| /lib/ |
| A D | aes.c | 513 static u32 aes_get_rounds(u32 key_len) in aes_get_rounds() argument 517 if (key_len == AES192_KEY_LENGTH) in aes_get_rounds() 519 else if (key_len == AES256_KEY_LENGTH) in aes_get_rounds() 525 static u32 aes_get_keycols(u32 key_len) in aes_get_keycols() argument 529 if (key_len == AES192_KEY_LENGTH) in aes_get_keycols() 531 else if (key_len == AES256_KEY_LENGTH) in aes_get_keycols() 543 aes_rounds = aes_get_rounds(key_len); in aes_expand_key() 544 aes_keycols = aes_get_keycols(key_len); in aes_expand_key() 546 memcpy(expkey, key, key_len); in aes_expand_key() 579 aes_rounds = aes_get_rounds(key_len); in aes_encrypt() [all …]
|
| /lib/aes/ |
| A D | aes-decrypt.c | 18 unsigned int aes_blocks, key_len = info->cipher->key_len; in image_aes_decrypt() local 27 memcpy(&key_exp[0], info->key, key_len); in image_aes_decrypt() 30 aes_expand_key((u8 *)info->key, key_len, key_exp); in image_aes_decrypt() 35 aes_cbc_decrypt_blocks(key_len, key_exp, (u8 *)info->iv, in image_aes_decrypt()
|
| A D | aes-encrypt.c | 149 info->key, info->cipher->key_len); in image_aes_add_cipher_data() 153 info->cipher->key_len); in image_aes_add_cipher_data()
|
| /lib/mbedtls/external/mbedtls/library/ |
| A D | pk_wrap.c | 74 int key_len; in rsa_verify_wrap() local 97 if (key_len <= 0) { in rsa_verify_wrap() 106 buf + sizeof(buf) - key_len, key_len, in rsa_verify_wrap() 178 int key_len; in mbedtls_pk_psa_rsa_sign_ext() local 195 if (key_len <= 0) { in mbedtls_pk_psa_rsa_sign_ext() 290 int key_len; in rsa_decrypt_wrap() local 317 buf + sizeof(buf) - key_len, key_len, in rsa_decrypt_wrap() 373 int key_len; in rsa_encrypt_wrap() local 400 buf + sizeof(buf) - key_len, key_len, in rsa_encrypt_wrap() 609 size_t key_len; in ecdsa_opaque_verify_wrap() local [all …]
|
| A D | ssl_tls13_keys.c | 224 unsigned char *key, size_t key_len, in ssl_tls13_make_traffic_key() argument 234 key, key_len); in ssl_tls13_make_traffic_key() 268 size_t key_len, size_t iv_len, in mbedtls_ssl_tls13_make_traffic_keys() argument 275 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 283 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 289 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys() 1095 size_t *key_len, size_t *iv_len) in ssl_tls13_get_cipher_key_info() argument 1143 size_t key_len = 0; in ssl_tls13_generate_early_key() local 1211 traffic_keys->key_len = key_len; in ssl_tls13_generate_early_key() 1344 size_t key_len = 0; in ssl_tls13_generate_handshake_keys() local [all …]
|
| A D | nist_kw.c | 456 static const unsigned int key_len[] = { variable 597 mbedtls_printf(" KW-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test() 601 kw_key[i], key_len[i] * 8, 1); in mbedtls_nist_kw_self_test() 623 kw_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test() 660 mbedtls_printf(" KWP-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test() 664 key_len[i] * 8, 1); in mbedtls_nist_kw_self_test() 686 kwp_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
|
| A D | psa_crypto_ffdh.c | 170 size_t key_len = PSA_BITS_TO_BYTES(attributes->bits); in mbedtls_psa_ffdh_export_public_key() local 172 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G); in mbedtls_psa_ffdh_export_public_key() 182 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len)); in mbedtls_psa_ffdh_export_public_key() 184 *data_length = key_len; in mbedtls_psa_ffdh_export_public_key()
|
| A D | gcm.c | 1050 int key_len = 128 + 64 * j; in mbedtls_gcm_self_test() local 1055 key_len, i, "enc"); in mbedtls_gcm_self_test() 1062 key_len); in mbedtls_gcm_self_test() 1068 if (ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED && key_len == 192) { in mbedtls_gcm_self_test() 1112 key_len, i, "dec"); in mbedtls_gcm_self_test() 1117 key_len); in mbedtls_gcm_self_test() 1151 key_len, i, "enc"); in mbedtls_gcm_self_test() 1156 key_len); in mbedtls_gcm_self_test() 1233 key_len, i, "dec"); in mbedtls_gcm_self_test() 1238 key_len); in mbedtls_gcm_self_test()
|
| A D | lmots.c | 394 const unsigned char *key, size_t key_len) in mbedtls_lmots_import_public_key() argument 396 if (key_len < MBEDTLS_LMOTS_SIG_TYPE_OFFSET + MBEDTLS_LMOTS_TYPE_LEN) { in mbedtls_lmots_import_public_key() 403 if (key_len != MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type)) { in mbedtls_lmots_import_public_key() 426 size_t *key_len) in mbedtls_lmots_export_public_key() argument 449 if (key_len != NULL) { in mbedtls_lmots_export_public_key() 450 *key_len = MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type); in mbedtls_lmots_export_public_key()
|
| A D | pk_ecc.c | 48 int mbedtls_pk_ecc_set_key(mbedtls_pk_context *pk, unsigned char *key, size_t key_len) in mbedtls_pk_ecc_set_key() argument 70 status = psa_import_key(&attributes, key, key_len, &pk->priv_id); in mbedtls_pk_ecc_set_key() 76 int ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, key_len); in mbedtls_pk_ecc_set_key()
|
| A D | pk.c | 1155 int key_len; in mbedtls_pk_verify_ext() local 1165 key_len = mbedtls_rsa_write_pubkey(mbedtls_pk_rsa(*ctx), buf, &p); in mbedtls_pk_verify_ext() 1167 if (key_len < 0) { in mbedtls_pk_verify_ext() 1168 return key_len; in mbedtls_pk_verify_ext() 1176 buf + sizeof(buf) - key_len, key_len, in mbedtls_pk_verify_ext()
|
| /lib/ecdsa/ |
| A D | ecdsa-libcrypto.c | 153 ctx->signature = malloc(info->crypto->key_len * 2); in alloc_ctx() 268 int key_len; in load_key_from_fdt() local 318 key_len = ecdsa_key_size_bytes(ctx->ecdsa_key); in load_key_from_fdt() 319 if (key_len != info->crypto->key_len) { in load_key_from_fdt() 321 info->crypto->key_len * 8, key_len * 8); in load_key_from_fdt() 357 if (key_len_bytes != info->crypto->key_len) { in prepare_ctx() 359 info->crypto->key_len * 8, key_len_bytes * 8); in prepare_ctx() 375 ecdsa_sig_encode_raw(ctx->signature, sig, info->crypto->key_len); in do_sign() 385 sig = ecdsa_sig_from_raw(ctx->signature, info->crypto->key_len); in ecdsa_check_signature() 404 if (sig_len != info->crypto->key_len * 2) { in do_verify() [all …]
|
| A D | ecdsa-verify.c | 128 .key_len = ECDSA256_BYTES, 134 .key_len = ECDSA384_BYTES,
|
| /lib/mbedtls/external/mbedtls/tests/scripts/ |
| A D | gen_gcm_encrypt.pl | 50 my $key_len = get_suite_val("Keylen"); 51 next if ($key_len !~ /\d+/); 67 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
| A D | gen_gcm_decrypt.pl | 67 my $key_len = get_suite_val("Keylen"); 68 next if ($key_len !~ /\d+/); 84 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
| /lib/rsa/ |
| A D | rsa-verify.c | 327 const uint32_t key_len) in rsa_verify_key() argument 373 ret = padding->verify(info, buf, key_len, hash, hash_len); in rsa_verify_key() 413 info->crypto->key_len); in rsa_verify_with_pkey() 483 info->crypto->key_len); in rsa_verify_with_keynode() 570 uint8_t hash[info->crypto->key_len]; in rsa_verify() 583 info->crypto->key_len) { in rsa_verify() 604 .key_len = RSA2048_BYTES, 610 .key_len = RSA3072_BYTES, 616 .key_len = RSA4096_BYTES,
|
| /lib/crypto/ |
| A D | rsa_helper.c | 175 unsigned int key_len) in rsa_parse_pub_key() argument 177 return asn1_ber_decoder(&rsapubkey_decoder, rsa_key, key, key_len); in rsa_parse_pub_key() 195 unsigned int key_len) in rsa_parse_priv_key() argument 197 return asn1_ber_decoder(&rsaprivkey_decoder, rsa_key, key, key_len); in rsa_parse_priv_key()
|
| /lib/libavb/ |
| A D | avb_cmdline.c | 119 size_t offset, key_len, value_len; in cmdline_append_option() local 122 key_len = avb_strlen(key); in cmdline_append_option() 133 new_cmdline = avb_calloc(offset + key_len + value_len + 2); in cmdline_append_option() 141 avb_memcpy(new_cmdline + offset, key, key_len); in cmdline_append_option() 142 new_cmdline[offset + key_len] = '='; in cmdline_append_option() 143 avb_memcpy(new_cmdline + offset + key_len + 1, value, value_len); in cmdline_append_option()
|
| /lib/lwip/lwip/contrib/addons/tcp_md5/ |
| A D | tcp_md5.c | 69 u16_t key_len; member 257 const u8_t *key, size_t key_len, u8_t *digest_out, struct pbuf *p) in tcp_md5_create_digest() argument 293 md5_update(&ctx, key, key_len); in tcp_md5_create_digest() 367 …rrent_src_addr(), ip_current_dest_addr(), &tcphdr_copy, info->key, info->key_len, digest_calculate… in tcp_md5_check_listen() 405 …eate_digest(&pcb->remote_ip, &pcb->local_ip, &hdr_copy, info->key, info->key_len, digest_calculate… in tcp_md5_check_inpacket() 445 …eate_digest(&pcb->local_ip, &pcb->remote_ip, &hdr_copy, info->key, info->key_len, digest_calculate… in tcp_md5_add_tx_options() 496 info->key_len = md5->tcpm_keylen; in tcp_md5_setsockopt_hook()
|
| /lib/lwip/lwip/src/apps/snmp/ |
| A D | snmpv3_mbedtls.c | 56 u8_t key_len; in snmpv3_auth() local 64 key_len = SNMP_V3_MD5_LEN; in snmpv3_auth() 67 key_len = SNMP_V3_SHA_LEN; in snmpv3_auth() 77 if (mbedtls_md_hmac_starts(&ctx, key, key_len) != 0) { in snmpv3_auth()
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_aes.function | 294 size_t key_len, src_len, dst_len, data_unit_len; 302 key = mbedtls_test_unhexify_alloc(hex_key_string, &key_len); 303 TEST_ASSERT(key_len % 2 == 0); 311 TEST_ASSERT(mbedtls_aes_xts_setkey_enc(&ctx, key, key_len * 8) == 0); 338 size_t key_len, src_len, dst_len, data_unit_len; 346 key = mbedtls_test_unhexify_alloc(hex_key_string, &key_len); 347 TEST_ASSERT(key_len % 2 == 0); 355 TEST_ASSERT(mbedtls_aes_xts_setkey_dec(&ctx, key, key_len * 8) == 0); 395 size_t key_len = size; 399 TEST_ASSERT(mbedtls_aes_xts_setkey_enc(&ctx, key, key_len * 8) == retval); [all …]
|
| A D | test_suite_pkcs5.function | 13 int it_cnt, int key_len, data_t *result_key_string) 20 it_cnt, key_len, key) == 0); 23 key_len, result_key_string->len) == 0);
|
| /lib/mbedtls/ |
| A D | rsa_helper.c | 28 unsigned int key_len) in rsa_parse_pub_key() argument 37 key_len); in rsa_parse_pub_key()
|
| /lib/mbedtls/external/mbedtls/programs/cipher/ |
| A D | cipher_aead_demo.c | 144 int key_len = mbedtls_cipher_get_key_bitlen(ctx); in aead_prepare() local 145 CHK(mbedtls_cipher_setkey(ctx, key_bytes, key_len, MBEDTLS_ENCRYPT)); in aead_prepare()
|
| /lib/mbedtls/external/mbedtls/include/mbedtls/ |
| A D | cmac.h | 220 int mbedtls_aes_cmac_prf_128(const unsigned char *key, size_t key_len,
|