/optee_test/host/xtest/ |
A D | regression_4000_data.h | 6652 .algo = TEE_ALG_ECDH_P192, 6662 .algo = TEE_ALG_ECDH_P192, 6672 .algo = TEE_ALG_ECDH_P192, 6682 .algo = TEE_ALG_ECDH_P192, 6692 .algo = TEE_ALG_ECDH_P192, 6702 .algo = TEE_ALG_ECDH_P192, 6712 .algo = TEE_ALG_ECDH_P192, 6722 .algo = TEE_ALG_ECDH_P192, 6732 .algo = TEE_ALG_ECDH_P192, 6742 .algo = TEE_ALG_ECDH_P192, [all …]
|
A D | hash_perf.c | 111 switch (algo) { in algo_str() 143 switch (algo) { in hash_size() 328 prepare_op(algo); in hash_perf_run_test() 348 algo_str(algo), size); in hash_perf_run_test() 438 algo = TA_SHA_SHA1; in hash_perf_runner_cmd_parser() 440 algo = TA_SHA_SHA224; in hash_perf_runner_cmd_parser() 442 algo = TA_SHA_SHA256; in hash_perf_runner_cmd_parser() 444 algo = TA_SHA_SHA384; in hash_perf_runner_cmd_parser() 448 algo = TA_SM3; in hash_perf_runner_cmd_parser() 450 algo = TA_HMAC_SHA1; in hash_perf_runner_cmd_parser() [all …]
|
A D | aes_gcm_counter_overflow_test_decrypt.h | 7 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES, 26 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES, 45 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES, 64 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES, 83 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES, 102 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES, 121 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES, 140 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES, 159 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES, 178 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES, [all …]
|
A D | aes_gcm_counter_overflow_test_encrypt.h | 7 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES, 26 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES, 45 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES, 64 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES, 83 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES, 102 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES, 121 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES, 140 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES, 159 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES, 178 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES, [all …]
|
A D | benchmark_2000.c | 32 int algo = TA_SHA_SHA1; /* Algorithm */ in xtest_tee_benchmark_2001() local 36 hash_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2001() 46 int algo = TA_SHA_SHA256; /* Algorithm */ in xtest_tee_benchmark_2002() local 50 hash_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2002()
|
A D | symm_cipher_perf.c | 166 static const char *cipher_str(uint32_t algo) in cipher_str() argument 168 switch (algo) { in cipher_str() 185 static const char *mode_str(uint32_t algo) in mode_str() argument 187 switch (algo) { in mode_str() 377 static void prepare_key(int decrypt, int keysize, int algo) in prepare_key() argument 388 op.params[1].value.a = algo; in prepare_key() 484 prepare_key(decrypt, keysize, algo); in aes_perf_run_test() 502 mode_str(algo), (decrypt ? "de" : "en"), keysize, size); in aes_perf_run_test() 619 int algo = -1; in aes_perf_runner_cmd_parser() local 739 algo = get_symm_algo(cipher, mode); in aes_perf_runner_cmd_parser() [all …]
|
A D | regression_8000.c | 318 #define TEST_HKDF_DATA(section, algo, id, oeb /* omit empty bufs */) \ in xtest_test_derivation_hkdf() argument 320 section, algo, \ in xtest_test_derivation_hkdf() 328 uint32_t algo; in xtest_test_derivation_hkdf() member 375 hc->algo, TEE_MODE_DERIVE, max_size))) in xtest_test_derivation_hkdf() 455 #define TEST_CONCAT_KDF_DATA(name, algo, id, oeb /* omit empty bufs */) \ in xtest_test_derivation_concat_kdf() argument 457 name, algo, \ in xtest_test_derivation_concat_kdf() 466 uint32_t algo; in xtest_test_derivation_concat_kdf() member 495 cc->algo, TEE_MODE_DERIVE, max_size))) in xtest_test_derivation_concat_kdf() 576 level, section, algo, \ in xtest_test_derivation_pbkdf2() 590 uint32_t algo; in xtest_test_derivation_pbkdf2() member [all …]
|
A D | regression_4000.c | 1328 uint32_t algo; member 1538 uint32_t algo; member 2406 uint32_t algo; member 2828 uint32_t algo; member 3140 uint32_t algo; member 5276 uint32_t algo; in xtest_tee_test_4007_ecc() member 5525 pt->algo, in xtest_tee_test_4009() 5612 pt->algo); in xtest_tee_test_4009() 6871 if (algo == TEE_ALG_AES_CTR || algo == TEE_ALG_AES_GCM) in do_algo_4017() 6875 if (algo == TEE_ALG_AES_CTS || algo == TEE_ALG_AES_XTS) in do_algo_4017() [all …]
|
A D | crypto_common.h | 44 void hash_perf_run_test(int algo, size_t size, unsigned int n,
|
A D | asym_perf.c | 306 uint32_t mode, uint32_t algo, uint32_t main_algo) in prepare_keypair() argument 318 op.params[1].value.b = algo; in prepare_keypair() 401 uint32_t algo) in asym_perf_run_test() argument 488 prepare_keypair(width_bits, buf, blen, mode, algo, main_algo); in asym_perf_run_test() 493 if (main_algo == ALGO_RSA && algo >= RSASSA_PKCS1_PSS_MGF1_SHA1) { in asym_perf_run_test() 605 static int get_rsa_hash_len(uint32_t algo) in get_rsa_hash_len() argument 607 switch (algo) { in get_rsa_hash_len() 629 fprintf(stderr, "The algo[%u] is not valid!\n", algo); in get_rsa_hash_len()
|
A D | xtest_helpers.c | 44 uint32_t algo, uint32_t mode, in ta_crypt_cmd_allocate_operation() argument 52 op.params[0].value.b = algo; in ta_crypt_cmd_allocate_operation() 380 uint32_t algo, uint32_t element) in ta_crypt_cmd_is_algo_supported() argument 387 op.params[0].value.a = algo; in ta_crypt_cmd_is_algo_supported()
|
A D | xtest_helpers.h | 49 uint32_t algo,
|
A D | regression_1000.c | 765 load_corrupt_ta(c, offsetof(struct shdr, algo), 1)); in test_1008_corrupt_ta()
|
/optee_test/ta/crypto_perf/ |
A D | ta_crypto_perf.c | 31 static uint32_t algo; variable 148 if (algo == TEE_ALG_AES_GCM) in cmd_cipher_process() 214 algo = TEE_ALG_AES_ECB_NOPAD; in cmd_cipher_prepare_key() 224 algo = TEE_ALG_AES_CTR; in cmd_cipher_prepare_key() 229 algo = TEE_ALG_AES_XTS; in cmd_cipher_prepare_key() 235 algo = TEE_ALG_AES_GCM; in cmd_cipher_prepare_key() 250 algo = TEE_ALG_SM4_CTR; in cmd_cipher_prepare_key() 255 algo = TEE_ALG_SM4_XTS; in cmd_cipher_prepare_key() 279 if (algo == TEE_ALG_AES_XTS || algo == TEE_ALG_SM4_XTS) { in cmd_cipher_prepare_key() 550 algo = TEE_ALG_RSA_NOPAD; in get_rsa_cipher_algo() [all …]
|
/optee_test/host/xtest/gp/include/ |
A D | xml_crypto_api.h | 900 uint32_t algo; member 984 saved_alloc.algo = 0; in crypto_reset() 1069 op.params[0].value.a = algo; in Invoke_Crypto_AllocateOperation() 1083 saved_alloc.algo = algo; in Invoke_Crypto_AllocateOperation() 2658 switch (algo) { in hash_algo_to_md() 3101 switch (algo) { in algo_to_md() 3126 switch (algo) { in padding_is_pkcs1_v1_5() 3154 uint32_t algo, in rsa_sign_digest() argument 3178 if (padding_is_pkcs1_v1_5(algo)) { in rsa_sign_digest() 3245 uint32_t algo, in rsa_verify_digest() argument [all …]
|