Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 24 of 24) sorted by relevance

/openbmc/u-boot/board/freescale/common/
H A Dfsl_validate.c26 #define CHECK_KEY_LEN(key_len) (((key_len) == 2 * KEY_SIZE_BYTES / 4) || \ argument
27 ((key_len) == 2 * KEY_SIZE_BYTES / 2) || \
28 ((key_len) == 2 * KEY_SIZE_BYTES))
245 if (!CHECK_KEY_LEN(img->srk_tbl[i].key_len)) in read_validate_srk_tbl()
249 img->key_len = img->srk_tbl[key_num - 1].key_len; in read_validate_srk_tbl()
252 img->key_len); in read_validate_srk_tbl()
265 if (!CHECK_KEY_LEN(hdr->key_len)) in read_validate_single_key()
268 memcpy(&img->img_key, esbc + hdr->pkey, hdr->key_len); in read_validate_single_key()
270 img->key_len = hdr->key_len; in read_validate_single_key()
312 ie_key_len = ie_info->ie_key_tbl[ie_num - 1].key_len; in read_validate_ie_tbl()
[all …]
/openbmc/qemu/hw/vmapple/
H A Daes.c93 uint32_t key_len; member
103 .key_len = 32,
107 .key_len = 32,
111 .key_len = 32,
199 uint32_t key_len; in cmd_key() local
213 key_len = key_lens[(cmd & CMD_KEY_KEY_LEN_MASK) >> CMD_KEY_KEY_LEN_SHIFT]; in cmd_key()
221 trace_aes_cmd_key_select_new(ctxt, key_len, in cmd_key()
224 if (key_len > sizeof(s->key[ctxt].key)) { in cmd_key()
227 if (!has_payload(s, key_len / sizeof(uint32_t))) { in cmd_key()
232 memcpy(&s->key[ctxt].key, &s->fifo[1], key_len); in cmd_key()
[all …]
H A Dtrace-events7 aes_cmd_key_select_new(uint32_t ctx, uint32_t key_len, const char *direction, const char *cipher) "…
/openbmc/qemu/backends/
H A Dcryptodev-builtin.c136 cryptodev_builtin_get_aes_algo(uint32_t key_len, int mode, Error **errp) in cryptodev_builtin_get_aes_algo() argument
140 if (key_len == AES_KEYSIZE_128) { in cryptodev_builtin_get_aes_algo()
142 } else if (key_len == AES_KEYSIZE_192) { in cryptodev_builtin_get_aes_algo()
144 } else if (key_len == AES_KEYSIZE_256) { /* equals AES_KEYSIZE_128_XTS */ in cryptodev_builtin_get_aes_algo()
150 } else if (key_len == AES_KEYSIZE_256_XTS) { in cryptodev_builtin_get_aes_algo()
163 error_setg(errp, "Unsupported key length :%u", key_len); in cryptodev_builtin_get_aes_algo()
242 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len, in cryptodev_builtin_create_cipher_session()
250 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len, in cryptodev_builtin_create_cipher_session()
258 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len, in cryptodev_builtin_create_cipher_session()
266 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len, in cryptodev_builtin_create_cipher_session()
[all …]
/openbmc/u-boot/include/
H A Dfsl_validate.h109 u32 key_len; /* pub key length in bytes */ member
166 u32 key_len; member
179 u32 key_len; member
236 u32 key_len; member
H A Dimage.h1170 const int key_len; member
/openbmc/u-boot/lib/libavb/
H A Davb_cmdline.c101 size_t offset, key_len, value_len; in cmdline_append_option() local
104 key_len = avb_strlen(key); in cmdline_append_option()
115 new_cmdline = avb_calloc(offset + key_len + value_len + 2); in cmdline_append_option()
123 avb_memcpy(new_cmdline + offset, key, key_len); in cmdline_append_option()
124 new_cmdline[offset + key_len] = '='; in cmdline_append_option()
125 avb_memcpy(new_cmdline + offset + key_len + 1, value, value_len); in cmdline_append_option()
/openbmc/u-boot/lib/rsa/
H A Drsa-verify.c290 const uint32_t key_len) in rsa_verify_key() argument
336 ret = padding->verify(info, buf, key_len, hash, hash_len); in rsa_verify_key()
394 info->crypto->key_len); in rsa_verify_with_keynode()
405 uint8_t hash[info->crypto->key_len]; in rsa_verify()
416 info->crypto->key_len) { in rsa_verify()
/openbmc/ipmitool/src/plugins/lanplus/
H A Dlanplus_crypt_impl.c115 int key_len, in lanplus_HMAC() argument
132 return HMAC(evp_md, key, key_len, d, n, md, (unsigned int *)md_len); in lanplus_HMAC()
H A Dlanplus_crypt_impl.h44 lanplus_HMAC(uint8_t mac, const void *key, int key_len,
/openbmc/u-boot/fs/ubifs/
H A Dmisc.h193 return UBIFS_IDX_NODE_SZ + (UBIFS_BRANCH_SZ + c->key_len) * child_cnt; in ubifs_idx_node_sz()
208 (UBIFS_BRANCH_SZ + c->key_len) * bnum); in ubifs_idx_branch()
H A Dsb.c86 c->key_len = UBIFS_SK_LEN; in create_default_filesystem()
598 c->key_len = UBIFS_SK_LEN; in ubifs_read_superblock()
H A Dubifs.h1919 int key_len; member
/openbmc/u-boot/cmd/
H A Dtpm-v1.c404 u32 key_len, key_handle, err; in do_tpm_load_key_by_sha1() local
419 key_len = simple_strtoul(argv[3], NULL, 0); in do_tpm_load_key_by_sha1()
432 err = tpm1_load_key2_oiap(dev, parent_handle, key, key_len, usage_auth, in do_tpm_load_key_by_sha1()
446 u32 parent_handle, key_len, key_handle, err; in do_tpm_load_key2_oiap() local
461 key_len = simple_strtoul(argv[3], NULL, 0); in do_tpm_load_key2_oiap()
466 err = tpm1_load_key2_oiap(dev, parent_handle, key, key_len, usage_auth, in do_tpm_load_key2_oiap()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl/
H A D0002-Fix-incompatible-pointer-types-error-with-gcc-15.patch67 455 | void _saslauthd_hmac_md5(text, text_len, key, key_len, digest)
70 499 | MD5_memcpy( k_ipad, key, key_len);
76 500 | MD5_memcpy( k_opad, key, key_len);
/openbmc/qemu/include/crypto/
H A Dakcipher.h56 const uint8_t *key, size_t key_len,
/openbmc/u-boot/common/
H A Dimage-sig.c83 .key_len = RSA2048_BYTES,
90 .key_len = RSA3072_BYTES,
97 .key_len = RSA4096_BYTES,
/openbmc/qemu/hw/virtio/
H A Dvirtio-crypto.c82 info->key_len = ldl_le_p(&cipher_para->keylen); in virtio_crypto_cipher_session_helper()
87 if (info->key_len > vcrypto->conf.max_cipher_key_len) { in virtio_crypto_cipher_session_helper()
89 info->key_len); in virtio_crypto_cipher_session_helper()
93 if (info->key_len > 0) { in virtio_crypto_cipher_session_helper()
95 DPRINTF("keylen=%" PRIu32 "\n", info->key_len); in virtio_crypto_cipher_session_helper()
97 info->cipher_key = g_malloc(info->key_len); in virtio_crypto_cipher_session_helper()
98 s = iov_to_buf(*iov, num, 0, info->cipher_key, info->key_len); in virtio_crypto_cipher_session_helper()
99 if (unlikely(s != info->key_len)) { in virtio_crypto_cipher_session_helper()
103 iov_discard_front(iov, &num, info->key_len); in virtio_crypto_cipher_session_helper()
H A Dvhost-user.c2555 if (sess->key_len) { in vhost_user_crypto_create_session()
2557 if (sess->key_len > keylen) { in vhost_user_crypto_create_session()
2563 sess->key_len); in vhost_user_crypto_create_session()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/
H A D0001-Forward-port-to-OpenSSL-1.1.x.patch130 - int key_len = BN_num_bytes(info->pub_key);
134 + int key_len = BN_num_bytes(pub_key);
135 if (key_len < len)
136 len = key_len;
139 unsigned char *foo = (unsigned char*)alloca(key_len);
/openbmc/qemu/hw/i386/kvm/
H A Dxenstore_impl.c373 int key_len = strlen(key); in node_rm_recurse() local
381 assert(key_len + path_len + 2 <= sizeof(op->path)); in node_rm_recurse()
383 memcpy(op->path + path_len + 1, key, key_len + 1); in node_rm_recurse()
968 int key_len = strlen(key); in tx_commit_walk() local
989 assert(key_len + path_len + 2 <= sizeof(op->path)); in tx_commit_walk()
991 memcpy(op->path + path_len + 1, key, key_len + 1); in tx_commit_walk()
/openbmc/qemu/include/system/
H A Dcryptodev.h74 uint32_t key_len; member
/openbmc/qemu/include/standard-headers/linux/
H A Dvirtio_crypto.h173 uint32_t key_len; member
/openbmc/u-boot/lib/
H A Dhashtable.c207 size_t key_len = strlen(match); in hmatch_r() local
212 if (!strncmp(match, htab->table[idx].entry.key, key_len)) { in hmatch_r()