mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-12-02 02:14:19 +01:00
Merge pull request #4174 from gilles-peskine-arm/psa-eddsa-spec
PSA Encodings for EdDSA
This commit is contained in:
commit
b420259777
@ -709,6 +709,8 @@ psa_status_t psa_import_key(const psa_key_attributes_t *attributes,
|
|||||||
* For Weierstrass curves, this is the content of the `privateKey` field of
|
* For Weierstrass curves, this is the content of the `privateKey` field of
|
||||||
* the `ECPrivateKey` format defined by RFC 5915. For Montgomery curves,
|
* the `ECPrivateKey` format defined by RFC 5915. For Montgomery curves,
|
||||||
* the format is defined by RFC 7748, and output is masked according to §5.
|
* the format is defined by RFC 7748, and output is masked according to §5.
|
||||||
|
* For twisted Edwards curves, the private key is as defined by RFC 8032
|
||||||
|
* (a 32-byte string for Edwards25519, a 57-byte string for Edwards448).
|
||||||
* - For Diffie-Hellman key exchange key pairs (key types for which
|
* - For Diffie-Hellman key exchange key pairs (key types for which
|
||||||
* #PSA_KEY_TYPE_IS_DH_KEY_PAIR is true), the
|
* #PSA_KEY_TYPE_IS_DH_KEY_PAIR is true), the
|
||||||
* format is the representation of the private key `x` as a big-endian byte
|
* format is the representation of the private key `x` as a big-endian byte
|
||||||
@ -774,7 +776,12 @@ psa_status_t psa_export_key(mbedtls_svc_key_id_t key,
|
|||||||
* modulus INTEGER, -- n
|
* modulus INTEGER, -- n
|
||||||
* publicExponent INTEGER } -- e
|
* publicExponent INTEGER } -- e
|
||||||
* ```
|
* ```
|
||||||
* - For elliptic curve public keys (key types for which
|
* - For elliptic curve keys on a twisted Edwards curve (key types for which
|
||||||
|
* #PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY is true and #PSA_KEY_TYPE_GET_CURVE
|
||||||
|
* returns #PSA_ECC_FAMILY_TWISTED_EDWARDS), the public key is as defined
|
||||||
|
* by RFC 8032
|
||||||
|
* (a 32-byte string for Edwards25519, a 57-byte string for Edwards448).
|
||||||
|
* - For other elliptic curve public keys (key types for which
|
||||||
* #PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY is true), the format is the uncompressed
|
* #PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY is true), the format is the uncompressed
|
||||||
* representation defined by SEC1 §2.3.3 as the content of an ECPoint.
|
* representation defined by SEC1 §2.3.3 as the content of an ECPoint.
|
||||||
* Let `m` be the bit size associated with the curve, i.e. the bit size of
|
* Let `m` be the bit size associated with the curve, i.e. the bit size of
|
||||||
@ -2840,7 +2847,8 @@ psa_status_t psa_aead_abort(psa_aead_operation_t *operation);
|
|||||||
*
|
*
|
||||||
* Note that to perform a hash-and-sign signature algorithm, you must
|
* Note that to perform a hash-and-sign signature algorithm, you must
|
||||||
* first calculate the hash by calling psa_hash_setup(), psa_hash_update()
|
* first calculate the hash by calling psa_hash_setup(), psa_hash_update()
|
||||||
* and psa_hash_finish(). Then pass the resulting hash as the \p hash
|
* and psa_hash_finish(), or alternatively by calling psa_hash_compute().
|
||||||
|
* Then pass the resulting hash as the \p hash
|
||||||
* parameter to this function. You can use #PSA_ALG_SIGN_GET_HASH(\p alg)
|
* parameter to this function. You can use #PSA_ALG_SIGN_GET_HASH(\p alg)
|
||||||
* to determine the hash algorithm to use.
|
* to determine the hash algorithm to use.
|
||||||
*
|
*
|
||||||
@ -2891,7 +2899,8 @@ psa_status_t psa_sign_hash(mbedtls_svc_key_id_t key,
|
|||||||
*
|
*
|
||||||
* Note that to perform a hash-and-sign signature algorithm, you must
|
* Note that to perform a hash-and-sign signature algorithm, you must
|
||||||
* first calculate the hash by calling psa_hash_setup(), psa_hash_update()
|
* first calculate the hash by calling psa_hash_setup(), psa_hash_update()
|
||||||
* and psa_hash_finish(). Then pass the resulting hash as the \p hash
|
* and psa_hash_finish(), or alternatively by calling psa_hash_compute().
|
||||||
|
* Then pass the resulting hash as the \p hash
|
||||||
* parameter to this function. You can use #PSA_ALG_SIGN_GET_HASH(\p alg)
|
* parameter to this function. You can use #PSA_ALG_SIGN_GET_HASH(\p alg)
|
||||||
* to determine the hash algorithm to use.
|
* to determine the hash algorithm to use.
|
||||||
*
|
*
|
||||||
|
@ -410,10 +410,9 @@ psa_status_t mbedtls_psa_inject_entropy(const uint8_t *seed,
|
|||||||
|
|
||||||
/* We need to expand the sample definition of this macro from
|
/* We need to expand the sample definition of this macro from
|
||||||
* the API definition. */
|
* the API definition. */
|
||||||
#undef PSA_ALG_IS_HASH_AND_SIGN
|
#undef PSA_ALG_IS_VENDOR_HASH_AND_SIGN
|
||||||
#define PSA_ALG_IS_HASH_AND_SIGN(alg) \
|
#define PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg) \
|
||||||
(PSA_ALG_IS_RSA_PSS(alg) || PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) || \
|
PSA_ALG_IS_DSA(alg)
|
||||||
PSA_ALG_IS_DSA(alg) || PSA_ALG_IS_ECDSA(alg))
|
|
||||||
|
|
||||||
/**@}*/
|
/**@}*/
|
||||||
|
|
||||||
|
@ -423,8 +423,8 @@
|
|||||||
|
|
||||||
/** Key for a cipher or MAC algorithm based on DES or 3DES (Triple-DES).
|
/** Key for a cipher or MAC algorithm based on DES or 3DES (Triple-DES).
|
||||||
*
|
*
|
||||||
* The size of the key can be 8 bytes (single DES), 16 bytes (2-key 3DES) or
|
* The size of the key can be 64 bits (single DES), 128 bits (2-key 3DES) or
|
||||||
* 24 bytes (3-key 3DES).
|
* 192 bits (3-key 3DES).
|
||||||
*
|
*
|
||||||
* Note that single DES and 2-key 3DES are weak and strongly
|
* Note that single DES and 2-key 3DES are weak and strongly
|
||||||
* deprecated and should only be used to decrypt legacy data. 3-key 3DES
|
* deprecated and should only be used to decrypt legacy data. 3-key 3DES
|
||||||
@ -451,9 +451,15 @@
|
|||||||
*/
|
*/
|
||||||
#define PSA_KEY_TYPE_CHACHA20 ((psa_key_type_t)0x2004)
|
#define PSA_KEY_TYPE_CHACHA20 ((psa_key_type_t)0x2004)
|
||||||
|
|
||||||
/** RSA public key. */
|
/** RSA public key.
|
||||||
|
*
|
||||||
|
* The size of an RSA key is the bit size of the modulus.
|
||||||
|
*/
|
||||||
#define PSA_KEY_TYPE_RSA_PUBLIC_KEY ((psa_key_type_t)0x4001)
|
#define PSA_KEY_TYPE_RSA_PUBLIC_KEY ((psa_key_type_t)0x4001)
|
||||||
/** RSA key pair (private and public key). */
|
/** RSA key pair (private and public key).
|
||||||
|
*
|
||||||
|
* The size of an RSA key is the bit size of the modulus.
|
||||||
|
*/
|
||||||
#define PSA_KEY_TYPE_RSA_KEY_PAIR ((psa_key_type_t)0x7001)
|
#define PSA_KEY_TYPE_RSA_KEY_PAIR ((psa_key_type_t)0x7001)
|
||||||
/** Whether a key type is an RSA key (pair or public-only). */
|
/** Whether a key type is an RSA key (pair or public-only). */
|
||||||
#define PSA_KEY_TYPE_IS_RSA(type) \
|
#define PSA_KEY_TYPE_IS_RSA(type) \
|
||||||
@ -463,6 +469,10 @@
|
|||||||
#define PSA_KEY_TYPE_ECC_KEY_PAIR_BASE ((psa_key_type_t)0x7100)
|
#define PSA_KEY_TYPE_ECC_KEY_PAIR_BASE ((psa_key_type_t)0x7100)
|
||||||
#define PSA_KEY_TYPE_ECC_CURVE_MASK ((psa_key_type_t)0x00ff)
|
#define PSA_KEY_TYPE_ECC_CURVE_MASK ((psa_key_type_t)0x00ff)
|
||||||
/** Elliptic curve key pair.
|
/** Elliptic curve key pair.
|
||||||
|
*
|
||||||
|
* The size of an elliptic curve key is the bit size associated with the curve,
|
||||||
|
* i.e. the bit size of *q* for a curve over a field *F<sub>q</sub>*.
|
||||||
|
* See the documentation of `PSA_ECC_FAMILY_xxx` curve families for details.
|
||||||
*
|
*
|
||||||
* \param curve A value of type ::psa_ecc_family_t that
|
* \param curve A value of type ::psa_ecc_family_t that
|
||||||
* identifies the ECC curve to be used.
|
* identifies the ECC curve to be used.
|
||||||
@ -470,6 +480,10 @@
|
|||||||
#define PSA_KEY_TYPE_ECC_KEY_PAIR(curve) \
|
#define PSA_KEY_TYPE_ECC_KEY_PAIR(curve) \
|
||||||
(PSA_KEY_TYPE_ECC_KEY_PAIR_BASE | (curve))
|
(PSA_KEY_TYPE_ECC_KEY_PAIR_BASE | (curve))
|
||||||
/** Elliptic curve public key.
|
/** Elliptic curve public key.
|
||||||
|
*
|
||||||
|
* The size of an elliptic curve public key is the same as the corresponding
|
||||||
|
* private key (see #PSA_KEY_TYPE_ECC_KEY_PAIR and the documentation of
|
||||||
|
* `PSA_ECC_FAMILY_xxx` curve families).
|
||||||
*
|
*
|
||||||
* \param curve A value of type ::psa_ecc_family_t that
|
* \param curve A value of type ::psa_ecc_family_t that
|
||||||
* identifies the ECC curve to be used.
|
* identifies the ECC curve to be used.
|
||||||
@ -569,6 +583,22 @@
|
|||||||
*/
|
*/
|
||||||
#define PSA_ECC_FAMILY_MONTGOMERY ((psa_ecc_family_t) 0x41)
|
#define PSA_ECC_FAMILY_MONTGOMERY ((psa_ecc_family_t) 0x41)
|
||||||
|
|
||||||
|
/** The twisted Edwards curves Ed25519 and Ed448.
|
||||||
|
*
|
||||||
|
* These curves are suitable for EdDSA (#PSA_ALG_PURE_EDDSA for both curves,
|
||||||
|
* #PSA_ALG_ED25519PH for the 255-bit curve,
|
||||||
|
* #PSA_ALG_ED448PH for the 448-bit curve).
|
||||||
|
*
|
||||||
|
* This family comprises the following twisted Edwards curves:
|
||||||
|
* - 255-bit: Edwards25519, the twisted Edwards curve birationally equivalent
|
||||||
|
* to Curve25519.
|
||||||
|
* Bernstein et al., _Twisted Edwards curves_, Africacrypt 2008.
|
||||||
|
* - 448-bit: Edwards448, the twisted Edwards curve birationally equivalent
|
||||||
|
* to Curve448.
|
||||||
|
* Hamburg, _Ed448-Goldilocks, a new elliptic curve_, NIST ECC Workshop, 2015.
|
||||||
|
*/
|
||||||
|
#define PSA_ECC_FAMILY_TWISTED_EDWARDS ((psa_ecc_family_t) 0x42)
|
||||||
|
|
||||||
#define PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE ((psa_key_type_t)0x4200)
|
#define PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE ((psa_key_type_t)0x4200)
|
||||||
#define PSA_KEY_TYPE_DH_KEY_PAIR_BASE ((psa_key_type_t)0x7200)
|
#define PSA_KEY_TYPE_DH_KEY_PAIR_BASE ((psa_key_type_t)0x7200)
|
||||||
#define PSA_KEY_TYPE_DH_GROUP_MASK ((psa_key_type_t)0x00ff)
|
#define PSA_KEY_TYPE_DH_GROUP_MASK ((psa_key_type_t)0x00ff)
|
||||||
@ -787,6 +817,13 @@
|
|||||||
#define PSA_ALG_SHA3_384 ((psa_algorithm_t)0x02000012)
|
#define PSA_ALG_SHA3_384 ((psa_algorithm_t)0x02000012)
|
||||||
/** SHA3-512 */
|
/** SHA3-512 */
|
||||||
#define PSA_ALG_SHA3_512 ((psa_algorithm_t)0x02000013)
|
#define PSA_ALG_SHA3_512 ((psa_algorithm_t)0x02000013)
|
||||||
|
/** The first 512 bits (64 bytes) of the SHAKE256 output.
|
||||||
|
*
|
||||||
|
* This is the prehashing for Ed448ph (see #PSA_ALG_ED448PH). For other
|
||||||
|
* scenarios where a hash function based on SHA3/SHAKE is desired, SHA3-512
|
||||||
|
* has the same output size and a (theoretically) higher security strength.
|
||||||
|
*/
|
||||||
|
#define PSA_ALG_SHAKE256_512 ((psa_algorithm_t)0x02000015)
|
||||||
|
|
||||||
/** In a hash-and-sign algorithm policy, allow any hash algorithm.
|
/** In a hash-and-sign algorithm policy, allow any hash algorithm.
|
||||||
*
|
*
|
||||||
@ -1344,6 +1381,94 @@
|
|||||||
#define PSA_ALG_IS_RANDOMIZED_ECDSA(alg) \
|
#define PSA_ALG_IS_RANDOMIZED_ECDSA(alg) \
|
||||||
(PSA_ALG_IS_ECDSA(alg) && !PSA_ALG_ECDSA_IS_DETERMINISTIC(alg))
|
(PSA_ALG_IS_ECDSA(alg) && !PSA_ALG_ECDSA_IS_DETERMINISTIC(alg))
|
||||||
|
|
||||||
|
/** Edwards-curve digital signature algorithm without prehashing (PureEdDSA),
|
||||||
|
* using standard parameters.
|
||||||
|
*
|
||||||
|
* Contexts are not supported in the current version of this specification
|
||||||
|
* because there is no suitable signature interface that can take the
|
||||||
|
* context as a parameter. A future version of this specification may add
|
||||||
|
* suitable functions and extend this algorithm to support contexts.
|
||||||
|
*
|
||||||
|
* PureEdDSA requires an elliptic curve key on a twisted Edwards curve.
|
||||||
|
* In this specification, the following curves are supported:
|
||||||
|
* - #PSA_ECC_FAMILY_TWISTED_EDWARDS, 255-bit: Ed25519 as specified
|
||||||
|
* in RFC 8032.
|
||||||
|
* The curve is Edwards25519.
|
||||||
|
* The hash function used internally is SHA-512.
|
||||||
|
* - #PSA_ECC_FAMILY_TWISTED_EDWARDS, 448-bit: Ed448 as specified
|
||||||
|
* in RFC 8032.
|
||||||
|
* The curve is Edwards448.
|
||||||
|
* The hash function used internally is the first 114 bytes of the
|
||||||
|
* SHAKE256 output.
|
||||||
|
*
|
||||||
|
* This algorithm can be used with psa_sign_message() and
|
||||||
|
* psa_verify_message(). Since there is no prehashing, it cannot be used
|
||||||
|
* with psa_sign_hash() or psa_verify_hash().
|
||||||
|
*
|
||||||
|
* The signature format is the concatenation of R and S as defined by
|
||||||
|
* RFC 8032 §5.1.6 and §5.2.6 (a 64-byte string for Ed25519, a 114-byte
|
||||||
|
* string for Ed448).
|
||||||
|
*/
|
||||||
|
#define PSA_ALG_PURE_EDDSA ((psa_algorithm_t)0x06000800)
|
||||||
|
|
||||||
|
#define PSA_ALG_HASH_EDDSA_BASE ((psa_algorithm_t)0x06000900)
|
||||||
|
#define PSA_ALG_IS_HASH_EDDSA(alg) \
|
||||||
|
(((alg) & ~PSA_ALG_HASH_MASK) == PSA_ALG_HASH_EDDSA_BASE)
|
||||||
|
|
||||||
|
/** Edwards-curve digital signature algorithm with prehashing (HashEdDSA),
|
||||||
|
* using SHA-512 and the Edwards25519 curve.
|
||||||
|
*
|
||||||
|
* See #PSA_ALG_PURE_EDDSA regarding context support and the signature format.
|
||||||
|
*
|
||||||
|
* This algorithm is Ed25519 as specified in RFC 8032.
|
||||||
|
* The curve is Edwards25519.
|
||||||
|
* The prehash is SHA-512.
|
||||||
|
* The hash function used internally is SHA-512.
|
||||||
|
*
|
||||||
|
* This is a hash-and-sign algorithm: to calculate a signature,
|
||||||
|
* you can either:
|
||||||
|
* - call psa_sign_message() on the message;
|
||||||
|
* - or calculate the SHA-512 hash of the message
|
||||||
|
* with psa_hash_compute()
|
||||||
|
* or with a multi-part hash operation started with psa_hash_setup(),
|
||||||
|
* using the hash algorithm #PSA_ALG_SHA_512,
|
||||||
|
* then sign the calculated hash with psa_sign_hash().
|
||||||
|
* Verifying a signature is similar, using psa_verify_message() or
|
||||||
|
* psa_verify_hash() instead of the signature function.
|
||||||
|
*/
|
||||||
|
#define PSA_ALG_ED25519PH \
|
||||||
|
(PSA_ALG_HASH_EDDSA_BASE | (PSA_ALG_SHA_512 & PSA_ALG_HASH_MASK))
|
||||||
|
|
||||||
|
/** Edwards-curve digital signature algorithm with prehashing (HashEdDSA),
|
||||||
|
* using SHAKE256 and the Edwards448 curve.
|
||||||
|
*
|
||||||
|
* See #PSA_ALG_PURE_EDDSA regarding context support and the signature format.
|
||||||
|
*
|
||||||
|
* This algorithm is Ed448 as specified in RFC 8032.
|
||||||
|
* The curve is Edwards448.
|
||||||
|
* The prehash is the first 64 bytes of the SHAKE256 output.
|
||||||
|
* The hash function used internally is the first 114 bytes of the
|
||||||
|
* SHAKE256 output.
|
||||||
|
*
|
||||||
|
* This is a hash-and-sign algorithm: to calculate a signature,
|
||||||
|
* you can either:
|
||||||
|
* - call psa_sign_message() on the message;
|
||||||
|
* - or calculate the first 64 bytes of the SHAKE256 output of the message
|
||||||
|
* with psa_hash_compute()
|
||||||
|
* or with a multi-part hash operation started with psa_hash_setup(),
|
||||||
|
* using the hash algorithm #PSA_ALG_SHAKE256_512,
|
||||||
|
* then sign the calculated hash with psa_sign_hash().
|
||||||
|
* Verifying a signature is similar, using psa_verify_message() or
|
||||||
|
* psa_verify_hash() instead of the signature function.
|
||||||
|
*/
|
||||||
|
#define PSA_ALG_ED448PH \
|
||||||
|
(PSA_ALG_HASH_EDDSA_BASE | (PSA_ALG_SHAKE256_512 & PSA_ALG_HASH_MASK))
|
||||||
|
|
||||||
|
/* Default definition, to be overridden if the library is extended with
|
||||||
|
* more hash-and-sign algorithms that we want to keep out of this header
|
||||||
|
* file. */
|
||||||
|
#define PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg) 0
|
||||||
|
|
||||||
/** Whether the specified algorithm is a hash-and-sign algorithm.
|
/** Whether the specified algorithm is a hash-and-sign algorithm.
|
||||||
*
|
*
|
||||||
* Hash-and-sign algorithms are asymmetric (public-key) signature algorithms
|
* Hash-and-sign algorithms are asymmetric (public-key) signature algorithms
|
||||||
@ -1359,7 +1484,8 @@
|
|||||||
*/
|
*/
|
||||||
#define PSA_ALG_IS_HASH_AND_SIGN(alg) \
|
#define PSA_ALG_IS_HASH_AND_SIGN(alg) \
|
||||||
(PSA_ALG_IS_RSA_PSS(alg) || PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) || \
|
(PSA_ALG_IS_RSA_PSS(alg) || PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) || \
|
||||||
PSA_ALG_IS_ECDSA(alg))
|
PSA_ALG_IS_ECDSA(alg) || PSA_ALG_IS_HASH_EDDSA(alg) || \
|
||||||
|
PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg))
|
||||||
|
|
||||||
/** Get the hash used by a hash-and-sign signature algorithm.
|
/** Get the hash used by a hash-and-sign signature algorithm.
|
||||||
*
|
*
|
||||||
|
@ -239,7 +239,7 @@ psa/key_ladder_demo$(EXEXT): psa/key_ladder_demo.c $(DEP)
|
|||||||
echo " CC psa/key_ladder_demo.c"
|
echo " CC psa/key_ladder_demo.c"
|
||||||
$(CC) $(LOCAL_CFLAGS) $(CFLAGS) psa/key_ladder_demo.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
|
$(CC) $(LOCAL_CFLAGS) $(CFLAGS) psa/key_ladder_demo.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
|
||||||
|
|
||||||
psa/psa_constant_names$(EXEXT): psa/psa_constant_names.c $(DEP)
|
psa/psa_constant_names$(EXEXT): psa/psa_constant_names.c psa/psa_constant_names_generated.c $(DEP)
|
||||||
echo " CC psa/psa_constant_names.c"
|
echo " CC psa/psa_constant_names.c"
|
||||||
$(CC) $(LOCAL_CFLAGS) $(CFLAGS) psa/psa_constant_names.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
|
$(CC) $(LOCAL_CFLAGS) $(CFLAGS) psa/psa_constant_names.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
|
||||||
|
|
||||||
|
@ -40,6 +40,7 @@ static const char *psa_ecc_family_name(psa_ecc_family_t curve)
|
|||||||
case PSA_ECC_FAMILY_SECT_K1: return "PSA_ECC_FAMILY_SECT_K1";
|
case PSA_ECC_FAMILY_SECT_K1: return "PSA_ECC_FAMILY_SECT_K1";
|
||||||
case PSA_ECC_FAMILY_SECT_R1: return "PSA_ECC_FAMILY_SECT_R1";
|
case PSA_ECC_FAMILY_SECT_R1: return "PSA_ECC_FAMILY_SECT_R1";
|
||||||
case PSA_ECC_FAMILY_SECT_R2: return "PSA_ECC_FAMILY_SECT_R2";
|
case PSA_ECC_FAMILY_SECT_R2: return "PSA_ECC_FAMILY_SECT_R2";
|
||||||
|
case PSA_ECC_FAMILY_TWISTED_EDWARDS: return "PSA_ECC_FAMILY_TWISTED_EDWARDS";
|
||||||
default: return NULL;
|
default: return NULL;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -66,6 +67,7 @@ static const char *psa_hash_algorithm_name(psa_algorithm_t hash_alg)
|
|||||||
case PSA_ALG_SHA3_256: return "PSA_ALG_SHA3_256";
|
case PSA_ALG_SHA3_256: return "PSA_ALG_SHA3_256";
|
||||||
case PSA_ALG_SHA3_384: return "PSA_ALG_SHA3_384";
|
case PSA_ALG_SHA3_384: return "PSA_ALG_SHA3_384";
|
||||||
case PSA_ALG_SHA3_512: return "PSA_ALG_SHA3_512";
|
case PSA_ALG_SHA3_512: return "PSA_ALG_SHA3_512";
|
||||||
|
case PSA_ALG_SHAKE256_512: return "PSA_ALG_SHAKE256_512";
|
||||||
case PSA_ALG_SHA_1: return "PSA_ALG_SHA_1";
|
case PSA_ALG_SHA_1: return "PSA_ALG_SHA_1";
|
||||||
case PSA_ALG_SHA_224: return "PSA_ALG_SHA_224";
|
case PSA_ALG_SHA_224: return "PSA_ALG_SHA_224";
|
||||||
case PSA_ALG_SHA_256: return "PSA_ALG_SHA_256";
|
case PSA_ALG_SHA_256: return "PSA_ALG_SHA_256";
|
||||||
@ -208,14 +210,18 @@ static int psa_snprint_algorithm(char *buffer, size_t buffer_size,
|
|||||||
case PSA_ALG_ECB_NO_PADDING: append(&buffer, buffer_size, &required_size, "PSA_ALG_ECB_NO_PADDING", 22); break;
|
case PSA_ALG_ECB_NO_PADDING: append(&buffer, buffer_size, &required_size, "PSA_ALG_ECB_NO_PADDING", 22); break;
|
||||||
case PSA_ALG_ECDH: append(&buffer, buffer_size, &required_size, "PSA_ALG_ECDH", 12); break;
|
case PSA_ALG_ECDH: append(&buffer, buffer_size, &required_size, "PSA_ALG_ECDH", 12); break;
|
||||||
case PSA_ALG_ECDSA_ANY: append(&buffer, buffer_size, &required_size, "PSA_ALG_ECDSA_ANY", 17); break;
|
case PSA_ALG_ECDSA_ANY: append(&buffer, buffer_size, &required_size, "PSA_ALG_ECDSA_ANY", 17); break;
|
||||||
|
case PSA_ALG_ED25519PH: append(&buffer, buffer_size, &required_size, "PSA_ALG_ED25519PH", 17); break;
|
||||||
|
case PSA_ALG_ED448PH: append(&buffer, buffer_size, &required_size, "PSA_ALG_ED448PH", 15); break;
|
||||||
case PSA_ALG_FFDH: append(&buffer, buffer_size, &required_size, "PSA_ALG_FFDH", 12); break;
|
case PSA_ALG_FFDH: append(&buffer, buffer_size, &required_size, "PSA_ALG_FFDH", 12); break;
|
||||||
case PSA_ALG_GCM: append(&buffer, buffer_size, &required_size, "PSA_ALG_GCM", 11); break;
|
case PSA_ALG_GCM: append(&buffer, buffer_size, &required_size, "PSA_ALG_GCM", 11); break;
|
||||||
|
case PSA_ALG_HASH_EDDSA_BASE: append(&buffer, buffer_size, &required_size, "PSA_ALG_HASH_EDDSA_BASE", 23); break;
|
||||||
case PSA_ALG_HKDF_BASE: append(&buffer, buffer_size, &required_size, "PSA_ALG_HKDF_BASE", 17); break;
|
case PSA_ALG_HKDF_BASE: append(&buffer, buffer_size, &required_size, "PSA_ALG_HKDF_BASE", 17); break;
|
||||||
case PSA_ALG_HMAC_BASE: append(&buffer, buffer_size, &required_size, "PSA_ALG_HMAC_BASE", 17); break;
|
case PSA_ALG_HMAC_BASE: append(&buffer, buffer_size, &required_size, "PSA_ALG_HMAC_BASE", 17); break;
|
||||||
case PSA_ALG_MD2: append(&buffer, buffer_size, &required_size, "PSA_ALG_MD2", 11); break;
|
case PSA_ALG_MD2: append(&buffer, buffer_size, &required_size, "PSA_ALG_MD2", 11); break;
|
||||||
case PSA_ALG_MD4: append(&buffer, buffer_size, &required_size, "PSA_ALG_MD4", 11); break;
|
case PSA_ALG_MD4: append(&buffer, buffer_size, &required_size, "PSA_ALG_MD4", 11); break;
|
||||||
case PSA_ALG_MD5: append(&buffer, buffer_size, &required_size, "PSA_ALG_MD5", 11); break;
|
case PSA_ALG_MD5: append(&buffer, buffer_size, &required_size, "PSA_ALG_MD5", 11); break;
|
||||||
case PSA_ALG_OFB: append(&buffer, buffer_size, &required_size, "PSA_ALG_OFB", 11); break;
|
case PSA_ALG_OFB: append(&buffer, buffer_size, &required_size, "PSA_ALG_OFB", 11); break;
|
||||||
|
case PSA_ALG_PURE_EDDSA: append(&buffer, buffer_size, &required_size, "PSA_ALG_PURE_EDDSA", 18); break;
|
||||||
case PSA_ALG_RIPEMD160: append(&buffer, buffer_size, &required_size, "PSA_ALG_RIPEMD160", 17); break;
|
case PSA_ALG_RIPEMD160: append(&buffer, buffer_size, &required_size, "PSA_ALG_RIPEMD160", 17); break;
|
||||||
case PSA_ALG_RSA_OAEP_BASE: append(&buffer, buffer_size, &required_size, "PSA_ALG_RSA_OAEP_BASE", 21); break;
|
case PSA_ALG_RSA_OAEP_BASE: append(&buffer, buffer_size, &required_size, "PSA_ALG_RSA_OAEP_BASE", 21); break;
|
||||||
case PSA_ALG_RSA_PKCS1V15_CRYPT: append(&buffer, buffer_size, &required_size, "PSA_ALG_RSA_PKCS1V15_CRYPT", 26); break;
|
case PSA_ALG_RSA_PKCS1V15_CRYPT: append(&buffer, buffer_size, &required_size, "PSA_ALG_RSA_PKCS1V15_CRYPT", 26); break;
|
||||||
@ -225,6 +231,7 @@ static int psa_snprint_algorithm(char *buffer, size_t buffer_size,
|
|||||||
case PSA_ALG_SHA3_256: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA3_256", 16); break;
|
case PSA_ALG_SHA3_256: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA3_256", 16); break;
|
||||||
case PSA_ALG_SHA3_384: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA3_384", 16); break;
|
case PSA_ALG_SHA3_384: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA3_384", 16); break;
|
||||||
case PSA_ALG_SHA3_512: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA3_512", 16); break;
|
case PSA_ALG_SHA3_512: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA3_512", 16); break;
|
||||||
|
case PSA_ALG_SHAKE256_512: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHAKE256_512", 20); break;
|
||||||
case PSA_ALG_SHA_1: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA_1", 13); break;
|
case PSA_ALG_SHA_1: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA_1", 13); break;
|
||||||
case PSA_ALG_SHA_224: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA_224", 15); break;
|
case PSA_ALG_SHA_224: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA_224", 15); break;
|
||||||
case PSA_ALG_SHA_256: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA_256", 15); break;
|
case PSA_ALG_SHA_256: append(&buffer, buffer_size, &required_size, "PSA_ALG_SHA_256", 15); break;
|
||||||
|
@ -123,6 +123,12 @@ ASYMMETRIC_KEY_DATA = construct_asymmetric_key_data({
|
|||||||
448: ("e4e49f52686f9ee3b638528f721f1596196ffd0a1cddb64c3f216f06541805cfeb1a286dc78018095cdfec050e8007b5f4908962ba20d6c1",
|
448: ("e4e49f52686f9ee3b638528f721f1596196ffd0a1cddb64c3f216f06541805cfeb1a286dc78018095cdfec050e8007b5f4908962ba20d6c1",
|
||||||
"c0d3a5a2b416a573dc9909f92f134ac01323ab8f8e36804e578588ba2d09fe7c3e737f771ca112825b548a0ffded6d6a2fd09a3e77dec30e"),
|
"c0d3a5a2b416a573dc9909f92f134ac01323ab8f8e36804e578588ba2d09fe7c3e737f771ca112825b548a0ffded6d6a2fd09a3e77dec30e"),
|
||||||
},
|
},
|
||||||
|
'ECC(PSA_ECC_FAMILY_TWISTED_EDWARDS)': {
|
||||||
|
255: ("9d61b19deffd5a60ba844af492ec2cc44449c5697b326919703bac031cae7f60",
|
||||||
|
"d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a"),
|
||||||
|
448: ("6c82a562cb808d10d632be89c8513ebf6c929f34ddfa8c9f63c9960ef6e348a3528c8a3fcc2f044e39a3fc5b94492f8f032e7549a20098f95b",
|
||||||
|
"5fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180"),
|
||||||
|
},
|
||||||
'RSA': {
|
'RSA': {
|
||||||
1024: ("""
|
1024: ("""
|
||||||
3082025e
|
3082025e
|
||||||
|
@ -78,6 +78,7 @@ class KeyType:
|
|||||||
'PSA_ECC_FAMILY_SECT_R2': (163,),
|
'PSA_ECC_FAMILY_SECT_R2': (163,),
|
||||||
'PSA_ECC_FAMILY_BRAINPOOL_P_R1': (160, 192, 224, 256, 320, 384, 512),
|
'PSA_ECC_FAMILY_BRAINPOOL_P_R1': (160, 192, 224, 256, 320, 384, 512),
|
||||||
'PSA_ECC_FAMILY_MONTGOMERY': (255, 448),
|
'PSA_ECC_FAMILY_MONTGOMERY': (255, 448),
|
||||||
|
'PSA_ECC_FAMILY_TWISTED_EDWARDS': (255, 448),
|
||||||
}
|
}
|
||||||
KEY_TYPE_SIZES = {
|
KEY_TYPE_SIZES = {
|
||||||
'PSA_KEY_TYPE_AES': (128, 192, 256), # exhaustive
|
'PSA_KEY_TYPE_AES': (128, 192, 256), # exhaustive
|
||||||
|
@ -170,6 +170,18 @@ Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256
|
|||||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_256
|
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_256
|
||||||
asymmetric_signature_algorithm:PSA_ALG_DETERMINISTIC_ECDSA( PSA_ALG_SHA_256 ):ALG_IS_ECDSA | ALG_IS_DETERMINISTIC_ECDSA | ALG_ECDSA_IS_DETERMINISTIC | ALG_IS_HASH_AND_SIGN
|
asymmetric_signature_algorithm:PSA_ALG_DETERMINISTIC_ECDSA( PSA_ALG_SHA_256 ):ALG_IS_ECDSA | ALG_IS_DETERMINISTIC_ECDSA | ALG_ECDSA_IS_DETERMINISTIC | ALG_IS_HASH_AND_SIGN
|
||||||
|
|
||||||
|
Asymmetric signature: pure EdDSA
|
||||||
|
depends_on:PSA_WANT_ALG_EDDSA
|
||||||
|
asymmetric_signature_algorithm:PSA_ALG_PURE_EDDSA:0
|
||||||
|
|
||||||
|
Asymmetric signature: Ed25519ph
|
||||||
|
depends_on:PSA_WANT_ALG_EDDSA
|
||||||
|
asymmetric_signature_algorithm:PSA_ALG_ED25519PH:ALG_IS_HASH_EDDSA | ALG_IS_HASH_AND_SIGN
|
||||||
|
|
||||||
|
Asymmetric signature: Ed448ph
|
||||||
|
depends_on:PSA_WANT_ALG_EDDSA
|
||||||
|
asymmetric_signature_algorithm:PSA_ALG_ED448PH:ALG_IS_HASH_EDDSA | ALG_IS_HASH_AND_SIGN
|
||||||
|
|
||||||
Asymmetric signature: RSA PKCS#1 v1.5 with wildcard hash
|
Asymmetric signature: RSA PKCS#1 v1.5 with wildcard hash
|
||||||
depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
|
depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
|
||||||
asymmetric_signature_wildcard:PSA_ALG_RSA_PKCS1V15_SIGN( PSA_ALG_ANY_HASH ):ALG_IS_RSA_PKCS1V15_SIGN
|
asymmetric_signature_wildcard:PSA_ALG_RSA_PKCS1V15_SIGN( PSA_ALG_ANY_HASH ):ALG_IS_RSA_PKCS1V15_SIGN
|
||||||
@ -304,5 +316,8 @@ ecc_key_family:PSA_ECC_FAMILY_BRAINPOOL_P_R1
|
|||||||
ECC key family: Montgomery (Curve25519, Curve448)
|
ECC key family: Montgomery (Curve25519, Curve448)
|
||||||
ecc_key_family:PSA_ECC_FAMILY_MONTGOMERY
|
ecc_key_family:PSA_ECC_FAMILY_MONTGOMERY
|
||||||
|
|
||||||
|
ECC key family: Twisted Edwards (Ed25519, Ed448)
|
||||||
|
ecc_key_family:PSA_ECC_FAMILY_TWISTED_EDWARDS
|
||||||
|
|
||||||
DH group family: RFC 7919
|
DH group family: RFC 7919
|
||||||
dh_key_family:PSA_DH_FAMILY_RFC7919
|
dh_key_family:PSA_DH_FAMILY_RFC7919
|
||||||
|
@ -30,16 +30,17 @@
|
|||||||
#define ALG_ECDSA_IS_DETERMINISTIC ( 1u << 11 )
|
#define ALG_ECDSA_IS_DETERMINISTIC ( 1u << 11 )
|
||||||
#define ALG_IS_DETERMINISTIC_ECDSA ( 1u << 12 )
|
#define ALG_IS_DETERMINISTIC_ECDSA ( 1u << 12 )
|
||||||
#define ALG_IS_RANDOMIZED_ECDSA ( 1u << 13 )
|
#define ALG_IS_RANDOMIZED_ECDSA ( 1u << 13 )
|
||||||
#define ALG_IS_HASH_AND_SIGN ( 1u << 14 )
|
#define ALG_IS_HASH_EDDSA ( 1u << 14 )
|
||||||
#define ALG_IS_RSA_OAEP ( 1u << 15 )
|
#define ALG_IS_HASH_AND_SIGN ( 1u << 15 )
|
||||||
#define ALG_IS_HKDF ( 1u << 16 )
|
#define ALG_IS_RSA_OAEP ( 1u << 16 )
|
||||||
#define ALG_IS_FFDH ( 1u << 17 )
|
#define ALG_IS_HKDF ( 1u << 17 )
|
||||||
#define ALG_IS_ECDH ( 1u << 18 )
|
#define ALG_IS_FFDH ( 1u << 18 )
|
||||||
#define ALG_IS_WILDCARD ( 1u << 19 )
|
#define ALG_IS_ECDH ( 1u << 19 )
|
||||||
#define ALG_IS_RAW_KEY_AGREEMENT ( 1u << 20 )
|
#define ALG_IS_WILDCARD ( 1u << 20 )
|
||||||
#define ALG_IS_AEAD_ON_BLOCK_CIPHER ( 1u << 21 )
|
#define ALG_IS_RAW_KEY_AGREEMENT ( 1u << 21 )
|
||||||
#define ALG_IS_TLS12_PRF ( 1u << 22 )
|
#define ALG_IS_AEAD_ON_BLOCK_CIPHER ( 1u << 22 )
|
||||||
#define ALG_IS_TLS12_PSK_TO_MS ( 1u << 23 )
|
#define ALG_IS_TLS12_PRF ( 1u << 23 )
|
||||||
|
#define ALG_IS_TLS12_PSK_TO_MS ( 1u << 24 )
|
||||||
|
|
||||||
/* Flags for key type classification macros. There is a flag for every
|
/* Flags for key type classification macros. There is a flag for every
|
||||||
* key type classification macro PSA_KEY_TYPE_IS_xxx except for some that
|
* key type classification macro PSA_KEY_TYPE_IS_xxx except for some that
|
||||||
@ -97,6 +98,7 @@ void algorithm_classification( psa_algorithm_t alg, unsigned flags )
|
|||||||
TEST_CLASSIFICATION_MACRO( ALG_ECDSA_IS_DETERMINISTIC, alg, flags );
|
TEST_CLASSIFICATION_MACRO( ALG_ECDSA_IS_DETERMINISTIC, alg, flags );
|
||||||
TEST_CLASSIFICATION_MACRO( ALG_IS_DETERMINISTIC_ECDSA, alg, flags );
|
TEST_CLASSIFICATION_MACRO( ALG_IS_DETERMINISTIC_ECDSA, alg, flags );
|
||||||
TEST_CLASSIFICATION_MACRO( ALG_IS_RANDOMIZED_ECDSA, alg, flags );
|
TEST_CLASSIFICATION_MACRO( ALG_IS_RANDOMIZED_ECDSA, alg, flags );
|
||||||
|
TEST_CLASSIFICATION_MACRO( ALG_IS_HASH_EDDSA, alg, flags );
|
||||||
TEST_CLASSIFICATION_MACRO( ALG_IS_HASH_AND_SIGN, alg, flags );
|
TEST_CLASSIFICATION_MACRO( ALG_IS_HASH_AND_SIGN, alg, flags );
|
||||||
TEST_CLASSIFICATION_MACRO( ALG_IS_RSA_OAEP, alg, flags );
|
TEST_CLASSIFICATION_MACRO( ALG_IS_RSA_OAEP, alg, flags );
|
||||||
TEST_CLASSIFICATION_MACRO( ALG_IS_HKDF, alg, flags );
|
TEST_CLASSIFICATION_MACRO( ALG_IS_HKDF, alg, flags );
|
||||||
|
@ -965,4 +965,58 @@ PSA import ECC_PUBLIC_KEY(SECT_R2) 163-bit curve not supported
|
|||||||
depends_on:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY:!PSA_WANT_ECC_SECT_R2_163:DEPENDENCY_NOT_IMPLEMENTED_YET
|
depends_on:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY:!PSA_WANT_ECC_SECT_R2_163:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
import_not_supported:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_SECT_R2):"0403692601144c32a6cfa369ae20ae5d43c1c764678c037bafe80c6fd2e42b7ced96171d9c5367fd3dca6f"
|
import_not_supported:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_SECT_R2):"0403692601144c32a6cfa369ae20ae5d43c1c764678c037bafe80c6fd2e42b7ced96171d9c5367fd3dca6f"
|
||||||
|
|
||||||
|
PSA import ECC_KEY_PAIR(TWISTED_EDWARDS) 255-bit type not supported
|
||||||
|
depends_on:!PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_TWISTED_EDWARDS_255:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
import_not_supported:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):"9d61b19deffd5a60ba844af492ec2cc44449c5697b326919703bac031cae7f60"
|
||||||
|
|
||||||
|
PSA generate ECC_KEY_PAIR(TWISTED_EDWARDS) 255-bit type not supported
|
||||||
|
depends_on:!PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_TWISTED_EDWARDS_255:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
generate_not_supported:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):255
|
||||||
|
|
||||||
|
PSA import ECC_KEY_PAIR(TWISTED_EDWARDS) 448-bit type not supported
|
||||||
|
depends_on:!PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_TWISTED_EDWARDS_448:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
import_not_supported:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):"6c82a562cb808d10d632be89c8513ebf6c929f34ddfa8c9f63c9960ef6e348a3528c8a3fcc2f044e39a3fc5b94492f8f032e7549a20098f95b"
|
||||||
|
|
||||||
|
PSA generate ECC_KEY_PAIR(TWISTED_EDWARDS) 448-bit type not supported
|
||||||
|
depends_on:!PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_TWISTED_EDWARDS_448:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
generate_not_supported:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):448
|
||||||
|
|
||||||
|
PSA import ECC_KEY_PAIR(TWISTED_EDWARDS) 255-bit curve not supported
|
||||||
|
depends_on:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:!PSA_WANT_ECC_TWISTED_EDWARDS_255:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
import_not_supported:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):"9d61b19deffd5a60ba844af492ec2cc44449c5697b326919703bac031cae7f60"
|
||||||
|
|
||||||
|
PSA generate ECC_KEY_PAIR(TWISTED_EDWARDS) 255-bit curve not supported
|
||||||
|
depends_on:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:!PSA_WANT_ECC_TWISTED_EDWARDS_255:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
generate_not_supported:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):255
|
||||||
|
|
||||||
|
PSA import ECC_KEY_PAIR(TWISTED_EDWARDS) 448-bit curve not supported
|
||||||
|
depends_on:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:!PSA_WANT_ECC_TWISTED_EDWARDS_448:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
import_not_supported:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):"6c82a562cb808d10d632be89c8513ebf6c929f34ddfa8c9f63c9960ef6e348a3528c8a3fcc2f044e39a3fc5b94492f8f032e7549a20098f95b"
|
||||||
|
|
||||||
|
PSA generate ECC_KEY_PAIR(TWISTED_EDWARDS) 448-bit curve not supported
|
||||||
|
depends_on:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:!PSA_WANT_ECC_TWISTED_EDWARDS_448:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
generate_not_supported:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):448
|
||||||
|
|
||||||
|
PSA import ECC_PUBLIC_KEY(TWISTED_EDWARDS) 255-bit type not supported
|
||||||
|
depends_on:!PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY:PSA_WANT_ECC_TWISTED_EDWARDS_255:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
import_not_supported:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS):"d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a"
|
||||||
|
|
||||||
|
PSA generate ECC_PUBLIC_KEY(TWISTED_EDWARDS) 255-bit type never supported
|
||||||
|
generate_not_supported:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS):255
|
||||||
|
|
||||||
|
PSA import ECC_PUBLIC_KEY(TWISTED_EDWARDS) 448-bit type not supported
|
||||||
|
depends_on:!PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY:PSA_WANT_ECC_TWISTED_EDWARDS_448:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
import_not_supported:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS):"5fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180"
|
||||||
|
|
||||||
|
PSA generate ECC_PUBLIC_KEY(TWISTED_EDWARDS) 448-bit type never supported
|
||||||
|
generate_not_supported:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS):448
|
||||||
|
|
||||||
|
PSA import ECC_PUBLIC_KEY(TWISTED_EDWARDS) 255-bit curve not supported
|
||||||
|
depends_on:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY:!PSA_WANT_ECC_TWISTED_EDWARDS_255:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
import_not_supported:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS):"d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a"
|
||||||
|
|
||||||
|
PSA import ECC_PUBLIC_KEY(TWISTED_EDWARDS) 448-bit curve not supported
|
||||||
|
depends_on:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY:!PSA_WANT_ECC_TWISTED_EDWARDS_448:DEPENDENCY_NOT_IMPLEMENTED_YET
|
||||||
|
import_not_supported:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS):"5fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180"
|
||||||
|
|
||||||
# End of automatically generated file.
|
# End of automatically generated file.
|
||||||
|
@ -292,6 +292,14 @@ PSA storage save: type: ECC_KEY_PAIR(SECT_R2) 163-bit
|
|||||||
depends_on:PSA_WANT_ECC_SECT_R2_163:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR
|
depends_on:PSA_WANT_ECC_SECT_R2_163:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR
|
||||||
key_storage_save:0x0001:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECT_R2):163:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"0210b482a458b4822d0cb21daa96819a67c8062d34":"505341004b45590000000000010000002b71a300010000000000000000000000150000000210b482a458b4822d0cb21daa96819a67c8062d34"
|
key_storage_save:0x0001:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECT_R2):163:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"0210b482a458b4822d0cb21daa96819a67c8062d34":"505341004b45590000000000010000002b71a300010000000000000000000000150000000210b482a458b4822d0cb21daa96819a67c8062d34"
|
||||||
|
|
||||||
|
PSA storage save: type: ECC_KEY_PAIR(TWISTED_EDWARDS) 255-bit
|
||||||
|
depends_on:PSA_WANT_ECC_TWISTED_EDWARDS_255:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):255:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"9d61b19deffd5a60ba844af492ec2cc44449c5697b326919703bac031cae7f60":"505341004b45590000000000010000004271ff00010000000000000000000000200000009d61b19deffd5a60ba844af492ec2cc44449c5697b326919703bac031cae7f60"
|
||||||
|
|
||||||
|
PSA storage save: type: ECC_KEY_PAIR(TWISTED_EDWARDS) 448-bit
|
||||||
|
depends_on:PSA_WANT_ECC_TWISTED_EDWARDS_448:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):448:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"6c82a562cb808d10d632be89c8513ebf6c929f34ddfa8c9f63c9960ef6e348a3528c8a3fcc2f044e39a3fc5b94492f8f032e7549a20098f95b":"505341004b45590000000000010000004271c001010000000000000000000000390000006c82a562cb808d10d632be89c8513ebf6c929f34ddfa8c9f63c9960ef6e348a3528c8a3fcc2f044e39a3fc5b94492f8f032e7549a20098f95b"
|
||||||
|
|
||||||
PSA storage save: type: ECC_PUBLIC_KEY(BRAINPOOL_P_R1) 160-bit
|
PSA storage save: type: ECC_PUBLIC_KEY(BRAINPOOL_P_R1) 160-bit
|
||||||
depends_on:PSA_WANT_ECC_BRAINPOOL_P_R1_160:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
depends_on:PSA_WANT_ECC_BRAINPOOL_P_R1_160:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
||||||
key_storage_save:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_BRAINPOOL_P_R1):160:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"04d4b9186816358e2f9c59cf70748cb70641b22fbab65473db4b4e22a361ed7e3de7e8a8ddc4130c5c":"505341004b45590000000000010000003041a0000100000000000000000000002900000004d4b9186816358e2f9c59cf70748cb70641b22fbab65473db4b4e22a361ed7e3de7e8a8ddc4130c5c"
|
key_storage_save:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_BRAINPOOL_P_R1):160:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"04d4b9186816358e2f9c59cf70748cb70641b22fbab65473db4b4e22a361ed7e3de7e8a8ddc4130c5c":"505341004b45590000000000010000003041a0000100000000000000000000002900000004d4b9186816358e2f9c59cf70748cb70641b22fbab65473db4b4e22a361ed7e3de7e8a8ddc4130c5c"
|
||||||
@ -408,6 +416,14 @@ PSA storage save: type: ECC_PUBLIC_KEY(SECT_R2) 163-bit
|
|||||||
depends_on:PSA_WANT_ECC_SECT_R2_163:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
depends_on:PSA_WANT_ECC_SECT_R2_163:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
||||||
key_storage_save:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_SECT_R2):163:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"0403692601144c32a6cfa369ae20ae5d43c1c764678c037bafe80c6fd2e42b7ced96171d9c5367fd3dca6f":"505341004b45590000000000010000002b41a3000100000000000000000000002b0000000403692601144c32a6cfa369ae20ae5d43c1c764678c037bafe80c6fd2e42b7ced96171d9c5367fd3dca6f"
|
key_storage_save:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_SECT_R2):163:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"0403692601144c32a6cfa369ae20ae5d43c1c764678c037bafe80c6fd2e42b7ced96171d9c5367fd3dca6f":"505341004b45590000000000010000002b41a3000100000000000000000000002b0000000403692601144c32a6cfa369ae20ae5d43c1c764678c037bafe80c6fd2e42b7ced96171d9c5367fd3dca6f"
|
||||||
|
|
||||||
|
PSA storage save: type: ECC_PUBLIC_KEY(TWISTED_EDWARDS) 255-bit
|
||||||
|
depends_on:PSA_WANT_ECC_TWISTED_EDWARDS_255:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS):255:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a":"505341004b45590000000000010000004241ff0001000000000000000000000020000000d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a"
|
||||||
|
|
||||||
|
PSA storage save: type: ECC_PUBLIC_KEY(TWISTED_EDWARDS) 448-bit
|
||||||
|
depends_on:PSA_WANT_ECC_TWISTED_EDWARDS_448:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS):448:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"5fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180":"505341004b45590000000000010000004241c001010000000000000000000000390000005fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180"
|
||||||
|
|
||||||
PSA storage save: alg: PSA_ALG_ANY_HASH
|
PSA storage save: alg: PSA_ALG_ANY_HASH
|
||||||
depends_on:PSA_WANT_ALG_ANY_HASH:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_ANY_HASH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_ANY_HASH:0x0000:"4b":"505341004b45590000000000010000000110080001000000ff00000200000000010000004b"
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_ANY_HASH:0x0000:"4b":"505341004b45590000000000010000000110080001000000ff00000200000000010000004b"
|
||||||
@ -504,6 +520,22 @@ PSA storage save: alg2: PSA_ALG_ECDSA_ANY
|
|||||||
depends_on:PSA_WANT_ALG_ECDSA_ANY:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_ECDSA_ANY:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_ECDSA_ANY:"4c":"505341004b455900000000000100000001100800010000000000000000060006010000004c"
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_ECDSA_ANY:"4c":"505341004b455900000000000100000001100800010000000000000000060006010000004c"
|
||||||
|
|
||||||
|
PSA storage save: alg: PSA_ALG_ED25519PH
|
||||||
|
depends_on:PSA_WANT_ALG_ED25519PH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_ED25519PH:0x0000:"4b":"505341004b455900000000000100000001100800010000000b09000600000000010000004b"
|
||||||
|
|
||||||
|
PSA storage save: alg2: PSA_ALG_ED25519PH
|
||||||
|
depends_on:PSA_WANT_ALG_ED25519PH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_ED25519PH:"4c":"505341004b45590000000000010000000110080001000000000000000b090006010000004c"
|
||||||
|
|
||||||
|
PSA storage save: alg: PSA_ALG_ED448PH
|
||||||
|
depends_on:PSA_WANT_ALG_ED448PH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_ED448PH:0x0000:"4b":"505341004b455900000000000100000001100800010000001509000600000000010000004b"
|
||||||
|
|
||||||
|
PSA storage save: alg2: PSA_ALG_ED448PH
|
||||||
|
depends_on:PSA_WANT_ALG_ED448PH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_ED448PH:"4c":"505341004b455900000000000100000001100800010000000000000015090006010000004c"
|
||||||
|
|
||||||
PSA storage save: alg: PSA_ALG_FFDH
|
PSA storage save: alg: PSA_ALG_FFDH
|
||||||
depends_on:PSA_WANT_ALG_FFDH:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_FFDH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_FFDH:0x0000:"4b":"505341004b455900000000000100000001100800010000000000010900000000010000004b"
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_FFDH:0x0000:"4b":"505341004b455900000000000100000001100800010000000000010900000000010000004b"
|
||||||
@ -552,6 +584,14 @@ PSA storage save: alg2: PSA_ALG_OFB
|
|||||||
depends_on:PSA_WANT_ALG_OFB:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_OFB:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_OFB:"4c":"505341004b45590000000000010000000110080001000000000000000012c004010000004c"
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_OFB:"4c":"505341004b45590000000000010000000110080001000000000000000012c004010000004c"
|
||||||
|
|
||||||
|
PSA storage save: alg: PSA_ALG_PURE_EDDSA
|
||||||
|
depends_on:PSA_WANT_ALG_PURE_EDDSA:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_PURE_EDDSA:0x0000:"4b":"505341004b455900000000000100000001100800010000000008000600000000010000004b"
|
||||||
|
|
||||||
|
PSA storage save: alg2: PSA_ALG_PURE_EDDSA
|
||||||
|
depends_on:PSA_WANT_ALG_PURE_EDDSA:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_PURE_EDDSA:"4c":"505341004b455900000000000100000001100800010000000000000000080006010000004c"
|
||||||
|
|
||||||
PSA storage save: alg: PSA_ALG_RIPEMD160
|
PSA storage save: alg: PSA_ALG_RIPEMD160
|
||||||
depends_on:PSA_WANT_ALG_RIPEMD160:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_RIPEMD160:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_RIPEMD160:0x0000:"4b":"505341004b455900000000000100000001100800010000000400000200000000010000004b"
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_RIPEMD160:0x0000:"4b":"505341004b455900000000000100000001100800010000000400000200000000010000004b"
|
||||||
@ -608,6 +648,14 @@ PSA storage save: alg2: PSA_ALG_SHA3_512
|
|||||||
depends_on:PSA_WANT_ALG_SHA3_512:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_SHA3_512:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_SHA3_512:"4c":"505341004b455900000000000100000001100800010000000000000013000002010000004c"
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_SHA3_512:"4c":"505341004b455900000000000100000001100800010000000000000013000002010000004c"
|
||||||
|
|
||||||
|
PSA storage save: alg: PSA_ALG_SHAKE256_512
|
||||||
|
depends_on:PSA_WANT_ALG_SHAKE256_512:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_SHAKE256_512:0x0000:"4b":"505341004b455900000000000100000001100800010000001500000200000000010000004b"
|
||||||
|
|
||||||
|
PSA storage save: alg2: PSA_ALG_SHAKE256_512
|
||||||
|
depends_on:PSA_WANT_ALG_SHAKE256_512:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_SHAKE256_512:"4c":"505341004b455900000000000100000001100800010000000000000015000002010000004c"
|
||||||
|
|
||||||
PSA storage save: alg: PSA_ALG_SHA_1
|
PSA storage save: alg: PSA_ALG_SHA_1
|
||||||
depends_on:PSA_WANT_ALG_SHA_1:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_SHA_1:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_SHA_1:0x0000:"4b":"505341004b455900000000000100000001100800010000000500000200000000010000004b"
|
key_storage_save:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_SHA_1:0x0000:"4b":"505341004b455900000000000100000001100800010000000500000200000000010000004b"
|
||||||
|
@ -292,6 +292,14 @@ PSA storage read: type: ECC_KEY_PAIR(SECT_R2) 163-bit
|
|||||||
depends_on:PSA_WANT_ECC_SECT_R2_163:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR
|
depends_on:PSA_WANT_ECC_SECT_R2_163:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR
|
||||||
key_storage_read:0x0001:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECT_R2):163:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"0210b482a458b4822d0cb21daa96819a67c8062d34":"505341004b45590000000000010000002b71a300010000000000000000000000150000000210b482a458b4822d0cb21daa96819a67c8062d34":1
|
key_storage_read:0x0001:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECT_R2):163:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"0210b482a458b4822d0cb21daa96819a67c8062d34":"505341004b45590000000000010000002b71a300010000000000000000000000150000000210b482a458b4822d0cb21daa96819a67c8062d34":1
|
||||||
|
|
||||||
|
PSA storage read: type: ECC_KEY_PAIR(TWISTED_EDWARDS) 255-bit
|
||||||
|
depends_on:PSA_WANT_ECC_TWISTED_EDWARDS_255:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):255:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"9d61b19deffd5a60ba844af492ec2cc44449c5697b326919703bac031cae7f60":"505341004b45590000000000010000004271ff00010000000000000000000000200000009d61b19deffd5a60ba844af492ec2cc44449c5697b326919703bac031cae7f60":1
|
||||||
|
|
||||||
|
PSA storage read: type: ECC_KEY_PAIR(TWISTED_EDWARDS) 448-bit
|
||||||
|
depends_on:PSA_WANT_ECC_TWISTED_EDWARDS_448:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_TWISTED_EDWARDS):448:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"6c82a562cb808d10d632be89c8513ebf6c929f34ddfa8c9f63c9960ef6e348a3528c8a3fcc2f044e39a3fc5b94492f8f032e7549a20098f95b":"505341004b45590000000000010000004271c001010000000000000000000000390000006c82a562cb808d10d632be89c8513ebf6c929f34ddfa8c9f63c9960ef6e348a3528c8a3fcc2f044e39a3fc5b94492f8f032e7549a20098f95b":1
|
||||||
|
|
||||||
PSA storage read: type: ECC_PUBLIC_KEY(BRAINPOOL_P_R1) 160-bit
|
PSA storage read: type: ECC_PUBLIC_KEY(BRAINPOOL_P_R1) 160-bit
|
||||||
depends_on:PSA_WANT_ECC_BRAINPOOL_P_R1_160:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
depends_on:PSA_WANT_ECC_BRAINPOOL_P_R1_160:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
||||||
key_storage_read:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_BRAINPOOL_P_R1):160:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"04d4b9186816358e2f9c59cf70748cb70641b22fbab65473db4b4e22a361ed7e3de7e8a8ddc4130c5c":"505341004b45590000000000010000003041a0000100000000000000000000002900000004d4b9186816358e2f9c59cf70748cb70641b22fbab65473db4b4e22a361ed7e3de7e8a8ddc4130c5c":1
|
key_storage_read:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_BRAINPOOL_P_R1):160:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"04d4b9186816358e2f9c59cf70748cb70641b22fbab65473db4b4e22a361ed7e3de7e8a8ddc4130c5c":"505341004b45590000000000010000003041a0000100000000000000000000002900000004d4b9186816358e2f9c59cf70748cb70641b22fbab65473db4b4e22a361ed7e3de7e8a8ddc4130c5c":1
|
||||||
@ -408,6 +416,14 @@ PSA storage read: type: ECC_PUBLIC_KEY(SECT_R2) 163-bit
|
|||||||
depends_on:PSA_WANT_ECC_SECT_R2_163:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
depends_on:PSA_WANT_ECC_SECT_R2_163:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
||||||
key_storage_read:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_SECT_R2):163:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"0403692601144c32a6cfa369ae20ae5d43c1c764678c037bafe80c6fd2e42b7ced96171d9c5367fd3dca6f":"505341004b45590000000000010000002b41a3000100000000000000000000002b0000000403692601144c32a6cfa369ae20ae5d43c1c764678c037bafe80c6fd2e42b7ced96171d9c5367fd3dca6f":1
|
key_storage_read:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_SECT_R2):163:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"0403692601144c32a6cfa369ae20ae5d43c1c764678c037bafe80c6fd2e42b7ced96171d9c5367fd3dca6f":"505341004b45590000000000010000002b41a3000100000000000000000000002b0000000403692601144c32a6cfa369ae20ae5d43c1c764678c037bafe80c6fd2e42b7ced96171d9c5367fd3dca6f":1
|
||||||
|
|
||||||
|
PSA storage read: type: ECC_PUBLIC_KEY(TWISTED_EDWARDS) 255-bit
|
||||||
|
depends_on:PSA_WANT_ECC_TWISTED_EDWARDS_255:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS):255:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a":"505341004b45590000000000010000004241ff0001000000000000000000000020000000d75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a":1
|
||||||
|
|
||||||
|
PSA storage read: type: ECC_PUBLIC_KEY(TWISTED_EDWARDS) 448-bit
|
||||||
|
depends_on:PSA_WANT_ECC_TWISTED_EDWARDS_448:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS):448:PSA_KEY_USAGE_EXPORT:0x0000:0x0000:"5fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180":"505341004b45590000000000010000004241c001010000000000000000000000390000005fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180":1
|
||||||
|
|
||||||
PSA storage read: alg: PSA_ALG_ANY_HASH
|
PSA storage read: alg: PSA_ALG_ANY_HASH
|
||||||
depends_on:PSA_WANT_ALG_ANY_HASH:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_ANY_HASH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_ANY_HASH:0x0000:"4b":"505341004b45590000000000010000000110080001000000ff00000200000000010000004b":0
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_ANY_HASH:0x0000:"4b":"505341004b45590000000000010000000110080001000000ff00000200000000010000004b":0
|
||||||
@ -504,6 +520,22 @@ PSA storage read: alg2: PSA_ALG_ECDSA_ANY
|
|||||||
depends_on:PSA_WANT_ALG_ECDSA_ANY:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_ECDSA_ANY:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_ECDSA_ANY:"4c":"505341004b455900000000000100000001100800010000000000000000060006010000004c":0
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_ECDSA_ANY:"4c":"505341004b455900000000000100000001100800010000000000000000060006010000004c":0
|
||||||
|
|
||||||
|
PSA storage read: alg: PSA_ALG_ED25519PH
|
||||||
|
depends_on:PSA_WANT_ALG_ED25519PH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_ED25519PH:0x0000:"4b":"505341004b455900000000000100000001100800010000000b09000600000000010000004b":0
|
||||||
|
|
||||||
|
PSA storage read: alg2: PSA_ALG_ED25519PH
|
||||||
|
depends_on:PSA_WANT_ALG_ED25519PH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_ED25519PH:"4c":"505341004b45590000000000010000000110080001000000000000000b090006010000004c":0
|
||||||
|
|
||||||
|
PSA storage read: alg: PSA_ALG_ED448PH
|
||||||
|
depends_on:PSA_WANT_ALG_ED448PH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_ED448PH:0x0000:"4b":"505341004b455900000000000100000001100800010000001509000600000000010000004b":0
|
||||||
|
|
||||||
|
PSA storage read: alg2: PSA_ALG_ED448PH
|
||||||
|
depends_on:PSA_WANT_ALG_ED448PH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_ED448PH:"4c":"505341004b455900000000000100000001100800010000000000000015090006010000004c":0
|
||||||
|
|
||||||
PSA storage read: alg: PSA_ALG_FFDH
|
PSA storage read: alg: PSA_ALG_FFDH
|
||||||
depends_on:PSA_WANT_ALG_FFDH:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_FFDH:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_FFDH:0x0000:"4b":"505341004b455900000000000100000001100800010000000000010900000000010000004b":0
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_FFDH:0x0000:"4b":"505341004b455900000000000100000001100800010000000000010900000000010000004b":0
|
||||||
@ -552,6 +584,14 @@ PSA storage read: alg2: PSA_ALG_OFB
|
|||||||
depends_on:PSA_WANT_ALG_OFB:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_OFB:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_OFB:"4c":"505341004b45590000000000010000000110080001000000000000000012c004010000004c":0
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_OFB:"4c":"505341004b45590000000000010000000110080001000000000000000012c004010000004c":0
|
||||||
|
|
||||||
|
PSA storage read: alg: PSA_ALG_PURE_EDDSA
|
||||||
|
depends_on:PSA_WANT_ALG_PURE_EDDSA:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_PURE_EDDSA:0x0000:"4b":"505341004b455900000000000100000001100800010000000008000600000000010000004b":0
|
||||||
|
|
||||||
|
PSA storage read: alg2: PSA_ALG_PURE_EDDSA
|
||||||
|
depends_on:PSA_WANT_ALG_PURE_EDDSA:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_PURE_EDDSA:"4c":"505341004b455900000000000100000001100800010000000000000000080006010000004c":0
|
||||||
|
|
||||||
PSA storage read: alg: PSA_ALG_RIPEMD160
|
PSA storage read: alg: PSA_ALG_RIPEMD160
|
||||||
depends_on:PSA_WANT_ALG_RIPEMD160:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_RIPEMD160:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_RIPEMD160:0x0000:"4b":"505341004b455900000000000100000001100800010000000400000200000000010000004b":0
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_RIPEMD160:0x0000:"4b":"505341004b455900000000000100000001100800010000000400000200000000010000004b":0
|
||||||
@ -608,6 +648,14 @@ PSA storage read: alg2: PSA_ALG_SHA3_512
|
|||||||
depends_on:PSA_WANT_ALG_SHA3_512:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_SHA3_512:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_SHA3_512:"4c":"505341004b455900000000000100000001100800010000000000000013000002010000004c":0
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_SHA3_512:"4c":"505341004b455900000000000100000001100800010000000000000013000002010000004c":0
|
||||||
|
|
||||||
|
PSA storage read: alg: PSA_ALG_SHAKE256_512
|
||||||
|
depends_on:PSA_WANT_ALG_SHAKE256_512:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_SHAKE256_512:0x0000:"4b":"505341004b455900000000000100000001100800010000001500000200000000010000004b":0
|
||||||
|
|
||||||
|
PSA storage read: alg2: PSA_ALG_SHAKE256_512
|
||||||
|
depends_on:PSA_WANT_ALG_SHAKE256_512:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:0x0000:PSA_ALG_SHAKE256_512:"4c":"505341004b455900000000000100000001100800010000000000000015000002010000004c":0
|
||||||
|
|
||||||
PSA storage read: alg: PSA_ALG_SHA_1
|
PSA storage read: alg: PSA_ALG_SHA_1
|
||||||
depends_on:PSA_WANT_ALG_SHA_1:PSA_WANT_KEY_TYPE_RAW_DATA
|
depends_on:PSA_WANT_ALG_SHA_1:PSA_WANT_KEY_TYPE_RAW_DATA
|
||||||
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_SHA_1:0x0000:"4b":"505341004b455900000000000100000001100800010000000500000200000000010000004b":0
|
key_storage_read:0x0001:PSA_KEY_TYPE_RAW_DATA:8:PSA_KEY_USAGE_EXPORT:PSA_ALG_SHA_1:0x0000:"4b":"505341004b455900000000000100000001100800010000000500000200000000010000004b":0
|
||||||
|
Loading…
Reference in New Issue
Block a user