Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 19 of 19) sorted by relevance

/optee_os/scripts/
H A Dsign_helper_kms.py46 algorithm: typing.Union[asym_utils.Prehashed,
49 if isinstance(algorithm, asym_utils.Prehashed):
61 if (isinstance(algorithm._algorithm, hashes.SHA256) or
62 isinstance(algorithm, hashes.SHA256)):
64 elif (isinstance(algorithm._algorithm, hashes.SHA384) or
65 isinstance(algorithm, hashes.SHA384)):
67 elif (isinstance(algorithm._algorithm, hashes.SHA512) or
68 isinstance(algorithm, hashes.SHA512)):
82 self, padding: AsymmetricPadding, algorithm: hashes.HashAlgorithm
/optee_os/core/lib/libtomcrypt/src/pk/asn1/x509/
H A Dx509_decode_public_key_from_certificate.c33 enum ltc_oid_id algorithm, ltc_asn1_type param_type, in x509_decode_public_key_from_certificate() argument
84 if (algorithm == LTC_OID_EC) { in x509_decode_public_key_from_certificate()
88 algorithm, tmpbuf, &tmpbuf_len, in x509_decode_public_key_from_certificate()
H A Dx509_encode_subject_public_key_info.c35 unsigned int algorithm, const void* public_key, unsigned long public_key_len, in x509_encode_subject_public_key_info() argument
46 if ((err = pk_get_oid(algorithm, &OID)) != CRYPT_OK) { in x509_encode_subject_public_key_info()
H A Dx509_decode_subject_public_key_info.c35 unsigned int algorithm, void* public_key, unsigned long* public_key_len, in x509_decode_subject_public_key_info() argument
60 err = pk_get_oid(algorithm, &oid); in x509_decode_subject_public_key_info()
/optee_os/lib/libmbedtls/mbedtls/include/psa/
H A Dcrypto_extra.h1058 psa_algorithm_t algorithm; member
1191 psa_algorithm_t algorithm);
1862 return cipher_suite->algorithm; in psa_pake_cs_get_algorithm()
1867 psa_algorithm_t algorithm) in psa_pake_cs_set_algorithm() argument
1869 if (!PSA_ALG_IS_PAKE(algorithm)) { in psa_pake_cs_set_algorithm()
1870 cipher_suite->algorithm = 0; in psa_pake_cs_set_algorithm()
1872 cipher_suite->algorithm = algorithm; in psa_pake_cs_set_algorithm()
H A Dcrypto_se_driver.h176 psa_algorithm_t algorithm);
382 psa_algorithm_t algorithm,
481 psa_algorithm_t algorithm,
726 psa_algorithm_t algorithm,
768 psa_algorithm_t algorithm,
/optee_os/lib/libutee/
H A Dtee_api_operations.c39 uint32_t algorithm, uint32_t mode, in TEE_AllocateOperation() argument
53 if (algorithm == TEE_ALG_AES_XTS || algorithm == TEE_ALG_SM2_KEP || in TEE_AllocateOperation()
54 algorithm == TEE_ALG_SM4_XTS) in TEE_AllocateOperation()
58 switch (algorithm) { in TEE_AllocateOperation()
136 switch (algorithm) { in TEE_AllocateOperation()
152 if (TEE_ALG_GET_MAIN_ALG(algorithm) == TEE_MAIN_ALGO_AES) in TEE_AllocateOperation()
154 else if (TEE_ALG_GET_MAIN_ALG(algorithm) == TEE_MAIN_ALGO_SM4) in TEE_AllocateOperation()
317 op->info.algorithm = algorithm; in TEE_AllocateOperation()
318 op->info.operationClass = TEE_ALG_GET_CLASS(algorithm); in TEE_AllocateOperation()
320 if (algorithm == TEE_ALG_RSASSA_PKCS1_V1_5) in TEE_AllocateOperation()
[all …]
/optee_os/lib/libutee/include/
H A Dtee_api_types.h153 uint32_t algorithm; member
169 uint32_t algorithm; member
H A Dtee_internal_api.h294 uint32_t algorithm, uint32_t mode,
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpsa_crypto_invasive.h73 psa_algorithm_t algorithm,
H A Dssl_tls13_generic.c231 uint16_t algorithm; in ssl_tls13_parse_certificate_verify() local
251 algorithm = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_certificate_verify()
270 if (!mbedtls_ssl_sig_alg_is_offered(ssl, algorithm)) { in ssl_tls13_parse_certificate_verify()
274 (unsigned int) algorithm)); in ssl_tls13_parse_certificate_verify()
279 algorithm, &sig_alg, &md_alg) != 0) { in ssl_tls13_parse_certificate_verify()
289 (unsigned int) algorithm)); in ssl_tls13_parse_certificate_verify()
H A Dpsa_crypto_pake.c221 operation->alg = cipher_suite.algorithm; in mbedtls_psa_pake_setup()
224 if (cipher_suite.algorithm == PSA_ALG_JPAKE) { in mbedtls_psa_pake_setup()
H A Dpsa_crypto.c680 psa_algorithm_t algorithm, in psa_mac_key_can_do() argument
683 if (PSA_ALG_IS_HMAC(algorithm)) { in psa_mac_key_can_do()
689 if (PSA_ALG_IS_BLOCK_CIPHER_MAC(algorithm)) { in psa_mac_key_can_do()
8678 if (inputs->cipher_suite.algorithm == PSA_ALG_NONE) { in psa_crypto_driver_pake_get_cipher_suite()
8698 if (PSA_ALG_IS_PAKE(cipher_suite->algorithm) == 0 || in psa_pake_setup()
8710 operation->alg = cipher_suite->algorithm; in psa_pake_setup()
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_private.h454 enum ltc_oid_id algorithm, ltc_asn1_type param_type,
460 unsigned int algorithm, const void* public_key, unsigned long public_key_len,
464 unsigned int algorithm, void* public_key, unsigned long* public_key_len,
/optee_os/ta/pkcs11/src/
H A Dprocessing_ec.c850 switch (info.algorithm) { in ecdsa_get_input_max_byte_size()
862 DMSG("Unexpected ECDSA algorithm %#"PRIx32, info.algorithm); in ecdsa_get_input_max_byte_size()
/optee_os/lib/libutils/isoc/
H A Dbget.doc43 The basic algorithm underlying BGET has withstood the test of time; more
330 #define BestFit 1 /* Use a best fit algorithm when
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog444 speaking that requires both the key type and algorithm to be accelerated
492 * Add support for 8-bit GCM tables for Shoup's algorithm to speedup GCM
616 primary algorithm of the wrapped PSA key.
688 and any algorithm possible using them will be included in the build.
751 * Add support for the FFDH algorithm and DH key types in PSA, with
908 symmetric encryption algorithm and the PSA configuration enabled.
996 - Only a single digest algorithm per message is supported.
1097 * The key derivation algorithm PSA_ALG_TLS12_ECJPAKE_TO_PMS cannot be
1218 Only the ECC primitive with secp256r1 curve and SHA-256 hash algorithm
1283 using PSA_ALG_TLS12_ECJPAKE_TO_PMS as the key derivation algorithm.
[all …]
H A DREADME.md288 * The interface to algorithms is generic, favoring algorithm agility.
/optee_os/
H A DCHANGELOG.md1093 * crypto: do not restrict hash size when algorithm is ECDSA ([#1497])
1475 * Fix incorrect algorithm passed to cipher.final()