Lines Matching refs:alg

1003  * \retval PSA_SUCCESS                  When \p alg is a specific algorithm
1005 * \retval PSA_ERROR_INVALID_ARGUMENT When \p alg is not a specific algorithm
1006 * \retval PSA_ERROR_NOT_PERMITTED When \p alg is a specific algorithm, but
1011 psa_algorithm_t alg)
1014 if (alg == 0) {
1019 if (PSA_ALG_IS_WILDCARD(alg)) {
1023 if (psa_key_algorithm_permits(key_type, policy->alg, alg) ||
1024 psa_key_algorithm_permits(key_type, policy->alg2, alg)) {
1055 psa_key_policy_algorithm_intersection(key_type, policy->alg,
1056 constraint->alg);
1060 if (intersection_alg == 0 && policy->alg != 0 && constraint->alg != 0) {
1067 policy->alg = intersection_alg;
1075 * The key must have allow all the usage flags set in \p usage. If \p alg is
1076 * nonzero, the key must allow operations with this algorithm. If \p alg is
1095 psa_algorithm_t alg)
1120 if (alg != 0) {
1123 alg);
1161 psa_algorithm_t alg)
1164 usage, alg);
2293 psa_algorithm_t alg)
2303 if (!PSA_ALG_IS_HASH(alg)) {
2312 status = psa_driver_wrapper_hash_setup(operation, alg);
2426 psa_status_t psa_hash_compute(psa_algorithm_t alg,
2436 if (!PSA_ALG_IS_HASH(alg)) {
2442 status = psa_driver_wrapper_hash_compute(alg, input, input_length,
2453 psa_status_t psa_hash_compare(psa_algorithm_t alg,
2464 if (!PSA_ALG_IS_HASH(alg)) {
2471 alg, input, input_length,
2534 psa_algorithm_t alg,
2542 if (!PSA_ALG_IS_MAC(alg)) {
2547 status = psa_mac_key_can_do(alg, key_type);
2553 *mac_size = PSA_MAC_LENGTH(key_type, key_bits, alg);
2564 PSA_ALG_FULL_LENGTH_MAC(alg))) {
2588 psa_algorithm_t alg,
2605 alg);
2610 status = psa_mac_finalize_alg_and_key_validation(alg, &slot->attr,
2623 alg);
2629 alg);
2644 psa_algorithm_t alg)
2646 return psa_mac_setup(operation, key, alg, 1);
2651 psa_algorithm_t alg)
2653 return psa_mac_setup(operation, key, alg, 0);
2784 psa_algorithm_t alg,
2801 alg);
2806 status = psa_mac_finalize_alg_and_key_validation(alg, &slot->attr,
2820 alg,
2844 psa_algorithm_t alg,
2857 status = psa_mac_compute_internal(key, alg,
2871 psa_algorithm_t alg,
2884 status = psa_mac_compute_internal(key, alg,
2916 psa_algorithm_t alg)
2919 if (!PSA_ALG_IS_SIGN_MESSAGE(alg)) {
2923 if (PSA_ALG_IS_SIGN_HASH(alg)) {
2924 if (!PSA_ALG_IS_HASH(PSA_ALG_SIGN_GET_HASH(alg))) {
2929 if (!PSA_ALG_IS_SIGN_HASH(alg)) {
2939 psa_algorithm_t alg,
2952 status = psa_sign_verify_check_alg(input_is_message, alg);
2969 alg);
2983 alg, input, input_length,
2989 alg, input, input_length,
3005 psa_algorithm_t alg,
3015 status = psa_sign_verify_check_alg(input_is_message, alg);
3024 alg);
3033 alg, input, input_length,
3038 alg, input, input_length,
3052 psa_algorithm_t alg,
3061 if (PSA_ALG_IS_SIGN_HASH(alg)) {
3066 PSA_ALG_SIGN_GET_HASH(alg),
3076 alg, hash, hash_length,
3084 psa_algorithm_t alg,
3097 status = psa_sign_internal(key, 1, alg, input, input_length, signature,
3112 psa_algorithm_t alg,
3120 if (PSA_ALG_IS_SIGN_HASH(alg)) {
3125 PSA_ALG_SIGN_GET_HASH(alg),
3135 alg, hash, hash_length,
3143 psa_algorithm_t alg,
3155 status = psa_verify_internal(key, 1, alg, input, input_length, signature,
3170 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length,
3174 if (PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) ||
3175 PSA_ALG_IS_RSA_PSS(alg)) {
3181 alg, hash, hash_length,
3189 if (PSA_ALG_IS_ECDSA(alg)) {
3195 alg, hash, hash_length,
3216 psa_algorithm_t alg,
3229 status = psa_sign_internal(key, 0, alg, hash, hash_length, signature,
3244 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length,
3248 if (PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) ||
3249 PSA_ALG_IS_RSA_PSS(alg)) {
3255 alg, hash, hash_length,
3263 if (PSA_ALG_IS_ECDSA(alg)) {
3269 alg, hash, hash_length,
3289 psa_algorithm_t alg,
3301 status = psa_verify_internal(key, 0, alg, hash, hash_length, signature,
3314 psa_algorithm_t alg,
3338 if (!PSA_ALG_IS_RSA_OAEP(alg) && salt_length != 0) {
3343 key, &slot, PSA_KEY_USAGE_ENCRYPT, alg);
3358 alg, input, input_length, salt, salt_length,
3371 psa_algorithm_t alg,
3395 if (!PSA_ALG_IS_RSA_OAEP(alg) && salt_length != 0) {
3400 key, &slot, PSA_KEY_USAGE_DECRYPT, alg);
3414 alg, input, input_length, salt, salt_length,
3480 mbedtls_svc_key_id_t key, psa_algorithm_t alg,
3495 status = psa_sign_verify_check_alg(0, alg);
3503 alg);
3521 slot->key.bytes, alg,
3638 mbedtls_svc_key_id_t key, psa_algorithm_t alg,
3655 status = psa_sign_verify_check_alg(0, alg);
3663 alg);
3679 alg, hash, hash_length,
3811 size_t key_buffer_size, psa_algorithm_t alg,
3821 if (!PSA_ALG_IS_ECDSA(alg)) {
3847 psa_algorithm_t hash_alg = PSA_ALG_SIGN_GET_HASH(alg);
3849 operation->alg = alg;
3870 (void) alg;
3906 if (PSA_ALG_ECDSA_IS_DETERMINISTIC(operation->alg)) {
4025 psa_algorithm_t alg,
4037 if (!PSA_ALG_IS_ECDSA(alg)) {
4111 (void) alg;
4248 psa_algorithm_t alg,
4264 if (!PSA_ALG_IS_CIPHER(alg)) {
4269 status = psa_get_and_lock_key_slot_with_policy(key, &slot, usage, alg);
4279 if (alg == PSA_ALG_ECB_NO_PADDING) {
4284 operation->default_iv_length = PSA_CIPHER_IV_LENGTH(slot->attr.type, alg);
4292 alg);
4298 alg);
4313 psa_algorithm_t alg)
4315 return psa_cipher_setup(operation, key, alg, MBEDTLS_ENCRYPT);
4320 psa_algorithm_t alg)
4322 return psa_cipher_setup(operation, key, alg, MBEDTLS_DECRYPT);
4524 psa_algorithm_t alg,
4540 if (!PSA_ALG_IS_CIPHER(alg)) {
4547 alg);
4552 default_iv_length = PSA_CIPHER_IV_LENGTH(slot->attr.type, alg);
4575 alg, local_iv, default_iv_length, input, input_length,
4601 psa_algorithm_t alg,
4615 if (!PSA_ALG_IS_CIPHER(alg)) {
4622 alg);
4627 if (alg == PSA_ALG_CCM_STAR_NO_TAG &&
4631 } else if (input_length < PSA_CIPHER_IV_LENGTH(slot->attr.type, alg)) {
4641 alg, input, input_length,
4666 static psa_algorithm_t psa_aead_get_base_algorithm(psa_algorithm_t alg)
4668 return PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG(alg);
4672 static psa_status_t psa_aead_check_nonce_length(psa_algorithm_t alg,
4675 psa_algorithm_t base_alg = psa_aead_get_base_algorithm(alg);
4715 static psa_status_t psa_aead_check_algorithm(psa_algorithm_t alg)
4717 if (!PSA_ALG_IS_AEAD(alg) || PSA_ALG_IS_WILDCARD(alg)) {
4725 psa_algorithm_t alg,
4746 status = psa_aead_check_algorithm(alg);
4752 key, &slot, PSA_KEY_USAGE_ENCRYPT, alg);
4762 status = psa_aead_check_nonce_length(alg, nonce_length);
4769 alg,
4791 psa_algorithm_t alg,
4812 status = psa_aead_check_algorithm(alg);
4818 key, &slot, PSA_KEY_USAGE_DECRYPT, alg);
4829 status = psa_aead_check_nonce_length(alg, nonce_length);
4836 alg,
4857 static psa_status_t psa_validate_tag_length(psa_algorithm_t alg)
4859 const uint8_t tag_len = PSA_ALG_AEAD_GET_TAG_LENGTH(alg);
4861 switch (PSA_ALG_AEAD_WITH_SHORTENED_TAG(alg, 0)) {
4900 psa_algorithm_t alg)
4907 status = psa_aead_check_algorithm(alg);
4930 alg);
4935 if ((status = psa_validate_tag_length(alg)) != PSA_SUCCESS) {
4944 alg);
4950 alg);
4963 operation->alg = psa_aead_get_base_algorithm(alg);
4975 psa_algorithm_t alg)
4977 return psa_aead_setup(operation, 1, key, alg);
4983 psa_algorithm_t alg)
4985 return psa_aead_setup(operation, 0, key, alg);
5004 status = psa_aead_check_nonce_length(operation->alg, nonce_length);
5058 operation->alg);
5126 switch (operation->alg) {
5202 else if (operation->alg == PSA_ALG_CCM) {
5270 else if (operation->alg == PSA_ALG_CCM) {
5470 if (PSA_ALG_IS_KEY_AGREEMENT(operation->alg)) {
5471 return PSA_ALG_KEY_AGREEMENT_GET_KDF(operation->alg);
5473 return operation->alg;
5550 if (operation->alg == 0) {
5562 if (operation->alg == 0) {
5669 psa_algorithm_t alg)
5671 psa_algorithm_t hash_alg = PSA_ALG_HKDF_GET_HASH(alg);
5789 psa_algorithm_t alg,
5793 psa_algorithm_t hash_alg = PSA_ALG_TLS12_PRF_GET_HASH(alg);
5812 alg);
6014 if (operation->alg == 0) {
6083 psa_algorithm_t alg = operation->alg;
6085 operation->alg = alg;
6445 if (operation->alg == PSA_ALG_NONE) {
6537 static psa_status_t psa_hash_try_support(psa_algorithm_t alg)
6540 psa_status_t status = psa_hash_setup(&operation, alg);
6648 static psa_status_t psa_key_agreement_try_support(psa_algorithm_t alg)
6651 if (alg == PSA_ALG_ECDH) {
6656 if (alg == PSA_ALG_FFDH) {
6660 (void) alg;
6678 psa_algorithm_t alg)
6682 if (operation->alg != 0) {
6686 if (PSA_ALG_IS_RAW_KEY_AGREEMENT(alg)) {
6688 } else if (PSA_ALG_IS_KEY_AGREEMENT(alg)) {
6690 psa_algorithm_t kdf_alg = PSA_ALG_KEY_AGREEMENT_GET_KDF(alg);
6691 psa_algorithm_t ka_alg = PSA_ALG_KEY_AGREEMENT_GET_BASE(alg);
6703 } else if (PSA_ALG_IS_KEY_DERIVATION(alg)) {
6705 status = psa_key_derivation_setup_kdf(operation, alg);
6714 operation->alg = alg;
7425 key, &slot, PSA_KEY_USAGE_DERIVE, operation->alg);
7457 psa_algorithm_t alg,
7464 switch (alg) {
7468 key_buffer_size, alg,
7506 static psa_status_t psa_key_agreement_raw_internal(psa_algorithm_t alg,
7514 if (!PSA_ALG_IS_RAW_KEY_AGREEMENT(alg)) {
7520 private_key->key.bytes, alg,
7539 psa_algorithm_t ka_alg = PSA_ALG_KEY_AGREEMENT_GET_BASE(operation->alg);
7576 if (!PSA_ALG_IS_KEY_AGREEMENT(operation->alg)) {
7580 private_key, &slot, PSA_KEY_USAGE_DERIVE, operation->alg);
7609 psa_status_t psa_raw_key_agreement(psa_algorithm_t alg,
7625 if (!PSA_ALG_IS_KEY_AGREEMENT(alg)) {
7630 private_key, &slot, PSA_KEY_USAGE_DERIVE, alg);
7651 status = psa_key_agreement_raw_internal(alg, slot,
8413 operation->alg = cipher_suite->algorithm;
8419 if (operation->alg == PSA_ALG_JPAKE) {
8456 operation->alg);
8586 switch (operation->alg) {
8646 if (operation->alg == PSA_ALG_JPAKE) {
8666 if (operation->alg == PSA_ALG_JPAKE) {
8783 switch (operation->alg) {
8809 switch (operation->alg) {
8839 const size_t max_input_length = (size_t) PSA_PAKE_INPUT_SIZE(operation->alg,
8861 switch (operation->alg) {
8886 switch (operation->alg) {
8923 if (operation->alg == PSA_ALG_JPAKE) {