| /openbmc/qemu/tests/bench/ |
| H A D | benchmark-crypto-akcipher.c | 36 size_t key_size) in test_rsa_speed() argument 53 signature = g_new0(uint8_t, key_size / BYTE); in test_rsa_speed() 55 g_test_message("benchmark rsa%zu (%s-%s) sign...", key_size, in test_rsa_speed() 61 signature, key_size / BYTE, in test_rsa_speed() 67 key_size, QCryptoRSAPaddingAlgo_str(PADDING), in test_rsa_speed() 72 g_test_message("benchmark rsa%zu (%s-%s) verification...", key_size, in test_rsa_speed() 77 g_assert(qcrypto_akcipher_verify(rsa, signature, key_size / BYTE, in test_rsa_speed() 84 key_size, QCryptoRSAPaddingAlgo_str(PADDING), in test_rsa_speed() 92 size_t key_size = (size_t)opaque; in test_rsa_1024_speed() local 93 test_rsa_speed(rsa1024_priv_key, sizeof(rsa1024_priv_key), key_size); in test_rsa_1024_speed() [all …]
|
| /openbmc/u-boot/lib/libavb/ |
| H A D | avb_property_descriptor.c | 44 size_t key_size; member 71 if (data->key_size == prop_desc.key_num_bytes) { in property_lookup_desc_foreach() 74 data->key_size) == 0) { in property_lookup_desc_foreach() 91 size_t key_size, in avb_property_lookup() argument 95 if (key_size == 0) { in avb_property_lookup() 96 key_size = avb_strlen(key); in avb_property_lookup() 100 data.key_size = key_size; in avb_property_lookup() 119 size_t key_size, in avb_property_lookup_uint64() argument 127 value = avb_property_lookup(image_data, image_size, key, key_size, NULL); in avb_property_lookup_uint64()
|
| H A D | avb_property_descriptor.h | 67 size_t key_size, 80 size_t key_size,
|
| /openbmc/google-misc/subprojects/libcr51sign/src/ |
| H A D | libcr51sign.c | 61 uint16_t* key_size) in get_key_size() argument 66 *key_size = 256; in get_key_size() 69 *key_size = 384; in get_key_size() 73 *key_size = 512; in get_key_size() 659 uint16_t key_size; in validate_signature() local 715 rv = get_key_size(scheme, &key_size); in validate_signature() 721 rv = intf->read(ctx, raw_signature_offset, key_size, signature); in validate_signature() 744 rv = intf->verify_signature(ctx, scheme, signature, key_size, in validate_signature()
|
| /openbmc/qemu/crypto/ |
| H A D | akcipher-nettle.c.inc | 76 int key_size) 78 akcipher->max_plaintext_len = key_size; 79 akcipher->max_ciphertext_len = key_size; 80 akcipher->max_signature_len = key_size; 81 akcipher->max_dgst_len = key_size;
|
| H A D | akcipher-gcrypt.c.inc | 76 size_t key_size = (gcry_mpi_get_nbits(n) + 7) / 8; 77 akcipher->max_plaintext_len = key_size; 78 akcipher->max_ciphertext_len = key_size; 79 akcipher->max_dgst_len = key_size; 80 akcipher->max_signature_len = key_size;
|
| /openbmc/qemu/tools/ebpf/ |
| H A D | rss.bpf.c | 81 __uint(key_size, sizeof(__u32)); 89 __uint(key_size, sizeof(__u32)); 97 __uint(key_size, sizeof(__u32));
|
| /openbmc/u-boot/board/gdsys/a38x/ |
| H A D | hre.c | 349 size_t key_size) in hre_op_loadkey() argument 358 hre_tpm_err = tpm_load_key2_oiap(tpm, parent_handle, key, key_size, in hre_op_loadkey()
|
| /openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/openssl-tpm-engine/files/ |
| H A D | 0001-create-tpm-key-support-well-known-key-option.patch | 41 UINT32 key_size = 2048;
|
| /openbmc/u-boot/tools/ |
| H A D | kwbimage.c | 459 unsigned int key_size; in kwb_compute_pubkey_hash() local 466 key_size = (pk->key[2] << 8) + pk->key[3] + 4; in kwb_compute_pubkey_hash() 478 if (!EVP_DigestUpdate(ctx, pk->key, key_size)) { in kwb_compute_pubkey_hash()
|
| /openbmc/u-boot/board/gdsys/p1022/ |
| H A D | controlcenterd-id.c | 588 size_t key_size) in hre_op_loadkey() argument 597 hre_tpm_err = tpm_load_key2_oiap(tpm, parent_handle, key, key_size, in hre_op_loadkey()
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/krb5/krb5/ |
| H A D | 0001-Eliminate-old-style-function-declarations.patch | 8041 size_t key_size, val_size;
|