| /openbmc/qemu/tests/unit/ |
| H A D | test-crypto-akcipher.c | 667 size_t keylen; member 697 .keylen = sizeof(rsa1024_public_key), 705 .keylen = sizeof(rsa1024_private_key), 713 .keylen = sizeof(rsa2048_public_key), 721 .keylen = sizeof(rsa2048_private_key), 729 .keylen = sizeof(rsa_public_key_lack_element), 736 .keylen = sizeof(rsa_private_key_lack_element), 743 .keylen = sizeof(rsa_public_key_empty_element), 750 .keylen = sizeof(rsa_private_key_empty_element), 757 .keylen = 0, [all …]
|
| H A D | test-crypto-xts.c | 33 int keylen; member 348 AES_set_encrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.enc); in test_xts() 349 AES_set_decrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.dec); in test_xts() 350 AES_set_encrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.enc); in test_xts() 351 AES_set_decrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.dec); in test_xts() 384 AES_set_encrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.enc); in test_xts_split() 385 AES_set_decrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.dec); in test_xts_split() 386 AES_set_encrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.enc); in test_xts_split() 387 AES_set_decrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.dec); in test_xts_split() 429 AES_set_encrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.enc); in test_xts_unaligned() [all …]
|
| /openbmc/qemu/hw/misc/ |
| H A D | max78000_aes.c | 72 int keylen = 256; in max78000_aes_do_crypto() local 75 keylen = 128; in max78000_aes_do_crypto() 78 keylen = 192; in max78000_aes_do_crypto() 90 AES_set_encrypt_key(keydata, keylen, &key); in max78000_aes_do_crypto() 91 AES_set_decrypt_key(keydata, keylen, &s->internal_key); in max78000_aes_do_crypto() 95 AES_set_decrypt_key(keydata, keylen, &key); in max78000_aes_do_crypto() 96 AES_set_decrypt_key(keydata, keylen, &s->internal_key); in max78000_aes_do_crypto()
|
| /openbmc/qemu/crypto/ |
| H A D | rsakey-builtin.c.inc | 70 const uint8_t *key, size_t keylen, Error **errp) 77 decode_ret = qcrypto_der_decode_seq(&key, &keylen, 79 if (decode_ret < 0 || keylen != 0) { 117 const uint8_t *key, size_t keylen, Error **errp) 125 decode_ret = qcrypto_der_decode_seq(&key, &keylen, extract_seq_content, 127 if (decode_ret < 0 || keylen != 0) { 183 size_t keylen, Error **errp) 187 return qcrypto_builtin_rsa_private_key_parse(key, keylen, errp); 190 return qcrypto_builtin_rsa_public_key_parse(key, keylen, errp);
|
| H A D | rsakey-nettle.c.inc | 59 const uint8_t *key, size_t keylen, Error **errp) 67 if (asn1_der_iterator_first(&i, keylen, key) != ASN1_ITERATOR_CONSTRUCTED || 120 const uint8_t *key, size_t keylen, Error **errp) 126 if (asn1_der_iterator_first(&i, keylen, key) != ASN1_ITERATOR_CONSTRUCTED || 145 size_t keylen, Error **errp) 149 return qcrypto_nettle_rsa_private_key_parse(key, keylen, errp); 152 return qcrypto_nettle_rsa_public_key_parse(key, keylen, errp);
|
| H A D | rsakey.h | 84 const uint8_t *key, size_t keylen, Error **errp); 92 size_t keylen,
|
| H A D | akcipher.c | 35 const uint8_t *key, size_t keylen, in qcrypto_akcipher_new() argument 113 uint8_t *key, size_t keylen, in qcrypto_akcipher_export_p8info() argument 119 qcrypto_akcipher_rsakey_export_p8info(key, keylen, dst, dst_len); in qcrypto_akcipher_export_p8info()
|
| H A D | rsakey.c | 53 size_t keylen, in qcrypto_akcipher_rsakey_export_p8info() argument 73 qcrypto_der_encode_octet_str(ctx, key, keylen); in qcrypto_akcipher_rsakey_export_p8info()
|
| H A D | akcipher-nettle.c.inc | 55 const uint8_t *key, size_t keylen, 60 const uint8_t *key, size_t keylen, 65 return qcrypto_nettle_rsa_new(&opts->u.rsa, type, key, keylen, errp); 86 size_t keylen, 90 QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE, key, keylen, errp); 136 size_t keylen, 140 QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, key, keylen, errp); 388 const uint8_t *key, size_t keylen, 401 if (qcrypt_nettle_parse_rsa_private_key(rsa, key, keylen, errp) != 0) { 407 if (qcrypt_nettle_parse_rsa_public_key(rsa, key, keylen, errp) != 0) {
|
| H A D | secret_common.c | 41 size_t keylen, ciphertextlen, ivlen; in qcrypto_secret_decrypt() local 49 &key, &keylen, in qcrypto_secret_decrypt() 54 if (keylen != 32) { in qcrypto_secret_decrypt() 76 key, keylen, in qcrypto_secret_decrypt()
|
| H A D | akcipher-gcrypt.c.inc | 53 const uint8_t *key, size_t keylen, 58 const uint8_t *key, size_t keylen, 64 &opts->u.rsa, type, key, keylen, errp); 85 const uint8_t *key, size_t keylen, Error **errp) 88 QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE, key, keylen, errp); 176 size_t keylen, 181 QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, key, keylen, errp); 534 const uint8_t *key, size_t keylen, 544 if (qcrypto_gcrypt_parse_rsa_private_key(rsa, key, keylen, errp) != 0) { 550 if (qcrypto_gcrypt_parse_rsa_public_key(rsa, key, keylen, errp) != 0) {
|
| /openbmc/u-boot/drivers/crypto/fsl/ |
| H A D | fsl_rsa.c | 21 uint32_t keylen; in fsl_mod_exp() local 27 keylen = prop->num_bits / 8; in fsl_mod_exp() 32 pkin.n_siz = keylen; in fsl_mod_exp()
|
| /openbmc/openbmc/meta-security/recipes-security/libmhash/files/ |
| H A D | mhash.c | 8 int keylen = 4; in main() local 15 td = mhash_hmac_init(MHASH_MD5, password, keylen, mhash_get_hash_pblock(MHASH_MD5)); in main()
|
| /openbmc/qemu/tests/bench/ |
| H A D | benchmark-crypto-akcipher.c | 22 size_t keylen, in create_rsa_akcipher() argument 32 priv_key, keylen, &error_abort); in create_rsa_akcipher() 35 static void test_rsa_speed(const uint8_t *priv_key, size_t keylen, in test_rsa_speed() argument 46 create_rsa_akcipher(priv_key, keylen, PADDING, HASH); in test_rsa_speed()
|
| /openbmc/pam-ipmi/src/pam_ipmisave/ |
| H A D | pam_ipmisave.c | 147 int keylen, const unsigned char *iv, int ivlen, in encrypt_decrypt_data() argument 160 EVP_CIPHER_key_length(cipher) > keylen || in encrypt_decrypt_data() 171 if (NULL == HMAC(digest, key, keylen, inbytes, inbyteslen, in encrypt_decrypt_data() 221 if (NULL == HMAC(digest, key, keylen, outbytes, *outbyteslen, in encrypt_decrypt_data() 297 unsigned int keylen = 0; in update_pass_special_file() local 408 &keylen); in update_pass_special_file() 415 pamh, 0, cipher, key, keylen, in update_pass_special_file() 509 &keylen); in update_pass_special_file() 531 if (encrypt_decrypt_data(pamh, 1, cipher, key, keylen, iv, in update_pass_special_file()
|
| /openbmc/qemu/include/hw/xen/interface/io/ |
| H A D | netif.h | 303 unsigned int keylen, in xen_netif_toeplitz_hash() argument 314 prefix |= (keyi < keylen) ? key[keyi] : 0; in xen_netif_toeplitz_hash() 332 prefix |= (keyi < keylen) ? key[keyi] : 0; in xen_netif_toeplitz_hash()
|
| /openbmc/qemu/tests/qemu-iotests/ |
| H A D | 149 | 37 def __init__(self, name, cipher, keylen, mode, ivgen, argument 42 self.keylen = keylen 164 args.extend(["--key-size", str(config.keylen * 2)]) 166 args.extend(["--key-size", str(config.keylen)]) 251 "cipher-alg=%s-%d" % (config.cipher, config.keylen),
|
| /openbmc/phosphor-host-ipmid/oem/nvidia/ |
| H A D | biosconfigcommands.cpp | 153 int keylen = SHA256_DIGEST_LENGTH; in ipmiGetBiosPassword() local 163 keylen = SHA384_DIGEST_LENGTH; in ipmiGetBiosPassword() 168 keylen, nullHash.data()); in ipmiGetBiosPassword()
|
| /openbmc/qemu/backends/ |
| H A D | cryptodev-lkcf.c | 66 size_t keylen; member 327 session->key, session->keylen, in cryptodev_lkcf_execute_task() 348 session->key, session->keylen, in cryptodev_lkcf_execute_task() 559 sess->keylen = sess_info->keylen; in cryptodev_lkcf_create_asym_session() 560 sess->key = g_malloc(sess_info->keylen); in cryptodev_lkcf_create_asym_session() 561 memcpy(sess->key, sess_info->key, sess_info->keylen); in cryptodev_lkcf_create_asym_session()
|
| /openbmc/u-boot/include/u-boot/ |
| H A D | sha1.h | 93 void sha1_hmac(const unsigned char *key, int keylen,
|
| /openbmc/qemu/hw/virtio/ |
| H A D | virtio-crypto.c | 82 info->key_len = ldl_le_p(&cipher_para->keylen); in virtio_crypto_cipher_session_helper() 206 uint32_t algo, keytype, keylen; in virtio_crypto_create_asym_session() local 211 keylen = ldl_le_p(&sess_req->para.keylen); in virtio_crypto_create_asym_session() 219 if (keylen) { in virtio_crypto_create_asym_session() 220 asym_info->key = g_malloc(keylen); in virtio_crypto_create_asym_session() 221 if (iov_to_buf(iov, out_num, 0, asym_info->key, keylen) != keylen) { in virtio_crypto_create_asym_session() 225 iov_discard_front(&iov, &out_num, keylen); in virtio_crypto_create_asym_session() 231 asym_info->keylen = keylen; in virtio_crypto_create_asym_session()
|
| H A D | vhost-user.c | 2535 size_t keylen; in vhost_user_crypto_create_session() local 2539 if (sess->keylen) { in vhost_user_crypto_create_session() 2540 keylen = sizeof(msg.payload.session.u.asym.key); in vhost_user_crypto_create_session() 2541 if (sess->keylen > keylen) { in vhost_user_crypto_create_session() 2547 sess->keylen); in vhost_user_crypto_create_session() 2551 size_t keylen; in vhost_user_crypto_create_session() local 2556 keylen = sizeof(msg.payload.session.u.sym.key); in vhost_user_crypto_create_session() 2557 if (sess->key_len > keylen) { in vhost_user_crypto_create_session() 2567 keylen = sizeof(msg.payload.session.u.sym.auth_key); in vhost_user_crypto_create_session() 2568 if (sess->auth_key_len > keylen) { in vhost_user_crypto_create_session()
|
| /openbmc/qemu/include/crypto/ |
| H A D | akcipher.h | 173 uint8_t *key, size_t keylen,
|
| /openbmc/qemu/include/standard-headers/linux/ |
| H A D | virtio_crypto.h | 90 uint32_t keylen; member 227 uint32_t keylen; member
|
| /openbmc/openbmc/meta-openembedded/meta-filesystems/recipes-filesystems/logfsprogs/logfsprogs/ |
| H A D | 0001-btree-Avoid-conflicts-with-libc-namespace-about-setk.patch | 22 return node[geo->no_pairs * geo->keylen + n]; 29 longcpy(bkey(geo, node, n), key, geo->keylen);
|