Home
last modified time | relevance | path

Searched refs:key (Results 1 – 21 of 21) sorted by relevance

/hal_silabs-3.6.0/gecko/se_manager/src/
Dsl_se_manager_key_handling.c108 sl_status_t sli_key_get_storage_size(const sl_se_key_descriptor_t* key, in sli_key_get_storage_size() argument
111 if (key == NULL || storage_size == NULL) { in sli_key_get_storage_size()
116 sl_status_t status = sli_key_get_size(key, &key_size); in sli_key_get_storage_size()
121 uint32_t key_type = (key->type & KEYSPEC_TYPE_MASK); in sli_key_get_storage_size()
134 ((key->flags & SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PRIVATE_KEY) != 0); in sli_key_get_storage_size()
136 ((key->flags & SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PUBLIC_KEY) != 0); in sli_key_get_storage_size()
140 ((key->flags & SL_SE_KEY_FLAG_ASYMMETRIC_USES_CUSTOM_DOMAIN) != 0); in sli_key_get_storage_size()
171 static sl_status_t clear_padding(const sl_se_key_descriptor_t *key) in clear_padding() argument
173 if (key->storage.method == SL_SE_KEY_STORAGE_EXTERNAL_PLAINTEXT in clear_padding()
174 && (key->type & KEYSPEC_TYPE_MASK) == KEYSPEC_TYPE_RAW) { in clear_padding()
[all …]
Dsl_se_manager_cipher.c61 const sl_se_key_descriptor_t *key, in sl_se_aes_crypt_ecb() argument
67 if (cmd_ctx == NULL || key == NULL || input == NULL || output == NULL in sl_se_aes_crypt_ecb()
82 sli_add_key_parameters(cmd_ctx, key, status); in sl_se_aes_crypt_ecb()
87 sli_add_key_metadata(cmd_ctx, key, status); in sl_se_aes_crypt_ecb()
89 sli_add_key_input(cmd_ctx, key, status); in sl_se_aes_crypt_ecb()
104 const sl_se_key_descriptor_t *key, in sl_se_aes_crypt_cbc() argument
111 if (cmd_ctx == NULL || key == NULL || input == NULL || output == NULL in sl_se_aes_crypt_cbc()
131 sli_add_key_parameters(cmd_ctx, key, status); in sl_se_aes_crypt_cbc()
136 sli_add_key_metadata(cmd_ctx, key, status); in sl_se_aes_crypt_cbc()
138 sli_add_key_input(cmd_ctx, key, status); in sl_se_aes_crypt_cbc()
[all …]
Dsl_se_manager_signature.c50 const sl_se_key_descriptor_t *key, in sl_se_ecc_sign() argument
58 if (cmd_ctx == NULL || key == NULL || message == NULL || signature == NULL) { in sl_se_ecc_sign()
66 if ((key->type & SL_SE_KEY_TYPE_ALGORITHM_MASK) in sl_se_ecc_sign()
102 sli_add_key_parameters(cmd_ctx, key, status); in sl_se_ecc_sign()
106 sli_add_key_metadata(cmd_ctx, key, status); in sl_se_ecc_sign()
108 sli_add_key_input(cmd_ctx, key, status); in sl_se_ecc_sign()
115 if ((key->type & SL_SE_KEY_TYPE_ALGORITHM_MASK) == SL_SE_KEY_TYPE_ECC_EDDSA) { in sl_se_ecc_sign()
129 const sl_se_key_descriptor_t *key, in sl_se_ecc_verify() argument
137 if (cmd_ctx == NULL || key == NULL || message == NULL || signature == NULL) { in sl_se_ecc_verify()
141 if (!(key->flags & SL_SE_KEY_FLAG_ASYMMETRIC_BUFFER_HAS_PUBLIC_KEY)) { in sl_se_ecc_verify()
[all …]
Dsl_se_manager_util.c250 void *key, in sl_se_init_otp_key() argument
253 if (cmd_ctx == NULL || key == NULL || num_bytes == 0UL || (size_t)key & 3U) { in sl_se_init_otp_key()
300 parity = parity ^ ((uint32_t *)key)[i]; in sl_se_init_otp_key()
316 SE_DataTransfer_t key_data = SE_DATATRANSFER_DEFAULT(key, num_bytes); in sl_se_init_otp_key()
327 void *key, in sl_se_read_pubkey() argument
330 if (cmd_ctx == NULL || key == NULL || num_bytes != 64UL || (size_t)key & 3U) { in sl_se_read_pubkey()
362 SE_DataTransfer_t out_data = SE_DATATRANSFER_DEFAULT(key, num_bytes); in sl_se_read_pubkey()
/hal_silabs-3.6.0/gecko/util/se_manager/inc/
Dsl_se_manager_cipher.h95 const sl_se_key_descriptor_t *key,
133 const sl_se_key_descriptor_t *key,
172 const sl_se_key_descriptor_t *key,
209 const sl_se_key_descriptor_t *key,
250 const sl_se_key_descriptor_t *key,
299 const sl_se_key_descriptor_t *key,
348 const sl_se_key_descriptor_t *key,
400 const sl_se_key_descriptor_t *key,
444 const sl_se_key_descriptor_t *key,
488 const sl_se_key_descriptor_t *key,
[all …]
Dsli_se_manager_internal.h320 #define sli_add_key_parameters(cmd_ctx, key, status) { \ argument
322 (status) = sli_se_key_to_keyspec((key), &keyspec); \
330 #define sli_add_key_metadata(cmd_ctx, key, status) \ argument
333 (status) = sli_se_get_auth_buffer((key), &auth_buffer); \
340 #define sli_add_key_metadata_custom(cmd_ctx, auth_data_buf, key, status) \ argument
343 (status) = sli_se_get_auth_buffer((key), &auth_data_buf); \
350 #define sli_add_key_input(cmd_ctx, key, status) \ argument
352 (status) = sli_se_get_key_input_output((key), &key_input_buffer); \
359 #define sli_add_key_output(cmd_ctx, key, status) \ argument
361 (status) = sli_se_get_key_input_output((key), &key_output_buffer); \
[all …]
Dsl_se_manager_key_handling.h80 sl_status_t sl_se_validate_key(const sl_se_key_descriptor_t *key);
226 const sl_se_key_descriptor_t *key);
246 sl_status_t sl_se_get_storage_size(const sl_se_key_descriptor_t *key,
Dsl_se_manager_util.h244 void *key,
276 void *key,
Dsl_se_manager_types.h343 const sl_se_key_descriptor_t *key; ///< Pointer to key object member
372 const sl_se_key_descriptor_t *key;///< Pointer to key object member
/hal_silabs-3.6.0/gecko/se_manager/inc/
Dsl_se_manager_cipher.h95 const sl_se_key_descriptor_t *key,
133 const sl_se_key_descriptor_t *key,
172 const sl_se_key_descriptor_t *key,
209 const sl_se_key_descriptor_t *key,
255 const sl_se_key_descriptor_t *key,
304 const sl_se_key_descriptor_t *key,
353 const sl_se_key_descriptor_t *key,
405 const sl_se_key_descriptor_t *key,
449 const sl_se_key_descriptor_t *key,
493 const sl_se_key_descriptor_t *key,
[all …]
Dsli_se_manager_internal.h317 #define sli_add_key_parameters(cmd_ctx, key, status) { \ argument
319 (status) = sli_se_key_to_keyspec((key), &keyspec); \
327 #define sli_add_key_metadata(cmd_ctx, key, status) \ argument
330 (status) = sli_se_get_auth_buffer((key), &auth_buffer); \
337 #define sli_add_key_metadata_custom(cmd_ctx, auth_data_buf, key, status) \ argument
340 (status) = sli_se_get_auth_buffer((key), &auth_data_buf); \
347 #define sli_add_key_input(cmd_ctx, key, status) \ argument
349 (status) = sli_se_get_key_input_output((key), &key_input_buffer); \
356 #define sli_add_key_output(cmd_ctx, key, status) \ argument
358 (status) = sli_se_get_key_input_output((key), &key_output_buffer); \
[all …]
Dsl_se_manager_key_handling.h80 sl_status_t sl_se_validate_key(const sl_se_key_descriptor_t *key);
226 const sl_se_key_descriptor_t *key);
246 sl_status_t sl_se_get_storage_size(const sl_se_key_descriptor_t *key,
Dsl_se_manager_signature.h114 const sl_se_key_descriptor_t *key,
168 const sl_se_key_descriptor_t *key,
Dsl_se_manager_util.h244 void *key,
276 void *key,
/hal_silabs-3.6.0/gecko/emlib/src/
Dem_aes.c158 const uint8_t *key, in AES_CBC128() argument
174 AES->KEYHA = __REV_FROM_BYTEARRAY(&key[i * 4]); in AES_CBC128()
197 AES->KEYLA = __REV_FROM_BYTEARRAY(&key[i * 4]); in AES_CBC128()
233 AES->KEYLA = __REV_FROM_BYTEARRAY(&key[i * 4]); in AES_CBC128()
298 const uint8_t *key, in AES_CBC256() argument
326 AES->KEYLA = __REV_FROM_BYTEARRAY(&key[j * 4]); in AES_CBC256()
327 AES->KEYHA = __REV_FROM_BYTEARRAY(&key[i * 4]); in AES_CBC256()
354 AES->KEYLA = __REV_FROM_BYTEARRAY(&key[j * 4]); in AES_CBC256()
355 AES->KEYHA = __REV_FROM_BYTEARRAY(&key[i * 4]); in AES_CBC256()
443 const uint8_t *key, in AES_CFB128() argument
[all …]
Dem_crypto.c108 const uint8_t * key,
117 const uint8_t * key,
126 const uint8_t * key,
135 const uint8_t * key,
144 const uint8_t * key,
152 const uint8_t * key,
1131 const uint8_t * key, in CRYPTO_AES_CBC128() argument
1136 CRYPTO_AES_CBCx(crypto, out, in, len, key, iv, encrypt, cryptoKey128Bits); in CRYPTO_AES_CBC128()
1177 const uint8_t * key, in CRYPTO_AES_CBC256() argument
1182 CRYPTO_AES_CBCx(crypto, out, in, len, key, iv, encrypt, cryptoKey256Bits); in CRYPTO_AES_CBC256()
[all …]
/hal_silabs-3.6.0/gecko/emlib/inc/
Dem_aes.h119 const uint8_t *key,
127 const uint8_t *key,
135 const uint8_t *key,
143 const uint8_t *key,
151 const uint8_t *key,
159 const uint8_t *key,
175 const uint8_t *key,
182 const uint8_t *key,
284 const uint8_t *key,
291 const uint8_t *key,
Dem_crypto.h1182 const uint8_t * key,
1190 const uint8_t * key,
1198 const uint8_t * key,
1206 const uint8_t * key,
1214 const uint8_t * key,
1222 const uint8_t * key,
1230 const uint8_t * key,
1238 const uint8_t * key,
1250 const uint8_t * key,
1257 const uint8_t * key,
[all …]
/hal_silabs-3.6.0/gecko/util/third_party/crypto/sl_component/sl_protocol_crypto/src/
Dsli_protocol_crypto_crypto.c47 const unsigned char *key, in aes_ccm_radio() argument
82 CRYPTO_KeyBufWriteUnaligned(device, key, cryptoKey128Bits); in aes_ccm_radio()
300 const unsigned char *key, in aes_ccm_ble() argument
331 key, in aes_ccm_ble()
341 const unsigned char *key, in sli_ccm_auth_decrypt_ble() argument
349 key, in sli_ccm_auth_decrypt_ble()
360 const unsigned char *key, in sli_ccm_encrypt_and_tag_ble() argument
368 key, in sli_ccm_encrypt_and_tag_ble()
378 const unsigned char *key, in sli_ccm_zigbee() argument
421 key, in sli_ccm_zigbee()
[all …]
Dsli_protocol_crypto.h65 sl_status_t sli_aes_crypt_ctr_radio(const unsigned char *key,
84 const unsigned char *key,
101 sl_status_t sli_aes_cmac_radio(const unsigned char *key,
131 const unsigned char *key,
150 const unsigned char *key,
175 const unsigned char *key,
Dsli_protocol_crypto_radioaes.c233 const unsigned char *key, in aes_ccm_radio() argument
318 .address = (uint32_t) key, in aes_ccm_radio()
413 const unsigned char *key, in aes_ccm_ble() argument
438 key, in aes_ccm_ble()
443 sl_status_t sli_aes_crypt_ctr_radio(const unsigned char *key, in sli_aes_crypt_ctr_radio() argument
509 .address = (uint32_t) key, in sli_aes_crypt_ctr_radio()
520 const unsigned char *key, in sli_aes_crypt_ecb_radio() argument
564 .address = (uint32_t) key, in sli_aes_crypt_ecb_radio()
574 sl_status_t sli_aes_cmac_radio(const unsigned char *key, in sli_aes_cmac_radio() argument
629 .address = (uint32_t) key, in sli_aes_cmac_radio()
[all …]