Lines Matching refs:alg

1022                                            psa_algorithm_t alg)  in psa_key_policy_permits()  argument
1025 if (alg == 0) { in psa_key_policy_permits()
1030 if (PSA_ALG_IS_WILDCARD(alg)) { in psa_key_policy_permits()
1034 if (psa_key_algorithm_permits(key_type, policy->alg, alg) || in psa_key_policy_permits()
1035 psa_key_algorithm_permits(key_type, policy->alg2, alg)) { in psa_key_policy_permits()
1066 psa_key_policy_algorithm_intersection(key_type, policy->alg, in psa_restrict_key_policy()
1067 constraint->alg); in psa_restrict_key_policy()
1071 if (intersection_alg == 0 && policy->alg != 0 && constraint->alg != 0) { in psa_restrict_key_policy()
1078 policy->alg = intersection_alg; in psa_restrict_key_policy()
1106 psa_algorithm_t alg) in psa_get_and_lock_key_slot_with_policy() argument
1131 if (alg != 0) { in psa_get_and_lock_key_slot_with_policy()
1134 alg); in psa_get_and_lock_key_slot_with_policy()
1172 psa_algorithm_t alg) in psa_get_and_lock_transparent_key_slot_with_policy() argument
1175 usage, alg); in psa_get_and_lock_transparent_key_slot_with_policy()
2349 psa_algorithm_t alg) argument
2359 if (!PSA_ALG_IS_HASH(alg)) {
2368 status = psa_driver_wrapper_hash_setup(operation, alg);
2482 psa_status_t psa_hash_compute(psa_algorithm_t alg, argument
2492 if (!PSA_ALG_IS_HASH(alg)) {
2498 status = psa_driver_wrapper_hash_compute(alg, input, input_length,
2509 psa_status_t psa_hash_compare(psa_algorithm_t alg, argument
2520 if (!PSA_ALG_IS_HASH(alg)) {
2527 alg, input, input_length,
2590 psa_algorithm_t alg, argument
2598 if (!PSA_ALG_IS_MAC(alg)) {
2603 status = psa_mac_key_can_do(alg, key_type);
2609 *mac_size = PSA_MAC_LENGTH(key_type, key_bits, alg);
2620 PSA_ALG_FULL_LENGTH_MAC(alg))) {
2644 psa_algorithm_t alg, argument
2661 alg);
2666 status = psa_mac_finalize_alg_and_key_validation(alg, &slot->attr,
2679 alg);
2685 alg);
2700 psa_algorithm_t alg) argument
2702 return psa_mac_setup(operation, key, alg, 1);
2707 psa_algorithm_t alg) argument
2709 return psa_mac_setup(operation, key, alg, 0);
2840 psa_algorithm_t alg, argument
2857 alg);
2862 status = psa_mac_finalize_alg_and_key_validation(alg, &slot->attr,
2876 alg,
2900 psa_algorithm_t alg, argument
2913 status = psa_mac_compute_internal(key, alg,
2927 psa_algorithm_t alg, argument
2940 status = psa_mac_compute_internal(key, alg,
2972 psa_algorithm_t alg) argument
2975 if (!PSA_ALG_IS_SIGN_MESSAGE(alg)) {
2979 if (PSA_ALG_IS_SIGN_HASH(alg)) {
2980 if (!PSA_ALG_IS_HASH(PSA_ALG_SIGN_GET_HASH(alg))) {
2985 if (!PSA_ALG_IS_SIGN_HASH(alg)) {
2995 psa_algorithm_t alg, argument
3008 status = psa_sign_verify_check_alg(input_is_message, alg);
3025 alg);
3039 alg, input, input_length,
3045 alg, input, input_length,
3061 psa_algorithm_t alg, argument
3071 status = psa_sign_verify_check_alg(input_is_message, alg);
3080 alg);
3089 alg, input, input_length,
3094 alg, input, input_length,
3108 psa_algorithm_t alg, argument
3117 if (PSA_ALG_IS_SIGN_HASH(alg)) {
3122 PSA_ALG_SIGN_GET_HASH(alg),
3132 alg, hash, hash_length,
3140 psa_algorithm_t alg, argument
3153 status = psa_sign_internal(key, 1, alg, input, input_length, signature,
3168 psa_algorithm_t alg, argument
3176 if (PSA_ALG_IS_SIGN_HASH(alg)) {
3181 PSA_ALG_SIGN_GET_HASH(alg),
3191 alg, hash, hash_length,
3199 psa_algorithm_t alg, argument
3211 status = psa_verify_internal(key, 1, alg, input, input_length, signature,
3226 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, argument
3230 if (PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) ||
3231 PSA_ALG_IS_RSA_PSS(alg)) {
3237 alg, hash, hash_length,
3245 if (PSA_ALG_IS_ECDSA(alg)) {
3251 alg, hash, hash_length,
3272 psa_algorithm_t alg, argument
3285 status = psa_sign_internal(key, 0, alg, hash, hash_length, signature,
3300 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, argument
3304 if (PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) ||
3305 PSA_ALG_IS_RSA_PSS(alg)) {
3311 alg, hash, hash_length,
3319 if (PSA_ALG_IS_ECDSA(alg)) {
3325 alg, hash, hash_length,
3345 psa_algorithm_t alg, argument
3357 status = psa_verify_internal(key, 0, alg, hash, hash_length, signature,
3370 psa_algorithm_t alg, argument
3395 if (!PSA_ALG_IS_RSA_OAEP(alg) && salt_length != 0) {
3400 key, &slot, PSA_KEY_USAGE_ENCRYPT, alg);
3416 alg, input, input_length, salt, salt_length,
3429 psa_algorithm_t alg, argument
3454 if (!PSA_ALG_IS_RSA_OAEP(alg) && salt_length != 0) {
3459 key, &slot, PSA_KEY_USAGE_DECRYPT, alg);
3474 alg, input, input_length, salt, salt_length,
3540 mbedtls_svc_key_id_t key, psa_algorithm_t alg, argument
3555 status = psa_sign_verify_check_alg(0, alg);
3563 alg);
3581 slot->key.bytes, alg,
3698 mbedtls_svc_key_id_t key, psa_algorithm_t alg, argument
3715 status = psa_sign_verify_check_alg(0, alg);
3723 alg);
3739 alg, hash, hash_length,
3871 size_t key_buffer_size, psa_algorithm_t alg, argument
3881 if (!PSA_ALG_IS_ECDSA(alg)) {
3907 psa_algorithm_t hash_alg = PSA_ALG_SIGN_GET_HASH(alg);
3909 operation->alg = alg;
3930 (void) alg;
3966 if (PSA_ALG_ECDSA_IS_DETERMINISTIC(operation->alg)) {
4085 psa_algorithm_t alg, argument
4097 if (!PSA_ALG_IS_ECDSA(alg)) {
4171 (void) alg;
4308 psa_algorithm_t alg, argument
4324 if (!PSA_ALG_IS_CIPHER(alg)) {
4329 status = psa_get_and_lock_key_slot_with_policy(key, &slot, usage, alg);
4339 if (alg == PSA_ALG_ECB_NO_PADDING) {
4344 operation->default_iv_length = PSA_CIPHER_IV_LENGTH(slot->attr.type, alg);
4352 alg);
4358 alg);
4373 psa_algorithm_t alg) argument
4375 return psa_cipher_setup(operation, key, alg, MBEDTLS_ENCRYPT);
4380 psa_algorithm_t alg) argument
4382 return psa_cipher_setup(operation, key, alg, MBEDTLS_DECRYPT);
4584 psa_algorithm_t alg, argument
4600 if (!PSA_ALG_IS_CIPHER(alg)) {
4607 alg);
4612 default_iv_length = PSA_CIPHER_IV_LENGTH(slot->attr.type, alg);
4635 alg, local_iv, default_iv_length, input, input_length,
4661 psa_algorithm_t alg, argument
4675 if (!PSA_ALG_IS_CIPHER(alg)) {
4682 alg);
4687 if (input_length < PSA_CIPHER_IV_LENGTH(slot->attr.type, alg)) {
4697 alg, input, input_length,
4722 static psa_algorithm_t psa_aead_get_base_algorithm(psa_algorithm_t alg) argument
4724 return PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG(alg);
4728 static psa_status_t psa_aead_check_nonce_length(psa_algorithm_t alg, argument
4731 psa_algorithm_t base_alg = psa_aead_get_base_algorithm(alg);
4771 static psa_status_t psa_aead_check_algorithm(psa_algorithm_t alg) argument
4773 if (!PSA_ALG_IS_AEAD(alg) || PSA_ALG_IS_WILDCARD(alg)) {
4781 psa_algorithm_t alg, argument
4802 status = psa_aead_check_algorithm(alg);
4808 key, &slot, PSA_KEY_USAGE_ENCRYPT, alg);
4818 status = psa_aead_check_nonce_length(alg, nonce_length);
4825 alg,
4847 psa_algorithm_t alg, argument
4868 status = psa_aead_check_algorithm(alg);
4874 key, &slot, PSA_KEY_USAGE_DECRYPT, alg);
4885 status = psa_aead_check_nonce_length(alg, nonce_length);
4892 alg,
4913 static psa_status_t psa_validate_tag_length(psa_algorithm_t alg) argument
4915 const uint8_t tag_len = PSA_ALG_AEAD_GET_TAG_LENGTH(alg);
4917 switch (PSA_ALG_AEAD_WITH_SHORTENED_TAG(alg, 0)) {
4956 psa_algorithm_t alg) argument
4963 status = psa_aead_check_algorithm(alg);
4986 alg);
4991 if ((status = psa_validate_tag_length(alg)) != PSA_SUCCESS) {
5000 alg);
5006 alg);
5019 operation->alg = psa_aead_get_base_algorithm(alg);
5031 psa_algorithm_t alg) argument
5033 return psa_aead_setup(operation, 1, key, alg);
5039 psa_algorithm_t alg) argument
5041 return psa_aead_setup(operation, 0, key, alg);
5060 status = psa_aead_check_nonce_length(operation->alg, nonce_length);
5114 operation->alg);
5182 switch (operation->alg) {
5264 else if (operation->alg == PSA_ALG_CCM) {
5332 else if (operation->alg == PSA_ALG_CCM) {
5532 if (PSA_ALG_IS_KEY_AGREEMENT(operation->alg)) {
5533 return PSA_ALG_KEY_AGREEMENT_GET_KDF(operation->alg);
5535 return operation->alg;
5612 if (operation->alg == 0) {
5624 if (operation->alg == 0) {
5731 psa_algorithm_t alg) argument
5733 psa_algorithm_t hash_alg = PSA_ALG_HKDF_GET_HASH(alg);
5851 psa_algorithm_t alg, argument
5855 psa_algorithm_t hash_alg = PSA_ALG_TLS12_PRF_GET_HASH(alg);
5874 alg);
6076 if (operation->alg == 0) {
6145 psa_algorithm_t alg = operation->alg; local
6147 operation->alg = alg;
6509 if (operation->alg == PSA_ALG_NONE) {
6616 static psa_status_t psa_hash_try_support(psa_algorithm_t alg) argument
6619 psa_status_t status = psa_hash_setup(&operation, alg);
6727 static psa_status_t psa_key_agreement_try_support(psa_algorithm_t alg) argument
6730 if (alg == PSA_ALG_ECDH) {
6735 if (alg == PSA_ALG_FFDH) {
6739 (void) alg;
6757 psa_algorithm_t alg) argument
6761 if (operation->alg != 0) {
6765 if (PSA_ALG_IS_RAW_KEY_AGREEMENT(alg)) {
6767 } else if (PSA_ALG_IS_KEY_AGREEMENT(alg)) {
6769 psa_algorithm_t kdf_alg = PSA_ALG_KEY_AGREEMENT_GET_KDF(alg);
6770 psa_algorithm_t ka_alg = PSA_ALG_KEY_AGREEMENT_GET_BASE(alg);
6782 } else if (PSA_ALG_IS_KEY_DERIVATION(alg)) {
6784 status = psa_key_derivation_setup_kdf(operation, alg);
6793 operation->alg = alg;
7504 key, &slot, PSA_KEY_USAGE_DERIVE, operation->alg);
7536 psa_algorithm_t alg, argument
7543 switch (alg) {
7547 key_buffer_size, alg,
7585 static psa_status_t psa_key_agreement_raw_internal(psa_algorithm_t alg, argument
7593 if (!PSA_ALG_IS_RAW_KEY_AGREEMENT(alg)) {
7599 private_key->key.bytes, alg,
7618 psa_algorithm_t ka_alg = PSA_ALG_KEY_AGREEMENT_GET_BASE(operation->alg);
7655 if (!PSA_ALG_IS_KEY_AGREEMENT(operation->alg)) {
7659 private_key, &slot, PSA_KEY_USAGE_DERIVE, operation->alg);
7688 psa_status_t psa_raw_key_agreement(psa_algorithm_t alg, argument
7704 if (!PSA_ALG_IS_KEY_AGREEMENT(alg)) {
7709 private_key, &slot, PSA_KEY_USAGE_DERIVE, alg);
7730 status = psa_key_agreement_raw_internal(alg, slot,
8510 operation->alg = cipher_suite->algorithm;
8516 if (operation->alg == PSA_ALG_JPAKE) {
8553 operation->alg);
8683 switch (operation->alg) {
8743 if (operation->alg == PSA_ALG_JPAKE) {
8763 if (operation->alg == PSA_ALG_JPAKE) {
8880 switch (operation->alg) {
8906 switch (operation->alg) {
8936 const size_t max_input_length = (size_t) PSA_PAKE_INPUT_SIZE(operation->alg,
8958 switch (operation->alg) {
8983 switch (operation->alg) {
9020 if (operation->alg == PSA_ALG_JPAKE) {