| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_sizes.h | 188 #define PSA_AEAD_TAG_LENGTH(key_type, key_bits, alg) \ argument 191 ((void) (key_bits), 0u)) 328 #define PSA_MAC_LENGTH(key_type, key_bits, alg) \ argument 332 ((void) (key_type), (void) (key_bits), 0u)) 646 #define PSA_SIGN_OUTPUT_SIZE(key_type, key_bits, alg) \ argument 647 (PSA_KEY_TYPE_IS_RSA(key_type) ? ((void) alg, PSA_BITS_TO_BYTES(key_bits)) : \ 648 PSA_KEY_TYPE_IS_ECC(key_type) ? PSA_ECDSA_SIGNATURE_SIZE(key_bits) : \ 699 #define PSA_ASYMMETRIC_ENCRYPT_OUTPUT_SIZE(key_type, key_bits, alg) \ argument 701 ((void) alg, PSA_BITS_TO_BYTES(key_bits)) : \ 738 #define PSA_ASYMMETRIC_DECRYPT_OUTPUT_SIZE(key_type, key_bits, alg) \ argument [all …]
|
| H A D | crypto_compat.h | 220 #define PSA_KEY_DOMAIN_PARAMETERS_SIZE(key_type, key_bits) \ argument
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_ticket.c | 96 psa_set_key_bits(&attributes, key->key_bits); in ssl_ticket_gen_key() 100 PSA_BITS_TO_BYTES(key->key_bits), in ssl_ticket_gen_key() 166 const size_t bitlen = key->key_bits; in mbedtls_ssl_ticket_rotate() 185 psa_set_key_bits(&attributes, key->key_bits); in mbedtls_ssl_ticket_rotate() 188 PSA_BITS_TO_BYTES(key->key_bits), in mbedtls_ssl_ticket_rotate() 220 size_t key_bits; in mbedtls_ssl_ticket_setup() local 231 &alg, &key_type, &key_bits) != PSA_SUCCESS) { in mbedtls_ssl_ticket_setup() 247 key_bits = mbedtls_cipher_info_get_key_bitlen(cipher_info); in mbedtls_ssl_ticket_setup() 250 if (key_bits > 8 * MAX_KEY_BYTES) { in mbedtls_ssl_ticket_setup() 262 ctx->keys[0].key_bits = key_bits; in mbedtls_ssl_ticket_setup() [all …]
|
| H A D | psa_crypto_cipher.c | 126 size_t *key_bits, in mbedtls_cipher_values_from_psa() argument 133 (void) key_bits; in mbedtls_cipher_values_from_psa() 221 if (*key_bits == 64) { in mbedtls_cipher_values_from_psa() 229 if (*key_bits == 128) { in mbedtls_cipher_values_from_psa() 230 *key_bits = 192; in mbedtls_cipher_values_from_psa() 258 size_t key_bits, in mbedtls_cipher_info_from_psa() argument 265 status = mbedtls_cipher_values_from_psa(alg, key_type, &key_bits, &mode, &cipher_id_tmp); in mbedtls_cipher_info_from_psa() 273 return mbedtls_cipher_info_from_values(cipher_id_tmp, (int) key_bits, mode); in mbedtls_cipher_info_from_psa() 287 size_t key_bits; in psa_cipher_setup() local 296 key_bits = attributes->bits; in psa_cipher_setup() [all …]
|
| H A D | psa_crypto_driver_wrappers_no_static.c | 92 size_t key_bits = psa_get_key_bits(attributes); in psa_driver_wrapper_get_key_buffer_size() local 110 key_bits ); in psa_driver_wrapper_get_key_buffer_size() 117 (void)key_bits; in psa_driver_wrapper_get_key_buffer_size()
|
| H A D | psa_crypto_cipher.h | 33 size_t *key_bits, mbedtls_cipher_mode_t *mode, 50 psa_algorithm_t alg, psa_key_type_t key_type, size_t key_bits,
|
| H A D | psa_crypto_aead.c | 36 size_t key_bits = attributes->bits; in psa_aead_setup() local 40 &key_bits, &mode, &cipher_id); in psa_aead_setup() 59 key_buffer, (unsigned int) key_bits)); in psa_aead_setup() 79 key_buffer, (unsigned int) key_bits)); in psa_aead_setup()
|
| H A D | ssl_tls13_keys.c | 944 size_t key_bits; in mbedtls_ssl_tls13_populate_transform() local 1054 &key_bits)) != PSA_SUCCESS) { in mbedtls_ssl_tls13_populate_transform() 1069 PSA_BITS_TO_BYTES(key_bits), in mbedtls_ssl_tls13_populate_transform() 1080 PSA_BITS_TO_BYTES(key_bits), in mbedtls_ssl_tls13_populate_transform() 1100 size_t key_bits; in ssl_tls13_get_cipher_key_info() local 1110 &alg, &key_type, &key_bits); in ssl_tls13_get_cipher_key_info() 1115 *key_len = PSA_BITS_TO_BYTES(key_bits); in ssl_tls13_get_cipher_key_info()
|
| H A D | pk.c | 867 size_t key_bits; in copy_from_psa() local 896 key_bits = psa_get_key_bits(&key_attr); in copy_from_psa() 943 grp_id = mbedtls_ecc_group_from_psa(PSA_KEY_TYPE_ECC_GET_FAMILY(key_type), key_bits); in copy_from_psa() 966 (void) key_bits; in copy_from_psa()
|
| H A D | ssl_ciphersuites.c | 1909 size_t key_bits; in mbedtls_ssl_ciphersuite_get_cipher_key_bitlen() local 1913 &alg, &key_type, &key_bits); in mbedtls_ssl_ciphersuite_get_cipher_key_bitlen() 1919 return key_bits; in mbedtls_ssl_ciphersuite_get_cipher_key_bitlen()
|
| H A D | pk_wrap.c | 703 size_t key_bits = 0; in ecdsa_sign_psa() local 709 key_bits = psa_get_key_bits(&key_attr); in ecdsa_sign_psa() 729 ret = mbedtls_ecdsa_raw_to_der(key_bits, sig, *sig_len, sig, sig_size, sig_len); in ecdsa_sign_psa()
|
| H A D | ssl_tls.c | 8660 size_t key_bits; in ssl_tls12_populate_transform() local 8710 &key_bits)) != PSA_SUCCESS) { in ssl_tls12_populate_transform() 8779 keylen = PSA_BITS_TO_BYTES(key_bits); in ssl_tls12_populate_transform() 8954 PSA_BITS_TO_BYTES(key_bits), in ssl_tls12_populate_transform() 8966 PSA_BITS_TO_BYTES(key_bits), in ssl_tls12_populate_transform()
|
| H A D | psa_crypto.c | 2645 size_t key_bits = psa_get_key_bits(attributes); in psa_mac_finalize_alg_and_key_validation() local 2658 *mac_size = PSA_MAC_LENGTH(key_type, key_bits, alg); in psa_mac_finalize_alg_and_key_validation() 2668 if (*mac_size > PSA_MAC_LENGTH(key_type, key_bits, in psa_mac_finalize_alg_and_key_validation()
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | hpre_ecc.c | 57 const uint32_t key_bits; member 309 .key_bits = 192, 319 .key_bits = 224, 329 .key_bits = 256, 339 .key_bits = 384, 349 .key_bits = 521, 359 .key_bits = 256, 602 static bool key_size_is_supported(size_t key_bits) in key_size_is_supported() argument 604 return (key_bits == 192 || key_bits == 224 || key_bits == 256 || in key_size_is_supported() 605 key_bits == 384 || key_bits == 448 || key_bits == 512 || in key_size_is_supported() [all …]
|
| H A D | hpre_montgomery.c | 23 uint32_t key_bits; member 81 .key_bits = 256, 86 .key_bits = 448, 123 static TEE_Result gen_random_privkey(uint8_t *priv, size_t key_bits) in gen_random_privkey() argument 125 size_t key_size = BITS_TO_BYTES(key_bits); in gen_random_privkey() 281 msg->curve_bytes = BITS_TO_BYTES(curve->key_bits); in hpre_montgomery_request_init() 283 if (curve->key_bits == X25519_KEY_BITS) { in hpre_montgomery_request_init() 285 } else if (curve->key_bits == X448_KEY_BITS) { in hpre_montgomery_request_init()
|
| H A D | hpre_rsa.c | 146 static size_t hpre_rsa_get_hw_kbytes(size_t key_bits) in hpre_rsa_get_hw_kbytes() argument 150 if (key_bits <= 1024) in hpre_rsa_get_hw_kbytes() 152 else if (key_bits <= 2048) in hpre_rsa_get_hw_kbytes() 154 else if (key_bits <= 3072) in hpre_rsa_get_hw_kbytes() 156 else if (key_bits <= 4096) in hpre_rsa_get_hw_kbytes() 159 EMSG("Invalid key_bits[%zu]", key_bits); in hpre_rsa_get_hw_kbytes()
|
| H A D | hpre_dh.c | 159 static TEE_Result hpre_dh_gen_privkey(struct bignum *x, size_t key_bits) in hpre_dh_gen_privkey() argument 161 size_t key_bytes = BITS_TO_BYTES(key_bits); in hpre_dh_gen_privkey()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| H A D | pbes2.c | 168 res->key_bits = 40; in pbes2_extract() 171 res->key_bits = 64; in pbes2_extract() 174 res->key_bits = 128; in pbes2_extract() 180 res->key_bits = klen; in pbes2_extract() 189 res->key_bits = 32; in pbes2_extract()
|
| H A D | pbes.c | 36 if (arg->key_bits != 0) { in pbes_decrypt() 38 if ((arg->key_bits % 8) != 0) return CRYPT_INVALID_KEYSIZE; in pbes_decrypt() 40 klen = arg->key_bits / 8; in pbes_decrypt()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | ssl_ticket.h | 63 size_t MBEDTLS_PRIVATE(key_bits); /*!< key length in bits */
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | ecc.c | 433 size_t key_bits = 0; in shared_secret() local 439 ret = ecc_get_key_size(private_key->curve, 0, &key_bytes, &key_bits); in shared_secret() 500 size_t key_bits = 0; in sign() local 503 res = ecc_get_key_size(key->curve, algo, &key_bytes, &key_bits); in sign() 577 size_t key_bits = 0; in verify() local 580 res = ecc_get_key_size(key->curve, algo, &key_bytes, &key_bits); in verify()
|
| /optee_os/ta/pkcs11/src/ |
| H A D | pkcs11_attributes.c | 813 uint32_t key_bits = 0; in create_pub_key_rsa_generated_attributes() local 828 key_bits = a_size * 8; in create_pub_key_rsa_generated_attributes() 830 return add_attribute(out, PKCS11_CKA_MODULUS_BITS, &key_bits, in create_pub_key_rsa_generated_attributes() 831 sizeof(key_bits)); in create_pub_key_rsa_generated_attributes() 2506 uint32_t key_bits = 0; in set_private_key_data_rsa() local 2518 rc = get_u32_attribute(*head, PKCS11_CKA_MODULUS_BITS, &key_bits); in set_private_key_data_rsa() 2555 if (key_bits && mbedtls_mpi_bitlen(&n) != key_bits) { in set_private_key_data_rsa()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_private.h | 91 unsigned long key_bits; member
|