| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | nist_kw.c | 132 unsigned char *output, size_t *out_len, size_t out_size) in mbedtls_nist_kw_wrap() argument 142 *out_len = 0; in mbedtls_nist_kw_wrap() 239 *out_len = semiblocks * KW_SEMIBLOCK_LENGTH; in mbedtls_nist_kw_wrap() 263 unsigned char *output, size_t *out_len) in unwrap() argument 272 *out_len = 0; in unwrap() 307 *out_len = (semiblocks - 1) * KW_SEMIBLOCK_LENGTH; in unwrap() 326 unsigned char *output, size_t *out_len, size_t out_size) in mbedtls_nist_kw_unwrap() argument 333 *out_len = 0; in mbedtls_nist_kw_unwrap() 352 A, output, out_len); in mbedtls_nist_kw_unwrap() 391 *out_len = KW_SEMIBLOCK_LENGTH; in mbedtls_nist_kw_unwrap() [all …]
|
| H A D | ssl_client.c | 118 size_t *out_len) in ssl_write_alpn_ext() argument 122 *out_len = 0; in ssl_write_alpn_ext() 159 *out_len = (size_t) (p - buf); in ssl_write_alpn_ext() 162 MBEDTLS_PUT_UINT16_BE(*out_len - 6, buf, 4); in ssl_write_alpn_ext() 165 MBEDTLS_PUT_UINT16_BE(*out_len - 4, buf, 2); in ssl_write_alpn_ext() 222 size_t *out_len) in ssl_write_supported_groups_ext() argument 229 *out_len = 0; in ssl_write_supported_groups_ext() 305 *out_len = (size_t) (p - buf); in ssl_write_supported_groups_ext() 323 size_t *out_len) in ssl_write_client_hello_cipher_suites() argument 331 *out_len = 0; in ssl_write_client_hello_cipher_suites() [all …]
|
| H A D | ssl_tls13_client.c | 49 size_t *out_len) in ssl_tls13_write_supported_versions_ext() argument 55 *out_len = 0; in ssl_tls13_write_supported_versions_ext() 89 *out_len = 5 + versions_len; in ssl_tls13_write_supported_versions_ext() 267 size_t *out_len) in ssl_tls13_write_key_share_ext() argument 275 *out_len = 0; in ssl_tls13_write_key_share_ext() 355 *out_len = p - buf; in ssl_tls13_write_key_share_ext() 358 3, "client hello, key_share extension", buf, *out_len); in ssl_tls13_write_key_share_ext() 566 size_t *out_len) in ssl_tls13_write_cookie_ext() argument 569 *out_len = 0; in ssl_tls13_write_cookie_ext() 593 *out_len = handshake->cookie_len + 6; in ssl_tls13_write_cookie_ext() [all …]
|
| H A D | ssl_tls13_generic.c | 763 size_t *out_len) in ssl_tls13_write_certificate_body() argument 816 *out_len = p - buf; in ssl_tls13_write_certificate_body() 902 size_t *out_len) in ssl_tls13_write_certificate_verify_body() argument 916 *out_len = 0; in ssl_tls13_write_certificate_verify_body() 1020 *out_len = 4 + signature_len; in ssl_tls13_write_certificate_verify_body() 1185 size_t *out_len) in ssl_tls13_write_finished_message_body() argument 1198 *out_len = verify_data_len; in ssl_tls13_write_finished_message_body() 1323 size_t *out_len) in mbedtls_ssl_tls13_write_early_data_ext() argument 1334 *out_len = 0; in mbedtls_ssl_tls13_write_early_data_ext() 1350 *out_len = needed; in mbedtls_ssl_tls13_write_early_data_ext() [all …]
|
| H A D | ssl_tls13_server.c | 2048 size_t *out_len) in ssl_tls13_write_server_hello_supported_versions_ext() argument 2050 *out_len = 0; in ssl_tls13_write_server_hello_supported_versions_ext() 2072 *out_len = 6; in ssl_tls13_write_server_hello_supported_versions_ext() 2089 size_t *out_len) in ssl_tls13_generate_and_write_key_share() argument 2093 *out_len = 0; in ssl_tls13_generate_and_write_key_share() 2099 ssl, named_group, buf, end, out_len); in ssl_tls13_generate_and_write_key_share() 2137 size_t *out_len) in ssl_tls13_write_key_share_ext() argument 2145 *out_len = 0; in ssl_tls13_write_key_share_ext() 2177 *out_len = p - buf; in ssl_tls13_write_key_share_ext() 2188 size_t *out_len) in ssl_tls13_write_hrr_key_share_ext() argument [all …]
|
| H A D | hmac_drbg.c | 307 unsigned char *output, size_t out_len, in mbedtls_hmac_drbg_random_with_add() argument 313 size_t left = out_len; in mbedtls_hmac_drbg_random_with_add() 317 if (out_len > MBEDTLS_HMAC_DRBG_MAX_REQUEST) { in mbedtls_hmac_drbg_random_with_add() 382 int mbedtls_hmac_drbg_random(void *p_rng, unsigned char *output, size_t out_len) in mbedtls_hmac_drbg_random() argument 393 ret = mbedtls_hmac_drbg_random_with_add(ctx, output, out_len, NULL, 0); in mbedtls_hmac_drbg_random()
|
| H A D | lmots.h | 151 size_t *out_len);
|
| H A D | ssl_misc.h | 1288 size_t *out_len); 1994 size_t *out_len); 2223 size_t *out_len); 2231 size_t *out_len); 2296 const unsigned char *end, size_t *out_len); 2865 size_t *out_len); 2879 size_t *out_len); 2908 size_t *out_len, size_t *binders_len);
|
| H A D | lmots.c | 470 size_t *out_len) in mbedtls_lmots_calculate_public_key_candidate() argument 506 if (out_len != NULL) { in mbedtls_lmots_calculate_public_key_candidate() 507 *out_len = MBEDTLS_LMOTS_N_HASH_LEN(params->type); in mbedtls_lmots_calculate_public_key_candidate()
|
| H A D | ssl_tls13_keys.h | 664 uint8_t *out, const size_t out_len);
|
| H A D | ssl_msg.c | 2968 MBEDTLS_PUT_UINT16_BE(len, ssl->out_len, 0); in mbedtls_ssl_write_record() 3004 MBEDTLS_PUT_UINT16_BE(rec.data_len, ssl->out_len, 0); in mbedtls_ssl_write_record() 5413 ssl->out_len = ssl->out_cid; in mbedtls_ssl_update_out_pointers() 5415 ssl->out_len += transform->out_cid_len; in mbedtls_ssl_update_out_pointers() 5418 ssl->out_len = ssl->out_ctr + MBEDTLS_SSL_SEQUENCE_NUMBER_LEN; in mbedtls_ssl_update_out_pointers() 5420 ssl->out_iv = ssl->out_len + 2; in mbedtls_ssl_update_out_pointers() 5424 ssl->out_len = ssl->out_hdr + 3; in mbedtls_ssl_update_out_pointers() 5426 ssl->out_cid = ssl->out_len; in mbedtls_ssl_update_out_pointers()
|
| /optee_os/core/lib/libtomcrypt/src/misc/base16/ |
| H A D | base16_decode.c | 26 unsigned long pos, out_len; in base16_decode() local 45 out_len = *outlen * 2; in base16_decode() 46 for (pos = 0; ((pos + 1 < out_len) && (pos + 1 < inlen)); pos += 2) { in base16_decode()
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | sm2-pke.c | 125 size_t out_len = 0; in sm2_mbedtls_pke_decrypt() local 212 out_len = MIN(*dst_len, C2_len); in sm2_mbedtls_pke_decrypt() 213 for (i = 0; i < out_len; i++) in sm2_mbedtls_pke_decrypt() 215 *dst_len = out_len; in sm2_mbedtls_pke_decrypt() 216 if (out_len < C2_len) { in sm2_mbedtls_pke_decrypt() 217 eom = calloc(1, C2_len - out_len); in sm2_mbedtls_pke_decrypt() 222 for (i = out_len; i < C2_len; i++) in sm2_mbedtls_pke_decrypt() 223 eom[i - out_len] = src[C1_len + i] ^ t[i]; in sm2_mbedtls_pke_decrypt() 237 res = crypto_hash_update(ctx, dst, out_len); in sm2_mbedtls_pke_decrypt() 240 if (out_len < C2_len) { in sm2_mbedtls_pke_decrypt() [all …]
|
| H A D | ecc.c | 321 size_t out_len = 0; in ecc_shared_secret() local 339 lmd_res = mbedtls_ecdh_calc_secret(&ecdh, &out_len, secret, in ecc_shared_secret() 345 *secret_len = out_len; in ecc_shared_secret()
|
| H A D | sm2-kep.c | 444 res = sm2_kdf(xUyUZAZB, sizeof(xUyUZAZB), p->out, p->out_len); in crypto_acipher_sm2_kep_derive()
|
| /optee_os/core/crypto/ |
| H A D | cbc-mac.c | 61 size_t out_len = 0; in crypto_cbc_mac_update() local 93 out_len = nblocks * mc->block_len; in crypto_cbc_mac_update() 96 out_len = mc->block_len; in crypto_cbc_mac_update() 102 false, data, out_len, out); in crypto_cbc_mac_update() 106 data += out_len; in crypto_cbc_mac_update() 107 len -= out_len; in crypto_cbc_mac_update() 111 memcpy(mc->digest, out_tmp + out_len - mc->block_len, in crypto_cbc_mac_update()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | sm2-pke.c | 126 size_t out_len = 0; in sm2_ltc_pke_decrypt() local 245 out_len = MIN(*dst_len, C2_len); in sm2_ltc_pke_decrypt() 246 for (i = 0; i < out_len; i++) in sm2_ltc_pke_decrypt() 248 *dst_len = out_len; in sm2_ltc_pke_decrypt() 249 if (out_len < C2_len) { in sm2_ltc_pke_decrypt() 250 eom = calloc(1, C2_len - out_len); in sm2_ltc_pke_decrypt() 255 for (i = out_len; i < C2_len; i++) in sm2_ltc_pke_decrypt() 256 eom[i - out_len] = src[C1_len + i] ^ t[i]; in sm2_ltc_pke_decrypt() 270 res = crypto_hash_update(ctx, dst, out_len); in sm2_ltc_pke_decrypt() 273 if (out_len < C2_len) { in sm2_ltc_pke_decrypt() [all …]
|
| H A D | sm2-kep.c | 351 res = sm2_kdf(xUyUZAZB, sizeof(xUyUZAZB), p->out, p->out_len); in sm2_kep_derive()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | nist_kw.h | 122 unsigned char *output, size_t *out_len, size_t out_size); 149 unsigned char *output, size_t *out_len, size_t out_size);
|
| H A D | hmac_drbg.h | 378 int mbedtls_hmac_drbg_random(void *p_rng, unsigned char *output, size_t out_len);
|
| /optee_os/core/drivers/ |
| H A D | stm32mp15_huk.c | 91 uint8_t *out, size_t *out_len) in aes_gcm_encrypt_uid() argument 116 out, out_len, tag, &tag_len); in aes_gcm_encrypt_uid() 125 memzero_explicit(out, *out_len); in aes_gcm_encrypt_uid()
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | sec_pbkdf2.c | 46 sqe->type2.dk_len = (uint16_t)pbkdf2_msg->out_len; in sec_pbkdf2_fill_sqe() 91 sqe->pbkdf2_scene.pass_word_dk_len |= SHIFT_U32(pbkdf2_msg->out_len, in sec_pbkdf2_fill_bd3_sqe() 294 msg->out_len = derived_key_len; in sec_pbkdf2_msg_init() 341 memcpy(derived_key, msg->out, msg->out_len); in tee_cryp_pbkdf2()
|
| H A D | sec_pbkdf2.h | 33 uint32_t out_len; member
|
| H A D | hpre_rsa.c | 323 size_t out_len = rsa_data->cipher.length; in rsaes_pkcs_v1_5_encode() local 330 if ((msg_len + PKCS_V1_5_MSG_MIN_LEN) > n_bytes || out_len < n_bytes) { in rsaes_pkcs_v1_5_encode() 772 uint8_t *out, size_t *out_len) in rsaes_pkcs_v1_5_decode() argument 797 if (em_len - ps_len - PKCS_V1_5_FIXED_LEN > *out_len || in rsaes_pkcs_v1_5_decode() 803 *out_len = em_len - ps_len - PKCS_V1_5_FIXED_LEN; in rsaes_pkcs_v1_5_decode() 804 memcpy(out, em + ps_len + PKCS_V1_5_FIXED_LEN, *out_len); in rsaes_pkcs_v1_5_decode() 878 uint8_t *db, uint8_t *out, size_t *out_len) in rsa_oaep_get_msg() argument 913 *out_len = msg_len; in rsa_oaep_get_msg() 917 *out_len = msg_len; in rsa_oaep_get_msg() 924 uint8_t *out, size_t *out_len) in rsa_oaep_decode() argument [all …]
|
| /optee_os/core/include/crypto/ |
| H A D | crypto.h | 316 size_t out_len; member
|