Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 21 of 21) sorted by relevance

/optee_os/scripts/
A Dsign_helper_kms.py46 algorithm: typing.Union[asym_utils.Prehashed,
49 if isinstance(algorithm, asym_utils.Prehashed):
61 if (isinstance(algorithm._algorithm, hashes.SHA256) or
62 isinstance(algorithm, hashes.SHA256)):
64 elif (isinstance(algorithm._algorithm, hashes.SHA384) or
65 isinstance(algorithm, hashes.SHA384)):
67 elif (isinstance(algorithm._algorithm, hashes.SHA512) or
68 isinstance(algorithm, hashes.SHA512)):
82 self, padding: AsymmetricPadding, algorithm: hashes.HashAlgorithm
/optee_os/lib/libutee/
A Dtee_api_operations.c33 uint32_t algorithm, uint32_t mode, in TEE_AllocateOperation() argument
47 if (algorithm == TEE_ALG_AES_XTS || algorithm == TEE_ALG_SM2_KEP) in TEE_AllocateOperation()
51 switch (algorithm) { in TEE_AllocateOperation()
114 switch (algorithm) { in TEE_AllocateOperation()
276 op->info.algorithm = algorithm; in TEE_AllocateOperation()
279 if (algorithm == TEE_ALG_RSASSA_PKCS1_V1_5) in TEE_AllocateOperation()
477 op_info->algorithm = op->info.algorithm; in TEE_GetOperationInfoMultiple()
721 if (dst_op->info.algorithm != src_op->info.algorithm) in TEE_CopyOperation()
943 if (op->info.algorithm == TEE_ALG_AES_CTS) in tee_buffer_update()
1325 if (operation->info.algorithm == TEE_ALG_AES_GCM) { in TEE_AEInit()
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/asn1/x509/
A Dx509_decode_public_key_from_certificate.c40 enum ltc_oid_id algorithm, ltc_asn1_type param_type, in x509_decode_public_key_from_certificate() argument
90 if (algorithm == PKA_EC) { in x509_decode_public_key_from_certificate()
94 algorithm, tmpbuf, &tmpbuf_len, in x509_decode_public_key_from_certificate()
A Dx509_encode_subject_public_key_info.c42 unsigned int algorithm, const void* public_key, unsigned long public_key_len, in x509_encode_subject_public_key_info() argument
53 if ((err = pk_get_oid(algorithm, &OID)) != CRYPT_OK) { in x509_encode_subject_public_key_info()
A Dx509_decode_subject_public_key_info.c42 unsigned int algorithm, void* public_key, unsigned long* public_key_len, in x509_decode_subject_public_key_info() argument
67 err = pk_get_oid(algorithm, &oid); in x509_decode_subject_public_key_info()
/optee_os/out/arm/export-ta_arm32/host_include/
A Dtee_api_types.h131 uint32_t algorithm; member
147 uint32_t algorithm; member
A Dtee_api.h206 uint32_t algorithm, uint32_t mode,
/optee_os/out/arm/export-ta_arm64/host_include/
A Dtee_api_types.h131 uint32_t algorithm; member
147 uint32_t algorithm; member
A Dtee_api.h206 uint32_t algorithm, uint32_t mode,
/optee_os/out/arm/export-ta_arm64/include/
A Dtee_api_types.h131 uint32_t algorithm; member
147 uint32_t algorithm; member
A Dtee_api.h206 uint32_t algorithm, uint32_t mode,
/optee_os/lib/libutee/include/
A Dtee_api_types.h131 uint32_t algorithm; member
147 uint32_t algorithm; member
A Dtee_api.h206 uint32_t algorithm, uint32_t mode,
/optee_os/out/arm/export-ta_arm32/include/
A Dtee_api_types.h131 uint32_t algorithm; member
147 uint32_t algorithm; member
A Dtee_api.h206 uint32_t algorithm, uint32_t mode,
/optee_os/ta/pkcs11/src/
A Dprocessing_ec.c633 switch (info.algorithm) { in ecdsa_get_input_max_byte_size()
645 DMSG("Unexpected ECDSA algorithm %#"PRIx32, info.algorithm); in ecdsa_get_input_max_byte_size()
/optee_os/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_private.h394 enum ltc_oid_id algorithm, ltc_asn1_type param_type,
400 unsigned int algorithm, const void* public_key, unsigned long public_key_len,
404 unsigned int algorithm, void* public_key, unsigned long* public_key_len,
/optee_os/lib/libutils/isoc/
A Dbget.doc43 The basic algorithm underlying BGET has withstood the test of time; more
330 #define BestFit 1 /* Use a best fit algorithm when
/optee_os/lib/libmbedtls/mbedtls/
A DChangeLog138 that PSA_ALG_RSA_PSS uses the same hash throughout the algorithm.)
158 the specified hash algorithm.
247 * In the PSA API, the policy for a MAC or AEAD algorithm can specify a
348 * In PSA, allow using a key declared with a base key agreement algorithm
350 agreement algorithm in use matches the algorithm the key was declared with.
389 algorithm parameters (only the size) when comparing the signature in the
876 unsupported algorithm. Fixes ARMmbed/mbed-crypto#254.
1994 * Parse signature algorithm extension when renegotiating. Previously,
2176 * Fix insufficient support for signature-hash-algorithm extension,
3755 * Added blowfish algorithm (Generic and cipher layer)
[all …]
A DREADME.md214 * The interface to algorithms is generic, favoring algorithm agility.
/optee_os/
A DCHANGELOG.md642 * crypto: do not restrict hash size when algorithm is ECDSA ([#1497])
1024 * Fix incorrect algorithm passed to cipher.final()

Completed in 35 milliseconds