| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_mac.h | 11 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen); 16 const unsigned char *key, unsigned long keylen, 20 const unsigned char *key, unsigned long keylen, 25 unsigned long keylen, 41 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen); 45 const unsigned char *key, unsigned long keylen, 49 const unsigned char *key, unsigned long keylen, 54 const unsigned char *key, unsigned long keylen, 76 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen); 81 const unsigned char *key, unsigned long keylen, [all …]
|
| H A D | tomcrypt_cipher.h | 107 ulong32 K[32], keylen; member 398 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 518 const unsigned char *key, unsigned long keylen, 543 const unsigned char *key, unsigned long keylen, 561 const unsigned char *key, unsigned long keylen, 575 const unsigned char *key, unsigned long keylen, 590 const unsigned char *key, unsigned long keylen, 626 int blowfish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 636 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 646 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); [all …]
|
| /optee_os/core/lib/libtomcrypt/src/mac/hmac/ |
| H A D | hmac_init.c | 22 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen) in hmac_init() argument 40 if (keylen == 0) { in hmac_init() 57 if(keylen > LTC_HMAC_BLOCKSIZE) { in hmac_init() 59 if ((err = hash_memory(hash, key, keylen, hmac->key, &z)) != CRYPT_OK) { in hmac_init() 62 keylen = hashsize; in hmac_init() 64 XMEMCPY(hmac->key, key, (size_t)keylen); in hmac_init() 67 if(keylen < LTC_HMAC_BLOCKSIZE) { in hmac_init() 68 zeromem((hmac->key) + keylen, (size_t)(LTC_HMAC_BLOCKSIZE - keylen)); in hmac_init()
|
| H A D | hmac_memory.c | 24 const unsigned char *key, unsigned long keylen, in hmac_memory() argument 43 return hash_descriptor[hash]->hmac_block(key, keylen, in, inlen, out, outlen); in hmac_memory() 53 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) { in hmac_memory()
|
| /optee_os/core/lib/libtomcrypt/src/mac/f9/ |
| H A D | f9_init.c | 19 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) in f9_init() argument 37 if ((err = cipher_descriptor[cipher]->setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { in f9_init() 42 for (x = 0; (unsigned)x < keylen; x++) { in f9_init() 52 f9->keylen = keylen; in f9_init()
|
| H A D | f9_memory.c | 23 const unsigned char *key, unsigned long keylen, in f9_memory() argument 37 return cipher_descriptor[cipher]->f9_memory(key, keylen, in, inlen, out, outlen); in f9_memory() 45 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) { in f9_memory()
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/ |
| H A D | rc2.c | 63 int rc2_setup_ex(const unsigned char *key, int keylen, int bits, int num_rounds, symmetric_key *ske… in rc2_setup_ex() argument 73 if (keylen == 0 || keylen > 128 || bits > 1024) { in rc2_setup_ex() 84 for (i = 0; i < keylen; i++) { in rc2_setup_ex() 89 if (keylen < 128) { in rc2_setup_ex() 90 for (i = keylen; i < 128; i++) { in rc2_setup_ex() 91 tmp[i] = permute[(tmp[i - 1] + tmp[i - keylen]) & 255]; in rc2_setup_ex() 126 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc2_setup() argument 128 return rc2_setup_ex(key, keylen, keylen * 8, num_rounds, skey); in rc2_setup() 298 int keylen, bits; in rc2_test() 351 if (tests[x].bits == (tests[x].keylen * 8)) { in rc2_test() [all …]
|
| H A D | rc6.c | 43 static int s_rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc6_setup() argument 45 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc6_setup() 59 if (keylen < 8 || keylen > 128) { in s_rc6_setup() 64 for (A = i = j = 0; i < (ulong32)keylen; ) { in s_rc6_setup() 73 if (keylen & 3) { in s_rc6_setup() 74 A <<= (8 * (4 - (keylen&3))); in s_rc6_setup() 99 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc6_setup() argument 102 x = s_rc6_setup(key, keylen, num_rounds, skey); in rc6_setup() 230 int keylen; in rc6_test() 273 if ((err = rc6_setup(tests[x].key, tests[x].keylen, 0, &key)) != CRYPT_OK) { in rc6_test()
|
| H A D | rc5.c | 46 static int s_rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc5_setup() argument 48 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc5_setup() 66 if (keylen < 8 || keylen > 128) { in s_rc5_setup() 74 for (A = i = j = 0; i < (ulong32)keylen; ) { in s_rc5_setup() 82 if ((keylen & 3) != 0) { in s_rc5_setup() 83 A <<= (ulong32)((8 * (4 - (keylen&3)))); in s_rc5_setup() 104 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc5_setup() argument 107 x = s_rc5_setup(key, keylen, num_rounds, skey); in rc5_setup()
|
| H A D | anubis.c | 879 static int s_anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_anubis_setup() argument 881 int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_anubis_setup() 893 if ((keylen & 3) || (keylen < 16) || (keylen > 40)) { in s_anubis_setup() 896 skey->anubis.keyBits = keylen*8; in s_anubis_setup() 1013 int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in anubis_setup() argument 1016 err = s_anubis_setup(key, keylen, num_rounds, skey); in anubis_setup() 1168 int keylen; in anubis_test() 1494 anubis_setup(tests[x].key, tests[x].keylen, 0, &skey); in anubis_test()
|
| /optee_os/core/lib/libtomcrypt/src/mac/xcbc/ |
| H A D | xcbc_init.c | 19 int xcbc_init(xcbc_state *xcbc, int cipher, const unsigned char *key, unsigned long keylen) in xcbc_init() argument 42 if (keylen & LTC_XCBC_PURE) { in xcbc_init() 43 keylen &= ~LTC_XCBC_PURE; in xcbc_init() 45 if (keylen < 2UL*cipher_descriptor[cipher]->block_length) { in xcbc_init() 49 k1 = keylen - 2*cipher_descriptor[cipher]->block_length; in xcbc_init() 63 if ((err = cipher_descriptor[cipher]->setup(key, keylen, 0, skey)) != CRYPT_OK) { in xcbc_init()
|
| H A D | xcbc_memory.c | 23 const unsigned char *key, unsigned long keylen, in xcbc_memory() argument 37 return cipher_descriptor[cipher]->xcbc_memory(key, keylen, in, inlen, out, outlen); in xcbc_memory() 45 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) { in xcbc_memory()
|
| H A D | xcbc_file.c | 23 const unsigned char *key, unsigned long keylen, in xcbc_file() argument 30 LTC_UNUSED_PARAM(keylen); in xcbc_file() 51 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) { in xcbc_file()
|
| /optee_os/core/lib/libtomcrypt/src/modes/f8/ |
| H A D | f8_start.c | 26 const unsigned char *key, int keylen, in f8_start() argument 56 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) { in f8_start() 62 for (; x < keylen && x < (int)sizeof(tkey); x++) { in f8_start() 67 if ((err = cipher_descriptor[cipher]->setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) { in f8_start() 83 return cipher_descriptor[cipher]->setup(key, keylen, num_rounds, &f8->key); in f8_start()
|
| /optee_os/core/lib/libtomcrypt/src/stream/salsa20/ |
| H A D | salsa20_setup.c | 25 int salsa20_setup(salsa20_state *st, const unsigned char *key, unsigned long keylen, int rounds) in salsa20_setup() argument 31 LTC_ARGCHK(keylen == 32 || keylen == 16); in salsa20_setup() 40 if (keylen == 32) { /* 256bit */ in salsa20_setup()
|
| /optee_os/core/lib/libtomcrypt/src/stream/chacha/ |
| H A D | chacha_setup.c | 24 int chacha_setup(chacha_state *st, const unsigned char *key, unsigned long keylen, int rounds) in chacha_setup() argument 30 LTC_ARGCHK(keylen == 32 || keylen == 16); in chacha_setup() 38 if (keylen == 32) { /* 256bit */ in chacha_setup()
|
| /optee_os/core/lib/libtomcrypt/src/encauth/eax/ |
| H A D | eax_init.c | 25 const unsigned char *key, unsigned long keylen, in eax_init() argument 63 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { in eax_init() 85 if ((err = omac_init(&eax->headeromac, cipher, key, keylen)) != CRYPT_OK) { in eax_init() 103 …if ((err = ctr_start(cipher, eax->N, key, keylen, 0, CTR_COUNTER_BIG_ENDIAN, &eax->ctr)) != CRYPT_… in eax_init() 108 if ((err = omac_init(&eax->ctomac, cipher, key, keylen)) != CRYPT_OK) { in eax_init()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | pkparse.c | 430 unsigned char *key, size_t keylen, const unsigned char *end, in pk_parse_key_rfc8410_der() argument 436 if ((ret = mbedtls_asn1_get_tag(&key, (key + keylen), &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) { in pk_parse_key_rfc8410_der() 605 const unsigned char *key, size_t keylen, in pk_parse_key_sec1_der() argument 614 unsigned char *end = p + keylen; in pk_parse_key_sec1_der() 744 const unsigned char *key, size_t keylen, in pk_parse_key_pkcs8_unencrypted_der() argument 751 unsigned char *end = p + keylen; in pk_parse_key_pkcs8_unencrypted_der() 847 if (end != (key + keylen)) { in pk_parse_key_pkcs8_unencrypted_der() 867 unsigned char *key, size_t keylen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() argument 883 end = p + keylen; in mbedtls_pk_parse_key_pkcs8_encrypted_der() 974 const unsigned char *key, size_t keylen, in mbedtls_pk_parse_key() argument [all …]
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/aes/ |
| H A D | aesni.c | 45 int aesni_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in aesni_setup() argument 54 if (keylen != 16 && keylen != 24 && keylen != 32) { in aesni_setup() 58 if (num_rounds != 0 && num_rounds != (keylen / 4 + 6)) { in aesni_setup() 62 skey->rijndael.Nr = keylen / 4 + 6; in aesni_setup() 75 if (keylen == 16) { in aesni_setup() 88 } else if (keylen == 24) { in aesni_setup() 105 } else if (keylen == 32) { in aesni_setup() 277 int keylen; in aesni_test() 315 if ((err = aesni_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) { in aesni_test()
|
| H A D | aes_desc.c | 94 int AES_SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in AES_SETUP() argument 98 return aesni_setup(key, keylen, num_rounds, skey); in AES_SETUP() 102 return rijndael_setup(key, keylen, num_rounds, skey); in AES_SETUP() 153 int keylen; in AES_TEST() 194 if ((err = AES_SETUP(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) { in AES_TEST()
|
| /optee_os/core/lib/libtomcrypt/src/modes/xts/ |
| H A D | xts_init.c | 20 …cipher, const unsigned char *key1, const unsigned char *key2, unsigned long keylen, int num_rounds, in xts_start() argument 40 if ((err = cipher_descriptor[cipher]->setup(key1, keylen, num_rounds, &xts->key1)) != CRYPT_OK) { in xts_start() 43 if ((err = cipher_descriptor[cipher]->setup(key2, keylen, num_rounds, &xts->key2)) != CRYPT_OK) { in xts_start()
|
| /optee_os/core/lib/libtomcrypt/src/mac/omac/ |
| H A D | omac_memory.c | 24 const unsigned char *key, unsigned long keylen, in omac_memory() argument 43 return cipher_descriptor[cipher]->omac_memory(key, keylen, in, inlen, out, outlen); in omac_memory() 53 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { in omac_memory()
|
| /optee_os/core/lib/libtomcrypt/src/encauth/chachapoly/ |
| H A D | chacha20poly1305_init.c | 15 …t chacha20poly1305_init(chacha20poly1305_state *st, const unsigned char *key, unsigned long keylen) in chacha20poly1305_init() argument 17 return chacha_setup(&st->chacha, key, keylen, 20); in chacha20poly1305_init()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| H A D | pbes.c | 19 unsigned long klen, keylen, dlen; in pbes_decrypt() local 33 klen = arg->type.keylen; in pbes_decrypt() 42 keylen = klen; in pbes_decrypt() 54 if ((err = cbc_start(cid, iv, k, keylen, 0, &cbc)) != CRYPT_OK) goto LBL_ERROR; in pbes_decrypt()
|
| /optee_os/core/lib/libtomcrypt/src/mac/pmac/ |
| H A D | pmac_file.c | 23 const unsigned char *key, unsigned long keylen, in pmac_file() argument 30 LTC_UNUSED_PARAM(keylen); in pmac_file() 52 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) { in pmac_file()
|