| /optee_os/core/crypto/ |
| H A D | aes-gcm.c | 72 size_t nonce_len, size_t tag_len) in __gcm_init() argument 84 if (nonce_len == (96 / 8)) { in __gcm_init() 85 memcpy(state->ctr, nonce, nonce_len); in __gcm_init() 88 ghash_update_pad_zero(state, nonce, nonce_len); in __gcm_init() 89 ghash_update_lengths(state, 0, nonce_len); in __gcm_init() 127 size_t nonce_len, size_t tag_len) in internal_aes_gcm_init() argument 137 return __gcm_init(&ctx->state, ek, mode, nonce, nonce_len, tag_len); in internal_aes_gcm_init() 369 const void *nonce, size_t nonce_len, in internal_aes_gcm_enc() argument 377 res = __gcm_init(&state, enc_key, TEE_MODE_ENCRYPT, nonce, nonce_len, in internal_aes_gcm_enc() 392 const void *nonce, size_t nonce_len, in internal_aes_gcm_dec() argument [all …]
|
| H A D | crypto.c | 409 const uint8_t *nonce, size_t nonce_len, in crypto_authenc_init() argument 413 return ae_ops(ctx)->init(ctx, mode, key, key_len, nonce, nonce_len, in crypto_authenc_init()
|
| /optee_os/core/include/crypto/ |
| H A D | internal_aes-gcm.h | 58 size_t nonce_len, size_t tag_len); 76 const void *nonce, size_t nonce_len, 82 const void *nonce, size_t nonce_len,
|
| H A D | crypto.h | 64 const uint8_t *nonce, size_t nonce_len,
|
| H A D | crypto_impl.h | 330 const uint8_t *nonce, size_t nonce_len,
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ctr_drbg.c | 450 size_t nonce_len) in mbedtls_ctr_drbg_reseed_internal() argument 459 if (nonce_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len) { in mbedtls_ctr_drbg_reseed_internal() 462 if (len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len - nonce_len) { in mbedtls_ctr_drbg_reseed_internal() 475 if (nonce_len != 0) { in mbedtls_ctr_drbg_reseed_internal() 476 if (0 != ctx->f_entropy(ctx->p_entropy, seed + seedlen, nonce_len)) { in mbedtls_ctr_drbg_reseed_internal() 479 seedlen += nonce_len; in mbedtls_ctr_drbg_reseed_internal() 543 size_t nonce_len; in mbedtls_ctr_drbg_seed() local 562 nonce_len = (ctx->reseed_counter >= 0 ? in mbedtls_ctr_drbg_seed() 584 nonce_len)) != 0) { in mbedtls_ctr_drbg_seed()
|
| /optee_os/core/drivers/crypto/crypto_api/authenc/ |
| H A D | authenc.c | 78 size_t nonce_len, size_t tag_len, size_t aad_len, in authenc_init() argument 84 if ((!key && key_len) || (!nonce && nonce_len)) { in authenc_init() 87 CRYPTO_TRACE("nonce @%p-%zu bytes", nonce, nonce_len); in authenc_init() 98 .nonce.length = nonce_len, in authenc_init()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | ccm.c | 65 const uint8_t *nonce, size_t nonce_len, in crypto_aes_ccm_init() argument 85 if (nonce_len > TEE_CCM_NONCE_MAX_LENGTH) in crypto_aes_ccm_init() 103 ltc_res = ccm_add_nonce(&ccm->ctx, nonce, nonce_len); in crypto_aes_ccm_init()
|
| H A D | gcm.c | 64 const uint8_t *nonce, size_t nonce_len, in crypto_aes_gcm_init() argument 84 ltc_res = gcm_add_iv(&gcm->ctx, nonce, nonce_len); in crypto_aes_gcm_init()
|
| /optee_os/scripts/ |
| H A D | sign_encrypt.py | 507 [enc_algo, flags, nonce_len, 512 if nonce_len != 12: 514 .format(nonce_len)) 515 self.nonce = self.inf[offs:offs + nonce_len] 516 offs += nonce_len 592 [enc_algo, flags, nonce_len, 611 print(' iv_size: {} (bytes)'.format(nonce_len)) 612 if nonce_len != NONCE_SIZE: 614 .format(nonce_len)) 615 nonce = self.inf[offs:offs + nonce_len] [all …]
|
| /optee_os/core/drivers/ |
| H A D | stm32mp15_huk.c | 97 size_t nonce_len = sizeof(nonce); in aes_gcm_encrypt_uid() local 111 nonce_len, TEE_AES_BLOCK_SIZE, 0, uid_len); in aes_gcm_encrypt_uid()
|
| /optee_os/core/include/tee/ |
| H A D | tee_svc_cryp.h | 62 size_t nonce_len, size_t tag_len,
|
| /optee_os/lib/libutee/include/ |
| H A D | utee_syscalls.h | 136 size_t nonce_len, size_t tag_len, size_t aad_len,
|
| /optee_os/core/tee/ |
| H A D | tee_svc_cryp.c | 4084 size_t nonce_len, size_t tag_len, in syscall_authenc_init() argument 4106 res = bb_memdup_user(nonce, nonce_len, &nonce_bbuf); in syscall_authenc_init() 4111 key->key_size, nonce_bbuf, nonce_len, tag_len, in syscall_authenc_init()
|