/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/dh/ |
A D | dh_generate_key.c | 40 unsigned long keysize; in dh_generate_key() local 51 keysize = s_dh_groupsize_to_keysize(mp_unsigned_bin_size(key->prime)); in dh_generate_key() 52 if (keysize == 0) { in dh_generate_key() 58 buf = XMALLOC(keysize); in dh_generate_key() 67 if (prng_descriptor[wprng]->read(buf, keysize, prng) != keysize) { in dh_generate_key() 72 if ((err = mp_read_unsigned_bin(key->x, buf, keysize)) != CRYPT_OK) { in dh_generate_key() 83 zeromem(buf, keysize); in dh_generate_key()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/ |
A D | anubis.c | 1528 LTC_ARGCHK(keysize != NULL); in anubis_keysize() 1529 if (*keysize >= 40) { in anubis_keysize() 1530 *keysize = 40; in anubis_keysize() 1531 } else if (*keysize >= 36) { in anubis_keysize() 1532 *keysize = 36; in anubis_keysize() 1533 } else if (*keysize >= 32) { in anubis_keysize() 1534 *keysize = 32; in anubis_keysize() 1536 *keysize = 28; in anubis_keysize() 1538 *keysize = 24; in anubis_keysize() 1540 *keysize = 20; in anubis_keysize() [all …]
|
A D | kseed.c | 355 int kseed_keysize(int *keysize) in kseed_keysize() argument 357 LTC_ARGCHK(keysize != NULL); in kseed_keysize() 358 if (*keysize >= 16) { in kseed_keysize() 359 *keysize = 16; in kseed_keysize()
|
A D | tea.c | 198 int tea_keysize(int *keysize) in tea_keysize() argument 200 LTC_ARGCHK(keysize != NULL); in tea_keysize() 201 if (*keysize < 16) { in tea_keysize() 204 *keysize = 16; in tea_keysize()
|
A D | skipjack.c | 322 int skipjack_keysize(int *keysize) in skipjack_keysize() argument 324 LTC_ARGCHK(keysize != NULL); in skipjack_keysize() 325 if (*keysize < 10) { in skipjack_keysize() 328 if (*keysize > 10) { in skipjack_keysize() 329 *keysize = 10; in skipjack_keysize()
|
A D | xtea.c | 237 int xtea_keysize(int *keysize) in xtea_keysize() argument 239 LTC_ARGCHK(keysize != NULL); in xtea_keysize() 240 if (*keysize < 16) { in xtea_keysize() 243 *keysize = 16; in xtea_keysize()
|
A D | rc2.c | 393 int rc2_keysize(int *keysize) in rc2_keysize() argument 395 LTC_ARGCHK(keysize != NULL); in rc2_keysize() 396 if (*keysize < 1) { in rc2_keysize() 399 if (*keysize > 128) { in rc2_keysize() 400 *keysize = 128; in rc2_keysize()
|
A D | rc5.c | 308 int rc5_keysize(int *keysize) in rc5_keysize() argument 310 LTC_ARGCHK(keysize != NULL); in rc5_keysize() 311 if (*keysize < 8) { in rc5_keysize() 314 if (*keysize > 128) { in rc5_keysize() 315 *keysize = 128; in rc5_keysize()
|
A D | idea.c | 175 int idea_keysize(int *keysize) in idea_keysize() argument 177 LTC_ARGCHK(keysize != NULL); in idea_keysize() 178 if (*keysize < 16) { in idea_keysize() 181 *keysize = 16; in idea_keysize()
|
A D | blowfish.c | 644 int blowfish_keysize(int *keysize) in blowfish_keysize() argument 646 LTC_ARGCHK(keysize != NULL); in blowfish_keysize() 648 if (*keysize < 8) { in blowfish_keysize() 651 if (*keysize > 56) { in blowfish_keysize() 652 *keysize = 56; in blowfish_keysize()
|
A D | rc6.c | 310 int rc6_keysize(int *keysize) in rc6_keysize() argument 312 LTC_ARGCHK(keysize != NULL); in rc6_keysize() 313 if (*keysize < 8) { in rc6_keysize() 316 if (*keysize > 128) { in rc6_keysize() 317 *keysize = 128; in rc6_keysize()
|
A D | kasumi.c | 234 int kasumi_keysize(int *keysize) in kasumi_keysize() argument 236 LTC_ARGCHK(keysize != NULL); in kasumi_keysize() 237 if (*keysize >= 16) { in kasumi_keysize() 238 *keysize = 16; in kasumi_keysize()
|
A D | multi2.c | 298 int multi2_keysize(int *keysize) in multi2_keysize() argument 300 LTC_ARGCHK(keysize != NULL); in multi2_keysize() 301 if (*keysize >= 40) { in multi2_keysize() 302 *keysize = 40; in multi2_keysize()
|
A D | noekeon.c | 306 int noekeon_keysize(int *keysize) in noekeon_keysize() argument 308 LTC_ARGCHK(keysize != NULL); in noekeon_keysize() 309 if (*keysize < 16) { in noekeon_keysize() 312 *keysize = 16; in noekeon_keysize()
|
A D | serpent.c | 608 int serpent_keysize(int *keysize) in serpent_keysize() argument 610 LTC_ARGCHK(keysize != NULL); in serpent_keysize() 612 if (*keysize >= 32) { *keysize = 32; } in serpent_keysize() 613 else if (*keysize >= 24) { *keysize = 24; } in serpent_keysize() 614 else if (*keysize >= 16) { *keysize = 16; } in serpent_keysize()
|
A D | camellia.c | 711 int camellia_keysize(int *keysize) in camellia_keysize() argument 713 if (*keysize >= 32) { *keysize = 32; } in camellia_keysize() 714 else if (*keysize >= 24) { *keysize = 24; } in camellia_keysize() 715 else if (*keysize >= 16) { *keysize = 16; } in camellia_keysize()
|
A D | cast5.c | 693 int cast5_keysize(int *keysize) in cast5_keysize() argument 695 LTC_ARGCHK(keysize != NULL); in cast5_keysize() 696 if (*keysize < 5) { in cast5_keysize() 699 if (*keysize > 16) { in cast5_keysize() 700 *keysize = 16; in cast5_keysize()
|
/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | aes_accel.c | 81 int rijndael_keysize(int *keysize) in rijndael_keysize() argument 83 LTC_ARGCHK(keysize); in rijndael_keysize() 85 if (*keysize < 16) in rijndael_keysize() 87 else if (*keysize < 24) in rijndael_keysize() 88 *keysize = 16; in rijndael_keysize() 89 else if (*keysize < 32) in rijndael_keysize() 90 *keysize = 24; in rijndael_keysize() 92 *keysize = 32; in rijndael_keysize() 236 .keysize = rijndael_keysize,
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_cipher.h | 425 int (*keysize)(int *keysize); member 639 int rc5_keysize(int *keysize); 649 int rc6_keysize(int *keysize); 660 int rc2_keysize(int *keysize); 724 int xtea_keysize(int *keysize); 744 int des_keysize(int *keysize); 750 int des3_keysize(int *keysize); 760 int cast5_keysize(int *keysize); 810 int kseed_keysize(int *keysize); 851 int idea_keysize(int *keysize); [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_make_key.c | 21 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) in ecc_make_key() argument 25 if ((err = ecc_set_curve_by_size(keysize, key)) != CRYPT_OK) { return err; } in ecc_make_key()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/safer/ |
A D | safer.c | 351 int safer_64_keysize(int *keysize) in safer_64_keysize() argument 353 LTC_ARGCHK(keysize != NULL); in safer_64_keysize() 354 if (*keysize < 8) { in safer_64_keysize() 357 *keysize = 8; in safer_64_keysize() 361 int safer_128_keysize(int *keysize) in safer_128_keysize() argument 363 LTC_ARGCHK(keysize != NULL); in safer_128_keysize() 364 if (*keysize < 16) { in safer_128_keysize() 367 *keysize = 16; in safer_128_keysize()
|
A D | saferp.c | 548 int saferp_keysize(int *keysize) in saferp_keysize() argument 550 LTC_ARGCHK(keysize != NULL); in saferp_keysize() 552 if (*keysize < 16) { in saferp_keysize() 555 if (*keysize < 24) { in saferp_keysize() 556 *keysize = 16; in saferp_keysize() 557 } else if (*keysize < 32) { in saferp_keysize() 558 *keysize = 24; in saferp_keysize() 560 *keysize = 32; in saferp_keysize()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/aes/ |
A D | aes.c | 724 int ECB_KS(int *keysize) in ECB_KS() argument 726 LTC_ARGCHK(keysize != NULL); in ECB_KS() 728 if (*keysize < 16) { in ECB_KS() 731 if (*keysize < 24) { in ECB_KS() 732 *keysize = 16; in ECB_KS() 735 if (*keysize < 32) { in ECB_KS() 736 *keysize = 24; in ECB_KS() 739 *keysize = 32; in ECB_KS()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/twofish/ |
A D | twofish.c | 687 int twofish_keysize(int *keysize) in twofish_keysize() argument 689 LTC_ARGCHK(keysize); in twofish_keysize() 690 if (*keysize < 16) { in twofish_keysize() 693 if (*keysize < 24) { in twofish_keysize() 694 *keysize = 16; in twofish_keysize() 697 if (*keysize < 32) { in twofish_keysize() 698 *keysize = 24; in twofish_keysize() 701 *keysize = 32; in twofish_keysize()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/chc/ |
A D | chc.c | 51 if ((err = cipher_descriptor[cipher]->keysize(&kl)) != CRYPT_OK) { in chc_register()
|