs.c | 47 __weak TEE_Result tee_otp_get_ta_enc_key(uint32_t key_type __maybe_unused, in tee_otp_get_ta_enc_key() 50 assert(key_type == SHDR_ENC_KEY_DEV_SPECIFIC); in tee_otp_get_ta_enc_key()
|
| /optee_os/core/include/crypto/ |
| H A D | crypto_impl.h | 445 crypto_asym_get_ecc_keypair_ops(uint32_t key_type); 448 crypto_asym_get_ecc_public_ops(uint32_t key_type); 451 uint32_t key_type, 454 uint32_t key_type, 459 uint32_t key_type __unused, in crypto_asym_alloc_ecc_public_key() 466 crypto_asym_get_ecc_keypair_ops(uint32_t key_type __unused) in crypto_asym_get_ecc_keypair_ops() 472 crypto_asym_get_ecc_public_ops(uint32_t key_type __unused) in crypto_asym_get_ecc_public_ops() 479 uint32_t key_type __unused, in crypto_asym_alloc_ecc_keypair() 488 uint32_t key_type, 491 uint32_t key_type, [all …]
|
| /optee_os/ta/pkcs11/src/ |
| H A D | processing_digest.c | 124 enum pkcs11_key_type key_type = PKCS11_CKK_UNDEFINED_ID; in step_digest_operation() local 171 key_type = get_key_type(obj->attributes); in step_digest_operation() 173 if (key_type != PKCS11_CKK_GENERIC_SECRET && in step_digest_operation() 174 key_type != PKCS11_CKK_AES) in step_digest_operation()
|
| H A D | pkcs11_attributes.c | 1702 static void get_key_min_max_sizes(enum pkcs11_key_type key_type, in get_key_min_max_sizes() argument 1708 switch (key_type) { in get_key_min_max_sizes() 1743 TEE_Panic(key_type); in get_key_min_max_sizes() 1934 enum pkcs11_key_type key_type = get_key_type(head); in check_parent_attrs_against_processing() local 1952 key_type == PKCS11_CKK_AES) in check_parent_attrs_against_processing() 1956 id2str_class(key_class), id2str_key_type(key_type)); in check_parent_attrs_against_processing() 1968 key_type != PKCS11_CKK_AES) in check_parent_attrs_against_processing() 1998 if (key_type == PKCS11_CKK_GENERIC_SECRET) in check_parent_attrs_against_processing() 2004 if (key_type == PKCS11_CKK_MD5_HMAC) in check_parent_attrs_against_processing() 2009 if (key_type == PKCS11_CKK_SHA_1_HMAC) in check_parent_attrs_against_processing() [all …]
|
| H A D | pkcs11_helpers.c | 479 enum pkcs11_key_type key_type = id; in key_type_is_symm_key() local 481 switch (key_type) { in key_type_is_symm_key() 498 enum pkcs11_key_type key_type = id; in key_type_is_asymm_key() local 500 switch (key_type) { in key_type_is_asymm_key() 781 enum pkcs11_key_type key_type = id; in id2str_type() local 787 return id2str_key_type(key_type); in id2str_type()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | ecc.c | 392 crypto_asym_get_ecc_keypair_ops( uint32_t key_type) in crypto_asym_get_ecc_keypair_ops() argument 394 switch (key_type) { in crypto_asym_get_ecc_keypair_ops() 416 uint32_t key_type, in crypto_asym_alloc_ecc_keypair() argument 421 switch (key_type) { in crypto_asym_alloc_ecc_keypair() 470 crypto_asym_get_ecc_public_ops(uint32_t key_type) in crypto_asym_get_ecc_public_ops() argument 472 switch (key_type) { in crypto_asym_get_ecc_public_ops() 494 uint32_t key_type, in crypto_asym_alloc_ecc_public_key() argument 499 switch (key_type) { in crypto_asym_alloc_ecc_public_key()
|
| /optee_os/core/drivers/crypto/caam/include/ |
| H A D | caam_key.h | 27 enum caam_key_type key_type; /* CAAM Key type */ member 149 enum caam_key_type key_type);
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | ecc.c | 376 crypto_asym_get_ecc_keypair_ops(uint32_t key_type) in crypto_asym_get_ecc_keypair_ops() argument 378 switch (key_type) { in crypto_asym_get_ecc_keypair_ops() 400 uint32_t key_type, in crypto_asym_alloc_ecc_keypair() argument 405 switch (key_type) { in crypto_asym_alloc_ecc_keypair() 474 crypto_asym_get_ecc_public_ops(uint32_t key_type) in crypto_asym_get_ecc_public_ops() argument 476 switch (key_type) { in crypto_asym_get_ecc_public_ops() 500 uint32_t key_type, in crypto_asym_alloc_ecc_public_key() argument 505 switch (key_type) { in crypto_asym_alloc_ecc_public_key()
|
| /optee_os/core/include/kernel/ |
| H A D | tee_common_otp.h | 20 TEE_Result tee_otp_get_ta_enc_key(uint32_t key_type, uint8_t *buffer,
|
| /optee_os/scripts/ |
| H A D | sign_rproc_fw.py | 349 key_type = { variable 388 sign_type = ENUM_SIGNATURE_TYPE[args.key_type] 389 get_key = key_type.get(sign_type, lambda: "Invalid sign type") 473 sign_size = sig_size_type.get(ENUM_SIGNATURE_TYPE[args.key_type], 481 signer = Signature.get(ENUM_SIGNATURE_TYPE[args.key_type])(key)
|
| /optee_os/lib/libutee/include/ |
| H A D | utee_defines.h | 147 uint32_t key_type = 0xA0000000 | TEE_ALG_GET_MAIN_ALG(algo); in __tee_alg_get_key_type() local 150 key_type |= 0x01000000; in __tee_alg_get_key_type() 152 return key_type; in __tee_alg_get_key_type()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | ssl_ticket.h | 62 psa_key_type_t MBEDTLS_PRIVATE(key_type); /*!< key type */
|