/optee_test/scripts/ |
A D | rsp_to_gcm_test.py | 22 def generate_case(outf, myvars, mode): argument 33 outf.write('{ TEE_ALG_AES_GCM, ' + mode + ', TEE_TYPE_AES,\n') 76 if args.mode == "encrypt": 77 mode = "TEE_MODE_ENCRYPT" 79 mode = "TEE_MODE_DECRYPT" 98 generate_case(outf, myvars, mode) 112 generate_case(outf, myvars, mode)
|
/optee_test/host/xtest/gp/patches/ |
A D | 0002-TTAs-add-files-needed-to-compile.patch | 141 new file mode 100644 151 new file mode 100644 159 new file mode 100644 168 new file mode 100644 215 new file mode 100644 223 new file mode 100644 232 new file mode 100644 274 new file mode 100644 325 new file mode 100644 333 new file mode 100644 [all …]
|
/optee_test/host/xtest/ |
A D | benchmark_2000.c | 70 int mode = TA_AES_ECB; /* AES mode */ in xtest_tee_benchmark_2011() local 75 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2011() 84 int mode = TA_AES_CBC; /* AES mode */ in xtest_tee_benchmark_2012() local 89 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2012()
|
A D | aes_perf.c | 166 static const char *mode_str(uint32_t mode) in mode_str() argument 168 switch (mode) { in mode_str() 363 op.params[1].value.a = mode; in prepare_key() 459 prepare_key(decrypt, keysize, mode); in aes_perf_run_test() 477 mode_str(mode), (decrypt ? "de" : "en"), keysize, size); in aes_perf_run_test() 557 int mode = TA_AES_ECB; /* AES mode (-m) */ in aes_perf_runner_cmd_parser() local 593 mode = TA_AES_ECB; in aes_perf_runner_cmd_parser() 595 mode = TA_AES_CBC; in aes_perf_runner_cmd_parser() 597 mode = TA_AES_CTR; in aes_perf_runner_cmd_parser() 599 mode = TA_AES_XTS; in aes_perf_runner_cmd_parser() [all …]
|
A D | crypto_common.h | 43 void aes_perf_run_test(int mode, int keysize, int decrypt, size_t size,
|
A D | xtest_helpers.h | 48 uint32_t mode,
|
A D | regression_4000.c | 1954 uint32_t mode; member 2203 ciph_cases[n].algo, ciph_cases[n].mode, in xtest_tee_test_4003() 2209 ciph_cases[n].algo, ciph_cases[n].mode, in xtest_tee_test_4003() 2376 uint32_t mode; member 2489 ae_cases[n].algo, ae_cases[n].mode, in xtest_tee_test_4005() 2495 ae_cases[n].algo, ae_cases[n].mode, in xtest_tee_test_4005() 2545 if (ae_cases[n].mode == TEE_MODE_ENCRYPT) { in xtest_tee_test_4005() 2679 TEE_OperationMode mode; member 2757 XTEST_AC_CASE(level, algo, mode, vect, \ 3654 if (tv->mode == TEE_MODE_VERIFY || tv->mode == TEE_MODE_SIGN) { in xtest_tee_test_4006() [all …]
|
A D | xtest_helpers.c | 44 uint32_t algo, uint32_t mode, in ta_crypt_cmd_allocate_operation() argument 53 op.params[1].value.a = mode; in ta_crypt_cmd_allocate_operation()
|
A D | pkcs11_1000.c | 1275 CK_MECHANISM_PTR mechanism, uint32_t mode, in cipher_init_final() argument 1282 switch (mode) { in cipher_init_final() 1294 if (mode == TEE_MODE_ENCRYPT) in cipher_init_final() 1296 if (mode == TEE_MODE_DECRYPT) in cipher_init_final() 1311 if (mode == TEE_MODE_ENCRYPT) in cipher_init_final() 1313 if (mode == TEE_MODE_DECRYPT) in cipher_init_final() 1473 CK_MECHANISM_PTR mechanism, uint32_t mode) in open_cipher_session() argument 1479 switch (mode) { in open_cipher_session() 1500 if (mode == TEE_MODE_ENCRYPT) in open_cipher_session() 1502 if (mode == TEE_MODE_DECRYPT) in open_cipher_session()
|
A D | regression_1000.c | 604 static FILE *open_ta_file(const TEEC_UUID *uuid, const char *mode) in open_ta_file() argument 616 return fopen(buf, mode); in open_ta_file()
|
A D | LICENSE | 313 when it starts in an interactive mode:
|
/optee_test/host/openssl/include/openssl/ |
A D | crypto.h | 369 int CRYPTO_mem_ctrl(int mode); 436 void CRYPTO_lock(int mode, int type, const char *file, int line); 437 void CRYPTO_set_locking_callback(void (*func) (int mode, int type, 439 void (*CRYPTO_get_locking_callback(void)) (int mode, int type, 479 (int mode, 487 void (*CRYPTO_get_dynlock_lock_callback(void)) (int mode,
|
A D | bio.h | 496 # define BIO_set_bind_mode(b,mode) BIO_ctrl(b,BIO_C_SET_BIND_MODE,mode,NULL) argument 497 # define BIO_get_bind_mode(b,mode) BIO_ctrl(b,BIO_C_GET_BIND_MODE,0,NULL) argument 655 BIO *BIO_new_file(const char *filename, const char *mode); 748 int BIO_socket_nbio(int fd, int mode); 751 int BIO_get_accept_socket(char *host_port, int mode);
|
A D | ssl.h | 1032 unsigned long mode; member 1585 unsigned long mode; member 2170 void SSL_set_verify(SSL *s, int mode, 2262 void SSL_CTX_set_verify(SSL_CTX *ctx, int mode, 2434 void SSL_CTX_set_quiet_shutdown(SSL_CTX *ctx, int mode); 2436 void SSL_set_quiet_shutdown(SSL *ssl, int mode); 2438 void SSL_set_shutdown(SSL *ssl, int mode);
|
A D | pkcs12.h | 224 PKCS12 *PKCS12_init(int mode);
|
A D | pem.h | 169 int mode; member
|
A D | evp.h | 995 int EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode);
|
/optee_test/ta/aes_perf/ |
A D | ta_aes_perf.c | 176 uint32_t mode = 0; in cmd_prepare_key() local 205 mode = params[0].value.a ? TEE_MODE_DECRYPT : TEE_MODE_ENCRYPT; in cmd_prepare_key() 237 res = TEE_AllocateOperation(&crypto_op, algo, mode, op_keysize); in cmd_prepare_key()
|
/optee_test/ta/os_test/include/ |
A D | testframework.h | 44 char *TEE_BigIntConvertToString(char *dest, int mode, const TEE_BigInt *src);
|
/optee_test/host/xtest/gp/include/ |
A D | xml_crypto_api.h | 901 uint32_t mode; member 985 saved_alloc.mode = 0; in crypto_reset() 1060 uint32_t mode, in Invoke_Crypto_AllocateOperation() argument 1070 op.params[0].value.b = mode; in Invoke_Crypto_AllocateOperation() 1084 saved_alloc.mode = mode; in Invoke_Crypto_AllocateOperation() 1110 .mode = op.params[1].value.a, in Invoke_Crypto_GetOperationInfo() 1164 d->mode = get_be32(b + 8); in Invoke_Crypto_GetOperationInfoMultiple() 1190 ADBG_EXPECT(c, _mode, saved_op_mult_info->mode); \ 1217 ADBG_EXPECT(c, _mode, saved_op_info.mode); \
|