Home
last modified time | relevance | path

Searched refs:KEY (Results 1 – 25 of 27) sorted by relevance

12

/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/host/src/tests/integration_cc3x/runtime_integration_test/tests/
Drun_integration_ccm.c46 …static const uint8_t KEY[16] = { 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a,… in runIt_ccmStarEncOnly() local
73 RUNIT_ASSERT_API(mbedtls_ccm_setkey(pCtx, MBEDTLS_CIPHER_ID_AES, KEY, 8 * sizeof(KEY)) == 0); in runIt_ccmStarEncOnly()
97 … (uint32_t)8 * sizeof(KEY), (uint32_t)sizeof(AD), (uint32_t)sizeof(MSG), (uint32_t)TAG_LEN); in runIt_ccmStarEncOnly()
106 …static const uint8_t KEY[16] = { 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a,… in runIt_ccmStar() local
133 RUNIT_ASSERT_API(mbedtls_ccm_setkey(pCtx, MBEDTLS_CIPHER_ID_AES, KEY, 8 * sizeof(KEY)) == 0); in runIt_ccmStar()
157 … (uint32_t)8 * sizeof(KEY), (uint32_t)sizeof(AD), (uint32_t)sizeof(MSG), (uint32_t)TAG_LEN); in runIt_ccmStar()
166 …static const uint8_t KEY[16] = { 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a,… in runIt_ccm() local
186 RUNIT_ASSERT_API(mbedtls_ccm_setkey(pCtx, MBEDTLS_CIPHER_ID_AES, KEY, 8 * sizeof(KEY)) == 0); in runIt_ccm()
210 … (uint32_t)8 * sizeof(KEY), (uint32_t)sizeof(AD), (uint32_t)sizeof(MSG)); in runIt_ccm()
Drun_integration_aes.c63 …static const uint8_t KEY[] = { 0x60, 0x3D, 0xEB, 0x10, 0x15, 0xCA, 0x71, 0xBE, 0x2B, 0x73, 0xAE, 0… in runIt_aesOfbTest() local
77 memcpy(key, KEY, sizeof(key)); in runIt_aesOfbTest()
133 …static const uint8_t KEY[] = { 0x60, 0x3D, 0xEB, 0x10, 0x15, 0xCA, 0x71, 0xBE, 0x2B, 0x73, 0xAE, 0… in runIt_aesCtrTestProfiling() local
157 memcpy(key, KEY, sizeof(key)); in runIt_aesCtrTestProfiling()
191 …static const uint8_t KEY[] = { 0x60, 0x3D, 0xEB, 0x10, 0x15, 0xCA, 0x71, 0xBE, 0x2B, 0x73, 0xAE, 0… in runIt_aesCtrTest() local
209 memcpy(key, KEY, sizeof(key)); in runIt_aesCtrTest()
271 …static const uint8_t KEY[] = { 0x60, 0x3D, 0xEB, 0x10, 0x15, 0xCA, 0x71, 0xBE, 0x2B, 0x73, 0xAE, 0… in runIt_aesCbcTest() local
286 memcpy(key, KEY, sizeof(key)); in runIt_aesCbcTest()
342 …static const uint8_t KEY[] = { 0x60, 0x3D, 0xEB, 0x10, 0x15, 0xCA, 0x71, 0xBE, 0x2B, 0x73, 0xAE, 0… in runIt_aesEcbTest() local
356 memcpy(key, KEY, sizeof(key)); in runIt_aesEcbTest()
Drun_integration_ext_dma.c50 …static const uint8_t KEY[] = { 0x60, 0x3D, 0xEB, 0x10, 0x15, 0xCA, 0x71, 0xBE, 0x2B, 0x73, 0xAE, 0… in runIt_extDma() local
56 size_t keySize = sizeof(KEY); in runIt_extDma()
82 memcpy(keyBuff, KEY, sizeof(keyBuff)); in runIt_extDma()
Drun_integration_chacha.c263 …uint8_t KEY[] = {0X85, 0Xd6, 0Xbe, 0X78, 0X57, 0X55, 0X6d, 0X33, 0X7f, 0X44, 0X52, 0Xfe, 0X42, 0Xd… in runIt_Poly() local
279 ALLOC(keyPtr, pKey, sizeof(KEY)); in runIt_Poly()
283 memcpy(pKey, KEY, sizeof(mbedtls_poly_key)); in runIt_Poly()
/trusted-firmware-m-3.7.0/platform/ext/target/cypress/psoc64/security/keys/
DTFM_S_KEY_PRIV.pem1 -----BEGIN PRIVATE KEY-----
5 -----END PRIVATE KEY-----
DTFM_NS_KEY_PRIV.pem1 -----BEGIN PRIVATE KEY-----
5 -----END PRIVATE KEY-----
/trusted-firmware-m-3.7.0/bl2/ext/mcuboot/
Droot-EC-P256_1.pem1 -----BEGIN EC PRIVATE KEY-----
5 -----END EC PRIVATE KEY-----
Droot-EC-P384.pem1 -----BEGIN EC PRIVATE KEY-----
6 -----END EC PRIVATE KEY-----
Droot-EC-P256.pem1 -----BEGIN EC PRIVATE KEY-----
5 -----END EC PRIVATE KEY-----
Droot-EC-P384_1.pem1 -----BEGIN EC PRIVATE KEY-----
6 -----END EC PRIVATE KEY-----
Droot-RSA-2048_1.pem1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
Droot-RSA-2048.pem1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
Droot-RSA-3072.pem1 -----BEGIN RSA PRIVATE KEY-----
39 -----END RSA PRIVATE KEY-----
Droot-RSA-3072_1.pem1 -----BEGIN RSA PRIVATE KEY-----
39 -----END RSA PRIVATE KEY-----
/trusted-firmware-m-3.7.0/platform/ext/common/template/
Dtfm_initial_attestation_key.pem1 -----BEGIN EC PRIVATE KEY-----
5 -----END EC PRIVATE KEY-----
/trusted-firmware-m-3.7.0/lib/ext/t_cose/test/keys/
Dprime256v1.pem4 -----BEGIN EC PRIVATE KEY-----
8 -----END EC PRIVATE KEY-----
Dsecp384r1.pem4 -----BEGIN EC PRIVATE KEY-----
9 -----END EC PRIVATE KEY-----
Dsecp521r1.pem4 -----BEGIN EC PRIVATE KEY-----
10 -----END EC PRIVATE KEY-----
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/icv_key_response/examples/
Ddmpu_icv_key_response.cfg9 # [DMPU-ICV-KEY-RES-CFG] Mandatory header.
15 [DMPU-ICV-KEY-RES-CFG]
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/oem_key_request/examples/
Ddmpu_oem_key_request.cfg9 # [DMPU-OEM-KEY-REQ-CFG] Mandatory header.
15 [DMPU-OEM-KEY-REQ-CFG]
/trusted-firmware-m-3.7.0/cmake/
Dremote_library.cmake140 # [in] KEY - option name
141 # [out] KEY_VAR - name of variable that is set to ${KEY} on exit if value is not
143 # [out] VALUE_VAR - name of variable that is set to option value for ${KEY}.
145 # Function looks for key/value pair specified by ${KEY} variable in
146 # this list. Function removes key/value pair specified by ${KEY} on
170 function(extract_key_value KEY KEY_VAR VALUE_VAR ARG_LIST_VAR)
171 list(FIND ${ARG_LIST_VAR} ${KEY} KEY_INDEX)
173 # Variable has been set, remove KEY
179 message(FATAL_ERROR "Missing option value for ${KEY}")
192 set(${KEY_VAR} ${KEY} PARENT_SCOPE)
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_boot_cert/examples/key_cert/
Dsb_key_cert.cfg9 # [KEY-CFG] Mandatory header.
22 [KEY-CFG]
Dsb_key_cert_hbk0.cfg9 # [KEY-CFG] Mandatory header.
22 [KEY-CFG]
Dsb_key_cert_hbk1.cfg9 # [KEY-CFG] Mandatory header.
22 [KEY-CFG]
/trusted-firmware-m-3.7.0/platform/ext/target/nuvoton/common/bsp/StdDriver/src/
Dkeystore.c98 au32Key[offset + i] = KS->KEY[i]; in KS_Read()
224 KS->KEY[i] = au32Key[offset + i]; in KS_Write()
492 KS->KEY[i] = au32Key[offset + i]; in KS_WriteOTP()

12