Home
last modified time | relevance | path

Searched refs:policy (Results 1 – 9 of 9) sorted by relevance

/optee_os/core/drivers/crypto/se050/adaptors/apis/
H A Dapdu.c43 Se05xPolicy_t *policy, in set_rsa_public() argument
66 status = Se05x_API_WriteRSAKey(s_ctx, policy, k_object->keyId, in set_rsa_public()
102 Se05xPolicy_t *policy, in set_rsa_private_rsa() argument
113 status = Se05x_API_WriteRSAKey(s_ctx, policy, k_object->keyId, in set_rsa_private_rsa()
149 Se05xPolicy_t *policy, in set_rsa_private_rsa_crt() argument
160 status = Se05x_API_WriteRSAKey(s_ctx, policy, k_object->keyId, in set_rsa_private_rsa_crt()
249 Se05xPolicy_t *policy, in set_rsa_keypair_rsa() argument
260 status = Se05x_API_WriteRSAKey(s_ctx, policy, k_object->keyId, in set_rsa_keypair_rsa()
312 Se05xPolicy_t *policy, in set_rsa_keypair_rsa_crt() argument
323 status = Se05x_API_WriteRSAKey(s_ctx, policy, k_object->keyId, in set_rsa_keypair_rsa_crt()
[all …]
H A Dsss.c17 .policy = {
38 .policy = {
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpsa_crypto_storage.c231 uint8_t policy[sizeof(psa_key_policy_t)]; member
250 MBEDTLS_PUT_UINT32_LE(attr->policy.usage, storage_format->policy, 0); in psa_format_key_data_for_storage()
251 MBEDTLS_PUT_UINT32_LE(attr->policy.alg, storage_format->policy, sizeof(uint32_t)); in psa_format_key_data_for_storage()
252 MBEDTLS_PUT_UINT32_LE(attr->policy.alg2, storage_format->policy, 2 * sizeof(uint32_t)); in psa_format_key_data_for_storage()
310 attr->policy.usage = MBEDTLS_GET_UINT32_LE(storage_format->policy, 0); in psa_parse_key_data_from_storage()
311 attr->policy.alg = MBEDTLS_GET_UINT32_LE(storage_format->policy, sizeof(uint32_t)); in psa_parse_key_data_from_storage()
312 attr->policy.alg2 = MBEDTLS_GET_UINT32_LE(storage_format->policy, 2 * sizeof(uint32_t)); in psa_parse_key_data_from_storage()
H A Dpsa_crypto.c1015 static psa_status_t psa_key_policy_permits(const psa_key_policy_t *policy, in psa_key_policy_permits() argument
1029 if (psa_key_algorithm_permits(key_type, policy->alg, alg) || in psa_key_policy_permits()
1030 psa_key_algorithm_permits(key_type, policy->alg2, alg)) { in psa_key_policy_permits()
1057 psa_key_policy_t *policy, in psa_restrict_key_policy() argument
1061 psa_key_policy_algorithm_intersection(key_type, policy->alg, in psa_restrict_key_policy()
1064 psa_key_policy_algorithm_intersection(key_type, policy->alg2, in psa_restrict_key_policy()
1066 if (intersection_alg == 0 && policy->alg != 0 && constraint->alg != 0) { in psa_restrict_key_policy()
1069 if (intersection_alg2 == 0 && policy->alg2 != 0 && constraint->alg2 != 0) { in psa_restrict_key_policy()
1072 policy->usage &= constraint->usage; in psa_restrict_key_policy()
1073 policy->alg = intersection_alg; in psa_restrict_key_policy()
[all …]
H A Dpsa_crypto_slot_management.c870 psa_extend_key_usage_flags(&(*p_slot)->attr.policy.usage); in psa_get_and_lock_key_slot()
/optee_os/lib/libmbedtls/mbedtls/include/psa/
H A Dcrypto_struct.h303 psa_key_policy_t MBEDTLS_PRIVATE(policy);
398 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(usage) = usage_flags; in psa_set_key_usage_flags()
404 return attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(usage); in psa_get_key_usage_flags()
410 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg) = alg; in psa_set_key_algorithm()
416 return attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg); in psa_get_key_algorithm()
H A Dcrypto_extra.h72 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg2) = alg2; in psa_set_key_enrollment_algorithm()
84 return attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg2); in psa_get_key_enrollment_algorithm()
/optee_os/core/lib/libfdt/
H A DREADME.license1 Licensing and contribution policy of dtc and libfdt
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog1729 This fixes a potential policy bypass or decryption oracle vulnerability
1733 from the output buffer. This fixes a potential policy bypass or decryption
2302 * Implicitly add PSA_KEY_USAGE_SIGN_MESSAGE key usage policy flag when
2351 * In the PSA API, the policy for a MAC or AEAD algorithm can specify a
3151 * Add the Any Policy certificate policy oid, as defined in
3156 * Add the oid certificate policy x509 extension.
3166 RFC 5280 section 4.2.1.4. Currently, only the "Any Policy" policy is