| /optee_os/core/drivers/crypto/stm32/ |
| H A D | hmac.c | 23 size_t key_len; member 54 c->key_len = 0; in do_hmac_init() 58 c->key_len = len; in do_hmac_init() 60 return stm32_hash_init(&c->hash, c->key, c->key_len); in do_hmac_init() 106 res = stm32_hash_final(&c->hash, tmp_digest, c->key, c->key_len); in do_hmac_final() 143 dst->key_len = src->key_len; in do_hmac_copy_state() 146 dst->key = malloc(dst->key_len); in do_hmac_copy_state() 149 memcpy(dst->key, src->key, dst->key_len); in do_hmac_copy_state() 151 dst->key_len = 0; in do_hmac_copy_state()
|
| H A D | cipher.c | 49 const uint8_t *key, size_t key_len, 64 const uint8_t *key, size_t key_len, in cryp_init() argument 72 if (key_len == 16 && in cryp_init() 76 memcpy(temp_key, key, key_len); in cryp_init() 77 memcpy(temp_key + key_len, key, key_len / 2); in cryp_init() 78 key_len = DES3_KEY_SIZE; in cryp_init() 83 key, key_len, iv, iv_len); in cryp_init() 107 const uint8_t *key, size_t key_len, in saes_init() argument 115 if (key_len == AES_KEYSIZE_192) { in saes_init() 131 res = ctx->ops->init(ctx, mode, key, key_len, NULL, 0, iv, in saes_init() [all …]
|
| /optee_os/core/arch/arm/crypto/ |
| H A D | aes_armv8a_ce.c | 64 static void expand_enc_key(uint32_t *enc_key, size_t key_len) in expand_enc_key() argument 70 unsigned int kwords = key_len / sizeof(uint32_t); in expand_enc_key() 83 if (key_len == 24) { in expand_enc_key() 88 } else if (key_len == 32) { in expand_enc_key() 120 TEE_Result crypto_accel_aes_expand_keys(const void *key, size_t key_len, in crypto_accel_aes_expand_keys() argument 130 if (key_len != 16 && key_len != 24 && key_len != 32) in crypto_accel_aes_expand_keys() 136 num_rounds = 10 + ((key_len / 8) - 2) * 2; in crypto_accel_aes_expand_keys() 143 memcpy(enc_key, key, key_len); in crypto_accel_aes_expand_keys() 147 expand_enc_key(enc_key, key_len); in crypto_accel_aes_expand_keys()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ec25519/ |
| H A D | ec25519_import_pkcs8.c | 31 unsigned long version, key_len; in ec25519_import_pkcs8() local 42 key_len = sizeof(private_key); in ec25519_import_pkcs8() 46 LTC_ASN1_OCTET_STRING, key_len, private_key, in ec25519_import_pkcs8() 68 key_len = sizeof(key->priv); in ec25519_import_pkcs8() 69 …if ((err = der_decode_octet_string(private_key, sizeof(private_key), key->priv, &key_len)) == CRYP… in ec25519_import_pkcs8()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | des2_key.h | 6 static inline void get_des2_key(const uint8_t **key, size_t *key_len, in get_des2_key() argument 9 if (*key_len == 16) { in get_des2_key() 20 *key_len = 24; in get_des2_key()
|
| H A D | aes.c | 15 TEE_Result crypto_aes_expand_enc_key(const void *key, size_t key_len, in crypto_aes_expand_enc_key() argument 20 return crypto_accel_aes_expand_keys(key, key_len, enc_key, NULL, in crypto_aes_expand_enc_key() 28 if (aes_setup(key, key_len, 0, &skey)) in crypto_aes_expand_enc_key()
|
| H A D | ccm.c | 64 const uint8_t *key, size_t key_len, in crypto_aes_ccm_init() argument 81 if ((!key) || (key_len > TEE_CCM_KEY_MAX_LENGTH)) in crypto_aes_ccm_init() 97 ltc_res = ccm_init(&ccm->ctx, ltc_cipherindex, key, key_len, in crypto_aes_ccm_init()
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | sec_cipher.c | 35 static TEE_Result sec_cipher_des_get_c_key_len(size_t key_len, in sec_cipher_des_get_c_key_len() argument 38 if (key_len == DES_KEY_SIZE) { in sec_cipher_des_get_c_key_len() 48 static TEE_Result sec_cipher_3des_get_c_key_len(size_t key_len, in sec_cipher_3des_get_c_key_len() argument 51 if (key_len == SEC_3DES_2KEY_SIZE) { in sec_cipher_3des_get_c_key_len() 53 } else if (key_len == SEC_3DES_3KEY_SIZE) { in sec_cipher_3des_get_c_key_len() 63 static TEE_Result sec_cipher_aes_get_c_key_len(size_t key_len, in sec_cipher_aes_get_c_key_len() argument 71 switch (key_len) { in sec_cipher_aes_get_c_key_len() 87 switch (key_len) { in sec_cipher_aes_get_c_key_len() 107 static TEE_Result sec_cipher_sm4_get_c_key_len(size_t key_len, in sec_cipher_sm4_get_c_key_len() argument 115 if (key_len != AES_KEYSIZE_128) { in sec_cipher_sm4_get_c_key_len() [all …]
|
| H A D | sec_hash.c | 16 if (ctx->key_len > SEC_DIGEST_MAX_KEY_SIZE || !ctx->key_len) { in sec_digest_set_hmac_key() 17 EMSG("Invalid digest key len(%ld)", ctx->key_len); in sec_digest_set_hmac_key() 22 sqe->type2.mac_key_alg |= SHIFT_U64(DIV_ROUND_UP(ctx->key_len, in sec_digest_set_hmac_key() 143 if (ctx->key_len > SEC_DIGEST_MAX_KEY_SIZE || !ctx->key_len) { in sec_digest_set_hmac_bd3_key() 144 EMSG("Invalid digest key len(%ld)", ctx->key_len); in sec_digest_set_hmac_bd3_key() 149 sqe->auth_mac_key |= SHIFT_U64(DIV_ROUND_UP(ctx->key_len, in sec_digest_set_hmac_bd3_key() 295 hash_ctx->key_len = len; in hisi_sec_digest_ctx_init() 464 out_hash_ctx->key_len = in_hash_ctx->key_len; in hisi_sec_digest_copy_state() 481 memcpy(out_hash_ctx->key, in_hash_ctx->key, out_hash_ctx->key_len); in hisi_sec_digest_copy_state()
|
| H A D | sec_pbkdf2.c | 45 sqe->type2.pass_word_len = (uint16_t)pbkdf2_msg->key_len; in sec_pbkdf2_fill_sqe() 89 sqe->pbkdf2_scene.pass_word_dk_len = pbkdf2_msg->key_len; in sec_pbkdf2_fill_bd3_sqe() 274 memcpy(msg->base_key, password, msg->key_len); in sec_pbkdf2_set_buf() 283 memzero_explicit(msg->base_key, msg->key_len); in sec_pbkdf2_clean_buf() 292 msg->key_len = password_len; in sec_pbkdf2_msg_init()
|
| /optee_os/core/lib/libtomcrypt/src/pk/x25519/ |
| H A D | x25519_import.c | 22 unsigned long key_len; in x25519_import() local 27 key_len = sizeof(key->pub); in x25519_import() 28 …if ((err = x509_decode_subject_public_key_info(in, inlen, LTC_OID_X25519, key->pub, &key_len, LTC_… in x25519_import()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ed25519/ |
| H A D | ed25519_import.c | 22 unsigned long key_len; in ed25519_import() local 27 key_len = sizeof(key->pub); in ed25519_import() 28 …if ((err = x509_decode_subject_public_key_info(in, inlen, LTC_OID_ED25519, key->pub, &key_len, LTC… in ed25519_import()
|
| /optee_os/core/pta/tests/ |
| H A D | aes_perf.c | 59 size_t key_len = 0; in init_ctx() local 64 key_len = key_size_bits / 8; in init_ctx() 65 if (key_len > sizeof(aes_key)) in init_ctx() 71 key2_len = key_len; in init_ctx() 97 res = crypto_cipher_init(*ctx, mode, aes_key, key_len, key2, in init_ctx() 101 res = crypto_authenc_init(*ctx, mode, aes_key, key_len, aes_iv, in init_ctx()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | pk_wrap.c | 74 int key_len; in rsa_verify_wrap() local 96 key_len = mbedtls_rsa_write_pubkey(rsa, buf, &p); in rsa_verify_wrap() 97 if (key_len <= 0) { in rsa_verify_wrap() 106 buf + sizeof(buf) - key_len, key_len, in rsa_verify_wrap() 178 int key_len; in mbedtls_pk_psa_rsa_sign_ext() local 194 key_len = mbedtls_rsa_write_key(rsa_ctx, buf, &p); in mbedtls_pk_psa_rsa_sign_ext() 195 if (key_len <= 0) { in mbedtls_pk_psa_rsa_sign_ext() 204 buf + MBEDTLS_PK_RSA_PRV_DER_MAX_BYTES - key_len, key_len, in mbedtls_pk_psa_rsa_sign_ext() 290 int key_len; in rsa_decrypt_wrap() local 301 key_len = mbedtls_rsa_write_key(rsa, buf, &p); in rsa_decrypt_wrap() [all …]
|
| H A D | ssl_tls13_keys.c | 224 unsigned char *key, size_t key_len, in ssl_tls13_make_traffic_key() argument 234 key, key_len); in ssl_tls13_make_traffic_key() 268 size_t key_len, size_t iv_len, in mbedtls_ssl_tls13_make_traffic_keys() argument 275 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 283 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 289 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys() 1095 size_t *key_len, size_t *iv_len) in ssl_tls13_get_cipher_key_info() argument 1115 *key_len = PSA_BITS_TO_BYTES(key_bits); in ssl_tls13_get_cipher_key_info() 1143 size_t key_len = 0; in ssl_tls13_generate_early_key() local 1153 ret = ssl_tls13_get_cipher_key_info(ciphersuite_info, &key_len, &iv_len); in ssl_tls13_generate_early_key() [all …]
|
| H A D | nist_kw.c | 460 static const unsigned int key_len[] = { variable 601 mbedtls_printf(" KW-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test() 605 kw_key[i], key_len[i] * 8, 1); in mbedtls_nist_kw_self_test() 627 kw_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test() 664 mbedtls_printf(" KWP-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test() 668 key_len[i] * 8, 1); in mbedtls_nist_kw_self_test() 690 kwp_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
|
| H A D | psa_crypto_ffdh.c | 170 size_t key_len = PSA_BITS_TO_BYTES(attributes->bits); in mbedtls_psa_ffdh_export_public_key() local 172 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G); in mbedtls_psa_ffdh_export_public_key() 182 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len)); in mbedtls_psa_ffdh_export_public_key() 184 *data_length = key_len; in mbedtls_psa_ffdh_export_public_key()
|
| H A D | gcm.c | 1050 int key_len = 128 + 64 * j; in mbedtls_gcm_self_test() local 1055 key_len, i, "enc"); in mbedtls_gcm_self_test() 1062 key_len); in mbedtls_gcm_self_test() 1068 if (ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED && key_len == 192) { in mbedtls_gcm_self_test() 1112 key_len, i, "dec"); in mbedtls_gcm_self_test() 1117 key_len); in mbedtls_gcm_self_test() 1151 key_len, i, "enc"); in mbedtls_gcm_self_test() 1156 key_len); in mbedtls_gcm_self_test() 1233 key_len, i, "dec"); in mbedtls_gcm_self_test() 1238 key_len); in mbedtls_gcm_self_test()
|
| H A D | pk_ecc.c | 48 int mbedtls_pk_ecc_set_key(mbedtls_pk_context *pk, unsigned char *key, size_t key_len) in mbedtls_pk_ecc_set_key() argument 70 status = psa_import_key(&attributes, key, key_len, &pk->priv_id); in mbedtls_pk_ecc_set_key() 76 int ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, key_len); in mbedtls_pk_ecc_set_key()
|
| /optee_os/core/drivers/crypto/versal/include/ |
| H A D | ipi.h | 15 uint32_t key_len; member 46 uint32_t key_len; member
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | ecc.c | 211 static TEE_Result set_binary_data(struct bignum *b, size_t key_len, uint8_t **p, in set_binary_data() argument 221 if (a != key_len) { in set_binary_data() 222 leading_zeros = key_len - a; in set_binary_data() 223 a = key_len; in set_binary_data() 239 size_t key_len) in se050_inject_public_key() argument 270 ret = set_binary_data(key->x, key_len, &key_bin.x, &key_bin.x_len); in se050_inject_public_key() 274 ret = set_binary_data(key->y, key_len, &key_bin.y, &key_bin.y_len); in se050_inject_public_key() 295 size_t key_len) in se050_inject_keypair() argument 336 ret = set_binary_data(key->d, key_len, &key_bin.d, &key_bin.d_len); in se050_inject_keypair() 340 ret = set_binary_data(key->x, key_len, in se050_inject_keypair() [all …]
|
| /optee_os/core/drivers/crypto/se050/glue/ |
| H A D | user.c | 67 uint8_t *key, size_t key_len, in glue_cipher_one_go() argument 70 if (crypto_cipher_init(cipher, mode, key, key_len, NULL, 0, iv, iv_len)) in glue_cipher_one_go()
|
| /optee_os/core/drivers/crypto/se050/adaptors/apis/ |
| H A D | apdu.c | 698 uint8_t *key, size_t *key_len) in se050_key_store_get_ecc_key_bin() argument 704 if (!store || !store->session || !k_object || !key || !key_len) in se050_key_store_get_ecc_key_bin() 714 add_ecc_header(key, key_len, &buf, &buflen, k_object->curve_id); in se050_key_store_get_ecc_key_bin() 717 buf, key_len); in se050_key_store_get_ecc_key_bin() 721 *key_len += buflen; in se050_key_store_get_ecc_key_bin() 722 buflen = *key_len; in se050_key_store_get_ecc_key_bin() 723 get_ecc_raw_data(key, *key_len, &buf, &buflen, in se050_key_store_get_ecc_key_bin() 727 *key_len = buflen; in se050_key_store_get_ecc_key_bin()
|
| /optee_os/core/drivers/crypto/crypto_api/authenc/ |
| H A D | authenc.c | 77 size_t key_len, const uint8_t *nonce, in authenc_init() argument 84 if ((!key && key_len) || (!nonce && nonce_len)) { in authenc_init() 86 CRYPTO_TRACE("key @%p-%zu bytes", key, key_len); in authenc_init() 96 .key.length = key_len, in authenc_init()
|
| /optee_os/core/drivers/ |
| H A D | versal_huk.c | 85 uint32_t key_len; member 177 size_t key_len = sizeof(key_data); in aes_gcm_encrypt() local 198 versal_mbox_alloc(key_len, key_data, &p); in aes_gcm_encrypt() 222 init->key_len = VERSAL_AES_KEY_SIZE_256; in aes_gcm_encrypt()
|