/optee_os/core/arch/arm/crypto/ |
A D | aes_modes_armv8a_ce_a32.S | 25 enc_round q0, \key2 30 dec_round q0, \key2 35 aese.8 q0, \key2 41 aesd.8 q0, \key2 49 enc_round q0, \key2 67 aese.8 q0, \key2 68 aese.8 q1, \key2 69 aese.8 q2, \key2 79 aesd.8 q0, \key2 80 aesd.8 q1, \key2 [all …]
|
A D | aes_armv8a_ce.c | 223 unsigned int block_count, const void *key2, in crypto_accel_aes_xts_enc() argument 228 assert(out && in && key1 && key2 && tweak); in crypto_accel_aes_xts_enc() 231 ce_aes_xts_encrypt(out, in, key1, round_count, block_count, key2, in crypto_accel_aes_xts_enc() 238 unsigned int block_count, const void *key2, in crypto_accel_aes_xts_dec() argument 243 assert(out && in && key1 && key2 && tweak); in crypto_accel_aes_xts_dec() 246 ce_aes_xts_decrypt(out, in, key1, round_count, block_count, key2, in crypto_accel_aes_xts_dec()
|
/optee_os/core/lib/libtomcrypt/src/modes/xts/ |
A D | xts_init.c | 27 int xts_start(int cipher, const unsigned char *key1, const unsigned char *key2, unsigned long keyle… in xts_start() argument 34 LTC_ARGCHK(key2 != NULL); in xts_start() 50 if ((err = cipher_descriptor[cipher]->setup(key2, keylen, num_rounds, &xts->key2)) != CRYPT_OK) { in xts_start()
|
A D | xts_decrypt.c | 96 …= cipher_descriptor[xts->cipher]->accel_xts_decrypt(ct, pt, lim, tweak, &xts->key1, &xts->key2)) != in xts_decrypt() 107 if ((err = cipher_descriptor[xts->cipher]->ecb_encrypt(tweak, T, &xts->key2)) != CRYPT_OK) { in xts_decrypt() 146 if ((err = cipher_descriptor[xts->cipher]->ecb_decrypt(T, tweak, &xts->key2)) != CRYPT_OK) { in xts_decrypt()
|
A D | xts_encrypt.c | 98 …= cipher_descriptor[xts->cipher]->accel_xts_encrypt(pt, ct, lim, tweak, &xts->key1, &xts->key2)) != in xts_encrypt() 110 if ((err = cipher_descriptor[xts->cipher]->ecb_encrypt(tweak, T, &xts->key2)) != CRYPT_OK) { in xts_encrypt() 147 if ((err = cipher_descriptor[xts->cipher]->ecb_decrypt(T, tweak, &xts->key2)) != CRYPT_OK) { in xts_encrypt()
|
A D | xts_test.c | 34 XMEMCPY(&xts.key2, skey2, sizeof(symmetric_key)); in _xts_test_accel_xts_encrypt() 61 XMEMCPY(&xts.key2, skey2, sizeof(symmetric_key)); in _xts_test_accel_xts_decrypt() 84 unsigned char key2[32]; in xts_test() 237 err = xts_start(idx, tests[i].key1, tests[i].key2, tests[i].keylen / 2, 0, &xts); in xts_test()
|
A D | xts_done.c | 25 cipher_descriptor[xts->cipher]->done(&xts->key2); in xts_done()
|
/optee_os/core/drivers/crypto/crypto_api/cipher/ |
A D | cipher.c | 76 size_t key1_len, const uint8_t *key2, in cipher_init() argument 82 if ((!key1 && key1_len) || (!key2 && key2_len) || (!iv && iv_len)) { in cipher_init() 96 .key2.data = (uint8_t *)key2, in cipher_init() 97 .key2.length = key2_len, in cipher_init()
|
/optee_os/core/drivers/crypto/caam/cipher/ |
A D | caam_cipher.c | 181 ctx->key2.length)); in caam_cipher_block() 182 caam_desc_add_ptr(desc, ctx->key2.paddr); in caam_cipher_block() 346 caam_free_buf(&ctx->key2); in do_free_intern() 395 if (src->key2.length) { in caam_cipher_copy_state() 396 struct drvcrypt_buf key2 = { in caam_cipher_copy_state() local 397 .data = src->key2.data, in caam_cipher_copy_state() 398 .length = src->key2.length in caam_cipher_copy_state() 400 copy_ctx_data(&dst->key2, &key2); in caam_cipher_copy_state() 457 if (!dinit->key2.data || !dinit->key2.length) in caam_cipher_initialize() 460 retstatus = do_check_keysize(&alg->def_key, dinit->key2.length); in caam_cipher_initialize() [all …]
|
A D | local.h | 52 struct caambuf key2; /* Second Key */ member
|
/optee_os/core/include/crypto/ |
A D | crypto_accel.h | 36 unsigned int block_count, const void *key2, 40 unsigned int block_count, const void *key2,
|
/optee_os/core/drivers/crypto/se050/core/ |
A D | cipher.c | 26 dinit->key2.data, dinit->key2.length, in do_init()
|
/optee_os/core/pta/tests/ |
A D | aes_perf.c | 57 const uint8_t *key2 = NULL; in init_ctx() local 73 key2 = aes_key2; in init_ctx() 98 res = crypto_cipher_init(*ctx, mode, aes_key, key_len, key2, in init_ctx()
|
/optee_os/core/crypto/ |
A D | aes-cts.c | 51 size_t key1_len, const uint8_t *key2, in cts_init() argument 59 res = crypto_cipher_init(c->ecb, mode, key1, key1_len, key2, key2_len, in cts_init() 64 return crypto_cipher_init(c->cbc, mode, key1, key1_len, key2, key2_len, in cts_init()
|
A D | sm4-ecb.c | 32 size_t key1_len, const uint8_t *key2 __unused, in sm4_ecb_init()
|
A D | sm4-ctr.c | 35 const uint8_t *key2 __unused, in sm4_ctr_init()
|
A D | sm4-cbc.c | 34 size_t key1_len, const uint8_t *key2 __unused, in sm4_cbc_init()
|
/optee_os/lib/libutee/ |
A D | tee_api_operations.c | 21 TEE_ObjectHandle key2; member 322 &op->key2); in TEE_AllocateOperation() 361 TEE_FreeTransientObject(op->key2); in TEE_AllocateOperation() 613 if (!key1 && !key2) { in TEE_SetOperationKey2() 616 TEE_ResetTransientObject(operation->key2); in TEE_SetOperationKey2() 619 } else if (!key1 || !key2) { in TEE_SetOperationKey2() 650 res = TEE_GetObjectInfo1(key2, &key_info2); in TEE_SetOperationKey2() 687 TEE_ResetTransientObject(operation->key2); in TEE_SetOperationKey2() 693 res = TEE_CopyObjectAttributes1(operation->key2, key2); in TEE_SetOperationKey2() 727 TEE_ObjectHandle key2 = TEE_HANDLE_NULL; in TEE_CopyOperation() local [all …]
|
/optee_os/core/lib/libtomcrypt/ |
A D | xts.c | 37 size_t key1_len, const uint8_t *key2 __unused, in ltc_xts_init() 63 if (xts_start(c->cipher_idx, key1, key2, key1_len, 0, in ltc_xts_init()
|
A D | ctr.c | 33 size_t key1_len, const uint8_t *key2 __unused, in ltc_ctr_init()
|
/optee_os/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_cipher.h | 29 struct drvcrypt_buf key2; /* Second key */ member
|
/optee_os/ta/pkcs11/src/ |
A D | pkcs11_attributes.h | 141 struct obj_attrs *key2);
|
/optee_os/core/tee/ |
A D | tee_svc_cryp.c | 49 vaddr_t key2; member 2183 if (key2 != 0) { in syscall_cryp_state_alloc() 2214 if (key1 == 0 || key2 != 0) { in syscall_cryp_state_alloc() 2223 if (key1 == 0 || key2 != 0) { in syscall_cryp_state_alloc() 2232 if (key1 != 0 || key2 != 0) { in syscall_cryp_state_alloc() 2247 if (key1 == 0 || key2 != 0) in syscall_cryp_state_alloc() 2252 if (key1 == 0 || key2 == 0) in syscall_cryp_state_alloc() 2255 if (key1 == 0 || key2 != 0) in syscall_cryp_state_alloc() 2277 cs->key2 = (vaddr_t)o2; in syscall_cryp_state_alloc() 2572 (uint8_t *)(key2 + 1), key2->key_size, in syscall_cipher_init() [all …]
|
/optee_os/lib/libmbedtls/core/ |
A D | des_ecb.c | 34 const uint8_t *key2 __unused, in mbed_des_ecb_init()
|
A D | des3_ecb.c | 34 const uint8_t *key2 __unused, in mbed_des3_ecb_init()
|