| /optee_os/core/lib/libtomcrypt/src/mac/blake2/ |
| H A D | blake2bmac_memory.c | 18 …ng keylen, const unsigned char *in, unsigned long inlen, unsigned char *mac, unsigned long *maclen) in blake2bmac_memory() argument 26 LTC_ARGCHK(maclen != NULL); in blake2bmac_memory() 28 if ((err = blake2bmac_init(&st, *maclen, key, keylen)) != CRYPT_OK) { goto LBL_ERR; } in blake2bmac_memory() 30 err = blake2bmac_done(&st, mac, maclen); in blake2bmac_memory()
|
| H A D | blake2smac_memory.c | 18 …ng keylen, const unsigned char *in, unsigned long inlen, unsigned char *mac, unsigned long *maclen) in blake2smac_memory() argument 26 LTC_ARGCHK(maclen != NULL); in blake2smac_memory() 28 if ((err = blake2smac_init(&st, *maclen, key, keylen)) != CRYPT_OK) { goto LBL_ERR; } in blake2smac_memory() 30 err = blake2smac_done(&st, mac, maclen); in blake2smac_memory()
|
| H A D | blake2smac_file.c | 17 … *fname, const unsigned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen) in blake2smac_file() argument 24 LTC_UNUSED_PARAM(maclen); in blake2smac_file() 36 LTC_ARGCHK(maclen != NULL); in blake2smac_file() 42 if ((err = blake2smac_init(&st, *maclen, key, keylen)) != CRYPT_OK) { in blake2smac_file() 65 err = blake2smac_done(&st, mac, maclen); in blake2smac_file()
|
| H A D | blake2bmac_file.c | 17 … *fname, const unsigned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen) in blake2bmac_file() argument 24 LTC_UNUSED_PARAM(maclen); in blake2bmac_file() 36 LTC_ARGCHK(maclen != NULL); in blake2bmac_file() 42 if ((err = blake2bmac_init(&st, *maclen, key, keylen)) != CRYPT_OK) { in blake2bmac_file() 65 err = blake2bmac_done(&st, mac, maclen); in blake2bmac_file()
|
| H A D | blake2smac.c | 45 int blake2smac_done(blake2smac_state *st, unsigned char *mac, unsigned long *maclen) in blake2smac_done() argument 49 LTC_ARGCHK(maclen != NULL); in blake2smac_done() 50 LTC_ARGCHK(*maclen >= st->blake2s.outlen); in blake2smac_done() 52 *maclen = st->blake2s.outlen; in blake2smac_done()
|
| H A D | blake2bmac.c | 45 int blake2bmac_done(blake2bmac_state *st, unsigned char *mac, unsigned long *maclen) in blake2bmac_done() argument 49 LTC_ARGCHK(maclen != NULL); in blake2bmac_done() 50 LTC_ARGCHK(*maclen >= st->blake2b.outlen); in blake2bmac_done() 52 *maclen = st->blake2b.outlen; in blake2bmac_done()
|
| H A D | blake2bmac_memory_multi.c | 20 …gned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen, const unsigned ch… in blake2bmac_memory_multi() argument 31 LTC_ARGCHK(maclen != NULL); in blake2bmac_memory_multi() 36 if ((err = blake2bmac_init(&st, *maclen, key, keylen)) != CRYPT_OK) { goto LBL_ERR; } in blake2bmac_memory_multi() 43 err = blake2bmac_done(&st, mac, maclen); in blake2bmac_memory_multi()
|
| H A D | blake2smac_memory_multi.c | 20 …gned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen, const unsigned ch… in blake2smac_memory_multi() argument 31 LTC_ARGCHK(maclen != NULL); in blake2smac_memory_multi() 36 if ((err = blake2smac_init(&st, *maclen, key, keylen)) != CRYPT_OK) { goto LBL_ERR; } in blake2smac_memory_multi() 43 err = blake2smac_done(&st, mac, maclen); in blake2smac_memory_multi()
|
| /optee_os/core/lib/libtomcrypt/src/mac/poly1305/ |
| H A D | poly1305_file.c | 22 … *fname, const unsigned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen) in poly1305_file() argument 29 LTC_UNUSED_PARAM(maclen); in poly1305_file() 41 LTC_ARGCHK(maclen != NULL); in poly1305_file() 70 err = poly1305_done(&st, mac, maclen); in poly1305_file()
|
| H A D | poly1305_memory.c | 23 …ng keylen, const unsigned char *in, unsigned long inlen, unsigned char *mac, unsigned long *maclen) in poly1305_memory() argument 31 LTC_ARGCHK(maclen != NULL); in poly1305_memory() 35 err = poly1305_done(&st, mac, maclen); in poly1305_memory()
|
| H A D | poly1305_memory_multi.c | 25 …gned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen, const unsigned ch… in poly1305_memory_multi() argument 36 LTC_ARGCHK(maclen != NULL); in poly1305_memory_multi() 48 err = poly1305_done(&st, mac, maclen); in poly1305_memory_multi()
|
| H A D | poly1305.c | 165 int poly1305_done(poly1305_state *st, unsigned char *mac, unsigned long *maclen) in poly1305_done() argument 174 LTC_ARGCHK(maclen != NULL); in poly1305_done() 175 LTC_ARGCHK(*maclen >= 16); in poly1305_done() 254 *maclen = 16; in poly1305_done()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_mac.h | 116 int poly1305_done(poly1305_state *st, unsigned char *mac, unsigned long *maclen); 117 …g keylen, const unsigned char *in, unsigned long inlen, unsigned char *mac, unsigned long *maclen); 119 unsigned char *mac, unsigned long *maclen, 122 …*fname, const unsigned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen); 130 int blake2smac_done(blake2smac_state *st, unsigned char *mac, unsigned long *maclen); 131 …g keylen, const unsigned char *in, unsigned long inlen, unsigned char *mac, unsigned long *maclen); 133 unsigned char *mac, unsigned long *maclen, 136 …*fname, const unsigned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen); 144 int blake2bmac_done(blake2bmac_state *st, unsigned char *mac, unsigned long *maclen); 145 …g keylen, const unsigned char *in, unsigned long inlen, unsigned char *mac, unsigned long *maclen); [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_msg.c | 1037 if (post_avail < transform->maclen) { in mbedtls_ssl_encrypt_buf() 1096 memcpy(data + rec->data_len, mac, transform->maclen); in mbedtls_ssl_encrypt_buf() 1100 transform->maclen); in mbedtls_ssl_encrypt_buf() 1102 rec->data_len += transform->maclen; in mbedtls_ssl_encrypt_buf() 1103 post_avail -= transform->maclen; in mbedtls_ssl_encrypt_buf() 1107 mbedtls_platform_zeroize(mac, transform->maclen); in mbedtls_ssl_encrypt_buf() 1385 if (post_avail < transform->maclen) { in mbedtls_ssl_encrypt_buf() 1441 memcpy(data + rec->data_len, mac, transform->maclen); in mbedtls_ssl_encrypt_buf() 1443 rec->data_len += transform->maclen; in mbedtls_ssl_encrypt_buf() 1444 post_avail -= transform->maclen; in mbedtls_ssl_encrypt_buf() [all …]
|
| H A D | ssl_misc.h | 1128 size_t maclen; /*!< MAC(CBC) len */ member 1188 return transform->maclen == 0 && transform->taglen != 0; in mbedtls_ssl_transform_uses_aead()
|
| H A D | ssl_tls.c | 8788 transform->maclen = 0; in ssl_tls12_populate_transform() 8844 transform->maclen = mac_key_len; in ssl_tls12_populate_transform() 8855 transform->minlen = transform->maclen; in ssl_tls12_populate_transform() 8865 transform->minlen = transform->maclen in ssl_tls12_populate_transform() 8870 transform->minlen = transform->maclen in ssl_tls12_populate_transform() 8872 - transform->maclen % block_size; in ssl_tls12_populate_transform() 8894 (unsigned) transform->maclen)); in ssl_tls12_populate_transform()
|
| H A D | ssl_tls13_keys.c | 1035 transform->maclen = 0; in mbedtls_ssl_tls13_populate_transform()
|