| /trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/codesafe/src/psa_driver_api/src/ |
| D | cc3xx_psa_cipher.c | 266 const uint8_t *input, size_t input_length, in cc3xx_cipher_update() argument 275 ( operation->unprocessed_size + input_length ) in cc3xx_cipher_update() 278 expected_output_size = input_length; in cc3xx_cipher_update() 298 input_length <= block_size - in cc3xx_cipher_update() 302 input_length < block_size - in cc3xx_cipher_update() 305 input_length < block_size - in cc3xx_cipher_update() 310 input_length); in cc3xx_cipher_update() 312 operation->unprocessed_size += input_length; in cc3xx_cipher_update() 342 input_length -= copy_len; in cc3xx_cipher_update() 345 if (0 != input_length) { in cc3xx_cipher_update() [all …]
|
| D | cc3xx_psa_asymmetric_encryption.c | 41 size_t input_length, const uint8_t *label, size_t label_len, in cc3xx_internal_rsa_encrypt() argument 99 input_length, in cc3xx_internal_rsa_encrypt() 108 input_length, in cc3xx_internal_rsa_encrypt() 143 size_t input_length, const uint8_t *label, size_t label_length, in cc3xx_internal_rsa_decrypt() argument 185 input_length, in cc3xx_internal_rsa_decrypt() 194 input_length, in cc3xx_internal_rsa_decrypt() 229 size_t input_length, in cc3xx_asymmetric_encrypt() argument 248 attributes, key_buffer, key_buffer_size, alg, input, input_length, in cc3xx_asymmetric_encrypt() 269 size_t input_length, in cc3xx_asymmetric_decrypt() argument 286 attributes, key_buffer, key_buffer_size, alg, input, input_length, in cc3xx_asymmetric_decrypt()
|
| D | cc3xx_psa_asymmetric_signature.c | 254 size_t input_length, in cc3xx_internal_rsa_verify() argument 302 (uint8_t *)input, input_length, in cc3xx_internal_rsa_verify() 307 input_length, (uint8_t *)signature); in cc3xx_internal_rsa_verify() 325 size_t input_length, in cc3xx_internal_rsa_sign() argument 380 hash_mode, (uint8_t *)input, input_length, in cc3xx_internal_rsa_sign() 403 input_length, (uint8_t *)signature, signature_length); in cc3xx_internal_rsa_sign() 425 size_t input_length, uint8_t *signature, in cc3xx_sign_hash() argument 429 input_length != PSA_HASH_LENGTH(PSA_ALG_SIGN_GET_HASH(alg))) { in cc3xx_sign_hash() 440 attributes, key, key_length, alg, input, input_length, signature, in cc3xx_sign_hash() 447 input_length, signature, signature_size, in cc3xx_sign_hash() [all …]
|
| D | cc3xx_internal_chacha20_poly1305.c | 222 size_t input_length) in cc3xx_chacha20_poly1305_update_ad() argument 231 if (context->curr_ad_len + input_length > context->ad_len) { in cc3xx_chacha20_poly1305_update_ad() 235 if (context->curr_ad_len + input_length == context->ad_len) { in cc3xx_chacha20_poly1305_update_ad() 240 rc = PolyUpdate(&context->poly, input, input_length, isPolyAeadMode); in cc3xx_chacha20_poly1305_update_ad() 246 context->curr_ad_len += input_length; in cc3xx_chacha20_poly1305_update_ad() 254 size_t input_length, in cc3xx_chacha20_poly1305_update() argument 272 if (context->curr_plaintext_len + input_length > context->plaintext_len) { in cc3xx_chacha20_poly1305_update() 277 status = cc3xx_chacha20_update(&context->chacha, input, input_length, in cc3xx_chacha20_poly1305_update() 294 if (context->curr_plaintext_len + input_length == context->plaintext_len) { in cc3xx_chacha20_poly1305_update() 300 rc = PolyUpdate(&context->poly, data_for_aead_construction, input_length, in cc3xx_chacha20_poly1305_update() [all …]
|
| D | cc3xx_psa_aead.c | 237 size_t input_length, uint8_t *output, in aead_one_shot_with_multipart() argument 249 size_t update_length = (dir == PSA_CRYPTO_DRIVER_ENCRYPT) ? input_length : in aead_one_shot_with_multipart() 250 input_length - expected_tag_length; in aead_one_shot_with_multipart() 260 if (output_size < input_length + expected_tag_length) { in aead_one_shot_with_multipart() 264 if (output_size < input_length - expected_tag_length) { in aead_one_shot_with_multipart() 319 input_length - update_length); in aead_one_shot_with_multipart() 736 size_t input_length, in cc3xx_aead_update() argument 759 if (input_length + curr_cache_size < AES_BLOCK_SIZE) { in cc3xx_aead_update() 761 CC_PalMemCopy(&cache_ptr[curr_cache_size], input, input_length); in cc3xx_aead_update() 762 operation->curr_cache_size += input_length; in cc3xx_aead_update() [all …]
|
| D | cc3xx_psa_hash.c | 189 const uint8_t *input, size_t input_length) in cc3xx_hash_update() argument 198 if (0 == input_length) { in cc3xx_hash_update() 211 while (input_length > MAX_HASH_CHUNK_SIZE) { in cc3xx_hash_update() 214 input_length -= MAX_HASH_CHUNK_SIZE; in cc3xx_hash_update() 223 status = hash_update(operation, (uint8_t *)input, input_length); in cc3xx_hash_update() 326 size_t input_length, uint8_t *hash, in cc3xx_hash_compute() argument 337 status = cc3xx_hash_update(&operation, input, input_length); in cc3xx_hash_compute()
|
| /trusted-firmware-m-latest/interface/include/psa/ |
| D | crypto_sizes.h | 517 #define PSA_AEAD_UPDATE_OUTPUT_SIZE(key_type, alg, input_length) \ argument 520 PSA_ROUND_UP_TO_MULTIPLE(PSA_BLOCK_CIPHER_BLOCK_LENGTH(key_type), (input_length)) : \ 521 (input_length) : \ 534 #define PSA_AEAD_UPDATE_OUTPUT_MAX_SIZE(input_length) \ argument 535 (PSA_ROUND_UP_TO_MULTIPLE(PSA_BLOCK_CIPHER_BLOCK_MAX_SIZE, (input_length))) 1179 #define PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, input_length) \ argument 1183 (input_length) + 1u) + \ 1186 (input_length) + PSA_CIPHER_IV_LENGTH((key_type), (alg)) : \ 1200 #define PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE(input_length) \ argument 1202 (input_length) + 1u) + \ [all …]
|
| D | crypto.h | 865 size_t input_length, 900 size_t input_length, 1020 size_t input_length); 1217 size_t input_length, 1258 size_t input_length, 1455 size_t input_length); 1624 size_t input_length, 1671 size_t input_length, 1960 size_t input_length, 2540 size_t input_length); [all …]
|
| /trusted-firmware-m-latest/platform/ext/accelerator/cc312/cc312-rom/psa_driver_api/src/ |
| D | cc3xx_psa_cipher.c | 94 size_t input_length, in cipher_crypt() argument 153 err = cc3xx_lowlevel_chacha20_update(input, input_length); in cipher_crypt() 215 err = cc3xx_lowlevel_aes_update(input, input_length); in cipher_crypt() 226 size_t pad_value = sizeof(padded_bytes) - (input_length % AES_BLOCK_SIZE); in cipher_crypt() 332 const uint8_t *input, size_t input_length, in cc3xx_cipher_update() argument 363 &(operation->stream), input, input_length, in cc3xx_cipher_update() 367 input_length -= *output_length; in cc3xx_cipher_update() 371 processed_length = (input_length / CC3XX_CHACHA_BLOCK_SIZE) * CC3XX_CHACHA_BLOCK_SIZE; in cc3xx_cipher_update() 373 processed_length = input_length; in cc3xx_cipher_update() 388 &(operation->stream), processed_length, input, input_length, in cc3xx_cipher_update() [all …]
|
| D | cc3xx_psa_asymmetric_signature.c | 49 const uint8_t *input, size_t input_length, in ecdsa_sign() argument 67 const size_t hash_length = (is_input_hash) ? input_length : PSA_HASH_LENGTH(hash_alg); in ecdsa_sign() 72 memcpy(hash, input, input_length); in ecdsa_sign() 73 hash_size = input_length; in ecdsa_sign() 75 status = cc3xx_hash_compute(hash_alg, input, input_length, in ecdsa_sign() 124 const uint8_t *input, size_t input_length, in ecdsa_verify() argument 144 const size_t hash_length = (is_input_hash) ? input_length : PSA_HASH_LENGTH(hash_alg); in ecdsa_verify() 149 memcpy(hash, input, input_length); in ecdsa_verify() 150 hash_size = input_length; in ecdsa_verify() 152 status = cc3xx_hash_compute(hash_alg, input, input_length, in ecdsa_verify() [all …]
|
| D | cc3xx_psa_mac.c | 36 const uint8_t *input, size_t input_length, in cmac_compute() argument 64 if (input_length > 0) { in cmac_compute() 65 cc3xx_lowlevel_aes_update_authed_data(input, input_length); in cmac_compute() 165 const uint8_t *input, size_t input_length, in hmac_compute() argument 199 input, input_length, in hmac_compute() 316 const uint8_t *input, size_t input_length) in cc3xx_mac_update() argument 324 return cmac_update(&(operation->cmac), input, input_length); in cc3xx_mac_update() 329 err = cc3xx_lowlevel_hmac_update(&(operation->hmac), input, input_length); in cc3xx_mac_update() 433 const uint8_t *input, size_t input_length, in cc3xx_mac_compute() argument 445 input, input_length, in cc3xx_mac_compute() [all …]
|
| D | cc3xx_psa_hash.c | 90 const uint8_t *input, size_t input_length) in cc3xx_hash_update() argument 96 if (input_length == 0) { in cc3xx_hash_update() 108 err = cc3xx_lowlevel_hash_update(input, input_length); in cc3xx_hash_update() 157 size_t input_length, uint8_t *hash, in cc3xx_hash_compute() argument 170 status = cc3xx_hash_update(&operation, input, input_length); in cc3xx_hash_compute()
|
| D | cc3xx_psa_aead.c | 55 size_t input_length, uint8_t *output, in aead_crypt() argument 73 if (input_length != 0) { in aead_crypt() 84 data_minus_tag = (dir == PSA_CRYPTO_DRIVER_DECRYPT) ? input_length - tag_len : input_length; in aead_crypt() 88 if (output_size < input_length + tag_len) { in aead_crypt() 92 if (output_size < input_length - tag_len) { in aead_crypt() 96 if (input_length < tag_len) { in aead_crypt() 106 memcpy(local_tag, input + (input_length - tag_len), tag_len); in aead_crypt() 237 memcpy(output + input_length, local_tag, tag_len); in aead_crypt() 383 size_t input_length, in cc3xx_aead_update() argument 415 &(operation->stream), input, input_length, in cc3xx_aead_update() [all …]
|
| D | cc3xx_internal_cipher.c | 449 const uint8_t *input, size_t input_length, in cc3xx_internal_cipher_stream_pre_update() argument 462 size_to_pre_process = keystream_size < input_length ? in cc3xx_internal_cipher_stream_pre_update() 463 keystream_size : input_length; in cc3xx_internal_cipher_stream_pre_update() 482 const uint8_t *input, size_t input_length, in cc3xx_internal_cipher_stream_post_update() argument 493 if (input_length - processed_length) { in cc3xx_internal_cipher_stream_post_update() 494 uint8_t permutation_buf[input_length - processed_length]; /* This is a VLA */ in cc3xx_internal_cipher_stream_post_update() 507 cc3xx_random_permutation_generate(permutation_buf, input_length - processed_length); in cc3xx_internal_cipher_stream_post_update() 509 for (idx = 0; idx < input_length - processed_length; idx++) { in cc3xx_internal_cipher_stream_post_update() 514 *output_length += (input_length - processed_length); in cc3xx_internal_cipher_stream_post_update() 517 stream->idx = (input_length - processed_length); in cc3xx_internal_cipher_stream_post_update()
|
| D | cc3xx_psa_asymmetric_encryption.c | 35 size_t input_length, in cc3xx_asymmetric_encrypt() argument 48 size_t input_length, in cc3xx_asymmetric_decrypt() argument
|
| /trusted-firmware-m-latest/secure_fw/partitions/crypto/ |
| D | crypto_asymmetric.c | 40 size_t input_length = in_vec[1].len; in tfm_crypto_asymmetric_sign_interface() local 44 status = psa_sign_message(library_key, iov->alg, input, input_length, in tfm_crypto_asymmetric_sign_interface() 54 size_t input_length = in_vec[1].len; in tfm_crypto_asymmetric_sign_interface() local 58 return psa_verify_message(library_key, iov->alg, input, input_length, in tfm_crypto_asymmetric_sign_interface() 118 size_t input_length = in_vec[1].len; in tfm_crypto_asymmetric_encrypt_interface() local 125 input, input_length, in tfm_crypto_asymmetric_encrypt_interface() 137 size_t input_length = in_vec[1].len; in tfm_crypto_asymmetric_encrypt_interface() local 144 input, input_length, in tfm_crypto_asymmetric_encrypt_interface()
|
| D | crypto_mac.c | 44 size_t input_length = in_vec[1].len; in tfm_crypto_mac_interface() 48 status = psa_mac_compute(library_key, iov->alg, input, input_length, in tfm_crypto_mac_interface() 62 size_t input_length = in_vec[1].len; in tfm_crypto_mac_interface() 66 return psa_mac_verify(library_key, iov->alg, input, input_length, in tfm_crypto_mac_interface() 137 size_t input_length = in_vec[1].len; in tfm_crypto_mac_interface() local 139 return psa_mac_update(operation, input, input_length); in tfm_crypto_mac_interface()
|
| D | crypto_hash.c | 38 size_t input_length = in_vec[1].len; in tfm_crypto_hash_interface() 42 status = psa_hash_compute(iov->alg, input, input_length, in tfm_crypto_hash_interface() 56 size_t input_length = in_vec[1].len; in tfm_crypto_hash_interface() 60 return psa_hash_compare(iov->alg, input, input_length, in tfm_crypto_hash_interface() 122 size_t input_length = in_vec[1].len; in tfm_crypto_hash_interface() local 124 return psa_hash_update(operation, input, input_length); in tfm_crypto_hash_interface()
|
| D | crypto_cipher.c | 44 size_t input_length = in_vec[1].len; in tfm_crypto_cipher_interface() 48 status = psa_cipher_encrypt(library_key, iov->alg, input, input_length, in tfm_crypto_cipher_interface() 62 size_t input_length = in_vec[1].len; in tfm_crypto_cipher_interface() 66 status = psa_cipher_decrypt(library_key, iov->alg, input, input_length, in tfm_crypto_cipher_interface() 158 size_t input_length = in_vec[1].len; in tfm_crypto_cipher_interface() local 162 status = psa_cipher_update(operation, input, input_length, in tfm_crypto_cipher_interface()
|
| /trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/codesafe/src/psa_driver_api/include/ |
| D | cc3xx_psa_asymmetric_signature.h | 44 size_t input_length, uint8_t *signature, 65 size_t input_length, const uint8_t *signature, 86 size_t input_length, uint8_t *signature,
|
| D | cc3xx_psa_cipher.h | 101 const uint8_t *input, size_t input_length, 155 size_t input_length, 182 size_t input_length,
|
| D | cc3xx_psa_asymmetric_encryption.h | 48 size_t input_length, 76 size_t input_length,
|
| /trusted-firmware-m-latest/platform/ext/accelerator/cc312/cc312-rom/psa_driver_api/include/ |
| D | cc3xx_psa_asymmetric_signature.h | 46 size_t input_length, uint8_t *signature, 67 size_t input_length, const uint8_t *signature, 88 size_t input_length, uint8_t *signature,
|
| D | cc3xx_psa_cipher.h | 101 const uint8_t *input, size_t input_length, 155 size_t input_length, 182 size_t input_length,
|
| /trusted-firmware-m-latest/interface/src/ |
| D | tfm_crypto_api.c | 315 size_t input_length, in TFM_CRYPTO_API() 328 {.base = input, .len = input_length}, in TFM_CRYPTO_API() 405 size_t input_length) in TFM_CRYPTO_API() 414 {.base = input, .len = input_length}, in TFM_CRYPTO_API() 510 size_t input_length, in TFM_CRYPTO_API() 523 {.base = input, .len = input_length}, in TFM_CRYPTO_API() 539 size_t input_length, in TFM_CRYPTO_API() 550 {.base = input, .len = input_length}, in TFM_CRYPTO_API() 601 size_t input_length) in TFM_CRYPTO_API() 610 {.base = input, .len = input_length}, in TFM_CRYPTO_API() [all …]
|