| /optee_os/core/lib/libtomcrypt/src/headers/ |
| A D | tomcrypt_mac.h | 24 const unsigned char *key, unsigned long keylen, 32 unsigned long keylen, 217 keylen, member 266 const unsigned char *key, unsigned long keylen, 274 const unsigned char *key, unsigned long keylen, 317 const unsigned char *key, unsigned long keylen, 324 const unsigned char *key, unsigned long keylen, 378 const unsigned char *key, unsigned long keylen, 386 const unsigned char *key, unsigned long keylen, 442 const unsigned char *key, unsigned long keylen, [all …]
|
| A D | tomcrypt_cipher.h | 112 ulong32 K[32], keylen; member 514 const unsigned char *key, unsigned long keylen, 539 const unsigned char *key, unsigned long keylen, 557 const unsigned char *key, unsigned long keylen, 571 const unsigned char *key, unsigned long keylen, 586 const unsigned char *key, unsigned long keylen, 865 int keylen, int num_rounds, symmetric_ECB *ecb); 873 int keylen, int num_rounds, symmetric_CFB *cfb); 909 const unsigned char *key, int keylen, 927 const unsigned char *key, int keylen, [all …]
|
| /optee_os/core/lib/libtomcrypt/src/mac/hmac/ |
| A D | hmac_init.c | 29 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen) in hmac_init() argument 47 if (keylen == 0) { in hmac_init() 64 if(keylen > LTC_HMAC_BLOCKSIZE) { in hmac_init() 66 if ((err = hash_memory(hash, key, keylen, hmac->key, &z)) != CRYPT_OK) { in hmac_init() 69 keylen = hashsize; in hmac_init() 71 XMEMCPY(hmac->key, key, (size_t)keylen); in hmac_init() 74 if(keylen < LTC_HMAC_BLOCKSIZE) { in hmac_init() 75 zeromem((hmac->key) + keylen, (size_t)(LTC_HMAC_BLOCKSIZE - keylen)); in hmac_init()
|
| A D | hmac_memory.c | 31 const unsigned char *key, unsigned long keylen, in hmac_memory() argument 50 return hash_descriptor[hash]->hmac_block(key, keylen, in, inlen, out, outlen); in hmac_memory() 60 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) { in hmac_memory()
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/ |
| A D | rc2.c | 70 int rc2_setup_ex(const unsigned char *key, int keylen, int bits, int num_rounds, symmetric_key *ske… in rc2_setup_ex() argument 80 if (keylen == 0 || keylen > 128 || bits > 1024) { in rc2_setup_ex() 91 for (i = 0; i < keylen; i++) { in rc2_setup_ex() 96 if (keylen < 128) { in rc2_setup_ex() 97 for (i = keylen; i < 128; i++) { in rc2_setup_ex() 98 tmp[i] = permute[(tmp[i - 1] + tmp[i - keylen]) & 255]; in rc2_setup_ex() 133 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc2_setup() argument 135 return rc2_setup_ex(key, keylen, keylen * 8, num_rounds, skey); in rc2_setup() 305 int keylen, bits; in rc2_test() 358 if (tests[x].bits == (tests[x].keylen * 8)) { in rc2_test() [all …]
|
| A D | rc6.c | 50 static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in _rc6_setup() argument 52 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in _rc6_setup() 66 if (keylen < 8 || keylen > 128) { in _rc6_setup() 71 for (A = i = j = 0; i < (ulong32)keylen; ) { in _rc6_setup() 80 if (keylen & 3) { in _rc6_setup() 81 A <<= (8 * (4 - (keylen&3))); in _rc6_setup() 106 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc6_setup() argument 109 x = _rc6_setup(key, keylen, num_rounds, skey); in rc6_setup() 237 int keylen; in rc6_test() 280 if ((err = rc6_setup(tests[x].key, tests[x].keylen, 0, &key)) != CRYPT_OK) { in rc6_test()
|
| A D | rc5.c | 53 static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in _rc5_setup() argument 55 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in _rc5_setup() 73 if (keylen < 8 || keylen > 128) { in _rc5_setup() 81 for (A = i = j = 0; i < (ulong32)keylen; ) { in _rc5_setup() 89 if ((keylen & 3) != 0) { in _rc5_setup() 90 A <<= (ulong32)((8 * (4 - (keylen&3)))); in _rc5_setup() 111 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc5_setup() argument 114 x = _rc5_setup(key, keylen, num_rounds, skey); in rc5_setup()
|
| A D | anubis.c | 886 static int _anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in _anubis_setup() argument 888 int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in _anubis_setup() 900 if ((keylen & 3) || (keylen < 16) || (keylen > 40)) { in _anubis_setup() 903 skey->anubis.keyBits = keylen*8; in _anubis_setup() 1020 int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in anubis_setup() argument 1023 err = _anubis_setup(key, keylen, num_rounds, skey); in anubis_setup() 1165 int keylen; in anubis_test() 1491 anubis_setup(tests[x].key, tests[x].keylen, 0, &skey); in anubis_test()
|
| A D | cast5.c | 410 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in _cast5_setup() 424 if (num_rounds == 12 && keylen > 10) { in _cast5_setup() 428 if (keylen < 5 || keylen > 16) { in _cast5_setup() 434 XMEMCPY(buf, key, (size_t)keylen); in _cast5_setup() 480 skey->cast5.keylen = keylen; in _cast5_setup() 492 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in cast5_setup() argument 495 z = _cast5_setup(key, keylen, num_rounds, skey); in cast5_setup() 563 if (skey->cast5.keylen > 10) { in _cast5_ecb_encrypt() 604 if (skey->cast5.keylen > 10) { in _cast5_ecb_decrypt() 647 int keylen; in cast5_test() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/mac/f9/ |
| A D | f9_init.c | 26 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) in f9_init() argument 44 if ((err = cipher_descriptor[cipher]->setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { in f9_init() 49 for (x = 0; (unsigned)x < keylen; x++) { in f9_init() 59 f9->keylen = keylen; in f9_init()
|
| A D | f9_memory.c | 30 const unsigned char *key, unsigned long keylen, in f9_memory() argument 44 return cipher_descriptor[cipher]->f9_memory(key, keylen, in, inlen, out, outlen); in f9_memory() 52 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) { in f9_memory()
|
| /optee_os/core/lib/libtomcrypt/src/mac/xcbc/ |
| A D | xcbc_init.c | 26 int xcbc_init(xcbc_state *xcbc, int cipher, const unsigned char *key, unsigned long keylen) in xcbc_init() argument 49 if (keylen & LTC_XCBC_PURE) { in xcbc_init() 50 keylen &= ~LTC_XCBC_PURE; in xcbc_init() 52 if (keylen < 2UL*cipher_descriptor[cipher]->block_length) { in xcbc_init() 56 k1 = keylen - 2*cipher_descriptor[cipher]->block_length; in xcbc_init() 70 if ((err = cipher_descriptor[cipher]->setup(key, keylen, 0, skey)) != CRYPT_OK) { in xcbc_init()
|
| A D | xcbc_memory.c | 30 const unsigned char *key, unsigned long keylen, in xcbc_memory() argument 44 return cipher_descriptor[cipher]->xcbc_memory(key, keylen, in, inlen, out, outlen); in xcbc_memory() 52 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) { in xcbc_memory()
|
| /optee_os/core/lib/libtomcrypt/src/modes/f8/ |
| A D | f8_start.c | 33 const unsigned char *key, int keylen, in f8_start() argument 63 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) { in f8_start() 69 for (; x < keylen && x < (int)sizeof(tkey); x++) { in f8_start() 74 if ((err = cipher_descriptor[cipher]->setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) { in f8_start() 90 return cipher_descriptor[cipher]->setup(key, keylen, num_rounds, &f8->key); in f8_start()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| A D | pkparse.c | 716 end = p + keylen; in pk_parse_key_pkcs1_der() 870 unsigned char *end = p + keylen; in pk_parse_key_sec1_der() 1112 end = p + keylen; in pk_parse_key_pkcs8_encrypted_der() 1228 if( keylen == 0 ) in mbedtls_pk_parse_key() 1237 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key() 1268 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key() 1298 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key() 1321 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key() 1443 if( keylen == 0 ) in mbedtls_pk_parse_public_key() 1451 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_public_key() [all …]
|
| A D | pkcs5.c | 55 int *keylen, mbedtls_md_type_t *md_type ) in pkcs5_parse_pbkdf2_params() argument 87 if( ( ret = mbedtls_asn1_get_int( &p, end, keylen ) ) != 0 ) in pkcs5_parse_pbkdf2_params() 114 int ret, iterations = 0, keylen = 0; in mbedtls_pkcs5_pbes2() local 150 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2() 177 keylen = cipher_info->key_bitlen / 8; in mbedtls_pkcs5_pbes2() 194 iterations, keylen, key ) ) != 0 ) in mbedtls_pkcs5_pbes2() 202 if( ( ret = mbedtls_cipher_setkey( &cipher_ctx, key, 8 * keylen, in mbedtls_pkcs5_pbes2()
|
| A D | pem.c | 76 static int pem_pbkdf1( unsigned char *key, size_t keylen, in pem_pbkdf1() argument 99 if( keylen <= 16 ) in pem_pbkdf1() 101 memcpy( key, md5sum, keylen ); in pem_pbkdf1() 122 if( keylen < 32 ) in pem_pbkdf1() 123 use_len = keylen - 16; in pem_pbkdf1() 196 static int pem_aes_decrypt( unsigned char aes_iv[16], unsigned int keylen, in pem_aes_decrypt() argument 206 if( ( ret = pem_pbkdf1( aes_key, keylen, aes_iv, pwd, pwdlen ) ) != 0 ) in pem_aes_decrypt() 209 if( ( ret = mbedtls_aes_setkey_dec( &aes_ctx, aes_key, keylen * 8 ) ) != 0 ) in pem_aes_decrypt() 216 mbedtls_platform_zeroize( aes_key, keylen ); in pem_aes_decrypt()
|
| /optee_os/core/lib/libtomcrypt/src/stream/chacha/ |
| A D | chacha_setup.c | 31 int chacha_setup(chacha_state *st, const unsigned char *key, unsigned long keylen, int rounds) in chacha_setup() argument 37 LTC_ARGCHK(keylen == 32 || keylen == 16); in chacha_setup() 45 if (keylen == 32) { /* 256bit */ in chacha_setup()
|
| /optee_os/core/lib/libtomcrypt/src/stream/salsa20/ |
| A D | salsa20_setup.c | 32 int salsa20_setup(salsa20_state *st, const unsigned char *key, unsigned long keylen, int rounds) in salsa20_setup() argument 38 LTC_ARGCHK(keylen == 32 || keylen == 16); in salsa20_setup() 47 if (keylen == 32) { /* 256bit */ in salsa20_setup()
|
| /optee_os/core/lib/libtomcrypt/src/encauth/eax/ |
| A D | eax_init.c | 32 const unsigned char *key, unsigned long keylen, in eax_init() argument 70 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { in eax_init() 92 if ((err = omac_init(&eax->headeromac, cipher, key, keylen)) != CRYPT_OK) { in eax_init() 110 …if ((err = ctr_start(cipher, eax->N, key, keylen, 0, CTR_COUNTER_BIG_ENDIAN, &eax->ctr)) != CRYPT_… in eax_init() 115 if ((err = omac_init(&eax->ctomac, cipher, key, keylen)) != CRYPT_OK) { in eax_init()
|
| /optee_os/core/lib/libtomcrypt/src/modes/xts/ |
| A D | xts_init.c | 27 …cipher, const unsigned char *key1, const unsigned char *key2, unsigned long keylen, int num_rounds, in xts_start() argument 47 if ((err = cipher_descriptor[cipher]->setup(key1, keylen, num_rounds, &xts->key1)) != CRYPT_OK) { in xts_start() 50 if ((err = cipher_descriptor[cipher]->setup(key2, keylen, num_rounds, &xts->key2)) != CRYPT_OK) { in xts_start()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| A D | pbes.c | 26 unsigned long klen, keylen, dlen; in pbes_decrypt() local 40 klen = arg->type.keylen; in pbes_decrypt() 49 keylen = klen; in pbes_decrypt() 61 if ((err = cbc_start(cid, iv, k, keylen, 0, &cbc)) != CRYPT_OK) goto LBL_ERROR; in pbes_decrypt()
|
| /optee_os/core/lib/libtomcrypt/src/mac/omac/ |
| A D | omac_memory.c | 31 const unsigned char *key, unsigned long keylen, in omac_memory() argument 50 return cipher_descriptor[cipher]->omac_memory(key, keylen, in, inlen, out, outlen); in omac_memory() 60 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { in omac_memory()
|
| /optee_os/core/lib/libtomcrypt/src/mac/blake2/ |
| A D | blake2bmac_file.c | 24 int blake2bmac_file(const char *fname, const unsigned char *key, unsigned long keylen, unsigned cha… in blake2bmac_file() argument 29 LTC_UNUSED_PARAM(keylen); in blake2bmac_file() 49 if ((err = blake2bmac_init(&st, *maclen, key, keylen)) != CRYPT_OK) { in blake2bmac_file()
|
| A D | blake2smac_file.c | 24 int blake2smac_file(const char *fname, const unsigned char *key, unsigned long keylen, unsigned cha… in blake2smac_file() argument 29 LTC_UNUSED_PARAM(keylen); in blake2smac_file() 49 if ((err = blake2smac_init(&st, *maclen, key, keylen)) != CRYPT_OK) { in blake2smac_file()
|