/optee_os/scripts/ |
A D | sign_helper_kms.py | 46 algorithm: typing.Union[asym_utils.Prehashed, 49 if isinstance(algorithm, asym_utils.Prehashed): 61 if (isinstance(algorithm._algorithm, hashes.SHA256) or 62 isinstance(algorithm, hashes.SHA256)): 64 elif (isinstance(algorithm._algorithm, hashes.SHA384) or 65 isinstance(algorithm, hashes.SHA384)): 67 elif (isinstance(algorithm._algorithm, hashes.SHA512) or 68 isinstance(algorithm, hashes.SHA512)): 82 self, padding: AsymmetricPadding, algorithm: hashes.HashAlgorithm
|
/optee_os/lib/libutee/ |
A D | tee_api_operations.c | 33 uint32_t algorithm, uint32_t mode, in TEE_AllocateOperation() argument 47 if (algorithm == TEE_ALG_AES_XTS || algorithm == TEE_ALG_SM2_KEP) in TEE_AllocateOperation() 51 switch (algorithm) { in TEE_AllocateOperation() 114 switch (algorithm) { in TEE_AllocateOperation() 276 op->info.algorithm = algorithm; in TEE_AllocateOperation() 279 if (algorithm == TEE_ALG_RSASSA_PKCS1_V1_5) in TEE_AllocateOperation() 477 op_info->algorithm = op->info.algorithm; in TEE_GetOperationInfoMultiple() 721 if (dst_op->info.algorithm != src_op->info.algorithm) in TEE_CopyOperation() 943 if (op->info.algorithm == TEE_ALG_AES_CTS) in tee_buffer_update() 1325 if (operation->info.algorithm == TEE_ALG_AES_GCM) { in TEE_AEInit() [all …]
|
/optee_os/core/lib/libtomcrypt/src/pk/asn1/x509/ |
A D | x509_decode_public_key_from_certificate.c | 40 enum ltc_oid_id algorithm, ltc_asn1_type param_type, in x509_decode_public_key_from_certificate() argument 90 if (algorithm == PKA_EC) { in x509_decode_public_key_from_certificate() 94 algorithm, tmpbuf, &tmpbuf_len, in x509_decode_public_key_from_certificate()
|
A D | x509_encode_subject_public_key_info.c | 42 unsigned int algorithm, const void* public_key, unsigned long public_key_len, in x509_encode_subject_public_key_info() argument 53 if ((err = pk_get_oid(algorithm, &OID)) != CRYPT_OK) { in x509_encode_subject_public_key_info()
|
A D | x509_decode_subject_public_key_info.c | 42 unsigned int algorithm, void* public_key, unsigned long* public_key_len, in x509_decode_subject_public_key_info() argument 67 err = pk_get_oid(algorithm, &oid); in x509_decode_subject_public_key_info()
|
/optee_os/out/arm/export-ta_arm32/host_include/ |
A D | tee_api_types.h | 131 uint32_t algorithm; member 147 uint32_t algorithm; member
|
A D | tee_api.h | 206 uint32_t algorithm, uint32_t mode,
|
/optee_os/out/arm/export-ta_arm64/host_include/ |
A D | tee_api_types.h | 131 uint32_t algorithm; member 147 uint32_t algorithm; member
|
A D | tee_api.h | 206 uint32_t algorithm, uint32_t mode,
|
/optee_os/out/arm/export-ta_arm64/include/ |
A D | tee_api_types.h | 131 uint32_t algorithm; member 147 uint32_t algorithm; member
|
A D | tee_api.h | 206 uint32_t algorithm, uint32_t mode,
|
/optee_os/lib/libutee/include/ |
A D | tee_api_types.h | 131 uint32_t algorithm; member 147 uint32_t algorithm; member
|
A D | tee_api.h | 206 uint32_t algorithm, uint32_t mode,
|
/optee_os/out/arm/export-ta_arm32/include/ |
A D | tee_api_types.h | 131 uint32_t algorithm; member 147 uint32_t algorithm; member
|
A D | tee_api.h | 206 uint32_t algorithm, uint32_t mode,
|
/optee_os/ta/pkcs11/src/ |
A D | processing_ec.c | 633 switch (info.algorithm) { in ecdsa_get_input_max_byte_size() 645 DMSG("Unexpected ECDSA algorithm %#"PRIx32, info.algorithm); in ecdsa_get_input_max_byte_size()
|
/optee_os/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_private.h | 394 enum ltc_oid_id algorithm, ltc_asn1_type param_type, 400 unsigned int algorithm, const void* public_key, unsigned long public_key_len, 404 unsigned int algorithm, void* public_key, unsigned long* public_key_len,
|
/optee_os/lib/libutils/isoc/ |
A D | bget.doc | 43 The basic algorithm underlying BGET has withstood the test of time; more 330 #define BestFit 1 /* Use a best fit algorithm when
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 138 that PSA_ALG_RSA_PSS uses the same hash throughout the algorithm.) 158 the specified hash algorithm. 247 * In the PSA API, the policy for a MAC or AEAD algorithm can specify a 348 * In PSA, allow using a key declared with a base key agreement algorithm 350 agreement algorithm in use matches the algorithm the key was declared with. 389 algorithm parameters (only the size) when comparing the signature in the 876 unsupported algorithm. Fixes ARMmbed/mbed-crypto#254. 1994 * Parse signature algorithm extension when renegotiating. Previously, 2176 * Fix insufficient support for signature-hash-algorithm extension, 3755 * Added blowfish algorithm (Generic and cipher layer) [all …]
|
A D | README.md | 214 * The interface to algorithms is generic, favoring algorithm agility.
|
/optee_os/ |
A D | CHANGELOG.md | 642 * crypto: do not restrict hash size when algorithm is ECDSA ([#1497]) 1024 * Fix incorrect algorithm passed to cipher.final()
|