| /optee_os/scripts/ |
| H A D | sign_helper_kms.py | 46 algorithm: typing.Union[asym_utils.Prehashed, 49 if isinstance(algorithm, asym_utils.Prehashed): 61 if (isinstance(algorithm._algorithm, hashes.SHA256) or 62 isinstance(algorithm, hashes.SHA256)): 64 elif (isinstance(algorithm._algorithm, hashes.SHA384) or 65 isinstance(algorithm, hashes.SHA384)): 67 elif (isinstance(algorithm._algorithm, hashes.SHA512) or 68 isinstance(algorithm, hashes.SHA512)): 82 self, padding: AsymmetricPadding, algorithm: hashes.HashAlgorithm
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/x509/ |
| H A D | x509_decode_public_key_from_certificate.c | 33 enum ltc_oid_id algorithm, ltc_asn1_type param_type, in x509_decode_public_key_from_certificate() argument 84 if (algorithm == LTC_OID_EC) { in x509_decode_public_key_from_certificate() 88 algorithm, tmpbuf, &tmpbuf_len, in x509_decode_public_key_from_certificate()
|
| H A D | x509_encode_subject_public_key_info.c | 35 unsigned int algorithm, const void* public_key, unsigned long public_key_len, in x509_encode_subject_public_key_info() argument 46 if ((err = pk_get_oid(algorithm, &OID)) != CRYPT_OK) { in x509_encode_subject_public_key_info()
|
| H A D | x509_decode_subject_public_key_info.c | 35 unsigned int algorithm, void* public_key, unsigned long* public_key_len, in x509_decode_subject_public_key_info() argument 60 err = pk_get_oid(algorithm, &oid); in x509_decode_subject_public_key_info()
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_extra.h | 1058 psa_algorithm_t algorithm; member 1191 psa_algorithm_t algorithm); 1862 return cipher_suite->algorithm; in psa_pake_cs_get_algorithm() 1867 psa_algorithm_t algorithm) in psa_pake_cs_set_algorithm() argument 1869 if (!PSA_ALG_IS_PAKE(algorithm)) { in psa_pake_cs_set_algorithm() 1870 cipher_suite->algorithm = 0; in psa_pake_cs_set_algorithm() 1872 cipher_suite->algorithm = algorithm; in psa_pake_cs_set_algorithm()
|
| H A D | crypto_se_driver.h | 176 psa_algorithm_t algorithm); 382 psa_algorithm_t algorithm, 481 psa_algorithm_t algorithm, 726 psa_algorithm_t algorithm, 768 psa_algorithm_t algorithm,
|
| /optee_os/lib/libutee/ |
| H A D | tee_api_operations.c | 39 uint32_t algorithm, uint32_t mode, in TEE_AllocateOperation() argument 53 if (algorithm == TEE_ALG_AES_XTS || algorithm == TEE_ALG_SM2_KEP || in TEE_AllocateOperation() 54 algorithm == TEE_ALG_SM4_XTS) in TEE_AllocateOperation() 58 switch (algorithm) { in TEE_AllocateOperation() 136 switch (algorithm) { in TEE_AllocateOperation() 152 if (TEE_ALG_GET_MAIN_ALG(algorithm) == TEE_MAIN_ALGO_AES) in TEE_AllocateOperation() 154 else if (TEE_ALG_GET_MAIN_ALG(algorithm) == TEE_MAIN_ALGO_SM4) in TEE_AllocateOperation() 317 op->info.algorithm = algorithm; in TEE_AllocateOperation() 318 op->info.operationClass = TEE_ALG_GET_CLASS(algorithm); in TEE_AllocateOperation() 320 if (algorithm == TEE_ALG_RSASSA_PKCS1_V1_5) in TEE_AllocateOperation() [all …]
|
| /optee_os/lib/libutee/include/ |
| H A D | tee_api_types.h | 153 uint32_t algorithm; member 169 uint32_t algorithm; member
|
| H A D | tee_internal_api.h | 294 uint32_t algorithm, uint32_t mode,
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_invasive.h | 73 psa_algorithm_t algorithm,
|
| H A D | ssl_tls13_generic.c | 231 uint16_t algorithm; in ssl_tls13_parse_certificate_verify() local 251 algorithm = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_certificate_verify() 270 if (!mbedtls_ssl_sig_alg_is_offered(ssl, algorithm)) { in ssl_tls13_parse_certificate_verify() 274 (unsigned int) algorithm)); in ssl_tls13_parse_certificate_verify() 279 algorithm, &sig_alg, &md_alg) != 0) { in ssl_tls13_parse_certificate_verify() 289 (unsigned int) algorithm)); in ssl_tls13_parse_certificate_verify()
|
| H A D | psa_crypto_pake.c | 221 operation->alg = cipher_suite.algorithm; in mbedtls_psa_pake_setup() 224 if (cipher_suite.algorithm == PSA_ALG_JPAKE) { in mbedtls_psa_pake_setup()
|
| H A D | psa_crypto.c | 680 psa_algorithm_t algorithm, in psa_mac_key_can_do() argument 683 if (PSA_ALG_IS_HMAC(algorithm)) { in psa_mac_key_can_do() 689 if (PSA_ALG_IS_BLOCK_CIPHER_MAC(algorithm)) { in psa_mac_key_can_do() 8678 if (inputs->cipher_suite.algorithm == PSA_ALG_NONE) { in psa_crypto_driver_pake_get_cipher_suite() 8698 if (PSA_ALG_IS_PAKE(cipher_suite->algorithm) == 0 || in psa_pake_setup() 8710 operation->alg = cipher_suite->algorithm; in psa_pake_setup()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_private.h | 454 enum ltc_oid_id algorithm, ltc_asn1_type param_type, 460 unsigned int algorithm, const void* public_key, unsigned long public_key_len, 464 unsigned int algorithm, void* public_key, unsigned long* public_key_len,
|
| /optee_os/ta/pkcs11/src/ |
| H A D | processing_ec.c | 850 switch (info.algorithm) { in ecdsa_get_input_max_byte_size() 862 DMSG("Unexpected ECDSA algorithm %#"PRIx32, info.algorithm); in ecdsa_get_input_max_byte_size()
|
| /optee_os/lib/libutils/isoc/ |
| H A D | bget.doc | 43 The basic algorithm underlying BGET has withstood the test of time; more 330 #define BestFit 1 /* Use a best fit algorithm when
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 444 speaking that requires both the key type and algorithm to be accelerated 492 * Add support for 8-bit GCM tables for Shoup's algorithm to speedup GCM 616 primary algorithm of the wrapped PSA key. 688 and any algorithm possible using them will be included in the build. 751 * Add support for the FFDH algorithm and DH key types in PSA, with 908 symmetric encryption algorithm and the PSA configuration enabled. 996 - Only a single digest algorithm per message is supported. 1097 * The key derivation algorithm PSA_ALG_TLS12_ECJPAKE_TO_PMS cannot be 1218 Only the ECC primitive with secp256r1 curve and SHA-256 hash algorithm 1283 using PSA_ALG_TLS12_ECJPAKE_TO_PMS as the key derivation algorithm. [all …]
|
| H A D | README.md | 288 * The interface to algorithms is generic, favoring algorithm agility.
|
| /optee_os/ |
| H A D | CHANGELOG.md | 1093 * crypto: do not restrict hash size when algorithm is ECDSA ([#1497]) 1475 * Fix incorrect algorithm passed to cipher.final()
|