Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 25 of 55) sorted by relevance

123

/optee_os/core/drivers/crypto/stm32/
H A Dhmac.c23 size_t key_len; member
54 c->key_len = 0; in do_hmac_init()
58 c->key_len = len; in do_hmac_init()
60 return stm32_hash_init(&c->hash, c->key, c->key_len); in do_hmac_init()
106 res = stm32_hash_final(&c->hash, tmp_digest, c->key, c->key_len); in do_hmac_final()
143 dst->key_len = src->key_len; in do_hmac_copy_state()
146 dst->key = malloc(dst->key_len); in do_hmac_copy_state()
149 memcpy(dst->key, src->key, dst->key_len); in do_hmac_copy_state()
151 dst->key_len = 0; in do_hmac_copy_state()
H A Dcipher.c49 const uint8_t *key, size_t key_len,
64 const uint8_t *key, size_t key_len, in cryp_init() argument
72 if (key_len == 16 && in cryp_init()
76 memcpy(temp_key, key, key_len); in cryp_init()
77 memcpy(temp_key + key_len, key, key_len / 2); in cryp_init()
78 key_len = DES3_KEY_SIZE; in cryp_init()
83 key, key_len, iv, iv_len); in cryp_init()
107 const uint8_t *key, size_t key_len, in saes_init() argument
115 if (key_len == AES_KEYSIZE_192) { in saes_init()
131 res = ctx->ops->init(ctx, mode, key, key_len, NULL, 0, iv, in saes_init()
[all …]
/optee_os/core/arch/arm/crypto/
H A Daes_armv8a_ce.c64 static void expand_enc_key(uint32_t *enc_key, size_t key_len) in expand_enc_key() argument
70 unsigned int kwords = key_len / sizeof(uint32_t); in expand_enc_key()
83 if (key_len == 24) { in expand_enc_key()
88 } else if (key_len == 32) { in expand_enc_key()
120 TEE_Result crypto_accel_aes_expand_keys(const void *key, size_t key_len, in crypto_accel_aes_expand_keys() argument
130 if (key_len != 16 && key_len != 24 && key_len != 32) in crypto_accel_aes_expand_keys()
136 num_rounds = 10 + ((key_len / 8) - 2) * 2; in crypto_accel_aes_expand_keys()
143 memcpy(enc_key, key, key_len); in crypto_accel_aes_expand_keys()
147 expand_enc_key(enc_key, key_len); in crypto_accel_aes_expand_keys()
/optee_os/core/lib/libtomcrypt/src/pk/ec25519/
H A Dec25519_import_pkcs8.c31 unsigned long version, key_len; in ec25519_import_pkcs8() local
42 key_len = sizeof(private_key); in ec25519_import_pkcs8()
46 LTC_ASN1_OCTET_STRING, key_len, private_key, in ec25519_import_pkcs8()
68 key_len = sizeof(key->priv); in ec25519_import_pkcs8()
69 …if ((err = der_decode_octet_string(private_key, sizeof(private_key), key->priv, &key_len)) == CRYP… in ec25519_import_pkcs8()
/optee_os/core/lib/libtomcrypt/
H A Ddes2_key.h6 static inline void get_des2_key(const uint8_t **key, size_t *key_len, in get_des2_key() argument
9 if (*key_len == 16) { in get_des2_key()
20 *key_len = 24; in get_des2_key()
H A Daes.c15 TEE_Result crypto_aes_expand_enc_key(const void *key, size_t key_len, in crypto_aes_expand_enc_key() argument
20 return crypto_accel_aes_expand_keys(key, key_len, enc_key, NULL, in crypto_aes_expand_enc_key()
28 if (aes_setup(key, key_len, 0, &skey)) in crypto_aes_expand_enc_key()
H A Dccm.c64 const uint8_t *key, size_t key_len, in crypto_aes_ccm_init() argument
81 if ((!key) || (key_len > TEE_CCM_KEY_MAX_LENGTH)) in crypto_aes_ccm_init()
97 ltc_res = ccm_init(&ccm->ctx, ltc_cipherindex, key, key_len, in crypto_aes_ccm_init()
/optee_os/core/drivers/crypto/hisilicon/
H A Dsec_cipher.c35 static TEE_Result sec_cipher_des_get_c_key_len(size_t key_len, in sec_cipher_des_get_c_key_len() argument
38 if (key_len == DES_KEY_SIZE) { in sec_cipher_des_get_c_key_len()
48 static TEE_Result sec_cipher_3des_get_c_key_len(size_t key_len, in sec_cipher_3des_get_c_key_len() argument
51 if (key_len == SEC_3DES_2KEY_SIZE) { in sec_cipher_3des_get_c_key_len()
53 } else if (key_len == SEC_3DES_3KEY_SIZE) { in sec_cipher_3des_get_c_key_len()
63 static TEE_Result sec_cipher_aes_get_c_key_len(size_t key_len, in sec_cipher_aes_get_c_key_len() argument
71 switch (key_len) { in sec_cipher_aes_get_c_key_len()
87 switch (key_len) { in sec_cipher_aes_get_c_key_len()
107 static TEE_Result sec_cipher_sm4_get_c_key_len(size_t key_len, in sec_cipher_sm4_get_c_key_len() argument
115 if (key_len != AES_KEYSIZE_128) { in sec_cipher_sm4_get_c_key_len()
[all …]
H A Dsec_hash.c16 if (ctx->key_len > SEC_DIGEST_MAX_KEY_SIZE || !ctx->key_len) { in sec_digest_set_hmac_key()
17 EMSG("Invalid digest key len(%ld)", ctx->key_len); in sec_digest_set_hmac_key()
22 sqe->type2.mac_key_alg |= SHIFT_U64(DIV_ROUND_UP(ctx->key_len, in sec_digest_set_hmac_key()
143 if (ctx->key_len > SEC_DIGEST_MAX_KEY_SIZE || !ctx->key_len) { in sec_digest_set_hmac_bd3_key()
144 EMSG("Invalid digest key len(%ld)", ctx->key_len); in sec_digest_set_hmac_bd3_key()
149 sqe->auth_mac_key |= SHIFT_U64(DIV_ROUND_UP(ctx->key_len, in sec_digest_set_hmac_bd3_key()
295 hash_ctx->key_len = len; in hisi_sec_digest_ctx_init()
464 out_hash_ctx->key_len = in_hash_ctx->key_len; in hisi_sec_digest_copy_state()
481 memcpy(out_hash_ctx->key, in_hash_ctx->key, out_hash_ctx->key_len); in hisi_sec_digest_copy_state()
H A Dsec_pbkdf2.c45 sqe->type2.pass_word_len = (uint16_t)pbkdf2_msg->key_len; in sec_pbkdf2_fill_sqe()
89 sqe->pbkdf2_scene.pass_word_dk_len = pbkdf2_msg->key_len; in sec_pbkdf2_fill_bd3_sqe()
274 memcpy(msg->base_key, password, msg->key_len); in sec_pbkdf2_set_buf()
283 memzero_explicit(msg->base_key, msg->key_len); in sec_pbkdf2_clean_buf()
292 msg->key_len = password_len; in sec_pbkdf2_msg_init()
/optee_os/core/lib/libtomcrypt/src/pk/x25519/
H A Dx25519_import.c22 unsigned long key_len; in x25519_import() local
27 key_len = sizeof(key->pub); in x25519_import()
28 …if ((err = x509_decode_subject_public_key_info(in, inlen, LTC_OID_X25519, key->pub, &key_len, LTC_… in x25519_import()
/optee_os/core/lib/libtomcrypt/src/pk/ed25519/
H A Ded25519_import.c22 unsigned long key_len; in ed25519_import() local
27 key_len = sizeof(key->pub); in ed25519_import()
28 …if ((err = x509_decode_subject_public_key_info(in, inlen, LTC_OID_ED25519, key->pub, &key_len, LTC… in ed25519_import()
/optee_os/core/pta/tests/
H A Daes_perf.c59 size_t key_len = 0; in init_ctx() local
64 key_len = key_size_bits / 8; in init_ctx()
65 if (key_len > sizeof(aes_key)) in init_ctx()
71 key2_len = key_len; in init_ctx()
97 res = crypto_cipher_init(*ctx, mode, aes_key, key_len, key2, in init_ctx()
101 res = crypto_authenc_init(*ctx, mode, aes_key, key_len, aes_iv, in init_ctx()
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpk_wrap.c74 int key_len; in rsa_verify_wrap() local
96 key_len = mbedtls_rsa_write_pubkey(rsa, buf, &p); in rsa_verify_wrap()
97 if (key_len <= 0) { in rsa_verify_wrap()
106 buf + sizeof(buf) - key_len, key_len, in rsa_verify_wrap()
178 int key_len; in mbedtls_pk_psa_rsa_sign_ext() local
194 key_len = mbedtls_rsa_write_key(rsa_ctx, buf, &p); in mbedtls_pk_psa_rsa_sign_ext()
195 if (key_len <= 0) { in mbedtls_pk_psa_rsa_sign_ext()
204 buf + MBEDTLS_PK_RSA_PRV_DER_MAX_BYTES - key_len, key_len, in mbedtls_pk_psa_rsa_sign_ext()
290 int key_len; in rsa_decrypt_wrap() local
301 key_len = mbedtls_rsa_write_key(rsa, buf, &p); in rsa_decrypt_wrap()
[all …]
H A Dssl_tls13_keys.c224 unsigned char *key, size_t key_len, in ssl_tls13_make_traffic_key() argument
234 key, key_len); in ssl_tls13_make_traffic_key()
268 size_t key_len, size_t iv_len, in mbedtls_ssl_tls13_make_traffic_keys() argument
275 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys()
283 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys()
289 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys()
1095 size_t *key_len, size_t *iv_len) in ssl_tls13_get_cipher_key_info() argument
1115 *key_len = PSA_BITS_TO_BYTES(key_bits); in ssl_tls13_get_cipher_key_info()
1143 size_t key_len = 0; in ssl_tls13_generate_early_key() local
1153 ret = ssl_tls13_get_cipher_key_info(ciphersuite_info, &key_len, &iv_len); in ssl_tls13_generate_early_key()
[all …]
H A Dnist_kw.c460 static const unsigned int key_len[] = { variable
601 mbedtls_printf(" KW-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test()
605 kw_key[i], key_len[i] * 8, 1); in mbedtls_nist_kw_self_test()
627 kw_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
664 mbedtls_printf(" KWP-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test()
668 key_len[i] * 8, 1); in mbedtls_nist_kw_self_test()
690 kwp_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
H A Dpsa_crypto_ffdh.c170 size_t key_len = PSA_BITS_TO_BYTES(attributes->bits); in mbedtls_psa_ffdh_export_public_key() local
172 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G); in mbedtls_psa_ffdh_export_public_key()
182 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len)); in mbedtls_psa_ffdh_export_public_key()
184 *data_length = key_len; in mbedtls_psa_ffdh_export_public_key()
H A Dgcm.c1050 int key_len = 128 + 64 * j; in mbedtls_gcm_self_test() local
1055 key_len, i, "enc"); in mbedtls_gcm_self_test()
1062 key_len); in mbedtls_gcm_self_test()
1068 if (ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED && key_len == 192) { in mbedtls_gcm_self_test()
1112 key_len, i, "dec"); in mbedtls_gcm_self_test()
1117 key_len); in mbedtls_gcm_self_test()
1151 key_len, i, "enc"); in mbedtls_gcm_self_test()
1156 key_len); in mbedtls_gcm_self_test()
1233 key_len, i, "dec"); in mbedtls_gcm_self_test()
1238 key_len); in mbedtls_gcm_self_test()
H A Dpk_ecc.c48 int mbedtls_pk_ecc_set_key(mbedtls_pk_context *pk, unsigned char *key, size_t key_len) in mbedtls_pk_ecc_set_key() argument
70 status = psa_import_key(&attributes, key, key_len, &pk->priv_id); in mbedtls_pk_ecc_set_key()
76 int ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, key_len); in mbedtls_pk_ecc_set_key()
/optee_os/core/drivers/crypto/versal/include/
H A Dipi.h15 uint32_t key_len; member
46 uint32_t key_len; member
/optee_os/core/drivers/crypto/se050/core/
H A Decc.c211 static TEE_Result set_binary_data(struct bignum *b, size_t key_len, uint8_t **p, in set_binary_data() argument
221 if (a != key_len) { in set_binary_data()
222 leading_zeros = key_len - a; in set_binary_data()
223 a = key_len; in set_binary_data()
239 size_t key_len) in se050_inject_public_key() argument
270 ret = set_binary_data(key->x, key_len, &key_bin.x, &key_bin.x_len); in se050_inject_public_key()
274 ret = set_binary_data(key->y, key_len, &key_bin.y, &key_bin.y_len); in se050_inject_public_key()
295 size_t key_len) in se050_inject_keypair() argument
336 ret = set_binary_data(key->d, key_len, &key_bin.d, &key_bin.d_len); in se050_inject_keypair()
340 ret = set_binary_data(key->x, key_len, in se050_inject_keypair()
[all …]
/optee_os/core/drivers/crypto/se050/glue/
H A Duser.c67 uint8_t *key, size_t key_len, in glue_cipher_one_go() argument
70 if (crypto_cipher_init(cipher, mode, key, key_len, NULL, 0, iv, iv_len)) in glue_cipher_one_go()
/optee_os/core/drivers/crypto/se050/adaptors/apis/
H A Dapdu.c698 uint8_t *key, size_t *key_len) in se050_key_store_get_ecc_key_bin() argument
704 if (!store || !store->session || !k_object || !key || !key_len) in se050_key_store_get_ecc_key_bin()
714 add_ecc_header(key, key_len, &buf, &buflen, k_object->curve_id); in se050_key_store_get_ecc_key_bin()
717 buf, key_len); in se050_key_store_get_ecc_key_bin()
721 *key_len += buflen; in se050_key_store_get_ecc_key_bin()
722 buflen = *key_len; in se050_key_store_get_ecc_key_bin()
723 get_ecc_raw_data(key, *key_len, &buf, &buflen, in se050_key_store_get_ecc_key_bin()
727 *key_len = buflen; in se050_key_store_get_ecc_key_bin()
/optee_os/core/drivers/crypto/crypto_api/authenc/
H A Dauthenc.c77 size_t key_len, const uint8_t *nonce, in authenc_init() argument
84 if ((!key && key_len) || (!nonce && nonce_len)) { in authenc_init()
86 CRYPTO_TRACE("key @%p-%zu bytes", key, key_len); in authenc_init()
96 .key.length = key_len, in authenc_init()
/optee_os/core/drivers/
H A Dversal_huk.c85 uint32_t key_len; member
177 size_t key_len = sizeof(key_data); in aes_gcm_encrypt() local
198 versal_mbox_alloc(key_len, key_data, &p); in aes_gcm_encrypt()
222 init->key_len = VERSAL_AES_KEY_SIZE_256; in aes_gcm_encrypt()

123