Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 21 of 21) sorted by relevance

/qemu/tests/unit/
A Dtest-crypto-akcipher.c667 size_t keylen; member
697 .keylen = sizeof(rsa1024_public_key),
705 .keylen = sizeof(rsa1024_private_key),
713 .keylen = sizeof(rsa2048_public_key),
721 .keylen = sizeof(rsa2048_private_key),
729 .keylen = sizeof(rsa_public_key_lack_element),
736 .keylen = sizeof(rsa_private_key_lack_element),
743 .keylen = sizeof(rsa_public_key_empty_element),
757 .keylen = 0,
764 .keylen = 0,
[all …]
A Dtest-crypto-xts.c33 int keylen; member
348 AES_set_encrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.enc); in test_xts()
349 AES_set_decrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.dec); in test_xts()
350 AES_set_encrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.enc); in test_xts()
351 AES_set_decrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.dec); in test_xts()
384 AES_set_encrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.enc); in test_xts_split()
385 AES_set_decrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.dec); in test_xts_split()
386 AES_set_encrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.enc); in test_xts_split()
387 AES_set_decrypt_key(data->key2, data->keylen / 2 * 8, &aestweak.dec); in test_xts_split()
429 AES_set_encrypt_key(data->key1, data->keylen / 2 * 8, &aesdata.enc); in test_xts_unaligned()
[all …]
/qemu/crypto/
A Drsakey-builtin.c.inc70 const uint8_t *key, size_t keylen, Error **errp)
77 decode_ret = qcrypto_der_decode_seq(&key, &keylen,
79 if (decode_ret < 0 || keylen != 0) {
117 const uint8_t *key, size_t keylen, Error **errp)
125 decode_ret = qcrypto_der_decode_seq(&key, &keylen, extract_seq_content,
127 if (decode_ret < 0 || keylen != 0) {
183 size_t keylen, Error **errp)
187 return qcrypto_builtin_rsa_private_key_parse(key, keylen, errp);
190 return qcrypto_builtin_rsa_public_key_parse(key, keylen, errp);
A Drsakey-nettle.c.inc59 const uint8_t *key, size_t keylen, Error **errp)
67 if (asn1_der_iterator_first(&i, keylen, key) != ASN1_ITERATOR_CONSTRUCTED ||
120 const uint8_t *key, size_t keylen, Error **errp)
126 if (asn1_der_iterator_first(&i, keylen, key) != ASN1_ITERATOR_CONSTRUCTED ||
145 size_t keylen, Error **errp)
149 return qcrypto_nettle_rsa_private_key_parse(key, keylen, errp);
152 return qcrypto_nettle_rsa_public_key_parse(key, keylen, errp);
A Dakcipher.c35 const uint8_t *key, size_t keylen, in qcrypto_akcipher_new() argument
113 uint8_t *key, size_t keylen, in qcrypto_akcipher_export_p8info() argument
119 qcrypto_akcipher_rsakey_export_p8info(key, keylen, dst, dst_len); in qcrypto_akcipher_export_p8info()
A Dakcipher-nettle.c.inc55 const uint8_t *key, size_t keylen,
60 const uint8_t *key, size_t keylen,
65 return qcrypto_nettle_rsa_new(&opts->u.rsa, type, key, keylen, errp);
86 size_t keylen,
90 QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE, key, keylen, errp);
136 size_t keylen,
140 QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, key, keylen, errp);
388 const uint8_t *key, size_t keylen,
401 if (qcrypt_nettle_parse_rsa_private_key(rsa, key, keylen, errp) != 0) {
407 if (qcrypt_nettle_parse_rsa_public_key(rsa, key, keylen, errp) != 0) {
A Drsakey.h84 const uint8_t *key, size_t keylen, Error **errp);
92 size_t keylen,
A Drsakey.c53 size_t keylen, in qcrypto_akcipher_rsakey_export_p8info() argument
73 qcrypto_der_encode_octet_str(ctx, key, keylen); in qcrypto_akcipher_rsakey_export_p8info()
A Dsecret_common.c41 size_t keylen, ciphertextlen, ivlen; in qcrypto_secret_decrypt() local
49 &key, &keylen, in qcrypto_secret_decrypt()
54 if (keylen != 32) { in qcrypto_secret_decrypt()
76 key, keylen, in qcrypto_secret_decrypt()
A Dakcipher-gcrypt.c.inc53 const uint8_t *key, size_t keylen,
58 const uint8_t *key, size_t keylen,
64 &opts->u.rsa, type, key, keylen, errp);
85 const uint8_t *key, size_t keylen, Error **errp)
88 QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE, key, keylen, errp);
176 size_t keylen,
181 QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, key, keylen, errp);
534 const uint8_t *key, size_t keylen,
544 if (qcrypto_gcrypt_parse_rsa_private_key(rsa, key, keylen, errp) != 0) {
550 if (qcrypto_gcrypt_parse_rsa_public_key(rsa, key, keylen, errp) != 0) {
A Dblock-luks.c271 size_t keylen = qcrypto_cipher_get_key_len(cipher); in qcrypto_block_luks_essiv_cipher() local
272 if (digestlen == keylen) { in qcrypto_block_luks_essiv_cipher()
/qemu/tests/bench/
A Dbenchmark-crypto-akcipher.c22 size_t keylen, in create_rsa_akcipher() argument
32 priv_key, keylen, &error_abort); in create_rsa_akcipher()
35 static void test_rsa_speed(const uint8_t *priv_key, size_t keylen, in test_rsa_speed() argument
46 create_rsa_akcipher(priv_key, keylen, PADDING, HASH); in test_rsa_speed()
/qemu/tests/qemu-iotests/
A D14937 def __init__(self, name, cipher, keylen, mode, ivgen, argument
42 self.keylen = keylen
164 args.extend(["--key-size", str(config.keylen * 2)])
166 args.extend(["--key-size", str(config.keylen)])
251 "cipher-alg=%s-%d" % (config.cipher, config.keylen),
/qemu/include/hw/xen/interface/io/
A Dnetif.h303 unsigned int keylen, in xen_netif_toeplitz_hash() argument
314 prefix |= (keyi < keylen) ? key[keyi] : 0; in xen_netif_toeplitz_hash()
332 prefix |= (keyi < keylen) ? key[keyi] : 0; in xen_netif_toeplitz_hash()
/qemu/backends/
A Dcryptodev-lkcf.c66 size_t keylen; member
327 session->key, session->keylen, in cryptodev_lkcf_execute_task()
346 session->key, session->keylen, in cryptodev_lkcf_execute_task()
556 sess->keylen = sess_info->keylen; in cryptodev_lkcf_create_asym_session()
557 sess->key = g_malloc(sess_info->keylen); in cryptodev_lkcf_create_asym_session()
558 memcpy(sess->key, sess_info->key, sess_info->keylen); in cryptodev_lkcf_create_asym_session()
A Dcryptodev-builtin.c357 sess_info->keylen, errp); in cryptodev_builtin_create_akcipher_session()
/qemu/hw/virtio/
A Dvirtio-crypto.c82 info->key_len = ldl_le_p(&cipher_para->keylen); in virtio_crypto_cipher_session_helper()
206 uint32_t algo, keytype, keylen; in virtio_crypto_create_asym_session() local
211 keylen = ldl_le_p(&sess_req->para.keylen); in virtio_crypto_create_asym_session()
219 if (keylen) { in virtio_crypto_create_asym_session()
220 asym_info->key = g_malloc(keylen); in virtio_crypto_create_asym_session()
221 if (iov_to_buf(iov, out_num, 0, asym_info->key, keylen) != keylen) { in virtio_crypto_create_asym_session()
225 iov_discard_front(&iov, &out_num, keylen); in virtio_crypto_create_asym_session()
231 asym_info->keylen = keylen; in virtio_crypto_create_asym_session()
A Dvhost-user.c2551 size_t keylen; in vhost_user_crypto_create_session() local
2555 if (sess->keylen) { in vhost_user_crypto_create_session()
2556 keylen = sizeof(msg.payload.session.u.asym.key); in vhost_user_crypto_create_session()
2557 if (sess->keylen > keylen) { in vhost_user_crypto_create_session()
2563 sess->keylen); in vhost_user_crypto_create_session()
2567 size_t keylen; in vhost_user_crypto_create_session() local
2572 keylen = sizeof(msg.payload.session.u.sym.key); in vhost_user_crypto_create_session()
2573 if (sess->key_len > keylen) { in vhost_user_crypto_create_session()
2583 keylen = sizeof(msg.payload.session.u.sym.auth_key); in vhost_user_crypto_create_session()
2584 if (sess->auth_key_len > keylen) { in vhost_user_crypto_create_session()
/qemu/include/crypto/
A Dakcipher.h173 uint8_t *key, size_t keylen,
/qemu/include/standard-headers/linux/
A Dvirtio_crypto.h90 uint32_t keylen; member
227 uint32_t keylen; member
/qemu/include/sysemu/
A Dcryptodev.h99 uint32_t keylen; member

Completed in 62 milliseconds