Lines Matching refs:algorithm
92 …ontrivial data format. Therefore the only gap is with metadata, namely specifying a hash algorithm.
127 …there is no algorithm that can be used with multiple types, and PSA keys have a policy that (for t…
139 * Simultaneously supporting **a key type and an algorithm**.
141 …is made at compile time. For RSA, the choice of encryption or signature algorithm is made either b…
143 …_key_type_t` value and an algorithm which is normally encoded as policy information in a `psa_key_…
190 … ECDSA specifically, or do we provide conversion functions that take an algorithm as argument and …
192 …onvert between the PSA and the pk signature format, parametrized by the algorithm. However, it is …
244 …n crucial ways, with different splits between key type, policy information and operation algorithm.
251 …algorithm. “Same key material” is straightforward, but “same algorithm” is not, because a PK conte…
256 …algorithm, which as discussed above cannot be fully deduced from the `mbedtls_pk_context` object. …
283 * `mbedtls_pk_get_psa_attributes` sets the algorithm usage policy based on information in the key o…
284 …* For an RSA key with the `MBEDTLS_RSA_PKCS_V15` padding mode, the algorithm policy is `PSA_ALG_RS…
285 …* For an RSA key with the `MBEDTLS_RSA_PKCS_V21` padding mode, the algorithm policy is `PSA_ALG_RS…
286 …* For an `MBEDTLS_PK_ECKEY` or `MBEDTLS_PK_ECDSA` with a sign/verify usage, the algorithm policy i…
287 …Y` or `MBEDTLS_PK_ECDKEY_DH` with the usage `PSA_KEY_USAGE_DERIVE`, the algorithm is `PSA_ALG_ECDH…
311 …on the resulting pk context will perform an algorithm that is compatible with the PSA key's primar…
314 …modifying the code that consumes the key. For RSA keys, the PSA primary algorithm policy is how on…