| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/xtest/ |
| H A D | regression_4000_data.h | 6485 uint32_t keysize; /* key size, in bits */ member 6496 .keysize = 192, 6506 .keysize = 192, 6516 .keysize = 192, 6526 .keysize = 192, 6536 .keysize = 192, 6546 .keysize = 192, 6556 .keysize = 192, 6566 .keysize = 192, 6576 .keysize = 192, [all …]
|
| H A D | aes_perf.c | 187 static void usage(const char *progname, int keysize, int mode, size_t size, in usage() argument 204 fprintf(stderr, " -k SIZE Key size in bits: 128, 192 or 256 [%u]\n", keysize); in usage() 352 static void prepare_key(int decrypt, int keysize, int mode) in prepare_key() argument 362 op.params[0].value.b = keysize; in prepare_key() 426 void aes_perf_run_test(int mode, int keysize, int decrypt, size_t size, size_t unit, in aes_perf_run_test() argument 459 prepare_key(decrypt, keysize, mode); in aes_perf_run_test() 477 mode_str(mode), (decrypt ? "de" : "en"), keysize, size); in aes_perf_run_test() 542 #define USAGE() usage(argv[0], keysize, mode, size, unit, warmup, l, n) 556 int keysize = AES_128; /* AES key size (-k) */ in aes_perf_runner_cmd_parser() local 579 keysize = atoi(argv[i]); in aes_perf_runner_cmd_parser() [all …]
|
| H A D | benchmark_2000.c | 72 int keysize = AES_128; in xtest_tee_benchmark_2011() local 75 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2011() 86 int keysize = AES_256; in xtest_tee_benchmark_2012() local 89 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2012()
|
| H A D | crypto_common.h | 43 void aes_perf_run_test(int mode, int keysize, int decrypt, size_t size,
|
| /OK3568_Linux_fs/kernel/include/crypto/internal/ |
| H A D | chacha.h | 16 unsigned int keysize, int nrounds) in chacha_setkey() argument 21 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey() 32 unsigned int keysize) in chacha20_setkey() argument 34 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey() 38 unsigned int keysize) in chacha12_setkey() argument 40 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/ |
| H A D | test_lpm_map.c | 209 static void test_lpm_map(int keysize) in test_lpm_map() argument 227 data = alloca(keysize); in test_lpm_map() 228 memset(data, 0, keysize); in test_lpm_map() 230 value = alloca(keysize + 1); in test_lpm_map() 231 memset(value, 0, keysize + 1); in test_lpm_map() 233 key = alloca(sizeof(*key) + keysize); in test_lpm_map() 234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map() 237 sizeof(*key) + keysize, in test_lpm_map() 238 keysize + 1, in test_lpm_map() 244 for (j = 0; j < keysize; ++j) in test_lpm_map() [all …]
|
| /OK3568_Linux_fs/buildroot/package/vtun/ |
| H A D | 0003-openssl11.patch | 34 keysize = 32; 45 keysize = 32; 57 keysize = 16; 67 keysize = 16; 79 keysize = 32; 91 keysize = 32; 104 keysize = 16; 116 keysize = 16; 127 if (prep_key(&pkey, keysize, host) != 0) return -1; 192 - EVP_CIPHER_CTX_set_key_length(&ctx_enc, keysize); [all …]
|
| /OK3568_Linux_fs/kernel/fs/crypto/ |
| H A D | keysetup.c | 20 .keysize = 64, 28 .keysize = 32, 35 .keysize = 16, 43 .keysize = 16, 50 .keysize = 32, 111 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher() 137 if (WARN_ON(is_hw_wrapped || raw_key_size != ci->ci_mode->keysize)) in fscrypt_prepare_key() 166 ci->ci_mode->keysize, in fscrypt_set_per_file_enc_key() 232 mode_key, mode->keysize); in setup_per_mode_enc_key() 235 err = fscrypt_prepare_key(prep_key, mode_key, mode->keysize, in setup_per_mode_enc_key() [all …]
|
| H A D | keysetup_v1.c | 204 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key() 236 err = fscrypt_prepare_key(&dk->dk_key, raw_key, ci->ci_mode->keysize, in fscrypt_get_direct_key() 242 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key() 276 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived() 281 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived() 307 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings() 311 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/aes_perf/ |
| H A D | ta_aes_perf.c | 178 uint32_t keysize = 0; in cmd_prepare_key() local 206 keysize = params[0].value.b; in cmd_prepare_key() 207 op_keysize = keysize; in cmd_prepare_key() 240 res = TEE_AllocateTransientObject(TEE_TYPE_AES, keysize, &hkey); in cmd_prepare_key() 245 attr.content.ref.length = keysize / 8; in cmd_prepare_key() 251 res = TEE_AllocateTransientObject(TEE_TYPE_AES, keysize, in cmd_prepare_key()
|
| /OK3568_Linux_fs/kernel/block/ |
| H A D | blk-crypto.c | 23 .keysize = 64, 28 .keysize = 16, 33 .keysize = 32, 71 BUG_ON(blk_crypto_modes[i].keysize > BLK_CRYPTO_MAX_KEY_SIZE); in bio_crypt_ctx_init() 343 if (raw_key_size < mode->keysize || in blk_crypto_init_key() 347 if (raw_key_size != mode->keysize) in blk_crypto_init_key()
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | tcrypt.c | 254 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() argument 348 *keysize * 8, *b_size); in test_mb_aead_speed() 355 if (template[j].klen == *keysize) { in test_mb_aead_speed() 363 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed() 431 keysize++; in test_mb_aead_speed() 432 } while (*keysize); in test_mb_aead_speed() 522 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument 596 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed() 598 *keysize + *b_size, in test_aead_speed() 605 if (template[j].klen == *keysize) { in test_aead_speed() [all …]
|
| H A D | salsa20_generic.c | 112 unsigned int keysize) in salsa20_setkey() argument 119 if (keysize != SALSA20_MIN_KEY_SIZE && in salsa20_setkey() 120 keysize != SALSA20_MAX_KEY_SIZE) in salsa20_setkey() 127 if (keysize == 32) { /* recommended */ in salsa20_setkey()
|
| /OK3568_Linux_fs/kernel/drivers/s390/crypto/ |
| H A D | pkey_api.c | 95 int keysize; in pkey_clr2protkey() local 100 keysize = 16; in pkey_clr2protkey() 104 keysize = 24; in pkey_clr2protkey() 108 keysize = 32; in pkey_clr2protkey() 131 memcpy(paramblock, clrkey->clrkey, keysize); in pkey_clr2protkey() 138 protkey->len = keysize + 32; in pkey_clr2protkey() 139 memcpy(protkey->protkey, paramblock, keysize + 32); in pkey_clr2protkey() 306 int keysize; in pkey_genprotkey() local 311 keysize = 16; in pkey_genprotkey() 314 keysize = 24; in pkey_genprotkey() [all …]
|
| H A D | zcrypt_ccamisc.c | 180 const u8 *token, size_t keysize, in cca_check_sececckeytoken() argument 193 if (t->len > keysize) { in cca_check_sececckeytoken() 196 __func__, (int) t->len, keysize); in cca_check_sececckeytoken() 300 int i, rc, keysize; in cca_genseckey() local 356 keysize = 16; in cca_genseckey() 361 keysize = 24; in cca_genseckey() 366 keysize = 32; in cca_genseckey() 422 prepparm->lv3.keyblock.tok, 8*keysize); in cca_genseckey() 443 int rc, keysize, seckeysize; in cca_clr2seckey() local 497 keysize = 16; in cca_clr2seckey() [all …]
|
| H A D | zcrypt_ep11misc.c | 803 const u8 *key, size_t keysize, in ep11_cryptsingle() argument 838 if (keysize > 0xFFFF || inbufsize > 0xFFFF) in ep11_cryptsingle() 843 + ASN1TAGLEN(keysize) + ASN1TAGLEN(inbufsize); in ep11_cryptsingle() 861 p += asn1tag_write(p, 0x04, key, keysize); in ep11_cryptsingle() 1069 const u8 *key, size_t keysize, in ep11_wrapkey() argument 1112 keysize = kb->head.len < keysize ? kb->head.len : keysize; in ep11_wrapkey() 1117 + ASN1TAGLEN(keysize) + 4; in ep11_wrapkey() 1138 p += asn1tag_write(p, 0x04, key, keysize); in ep11_wrapkey() 1141 kb = (struct ep11keyblob *)(p - keysize); in ep11_wrapkey()
|
| H A D | zcrypt_ccamisc.h | 53 u16 keysize; /* key byte size */ member 156 const u8 *token, size_t keysize,
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-crypto/cryptsetup/ |
| H A D | cryptsetup_2.4.3.bb | 39 luks-adjust-xts-keysize \ 65 PACKAGECONFIG[luks-adjust-xts-keysize] = "--enable-luks-adjust-xts-keysize,--disable-luks-adjust-xt…
|
| /OK3568_Linux_fs/kernel/fs/befs/ |
| H A D | btree.c | 412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument 450 *keysize = 0; in befs_btree_read() 463 *keysize = 0; in befs_btree_read() 505 *keysize = keylen; in befs_btree_read() 521 *keysize = 0; in befs_btree_read()
|
| H A D | btree.h | 12 size_t *keysize, befs_off_t *value);
|
| /OK3568_Linux_fs/kernel/drivers/crypto/ux500/cryp/ |
| H A D | cryp.c | 119 *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); in cryp_set_configuration() 313 switch (config->keysize) { in cryp_save_device_context() 363 switch (config->keysize) { in cryp_restore_device_context()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/ |
| H A D | hifn_795x.c | 617 unsigned int keysize; member 1145 if (ctx->keysize) in hifn_setup_cmd_desc() 1169 if (ctx->keysize != 16) in hifn_setup_cmd_desc() 1175 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1181 if (ctx->keysize != 32) in hifn_setup_cmd_desc() 1187 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1192 if (ctx->keysize != 8) in hifn_setup_cmd_desc() 1201 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc() 1587 ctx->key, ctx->keysize, in hifn_setup_session() 1956 ctx->keysize = len; in hifn_setkey() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rk_public_api/ |
| H A D | rk_crypto_api.c | 2137 uint32_t keysize = 256; in rk_sm2_kep_genkey() local 2147 res = TEE_AllocateOperation(&derive_op, algo, TEE_MODE_DERIVE, keysize * 2); in rk_sm2_kep_genkey() 2154 res = TEE_AllocateTransientObject(TEE_TYPE_SM2_KEP_KEYPAIR, keysize, &keyA); in rk_sm2_kep_genkey() 2184 res = TEE_AllocateTransientObject(TEE_TYPE_SM2_KEP_KEYPAIR, keysize, &eph_keyA); in rk_sm2_kep_genkey() 2621 uint32_t algo, uint32_t curve, uint32_t keysize, uint8_t *out) in rk_ecdh_genkey() argument 2630 uint32_t size_byte = (keysize + 7) / 8; in rk_ecdh_genkey() 2636 if (keysize != 192 && keysize != 224 && keysize != 256 && in rk_ecdh_genkey() 2637 keysize != 384 && keysize != 521) in rk_ecdh_genkey() 2641 IMSG("algo is %d; curve is %d; keysize is %d", algo, curve, keysize); in rk_ecdh_genkey() 2644 res = TEE_AllocateOperation(&derive_op, algo, TEE_MODE_DERIVE, keysize); in rk_ecdh_genkey() [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
| H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 203 key = new unsigned char[keysize]; 204 memcpy(key, _key, keysize); 222 - HMAC_Init(hmacctx, key, keysize, (env_md_st *)digest->getevpmd()); 223 + HMAC_Init(hmacctx, key, keysize, digest->getevpmd()); 531 size_t keysize;
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/ta/rk_public_api/ |
| H A D | rk_crypto_api.c | 2168 uint32_t algo, uint32_t curve, uint32_t keysize, uint8_t *out) in rk_ecdh_genkey() argument 2177 uint32_t size_byte = (keysize + 7) / 8; in rk_ecdh_genkey() 2183 if (keysize != 192 && keysize != 224 && keysize != 256 && in rk_ecdh_genkey() 2184 keysize != 384 && keysize != 521) in rk_ecdh_genkey() 2188 IMSG("algo is %d; curve is %d; keysize is %d", algo, curve, keysize); in rk_ecdh_genkey() 2191 res = TEE_AllocateOperation(&derive_op, algo, TEE_MODE_DERIVE, keysize); in rk_ecdh_genkey() 2197 res = TEE_AllocateTransientObject(TEE_TYPE_ECDH_KEYPAIR, keysize, in rk_ecdh_genkey()
|