| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_sizes.h | 517 #define PSA_AEAD_UPDATE_OUTPUT_SIZE(key_type, alg, input_length) \ argument 520 PSA_ROUND_UP_TO_MULTIPLE(PSA_BLOCK_CIPHER_BLOCK_LENGTH(key_type), (input_length)) : \ 521 (input_length) : \ 534 #define PSA_AEAD_UPDATE_OUTPUT_MAX_SIZE(input_length) \ argument 535 (PSA_ROUND_UP_TO_MULTIPLE(PSA_BLOCK_CIPHER_BLOCK_MAX_SIZE, (input_length))) 1179 #define PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, input_length) \ argument 1183 (input_length) + 1u) + \ 1186 (input_length) + PSA_CIPHER_IV_LENGTH((key_type), (alg)) : \ 1200 #define PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE(input_length) \ argument 1202 (input_length) + 1u) + \ [all …]
|
| H A D | crypto.h | 877 size_t input_length, 912 size_t input_length, 1032 size_t input_length); 1229 size_t input_length, 1270 size_t input_length, 1467 size_t input_length); 1636 size_t input_length, 1683 size_t input_length, 1972 size_t input_length, 2552 size_t input_length); [all …]
|
| H A D | crypto_se_driver.h | 190 size_t input_length); 261 size_t input_length, 290 size_t input_length, 615 size_t input_length, 655 size_t input_length,
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_cipher.c | 419 size_t input_length, in psa_cipher_update_ecb() argument 428 if (input_length == 0) { in psa_cipher_update_ecb() 437 if (input_length < bytes_to_copy) { in psa_cipher_update_ecb() 438 bytes_to_copy = input_length; in psa_cipher_update_ecb() 443 input_length -= bytes_to_copy; in psa_cipher_update_ecb() 464 while (input_length >= block_size) { in psa_cipher_update_ecb() 475 input_length -= block_size; in psa_cipher_update_ecb() 482 if (input_length > 0) { in psa_cipher_update_ecb() 485 input, input_length); in psa_cipher_update_ecb() 486 ctx->unprocessed_len += input_length; in psa_cipher_update_ecb() [all …]
|
| H A D | psa_crypto_driver_wrappers.h | 117 size_t input_length, in psa_driver_wrapper_sign_message() argument 139 input_length, in psa_driver_wrapper_sign_message() 160 input_length, in psa_driver_wrapper_sign_message() 180 input_length, in psa_driver_wrapper_sign_message() 192 size_t input_length, in psa_driver_wrapper_verify_message() argument 213 input_length, in psa_driver_wrapper_verify_message() 233 input_length, in psa_driver_wrapper_verify_message() 252 input_length, in psa_driver_wrapper_verify_message() 1076 size_t input_length, in psa_driver_wrapper_cipher_encrypt() argument 1099 input_length, in psa_driver_wrapper_cipher_encrypt() [all …]
|
| H A D | psa_crypto_hash.c | 264 size_t input_length) in mbedtls_psa_hash_update() argument 272 input, input_length); in mbedtls_psa_hash_update() 278 input, input_length); in mbedtls_psa_hash_update() 284 input, input_length); in mbedtls_psa_hash_update() 290 input, input_length); in mbedtls_psa_hash_update() 296 input, input_length); in mbedtls_psa_hash_update() 302 input, input_length); in mbedtls_psa_hash_update() 308 input, input_length); in mbedtls_psa_hash_update() 328 input, input_length); in mbedtls_psa_hash_update() 333 (void) input_length; in mbedtls_psa_hash_update() [all …]
|
| H A D | psa_crypto_aead.c | 447 size_t input_length) in mbedtls_psa_aead_update_ad() argument 454 mbedtls_gcm_update_ad(&operation->ctx.gcm, input, input_length)); in mbedtls_psa_aead_update_ad() 460 mbedtls_ccm_update_ad(&operation->ctx.ccm, input, input_length)); in mbedtls_psa_aead_update_ad() 468 input_length)); in mbedtls_psa_aead_update_ad() 474 (void) input_length; in mbedtls_psa_aead_update_ad() 487 size_t input_length, in mbedtls_psa_aead_update() argument 495 update_output_length = input_length; in mbedtls_psa_aead_update() 501 input, input_length, in mbedtls_psa_aead_update() 508 if (output_size < input_length) { in mbedtls_psa_aead_update() 514 input, input_length, in mbedtls_psa_aead_update() [all …]
|
| H A D | psa_crypto_pake.c | 407 size_t input_length) in mbedtls_psa_pake_input_internal() argument 462 if (operation->buffer_length + input_length + 1 > sizeof(operation->buffer)) { in mbedtls_psa_pake_input_internal() 467 operation->buffer[operation->buffer_length] = (uint8_t) input_length; in mbedtls_psa_pake_input_internal() 472 input, input_length); in mbedtls_psa_pake_input_internal() 473 operation->buffer_length += input_length; in mbedtls_psa_pake_input_internal() 505 (void) input_length; in mbedtls_psa_pake_input_internal() 513 size_t input_length) in mbedtls_psa_pake_input() argument 516 operation, step, input, input_length); in mbedtls_psa_pake_input()
|
| H A D | psa_crypto_cipher.h | 163 const uint8_t *input, size_t input_length, 262 size_t input_length, 311 size_t input_length,
|
| H A D | psa_crypto_hash.h | 43 size_t input_length, 142 size_t input_length);
|
| H A D | psa_crypto_mac.h | 52 size_t input_length, 155 size_t input_length);
|
| H A D | psa_crypto_mac.c | 344 size_t input_length) in mbedtls_psa_mac_update() argument 354 input, input_length)); in mbedtls_psa_mac_update() 360 input, input_length); in mbedtls_psa_mac_update() 367 (void) input_length; in mbedtls_psa_mac_update() 461 size_t input_length, in mbedtls_psa_mac_compute() argument 485 if (input_length > 0) { in mbedtls_psa_mac_compute() 486 status = mbedtls_psa_mac_update(&operation, input, input_length); in mbedtls_psa_mac_compute()
|
| H A D | gcm.c | 565 const unsigned char *input, size_t input_length, in mbedtls_gcm_update() argument 575 if (output_size < input_length) { in mbedtls_gcm_update() 578 *output_length = input_length; in mbedtls_gcm_update() 584 if (input_length == 0) { in mbedtls_gcm_update() 588 if (output > input && (size_t) (output - input) < input_length) { in mbedtls_gcm_update() 594 if (ctx->len + input_length < ctx->len || in mbedtls_gcm_update() 595 (uint64_t) ctx->len + input_length > 0xFFFFFFFE0ull) { in mbedtls_gcm_update() 606 if (use_len > input_length) { in mbedtls_gcm_update() 607 use_len = input_length; in mbedtls_gcm_update() 619 input_length -= use_len; in mbedtls_gcm_update() [all …]
|
| H A D | psa_crypto_aead.h | 334 size_t input_length); 394 size_t input_length,
|
| H A D | psa_crypto_rsa.h | 256 size_t input_length, 314 size_t input_length,
|
| H A D | psa_crypto_rsa.c | 520 size_t input_length, in mbedtls_psa_asymmetric_encrypt() argument 531 (void) input_length; in mbedtls_psa_asymmetric_encrypt() 562 input_length, in mbedtls_psa_asymmetric_encrypt() 582 input_length, in mbedtls_psa_asymmetric_encrypt() 614 size_t input_length, in mbedtls_psa_asymmetric_decrypt() argument 625 (void) input_length; in mbedtls_psa_asymmetric_decrypt() 646 if (input_length != mbedtls_rsa_get_len(rsa)) { in mbedtls_psa_asymmetric_decrypt()
|
| H A D | psa_crypto.c | 2422 size_t input_length) in psa_hash_update() argument 2434 if (input_length == 0) { in psa_hash_update() 2438 LOCAL_INPUT_ALLOC(input_external, input_length, input); in psa_hash_update() 2439 status = psa_driver_wrapper_hash_update(operation, input, input_length); in psa_hash_update() 2525 const uint8_t *input_external, size_t input_length, in psa_hash_compute() argument 2538 LOCAL_INPUT_ALLOC(input_external, input_length, input); in psa_hash_compute() 2540 status = psa_driver_wrapper_hash_compute(alg, input, input_length, in psa_hash_compute() 2552 const uint8_t *input_external, size_t input_length, in psa_hash_compare() argument 2567 LOCAL_INPUT_ALLOC(input_external, input_length, input); in psa_hash_compare() 2569 alg, input, input_length, in psa_hash_compare() [all …]
|
| H A D | psa_crypto_pake.h | 115 size_t input_length);
|
| H A D | bignum_mod_raw.c | 45 size_t input_length, in mbedtls_mpi_mod_raw_read() argument 53 input, input_length); in mbedtls_mpi_mod_raw_read() 57 input, input_length); in mbedtls_mpi_mod_raw_read()
|
| H A D | bignum_core.c | 206 size_t input_length) in mbedtls_mpi_core_read_le() argument 208 const size_t limbs = CHARS_TO_LIMBS(input_length); in mbedtls_mpi_core_read_le() 217 for (size_t i = 0; i < input_length; i++) { in mbedtls_mpi_core_read_le() 229 size_t input_length) in mbedtls_mpi_core_read_be() argument 231 const size_t limbs = CHARS_TO_LIMBS(input_length); in mbedtls_mpi_core_read_be() 246 if (input_length != 0) { in mbedtls_mpi_core_read_be() 247 size_t overhead = (X_limbs * ciL) - input_length; in mbedtls_mpi_core_read_be() 249 memcpy(Xp + overhead, input, input_length); in mbedtls_mpi_core_read_be()
|
| H A D | bignum_core.h | 244 size_t input_length); 266 size_t input_length);
|
| H A D | bignum_mod_raw.h | 153 size_t input_length,
|
| H A D | psa_crypto_core.h | 466 psa_algorithm_t alg, const uint8_t *input, size_t input_length, 503 psa_algorithm_t alg, const uint8_t *input, size_t input_length,
|
| /optee_os/core/drivers/crypto/caam/ae/ |
| H A D | caam_ae_gcm.c | 75 size_t input_length = 0; in caam_ae_do_block_gcm() local 119 input_length = src->orig.length; in caam_ae_do_block_gcm() 120 counter_value = processed_blocks + ROUNDUP_DIV(input_length, 16); in caam_ae_do_block_gcm() 129 if ((yi_1s_complement + TEE_AES_BLOCK_SIZE) > input_length) in caam_ae_do_block_gcm() 130 corrupted_block_size = input_length - yi_1s_complement; in caam_ae_do_block_gcm() 133 remaining_len = input_length - (yi_1s_complement + in caam_ae_do_block_gcm()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | gcm.h | 319 const unsigned char *input, size_t input_length,
|