Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 33) sorted by relevance

12

/optee_os/core/lib/libtomcrypt/src/pk/dh/
H A Ddh_generate_key.c40 unsigned long keysize; in dh_generate_key() local
51 keysize = s_dh_groupsize_to_keysize(mp_unsigned_bin_size(key->prime)); in dh_generate_key()
52 if (keysize == 0) { in dh_generate_key()
58 buf = XMALLOC(keysize); in dh_generate_key()
67 if (prng_descriptor[wprng]->read(buf, keysize, prng) != keysize) { in dh_generate_key()
72 if ((err = mp_read_unsigned_bin(key->x, buf, keysize)) != CRYPT_OK) { in dh_generate_key()
83 zeromem(buf, keysize); in dh_generate_key()
/optee_os/core/lib/libtomcrypt/src/ciphers/aes/
H A Daes_desc.c234 int AES_KS(int *keysize) in AES_KS() argument
236 LTC_ARGCHK(keysize != NULL); in AES_KS()
238 if (*keysize < 16) { in AES_KS()
241 if (*keysize < 24) { in AES_KS()
242 *keysize = 16; in AES_KS()
245 if (*keysize < 32) { in AES_KS()
246 *keysize = 24; in AES_KS()
249 *keysize = 32; in AES_KS()
H A Daesni.c351 int aesni_keysize(int *keysize) in aesni_keysize() argument
353 LTC_ARGCHK(keysize != NULL); in aesni_keysize()
355 if (*keysize < 16) { in aesni_keysize()
358 if (*keysize < 24) { in aesni_keysize()
359 *keysize = 16; in aesni_keysize()
362 if (*keysize < 32) { in aesni_keysize()
363 *keysize = 24; in aesni_keysize()
366 *keysize = 32; in aesni_keysize()
H A Daes.c710 int ECB_KS(int *keysize) in ECB_KS() argument
712 LTC_ARGCHK(keysize != NULL); in ECB_KS()
714 if (*keysize < 16) { in ECB_KS()
717 if (*keysize < 24) { in ECB_KS()
718 *keysize = 16; in ECB_KS()
721 if (*keysize < 32) { in ECB_KS()
722 *keysize = 24; in ECB_KS()
725 *keysize = 32; in ECB_KS()
/optee_os/core/lib/libtomcrypt/src/ciphers/
H A Danubis.c1526 int anubis_keysize(int *keysize) in anubis_keysize() argument
1528 LTC_ARGCHK(keysize != NULL); in anubis_keysize()
1529 if (*keysize >= 40) { in anubis_keysize()
1530 *keysize = 40; in anubis_keysize()
1531 } else if (*keysize >= 36) { in anubis_keysize()
1532 *keysize = 36; in anubis_keysize()
1533 } else if (*keysize >= 32) { in anubis_keysize()
1534 *keysize = 32; in anubis_keysize()
1535 } else if (*keysize >= 28) { in anubis_keysize()
1536 *keysize = 28; in anubis_keysize()
[all …]
H A Dkseed.c355 int kseed_keysize(int *keysize) in kseed_keysize() argument
357 LTC_ARGCHK(keysize != NULL); in kseed_keysize()
358 if (*keysize >= 16) { in kseed_keysize()
359 *keysize = 16; in kseed_keysize()
H A Dtea.c198 int tea_keysize(int *keysize) in tea_keysize() argument
200 LTC_ARGCHK(keysize != NULL); in tea_keysize()
201 if (*keysize < 16) { in tea_keysize()
204 *keysize = 16; in tea_keysize()
H A Dskipjack.c322 int skipjack_keysize(int *keysize) in skipjack_keysize() argument
324 LTC_ARGCHK(keysize != NULL); in skipjack_keysize()
325 if (*keysize < 10) { in skipjack_keysize()
328 if (*keysize > 10) { in skipjack_keysize()
329 *keysize = 10; in skipjack_keysize()
H A Dxtea.c237 int xtea_keysize(int *keysize) in xtea_keysize() argument
239 LTC_ARGCHK(keysize != NULL); in xtea_keysize()
240 if (*keysize < 16) { in xtea_keysize()
243 *keysize = 16; in xtea_keysize()
H A Drc2.c393 int rc2_keysize(int *keysize) in rc2_keysize() argument
395 LTC_ARGCHK(keysize != NULL); in rc2_keysize()
396 if (*keysize < 1) { in rc2_keysize()
399 if (*keysize > 128) { in rc2_keysize()
400 *keysize = 128; in rc2_keysize()
H A Drc5.c308 int rc5_keysize(int *keysize) in rc5_keysize() argument
310 LTC_ARGCHK(keysize != NULL); in rc5_keysize()
311 if (*keysize < 8) { in rc5_keysize()
314 if (*keysize > 128) { in rc5_keysize()
315 *keysize = 128; in rc5_keysize()
H A Drc6.c310 int rc6_keysize(int *keysize) in rc6_keysize() argument
312 LTC_ARGCHK(keysize != NULL); in rc6_keysize()
313 if (*keysize < 8) { in rc6_keysize()
316 if (*keysize > 128) { in rc6_keysize()
317 *keysize = 128; in rc6_keysize()
H A Dblowfish.c644 int blowfish_keysize(int *keysize) in blowfish_keysize() argument
646 LTC_ARGCHK(keysize != NULL); in blowfish_keysize()
648 if (*keysize < 8) { in blowfish_keysize()
651 if (*keysize > 56) { in blowfish_keysize()
652 *keysize = 56; in blowfish_keysize()
H A Didea.c175 int idea_keysize(int *keysize) in idea_keysize() argument
177 LTC_ARGCHK(keysize != NULL); in idea_keysize()
178 if (*keysize < 16) { in idea_keysize()
181 *keysize = 16; in idea_keysize()
H A Dmulti2.c298 int multi2_keysize(int *keysize) in multi2_keysize() argument
300 LTC_ARGCHK(keysize != NULL); in multi2_keysize()
301 if (*keysize >= 40) { in multi2_keysize()
302 *keysize = 40; in multi2_keysize()
H A Dkasumi.c234 int kasumi_keysize(int *keysize) in kasumi_keysize() argument
236 LTC_ARGCHK(keysize != NULL); in kasumi_keysize()
237 if (*keysize >= 16) { in kasumi_keysize()
238 *keysize = 16; in kasumi_keysize()
H A Dnoekeon.c306 int noekeon_keysize(int *keysize) in noekeon_keysize() argument
308 LTC_ARGCHK(keysize != NULL); in noekeon_keysize()
309 if (*keysize < 16) { in noekeon_keysize()
312 *keysize = 16; in noekeon_keysize()
H A Dserpent.c608 int serpent_keysize(int *keysize) in serpent_keysize() argument
610 LTC_ARGCHK(keysize != NULL); in serpent_keysize()
612 if (*keysize >= 32) { *keysize = 32; } in serpent_keysize()
613 else if (*keysize >= 24) { *keysize = 24; } in serpent_keysize()
614 else if (*keysize >= 16) { *keysize = 16; } in serpent_keysize()
H A Dcamellia.c711 int camellia_keysize(int *keysize) in camellia_keysize() argument
713 if (*keysize >= 32) { *keysize = 32; } in camellia_keysize()
714 else if (*keysize >= 24) { *keysize = 24; } in camellia_keysize()
715 else if (*keysize >= 16) { *keysize = 16; } in camellia_keysize()
/optee_os/core/lib/libtomcrypt/
H A Daes_accel.c88 int rijndael_keysize(int *keysize) in rijndael_keysize() argument
90 LTC_ARGCHK(keysize); in rijndael_keysize()
92 if (*keysize < 16) in rijndael_keysize()
94 else if (*keysize < 24) in rijndael_keysize()
95 *keysize = 16; in rijndael_keysize()
96 else if (*keysize < 32) in rijndael_keysize()
97 *keysize = 24; in rijndael_keysize()
99 *keysize = 32; in rijndael_keysize()
245 .keysize = rijndael_keysize,
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_cipher.h427 int (*keysize)(int *keysize); member
631 int blowfish_keysize(int *keysize);
641 int rc5_keysize(int *keysize);
651 int rc6_keysize(int *keysize);
662 int rc2_keysize(int *keysize);
672 int saferp_keysize(int *keysize);
687 int safer_64_keysize(int *keysize);
688 int safer_128_keysize(int *keysize);
699 int aes_keysize(int *keysize);
704 int aes_enc_keysize(int *keysize);
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
H A Decc_make_key.c21 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) in ecc_make_key() argument
25 if ((err = ecc_set_curve_by_size(keysize, key)) != CRYPT_OK) { return err; } in ecc_make_key()
/optee_os/core/lib/libtomcrypt/src/ciphers/safer/
H A Dsafer.c351 int safer_64_keysize(int *keysize) in safer_64_keysize() argument
353 LTC_ARGCHK(keysize != NULL); in safer_64_keysize()
354 if (*keysize < 8) { in safer_64_keysize()
357 *keysize = 8; in safer_64_keysize()
361 int safer_128_keysize(int *keysize) in safer_128_keysize() argument
363 LTC_ARGCHK(keysize != NULL); in safer_128_keysize()
364 if (*keysize < 16) { in safer_128_keysize()
367 *keysize = 16; in safer_128_keysize()
H A Dsaferp.c548 int saferp_keysize(int *keysize) in saferp_keysize() argument
550 LTC_ARGCHK(keysize != NULL); in saferp_keysize()
552 if (*keysize < 16) { in saferp_keysize()
555 if (*keysize < 24) { in saferp_keysize()
556 *keysize = 16; in saferp_keysize()
557 } else if (*keysize < 32) { in saferp_keysize()
558 *keysize = 24; in saferp_keysize()
560 *keysize = 32; in saferp_keysize()
/optee_os/core/lib/libtomcrypt/src/ciphers/twofish/
H A Dtwofish.c687 int twofish_keysize(int *keysize) in twofish_keysize() argument
689 LTC_ARGCHK(keysize); in twofish_keysize()
690 if (*keysize < 16) { in twofish_keysize()
693 if (*keysize < 24) { in twofish_keysize()
694 *keysize = 16; in twofish_keysize()
697 if (*keysize < 32) { in twofish_keysize()
698 *keysize = 24; in twofish_keysize()
701 *keysize = 32; in twofish_keysize()

12