Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 25 of 38) sorted by relevance

12

/lib/
A Daes.c513 static u32 aes_get_rounds(u32 key_len) in aes_get_rounds() argument
517 if (key_len == AES192_KEY_LENGTH) in aes_get_rounds()
519 else if (key_len == AES256_KEY_LENGTH) in aes_get_rounds()
525 static u32 aes_get_keycols(u32 key_len) in aes_get_keycols() argument
529 if (key_len == AES192_KEY_LENGTH) in aes_get_keycols()
531 else if (key_len == AES256_KEY_LENGTH) in aes_get_keycols()
543 aes_rounds = aes_get_rounds(key_len); in aes_expand_key()
544 aes_keycols = aes_get_keycols(key_len); in aes_expand_key()
546 memcpy(expkey, key, key_len); in aes_expand_key()
579 aes_rounds = aes_get_rounds(key_len); in aes_encrypt()
[all …]
/lib/aes/
A Daes-decrypt.c18 unsigned int aes_blocks, key_len = info->cipher->key_len; in image_aes_decrypt() local
27 memcpy(&key_exp[0], info->key, key_len); in image_aes_decrypt()
30 aes_expand_key((u8 *)info->key, key_len, key_exp); in image_aes_decrypt()
35 aes_cbc_decrypt_blocks(key_len, key_exp, (u8 *)info->iv, in image_aes_decrypt()
A Daes-encrypt.c149 info->key, info->cipher->key_len); in image_aes_add_cipher_data()
153 info->cipher->key_len); in image_aes_add_cipher_data()
/lib/mbedtls/external/mbedtls/library/
A Dpk_wrap.c74 int key_len; in rsa_verify_wrap() local
97 if (key_len <= 0) { in rsa_verify_wrap()
106 buf + sizeof(buf) - key_len, key_len, in rsa_verify_wrap()
178 int key_len; in mbedtls_pk_psa_rsa_sign_ext() local
195 if (key_len <= 0) { in mbedtls_pk_psa_rsa_sign_ext()
290 int key_len; in rsa_decrypt_wrap() local
317 buf + sizeof(buf) - key_len, key_len, in rsa_decrypt_wrap()
373 int key_len; in rsa_encrypt_wrap() local
400 buf + sizeof(buf) - key_len, key_len, in rsa_encrypt_wrap()
609 size_t key_len; in ecdsa_opaque_verify_wrap() local
[all …]
A Dssl_tls13_keys.c224 unsigned char *key, size_t key_len, in ssl_tls13_make_traffic_key() argument
234 key, key_len); in ssl_tls13_make_traffic_key()
268 size_t key_len, size_t iv_len, in mbedtls_ssl_tls13_make_traffic_keys() argument
275 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys()
283 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys()
289 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys()
1095 size_t *key_len, size_t *iv_len) in ssl_tls13_get_cipher_key_info() argument
1143 size_t key_len = 0; in ssl_tls13_generate_early_key() local
1211 traffic_keys->key_len = key_len; in ssl_tls13_generate_early_key()
1344 size_t key_len = 0; in ssl_tls13_generate_handshake_keys() local
[all …]
A Dnist_kw.c456 static const unsigned int key_len[] = { variable
597 mbedtls_printf(" KW-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test()
601 kw_key[i], key_len[i] * 8, 1); in mbedtls_nist_kw_self_test()
623 kw_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
660 mbedtls_printf(" KWP-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test()
664 key_len[i] * 8, 1); in mbedtls_nist_kw_self_test()
686 kwp_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
A Dpsa_crypto_ffdh.c170 size_t key_len = PSA_BITS_TO_BYTES(attributes->bits); in mbedtls_psa_ffdh_export_public_key() local
172 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G); in mbedtls_psa_ffdh_export_public_key()
182 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len)); in mbedtls_psa_ffdh_export_public_key()
184 *data_length = key_len; in mbedtls_psa_ffdh_export_public_key()
A Dgcm.c1050 int key_len = 128 + 64 * j; in mbedtls_gcm_self_test() local
1055 key_len, i, "enc"); in mbedtls_gcm_self_test()
1062 key_len); in mbedtls_gcm_self_test()
1068 if (ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED && key_len == 192) { in mbedtls_gcm_self_test()
1112 key_len, i, "dec"); in mbedtls_gcm_self_test()
1117 key_len); in mbedtls_gcm_self_test()
1151 key_len, i, "enc"); in mbedtls_gcm_self_test()
1156 key_len); in mbedtls_gcm_self_test()
1233 key_len, i, "dec"); in mbedtls_gcm_self_test()
1238 key_len); in mbedtls_gcm_self_test()
A Dlmots.c394 const unsigned char *key, size_t key_len) in mbedtls_lmots_import_public_key() argument
396 if (key_len < MBEDTLS_LMOTS_SIG_TYPE_OFFSET + MBEDTLS_LMOTS_TYPE_LEN) { in mbedtls_lmots_import_public_key()
403 if (key_len != MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type)) { in mbedtls_lmots_import_public_key()
426 size_t *key_len) in mbedtls_lmots_export_public_key() argument
449 if (key_len != NULL) { in mbedtls_lmots_export_public_key()
450 *key_len = MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type); in mbedtls_lmots_export_public_key()
A Dpk_ecc.c48 int mbedtls_pk_ecc_set_key(mbedtls_pk_context *pk, unsigned char *key, size_t key_len) in mbedtls_pk_ecc_set_key() argument
70 status = psa_import_key(&attributes, key, key_len, &pk->priv_id); in mbedtls_pk_ecc_set_key()
76 int ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, key_len); in mbedtls_pk_ecc_set_key()
A Dpk.c1155 int key_len; in mbedtls_pk_verify_ext() local
1165 key_len = mbedtls_rsa_write_pubkey(mbedtls_pk_rsa(*ctx), buf, &p); in mbedtls_pk_verify_ext()
1167 if (key_len < 0) { in mbedtls_pk_verify_ext()
1168 return key_len; in mbedtls_pk_verify_ext()
1176 buf + sizeof(buf) - key_len, key_len, in mbedtls_pk_verify_ext()
/lib/ecdsa/
A Decdsa-libcrypto.c153 ctx->signature = malloc(info->crypto->key_len * 2); in alloc_ctx()
268 int key_len; in load_key_from_fdt() local
318 key_len = ecdsa_key_size_bytes(ctx->ecdsa_key); in load_key_from_fdt()
319 if (key_len != info->crypto->key_len) { in load_key_from_fdt()
321 info->crypto->key_len * 8, key_len * 8); in load_key_from_fdt()
357 if (key_len_bytes != info->crypto->key_len) { in prepare_ctx()
359 info->crypto->key_len * 8, key_len_bytes * 8); in prepare_ctx()
375 ecdsa_sig_encode_raw(ctx->signature, sig, info->crypto->key_len); in do_sign()
385 sig = ecdsa_sig_from_raw(ctx->signature, info->crypto->key_len); in ecdsa_check_signature()
404 if (sig_len != info->crypto->key_len * 2) { in do_verify()
[all …]
A Decdsa-verify.c128 .key_len = ECDSA256_BYTES,
134 .key_len = ECDSA384_BYTES,
/lib/mbedtls/external/mbedtls/tests/scripts/
A Dgen_gcm_encrypt.pl50 my $key_len = get_suite_val("Keylen");
51 next if ($key_len !~ /\d+/);
67 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
A Dgen_gcm_decrypt.pl67 my $key_len = get_suite_val("Keylen");
68 next if ($key_len !~ /\d+/);
84 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
/lib/rsa/
A Drsa-verify.c327 const uint32_t key_len) in rsa_verify_key() argument
373 ret = padding->verify(info, buf, key_len, hash, hash_len); in rsa_verify_key()
413 info->crypto->key_len); in rsa_verify_with_pkey()
483 info->crypto->key_len); in rsa_verify_with_keynode()
570 uint8_t hash[info->crypto->key_len]; in rsa_verify()
583 info->crypto->key_len) { in rsa_verify()
604 .key_len = RSA2048_BYTES,
610 .key_len = RSA3072_BYTES,
616 .key_len = RSA4096_BYTES,
/lib/crypto/
A Drsa_helper.c175 unsigned int key_len) in rsa_parse_pub_key() argument
177 return asn1_ber_decoder(&rsapubkey_decoder, rsa_key, key, key_len); in rsa_parse_pub_key()
195 unsigned int key_len) in rsa_parse_priv_key() argument
197 return asn1_ber_decoder(&rsaprivkey_decoder, rsa_key, key, key_len); in rsa_parse_priv_key()
/lib/libavb/
A Davb_cmdline.c119 size_t offset, key_len, value_len; in cmdline_append_option() local
122 key_len = avb_strlen(key); in cmdline_append_option()
133 new_cmdline = avb_calloc(offset + key_len + value_len + 2); in cmdline_append_option()
141 avb_memcpy(new_cmdline + offset, key, key_len); in cmdline_append_option()
142 new_cmdline[offset + key_len] = '='; in cmdline_append_option()
143 avb_memcpy(new_cmdline + offset + key_len + 1, value, value_len); in cmdline_append_option()
/lib/lwip/lwip/contrib/addons/tcp_md5/
A Dtcp_md5.c69 u16_t key_len; member
257 const u8_t *key, size_t key_len, u8_t *digest_out, struct pbuf *p) in tcp_md5_create_digest() argument
293 md5_update(&ctx, key, key_len); in tcp_md5_create_digest()
367 …rrent_src_addr(), ip_current_dest_addr(), &tcphdr_copy, info->key, info->key_len, digest_calculate… in tcp_md5_check_listen()
405 …eate_digest(&pcb->remote_ip, &pcb->local_ip, &hdr_copy, info->key, info->key_len, digest_calculate… in tcp_md5_check_inpacket()
445 …eate_digest(&pcb->local_ip, &pcb->remote_ip, &hdr_copy, info->key, info->key_len, digest_calculate… in tcp_md5_add_tx_options()
496 info->key_len = md5->tcpm_keylen; in tcp_md5_setsockopt_hook()
/lib/lwip/lwip/src/apps/snmp/
A Dsnmpv3_mbedtls.c56 u8_t key_len; in snmpv3_auth() local
64 key_len = SNMP_V3_MD5_LEN; in snmpv3_auth()
67 key_len = SNMP_V3_SHA_LEN; in snmpv3_auth()
77 if (mbedtls_md_hmac_starts(&ctx, key, key_len) != 0) { in snmpv3_auth()
/lib/mbedtls/external/mbedtls/tests/suites/
A Dtest_suite_aes.function294 size_t key_len, src_len, dst_len, data_unit_len;
302 key = mbedtls_test_unhexify_alloc(hex_key_string, &key_len);
303 TEST_ASSERT(key_len % 2 == 0);
311 TEST_ASSERT(mbedtls_aes_xts_setkey_enc(&ctx, key, key_len * 8) == 0);
338 size_t key_len, src_len, dst_len, data_unit_len;
346 key = mbedtls_test_unhexify_alloc(hex_key_string, &key_len);
347 TEST_ASSERT(key_len % 2 == 0);
355 TEST_ASSERT(mbedtls_aes_xts_setkey_dec(&ctx, key, key_len * 8) == 0);
395 size_t key_len = size;
399 TEST_ASSERT(mbedtls_aes_xts_setkey_enc(&ctx, key, key_len * 8) == retval);
[all …]
A Dtest_suite_pkcs5.function13 int it_cnt, int key_len, data_t *result_key_string)
20 it_cnt, key_len, key) == 0);
23 key_len, result_key_string->len) == 0);
/lib/mbedtls/
A Drsa_helper.c28 unsigned int key_len) in rsa_parse_pub_key() argument
37 key_len); in rsa_parse_pub_key()
/lib/mbedtls/external/mbedtls/programs/cipher/
A Dcipher_aead_demo.c144 int key_len = mbedtls_cipher_get_key_bitlen(ctx); in aead_prepare() local
145 CHK(mbedtls_cipher_setkey(ctx, key_bytes, key_len, MBEDTLS_ENCRYPT)); in aead_prepare()
/lib/mbedtls/external/mbedtls/include/mbedtls/
A Dcmac.h220 int mbedtls_aes_cmac_prf_128(const unsigned char *key, size_t key_len,

Completed in 58 milliseconds

12