Searched refs:n_size (Results 1 – 7 of 7) sorted by relevance
/optee_os-3.20.0/core/drivers/crypto/crypto_api/acipher/ |
A D | rsa.c | 168 if (rsa_data.key.n_size > *cipher_len) { in crypto_acipher_rsanopad_encrypt() 170 *cipher_len, rsa_data.key.n_size); in crypto_acipher_rsanopad_encrypt() 171 *cipher_len = rsa_data.key.n_size; in crypto_acipher_rsanopad_encrypt() 286 if (rsa_data.key.n_size > *cipher_len) { in crypto_acipher_rsaes_encrypt() 288 *cipher_len, rsa_data.key.n_size); in crypto_acipher_rsaes_encrypt() 289 *cipher_len = rsa_data.key.n_size; in crypto_acipher_rsaes_encrypt() 386 if (rsa_ssa.key.n_size > *sig_len) { in crypto_acipher_rsassa_sign() 388 *sig_len, rsa_ssa.key.n_size); in crypto_acipher_rsassa_sign() 389 *sig_len = rsa_ssa.key.n_size; in crypto_acipher_rsassa_sign() 469 if (rsa_ssa.key.n_size > sig_len) { in crypto_acipher_rsassa_verify() [all …]
|
A D | rsassa.c | 48 ps_size = ssa_data->key.n_size - 3; in emsa_pkcs1_v1_5_encode() 52 CRYPTO_TRACE("PS size = %zu (n %zu)", ps_size, ssa_data->key.n_size); in emsa_pkcs1_v1_5_encode() 135 ps_size = ssa_data->key.n_size - 3; in emsa_pkcs1_v1_5_encode_noasn1() 142 CRYPTO_TRACE("PS size = %zu (n %zu)", ps_size, ssa_data->key.n_size); in emsa_pkcs1_v1_5_encode_noasn1() 185 EM.length = ssa_data->key.n_size; in rsassa_pkcs1_v1_5_sign() 205 rsa_data.key.n_size = ssa_data->key.n_size; in rsassa_pkcs1_v1_5_sign() 247 EM.length = ssa_data->key.n_size; in rsassa_pkcs1_v1_5_verify() 250 EM_gen.length = ssa_data->key.n_size; in rsassa_pkcs1_v1_5_verify() 264 rsa_data.key.n_size = ssa_data->key.n_size; in rsassa_pkcs1_v1_5_verify() 769 rsa_data.key.n_size = ssa_data->key.n_size; in rsassa_pss_sign() [all …]
|
/optee_os-3.20.0/core/drivers/crypto/versal/ |
A D | rsa.c | 43 if (rsa_data->key.n_size != 128) in do_encrypt() 71 assert(rsa_data->key.n_size != 128); in do_encrypt() 89 cmd->key_len = rsa_data->key.n_size; in do_encrypt() 100 err, rsa_data->rsa_id, rsa_data->key.n_size); in do_encrypt() 109 rsa_data->cipher.length = rsa_data->key.n_size; in do_encrypt() 135 if (rsa_data->key.n_size != 128) in do_decrypt() 163 assert(rsa_data->key.n_size != 128); in do_decrypt() 181 cmd->key_len = rsa_data->key.n_size; in do_decrypt() 197 rsa_data->message.length = rsa_data->key.n_size; in do_decrypt() 217 if (p->key.n_size != 128) { in do_ssa_sign() [all …]
|
/optee_os-3.20.0/core/drivers/crypto/se050/core/ |
A D | rsa.c | 701 if (!oefid_keylen_supported(rsa_data->key.n_size * 8)) in do_encrypt() 776 if (!oefid_keylen_supported(rsa_data->key.n_size * 8)) in do_decrypt() 838 if (!oefid_keylen_supported(ssa_data->key.n_size * 8)) in do_ssa_sign() 851 if (ssa_data->key.n_size * 8 <= 512) in do_ssa_sign() 855 if (ssa_data->key.n_size * 8 <= 1024) in do_ssa_sign() 887 if (!oefid_keylen_supported(ssa_data->key.n_size * 8)) in do_ssa_verify() 897 if (ssa_data->key.n_size * 8 <= 512) in do_ssa_verify() 901 if (ssa_data->key.n_size * 8 <= 1024) in do_ssa_verify()
|
/optee_os-3.20.0/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_acipher.h | 29 size_t n_size; /* Size in bytes of the Modulus N */ member
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | ecdsa.c | 231 size_t n_size = ( grp->nbits + 7 ) / 8; in derive_mpi() local 232 size_t use_size = blen > n_size ? n_size : blen; in derive_mpi()
|
/optee_os-3.20.0/core/drivers/crypto/caam/acipher/ |
A D | caam_rsa.c | 725 retstatus = caam_calloc_align_buf(&EM, rsa_data->key.n_size); in do_oaep_decoding() 750 db_size = rsa_data->key.n_size - rsa_data->digest_size - 1; in do_oaep_decoding() 982 db_size = rsa_data->key.n_size - rsa_data->digest_size - 1; in do_oaep_encoding() 1013 ps_size = rsa_data->key.n_size - rsa_data->message.length - in do_oaep_encoding() 1074 retstatus = caam_calloc_align_buf(&EM, rsa_data->key.n_size); in do_oaep_encoding()
|
Completed in 12 milliseconds