Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 30) sorted by relevance

12

/optee_os/core/lib/libtomcrypt/src/pk/dh/
A Ddh_generate_key.c47 unsigned long keysize; in dh_generate_key() local
58 keysize = _dh_groupsize_to_keysize(mp_unsigned_bin_size(key->prime)); in dh_generate_key()
59 if (keysize == 0) { in dh_generate_key()
65 buf = XMALLOC(keysize); in dh_generate_key()
74 if (prng_descriptor[wprng]->read(buf, keysize, prng) != keysize) { in dh_generate_key()
79 if ((err = mp_read_unsigned_bin(key->x, buf, keysize)) != CRYPT_OK) { in dh_generate_key()
90 zeromem(buf, keysize); in dh_generate_key()
/optee_os/core/lib/libtomcrypt/src/ciphers/
A Danubis.c1525 LTC_ARGCHK(keysize != NULL); in anubis_keysize()
1526 if (*keysize >= 40) { in anubis_keysize()
1527 *keysize = 40; in anubis_keysize()
1528 } else if (*keysize >= 36) { in anubis_keysize()
1529 *keysize = 36; in anubis_keysize()
1530 } else if (*keysize >= 32) { in anubis_keysize()
1531 *keysize = 32; in anubis_keysize()
1533 *keysize = 28; in anubis_keysize()
1535 *keysize = 24; in anubis_keysize()
1537 *keysize = 20; in anubis_keysize()
[all …]
A Dkseed.c362 int kseed_keysize(int *keysize) in kseed_keysize() argument
364 LTC_ARGCHK(keysize != NULL); in kseed_keysize()
365 if (*keysize >= 16) { in kseed_keysize()
366 *keysize = 16; in kseed_keysize()
A Dblowfish.c578 int blowfish_keysize(int *keysize) in blowfish_keysize() argument
580 LTC_ARGCHK(keysize != NULL); in blowfish_keysize()
582 if (*keysize < 8) { in blowfish_keysize()
585 if (*keysize > 56) { in blowfish_keysize()
586 *keysize = 56; in blowfish_keysize()
A Drc5.c307 int rc5_keysize(int *keysize) in rc5_keysize() argument
309 LTC_ARGCHK(keysize != NULL); in rc5_keysize()
310 if (*keysize < 8) { in rc5_keysize()
313 if (*keysize > 128) { in rc5_keysize()
314 *keysize = 128; in rc5_keysize()
A Dskipjack.c329 int skipjack_keysize(int *keysize) in skipjack_keysize() argument
331 LTC_ARGCHK(keysize != NULL); in skipjack_keysize()
332 if (*keysize < 10) { in skipjack_keysize()
335 if (*keysize > 10) { in skipjack_keysize()
336 *keysize = 10; in skipjack_keysize()
A Drc2.c400 int rc2_keysize(int *keysize) in rc2_keysize() argument
402 LTC_ARGCHK(keysize != NULL); in rc2_keysize()
403 if (*keysize < 1) { in rc2_keysize()
406 if (*keysize > 128) { in rc2_keysize()
407 *keysize = 128; in rc2_keysize()
A Dxtea.c244 int xtea_keysize(int *keysize) in xtea_keysize() argument
246 LTC_ARGCHK(keysize != NULL); in xtea_keysize()
247 if (*keysize < 16) { in xtea_keysize()
250 *keysize = 16; in xtea_keysize()
A Drc6.c317 int rc6_keysize(int *keysize) in rc6_keysize() argument
319 LTC_ARGCHK(keysize != NULL); in rc6_keysize()
320 if (*keysize < 8) { in rc6_keysize()
323 if (*keysize > 128) { in rc6_keysize()
324 *keysize = 128; in rc6_keysize()
A Didea.c182 int idea_keysize(int *keysize) in idea_keysize() argument
184 LTC_ARGCHK(keysize != NULL); in idea_keysize()
185 if (*keysize < 16) { in idea_keysize()
188 *keysize = 16; in idea_keysize()
A Dkasumi.c241 int kasumi_keysize(int *keysize) in kasumi_keysize() argument
243 LTC_ARGCHK(keysize != NULL); in kasumi_keysize()
244 if (*keysize >= 16) { in kasumi_keysize()
245 *keysize = 16; in kasumi_keysize()
A Dmulti2.c305 int multi2_keysize(int *keysize) in multi2_keysize() argument
307 LTC_ARGCHK(keysize != NULL); in multi2_keysize()
308 if (*keysize >= 40) { in multi2_keysize()
309 *keysize = 40; in multi2_keysize()
A Dnoekeon.c313 int noekeon_keysize(int *keysize) in noekeon_keysize() argument
315 LTC_ARGCHK(keysize != NULL); in noekeon_keysize()
316 if (*keysize < 16) { in noekeon_keysize()
319 *keysize = 16; in noekeon_keysize()
A Dserpent.c615 int serpent_keysize(int *keysize) in serpent_keysize() argument
617 LTC_ARGCHK(keysize != NULL); in serpent_keysize()
619 if (*keysize >= 32) { *keysize = 32; } in serpent_keysize()
620 else if (*keysize >= 24) { *keysize = 24; } in serpent_keysize()
621 else if (*keysize >= 16) { *keysize = 16; } in serpent_keysize()
A Dcamellia.c714 int camellia_keysize(int *keysize) in camellia_keysize() argument
716 if (*keysize >= 32) { *keysize = 32; } in camellia_keysize()
717 else if (*keysize >= 24) { *keysize = 24; } in camellia_keysize()
718 else if (*keysize >= 16) { *keysize = 16; } in camellia_keysize()
A Dcast5.c706 int cast5_keysize(int *keysize) in cast5_keysize() argument
708 LTC_ARGCHK(keysize != NULL); in cast5_keysize()
709 if (*keysize < 5) { in cast5_keysize()
712 if (*keysize > 16) { in cast5_keysize()
713 *keysize = 16; in cast5_keysize()
A Ddes.c2054 int des_keysize(int *keysize) in des_keysize() argument
2056 LTC_ARGCHK(keysize != NULL); in des_keysize()
2057 if(*keysize < 8) { in des_keysize()
2060 *keysize = 8; in des_keysize()
2069 int des3_keysize(int *keysize) in des3_keysize() argument
2071 LTC_ARGCHK(keysize != NULL); in des3_keysize()
2072 if (*keysize < 16) { in des3_keysize()
2075 if (*keysize < 24) { in des3_keysize()
2076 *keysize = 16; in des3_keysize()
2079 *keysize = 24; in des3_keysize()
/optee_os/core/lib/libtomcrypt/
A Daes_accel.c81 int rijndael_keysize(int *keysize) in rijndael_keysize() argument
83 LTC_ARGCHK(keysize); in rijndael_keysize()
85 if (*keysize < 16) in rijndael_keysize()
87 else if (*keysize < 24) in rijndael_keysize()
88 *keysize = 16; in rijndael_keysize()
89 else if (*keysize < 32) in rijndael_keysize()
90 *keysize = 24; in rijndael_keysize()
92 *keysize = 32; in rijndael_keysize()
236 .keysize = rijndael_keysize,
/optee_os/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_cipher.h423 int (*keysize)(int *keysize); member
637 int rc5_keysize(int *keysize);
647 int rc6_keysize(int *keysize);
658 int rc2_keysize(int *keysize);
668 int saferp_keysize(int *keysize);
722 int xtea_keysize(int *keysize);
742 int des_keysize(int *keysize);
748 int des3_keysize(int *keysize);
758 int cast5_keysize(int *keysize);
808 int kseed_keysize(int *keysize);
[all …]
/optee_os/core/lib/libtomcrypt/src/ciphers/safer/
A Dsafer.c358 int safer_64_keysize(int *keysize) in safer_64_keysize() argument
360 LTC_ARGCHK(keysize != NULL); in safer_64_keysize()
361 if (*keysize < 8) { in safer_64_keysize()
364 *keysize = 8; in safer_64_keysize()
368 int safer_128_keysize(int *keysize) in safer_128_keysize() argument
370 LTC_ARGCHK(keysize != NULL); in safer_128_keysize()
371 if (*keysize < 16) { in safer_128_keysize()
374 *keysize = 16; in safer_128_keysize()
A Dsaferp.c547 int saferp_keysize(int *keysize) in saferp_keysize() argument
549 LTC_ARGCHK(keysize != NULL); in saferp_keysize()
551 if (*keysize < 16) { in saferp_keysize()
554 if (*keysize < 24) { in saferp_keysize()
555 *keysize = 16; in saferp_keysize()
556 } else if (*keysize < 32) { in saferp_keysize()
557 *keysize = 24; in saferp_keysize()
559 *keysize = 32; in saferp_keysize()
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
A Decc_make_key.c28 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) in ecc_make_key() argument
32 if ((err = ecc_set_curve_by_size(keysize, key)) != CRYPT_OK) { return err; } in ecc_make_key()
/optee_os/core/lib/libtomcrypt/src/ciphers/aes/
A Daes.c731 int ECB_KS(int *keysize) in ECB_KS() argument
733 LTC_ARGCHK(keysize != NULL); in ECB_KS()
735 if (*keysize < 16) { in ECB_KS()
738 if (*keysize < 24) { in ECB_KS()
739 *keysize = 16; in ECB_KS()
742 if (*keysize < 32) { in ECB_KS()
743 *keysize = 24; in ECB_KS()
746 *keysize = 32; in ECB_KS()
/optee_os/core/lib/libtomcrypt/src/ciphers/twofish/
A Dtwofish.c694 int twofish_keysize(int *keysize) in twofish_keysize() argument
696 LTC_ARGCHK(keysize); in twofish_keysize()
697 if (*keysize < 16) { in twofish_keysize()
700 if (*keysize < 24) { in twofish_keysize()
701 *keysize = 16; in twofish_keysize()
704 if (*keysize < 32) { in twofish_keysize()
705 *keysize = 24; in twofish_keysize()
708 *keysize = 32; in twofish_keysize()
/optee_os/core/lib/libtomcrypt/src/hashes/chc/
A Dchc.c58 if ((err = cipher_descriptor[cipher]->keysize(&kl)) != CRYPT_OK) { in chc_register()

Completed in 40 milliseconds

12