| /qemu/tests/unit/ |
| A D | test-crypto-akcipher.c | 667 size_t keylen; member 697 .keylen = sizeof(rsa1024_public_key), 705 .keylen = sizeof(rsa1024_private_key), 713 .keylen = sizeof(rsa2048_public_key), 721 .keylen = sizeof(rsa2048_private_key), 729 .keylen = sizeof(rsa_public_key_lack_element), 736 .keylen = sizeof(rsa_private_key_lack_element), 743 .keylen = sizeof(rsa_public_key_empty_element), 757 .keylen = 0, 764 .keylen = 0, [all …]
|
| A D | test-crypto-xts.c | 33 int keylen; member 348 AES_set_encrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.enc); in test_xts() 349 AES_set_decrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.dec); in test_xts() 350 AES_set_encrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.enc); in test_xts() 351 AES_set_decrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.dec); in test_xts() 384 AES_set_encrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.enc); in test_xts_split() 385 AES_set_decrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.dec); in test_xts_split() 386 AES_set_encrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.enc); in test_xts_split() 387 AES_set_decrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.dec); in test_xts_split() 429 AES_set_encrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.enc); in test_xts_unaligned() [all …]
|
| /qemu/crypto/ |
| A D | rsakey-builtin.c.inc | 70 const uint8_t *key, size_t keylen, Error **errp) 77 decode_ret = qcrypto_der_decode_seq(&key, &keylen, 79 if (decode_ret < 0 || keylen != 0) { 117 const uint8_t *key, size_t keylen, Error **errp) 125 decode_ret = qcrypto_der_decode_seq(&key, &keylen, extract_seq_content, 127 if (decode_ret < 0 || keylen != 0) { 183 size_t keylen, Error **errp) 187 return qcrypto_builtin_rsa_private_key_parse(key, keylen, errp); 190 return qcrypto_builtin_rsa_public_key_parse(key, keylen, errp);
|
| A D | rsakey-nettle.c.inc | 59 const uint8_t *key, size_t keylen, Error **errp) 67 if (asn1_der_iterator_first(&i, keylen, key) != ASN1_ITERATOR_CONSTRUCTED || 120 const uint8_t *key, size_t keylen, Error **errp) 126 if (asn1_der_iterator_first(&i, keylen, key) != ASN1_ITERATOR_CONSTRUCTED || 145 size_t keylen, Error **errp) 149 return qcrypto_nettle_rsa_private_key_parse(key, keylen, errp); 152 return qcrypto_nettle_rsa_public_key_parse(key, keylen, errp);
|
| A D | akcipher.c | 35 const uint8_t *key, size_t keylen, in qcrypto_akcipher_new() argument 113 uint8_t *key, size_t keylen, in qcrypto_akcipher_export_p8info() argument 119 qcrypto_akcipher_rsakey_export_p8info(key, keylen, dst, dst_len); in qcrypto_akcipher_export_p8info()
|
| A D | akcipher-nettle.c.inc | 55 const uint8_t *key, size_t keylen, 60 const uint8_t *key, size_t keylen, 65 return qcrypto_nettle_rsa_new(&opts->u.rsa, type, key, keylen, errp); 86 size_t keylen, 90 QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE, key, keylen, errp); 136 size_t keylen, 140 QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, key, keylen, errp); 388 const uint8_t *key, size_t keylen, 401 if (qcrypt_nettle_parse_rsa_private_key(rsa, key, keylen, errp) != 0) { 407 if (qcrypt_nettle_parse_rsa_public_key(rsa, key, keylen, errp) != 0) {
|
| A D | rsakey.h | 84 const uint8_t *key, size_t keylen, Error **errp); 92 size_t keylen,
|
| A D | rsakey.c | 53 size_t keylen, in qcrypto_akcipher_rsakey_export_p8info() argument 73 qcrypto_der_encode_octet_str(ctx, key, keylen); in qcrypto_akcipher_rsakey_export_p8info()
|
| A D | secret_common.c | 41 size_t keylen, ciphertextlen, ivlen; in qcrypto_secret_decrypt() local 49 &key, &keylen, in qcrypto_secret_decrypt() 54 if (keylen != 32) { in qcrypto_secret_decrypt() 76 key, keylen, in qcrypto_secret_decrypt()
|
| A D | akcipher-gcrypt.c.inc | 53 const uint8_t *key, size_t keylen, 58 const uint8_t *key, size_t keylen, 64 &opts->u.rsa, type, key, keylen, errp); 85 const uint8_t *key, size_t keylen, Error **errp) 88 QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE, key, keylen, errp); 176 size_t keylen, 181 QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, key, keylen, errp); 534 const uint8_t *key, size_t keylen, 544 if (qcrypto_gcrypt_parse_rsa_private_key(rsa, key, keylen, errp) != 0) { 550 if (qcrypto_gcrypt_parse_rsa_public_key(rsa, key, keylen, errp) != 0) {
|
| A D | block-luks.c | 271 size_t keylen = qcrypto_cipher_get_key_len(cipher); in qcrypto_block_luks_essiv_cipher() local 272 if (digestlen == keylen) { in qcrypto_block_luks_essiv_cipher()
|
| /qemu/tests/bench/ |
| A D | benchmark-crypto-akcipher.c | 22 size_t keylen, in create_rsa_akcipher() argument 32 priv_key, keylen, &error_abort); in create_rsa_akcipher() 35 static void test_rsa_speed(const uint8_t *priv_key, size_t keylen, in test_rsa_speed() argument 46 create_rsa_akcipher(priv_key, keylen, PADDING, HASH); in test_rsa_speed()
|
| /qemu/tests/qemu-iotests/ |
| A D | 149 | 37 def __init__(self, name, cipher, keylen, mode, ivgen, argument 42 self.keylen = keylen 164 args.extend(["--key-size", str(config.keylen * 2)]) 166 args.extend(["--key-size", str(config.keylen)]) 251 "cipher-alg=%s-%d" % (config.cipher, config.keylen),
|
| /qemu/include/hw/xen/interface/io/ |
| A D | netif.h | 303 unsigned int keylen, in xen_netif_toeplitz_hash() argument 314 prefix |= (keyi < keylen) ? key[keyi] : 0; in xen_netif_toeplitz_hash() 332 prefix |= (keyi < keylen) ? key[keyi] : 0; in xen_netif_toeplitz_hash()
|
| /qemu/backends/ |
| A D | cryptodev-lkcf.c | 66 size_t keylen; member 327 session->key, session->keylen, in cryptodev_lkcf_execute_task() 346 session->key, session->keylen, in cryptodev_lkcf_execute_task() 556 sess->keylen = sess_info->keylen; in cryptodev_lkcf_create_asym_session() 557 sess->key = g_malloc(sess_info->keylen); in cryptodev_lkcf_create_asym_session() 558 memcpy(sess->key, sess_info->key, sess_info->keylen); in cryptodev_lkcf_create_asym_session()
|
| A D | cryptodev-builtin.c | 357 sess_info->keylen, errp); in cryptodev_builtin_create_akcipher_session()
|
| /qemu/hw/virtio/ |
| A D | virtio-crypto.c | 82 info->key_len = ldl_le_p(&cipher_para->keylen); in virtio_crypto_cipher_session_helper() 206 uint32_t algo, keytype, keylen; in virtio_crypto_create_asym_session() local 211 keylen = ldl_le_p(&sess_req->para.keylen); in virtio_crypto_create_asym_session() 219 if (keylen) { in virtio_crypto_create_asym_session() 220 asym_info->key = g_malloc(keylen); in virtio_crypto_create_asym_session() 221 if (iov_to_buf(iov, out_num, 0, asym_info->key, keylen) != keylen) { in virtio_crypto_create_asym_session() 225 iov_discard_front(&iov, &out_num, keylen); in virtio_crypto_create_asym_session() 231 asym_info->keylen = keylen; in virtio_crypto_create_asym_session()
|
| A D | vhost-user.c | 2551 size_t keylen; in vhost_user_crypto_create_session() local 2555 if (sess->keylen) { in vhost_user_crypto_create_session() 2556 keylen = sizeof(msg.payload.session.u.asym.key); in vhost_user_crypto_create_session() 2557 if (sess->keylen > keylen) { in vhost_user_crypto_create_session() 2563 sess->keylen); in vhost_user_crypto_create_session() 2567 size_t keylen; in vhost_user_crypto_create_session() local 2572 keylen = sizeof(msg.payload.session.u.sym.key); in vhost_user_crypto_create_session() 2573 if (sess->key_len > keylen) { in vhost_user_crypto_create_session() 2583 keylen = sizeof(msg.payload.session.u.sym.auth_key); in vhost_user_crypto_create_session() 2584 if (sess->auth_key_len > keylen) { in vhost_user_crypto_create_session()
|
| /qemu/include/crypto/ |
| A D | akcipher.h | 173 uint8_t *key, size_t keylen,
|
| /qemu/include/standard-headers/linux/ |
| A D | virtio_crypto.h | 90 uint32_t keylen; member 227 uint32_t keylen; member
|
| /qemu/include/sysemu/ |
| A D | cryptodev.h | 99 uint32_t keylen; member
|