Home
last modified time | relevance | path

Searched refs:input_length (Results 1 – 25 of 47) sorted by relevance

12

/trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/codesafe/src/psa_driver_api/src/
Dcc3xx_psa_cipher.c266 const uint8_t *input, size_t input_length, in cc3xx_cipher_update() argument
275 ( operation->unprocessed_size + input_length ) in cc3xx_cipher_update()
278 expected_output_size = input_length; in cc3xx_cipher_update()
298 input_length <= block_size - in cc3xx_cipher_update()
302 input_length < block_size - in cc3xx_cipher_update()
305 input_length < block_size - in cc3xx_cipher_update()
310 input_length); in cc3xx_cipher_update()
312 operation->unprocessed_size += input_length; in cc3xx_cipher_update()
342 input_length -= copy_len; in cc3xx_cipher_update()
345 if (0 != input_length) { in cc3xx_cipher_update()
[all …]
Dcc3xx_psa_asymmetric_encryption.c41 size_t input_length, const uint8_t *label, size_t label_len, in cc3xx_internal_rsa_encrypt() argument
99 input_length, in cc3xx_internal_rsa_encrypt()
108 input_length, in cc3xx_internal_rsa_encrypt()
143 size_t input_length, const uint8_t *label, size_t label_length, in cc3xx_internal_rsa_decrypt() argument
185 input_length, in cc3xx_internal_rsa_decrypt()
194 input_length, in cc3xx_internal_rsa_decrypt()
229 size_t input_length, in cc3xx_asymmetric_encrypt() argument
248 attributes, key_buffer, key_buffer_size, alg, input, input_length, in cc3xx_asymmetric_encrypt()
269 size_t input_length, in cc3xx_asymmetric_decrypt() argument
286 attributes, key_buffer, key_buffer_size, alg, input, input_length, in cc3xx_asymmetric_decrypt()
Dcc3xx_psa_asymmetric_signature.c254 size_t input_length, in cc3xx_internal_rsa_verify() argument
302 (uint8_t *)input, input_length, in cc3xx_internal_rsa_verify()
307 input_length, (uint8_t *)signature); in cc3xx_internal_rsa_verify()
325 size_t input_length, in cc3xx_internal_rsa_sign() argument
380 hash_mode, (uint8_t *)input, input_length, in cc3xx_internal_rsa_sign()
403 input_length, (uint8_t *)signature, signature_length); in cc3xx_internal_rsa_sign()
425 size_t input_length, uint8_t *signature, in cc3xx_sign_hash() argument
429 input_length != PSA_HASH_LENGTH(PSA_ALG_SIGN_GET_HASH(alg))) { in cc3xx_sign_hash()
440 attributes, key, key_length, alg, input, input_length, signature, in cc3xx_sign_hash()
447 input_length, signature, signature_size, in cc3xx_sign_hash()
[all …]
Dcc3xx_internal_chacha20_poly1305.c222 size_t input_length) in cc3xx_chacha20_poly1305_update_ad() argument
231 if (context->curr_ad_len + input_length > context->ad_len) { in cc3xx_chacha20_poly1305_update_ad()
235 if (context->curr_ad_len + input_length == context->ad_len) { in cc3xx_chacha20_poly1305_update_ad()
240 rc = PolyUpdate(&context->poly, input, input_length, isPolyAeadMode); in cc3xx_chacha20_poly1305_update_ad()
246 context->curr_ad_len += input_length; in cc3xx_chacha20_poly1305_update_ad()
254 size_t input_length, in cc3xx_chacha20_poly1305_update() argument
272 if (context->curr_plaintext_len + input_length > context->plaintext_len) { in cc3xx_chacha20_poly1305_update()
277 status = cc3xx_chacha20_update(&context->chacha, input, input_length, in cc3xx_chacha20_poly1305_update()
294 if (context->curr_plaintext_len + input_length == context->plaintext_len) { in cc3xx_chacha20_poly1305_update()
300 rc = PolyUpdate(&context->poly, data_for_aead_construction, input_length, in cc3xx_chacha20_poly1305_update()
[all …]
Dcc3xx_psa_aead.c237 size_t input_length, uint8_t *output, in aead_one_shot_with_multipart() argument
249 size_t update_length = (dir == PSA_CRYPTO_DRIVER_ENCRYPT) ? input_length : in aead_one_shot_with_multipart()
250 input_length - expected_tag_length; in aead_one_shot_with_multipart()
260 if (output_size < input_length + expected_tag_length) { in aead_one_shot_with_multipart()
264 if (output_size < input_length - expected_tag_length) { in aead_one_shot_with_multipart()
319 input_length - update_length); in aead_one_shot_with_multipart()
736 size_t input_length, in cc3xx_aead_update() argument
759 if (input_length + curr_cache_size < AES_BLOCK_SIZE) { in cc3xx_aead_update()
761 CC_PalMemCopy(&cache_ptr[curr_cache_size], input, input_length); in cc3xx_aead_update()
762 operation->curr_cache_size += input_length; in cc3xx_aead_update()
[all …]
Dcc3xx_psa_hash.c189 const uint8_t *input, size_t input_length) in cc3xx_hash_update() argument
198 if (0 == input_length) { in cc3xx_hash_update()
211 while (input_length > MAX_HASH_CHUNK_SIZE) { in cc3xx_hash_update()
214 input_length -= MAX_HASH_CHUNK_SIZE; in cc3xx_hash_update()
223 status = hash_update(operation, (uint8_t *)input, input_length); in cc3xx_hash_update()
326 size_t input_length, uint8_t *hash, in cc3xx_hash_compute() argument
337 status = cc3xx_hash_update(&operation, input, input_length); in cc3xx_hash_compute()
/trusted-firmware-m-latest/interface/include/psa/
Dcrypto_sizes.h517 #define PSA_AEAD_UPDATE_OUTPUT_SIZE(key_type, alg, input_length) \ argument
520 PSA_ROUND_UP_TO_MULTIPLE(PSA_BLOCK_CIPHER_BLOCK_LENGTH(key_type), (input_length)) : \
521 (input_length) : \
534 #define PSA_AEAD_UPDATE_OUTPUT_MAX_SIZE(input_length) \ argument
535 (PSA_ROUND_UP_TO_MULTIPLE(PSA_BLOCK_CIPHER_BLOCK_MAX_SIZE, (input_length)))
1179 #define PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, input_length) \ argument
1183 (input_length) + 1u) + \
1186 (input_length) + PSA_CIPHER_IV_LENGTH((key_type), (alg)) : \
1200 #define PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE(input_length) \ argument
1202 (input_length) + 1u) + \
[all …]
Dcrypto.h865 size_t input_length,
900 size_t input_length,
1020 size_t input_length);
1217 size_t input_length,
1258 size_t input_length,
1455 size_t input_length);
1624 size_t input_length,
1671 size_t input_length,
1960 size_t input_length,
2540 size_t input_length);
[all …]
/trusted-firmware-m-latest/platform/ext/accelerator/cc312/cc312-rom/psa_driver_api/src/
Dcc3xx_psa_cipher.c94 size_t input_length, in cipher_crypt() argument
153 err = cc3xx_lowlevel_chacha20_update(input, input_length); in cipher_crypt()
215 err = cc3xx_lowlevel_aes_update(input, input_length); in cipher_crypt()
226 size_t pad_value = sizeof(padded_bytes) - (input_length % AES_BLOCK_SIZE); in cipher_crypt()
332 const uint8_t *input, size_t input_length, in cc3xx_cipher_update() argument
363 &(operation->stream), input, input_length, in cc3xx_cipher_update()
367 input_length -= *output_length; in cc3xx_cipher_update()
371 processed_length = (input_length / CC3XX_CHACHA_BLOCK_SIZE) * CC3XX_CHACHA_BLOCK_SIZE; in cc3xx_cipher_update()
373 processed_length = input_length; in cc3xx_cipher_update()
388 &(operation->stream), processed_length, input, input_length, in cc3xx_cipher_update()
[all …]
Dcc3xx_psa_asymmetric_signature.c49 const uint8_t *input, size_t input_length, in ecdsa_sign() argument
67 const size_t hash_length = (is_input_hash) ? input_length : PSA_HASH_LENGTH(hash_alg); in ecdsa_sign()
72 memcpy(hash, input, input_length); in ecdsa_sign()
73 hash_size = input_length; in ecdsa_sign()
75 status = cc3xx_hash_compute(hash_alg, input, input_length, in ecdsa_sign()
124 const uint8_t *input, size_t input_length, in ecdsa_verify() argument
144 const size_t hash_length = (is_input_hash) ? input_length : PSA_HASH_LENGTH(hash_alg); in ecdsa_verify()
149 memcpy(hash, input, input_length); in ecdsa_verify()
150 hash_size = input_length; in ecdsa_verify()
152 status = cc3xx_hash_compute(hash_alg, input, input_length, in ecdsa_verify()
[all …]
Dcc3xx_psa_mac.c36 const uint8_t *input, size_t input_length, in cmac_compute() argument
64 if (input_length > 0) { in cmac_compute()
65 cc3xx_lowlevel_aes_update_authed_data(input, input_length); in cmac_compute()
165 const uint8_t *input, size_t input_length, in hmac_compute() argument
199 input, input_length, in hmac_compute()
316 const uint8_t *input, size_t input_length) in cc3xx_mac_update() argument
324 return cmac_update(&(operation->cmac), input, input_length); in cc3xx_mac_update()
329 err = cc3xx_lowlevel_hmac_update(&(operation->hmac), input, input_length); in cc3xx_mac_update()
433 const uint8_t *input, size_t input_length, in cc3xx_mac_compute() argument
445 input, input_length, in cc3xx_mac_compute()
[all …]
Dcc3xx_psa_hash.c90 const uint8_t *input, size_t input_length) in cc3xx_hash_update() argument
96 if (input_length == 0) { in cc3xx_hash_update()
108 err = cc3xx_lowlevel_hash_update(input, input_length); in cc3xx_hash_update()
157 size_t input_length, uint8_t *hash, in cc3xx_hash_compute() argument
170 status = cc3xx_hash_update(&operation, input, input_length); in cc3xx_hash_compute()
Dcc3xx_psa_aead.c55 size_t input_length, uint8_t *output, in aead_crypt() argument
73 if (input_length != 0) { in aead_crypt()
84 data_minus_tag = (dir == PSA_CRYPTO_DRIVER_DECRYPT) ? input_length - tag_len : input_length; in aead_crypt()
88 if (output_size < input_length + tag_len) { in aead_crypt()
92 if (output_size < input_length - tag_len) { in aead_crypt()
96 if (input_length < tag_len) { in aead_crypt()
106 memcpy(local_tag, input + (input_length - tag_len), tag_len); in aead_crypt()
237 memcpy(output + input_length, local_tag, tag_len); in aead_crypt()
383 size_t input_length, in cc3xx_aead_update() argument
415 &(operation->stream), input, input_length, in cc3xx_aead_update()
[all …]
Dcc3xx_internal_cipher.c449 const uint8_t *input, size_t input_length, in cc3xx_internal_cipher_stream_pre_update() argument
462 size_to_pre_process = keystream_size < input_length ? in cc3xx_internal_cipher_stream_pre_update()
463 keystream_size : input_length; in cc3xx_internal_cipher_stream_pre_update()
482 const uint8_t *input, size_t input_length, in cc3xx_internal_cipher_stream_post_update() argument
493 if (input_length - processed_length) { in cc3xx_internal_cipher_stream_post_update()
494 uint8_t permutation_buf[input_length - processed_length]; /* This is a VLA */ in cc3xx_internal_cipher_stream_post_update()
507 cc3xx_random_permutation_generate(permutation_buf, input_length - processed_length); in cc3xx_internal_cipher_stream_post_update()
509 for (idx = 0; idx < input_length - processed_length; idx++) { in cc3xx_internal_cipher_stream_post_update()
514 *output_length += (input_length - processed_length); in cc3xx_internal_cipher_stream_post_update()
517 stream->idx = (input_length - processed_length); in cc3xx_internal_cipher_stream_post_update()
Dcc3xx_psa_asymmetric_encryption.c35 size_t input_length, in cc3xx_asymmetric_encrypt() argument
48 size_t input_length, in cc3xx_asymmetric_decrypt() argument
/trusted-firmware-m-latest/secure_fw/partitions/crypto/
Dcrypto_asymmetric.c40 size_t input_length = in_vec[1].len; in tfm_crypto_asymmetric_sign_interface() local
44 status = psa_sign_message(library_key, iov->alg, input, input_length, in tfm_crypto_asymmetric_sign_interface()
54 size_t input_length = in_vec[1].len; in tfm_crypto_asymmetric_sign_interface() local
58 return psa_verify_message(library_key, iov->alg, input, input_length, in tfm_crypto_asymmetric_sign_interface()
118 size_t input_length = in_vec[1].len; in tfm_crypto_asymmetric_encrypt_interface() local
125 input, input_length, in tfm_crypto_asymmetric_encrypt_interface()
137 size_t input_length = in_vec[1].len; in tfm_crypto_asymmetric_encrypt_interface() local
144 input, input_length, in tfm_crypto_asymmetric_encrypt_interface()
Dcrypto_mac.c44 size_t input_length = in_vec[1].len; in tfm_crypto_mac_interface()
48 status = psa_mac_compute(library_key, iov->alg, input, input_length, in tfm_crypto_mac_interface()
62 size_t input_length = in_vec[1].len; in tfm_crypto_mac_interface()
66 return psa_mac_verify(library_key, iov->alg, input, input_length, in tfm_crypto_mac_interface()
137 size_t input_length = in_vec[1].len; in tfm_crypto_mac_interface() local
139 return psa_mac_update(operation, input, input_length); in tfm_crypto_mac_interface()
Dcrypto_hash.c38 size_t input_length = in_vec[1].len; in tfm_crypto_hash_interface()
42 status = psa_hash_compute(iov->alg, input, input_length, in tfm_crypto_hash_interface()
56 size_t input_length = in_vec[1].len; in tfm_crypto_hash_interface()
60 return psa_hash_compare(iov->alg, input, input_length, in tfm_crypto_hash_interface()
122 size_t input_length = in_vec[1].len; in tfm_crypto_hash_interface() local
124 return psa_hash_update(operation, input, input_length); in tfm_crypto_hash_interface()
Dcrypto_cipher.c44 size_t input_length = in_vec[1].len; in tfm_crypto_cipher_interface()
48 status = psa_cipher_encrypt(library_key, iov->alg, input, input_length, in tfm_crypto_cipher_interface()
62 size_t input_length = in_vec[1].len; in tfm_crypto_cipher_interface()
66 status = psa_cipher_decrypt(library_key, iov->alg, input, input_length, in tfm_crypto_cipher_interface()
158 size_t input_length = in_vec[1].len; in tfm_crypto_cipher_interface() local
162 status = psa_cipher_update(operation, input, input_length, in tfm_crypto_cipher_interface()
/trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/codesafe/src/psa_driver_api/include/
Dcc3xx_psa_asymmetric_signature.h44 size_t input_length, uint8_t *signature,
65 size_t input_length, const uint8_t *signature,
86 size_t input_length, uint8_t *signature,
Dcc3xx_psa_cipher.h101 const uint8_t *input, size_t input_length,
155 size_t input_length,
182 size_t input_length,
Dcc3xx_psa_asymmetric_encryption.h48 size_t input_length,
76 size_t input_length,
/trusted-firmware-m-latest/platform/ext/accelerator/cc312/cc312-rom/psa_driver_api/include/
Dcc3xx_psa_asymmetric_signature.h46 size_t input_length, uint8_t *signature,
67 size_t input_length, const uint8_t *signature,
88 size_t input_length, uint8_t *signature,
Dcc3xx_psa_cipher.h101 const uint8_t *input, size_t input_length,
155 size_t input_length,
182 size_t input_length,
/trusted-firmware-m-latest/interface/src/
Dtfm_crypto_api.c315 size_t input_length, in TFM_CRYPTO_API()
328 {.base = input, .len = input_length}, in TFM_CRYPTO_API()
405 size_t input_length) in TFM_CRYPTO_API()
414 {.base = input, .len = input_length}, in TFM_CRYPTO_API()
510 size_t input_length, in TFM_CRYPTO_API()
523 {.base = input, .len = input_length}, in TFM_CRYPTO_API()
539 size_t input_length, in TFM_CRYPTO_API()
550 {.base = input, .len = input_length}, in TFM_CRYPTO_API()
601 size_t input_length) in TFM_CRYPTO_API()
610 {.base = input, .len = input_length}, in TFM_CRYPTO_API()
[all …]

12