| /trusted-firmware-m-latest/platform/ext/target/arm/rse/common/ |
| D | crypto_keys.c | 28 psa_algorithm_t *algorithm, in tfm_plat_get_huk() argument 39 *algorithm = PSA_ALG_HKDF(PSA_ALG_SHA_256); in tfm_plat_get_huk() 53 psa_algorithm_t *algorithm, in tfm_plat_get_iak() argument 102 *algorithm = PSA_ALG_ECDSA(PSA_ALG_SHA_256); in tfm_plat_get_iak() 104 *algorithm = PSA_ALG_ECDSA(PSA_ALG_SHA_384); in tfm_plat_get_iak() 111 psa_set_key_algorithm(&transient_attr, *algorithm); in tfm_plat_get_iak() 158 psa_algorithm_t *algorithm, in tfm_plat_get_dak_seed() argument 169 *algorithm = PSA_ALG_HKDF(PSA_ALG_SHA_256); in tfm_plat_get_dak_seed() 185 psa_algorithm_t *algorithm, in tfm_plat_get_rot_cdi() argument 196 *algorithm = PSA_ALG_HKDF(PSA_ALG_SHA_256); in tfm_plat_get_rot_cdi() [all …]
|
| /trusted-firmware-m-latest/platform/ext/common/template/ |
| D | crypto_keys.c | 31 psa_algorithm_t *algorithm, in tfm_plat_get_huk() argument 47 *algorithm = PSA_ALG_HKDF(PSA_ALG_SHA_256); in tfm_plat_get_huk() 57 psa_algorithm_t *algorithm, in tfm_plat_get_iak() argument 78 sizeof(psa_algorithm_t), (uint8_t*)algorithm); in tfm_plat_get_iak() 91 *algorithm = PSA_ALG_ECDSA(PSA_ALG_SHA_256); in tfm_plat_get_iak()
|
| /trusted-firmware-m-latest/platform/ext/target/rpi/rp2350/ |
| D | crypto_keys.c | 23 psa_algorithm_t *algorithm, in tfm_plat_get_huk() argument 39 *algorithm = PSA_ALG_HKDF(PSA_ALG_SHA_256); in tfm_plat_get_huk() 49 psa_algorithm_t *algorithm, in tfm_plat_get_iak() argument 70 sizeof(psa_algorithm_t), (uint8_t*)algorithm); in tfm_plat_get_iak() 83 *algorithm = PSA_ALG_ECDSA(PSA_ALG_SHA_256); in tfm_plat_get_iak()
|
| /trusted-firmware-m-latest/platform/ext/target/arm/mps4/corstone315/ |
| D | crypto_keys.c | 27 psa_algorithm_t *algorithm, in tfm_plat_get_huk() argument 38 *algorithm = PSA_ALG_HKDF(PSA_ALG_SHA_256); in tfm_plat_get_huk() 52 psa_algorithm_t *algorithm, in tfm_plat_get_iak() argument 101 *algorithm = PSA_ALG_ECDSA(PSA_ALG_SHA_256); in tfm_plat_get_iak() 103 *algorithm = PSA_ALG_ECDSA(PSA_ALG_SHA_384); in tfm_plat_get_iak() 110 psa_set_key_algorithm(&transient_attr, *algorithm); in tfm_plat_get_iak()
|
| /trusted-firmware-m-latest/interface/include/psa/ |
| D | crypto_extra.h | 950 psa_algorithm_t algorithm); 1719 psa_algorithm_t algorithm; member 1729 return cipher_suite->algorithm; in psa_pake_cs_get_algorithm() 1734 psa_algorithm_t algorithm) in psa_pake_cs_set_algorithm() argument 1736 if (!PSA_ALG_IS_PAKE(algorithm)) { in psa_pake_cs_set_algorithm() 1737 cipher_suite->algorithm = 0; in psa_pake_cs_set_algorithm() 1739 cipher_suite->algorithm = algorithm; in psa_pake_cs_set_algorithm()
|
| D | crypto_se_driver.h | 176 psa_algorithm_t algorithm); 382 psa_algorithm_t algorithm, 481 psa_algorithm_t algorithm, 726 psa_algorithm_t algorithm, 768 psa_algorithm_t algorithm,
|
| D | fwu_config.h.in | 28 * on the hash algorithm used.
|
| /trusted-firmware-m-latest/secure_fw/partitions/protected_storage/ |
| D | Kconfig | 22 string "PS encryption AEAD algorithm" 25 Indicates the AEAD algorithm to use for authenticated encryption in
|
| /trusted-firmware-m-latest/docs/configuration/ |
| D | test_configuration.rst | 88 | TFM_CRYPTO_TEST_ALG_SHA_384 | Test SHA-384 cryptography algorithm | ON | 90 | TFM_CRYPTO_TEST_ALG_SHA_512 | Test SHA-512 cryptography algorithm | ON | 92 | TFM_CRYPTO_TEST_HKDF | Test HKDF key derivation algorithm | ON | 94 | TFM_CRYPTO_TEST_ECDH | Test ECDH key agreement algorithm | ON | 98 | TFM_CRYPTO_TEST_ALG_CHACHA20_POLY1305 | Test ChaCha20-Poly1305 AEAD algorithm | ON |
|
| /trusted-firmware-m-latest/docs/configuration/profiles/ |
| D | tfm_profile_medium.rst | 33 - Authenticated Encryption with Associated Data (AEAD) algorithm 34 - Asymmetric key algorithm based signature and verification 44 - Asymmetric key algorithm based Initial Attestation 97 - ECDHE_ECDSA as key exchange algorithm. 98 - AES-128-CCM (AES CCM mode with 128-bit key) as AEAD algorithm. 102 - HMAC as Message Authentication Code algorithm. 131 If usage scenarios require RSA algorithm for backward compatibility and legacy 135 AEAD algorithm 139 AEAD algorithm for PS service as the one used by TLS/DTLS cipher suite. 169 TF-M PS service relies on an AEAD algorithm to ensure data confidentiality and [all …]
|
| D | tfm_profile_large.rst | 45 - Authenticated Encryption with Associated Data (AEAD) algorithm 46 - Asymmetric key algorithm based signature and verification 58 - Asymmetric key algorithm based Initial Attestation 290 If PS is selected, AES-CCM is used as AEAD algorithm by default. If platform 291 hardware crypto accelerator supports the AEAD algorithm, the AEAD operations can 355 …FM_CRYPTO_TEST_ALG_SHA_384`` | ``OFF`` | Test SHA-384 cryptography algorithm | 357 …FM_CRYPTO_TEST_ALG_SHA_512`` | ``ON`` | Test SHA-512 cryptography algorithm | 361 …| ``TFM_CRYPTO_TEST_ECDH`` | ``ON`` | Test ECDH key agreement algorithm … 365 …FM_CRYPTO_TEST_CHACHA20_POLY1305`` | ``OFF`` | Test ChaCha20-Poly1305 AEAD algorithm |
|
| D | tfm_profile_small.rst | 39 - Advanced Encryption Standard (AES) as symmetric crypto algorithm 41 - HMAC as Message Authentication Code algorithm 124 capabilities as defined in TLS-PSK, such as one symmetric cipher algorithm 130 - AES-128-CCM (AES CCM mode with 128-bit key) as symmetric crypto algorithm 132 - HMAC as Message Authentication Code algorithm 252 It is recommended to utilize the same MAC algorithm supported in Crypto 436 algorithms based Initial Attestation, using HMAC SHA-256 as MAC algorithm in 488 …TFM_CRYPTO_TEST_ALG_SHA_384`` | ``OFF`` | Test SHA-384 cryptography algorithm | 490 …TFM_CRYPTO_TEST_ALG_SHA_512`` | ``OFF`` | Test SHA-512 cryptography algorithm | 492 …TFM_CRYPTO_TEST_HKDF`` | ``OFF`` | Test HKDF key derivation algorithm | [all …]
|
| D | tfm_profile_medium_arot-less.rst | 34 - Authenticated Encryption with Associated Data (AEAD) algorithm 35 - Asymmetric key algorithm based signature and verification 45 - Asymmetric key algorithm based Initial Attestation
|
| /trusted-firmware-m-latest/lib/ext/t_cose/src/ |
| D | t_cose_sign1_sign.c | 35 #error COSE algorithm identifier definitions are in error 39 #error COSE algorithm identifier definitions are in error 43 #error COSE algorithm identifier definitions are in error
|
| /trusted-firmware-m-latest/platform/include/ |
| D | tfm_plat_crypto_keys.h | 38 …_t buf_len, size_t *key_len, psa_key_bits_t *key_bits, psa_algorithm_t *algorithm, psa_key_type_t …
|
| /trusted-firmware-m-latest/platform/ext/cmsis/CMSIS/CoreValidation/Layer/Target/CM85/ |
| D | model_config.txt | 8 …sing the QARMA5 algorithm with BTI, 2: PAC implemented using an IMP DEF algorithm with BTI, 4: PAC…
|
| /trusted-firmware-m-latest/secure_fw/partitions/crypto/psa_driver_api/ |
| D | tfm_builtin_key_loader.c | 216 psa_algorithm_t algorithm; in tfm_builtin_key_loader_init() local 229 … &buf[0], TFM_BUILTIN_MAX_KEY_LEN, &key_len, &key_bits, &algorithm, &type); in tfm_builtin_key_loader_init() 238 psa_set_key_algorithm(&attr, algorithm); in tfm_builtin_key_loader_init()
|
| /trusted-firmware-m-latest/platform/ext/cmsis/CMSIS/CoreValidation/Layer/Target/CM85NS/ |
| D | model_config.txt | 8 …sing the QARMA5 algorithm with BTI, 2: PAC implemented using an IMP DEF algorithm with BTI, 4: PAC…
|
| /trusted-firmware-m-latest/platform/ext/cmsis/CMSIS/CoreValidation/Layer/Target/CM85S/ |
| D | model_config.txt | 8 …sing the QARMA5 algorithm with BTI, 2: PAC implemented using an IMP DEF algorithm with BTI, 4: PAC…
|
| /trusted-firmware-m-latest/secure_fw/partitions/initial_attestation/ |
| D | attest_boot_data.c | 63 get_measurement_description(psa_algorithm_t algorithm, in get_measurement_description() argument 66 switch (algorithm) { in get_measurement_description()
|
| D | Kconfig | 16 bool "Symmetric key algorithm based Initial Attestation"
|
| /trusted-firmware-m-latest/docs/design_docs/services/ |
| D | symmetric_initial_attest.rst | 2 Symmetric key algorithm based Initial Attestation 13 This document proposes a design of symmetric key algorithm based Initial 16 Symmetric key algorithm based Initial Attestation 38 for Initial Attestation based on asymmetric key algorithm 134 Only symmetric IAK for HMAC algorithm is allowed so far. 145 hash algorithm of Instance ID calculation. 319 configures option flags and algorithm used in signing. 517 | ``key_alg`` | The key algorithm. Only HMAC SHA-256 is supported so far. |
|
| /trusted-firmware-m-latest/config/profile/ |
| D | profile_medium.cmake | 28 set(PS_CRYPTO_AEAD_ALG PSA_ALG_CCM CACHE STRING "The AEAD algorithm to use for …
|
| D | profile_large.cmake | 29 set(PS_CRYPTO_AEAD_ALG PSA_ALG_CCM CACHE STRING "The AEAD algorithm to use for …
|
| /trusted-firmware-m-latest/docs/releases/ |
| D | 1.3.0.rst | 141 | algorithm in CryptoCell-312. 146 | algorithm doesn't match other parameters.
|