Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 25 of 128) sorted by relevance

123456

/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_mac.h11 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen);
16 const unsigned char *key, unsigned long keylen,
20 const unsigned char *key, unsigned long keylen,
25 unsigned long keylen,
41 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
45 const unsigned char *key, unsigned long keylen,
49 const unsigned char *key, unsigned long keylen,
54 const unsigned char *key, unsigned long keylen,
76 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
81 const unsigned char *key, unsigned long keylen,
[all …]
H A Dtomcrypt_cipher.h107 ulong32 K[32], keylen; member
398 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
518 const unsigned char *key, unsigned long keylen,
543 const unsigned char *key, unsigned long keylen,
561 const unsigned char *key, unsigned long keylen,
575 const unsigned char *key, unsigned long keylen,
590 const unsigned char *key, unsigned long keylen,
626 int blowfish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
636 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
646 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
[all …]
/optee_os/core/lib/libtomcrypt/src/mac/hmac/
H A Dhmac_init.c22 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen) in hmac_init() argument
40 if (keylen == 0) { in hmac_init()
57 if(keylen > LTC_HMAC_BLOCKSIZE) { in hmac_init()
59 if ((err = hash_memory(hash, key, keylen, hmac->key, &z)) != CRYPT_OK) { in hmac_init()
62 keylen = hashsize; in hmac_init()
64 XMEMCPY(hmac->key, key, (size_t)keylen); in hmac_init()
67 if(keylen < LTC_HMAC_BLOCKSIZE) { in hmac_init()
68 zeromem((hmac->key) + keylen, (size_t)(LTC_HMAC_BLOCKSIZE - keylen)); in hmac_init()
H A Dhmac_memory.c24 const unsigned char *key, unsigned long keylen, in hmac_memory() argument
43 return hash_descriptor[hash]->hmac_block(key, keylen, in, inlen, out, outlen); in hmac_memory()
53 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) { in hmac_memory()
/optee_os/core/lib/libtomcrypt/src/mac/f9/
H A Df9_init.c19 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) in f9_init() argument
37 if ((err = cipher_descriptor[cipher]->setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { in f9_init()
42 for (x = 0; (unsigned)x < keylen; x++) { in f9_init()
52 f9->keylen = keylen; in f9_init()
H A Df9_memory.c23 const unsigned char *key, unsigned long keylen, in f9_memory() argument
37 return cipher_descriptor[cipher]->f9_memory(key, keylen, in, inlen, out, outlen); in f9_memory()
45 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) { in f9_memory()
/optee_os/core/lib/libtomcrypt/src/ciphers/
H A Drc2.c63 int rc2_setup_ex(const unsigned char *key, int keylen, int bits, int num_rounds, symmetric_key *ske… in rc2_setup_ex() argument
73 if (keylen == 0 || keylen > 128 || bits > 1024) { in rc2_setup_ex()
84 for (i = 0; i < keylen; i++) { in rc2_setup_ex()
89 if (keylen < 128) { in rc2_setup_ex()
90 for (i = keylen; i < 128; i++) { in rc2_setup_ex()
91 tmp[i] = permute[(tmp[i - 1] + tmp[i - keylen]) & 255]; in rc2_setup_ex()
126 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc2_setup() argument
128 return rc2_setup_ex(key, keylen, keylen * 8, num_rounds, skey); in rc2_setup()
298 int keylen, bits; in rc2_test()
351 if (tests[x].bits == (tests[x].keylen * 8)) { in rc2_test()
[all …]
H A Drc6.c43 static int s_rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc6_setup() argument
45 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc6_setup()
59 if (keylen < 8 || keylen > 128) { in s_rc6_setup()
64 for (A = i = j = 0; i < (ulong32)keylen; ) { in s_rc6_setup()
73 if (keylen & 3) { in s_rc6_setup()
74 A <<= (8 * (4 - (keylen&3))); in s_rc6_setup()
99 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc6_setup() argument
102 x = s_rc6_setup(key, keylen, num_rounds, skey); in rc6_setup()
230 int keylen; in rc6_test()
273 if ((err = rc6_setup(tests[x].key, tests[x].keylen, 0, &key)) != CRYPT_OK) { in rc6_test()
H A Drc5.c46 static int s_rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc5_setup() argument
48 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc5_setup()
66 if (keylen < 8 || keylen > 128) { in s_rc5_setup()
74 for (A = i = j = 0; i < (ulong32)keylen; ) { in s_rc5_setup()
82 if ((keylen & 3) != 0) { in s_rc5_setup()
83 A <<= (ulong32)((8 * (4 - (keylen&3)))); in s_rc5_setup()
104 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc5_setup() argument
107 x = s_rc5_setup(key, keylen, num_rounds, skey); in rc5_setup()
H A Danubis.c879 static int s_anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_anubis_setup() argument
881 int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_anubis_setup()
893 if ((keylen & 3) || (keylen < 16) || (keylen > 40)) { in s_anubis_setup()
896 skey->anubis.keyBits = keylen*8; in s_anubis_setup()
1013 int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in anubis_setup() argument
1016 err = s_anubis_setup(key, keylen, num_rounds, skey); in anubis_setup()
1168 int keylen; in anubis_test()
1494 anubis_setup(tests[x].key, tests[x].keylen, 0, &skey); in anubis_test()
/optee_os/core/lib/libtomcrypt/src/mac/xcbc/
H A Dxcbc_init.c19 int xcbc_init(xcbc_state *xcbc, int cipher, const unsigned char *key, unsigned long keylen) in xcbc_init() argument
42 if (keylen & LTC_XCBC_PURE) { in xcbc_init()
43 keylen &= ~LTC_XCBC_PURE; in xcbc_init()
45 if (keylen < 2UL*cipher_descriptor[cipher]->block_length) { in xcbc_init()
49 k1 = keylen - 2*cipher_descriptor[cipher]->block_length; in xcbc_init()
63 if ((err = cipher_descriptor[cipher]->setup(key, keylen, 0, skey)) != CRYPT_OK) { in xcbc_init()
H A Dxcbc_memory.c23 const unsigned char *key, unsigned long keylen, in xcbc_memory() argument
37 return cipher_descriptor[cipher]->xcbc_memory(key, keylen, in, inlen, out, outlen); in xcbc_memory()
45 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) { in xcbc_memory()
H A Dxcbc_file.c23 const unsigned char *key, unsigned long keylen, in xcbc_file() argument
30 LTC_UNUSED_PARAM(keylen); in xcbc_file()
51 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) { in xcbc_file()
/optee_os/core/lib/libtomcrypt/src/modes/f8/
H A Df8_start.c26 const unsigned char *key, int keylen, in f8_start() argument
56 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) { in f8_start()
62 for (; x < keylen && x < (int)sizeof(tkey); x++) { in f8_start()
67 if ((err = cipher_descriptor[cipher]->setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) { in f8_start()
83 return cipher_descriptor[cipher]->setup(key, keylen, num_rounds, &f8->key); in f8_start()
/optee_os/core/lib/libtomcrypt/src/stream/salsa20/
H A Dsalsa20_setup.c25 int salsa20_setup(salsa20_state *st, const unsigned char *key, unsigned long keylen, int rounds) in salsa20_setup() argument
31 LTC_ARGCHK(keylen == 32 || keylen == 16); in salsa20_setup()
40 if (keylen == 32) { /* 256bit */ in salsa20_setup()
/optee_os/core/lib/libtomcrypt/src/stream/chacha/
H A Dchacha_setup.c24 int chacha_setup(chacha_state *st, const unsigned char *key, unsigned long keylen, int rounds) in chacha_setup() argument
30 LTC_ARGCHK(keylen == 32 || keylen == 16); in chacha_setup()
38 if (keylen == 32) { /* 256bit */ in chacha_setup()
/optee_os/core/lib/libtomcrypt/src/encauth/eax/
H A Deax_init.c25 const unsigned char *key, unsigned long keylen, in eax_init() argument
63 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { in eax_init()
85 if ((err = omac_init(&eax->headeromac, cipher, key, keylen)) != CRYPT_OK) { in eax_init()
103 …if ((err = ctr_start(cipher, eax->N, key, keylen, 0, CTR_COUNTER_BIG_ENDIAN, &eax->ctr)) != CRYPT_… in eax_init()
108 if ((err = omac_init(&eax->ctomac, cipher, key, keylen)) != CRYPT_OK) { in eax_init()
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpkparse.c430 unsigned char *key, size_t keylen, const unsigned char *end, in pk_parse_key_rfc8410_der() argument
436 if ((ret = mbedtls_asn1_get_tag(&key, (key + keylen), &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) { in pk_parse_key_rfc8410_der()
605 const unsigned char *key, size_t keylen, in pk_parse_key_sec1_der() argument
614 unsigned char *end = p + keylen; in pk_parse_key_sec1_der()
744 const unsigned char *key, size_t keylen, in pk_parse_key_pkcs8_unencrypted_der() argument
751 unsigned char *end = p + keylen; in pk_parse_key_pkcs8_unencrypted_der()
847 if (end != (key + keylen)) { in pk_parse_key_pkcs8_unencrypted_der()
867 unsigned char *key, size_t keylen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() argument
883 end = p + keylen; in mbedtls_pk_parse_key_pkcs8_encrypted_der()
974 const unsigned char *key, size_t keylen, in mbedtls_pk_parse_key() argument
[all …]
/optee_os/core/lib/libtomcrypt/src/ciphers/aes/
H A Daesni.c45 int aesni_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in aesni_setup() argument
54 if (keylen != 16 && keylen != 24 && keylen != 32) { in aesni_setup()
58 if (num_rounds != 0 && num_rounds != (keylen / 4 + 6)) { in aesni_setup()
62 skey->rijndael.Nr = keylen / 4 + 6; in aesni_setup()
75 if (keylen == 16) { in aesni_setup()
88 } else if (keylen == 24) { in aesni_setup()
105 } else if (keylen == 32) { in aesni_setup()
277 int keylen; in aesni_test()
315 if ((err = aesni_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) { in aesni_test()
H A Daes_desc.c94 int AES_SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in AES_SETUP() argument
98 return aesni_setup(key, keylen, num_rounds, skey); in AES_SETUP()
102 return rijndael_setup(key, keylen, num_rounds, skey); in AES_SETUP()
153 int keylen; in AES_TEST()
194 if ((err = AES_SETUP(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) { in AES_TEST()
/optee_os/core/lib/libtomcrypt/src/modes/xts/
H A Dxts_init.c20 …cipher, const unsigned char *key1, const unsigned char *key2, unsigned long keylen, int num_rounds, in xts_start() argument
40 if ((err = cipher_descriptor[cipher]->setup(key1, keylen, num_rounds, &xts->key1)) != CRYPT_OK) { in xts_start()
43 if ((err = cipher_descriptor[cipher]->setup(key2, keylen, num_rounds, &xts->key2)) != CRYPT_OK) { in xts_start()
/optee_os/core/lib/libtomcrypt/src/mac/omac/
H A Domac_memory.c24 const unsigned char *key, unsigned long keylen, in omac_memory() argument
43 return cipher_descriptor[cipher]->omac_memory(key, keylen, in, inlen, out, outlen); in omac_memory()
53 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { in omac_memory()
/optee_os/core/lib/libtomcrypt/src/encauth/chachapoly/
H A Dchacha20poly1305_init.c15 …t chacha20poly1305_init(chacha20poly1305_state *st, const unsigned char *key, unsigned long keylen) in chacha20poly1305_init() argument
17 return chacha_setup(&st->chacha, key, keylen, 20); in chacha20poly1305_init()
/optee_os/core/lib/libtomcrypt/src/misc/pbes/
H A Dpbes.c19 unsigned long klen, keylen, dlen; in pbes_decrypt() local
33 klen = arg->type.keylen; in pbes_decrypt()
42 keylen = klen; in pbes_decrypt()
54 if ((err = cbc_start(cid, iv, k, keylen, 0, &cbc)) != CRYPT_OK) goto LBL_ERROR; in pbes_decrypt()
/optee_os/core/lib/libtomcrypt/src/mac/pmac/
H A Dpmac_file.c23 const unsigned char *key, unsigned long keylen, in pmac_file() argument
30 LTC_UNUSED_PARAM(keylen); in pmac_file()
52 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) { in pmac_file()

123456