Home
last modified time | relevance | path

Searched refs:algo (Results 1 – 15 of 15) sorted by relevance

/optee_test/host/xtest/
A Dregression_4000_data.h6652 .algo = TEE_ALG_ECDH_P192,
6662 .algo = TEE_ALG_ECDH_P192,
6672 .algo = TEE_ALG_ECDH_P192,
6682 .algo = TEE_ALG_ECDH_P192,
6692 .algo = TEE_ALG_ECDH_P192,
6702 .algo = TEE_ALG_ECDH_P192,
6712 .algo = TEE_ALG_ECDH_P192,
6722 .algo = TEE_ALG_ECDH_P192,
6732 .algo = TEE_ALG_ECDH_P192,
6742 .algo = TEE_ALG_ECDH_P192,
[all …]
A Dhash_perf.c111 switch (algo) { in algo_str()
143 switch (algo) { in hash_size()
328 prepare_op(algo); in hash_perf_run_test()
348 algo_str(algo), size); in hash_perf_run_test()
438 algo = TA_SHA_SHA1; in hash_perf_runner_cmd_parser()
440 algo = TA_SHA_SHA224; in hash_perf_runner_cmd_parser()
442 algo = TA_SHA_SHA256; in hash_perf_runner_cmd_parser()
444 algo = TA_SHA_SHA384; in hash_perf_runner_cmd_parser()
448 algo = TA_SM3; in hash_perf_runner_cmd_parser()
450 algo = TA_HMAC_SHA1; in hash_perf_runner_cmd_parser()
[all …]
A Daes_gcm_counter_overflow_test_decrypt.h7 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES,
26 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES,
45 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES,
64 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES,
83 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES,
102 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES,
121 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES,
140 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES,
159 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES,
178 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_DECRYPT, .key_type = TEE_TYPE_AES,
[all …]
A Daes_gcm_counter_overflow_test_encrypt.h7 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES,
26 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES,
45 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES,
64 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES,
83 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES,
102 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES,
121 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES,
140 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES,
159 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES,
178 .algo = TEE_ALG_AES_GCM, .mode = TEE_MODE_ENCRYPT, .key_type = TEE_TYPE_AES,
[all …]
A Dbenchmark_2000.c32 int algo = TA_SHA_SHA1; /* Algorithm */ in xtest_tee_benchmark_2001() local
36 hash_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2001()
46 int algo = TA_SHA_SHA256; /* Algorithm */ in xtest_tee_benchmark_2002() local
50 hash_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2002()
A Dsymm_cipher_perf.c166 static const char *cipher_str(uint32_t algo) in cipher_str() argument
168 switch (algo) { in cipher_str()
185 static const char *mode_str(uint32_t algo) in mode_str() argument
187 switch (algo) { in mode_str()
377 static void prepare_key(int decrypt, int keysize, int algo) in prepare_key() argument
388 op.params[1].value.a = algo; in prepare_key()
484 prepare_key(decrypt, keysize, algo); in aes_perf_run_test()
502 mode_str(algo), (decrypt ? "de" : "en"), keysize, size); in aes_perf_run_test()
619 int algo = -1; in aes_perf_runner_cmd_parser() local
739 algo = get_symm_algo(cipher, mode); in aes_perf_runner_cmd_parser()
[all …]
A Dregression_8000.c318 #define TEST_HKDF_DATA(section, algo, id, oeb /* omit empty bufs */) \ in xtest_test_derivation_hkdf() argument
320 section, algo, \ in xtest_test_derivation_hkdf()
328 uint32_t algo; in xtest_test_derivation_hkdf() member
375 hc->algo, TEE_MODE_DERIVE, max_size))) in xtest_test_derivation_hkdf()
455 #define TEST_CONCAT_KDF_DATA(name, algo, id, oeb /* omit empty bufs */) \ in xtest_test_derivation_concat_kdf() argument
457 name, algo, \ in xtest_test_derivation_concat_kdf()
466 uint32_t algo; in xtest_test_derivation_concat_kdf() member
495 cc->algo, TEE_MODE_DERIVE, max_size))) in xtest_test_derivation_concat_kdf()
576 level, section, algo, \ in xtest_test_derivation_pbkdf2()
590 uint32_t algo; in xtest_test_derivation_pbkdf2() member
[all …]
A Dregression_4000.c1328 uint32_t algo; member
1538 uint32_t algo; member
2406 uint32_t algo; member
2828 uint32_t algo; member
3140 uint32_t algo; member
5276 uint32_t algo; in xtest_tee_test_4007_ecc() member
5525 pt->algo, in xtest_tee_test_4009()
5612 pt->algo); in xtest_tee_test_4009()
6871 if (algo == TEE_ALG_AES_CTR || algo == TEE_ALG_AES_GCM) in do_algo_4017()
6875 if (algo == TEE_ALG_AES_CTS || algo == TEE_ALG_AES_XTS) in do_algo_4017()
[all …]
A Dcrypto_common.h44 void hash_perf_run_test(int algo, size_t size, unsigned int n,
A Dasym_perf.c306 uint32_t mode, uint32_t algo, uint32_t main_algo) in prepare_keypair() argument
318 op.params[1].value.b = algo; in prepare_keypair()
401 uint32_t algo) in asym_perf_run_test() argument
488 prepare_keypair(width_bits, buf, blen, mode, algo, main_algo); in asym_perf_run_test()
493 if (main_algo == ALGO_RSA && algo >= RSASSA_PKCS1_PSS_MGF1_SHA1) { in asym_perf_run_test()
605 static int get_rsa_hash_len(uint32_t algo) in get_rsa_hash_len() argument
607 switch (algo) { in get_rsa_hash_len()
629 fprintf(stderr, "The algo[%u] is not valid!\n", algo); in get_rsa_hash_len()
A Dxtest_helpers.c44 uint32_t algo, uint32_t mode, in ta_crypt_cmd_allocate_operation() argument
52 op.params[0].value.b = algo; in ta_crypt_cmd_allocate_operation()
380 uint32_t algo, uint32_t element) in ta_crypt_cmd_is_algo_supported() argument
387 op.params[0].value.a = algo; in ta_crypt_cmd_is_algo_supported()
A Dxtest_helpers.h49 uint32_t algo,
A Dregression_1000.c765 load_corrupt_ta(c, offsetof(struct shdr, algo), 1)); in test_1008_corrupt_ta()
/optee_test/ta/crypto_perf/
A Dta_crypto_perf.c31 static uint32_t algo; variable
148 if (algo == TEE_ALG_AES_GCM) in cmd_cipher_process()
214 algo = TEE_ALG_AES_ECB_NOPAD; in cmd_cipher_prepare_key()
224 algo = TEE_ALG_AES_CTR; in cmd_cipher_prepare_key()
229 algo = TEE_ALG_AES_XTS; in cmd_cipher_prepare_key()
235 algo = TEE_ALG_AES_GCM; in cmd_cipher_prepare_key()
250 algo = TEE_ALG_SM4_CTR; in cmd_cipher_prepare_key()
255 algo = TEE_ALG_SM4_XTS; in cmd_cipher_prepare_key()
279 if (algo == TEE_ALG_AES_XTS || algo == TEE_ALG_SM4_XTS) { in cmd_cipher_prepare_key()
550 algo = TEE_ALG_RSA_NOPAD; in get_rsa_cipher_algo()
[all …]
/optee_test/host/xtest/gp/include/
A Dxml_crypto_api.h900 uint32_t algo; member
984 saved_alloc.algo = 0; in crypto_reset()
1069 op.params[0].value.a = algo; in Invoke_Crypto_AllocateOperation()
1083 saved_alloc.algo = algo; in Invoke_Crypto_AllocateOperation()
2658 switch (algo) { in hash_algo_to_md()
3101 switch (algo) { in algo_to_md()
3126 switch (algo) { in padding_is_pkcs1_v1_5()
3154 uint32_t algo, in rsa_sign_digest() argument
3178 if (padding_is_pkcs1_v1_5(algo)) { in rsa_sign_digest()
3245 uint32_t algo, in rsa_verify_digest() argument
[all …]

Completed in 880 milliseconds