| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_invasive.h | 76 psa_status_t psa_crypto_copy_input(const uint8_t *input, size_t input_len, 85 extern void (*psa_input_pre_copy_hook)(const uint8_t *input, size_t input_len); 86 extern void (*psa_input_post_copy_hook)(const uint8_t *input, size_t input_len);
|
| H A D | cipher.c | 884 * Note: input_len must be the block size of the cipher. 887 size_t input_len, in mbedtls_get_pkcs_padding() argument 898 padding_len = input[input_len - 1]; in mbedtls_get_pkcs_padding() 900 mbedtls_ct_condition_t bad = mbedtls_ct_uint_gt(padding_len, input_len); in mbedtls_get_pkcs_padding() 904 * so pick input_len, which is usually 8 or 16 (one block) */ in mbedtls_get_pkcs_padding() 905 pad_idx = input_len - padding_len; in mbedtls_get_pkcs_padding() 906 for (i = 0; i < input_len; i++) { in mbedtls_get_pkcs_padding() 913 *data_len = mbedtls_ct_if(bad, 0, input_len - padding_len); in mbedtls_get_pkcs_padding() 936 static int get_one_and_zeros_padding(unsigned char *input, size_t input_len, in get_one_and_zeros_padding() 948 for (ptrdiff_t i = (ptrdiff_t) (input_len) in get_one_and_zeros_padding() 934 get_one_and_zeros_padding(unsigned char * input,size_t input_len,size_t * data_len) get_one_and_zeros_padding() argument 978 get_zeros_and_len_padding(unsigned char * input,size_t input_len,size_t * data_len) get_zeros_and_len_padding() argument 1019 get_zeros_padding(unsigned char * input,size_t input_len,size_t * data_len) get_zeros_padding() argument 1046 get_no_padding(unsigned char * input,size_t input_len,size_t * data_len) get_no_padding() argument [all...] |
| H A D | pem.c | 244 static int pem_check_pkcs_padding(unsigned char *input, size_t input_len, size_t *data_len) in pem_check_pkcs_padding() argument 247 if (input_len < 1) { in pem_check_pkcs_padding() 250 size_t pad_len = input[input_len - 1]; in pem_check_pkcs_padding() 253 if (pad_len > input_len) { in pem_check_pkcs_padding() 257 *data_len = input_len - pad_len; in pem_check_pkcs_padding() 259 for (i = *data_len; i < input_len; i++) { in pem_check_pkcs_padding()
|
| H A D | cipher_invasive.h | 22 size_t input_len,
|
| H A D | ccm.c | 360 const unsigned char *input, size_t input_len, in mbedtls_ccm_update() argument 380 if (ctx->tag_len != 0 && ctx->processed + input_len > ctx->plaintext_len) { in mbedtls_ccm_update() 384 if (output_size < input_len) { in mbedtls_ccm_update() 387 *output_len = input_len; in mbedtls_ccm_update() 391 while (input_len > 0) { in mbedtls_ccm_update() 396 if (use_len > input_len) { in mbedtls_ccm_update() 397 use_len = input_len; in mbedtls_ccm_update() 462 input_len -= use_len; in mbedtls_ccm_update()
|
| H A D | ssl_tls13_keys.h | 453 const unsigned char *input, size_t input_len,
|
| H A D | psa_crypto_core.h | 923 * \param[in] input_len Length of the input buffer. 931 psa_status_t psa_crypto_local_input_alloc(const uint8_t *input, size_t input_len,
|
| H A D | psa_crypto.c | 7418 size_t input_len, in psa_pbkdf2_cmac_set_password() 7423 if (input_len > PSA_HASH_BLOCK_LENGTH(hash_alg)) { in psa_pbkdf2_cmac_set_password() 7424 return psa_hash_compute(hash_alg, input, input_len, output, in psa_pbkdf2_cmac_set_password() 7426 } else if (input_len > 0) { in psa_pbkdf2_cmac_set_password() 7427 memcpy(output, input, input_len); in psa_pbkdf2_cmac_set_password() 7436 size_t input_len, in psa_pbkdf2_cmac_set_password() 7441 if (input_len != PSA_MAC_LENGTH(PSA_KEY_TYPE_AES, 128U, PSA_ALG_CMAC)) { in psa_pbkdf2_cmac_set_password() 7452 PSA_ALG_CMAC, input, input_len, in psa_pbkdf2_set_password() 7459 memcpy(output, input, input_len); in psa_pbkdf2_set_password() 9306 void (*psa_input_pre_copy_hook)(const uint8_t *input, size_t input_len) in psa_crypto_copy_input() 7398 psa_pbkdf2_hmac_set_password(psa_algorithm_t hash_alg,const uint8_t * input,size_t input_len,uint8_t * output,size_t * output_len) psa_pbkdf2_hmac_set_password() argument 7416 psa_pbkdf2_cmac_set_password(const uint8_t * input,size_t input_len,uint8_t * output,size_t * output_len) psa_pbkdf2_cmac_set_password() argument 9305 psa_crypto_copy_input(const uint8_t * input,size_t input_len,uint8_t * input_copy,size_t input_copy_len) psa_crypto_copy_input() argument 9370 psa_crypto_local_input_alloc(const uint8_t * input,size_t input_len,psa_crypto_local_input_t * local_input) psa_crypto_local_input_alloc() argument [all...] |
| H A D | ssl_tls13_keys.c | 337 const unsigned char *input, size_t input_len, in mbedtls_ssl_tls13_evolve_secret() argument 375 if (input != NULL && input_len != 0) { in mbedtls_ssl_tls13_evolve_secret() 377 l_input_len = input_len; in mbedtls_ssl_tls13_evolve_secret()
|
| /optee_os/core/drivers/crypto/versal/include/ |
| H A D | ipi.h | 51 uint32_t input_len; member
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | ccm.h | 474 const unsigned char *input, size_t input_len,
|
| H A D | ssl.h | 1133 size_t input_len);
|
| /optee_os/core/drivers/ |
| H A D | versal_huk.c | 77 uint32_t input_len; member 261 input->input_len = p.len; in aes_gcm_encrypt()
|
| /optee_os/core/drivers/crypto/versal/ |
| H A D | authenc.c | 490 input->input_len = p.len % 16 ? p.alloc_len : p.len; in update_payload() 502 dupdate->src.length, input->input_len); in update_payload()
|