| /openbmc/u-boot/board/freescale/common/ |
| H A D | fsl_validate.c | 26 #define CHECK_KEY_LEN(key_len) (((key_len) == 2 * KEY_SIZE_BYTES / 4) || \ argument 27 ((key_len) == 2 * KEY_SIZE_BYTES / 2) || \ 28 ((key_len) == 2 * KEY_SIZE_BYTES)) 245 if (!CHECK_KEY_LEN(img->srk_tbl[i].key_len)) in read_validate_srk_tbl() 249 img->key_len = img->srk_tbl[key_num - 1].key_len; in read_validate_srk_tbl() 252 img->key_len); in read_validate_srk_tbl() 265 if (!CHECK_KEY_LEN(hdr->key_len)) in read_validate_single_key() 268 memcpy(&img->img_key, esbc + hdr->pkey, hdr->key_len); in read_validate_single_key() 270 img->key_len = hdr->key_len; in read_validate_single_key() 312 ie_key_len = ie_info->ie_key_tbl[ie_num - 1].key_len; in read_validate_ie_tbl() [all …]
|
| /openbmc/qemu/hw/vmapple/ |
| H A D | aes.c | 93 uint32_t key_len; member 103 .key_len = 32, 107 .key_len = 32, 111 .key_len = 32, 199 uint32_t key_len; in cmd_key() local 213 key_len = key_lens[(cmd & CMD_KEY_KEY_LEN_MASK) >> CMD_KEY_KEY_LEN_SHIFT]; in cmd_key() 221 trace_aes_cmd_key_select_new(ctxt, key_len, in cmd_key() 224 if (key_len > sizeof(s->key[ctxt].key)) { in cmd_key() 227 if (!has_payload(s, key_len / sizeof(uint32_t))) { in cmd_key() 232 memcpy(&s->key[ctxt].key, &s->fifo[1], key_len); in cmd_key() [all …]
|
| H A D | trace-events | 7 aes_cmd_key_select_new(uint32_t ctx, uint32_t key_len, const char *direction, const char *cipher) "…
|
| /openbmc/qemu/backends/ |
| H A D | cryptodev-builtin.c | 136 cryptodev_builtin_get_aes_algo(uint32_t key_len, int mode, Error **errp) in cryptodev_builtin_get_aes_algo() argument 140 if (key_len == AES_KEYSIZE_128) { in cryptodev_builtin_get_aes_algo() 142 } else if (key_len == AES_KEYSIZE_192) { in cryptodev_builtin_get_aes_algo() 144 } else if (key_len == AES_KEYSIZE_256) { /* equals AES_KEYSIZE_128_XTS */ in cryptodev_builtin_get_aes_algo() 150 } else if (key_len == AES_KEYSIZE_256_XTS) { in cryptodev_builtin_get_aes_algo() 163 error_setg(errp, "Unsupported key length :%u", key_len); in cryptodev_builtin_get_aes_algo() 242 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len, in cryptodev_builtin_create_cipher_session() 250 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len, in cryptodev_builtin_create_cipher_session() 258 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len, in cryptodev_builtin_create_cipher_session() 266 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len, in cryptodev_builtin_create_cipher_session() [all …]
|
| /openbmc/u-boot/include/ |
| H A D | fsl_validate.h | 109 u32 key_len; /* pub key length in bytes */ member 166 u32 key_len; member 179 u32 key_len; member 236 u32 key_len; member
|
| H A D | image.h | 1170 const int key_len; member
|
| /openbmc/u-boot/lib/libavb/ |
| H A D | avb_cmdline.c | 101 size_t offset, key_len, value_len; in cmdline_append_option() local 104 key_len = avb_strlen(key); in cmdline_append_option() 115 new_cmdline = avb_calloc(offset + key_len + value_len + 2); in cmdline_append_option() 123 avb_memcpy(new_cmdline + offset, key, key_len); in cmdline_append_option() 124 new_cmdline[offset + key_len] = '='; in cmdline_append_option() 125 avb_memcpy(new_cmdline + offset + key_len + 1, value, value_len); in cmdline_append_option()
|
| /openbmc/u-boot/lib/rsa/ |
| H A D | rsa-verify.c | 290 const uint32_t key_len) in rsa_verify_key() argument 336 ret = padding->verify(info, buf, key_len, hash, hash_len); in rsa_verify_key() 394 info->crypto->key_len); in rsa_verify_with_keynode() 405 uint8_t hash[info->crypto->key_len]; in rsa_verify() 416 info->crypto->key_len) { in rsa_verify()
|
| /openbmc/ipmitool/src/plugins/lanplus/ |
| H A D | lanplus_crypt_impl.c | 115 int key_len, in lanplus_HMAC() argument 132 return HMAC(evp_md, key, key_len, d, n, md, (unsigned int *)md_len); in lanplus_HMAC()
|
| H A D | lanplus_crypt_impl.h | 44 lanplus_HMAC(uint8_t mac, const void *key, int key_len,
|
| /openbmc/u-boot/fs/ubifs/ |
| H A D | misc.h | 193 return UBIFS_IDX_NODE_SZ + (UBIFS_BRANCH_SZ + c->key_len) * child_cnt; in ubifs_idx_node_sz() 208 (UBIFS_BRANCH_SZ + c->key_len) * bnum); in ubifs_idx_branch()
|
| H A D | sb.c | 86 c->key_len = UBIFS_SK_LEN; in create_default_filesystem() 598 c->key_len = UBIFS_SK_LEN; in ubifs_read_superblock()
|
| H A D | ubifs.h | 1919 int key_len; member
|
| /openbmc/u-boot/cmd/ |
| H A D | tpm-v1.c | 404 u32 key_len, key_handle, err; in do_tpm_load_key_by_sha1() local 419 key_len = simple_strtoul(argv[3], NULL, 0); in do_tpm_load_key_by_sha1() 432 err = tpm1_load_key2_oiap(dev, parent_handle, key, key_len, usage_auth, in do_tpm_load_key_by_sha1() 446 u32 parent_handle, key_len, key_handle, err; in do_tpm_load_key2_oiap() local 461 key_len = simple_strtoul(argv[3], NULL, 0); in do_tpm_load_key2_oiap() 466 err = tpm1_load_key2_oiap(dev, parent_handle, key, key_len, usage_auth, in do_tpm_load_key2_oiap()
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl/ |
| H A D | 0002-Fix-incompatible-pointer-types-error-with-gcc-15.patch | 67 455 | void _saslauthd_hmac_md5(text, text_len, key, key_len, digest) 70 499 | MD5_memcpy( k_ipad, key, key_len); 76 500 | MD5_memcpy( k_opad, key, key_len);
|
| /openbmc/qemu/include/crypto/ |
| H A D | akcipher.h | 56 const uint8_t *key, size_t key_len,
|
| /openbmc/u-boot/common/ |
| H A D | image-sig.c | 83 .key_len = RSA2048_BYTES, 90 .key_len = RSA3072_BYTES, 97 .key_len = RSA4096_BYTES,
|
| /openbmc/qemu/hw/virtio/ |
| H A D | virtio-crypto.c | 82 info->key_len = ldl_le_p(&cipher_para->keylen); in virtio_crypto_cipher_session_helper() 87 if (info->key_len > vcrypto->conf.max_cipher_key_len) { in virtio_crypto_cipher_session_helper() 89 info->key_len); in virtio_crypto_cipher_session_helper() 93 if (info->key_len > 0) { in virtio_crypto_cipher_session_helper() 95 DPRINTF("keylen=%" PRIu32 "\n", info->key_len); in virtio_crypto_cipher_session_helper() 97 info->cipher_key = g_malloc(info->key_len); in virtio_crypto_cipher_session_helper() 98 s = iov_to_buf(*iov, num, 0, info->cipher_key, info->key_len); in virtio_crypto_cipher_session_helper() 99 if (unlikely(s != info->key_len)) { in virtio_crypto_cipher_session_helper() 103 iov_discard_front(iov, &num, info->key_len); in virtio_crypto_cipher_session_helper()
|
| H A D | vhost-user.c | 2555 if (sess->key_len) { in vhost_user_crypto_create_session() 2557 if (sess->key_len > keylen) { in vhost_user_crypto_create_session() 2563 sess->key_len); in vhost_user_crypto_create_session()
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
| H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 130 - int key_len = BN_num_bytes(info->pub_key); 134 + int key_len = BN_num_bytes(pub_key); 135 if (key_len < len) 136 len = key_len; 139 unsigned char *foo = (unsigned char*)alloca(key_len);
|
| /openbmc/qemu/hw/i386/kvm/ |
| H A D | xenstore_impl.c | 373 int key_len = strlen(key); in node_rm_recurse() local 381 assert(key_len + path_len + 2 <= sizeof(op->path)); in node_rm_recurse() 383 memcpy(op->path + path_len + 1, key, key_len + 1); in node_rm_recurse() 968 int key_len = strlen(key); in tx_commit_walk() local 989 assert(key_len + path_len + 2 <= sizeof(op->path)); in tx_commit_walk() 991 memcpy(op->path + path_len + 1, key, key_len + 1); in tx_commit_walk()
|
| /openbmc/qemu/include/system/ |
| H A D | cryptodev.h | 74 uint32_t key_len; member
|
| /openbmc/qemu/include/standard-headers/linux/ |
| H A D | virtio_crypto.h | 173 uint32_t key_len; member
|
| /openbmc/u-boot/lib/ |
| H A D | hashtable.c | 207 size_t key_len = strlen(match); in hmatch_r() local 212 if (!strncmp(match, htab->table[idx].entry.key, key_len)) { in hmatch_r()
|