| /rk3399_ARM-atf/tools/encrypt_fw/src/ |
| H A D | encrypt.c | 30 unsigned char key[KEY_SIZE], iv[IV_SIZE], tag[TAG_SIZE]; in gcm_encrypt() local 54 if (sscanf(&nonce_string[j], "%02hhx", &iv[i]) != 1) { in gcm_encrypt() 93 ret = EVP_EncryptInit_ex(ctx, NULL, NULL, key, iv); in gcm_encrypt() 129 memcpy(header.iv, iv, IV_SIZE); in gcm_encrypt()
|
| /rk3399_ARM-atf/include/drivers/st/ |
| H A D | stm32_saes.h | 44 uint32_t iv[4]; /* In HW byte order */ member 51 const void *key, size_t key_len, const void *iv, size_t iv_len);
|
| /rk3399_ARM-atf/drivers/auth/ |
| H A D | crypto_mod.c | 201 unsigned int key_flags, const void *iv, in crypto_mod_auth_decrypt() argument 210 assert(iv != NULL); in crypto_mod_auth_decrypt() 216 key_len, key_flags, iv, iv_len, tag, in crypto_mod_auth_decrypt()
|
| /rk3399_ARM-atf/drivers/auth/mbedtls/ |
| H A D | mbedtls_crypto.c | 308 unsigned int key_len, const void *iv, in aes_gcm_decrypt() argument 330 rc = mbedtls_gcm_starts(&ctx, MBEDTLS_GCM_DECRYPT, iv, iv_len, NULL, 0); in aes_gcm_decrypt() 332 rc = mbedtls_gcm_starts(&ctx, MBEDTLS_GCM_DECRYPT, iv, iv_len); in aes_gcm_decrypt() 391 unsigned int key_flags, const void *iv, in auth_decrypt() argument 401 rc = aes_gcm_decrypt(data_ptr, len, key, key_len, iv, iv_len, in auth_decrypt()
|
| H A D | mbedtls_psa_crypto.c | 498 unsigned int key_len, const void *iv, in aes_gcm_decrypt() argument 527 psa_status = psa_aead_set_nonce(&operation, iv, iv_len); in aes_gcm_decrypt() 564 unsigned int key_flags, const void *iv, in auth_decrypt() argument 574 rc = aes_gcm_decrypt(data_ptr, len, key, key_len, iv, iv_len, in auth_decrypt()
|
| /rk3399_ARM-atf/include/drivers/auth/ |
| H A D | crypto_mod.h | 82 unsigned int key_flags, const void *iv, 115 unsigned int key_flags, const void *iv,
|
| /rk3399_ARM-atf/include/tools_share/ |
| H A D | firmware_encrypted.h | 38 uint8_t iv[ENC_MAX_IV_SIZE]; member
|
| /rk3399_ARM-atf/plat/marvell/armada/a3k/common/ |
| H A D | a3700_common.mk | 210 -iv `cat $(IMAGESPATH)/iv.txt` -p 215 -iv `cat $(IMAGESPATH)/iv.txt` -p
|
| /rk3399_ARM-atf/drivers/st/crypto/ |
| H A D | stm32_saes.c | 252 mmio_write_32(ctx->base + _SAES_IVR0 + i * sizeof(uint32_t), ctx->iv[i]); in saes_write_iv() 335 ctx->iv[i] = mmio_read_32(ctx->base + _SAES_IVR0 + i * sizeof(uint32_t)); in save_context() 419 const void *key, size_t key_size, const void *iv, size_t iv_size) in stm32_saes_init() argument 433 assert((uintptr_t)iv % __alignof__(uint32_t) == 0); in stm32_saes_init() 435 iv_u32 = iv; in stm32_saes_init() 544 if ((iv == NULL) || (iv_size != AES_IVSIZE)) { in stm32_saes_init() 549 mmio_write_32((uintptr_t)(ctx->iv + i), htobe32(iv_u32[3 - i])); in stm32_saes_init()
|
| /rk3399_ARM-atf/plat/st/common/ |
| H A D | stm32mp_crypto_lib.c | 575 const void *iv, unsigned int iv_len, in stm32_decrypt_aes_gcm() argument 588 key_len, iv, iv_len); in stm32_decrypt_aes_gcm() 626 const void *iv, unsigned int iv_len, const void *tag, in crypto_auth_decrypt() argument 640 memcpy(real_iv, iv, iv_len); in crypto_auth_decrypt()
|
| /rk3399_ARM-atf/drivers/io/ |
| H A D | io_encrypted.c | 207 key_len, key_flags, header.iv, in enc_file_read()
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | auth-framework.rst | 265 const void *iv, unsigned int iv_len,
|