/optee_os/core/lib/libtomcrypt/src/pk/dh/ |
A D | dh_generate_key.c | 47 unsigned long keysize; in dh_generate_key() local 58 keysize = _dh_groupsize_to_keysize(mp_unsigned_bin_size(key->prime)); in dh_generate_key() 59 if (keysize == 0) { in dh_generate_key() 65 buf = XMALLOC(keysize); in dh_generate_key() 74 if (prng_descriptor[wprng]->read(buf, keysize, prng) != keysize) { in dh_generate_key() 79 if ((err = mp_read_unsigned_bin(key->x, buf, keysize)) != CRYPT_OK) { in dh_generate_key() 90 zeromem(buf, keysize); in dh_generate_key()
|
/optee_os/core/lib/libtomcrypt/src/ciphers/ |
A D | anubis.c | 1525 LTC_ARGCHK(keysize != NULL); in anubis_keysize() 1526 if (*keysize >= 40) { in anubis_keysize() 1527 *keysize = 40; in anubis_keysize() 1528 } else if (*keysize >= 36) { in anubis_keysize() 1529 *keysize = 36; in anubis_keysize() 1530 } else if (*keysize >= 32) { in anubis_keysize() 1531 *keysize = 32; in anubis_keysize() 1533 *keysize = 28; in anubis_keysize() 1535 *keysize = 24; in anubis_keysize() 1537 *keysize = 20; in anubis_keysize() [all …]
|
A D | kseed.c | 362 int kseed_keysize(int *keysize) in kseed_keysize() argument 364 LTC_ARGCHK(keysize != NULL); in kseed_keysize() 365 if (*keysize >= 16) { in kseed_keysize() 366 *keysize = 16; in kseed_keysize()
|
A D | blowfish.c | 578 int blowfish_keysize(int *keysize) in blowfish_keysize() argument 580 LTC_ARGCHK(keysize != NULL); in blowfish_keysize() 582 if (*keysize < 8) { in blowfish_keysize() 585 if (*keysize > 56) { in blowfish_keysize() 586 *keysize = 56; in blowfish_keysize()
|
A D | rc5.c | 307 int rc5_keysize(int *keysize) in rc5_keysize() argument 309 LTC_ARGCHK(keysize != NULL); in rc5_keysize() 310 if (*keysize < 8) { in rc5_keysize() 313 if (*keysize > 128) { in rc5_keysize() 314 *keysize = 128; in rc5_keysize()
|
A D | skipjack.c | 329 int skipjack_keysize(int *keysize) in skipjack_keysize() argument 331 LTC_ARGCHK(keysize != NULL); in skipjack_keysize() 332 if (*keysize < 10) { in skipjack_keysize() 335 if (*keysize > 10) { in skipjack_keysize() 336 *keysize = 10; in skipjack_keysize()
|
A D | rc2.c | 400 int rc2_keysize(int *keysize) in rc2_keysize() argument 402 LTC_ARGCHK(keysize != NULL); in rc2_keysize() 403 if (*keysize < 1) { in rc2_keysize() 406 if (*keysize > 128) { in rc2_keysize() 407 *keysize = 128; in rc2_keysize()
|
A D | xtea.c | 244 int xtea_keysize(int *keysize) in xtea_keysize() argument 246 LTC_ARGCHK(keysize != NULL); in xtea_keysize() 247 if (*keysize < 16) { in xtea_keysize() 250 *keysize = 16; in xtea_keysize()
|
A D | rc6.c | 317 int rc6_keysize(int *keysize) in rc6_keysize() argument 319 LTC_ARGCHK(keysize != NULL); in rc6_keysize() 320 if (*keysize < 8) { in rc6_keysize() 323 if (*keysize > 128) { in rc6_keysize() 324 *keysize = 128; in rc6_keysize()
|
A D | idea.c | 182 int idea_keysize(int *keysize) in idea_keysize() argument 184 LTC_ARGCHK(keysize != NULL); in idea_keysize() 185 if (*keysize < 16) { in idea_keysize() 188 *keysize = 16; in idea_keysize()
|
A D | kasumi.c | 241 int kasumi_keysize(int *keysize) in kasumi_keysize() argument 243 LTC_ARGCHK(keysize != NULL); in kasumi_keysize() 244 if (*keysize >= 16) { in kasumi_keysize() 245 *keysize = 16; in kasumi_keysize()
|
A D | multi2.c | 305 int multi2_keysize(int *keysize) in multi2_keysize() argument 307 LTC_ARGCHK(keysize != NULL); in multi2_keysize() 308 if (*keysize >= 40) { in multi2_keysize() 309 *keysize = 40; in multi2_keysize()
|
A D | noekeon.c | 313 int noekeon_keysize(int *keysize) in noekeon_keysize() argument 315 LTC_ARGCHK(keysize != NULL); in noekeon_keysize() 316 if (*keysize < 16) { in noekeon_keysize() 319 *keysize = 16; in noekeon_keysize()
|
A D | serpent.c | 615 int serpent_keysize(int *keysize) in serpent_keysize() argument 617 LTC_ARGCHK(keysize != NULL); in serpent_keysize() 619 if (*keysize >= 32) { *keysize = 32; } in serpent_keysize() 620 else if (*keysize >= 24) { *keysize = 24; } in serpent_keysize() 621 else if (*keysize >= 16) { *keysize = 16; } in serpent_keysize()
|
A D | camellia.c | 714 int camellia_keysize(int *keysize) in camellia_keysize() argument 716 if (*keysize >= 32) { *keysize = 32; } in camellia_keysize() 717 else if (*keysize >= 24) { *keysize = 24; } in camellia_keysize() 718 else if (*keysize >= 16) { *keysize = 16; } in camellia_keysize()
|
A D | cast5.c | 706 int cast5_keysize(int *keysize) in cast5_keysize() argument 708 LTC_ARGCHK(keysize != NULL); in cast5_keysize() 709 if (*keysize < 5) { in cast5_keysize() 712 if (*keysize > 16) { in cast5_keysize() 713 *keysize = 16; in cast5_keysize()
|
A D | des.c | 2054 int des_keysize(int *keysize) in des_keysize() argument 2056 LTC_ARGCHK(keysize != NULL); in des_keysize() 2057 if(*keysize < 8) { in des_keysize() 2060 *keysize = 8; in des_keysize() 2069 int des3_keysize(int *keysize) in des3_keysize() argument 2071 LTC_ARGCHK(keysize != NULL); in des3_keysize() 2072 if (*keysize < 16) { in des3_keysize() 2075 if (*keysize < 24) { in des3_keysize() 2076 *keysize = 16; in des3_keysize() 2079 *keysize = 24; in des3_keysize()
|
/optee_os/core/lib/libtomcrypt/ |
A D | aes_accel.c | 81 int rijndael_keysize(int *keysize) in rijndael_keysize() argument 83 LTC_ARGCHK(keysize); in rijndael_keysize() 85 if (*keysize < 16) in rijndael_keysize() 87 else if (*keysize < 24) in rijndael_keysize() 88 *keysize = 16; in rijndael_keysize() 89 else if (*keysize < 32) in rijndael_keysize() 90 *keysize = 24; in rijndael_keysize() 92 *keysize = 32; in rijndael_keysize() 236 .keysize = rijndael_keysize,
|
/optee_os/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_cipher.h | 423 int (*keysize)(int *keysize); member 637 int rc5_keysize(int *keysize); 647 int rc6_keysize(int *keysize); 658 int rc2_keysize(int *keysize); 668 int saferp_keysize(int *keysize); 722 int xtea_keysize(int *keysize); 742 int des_keysize(int *keysize); 748 int des3_keysize(int *keysize); 758 int cast5_keysize(int *keysize); 808 int kseed_keysize(int *keysize); [all …]
|
/optee_os/core/lib/libtomcrypt/src/ciphers/safer/ |
A D | safer.c | 358 int safer_64_keysize(int *keysize) in safer_64_keysize() argument 360 LTC_ARGCHK(keysize != NULL); in safer_64_keysize() 361 if (*keysize < 8) { in safer_64_keysize() 364 *keysize = 8; in safer_64_keysize() 368 int safer_128_keysize(int *keysize) in safer_128_keysize() argument 370 LTC_ARGCHK(keysize != NULL); in safer_128_keysize() 371 if (*keysize < 16) { in safer_128_keysize() 374 *keysize = 16; in safer_128_keysize()
|
A D | saferp.c | 547 int saferp_keysize(int *keysize) in saferp_keysize() argument 549 LTC_ARGCHK(keysize != NULL); in saferp_keysize() 551 if (*keysize < 16) { in saferp_keysize() 554 if (*keysize < 24) { in saferp_keysize() 555 *keysize = 16; in saferp_keysize() 556 } else if (*keysize < 32) { in saferp_keysize() 557 *keysize = 24; in saferp_keysize() 559 *keysize = 32; in saferp_keysize()
|
/optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_make_key.c | 28 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) in ecc_make_key() argument 32 if ((err = ecc_set_curve_by_size(keysize, key)) != CRYPT_OK) { return err; } in ecc_make_key()
|
/optee_os/core/lib/libtomcrypt/src/ciphers/aes/ |
A D | aes.c | 731 int ECB_KS(int *keysize) in ECB_KS() argument 733 LTC_ARGCHK(keysize != NULL); in ECB_KS() 735 if (*keysize < 16) { in ECB_KS() 738 if (*keysize < 24) { in ECB_KS() 739 *keysize = 16; in ECB_KS() 742 if (*keysize < 32) { in ECB_KS() 743 *keysize = 24; in ECB_KS() 746 *keysize = 32; in ECB_KS()
|
/optee_os/core/lib/libtomcrypt/src/ciphers/twofish/ |
A D | twofish.c | 694 int twofish_keysize(int *keysize) in twofish_keysize() argument 696 LTC_ARGCHK(keysize); in twofish_keysize() 697 if (*keysize < 16) { in twofish_keysize() 700 if (*keysize < 24) { in twofish_keysize() 701 *keysize = 16; in twofish_keysize() 704 if (*keysize < 32) { in twofish_keysize() 705 *keysize = 24; in twofish_keysize() 708 *keysize = 32; in twofish_keysize()
|
/optee_os/core/lib/libtomcrypt/src/hashes/chc/ |
A D | chc.c | 58 if ((err = cipher_descriptor[cipher]->keysize(&kl)) != CRYPT_OK) { in chc_register()
|