| /optee_os/core/lib/libtomcrypt/src/modes/xts/ |
| H A D | xts_init.c | 20 int xts_start(int cipher, const unsigned char *key1, const unsigned char *key2, unsigned long keyle… in xts_start() argument 27 LTC_ARGCHK(key2 != NULL); in xts_start() 43 if ((err = cipher_descriptor[cipher]->setup(key2, keylen, num_rounds, &xts->key2)) != CRYPT_OK) { in xts_start()
|
| H A D | xts_decrypt.c | 89 …= cipher_descriptor[xts->cipher]->accel_xts_decrypt(ct, pt, lim, tweak, &xts->key1, &xts->key2)) != in xts_decrypt() 100 if ((err = cipher_descriptor[xts->cipher]->ecb_encrypt(tweak, T, &xts->key2)) != CRYPT_OK) { in xts_decrypt() 139 if ((err = cipher_descriptor[xts->cipher]->ecb_decrypt(T, tweak, &xts->key2)) != CRYPT_OK) { in xts_decrypt()
|
| H A D | xts_encrypt.c | 91 …= cipher_descriptor[xts->cipher]->accel_xts_encrypt(pt, ct, lim, tweak, &xts->key1, &xts->key2)) != in xts_encrypt() 103 if ((err = cipher_descriptor[xts->cipher]->ecb_encrypt(tweak, T, &xts->key2)) != CRYPT_OK) { in xts_encrypt() 140 if ((err = cipher_descriptor[xts->cipher]->ecb_decrypt(T, tweak, &xts->key2)) != CRYPT_OK) { in xts_encrypt()
|
| H A D | xts_test.c | 27 XMEMCPY(&xts.key2, skey2, sizeof(symmetric_key)); in s_xts_test_accel_xts_encrypt() 54 XMEMCPY(&xts.key2, skey2, sizeof(symmetric_key)); in s_xts_test_accel_xts_decrypt() 77 unsigned char key2[32]; in xts_test() 230 err = xts_start(idx, tests[i].key1, tests[i].key2, tests[i].keylen / 2, 0, &xts); in xts_test()
|
| H A D | xts_done.c | 18 cipher_descriptor[xts->cipher]->done(&xts->key2); in xts_done()
|
| /optee_os/core/arch/arm/crypto/ |
| H A D | sm4_armv8a_neon.c | 84 const void *key2, unsigned int len, void *iv) in crypto_accel_sm4_xts_enc() argument 88 assert(out && in && key1 && key2 && (len >= 16)); in crypto_accel_sm4_xts_enc() 91 neon_sm4_xts_encrypt(out, in, key1, key2, len, iv); in crypto_accel_sm4_xts_enc() 96 const void *key2, unsigned int len, void *iv) in crypto_accel_sm4_xts_dec() argument 100 assert(out && in && key1 && key2 && (len >= 16)); in crypto_accel_sm4_xts_dec() 103 neon_sm4_xts_decrypt(out, in, key1, key2, len, iv); in crypto_accel_sm4_xts_dec()
|
| H A D | sm4_armv8a_ce.c | 84 const void *key2, unsigned int len, void *iv) in crypto_accel_sm4_xts_enc() argument 88 assert(out && in && key1 && key2 && (len >= 16)); in crypto_accel_sm4_xts_enc() 91 ce_sm4_xts_encrypt(out, in, key1, key2, len, iv); in crypto_accel_sm4_xts_enc() 96 const void *key2, unsigned int len, void *iv) in crypto_accel_sm4_xts_dec() argument 100 assert(out && in && key1 && key2 && (len >= 16)); in crypto_accel_sm4_xts_dec() 103 ce_sm4_xts_decrypt(out, in, key1, key2, len, iv); in crypto_accel_sm4_xts_dec()
|
| H A D | aes_modes_armv8a_ce_a32.S | 23 .macro enc_dround, key1, key2 argument 25 enc_round q0, \key2 28 .macro dec_dround, key1, key2 argument 30 dec_round q0, \key2 33 .macro enc_fround, key1, key2, key3 35 aese.8 q0, \key2 39 .macro dec_fround, key1, key2, key3 41 aesd.8 q0, \key2 45 .macro enc_dround_3x, key1, key2 argument 49 enc_round q0, \key2 [all …]
|
| H A D | aes_armv8a_ce.c | 223 unsigned int block_count, const void *key2, in crypto_accel_aes_xts_enc() argument 228 assert(out && in && key1 && key2 && tweak); in crypto_accel_aes_xts_enc() 231 ce_aes_xts_encrypt(out, in, key1, round_count, block_count, key2, in crypto_accel_aes_xts_enc() 238 unsigned int block_count, const void *key2, in crypto_accel_aes_xts_dec() argument 243 assert(out && in && key1 && key2 && tweak); in crypto_accel_aes_xts_dec() 246 ce_aes_xts_decrypt(out, in, key1, round_count, block_count, key2, in crypto_accel_aes_xts_dec()
|
| /optee_os/core/include/crypto/ |
| H A D | crypto_accel.h | 36 unsigned int block_count, const void *key2, 40 unsigned int block_count, const void *key2, 66 const void *key2, unsigned int len, void *iv); 68 const void *key2, unsigned int len, void *iv);
|
| /optee_os/core/drivers/crypto/crypto_api/cipher/ |
| H A D | cipher.c | 74 size_t key1_len, const uint8_t *key2, in cipher_init() argument 80 if ((!key1 && key1_len) || (!key2 && key2_len) || (!iv && iv_len)) { in cipher_init() 94 .key2.data = (uint8_t *)key2, in cipher_init() 95 .key2.length = key2_len, in cipher_init()
|
| /optee_os/core/crypto/ |
| H A D | sm4-xts.c | 35 size_t key1_len, const uint8_t *key2, in sm4_xts_init() argument 52 sm4_setkey_enc(&c->state_ek, key2); in sm4_xts_init() 53 sm4_setkey_dec(&c->state_dk, key2); in sm4_xts_init()
|
| H A D | aes-cts.c | 51 size_t key1_len, const uint8_t *key2, in cts_init() argument 59 res = crypto_cipher_init(c->ecb, mode, key1, key1_len, key2, key2_len, in cts_init() 64 return crypto_cipher_init(c->cbc, mode, key1, key1_len, key2, key2_len, in cts_init()
|
| H A D | sm4-ecb.c | 32 size_t key1_len, const uint8_t *key2 __unused, in sm4_ecb_init()
|
| H A D | sm4-ctr.c | 35 const uint8_t *key2 __unused, in sm4_ctr_init()
|
| H A D | sm4-cbc.c | 34 size_t key1_len, const uint8_t *key2 __unused, in sm4_cbc_init()
|
| /optee_os/core/drivers/crypto/caam/cipher/ |
| H A D | caam_cipher.c | 154 ctx->key2.length)); in caam_cipher_block() 155 caam_desc_add_ptr(desc, ctx->key2.paddr); in caam_cipher_block() 319 caam_free_buf(&ctx->key2); in do_free_intern() 363 if (src->key2.length) in caam_cipher_copy_state() 364 caam_cpy_buf(&dst->key2, src->key2.data, src->key2.length); in caam_cipher_copy_state() 413 if (!dinit->key2.data || !dinit->key2.length) in caam_cipher_initialize() 416 retstatus = do_check_keysize(&alg->def_key, dinit->key2.length); in caam_cipher_initialize() 423 retstatus = caam_cpy_buf(&cipherdata->key2, dinit->key2.data, in caam_cipher_initialize() 424 dinit->key2.length); in caam_cipher_initialize()
|
| H A D | local.h | 52 struct caambuf key2; /* Second Key */ member
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | cipher.c | 26 dinit->key2.data, dinit->key2.length, in do_init()
|
| /optee_os/core/pta/tests/ |
| H A D | aes_perf.c | 56 const uint8_t *key2 = NULL; in init_ctx() local 72 key2 = aes_key2; in init_ctx() 97 res = crypto_cipher_init(*ctx, mode, aes_key, key_len, key2, in init_ctx()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | xts.c | 37 size_t key1_len, const uint8_t *key2 __unused, in ltc_xts_init() 63 if (xts_start(c->cipher_idx, key1, key2, key1_len, 0, in ltc_xts_init()
|
| /optee_os/core/drivers/crypto/crypto_api/include/ |
| H A D | drvcrypt_cipher.h | 29 struct drvcrypt_buf key2; /* Second key */ member
|
| /optee_os/lib/libutee/ |
| H A D | tee_api_operations.c | 22 TEE_ObjectHandle key2; member 370 &op->key2); in TEE_AllocateOperation() 377 (unsigned long)op->key2, &op->state); in TEE_AllocateOperation() 409 TEE_FreeTransientObject(op->key2); in TEE_AllocateOperation() 520 res = TEE_GetObjectInfo1(op->key2, &kinfo); in TEE_GetOperationInfoMultiple() 684 TEE_ObjectHandle key2) in set_operation_key2() 697 if (!key1 && !key2) { in set_operation_key2() 700 TEE_ResetTransientObject(operation->key2); in set_operation_key2() 705 } else if (!key1 || !key2) { in set_operation_key2() 736 res = TEE_GetObjectInfo1(key2, in set_operation_key2() 677 set_operation_key2(TEE_OperationHandle operation,TEE_ObjectHandle key1,TEE_ObjectHandle key2) set_operation_key2() argument 800 TEE_SetOperationKey2(TEE_OperationHandle operation,TEE_ObjectHandle key1,TEE_ObjectHandle key2) TEE_SetOperationKey2() argument 810 __GP11_TEE_SetOperationKey2(TEE_OperationHandle operation,TEE_ObjectHandle key1,TEE_ObjectHandle key2) __GP11_TEE_SetOperationKey2() argument 831 TEE_ObjectHandle key2 = TEE_HANDLE_NULL; TEE_CopyOperation() local [all...] |
| /optee_os/ta/pkcs11/src/ |
| H A D | pkcs11_attributes.h | 145 struct obj_attrs *key2);
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | des_ecb.c | 34 const uint8_t *key2 __unused, in mbed_des_ecb_init()
|