Home
last modified time | relevance | path

Searched refs:custom (Results 1 – 11 of 11) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/pk/ecc/
H A Decc_import_openssl.c10 ltc_asn1_list seq_priv[4], custom[2]; in s_ecc_import_private_with_oid() local
20 LTC_SET_ASN1(custom, 0, LTC_ASN1_OBJECT_IDENTIFIER, curveoid, 16UL); in s_ecc_import_private_with_oid()
21 LTC_SET_ASN1(custom, 1, LTC_ASN1_RAW_BIT_STRING, bin_xy, 8UL*sizeof(bin_xy)); in s_ecc_import_private_with_oid()
24 …LTC_SET_ASN1_CUSTOM_CONSTRUCTED(seq_priv, 2, LTC_ASN1_CL_CONTEXT_SPECIFIC, 0, custom); /* cont… in s_ecc_import_private_with_oid()
25 …LTC_SET_ASN1_CUSTOM_CONSTRUCTED(seq_priv, 3, LTC_ASN1_CL_CONTEXT_SPECIFIC, 1, custom + 1); /* cont… in s_ecc_import_private_with_oid()
32 … if ((err = pk_oid_num_to_str(curveoid, custom[0].size, OID, &len)) != CRYPT_OK) { goto error; } in s_ecc_import_private_with_oid()
45 ltc_asn1_list seq_fieldid[2], seq_curve[3], seq_ecparams[6], seq_priv[4], custom[2]; in s_ecc_import_private_with_curve() local
59 LTC_SET_ASN1(custom, 0, LTC_ASN1_SEQUENCE, seq_ecparams, 6UL); in s_ecc_import_private_with_curve()
60 LTC_SET_ASN1(custom, 1, LTC_ASN1_RAW_BIT_STRING, bin_xy, 8UL*sizeof(bin_xy)); in s_ecc_import_private_with_curve()
63 …LTC_SET_ASN1_CUSTOM_CONSTRUCTED(seq_priv, 2, LTC_ASN1_CL_CONTEXT_SPECIFIC, 0, custom); /* cont… in s_ecc_import_private_with_curve()
[all …]
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpsa_crypto_random_impl.h114 const unsigned char *custom, size_t len) in mbedtls_psa_drbg_seed() argument
117 return mbedtls_ctr_drbg_seed(drbg_ctx, mbedtls_entropy_func, entropy, custom, len); in mbedtls_psa_drbg_seed()
120 return mbedtls_hmac_drbg_seed(drbg_ctx, md_info, mbedtls_entropy_func, entropy, custom, len); in mbedtls_psa_drbg_seed()
H A Dpsa_crypto_core.h392 const psa_custom_key_parameters_t *custom,
419 const psa_custom_key_parameters_t *custom,
H A Dhmac_drbg.c226 const unsigned char *custom, in mbedtls_hmac_drbg_seed() argument
269 if ((ret = hmac_drbg_reseed_core(ctx, custom, len, in mbedtls_hmac_drbg_seed()
H A Dctr_drbg.c538 const unsigned char *custom, in mbedtls_ctr_drbg_seed() argument
583 if ((ret = mbedtls_ctr_drbg_reseed_internal(ctx, custom, len, in mbedtls_ctr_drbg_seed()
H A Dpsa_crypto_driver_wrappers.h731 const psa_custom_key_parameters_t *custom, in psa_driver_wrapper_generate_key() argument
741 psa_custom_key_parameters_are_default(custom, custom_data_length); in psa_driver_wrapper_generate_key()
812 attributes, custom, custom_data, custom_data_length, in psa_driver_wrapper_generate_key()
H A Dpsa_crypto.c6647 const psa_custom_key_parameters_t *custom, in psa_custom_key_parameters_are_default() argument
6650 if (custom->flags != 0) { in psa_custom_key_parameters_are_default()
6662 const psa_custom_key_parameters_t *custom, in psa_key_derivation_output_key_custom() argument
6680 if (!psa_custom_key_parameters_are_default(custom, custom_data_length)) { in psa_key_derivation_output_key_custom()
8124 const psa_custom_key_parameters_t *custom, in psa_generate_key_internal() argument
8133 (void) custom; in psa_generate_key_internal()
8186 const psa_custom_key_parameters_t *custom, in psa_generate_key_custom() argument
8211 if (custom->flags != 0) { in psa_generate_key_custom()
8216 if (!psa_custom_key_parameters_are_default(custom, custom_data_length)) { in psa_generate_key_custom()
8257 custom, in psa_generate_key_custom()
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dhmac_drbg.h190 const unsigned char *custom,
H A Dctr_drbg.h350 const unsigned char *custom,
/optee_os/lib/libmbedtls/mbedtls/include/psa/
H A Dcrypto.h3852 const psa_custom_key_parameters_t *custom,
4280 const psa_custom_key_parameters_t *custom,
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog242 - Finite-field Diffie-Hellman with custom groups.
385 When migrating from Mbed TLS 2.x, if you had a custom config.h that
496 key pair with a custom public exponent.
934 * Fix undefined symbols in some builds using TLS 1.3 with a custom
1531 and possibly up to 571 bytes with a custom cookie check function.
1653 Replace custom LIB_INSTALL_DIR variable with standard CMAKE_INSTALL_LIBDIR
2025 If needed, SHA-1 certificates can still be verified by using a custom
2990 * Remove the technical possibility to define custom mbedtls_md_info
4753 with custom implementation (eg hardware accelerated), complementing the
4855 * Removed mbedtls_timing_msleep(). Use mbedtls_net_usleep() or a custom
[all …]