/hal_silabs-3.6.0/gecko/se_manager/src/ |
D | sl_se_manager_key_handling.c | 108 sl_status_t sli_key_get_storage_size(const sl_se_key_descriptor_t* key, in sli_key_get_storage_size() argument 111 if (key == NULL || storage_size == NULL) { in sli_key_get_storage_size() 116 sl_status_t status = sli_key_get_size(key, &key_size); in sli_key_get_storage_size() 121 uint32_t key_type = (key->type & KEYSPEC_TYPE_MASK); in sli_key_get_storage_size() 134 ((key->flags & SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PRIVATE_KEY) != 0); in sli_key_get_storage_size() 136 ((key->flags & SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PUBLIC_KEY) != 0); in sli_key_get_storage_size() 140 ((key->flags & SL_SE_KEY_FLAG_ASYMMETRIC_USES_CUSTOM_DOMAIN) != 0); in sli_key_get_storage_size() 171 static sl_status_t clear_padding(const sl_se_key_descriptor_t *key) in clear_padding() argument 173 if (key->storage.method == SL_SE_KEY_STORAGE_EXTERNAL_PLAINTEXT in clear_padding() 174 && (key->type & KEYSPEC_TYPE_MASK) == KEYSPEC_TYPE_RAW) { in clear_padding() [all …]
|
D | sl_se_manager_cipher.c | 61 const sl_se_key_descriptor_t *key, in sl_se_aes_crypt_ecb() argument 67 if (cmd_ctx == NULL || key == NULL || input == NULL || output == NULL in sl_se_aes_crypt_ecb() 82 sli_add_key_parameters(cmd_ctx, key, status); in sl_se_aes_crypt_ecb() 87 sli_add_key_metadata(cmd_ctx, key, status); in sl_se_aes_crypt_ecb() 89 sli_add_key_input(cmd_ctx, key, status); in sl_se_aes_crypt_ecb() 104 const sl_se_key_descriptor_t *key, in sl_se_aes_crypt_cbc() argument 111 if (cmd_ctx == NULL || key == NULL || input == NULL || output == NULL in sl_se_aes_crypt_cbc() 131 sli_add_key_parameters(cmd_ctx, key, status); in sl_se_aes_crypt_cbc() 136 sli_add_key_metadata(cmd_ctx, key, status); in sl_se_aes_crypt_cbc() 138 sli_add_key_input(cmd_ctx, key, status); in sl_se_aes_crypt_cbc() [all …]
|
D | sl_se_manager_signature.c | 50 const sl_se_key_descriptor_t *key, in sl_se_ecc_sign() argument 58 if (cmd_ctx == NULL || key == NULL || message == NULL || signature == NULL) { in sl_se_ecc_sign() 66 if ((key->type & SL_SE_KEY_TYPE_ALGORITHM_MASK) in sl_se_ecc_sign() 102 sli_add_key_parameters(cmd_ctx, key, status); in sl_se_ecc_sign() 106 sli_add_key_metadata(cmd_ctx, key, status); in sl_se_ecc_sign() 108 sli_add_key_input(cmd_ctx, key, status); in sl_se_ecc_sign() 115 if ((key->type & SL_SE_KEY_TYPE_ALGORITHM_MASK) == SL_SE_KEY_TYPE_ECC_EDDSA) { in sl_se_ecc_sign() 129 const sl_se_key_descriptor_t *key, in sl_se_ecc_verify() argument 137 if (cmd_ctx == NULL || key == NULL || message == NULL || signature == NULL) { in sl_se_ecc_verify() 141 if (!(key->flags & SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PUBLIC_KEY)) { in sl_se_ecc_verify() [all …]
|
D | sl_se_manager_util.c | 250 void *key, in sl_se_init_otp_key() argument 253 if (cmd_ctx == NULL || key == NULL || num_bytes == 0UL || (size_t)key & 3U) { in sl_se_init_otp_key() 300 parity = parity ^ ((uint32_t *)key)[i]; in sl_se_init_otp_key() 316 SE_DataTransfer_t key_data = SE_DATATRANSFER_DEFAULT(key, num_bytes); in sl_se_init_otp_key() 327 void *key, in sl_se_read_pubkey() argument 330 if (cmd_ctx == NULL || key == NULL || num_bytes != 64UL || (size_t)key & 3U) { in sl_se_read_pubkey() 362 SE_DataTransfer_t out_data = SE_DATATRANSFER_DEFAULT(key, num_bytes); in sl_se_read_pubkey()
|
/hal_silabs-3.6.0/gecko/util/se_manager/inc/ |
D | sl_se_manager_cipher.h | 95 const sl_se_key_descriptor_t *key, 133 const sl_se_key_descriptor_t *key, 172 const sl_se_key_descriptor_t *key, 209 const sl_se_key_descriptor_t *key, 250 const sl_se_key_descriptor_t *key, 299 const sl_se_key_descriptor_t *key, 348 const sl_se_key_descriptor_t *key, 400 const sl_se_key_descriptor_t *key, 444 const sl_se_key_descriptor_t *key, 488 const sl_se_key_descriptor_t *key, [all …]
|
D | sli_se_manager_internal.h | 320 #define sli_add_key_parameters(cmd_ctx, key, status) { \ argument 322 (status) = sli_se_key_to_keyspec((key), &keyspec); \ 330 #define sli_add_key_metadata(cmd_ctx, key, status) \ argument 333 (status) = sli_se_get_auth_buffer((key), &auth_buffer); \ 340 #define sli_add_key_metadata_custom(cmd_ctx, auth_data_buf, key, status) \ argument 343 (status) = sli_se_get_auth_buffer((key), &auth_data_buf); \ 350 #define sli_add_key_input(cmd_ctx, key, status) \ argument 352 (status) = sli_se_get_key_input_output((key), &key_input_buffer); \ 359 #define sli_add_key_output(cmd_ctx, key, status) \ argument 361 (status) = sli_se_get_key_input_output((key), &key_output_buffer); \ [all …]
|
D | sl_se_manager_key_handling.h | 80 sl_status_t sl_se_validate_key(const sl_se_key_descriptor_t *key); 226 const sl_se_key_descriptor_t *key); 246 sl_status_t sl_se_get_storage_size(const sl_se_key_descriptor_t *key,
|
D | sl_se_manager_util.h | 244 void *key, 276 void *key,
|
D | sl_se_manager_types.h | 343 const sl_se_key_descriptor_t *key; ///< Pointer to key object member 372 const sl_se_key_descriptor_t *key;///< Pointer to key object member
|
/hal_silabs-3.6.0/gecko/se_manager/inc/ |
D | sl_se_manager_cipher.h | 95 const sl_se_key_descriptor_t *key, 133 const sl_se_key_descriptor_t *key, 172 const sl_se_key_descriptor_t *key, 209 const sl_se_key_descriptor_t *key, 255 const sl_se_key_descriptor_t *key, 304 const sl_se_key_descriptor_t *key, 353 const sl_se_key_descriptor_t *key, 405 const sl_se_key_descriptor_t *key, 449 const sl_se_key_descriptor_t *key, 493 const sl_se_key_descriptor_t *key, [all …]
|
D | sli_se_manager_internal.h | 317 #define sli_add_key_parameters(cmd_ctx, key, status) { \ argument 319 (status) = sli_se_key_to_keyspec((key), &keyspec); \ 327 #define sli_add_key_metadata(cmd_ctx, key, status) \ argument 330 (status) = sli_se_get_auth_buffer((key), &auth_buffer); \ 337 #define sli_add_key_metadata_custom(cmd_ctx, auth_data_buf, key, status) \ argument 340 (status) = sli_se_get_auth_buffer((key), &auth_data_buf); \ 347 #define sli_add_key_input(cmd_ctx, key, status) \ argument 349 (status) = sli_se_get_key_input_output((key), &key_input_buffer); \ 356 #define sli_add_key_output(cmd_ctx, key, status) \ argument 358 (status) = sli_se_get_key_input_output((key), &key_output_buffer); \ [all …]
|
D | sl_se_manager_key_handling.h | 80 sl_status_t sl_se_validate_key(const sl_se_key_descriptor_t *key); 226 const sl_se_key_descriptor_t *key); 246 sl_status_t sl_se_get_storage_size(const sl_se_key_descriptor_t *key,
|
D | sl_se_manager_signature.h | 114 const sl_se_key_descriptor_t *key, 168 const sl_se_key_descriptor_t *key,
|
D | sl_se_manager_util.h | 244 void *key, 276 void *key,
|
/hal_silabs-3.6.0/gecko/emlib/src/ |
D | em_aes.c | 158 const uint8_t *key, in AES_CBC128() argument 174 AES->KEYHA = __REV_FROM_BYTEARRAY(&key[i * 4]); in AES_CBC128() 197 AES->KEYLA = __REV_FROM_BYTEARRAY(&key[i * 4]); in AES_CBC128() 233 AES->KEYLA = __REV_FROM_BYTEARRAY(&key[i * 4]); in AES_CBC128() 298 const uint8_t *key, in AES_CBC256() argument 326 AES->KEYLA = __REV_FROM_BYTEARRAY(&key[j * 4]); in AES_CBC256() 327 AES->KEYHA = __REV_FROM_BYTEARRAY(&key[i * 4]); in AES_CBC256() 354 AES->KEYLA = __REV_FROM_BYTEARRAY(&key[j * 4]); in AES_CBC256() 355 AES->KEYHA = __REV_FROM_BYTEARRAY(&key[i * 4]); in AES_CBC256() 443 const uint8_t *key, in AES_CFB128() argument [all …]
|
D | em_crypto.c | 108 const uint8_t * key, 117 const uint8_t * key, 126 const uint8_t * key, 135 const uint8_t * key, 144 const uint8_t * key, 152 const uint8_t * key, 1131 const uint8_t * key, in CRYPTO_AES_CBC128() argument 1136 CRYPTO_AES_CBCx(crypto, out, in, len, key, iv, encrypt, cryptoKey128Bits); in CRYPTO_AES_CBC128() 1177 const uint8_t * key, in CRYPTO_AES_CBC256() argument 1182 CRYPTO_AES_CBCx(crypto, out, in, len, key, iv, encrypt, cryptoKey256Bits); in CRYPTO_AES_CBC256() [all …]
|
/hal_silabs-3.6.0/gecko/emlib/inc/ |
D | em_aes.h | 119 const uint8_t *key, 127 const uint8_t *key, 135 const uint8_t *key, 143 const uint8_t *key, 151 const uint8_t *key, 159 const uint8_t *key, 175 const uint8_t *key, 182 const uint8_t *key, 284 const uint8_t *key, 291 const uint8_t *key,
|
D | em_crypto.h | 1182 const uint8_t * key, 1190 const uint8_t * key, 1198 const uint8_t * key, 1206 const uint8_t * key, 1214 const uint8_t * key, 1222 const uint8_t * key, 1230 const uint8_t * key, 1238 const uint8_t * key, 1250 const uint8_t * key, 1257 const uint8_t * key, [all …]
|
/hal_silabs-3.6.0/gecko/util/third_party/crypto/sl_component/sl_protocol_crypto/src/ |
D | sli_protocol_crypto_crypto.c | 47 const unsigned char *key, in aes_ccm_radio() argument 82 CRYPTO_KeyBufWriteUnaligned(device, key, cryptoKey128Bits); in aes_ccm_radio() 300 const unsigned char *key, in aes_ccm_ble() argument 331 key, in aes_ccm_ble() 341 const unsigned char *key, in sli_ccm_auth_decrypt_ble() argument 349 key, in sli_ccm_auth_decrypt_ble() 360 const unsigned char *key, in sli_ccm_encrypt_and_tag_ble() argument 368 key, in sli_ccm_encrypt_and_tag_ble() 378 const unsigned char *key, in sli_ccm_zigbee() argument 421 key, in sli_ccm_zigbee() [all …]
|
D | sli_protocol_crypto.h | 65 sl_status_t sli_aes_crypt_ctr_radio(const unsigned char *key, 84 const unsigned char *key, 101 sl_status_t sli_aes_cmac_radio(const unsigned char *key, 131 const unsigned char *key, 150 const unsigned char *key, 175 const unsigned char *key,
|
D | sli_protocol_crypto_radioaes.c | 233 const unsigned char *key, in aes_ccm_radio() argument 318 .address = (uint32_t) key, in aes_ccm_radio() 413 const unsigned char *key, in aes_ccm_ble() argument 438 key, in aes_ccm_ble() 443 sl_status_t sli_aes_crypt_ctr_radio(const unsigned char *key, in sli_aes_crypt_ctr_radio() argument 509 .address = (uint32_t) key, in sli_aes_crypt_ctr_radio() 520 const unsigned char *key, in sli_aes_crypt_ecb_radio() argument 564 .address = (uint32_t) key, in sli_aes_crypt_ecb_radio() 574 sl_status_t sli_aes_cmac_radio(const unsigned char *key, in sli_aes_cmac_radio() argument 629 .address = (uint32_t) key, in sli_aes_cmac_radio() [all …]
|