| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt.h | 40 CRYPT_INVALID_KEYSIZE, /* Invalid key size given */ enumerator
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/safer/ |
| H A D | safer.c | 184 return CRYPT_INVALID_KEYSIZE; in safer_k64_setup() 201 return CRYPT_INVALID_KEYSIZE; in safer_sk64_setup() 218 return CRYPT_INVALID_KEYSIZE; in safer_k128_setup() 235 return CRYPT_INVALID_KEYSIZE; in safer_sk128_setup() 355 return CRYPT_INVALID_KEYSIZE; in safer_64_keysize() 365 return CRYPT_INVALID_KEYSIZE; in safer_128_keysize()
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/ |
| H A D | kseed.c | 200 return CRYPT_INVALID_KEYSIZE; in kseed_setup() 361 return CRYPT_INVALID_KEYSIZE; in kseed_keysize()
|
| H A D | tea.c | 36 return CRYPT_INVALID_KEYSIZE; in tea_setup() 202 return CRYPT_INVALID_KEYSIZE; in tea_keysize()
|
| H A D | xtea.c | 35 return CRYPT_INVALID_KEYSIZE; in xtea_setup() 241 return CRYPT_INVALID_KEYSIZE; in xtea_keysize()
|
| H A D | idea.c | 147 if (keylen != 16) return CRYPT_INVALID_KEYSIZE; in idea_setup() 179 return CRYPT_INVALID_KEYSIZE; in idea_keysize()
|
| H A D | multi2.c | 122 if (keylen != 40) return CRYPT_INVALID_KEYSIZE; in multi2_setup() 304 return CRYPT_INVALID_KEYSIZE; in multi2_keysize()
|
| H A D | kasumi.c | 197 return CRYPT_INVALID_KEYSIZE; in kasumi_setup() 241 return CRYPT_INVALID_KEYSIZE; in kasumi_keysize()
|
| H A D | skipjack.c | 67 return CRYPT_INVALID_KEYSIZE; in skipjack_setup() 326 return CRYPT_INVALID_KEYSIZE; in skipjack_keysize()
|
| H A D | rc2.c | 74 return CRYPT_INVALID_KEYSIZE; in rc2_setup_ex() 397 return CRYPT_INVALID_KEYSIZE; in rc2_keysize()
|
| H A D | rc5.c | 67 return CRYPT_INVALID_KEYSIZE; in s_rc5_setup() 312 return CRYPT_INVALID_KEYSIZE; in rc5_keysize()
|
| H A D | rc6.c | 60 return CRYPT_INVALID_KEYSIZE; in s_rc6_setup() 314 return CRYPT_INVALID_KEYSIZE; in rc6_keysize()
|
| H A D | blowfish.c | 437 return CRYPT_INVALID_KEYSIZE; in blowfish_setup() 649 return CRYPT_INVALID_KEYSIZE; in blowfish_keysize()
|
| H A D | noekeon.c | 75 return CRYPT_INVALID_KEYSIZE; in noekeon_setup() 310 return CRYPT_INVALID_KEYSIZE; in noekeon_keysize()
|
| H A D | anubis.c | 894 return CRYPT_INVALID_KEYSIZE; in s_anubis_setup() 1544 return CRYPT_INVALID_KEYSIZE; in anubis_keysize()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | aes_accel.c | 65 return CRYPT_INVALID_KEYSIZE; in rijndael_setup() 93 return CRYPT_INVALID_KEYSIZE; in rijndael_keysize()
|
| /optee_os/core/lib/libtomcrypt/src/pk/dh/ |
| H A D | dh_generate_key.c | 53 err = CRYPT_INVALID_KEYSIZE; in dh_generate_key()
|
| H A D | dh_set.c | 59 if (ltc_dh_sets[i].size == 0) return CRYPT_INVALID_KEYSIZE; in dh_set_pg_groupsize()
|
| /optee_os/core/lib/libtomcrypt/src/mac/hmac/ |
| H A D | hmac_init.c | 41 return CRYPT_INVALID_KEYSIZE; in hmac_init()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| H A D | pbes.c | 38 if ((arg->key_bits % 8) != 0) return CRYPT_INVALID_KEYSIZE; in pbes_decrypt()
|
| H A D | pbes2.c | 178 if (klen < 256) return CRYPT_INVALID_KEYSIZE; in pbes2_extract()
|
| /optee_os/core/lib/libtomcrypt/src/stream/sober128/ |
| H A D | sober128_stream.c | 163 return CRYPT_INVALID_KEYSIZE; in sober128_stream_setup() 213 return CRYPT_INVALID_KEYSIZE; in sober128_stream_setiv()
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/aes/ |
| H A D | aesni.c | 55 return CRYPT_INVALID_KEYSIZE; in aesni_setup() 356 return CRYPT_INVALID_KEYSIZE; in aesni_keysize()
|
| H A D | aes_desc.c | 239 return CRYPT_INVALID_KEYSIZE; in AES_KS()
|
| /optee_os/core/lib/libtomcrypt/src/misc/crypt/ |
| H A D | crypt_constants.c | 27 C_STRINGIFY(CRYPT_INVALID_KEYSIZE),
|