| /optee_os/core/lib/libtomcrypt/src/encauth/gcm/ |
| H A D | gcm_gf_mult.c | 112 LTC_FAST_TYPE B[16][WPV], tmp[32 / sizeof(LTC_FAST_TYPE)], pB[16 / sizeof(LTC_FAST_TYPE)], zz, z; in gcm_gf_mult() local 116 zeromem(B[0], sizeof(B[0])); in gcm_gf_mult() 117 zeromem(B[M(1)], sizeof(B[M(1)])); in gcm_gf_mult() 121 LOAD32H(B[M(1)][i], a + (i<<2)); in gcm_gf_mult() 126 LOAD64H(B[M(1)][i], a + (i<<3)); in gcm_gf_mult() 132 B[M(2)][0] = B[M(1)][0] >> 1; in gcm_gf_mult() 133 B[M(4)][0] = B[M(1)][0] >> 2; in gcm_gf_mult() 134 B[M(8)][0] = B[M(1)][0] >> 3; in gcm_gf_mult() 136 B[M(2)][i] = (B[M(1)][i-1] << (BPD-1)) | (B[M(1)][i] >> 1); in gcm_gf_mult() 137 B[M(4)][i] = (B[M(1)][i-1] << (BPD-2)) | (B[M(1)][i] >> 2); in gcm_gf_mult() [all …]
|
| H A D | gcm_init.c | 24 unsigned char B[16]; in gcm_init() local 52 zeromem(B, 16); in gcm_init() 53 if ((err = cipher_descriptor[cipher]->ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) { in gcm_init() 71 zeromem(B, 16); in gcm_init() 73 B[0] = y; in gcm_init() 74 gcm_gf_mult(gcm->H, B, &gcm->PC[0][y][0]); in gcm_init()
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/ |
| H A D | rc5.c | 51 ulong32 L[64], *S, A, B, i, j, v, s, t, l; in s_rc5_setup() local 94 for (A = B = i = j = v = 0; v < s; v++) { in s_rc5_setup() 95 A = S[i] = ROLc(S[i] + A + B, 3); in s_rc5_setup() 96 B = L[j] = ROL(L[j] + A + B, (A+B)); in s_rc5_setup() 126 ulong32 A, B; in s_rc5_ecb_encrypt() local 138 LOAD32L(B, &pt[4]); in s_rc5_ecb_encrypt() 140 B += skey->rc5.K[1]; in s_rc5_ecb_encrypt() 145 A = ROL(A ^ B, B) + K[0]; in s_rc5_ecb_encrypt() 146 B = ROL(B ^ A, A) + K[1]; in s_rc5_ecb_encrypt() 147 A = ROL(A ^ B, B) + K[2]; in s_rc5_ecb_encrypt() [all …]
|
| H A D | blowfish.c | 373 ulong32 x, y, A, B[2]; in blowfish_expand() local 388 B[0] = 0; in blowfish_expand() 389 B[1] = 0; in blowfish_expand() 392 B[0] ^= s_blowfish_stream2word(data, datalen, &i); in blowfish_expand() 393 B[1] ^= s_blowfish_stream2word(data, datalen, &i); in blowfish_expand() 396 s_blowfish_encipher(&B[0], &B[1], skey); in blowfish_expand() 398 skey->blowfish.K[x] = B[0]; in blowfish_expand() 399 skey->blowfish.K[x+1] = B[1]; in blowfish_expand() 406 B[0] ^= s_blowfish_stream2word(data, datalen, &i); in blowfish_expand() 407 B[1] ^= s_blowfish_stream2word(data, datalen, &i); in blowfish_expand() [all …]
|
| H A D | xtea.c | 51 skey->xtea.B[x] = (sum + K[(sum>>11)&3]) & 0xFFFFFFFFUL; in xtea_setup() 81 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 84 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+1])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 87 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+2])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 90 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+3])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 116 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt() 119 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r-1])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt() 122 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r-2])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt() 125 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r-3])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | md5.c | 68 uint32_t X[16], A, B, C, D; in mbedtls_internal_md5_process() member 99 local.B = ctx->state[1]; in mbedtls_internal_md5_process() 105 P(local.A, local.B, local.C, local.D, 0, 7, 0xD76AA478); in mbedtls_internal_md5_process() 106 P(local.D, local.A, local.B, local.C, 1, 12, 0xE8C7B756); in mbedtls_internal_md5_process() 107 P(local.C, local.D, local.A, local.B, 2, 17, 0x242070DB); in mbedtls_internal_md5_process() 108 P(local.B, local.C, local.D, local.A, 3, 22, 0xC1BDCEEE); in mbedtls_internal_md5_process() 109 P(local.A, local.B, local.C, local.D, 4, 7, 0xF57C0FAF); in mbedtls_internal_md5_process() 110 P(local.D, local.A, local.B, local.C, 5, 12, 0x4787C62A); in mbedtls_internal_md5_process() 111 P(local.C, local.D, local.A, local.B, 6, 17, 0xA8304613); in mbedtls_internal_md5_process() 112 P(local.B, local.C, local.D, local.A, 7, 22, 0xFD469501); in mbedtls_internal_md5_process() [all …]
|
| H A D | sha1.c | 69 uint32_t temp, W[16], A, B, C, D, E; in mbedtls_internal_sha1_process() member 108 local.B = ctx->state[1]; in mbedtls_internal_sha1_process() 116 P(local.A, local.B, local.C, local.D, local.E, local.W[0]); in mbedtls_internal_sha1_process() 117 P(local.E, local.A, local.B, local.C, local.D, local.W[1]); in mbedtls_internal_sha1_process() 118 P(local.D, local.E, local.A, local.B, local.C, local.W[2]); in mbedtls_internal_sha1_process() 119 P(local.C, local.D, local.E, local.A, local.B, local.W[3]); in mbedtls_internal_sha1_process() 120 P(local.B, local.C, local.D, local.E, local.A, local.W[4]); in mbedtls_internal_sha1_process() 121 P(local.A, local.B, local.C, local.D, local.E, local.W[5]); in mbedtls_internal_sha1_process() 122 P(local.E, local.A, local.B, local.C, local.D, local.W[6]); in mbedtls_internal_sha1_process() 123 P(local.D, local.E, local.A, local.B, local.C, local.W[7]); in mbedtls_internal_sha1_process() [all …]
|
| H A D | ripemd160.c | 73 uint32_t A, B, C, D, E, Ap, Bp, Cp, Dp, Ep, X[16]; in mbedtls_internal_ripemd160_process() member 94 local.B = local.Bp = ctx->state[1]; in mbedtls_internal_ripemd160_process() 127 P2(local.A, local.B, local.C, local.D, local.E, 0, 11, 5, 8); in mbedtls_internal_ripemd160_process() 128 P2(local.E, local.A, local.B, local.C, local.D, 1, 14, 14, 9); in mbedtls_internal_ripemd160_process() 129 P2(local.D, local.E, local.A, local.B, local.C, 2, 15, 7, 9); in mbedtls_internal_ripemd160_process() 130 P2(local.C, local.D, local.E, local.A, local.B, 3, 12, 0, 11); in mbedtls_internal_ripemd160_process() 131 P2(local.B, local.C, local.D, local.E, local.A, 4, 5, 9, 13); in mbedtls_internal_ripemd160_process() 132 P2(local.A, local.B, local.C, local.D, local.E, 5, 8, 2, 15); in mbedtls_internal_ripemd160_process() 133 P2(local.E, local.A, local.B, local.C, local.D, 6, 7, 11, 15); in mbedtls_internal_ripemd160_process() 134 P2(local.D, local.E, local.A, local.B, local.C, 7, 9, 4, 5); in mbedtls_internal_ripemd160_process() [all …]
|
| H A D | aes.c | 119 V(A5, 63, 63, C6), V(84, 7C, 7C, F8), V(99, 77, 77, EE), V(8D, 7B, 7B, F6), \ 120 V(0D, F2, F2, FF), V(BD, 6B, 6B, D6), V(B1, 6F, 6F, DE), V(54, C5, C5, 91), \ 121 V(50, 30, 30, 60), V(03, 01, 01, 02), V(A9, 67, 67, CE), V(7D, 2B, 2B, 56), \ 124 V(15, FA, FA, EF), V(EB, 59, 59, B2), V(C9, 47, 47, 8E), V(0B, F0, F0, FB), \ 126 V(BF, 9C, 9C, 23), V(F7, A4, A4, 53), V(96, 72, 72, E4), V(5B, C0, C0, 9B), \ 133 V(09, 07, 07, 0E), V(36, 12, 12, 24), V(9B, 80, 80, 1B), V(3D, E2, E2, DF), \ 135 V(1B, 09, 09, 12), V(9E, 83, 83, 1D), V(74, 2C, 2C, 58), V(2E, 1A, 1A, 34), \ 136 V(2D, 1B, 1B, 36), V(B2, 6E, 6E, DC), V(EE, 5A, 5A, B4), V(FB, A0, A0, 5B), \ 137 V(F6, 52, 52, A4), V(4D, 3B, 3B, 76), V(61, D6, D6, B7), V(CE, B3, B3, 7D), \ 138 V(7B, 29, 29, 52), V(3E, E3, E3, DD), V(71, 2F, 2F, 5E), V(97, 84, 84, 13), \ [all …]
|
| H A D | bignum.c | 1051 int mbedtls_mpi_add_abs(mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi *B) in mbedtls_mpi_add_abs() argument 1058 if (X == B) { in mbedtls_mpi_add_abs() 1059 const mbedtls_mpi *T = A; A = X; B = T; in mbedtls_mpi_add_abs() 1071 for (j = B->n; j > 0; j--) { in mbedtls_mpi_add_abs() 1072 if (B->p[j - 1] != 0) { in mbedtls_mpi_add_abs() 1089 c = mbedtls_mpi_core_add(p, p, B->p, j); in mbedtls_mpi_add_abs() 1112 int mbedtls_mpi_sub_abs(mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi *B) in mbedtls_mpi_sub_abs() argument 1118 for (n = B->n; n > 0; n--) { in mbedtls_mpi_sub_abs() 1119 if (B->p[n - 1] != 0) { in mbedtls_mpi_sub_abs() 1141 carry = mbedtls_mpi_core_sub(X->p, A->p, B->p, n); in mbedtls_mpi_sub_abs() [all …]
|
| H A D | bignum_mod_raw.c | 97 const mbedtls_mpi_uint *B, in mbedtls_mpi_mod_raw_sub() argument 100 mbedtls_mpi_uint c = mbedtls_mpi_core_sub(X, A, B, N->limbs); in mbedtls_mpi_mod_raw_sub() 117 const mbedtls_mpi_uint *B, in mbedtls_mpi_mod_raw_mul() argument 129 mbedtls_mpi_core_montmul(X, A, B, N->limbs, N->p, N->limbs, in mbedtls_mpi_mod_raw_mul() 133 mbedtls_mpi_core_mul(T, A, N->limbs, B, N->limbs); in mbedtls_mpi_mod_raw_mul() 181 const mbedtls_mpi_uint *B, in mbedtls_mpi_mod_raw_add() argument 185 carry = mbedtls_mpi_core_add(X, A, B, N->limbs); in mbedtls_mpi_mod_raw_add()
|
| H A D | bignum_mod.c | 165 const mbedtls_mpi_mod_residue *B, in mbedtls_mpi_mod_mul() argument 172 if (X->limbs != N->limbs || A->limbs != N->limbs || B->limbs != N->limbs) { in mbedtls_mpi_mod_mul() 181 mbedtls_mpi_mod_raw_mul(X->p, A->p, B->p, N, T); in mbedtls_mpi_mod_mul() 190 const mbedtls_mpi_mod_residue *B, in mbedtls_mpi_mod_sub() argument 193 if (X->limbs != N->limbs || A->limbs != N->limbs || B->limbs != N->limbs) { in mbedtls_mpi_mod_sub() 197 mbedtls_mpi_mod_raw_sub(X->p, A->p, B->p, N); in mbedtls_mpi_mod_sub() 293 const mbedtls_mpi_mod_residue *B, in mbedtls_mpi_mod_add() argument 296 if (X->limbs != N->limbs || A->limbs != N->limbs || B->limbs != N->limbs) { in mbedtls_mpi_mod_add() 300 mbedtls_mpi_mod_raw_add(X->p, A->p, B->p, N); in mbedtls_mpi_mod_add()
|
| H A D | bignum_mod_raw.h | 197 const mbedtls_mpi_uint *B, 231 const mbedtls_mpi_uint *B, 304 const mbedtls_mpi_uint *B,
|
| H A D | bignum_mod.h | 260 const mbedtls_mpi_mod_residue *B, 290 const mbedtls_mpi_mod_residue *B, 349 const mbedtls_mpi_mod_residue *B,
|
| H A D | bignum_core.h | 182 const mbedtls_mpi_uint *B, 357 const mbedtls_mpi_uint *B, 415 const mbedtls_mpi_uint *B, 461 const mbedtls_mpi_uint *B, size_t B_limbs); 511 const mbedtls_mpi_uint *B, size_t B_limbs,
|
| H A D | constant_time.c | 80 volatile const unsigned char *B = (volatile const unsigned char *) b; in mbedtls_ct_memcmp() local 86 uint32_t y = mbedtls_get_unaligned_volatile_uint32(B + i); in mbedtls_ct_memcmp() 95 unsigned char x = A[i], y = B[i]; in mbedtls_ct_memcmp() 130 volatile const unsigned char *B = (volatile const unsigned char *) b; in mbedtls_ct_memcmp_partial() local 135 unsigned char x = A[i], y = B[i]; in mbedtls_ct_memcmp_partial()
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/twofish/ |
| H A D | twofish.c | 139 ulong32 result, B[2], P[2]; in gf_mult() local 142 B[1] = b; in gf_mult() 143 result = P[0] = B[0] = 0; in gf_mult() 146 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 147 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 148 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 149 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 150 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 151 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 152 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/der/set/ |
| H A D | der_encode_setof.c | 19 struct edge *A = (struct edge *)a, *B = (struct edge *)b; in s_qsort_helper() local 24 r = XMEMCMP(A->start, B->start, MIN(A->size, B->size)); in s_qsort_helper() 26 if (r == 0 && A->size != B->size) { in s_qsort_helper() 27 if (A->size > B->size) { in s_qsort_helper() 28 for (x = B->size; x < A->size; x++) { in s_qsort_helper() 34 for (x = A->size; x < B->size; x++) { in s_qsort_helper() 35 if (B->start[x]) { in s_qsort_helper()
|
| H A D | der_encode_set.c | 21 ltc_asn1_list *A = (ltc_asn1_list *)a, *B = (ltc_asn1_list *)b; in s_qsort_helper() local 24 r = s_ltc_to_asn1(A->type) - s_ltc_to_asn1(B->type); in s_qsort_helper() 29 return A->used - B->used; in s_qsort_helper()
|
| /optee_os/core/arch/arm/dts/ |
| H A D | stm32mp15-pinctrl.dtsi | 55 pinmux = <STM32_PINMUX('B', 6, AF5)>; 64 pinmux = <STM32_PINMUX('B', 6, ANALOG)>; /* HDMI_CEC */ 83 <STM32_PINMUX('B', 7, AF13)>,/* DCMI_VSYNC */ 91 <STM32_PINMUX('B', 8, AF13)>,/* DCMI_D6 */ 104 <STM32_PINMUX('B', 7, ANALOG)>,/* DCMI_VSYNC */ 112 <STM32_PINMUX('B', 8, ANALOG)>,/* DCMI_D6 */ 124 <STM32_PINMUX('B', 7, AF13)>,/* DCMI_VSYNC */ 133 <STM32_PINMUX('B', 9, AF13)>;/* DCMI_D7 */ 141 <STM32_PINMUX('B', 7, ANALOG)>,/* DCMI_VSYNC */ 150 <STM32_PINMUX('B', 9, ANALOG)>;/* DCMI_D7 */ [all …]
|
| /optee_os/core/lib/libtomcrypt/src/modes/lrw/ |
| H A D | lrw_start.c | 32 unsigned char B[16]; in lrw_start() local 67 zeromem(B, 16); in lrw_start() 69 B[0] = y; in lrw_start() 70 gcm_gf_mult(tweak, B, &lrw->PC[0][y][0]); in lrw_start()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | bignum.h | 703 const mbedtls_mpi *B); 718 const mbedtls_mpi *B); 732 const mbedtls_mpi *B); 746 const mbedtls_mpi *B); 790 const mbedtls_mpi *B); 827 const mbedtls_mpi *B); 868 const mbedtls_mpi *B); 991 const mbedtls_mpi *B); 1092 void mbedtls_mpi_montmul(mbedtls_mpi *A, const mbedtls_mpi *B,
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_set_curve_internal.c | 26 if (s_ecc_cmp_hex_bn(curve->B, key->dp.B, bn) != 1) continue; in s_ecc_oid_lookup() 47 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve() 58 if ((err = mp_copy(srckey->dp.B, key->dp.B )) != CRYPT_OK) { goto error; } in ecc_copy_curve() 91 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis() 102 if ((err = mp_copy(b, key->dp.B )) != CRYPT_OK) { goto error; } in ecc_set_curve_from_mpis()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pkcs12/ |
| H A D | pkcs12_kdf.c | 23 unsigned char D[MAXBLOCKSIZE], A[MAXBLOCKSIZE], B[MAXBLOCKSIZE]; in pkcs12_kdf() local 49 for (j = 0; j < v; j++) B[j] = A[j % Alen]; in pkcs12_kdf() 52 if (++B[j - 1] != 0) break; in pkcs12_kdf() 58 tmp = I[n * v + j - 1] + B[j - 1] + ch; in pkcs12_kdf()
|
| /optee_os/core/crypto/ |
| H A D | sm3.c | 71 uint32_t A, B, C, D, E, F, G, H; in sm3_process() local 125 B = ctx->state[1]; in sm3_process() 136 TT1 = FF0(A, B, C) + D + SS2 + W1[j]; in sm3_process() 139 C = ROTL(B, 9); in sm3_process() 140 B = A; in sm3_process() 151 TT1 = FF1(A, B, C) + D + SS2 + W1[j]; in sm3_process() 154 C = ROTL(B, 9); in sm3_process() 155 B = A; in sm3_process() 164 ctx->state[1] ^= B; in sm3_process()
|