/trusted-firmware-m-3.6.0/platform/ext/target/arm/rss/common/ |
D | crypto_keys.c | 26 psa_algorithm_t *algorithm, in tfm_plat_get_huk() argument 37 *algorithm = PSA_ALG_HKDF(PSA_ALG_SHA_256); in tfm_plat_get_huk() 51 psa_algorithm_t *algorithm, in tfm_plat_get_iak() argument 100 *algorithm = PSA_ALG_ECDSA(PSA_ALG_SHA_256); in tfm_plat_get_iak() 102 *algorithm = PSA_ALG_ECDSA(PSA_ALG_SHA_384); in tfm_plat_get_iak() 109 psa_set_key_algorithm(&transient_attr, *algorithm); in tfm_plat_get_iak() 156 psa_algorithm_t *algorithm, in tfm_plat_get_dak_seed() argument 167 *algorithm = PSA_ALG_HKDF(PSA_ALG_SHA_256); in tfm_plat_get_dak_seed() 182 psa_algorithm_t *algorithm, in tfm_plat_get_host_s_rotpk() argument 192 *algorithm = PSA_ALG_ECDSA(PSA_ALG_SHA_384); in tfm_plat_get_host_s_rotpk() [all …]
|
D | config.cmake | 52 set(MEASURED_BOOT_HASH_ALG PSA_ALG_SHA_256 CACHE STRING "Hash algorithm used by Measur…
|
/trusted-firmware-m-3.6.0/platform/ext/common/template/ |
D | crypto_keys.c | 30 psa_algorithm_t *algorithm, in tfm_plat_get_huk() argument 46 *algorithm = PSA_ALG_HKDF(PSA_ALG_SHA_256); in tfm_plat_get_huk() 56 psa_algorithm_t *algorithm, in tfm_plat_get_iak() argument 77 sizeof(psa_algorithm_t), (uint8_t*)algorithm); in tfm_plat_get_iak() 90 *algorithm = PSA_ALG_ECDSA(PSA_ALG_SHA_256); in tfm_plat_get_iak()
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/protected_storage/ |
D | Kconfig | 22 string "PS encryption AEAD algorithm" 25 Indicates the AEAD algorithm to use for authenticated encryption in
|
/trusted-firmware-m-3.6.0/docs/configuration/ |
D | test_configuration.rst | 88 | TFM_CRYPTO_TEST_ALG_SHA_384 | Test SHA-384 cryptography algorithm | ON | 90 | TFM_CRYPTO_TEST_ALG_SHA_512 | Test SHA-512 cryptography algorithm | ON | 92 | TFM_CRYPTO_TEST_HKDF | Test HKDF key derivation algorithm | ON | 94 | TFM_CRYPTO_TEST_ECDH | Test ECDH key agreement algorithm | ON | 98 | TFM_CRYPTO_TEST_ALG_CHACHA20_POLY1305 | Test ChaCha20-Poly1305 AEAD algorithm | ON |
|
/trusted-firmware-m-3.6.0/docs/configuration/profiles/ |
D | tfm_profile_medium.rst | 33 - Authenticated Encryption with Associated Data (AEAD) algorithm 34 - Asymmetric key algorithm based signature and verification 44 - Asymmetric key algorithm based Initial Attestation 97 - ECDHE_ECDSA as key exchange algorithm. 98 - AES-128-CCM (AES CCM mode with 128-bit key) as AEAD algorithm. 102 - HMAC as Message Authentication Code algorithm. 131 If usage scenarios require RSA algorithm for backward compatibility and legacy 135 AEAD algorithm 139 AEAD algorithm for PS service as the one used by TLS/DTLS cipher suite. 169 TF-M PS service relies on an AEAD algorithm to ensure data confidentiality and [all …]
|
D | tfm_profile_large.rst | 45 - Authenticated Encryption with Associated Data (AEAD) algorithm 46 - Asymmetric key algorithm based signature and verification 58 - Asymmetric key algorithm based Initial Attestation 290 If PS is selected, AES-CCM is used as AEAD algorithm by default. If platform 291 hardware crypto accelerator supports the AEAD algorithm, the AEAD operations can 355 …FM_CRYPTO_TEST_ALG_SHA_384`` | ``OFF`` | Test SHA-384 cryptography algorithm | 357 …FM_CRYPTO_TEST_ALG_SHA_512`` | ``ON`` | Test SHA-512 cryptography algorithm | 361 …| ``TFM_CRYPTO_TEST_ECDH`` | ``ON`` | Test ECDH key agreement algorithm … 365 …FM_CRYPTO_TEST_CHACHA20_POLY1305`` | ``OFF`` | Test ChaCha20-Poly1305 AEAD algorithm |
|
D | tfm_profile_small.rst | 39 - Advanced Encryption Standard (AES) as symmetric crypto algorithm 41 - HMAC as Message Authentication Code algorithm 124 capabilities as defined in TLS-PSK, such as one symmetric cipher algorithm 130 - AES-128-CCM (AES CCM mode with 128-bit key) as symmetric crypto algorithm 132 - HMAC as Message Authentication Code algorithm 252 It is recommended to utilize the same MAC algorithm supported in Crypto 436 algorithms based Initial Attestation, using HMAC SHA-256 as MAC algorithm in 488 …TFM_CRYPTO_TEST_ALG_SHA_384`` | ``OFF`` | Test SHA-384 cryptography algorithm | 490 …TFM_CRYPTO_TEST_ALG_SHA_512`` | ``OFF`` | Test SHA-512 cryptography algorithm | 492 …TFM_CRYPTO_TEST_HKDF`` | ``OFF`` | Test HKDF key derivation algorithm | [all …]
|
D | tfm_profile_medium_arot-less.rst | 34 - Authenticated Encryption with Associated Data (AEAD) algorithm 35 - Asymmetric key algorithm based signature and verification 45 - Asymmetric key algorithm based Initial Attestation
|
/trusted-firmware-m-3.6.0/lib/ext/t_cose/src/ |
D | t_cose_sign1_sign.c | 35 #error COSE algorithm identifier definitions are in error 39 #error COSE algorithm identifier definitions are in error 43 #error COSE algorithm identifier definitions are in error
|
D | t_cose_parameters.c | 319 #error Invalid algorithm designator not 0. Parameter list initialization fails. in clear_cose_parameters() 323 #error Constant for unset algorithm ID not aligned with COSE_ALGORITHM_RESERVED in clear_cose_parameters()
|
/trusted-firmware-m-3.6.0/platform/include/ |
D | tfm_plat_crypto_keys.h | 37 …(uint8_t *buf, size_t buf_len, size_t *key_len, size_t *key_bits, psa_algorithm_t *algorithm, psa_…
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/initial_attestation/ |
D | attest_boot_data.c | 63 get_measurement_description(psa_algorithm_t algorithm, in get_measurement_description() argument 66 switch (algorithm) { in get_measurement_description()
|
D | Kconfig | 16 bool "Symmetric key algorithm based Initial Attestation"
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/crypto/psa_driver_api/ |
D | tfm_builtin_key_loader.c | 258 psa_algorithm_t algorithm; in tfm_builtin_key_loader_init() local 271 … &buf[0], TFM_BUILTIN_MAX_KEY_LEN, &key_len, &key_bits, &algorithm, &type); in tfm_builtin_key_loader_init() 280 psa_set_key_algorithm(&attr, algorithm); in tfm_builtin_key_loader_init()
|
/trusted-firmware-m-3.6.0/interface/include/psa/ |
D | fwu_config.h.in | 28 * on the hash algorithm used.
|
/trusted-firmware-m-3.6.0/docs/design_docs/services/ |
D | symmetric_initial_attest.rst | 2 Symmetric key algorithm based Initial Attestation 13 This document proposes a design of symmetric key algorithm based Initial 16 Symmetric key algorithm based Initial Attestation 38 for Initial Attestation based on asymmetric key algorithm 134 Only symmetric IAK for HMAC algorithm is allowed so far. 145 hash algorithm of Instance ID calculation. 319 configures option flags and algorithm used in signing. 517 | ``key_alg`` | The key algorithm. Only HMAC SHA-256 is supported so far. |
|
/trusted-firmware-m-3.6.0/config/profile/ |
D | profile_medium.cmake | 28 set(PS_CRYPTO_AEAD_ALG PSA_ALG_CCM CACHE STRING "The AEAD algorithm to use for …
|
D | profile_large.cmake | 29 set(PS_CRYPTO_AEAD_ALG PSA_ALG_CCM CACHE STRING "The AEAD algorithm to use for …
|
/trusted-firmware-m-3.6.0/docs/releases/ |
D | 1.3.0.rst | 141 | algorithm in CryptoCell-312. 146 | algorithm doesn't match other parameters.
|
/trusted-firmware-m-3.6.0/platform/ext/target/stm/b_u585i_iot02a/ |
D | config.cmake | 28 set(PS_CRYPTO_AEAD_ALG PSA_ALG_GCM CACHE STRING "The AEAD algorithm to use for …
|
/trusted-firmware-m-3.6.0/platform/ext/target/stm/stm32h573i_dk/ |
D | config.cmake | 26 set(PS_CRYPTO_AEAD_ALG PSA_ALG_GCM CACHE STRING "The AEAD algorithm to use for …
|
/trusted-firmware-m-3.6.0/lib/ext/t_cose/ |
D | README.md | 163 modified. This is for hash algorithm implementations that are linked 225 * Doesn't handle COSE string algorithm IDs. Only COSE integer algorithm IDs are handled. 226 Thus far no string algorithm IDs have been assigned by IANA.
|
/trusted-firmware-m-3.6.0/docs/integration_guide/services/ |
D | tfm_attestation_integration_guide.rst | 13 TF-M Initial Attestation Service by default enables asymmetric key algorithm 14 based attestation (*asymmetric attestation* for short). Symmetric key algorithm 401 Asymmetric key algorithm based attestation 437 Symmetric key algorithm based attestation 464 It also requires the same hash operations as listed in asymmetric key algorithm 528 Comparison of asymmetric and symmetric algorithm based token authentication 625 ``Symmetric key algorithm based Initial Attestation test``.
|
/trusted-firmware-m-3.6.0/lib/ext/cryptocell-312-runtime/codesafe/src/psa_driver_api/ |
D | psa_driver_api_design.rst | 88 be called between modules, as they are usually utility functions or algorithm- 149 algorithm in AEAD. This option is enabled by default.
|