/openbmc/qemu/tests/unit/ |
H A D | test-crypto-pbkdf.c | 37 size_t nkey; member 58 .nkey = 8, 72 .nkey = 8, 86 .nkey = 8, 100 .nkey = 8, 115 .nkey = 64, 130 .nkey = 65, 144 .nkey = 4, 160 .nkey = 8, 172 .nkey = 8, [all …]
|
H A D | test-crypto-ivgen.c | 33 size_t nkey; member 100 .nkey = 16, 114 .nkey = 16, 128 .nkey = 16, 152 data->nkey, in test_ivgen()
|
H A D | test-crypto-cipher.c | 656 size_t nkey, niv = 0, nciphertext = 0, nplaintext = 0; in test_cipher() local 661 nkey = unhex_string(data->key, &key); in test_cipher() 678 key, nkey, in test_cipher() 693 g_assert_cmpint(keysize * 2, ==, nkey); in test_cipher() 695 g_assert_cmpint(keysize, ==, nkey); in test_cipher()
|
/openbmc/qemu/crypto/ |
H A D | pbkdf-nettle.c | 47 const uint8_t *key, size_t nkey, in qcrypto_pbkdf2() argument 75 hmac_md5_set_key(&ctx.md5, nkey, key); in qcrypto_pbkdf2() 81 hmac_sha1_set_key(&ctx.sha1, nkey, key); in qcrypto_pbkdf2() 87 hmac_sha224_set_key(&ctx.sha224, nkey, key); in qcrypto_pbkdf2() 93 hmac_sha256_set_key(&ctx.sha256, nkey, key); in qcrypto_pbkdf2() 99 hmac_sha384_set_key(&ctx.sha384, nkey, key); in qcrypto_pbkdf2() 105 hmac_sha512_set_key(&ctx.sha512, nkey, key); in qcrypto_pbkdf2() 111 hmac_ripemd160_set_key(&ctx.ripemd160, nkey, key); in qcrypto_pbkdf2() 117 hmac_sm3_set_key(&ctx.sm3, nkey, key); in qcrypto_pbkdf2()
|
H A D | cipher.c | 106 size_t nkey, in qcrypto_cipher_validate_key_length() argument 121 if (nkey % 2) { in qcrypto_cipher_validate_key_length() 126 if (alg_key_len[alg] != (nkey / 2)) { in qcrypto_cipher_validate_key_length() 128 nkey, alg_key_len[alg] * 2); in qcrypto_cipher_validate_key_length() 132 if (alg_key_len[alg] != nkey) { in qcrypto_cipher_validate_key_length() 134 nkey, alg_key_len[alg]); in qcrypto_cipher_validate_key_length() 153 const uint8_t *key, size_t nkey, in qcrypto_cipher_new() argument 159 cipher = qcrypto_afalg_cipher_ctx_new(alg, mode, key, nkey, NULL); in qcrypto_cipher_new() 163 cipher = qcrypto_cipher_ctx_new(alg, mode, key, nkey, errp); in qcrypto_cipher_new()
|
H A D | pbkdf.c | 92 size_t nkey; member 105 size_t nkey = iters_data->nkey; in threaded_qcrypto_pbkdf2_count_iters() local 121 key, nkey, in threaded_qcrypto_pbkdf2_count_iters() 168 const uint8_t *key, size_t nkey, in qcrypto_pbkdf2_count_iters() argument 174 hash, key, nkey, salt, nsalt, nout, 0, errp in qcrypto_pbkdf2_count_iters()
|
H A D | cipher-gnutls.c.inc | 68 size_t nkey; /* ECB mode */ 115 gnutls_datum_t gkey = { (unsigned char *)ctx->key, ctx->nkey }; 176 gnutls_datum_t gkey = { (unsigned char *)ctx->key, ctx->nkey }; 235 size_t nkey, 239 gnutls_datum_t gkey = { (unsigned char *)key, nkey }; 292 if (!qcrypto_cipher_validate_key_length(alg, mode, nkey, errp)) { 300 ctx->key = g_new0(guint8, nkey); 301 memcpy(ctx->key, key, nkey); 302 ctx->nkey = nkey;
|
H A D | cipher-nettle.c.inc | 495 size_t nkey, 508 if (!qcrypto_cipher_validate_key_length(alg, mode, nkey, errp)) { 584 nkey /= 2; 585 aes128_set_encrypt_key(&ctx->key_xts[0], key + nkey); 586 aes128_set_decrypt_key(&ctx->key_xts[1], key + nkey); 613 nkey /= 2; 614 aes192_set_encrypt_key(&ctx->key_xts[0], key + nkey); 615 aes192_set_decrypt_key(&ctx->key_xts[1], key + nkey); 642 nkey /= 2; 643 aes256_set_encrypt_key(&ctx->key_xts[0], key + nkey); [all …]
|
H A D | hmac.c | 87 const uint8_t *key, size_t nkey, in qcrypto_hmac_new() argument 95 ctx = qcrypto_afalg_hmac_ctx_new(alg, key, nkey, NULL); in qcrypto_hmac_new() 102 ctx = qcrypto_hmac_ctx_new(alg, key, nkey, errp); in qcrypto_hmac_new()
|
H A D | hmacpriv.h | 32 const uint8_t *key, size_t nkey, 41 const uint8_t *key, size_t nkey,
|
H A D | hash-afalg.c | 70 const uint8_t *key, size_t nkey, in qcrypto_afalg_hash_hmac_ctx_new() argument 92 key, nkey) != 0) { in qcrypto_afalg_hash_hmac_ctx_new() 111 const uint8_t *key, size_t nkey, in qcrypto_afalg_hmac_ctx_new() argument 114 return qcrypto_afalg_hash_hmac_ctx_new(alg, key, nkey, true, errp); in qcrypto_afalg_hmac_ctx_new()
|
H A D | pbkdf-gnutls.c | 43 const uint8_t *key, size_t nkey, in qcrypto_pbkdf2() argument 59 const gnutls_datum_t gkey = { (unsigned char *)key, nkey }; in qcrypto_pbkdf2()
|
H A D | pbkdf-gcrypt.c | 46 const uint8_t *key, size_t nkey, in qcrypto_pbkdf2() argument 81 ret = gcry_kdf_derive(key, nkey, GCRY_KDF_PBKDF2, in qcrypto_pbkdf2()
|
H A D | ivgen.c | 33 const uint8_t *key, size_t nkey, in qcrypto_ivgen_new() argument 58 if (ivgen->driver->init(ivgen, key, nkey, errp) < 0) { in qcrypto_ivgen_new()
|
H A D | block.c | 248 block->nkey, errp); in qcrypto_block_pop_cipher() 272 const uint8_t *key, size_t nkey, in qcrypto_block_init_cipher() argument 283 block->key = g_memdup2(key, nkey); in qcrypto_block_init_cipher() 284 block->nkey = nkey; in qcrypto_block_init_cipher()
|
H A D | hmac-glib.c | 46 const uint8_t *key, size_t nkey, in qcrypto_hmac_ctx_new() argument 60 (const uint8_t *)key, nkey); in qcrypto_hmac_ctx_new()
|
H A D | hmac-gnutls.c | 56 const uint8_t *key, size_t nkey, in qcrypto_hmac_ctx_new() argument 72 (const void *)key, nkey); in qcrypto_hmac_ctx_new()
|
H A D | ivgen-essiv.c | 31 const uint8_t *key, size_t nkey, in qcrypto_ivgen_essiv_init() argument 46 if (qcrypto_hash_bytes(ivgen->hash, (const gchar *)key, nkey, in qcrypto_ivgen_essiv_init()
|
H A D | blockpriv.h | 39 size_t nkey; member 137 const uint8_t *key, size_t nkey,
|
H A D | hmac-gcrypt.c | 50 const uint8_t *key, size_t nkey, in qcrypto_hmac_ctx_new() argument 72 err = gcry_mac_setkey(ctx->handle, (const void *)key, nkey); in qcrypto_hmac_ctx_new()
|
/openbmc/qemu/tests/bench/ |
H A D | benchmark-crypto-cipher.c | 26 size_t nkey; in test_cipher_speed() local 35 nkey = qcrypto_cipher_get_key_len(alg); in test_cipher_speed() 38 nkey *= 2; in test_cipher_speed() 41 key = g_new0(uint8_t, nkey); in test_cipher_speed() 42 memset(key, g_test_rand_int(), nkey); in test_cipher_speed() 53 key, nkey, &err); in test_cipher_speed()
|
/openbmc/linux/drivers/input/ |
H A D | joydev.c | 49 int nkey; member 100 if (client->startup == joydev->nabs + joydev->nkey) { in joydev_pass_event() 296 have_event = client->startup < joydev->nabs + joydev->nkey; in joydev_generate_startup_event() 301 if (client->startup < joydev->nkey) { in joydev_generate_startup_event() 308 event->number = client->startup - joydev->nkey; in joydev_generate_startup_event() 353 for (data.buttons = i = 0; i < 32 && i < joydev->nkey; i++) in joydev_0x_read() 379 return client->startup < joydev->nabs + joydev->nkey || in joydev_data_pending() 492 for (i = 0; i < (len / 2) && i < joydev->nkey; i++) { in joydev_handle_JSIOCSBTNMAP() 501 for (i = 0; i < joydev->nkey; i++) in joydev_handle_JSIOCSBTNMAP() 542 return put_user(joydev->nkey, (__u8 __user *) argp); in joydev_ioctl_common() [all …]
|
/openbmc/openbmc/poky/bitbake/lib/bb/ |
H A D | COW.py | 62 nkey = key + MUTABLE 64 return cls.__dict__[nkey] 68 value = getattr(cls, nkey) 78 setattr(cls, nkey, value)
|
/openbmc/qemu/include/crypto/ |
H A D | pbkdf.h | 123 const uint8_t *key, size_t nkey, 151 const uint8_t *key, size_t nkey,
|
/openbmc/qemu/hw/net/rocker/ |
H A D | rocker_of_dpa.c | 2293 RockerOfDpaFlowKey *nkey; in of_dpa_flow_fill() local 2303 nkey = nflow->key = g_malloc0(sizeof(*nkey)); in of_dpa_flow_fill() 2309 nkey->priority = flow->priority; in of_dpa_flow_fill() 2310 nkey->tbl_id = key->tbl_id; in of_dpa_flow_fill() 2313 nkey->has_in_pport = true; in of_dpa_flow_fill() 2314 nkey->in_pport = key->in_pport; in of_dpa_flow_fill() 2317 if (nkey->has_in_pport && mask->in_pport != 0xffffffff) { in of_dpa_flow_fill() 2323 nkey->has_vlan_id = true; in of_dpa_flow_fill() 2324 nkey->vlan_id = ntohs(key->eth.vlan_id); in of_dpa_flow_fill() 2327 if (nkey->has_vlan_id && mask->eth.vlan_id != 0xffff) { in of_dpa_flow_fill() [all …]
|