Home
last modified time | relevance | path

Searched refs:key2 (Results 1 – 25 of 49) sorted by relevance

12

/optee_os/core/lib/libtomcrypt/src/modes/xts/
H A Dxts_init.c20 int xts_start(int cipher, const unsigned char *key1, const unsigned char *key2, unsigned long keyle… in xts_start() argument
27 LTC_ARGCHK(key2 != NULL); in xts_start()
43 if ((err = cipher_descriptor[cipher]->setup(key2, keylen, num_rounds, &xts->key2)) != CRYPT_OK) { in xts_start()
H A Dxts_decrypt.c89 …= cipher_descriptor[xts->cipher]->accel_xts_decrypt(ct, pt, lim, tweak, &xts->key1, &xts->key2)) != in xts_decrypt()
100 if ((err = cipher_descriptor[xts->cipher]->ecb_encrypt(tweak, T, &xts->key2)) != CRYPT_OK) { in xts_decrypt()
139 if ((err = cipher_descriptor[xts->cipher]->ecb_decrypt(T, tweak, &xts->key2)) != CRYPT_OK) { in xts_decrypt()
H A Dxts_encrypt.c91 …= cipher_descriptor[xts->cipher]->accel_xts_encrypt(pt, ct, lim, tweak, &xts->key1, &xts->key2)) != in xts_encrypt()
103 if ((err = cipher_descriptor[xts->cipher]->ecb_encrypt(tweak, T, &xts->key2)) != CRYPT_OK) { in xts_encrypt()
140 if ((err = cipher_descriptor[xts->cipher]->ecb_decrypt(T, tweak, &xts->key2)) != CRYPT_OK) { in xts_encrypt()
H A Dxts_test.c27 XMEMCPY(&xts.key2, skey2, sizeof(symmetric_key)); in s_xts_test_accel_xts_encrypt()
54 XMEMCPY(&xts.key2, skey2, sizeof(symmetric_key)); in s_xts_test_accel_xts_decrypt()
77 unsigned char key2[32]; in xts_test()
230 err = xts_start(idx, tests[i].key1, tests[i].key2, tests[i].keylen / 2, 0, &xts); in xts_test()
H A Dxts_done.c18 cipher_descriptor[xts->cipher]->done(&xts->key2); in xts_done()
/optee_os/core/arch/arm/crypto/
H A Dsm4_armv8a_neon.c84 const void *key2, unsigned int len, void *iv) in crypto_accel_sm4_xts_enc() argument
88 assert(out && in && key1 && key2 && (len >= 16)); in crypto_accel_sm4_xts_enc()
91 neon_sm4_xts_encrypt(out, in, key1, key2, len, iv); in crypto_accel_sm4_xts_enc()
96 const void *key2, unsigned int len, void *iv) in crypto_accel_sm4_xts_dec() argument
100 assert(out && in && key1 && key2 && (len >= 16)); in crypto_accel_sm4_xts_dec()
103 neon_sm4_xts_decrypt(out, in, key1, key2, len, iv); in crypto_accel_sm4_xts_dec()
H A Dsm4_armv8a_ce.c84 const void *key2, unsigned int len, void *iv) in crypto_accel_sm4_xts_enc() argument
88 assert(out && in && key1 && key2 && (len >= 16)); in crypto_accel_sm4_xts_enc()
91 ce_sm4_xts_encrypt(out, in, key1, key2, len, iv); in crypto_accel_sm4_xts_enc()
96 const void *key2, unsigned int len, void *iv) in crypto_accel_sm4_xts_dec() argument
100 assert(out && in && key1 && key2 && (len >= 16)); in crypto_accel_sm4_xts_dec()
103 ce_sm4_xts_decrypt(out, in, key1, key2, len, iv); in crypto_accel_sm4_xts_dec()
H A Daes_modes_armv8a_ce_a32.S23 .macro enc_dround, key1, key2 argument
25 enc_round q0, \key2
28 .macro dec_dround, key1, key2 argument
30 dec_round q0, \key2
33 .macro enc_fround, key1, key2, key3
35 aese.8 q0, \key2
39 .macro dec_fround, key1, key2, key3
41 aesd.8 q0, \key2
45 .macro enc_dround_3x, key1, key2 argument
49 enc_round q0, \key2
[all …]
H A Daes_armv8a_ce.c223 unsigned int block_count, const void *key2, in crypto_accel_aes_xts_enc() argument
228 assert(out && in && key1 && key2 && tweak); in crypto_accel_aes_xts_enc()
231 ce_aes_xts_encrypt(out, in, key1, round_count, block_count, key2, in crypto_accel_aes_xts_enc()
238 unsigned int block_count, const void *key2, in crypto_accel_aes_xts_dec() argument
243 assert(out && in && key1 && key2 && tweak); in crypto_accel_aes_xts_dec()
246 ce_aes_xts_decrypt(out, in, key1, round_count, block_count, key2, in crypto_accel_aes_xts_dec()
/optee_os/core/include/crypto/
H A Dcrypto_accel.h36 unsigned int block_count, const void *key2,
40 unsigned int block_count, const void *key2,
66 const void *key2, unsigned int len, void *iv);
68 const void *key2, unsigned int len, void *iv);
/optee_os/core/drivers/crypto/crypto_api/cipher/
H A Dcipher.c74 size_t key1_len, const uint8_t *key2, in cipher_init() argument
80 if ((!key1 && key1_len) || (!key2 && key2_len) || (!iv && iv_len)) { in cipher_init()
94 .key2.data = (uint8_t *)key2, in cipher_init()
95 .key2.length = key2_len, in cipher_init()
/optee_os/core/crypto/
H A Dsm4-xts.c35 size_t key1_len, const uint8_t *key2, in sm4_xts_init() argument
52 sm4_setkey_enc(&c->state_ek, key2); in sm4_xts_init()
53 sm4_setkey_dec(&c->state_dk, key2); in sm4_xts_init()
H A Daes-cts.c51 size_t key1_len, const uint8_t *key2, in cts_init() argument
59 res = crypto_cipher_init(c->ecb, mode, key1, key1_len, key2, key2_len, in cts_init()
64 return crypto_cipher_init(c->cbc, mode, key1, key1_len, key2, key2_len, in cts_init()
H A Dsm4-ecb.c32 size_t key1_len, const uint8_t *key2 __unused, in sm4_ecb_init()
H A Dsm4-ctr.c35 const uint8_t *key2 __unused, in sm4_ctr_init()
H A Dsm4-cbc.c34 size_t key1_len, const uint8_t *key2 __unused, in sm4_cbc_init()
/optee_os/core/drivers/crypto/caam/cipher/
H A Dcaam_cipher.c154 ctx->key2.length)); in caam_cipher_block()
155 caam_desc_add_ptr(desc, ctx->key2.paddr); in caam_cipher_block()
319 caam_free_buf(&ctx->key2); in do_free_intern()
363 if (src->key2.length) in caam_cipher_copy_state()
364 caam_cpy_buf(&dst->key2, src->key2.data, src->key2.length); in caam_cipher_copy_state()
413 if (!dinit->key2.data || !dinit->key2.length) in caam_cipher_initialize()
416 retstatus = do_check_keysize(&alg->def_key, dinit->key2.length); in caam_cipher_initialize()
423 retstatus = caam_cpy_buf(&cipherdata->key2, dinit->key2.data, in caam_cipher_initialize()
424 dinit->key2.length); in caam_cipher_initialize()
H A Dlocal.h52 struct caambuf key2; /* Second Key */ member
/optee_os/core/drivers/crypto/se050/core/
H A Dcipher.c26 dinit->key2.data, dinit->key2.length, in do_init()
/optee_os/core/pta/tests/
H A Daes_perf.c56 const uint8_t *key2 = NULL; in init_ctx() local
72 key2 = aes_key2; in init_ctx()
97 res = crypto_cipher_init(*ctx, mode, aes_key, key_len, key2, in init_ctx()
/optee_os/core/lib/libtomcrypt/
H A Dxts.c37 size_t key1_len, const uint8_t *key2 __unused, in ltc_xts_init()
63 if (xts_start(c->cipher_idx, key1, key2, key1_len, 0, in ltc_xts_init()
/optee_os/core/drivers/crypto/crypto_api/include/
H A Ddrvcrypt_cipher.h29 struct drvcrypt_buf key2; /* Second key */ member
/optee_os/lib/libutee/
H A Dtee_api_operations.c22 TEE_ObjectHandle key2; member
370 &op->key2); in TEE_AllocateOperation()
377 (unsigned long)op->key2, &op->state); in TEE_AllocateOperation()
409 TEE_FreeTransientObject(op->key2); in TEE_AllocateOperation()
520 res = TEE_GetObjectInfo1(op->key2, &kinfo); in TEE_GetOperationInfoMultiple()
684 TEE_ObjectHandle key2) in set_operation_key2()
697 if (!key1 && !key2) { in set_operation_key2()
700 TEE_ResetTransientObject(operation->key2); in set_operation_key2()
705 } else if (!key1 || !key2) { in set_operation_key2()
736 res = TEE_GetObjectInfo1(key2, in set_operation_key2()
677 set_operation_key2(TEE_OperationHandle operation,TEE_ObjectHandle key1,TEE_ObjectHandle key2) set_operation_key2() argument
800 TEE_SetOperationKey2(TEE_OperationHandle operation,TEE_ObjectHandle key1,TEE_ObjectHandle key2) TEE_SetOperationKey2() argument
810 __GP11_TEE_SetOperationKey2(TEE_OperationHandle operation,TEE_ObjectHandle key1,TEE_ObjectHandle key2) __GP11_TEE_SetOperationKey2() argument
831 TEE_ObjectHandle key2 = TEE_HANDLE_NULL; TEE_CopyOperation() local
[all...]
/optee_os/ta/pkcs11/src/
H A Dpkcs11_attributes.h145 struct obj_attrs *key2);
/optee_os/lib/libmbedtls/core/
H A Ddes_ecb.c34 const uint8_t *key2 __unused, in mbed_des_ecb_init()

12