Home
last modified time | relevance | path

Searched refs:key2 (Results 1 – 25 of 46) sorted by relevance

12

/optee_os-3.20.0/core/lib/libtomcrypt/src/modes/xts/
A Dxts_init.c20 int xts_start(int cipher, const unsigned char *key1, const unsigned char *key2, unsigned long keyle… in xts_start() argument
27 LTC_ARGCHK(key2 != NULL); in xts_start()
43 if ((err = cipher_descriptor[cipher]->setup(key2, keylen, num_rounds, &xts->key2)) != CRYPT_OK) { in xts_start()
A Dxts_decrypt.c89 …= cipher_descriptor[xts->cipher]->accel_xts_decrypt(ct, pt, lim, tweak, &xts->key1, &xts->key2)) != in xts_decrypt()
100 if ((err = cipher_descriptor[xts->cipher]->ecb_encrypt(tweak, T, &xts->key2)) != CRYPT_OK) { in xts_decrypt()
139 if ((err = cipher_descriptor[xts->cipher]->ecb_decrypt(T, tweak, &xts->key2)) != CRYPT_OK) { in xts_decrypt()
A Dxts_encrypt.c91 …= cipher_descriptor[xts->cipher]->accel_xts_encrypt(pt, ct, lim, tweak, &xts->key1, &xts->key2)) != in xts_encrypt()
103 if ((err = cipher_descriptor[xts->cipher]->ecb_encrypt(tweak, T, &xts->key2)) != CRYPT_OK) { in xts_encrypt()
140 if ((err = cipher_descriptor[xts->cipher]->ecb_decrypt(T, tweak, &xts->key2)) != CRYPT_OK) { in xts_encrypt()
A Dxts_test.c27 XMEMCPY(&xts.key2, skey2, sizeof(symmetric_key)); in s_xts_test_accel_xts_encrypt()
54 XMEMCPY(&xts.key2, skey2, sizeof(symmetric_key)); in s_xts_test_accel_xts_decrypt()
77 unsigned char key2[32]; in xts_test()
230 err = xts_start(idx, tests[i].key1, tests[i].key2, tests[i].keylen / 2, 0, &xts); in xts_test()
A Dxts_done.c18 cipher_descriptor[xts->cipher]->done(&xts->key2); in xts_done()
/optee_os-3.20.0/core/arch/arm/crypto/
A Daes_modes_armv8a_ce_a32.S25 enc_round q0, \key2
30 dec_round q0, \key2
35 aese.8 q0, \key2
41 aesd.8 q0, \key2
49 enc_round q0, \key2
67 aese.8 q0, \key2
68 aese.8 q1, \key2
69 aese.8 q2, \key2
79 aesd.8 q0, \key2
80 aesd.8 q1, \key2
[all …]
A Daes_armv8a_ce.c223 unsigned int block_count, const void *key2, in crypto_accel_aes_xts_enc() argument
228 assert(out && in && key1 && key2 && tweak); in crypto_accel_aes_xts_enc()
231 ce_aes_xts_encrypt(out, in, key1, round_count, block_count, key2, in crypto_accel_aes_xts_enc()
238 unsigned int block_count, const void *key2, in crypto_accel_aes_xts_dec() argument
243 assert(out && in && key1 && key2 && tweak); in crypto_accel_aes_xts_dec()
246 ce_aes_xts_decrypt(out, in, key1, round_count, block_count, key2, in crypto_accel_aes_xts_dec()
/optee_os-3.20.0/core/drivers/crypto/crypto_api/cipher/
A Dcipher.c75 size_t key1_len, const uint8_t *key2, in cipher_init() argument
81 if ((!key1 && key1_len) || (!key2 && key2_len) || (!iv && iv_len)) { in cipher_init()
95 .key2.data = (uint8_t *)key2, in cipher_init()
96 .key2.length = key2_len, in cipher_init()
/optee_os-3.20.0/core/include/crypto/
A Dcrypto_accel.h36 unsigned int block_count, const void *key2,
40 unsigned int block_count, const void *key2,
/optee_os-3.20.0/core/crypto/
A Dsm4-xts.c35 size_t key1_len, const uint8_t *key2, in sm4_xts_init() argument
52 sm4_setkey_enc(&c->state_ek, key2); in sm4_xts_init()
53 sm4_setkey_dec(&c->state_dk, key2); in sm4_xts_init()
A Daes-cts.c51 size_t key1_len, const uint8_t *key2, in cts_init() argument
59 res = crypto_cipher_init(c->ecb, mode, key1, key1_len, key2, key2_len, in cts_init()
64 return crypto_cipher_init(c->cbc, mode, key1, key1_len, key2, key2_len, in cts_init()
A Dsm4-ecb.c32 size_t key1_len, const uint8_t *key2 __unused, in sm4_ecb_init()
A Dsm4-ctr.c35 const uint8_t *key2 __unused, in sm4_ctr_init()
A Dsm4-cbc.c34 size_t key1_len, const uint8_t *key2 __unused, in sm4_cbc_init()
/optee_os-3.20.0/core/drivers/crypto/caam/cipher/
A Dcaam_cipher.c181 ctx->key2.length)); in caam_cipher_block()
182 caam_desc_add_ptr(desc, ctx->key2.paddr); in caam_cipher_block()
346 caam_free_buf(&ctx->key2); in do_free_intern()
395 if (src->key2.length) { in caam_cipher_copy_state()
396 struct drvcrypt_buf key2 = { in caam_cipher_copy_state() local
397 .data = src->key2.data, in caam_cipher_copy_state()
398 .length = src->key2.length in caam_cipher_copy_state()
400 copy_ctx_data(&dst->key2, &key2); in caam_cipher_copy_state()
457 if (!dinit->key2.data || !dinit->key2.length) in caam_cipher_initialize()
460 retstatus = do_check_keysize(&alg->def_key, dinit->key2.length); in caam_cipher_initialize()
[all …]
A Dlocal.h52 struct caambuf key2; /* Second Key */ member
/optee_os-3.20.0/core/drivers/crypto/se050/core/
A Dcipher.c26 dinit->key2.data, dinit->key2.length, in do_init()
/optee_os-3.20.0/core/pta/tests/
A Daes_perf.c57 const uint8_t *key2 = NULL; in init_ctx() local
73 key2 = aes_key2; in init_ctx()
98 res = crypto_cipher_init(*ctx, mode, aes_key, key_len, key2, in init_ctx()
/optee_os-3.20.0/core/drivers/crypto/crypto_api/include/
A Ddrvcrypt_cipher.h29 struct drvcrypt_buf key2; /* Second key */ member
/optee_os-3.20.0/core/lib/libtomcrypt/
A Dxts.c37 size_t key1_len, const uint8_t *key2 __unused, in ltc_xts_init()
63 if (xts_start(c->cipher_idx, key1, key2, key1_len, 0, in ltc_xts_init()
A Dctr.c33 size_t key1_len, const uint8_t *key2 __unused, in ltc_ctr_init()
/optee_os-3.20.0/lib/libutee/
A Dtee_api_operations.c21 TEE_ObjectHandle key2; member
330 &op->key2); in TEE_AllocateOperation()
369 TEE_FreeTransientObject(op->key2); in TEE_AllocateOperation()
621 if (!key1 && !key2) { in TEE_SetOperationKey2()
624 TEE_ResetTransientObject(operation->key2); in TEE_SetOperationKey2()
627 } else if (!key1 || !key2) { in TEE_SetOperationKey2()
658 res = TEE_GetObjectInfo1(key2, &key_info2); in TEE_SetOperationKey2()
695 TEE_ResetTransientObject(operation->key2); in TEE_SetOperationKey2()
701 res = TEE_CopyObjectAttributes1(operation->key2, key2); in TEE_SetOperationKey2()
735 TEE_ObjectHandle key2 = TEE_HANDLE_NULL; in TEE_CopyOperation() local
[all …]
/optee_os-3.20.0/ta/pkcs11/src/
A Dpkcs11_attributes.h141 struct obj_attrs *key2);
/optee_os-3.20.0/lib/libmbedtls/core/
A Ddes_ecb.c34 const uint8_t *key2 __unused, in mbed_des_ecb_init()
A Ddes3_ecb.c34 const uint8_t *key2 __unused, in mbed_des3_ecb_init()

Completed in 20 milliseconds

12