| /optee_os/core/lib/libtomcrypt/src/misc/padding/ |
| H A D | padding_depad.c | 20 unsigned char pad; in padding_depad() local 31 pad = data[padded_length - 1]; in padding_depad() 33 if (pad > padded_length || pad == 0) return CRYPT_INVALID_ARG; in padding_depad() 35 unpadded_length = padded_length - pad; in padding_depad() 38 pad = 0x0; in padding_depad() 44 pad = 0x0; in padding_depad() 48 if (data[n] != pad) return CRYPT_INVALID_PACKET; in padding_depad() 57 pad = 0x1; in padding_depad() 59 if (data[n] != pad++) return CRYPT_INVALID_PACKET; in padding_depad()
|
| H A D | padding_pad.c | 17 unsigned char pad, block_length, r, t; in s_padding_padded_length() local 58 pad = (t * block_length) - r; in s_padding_padded_length() 60 if ((pad == 0) && (padding != LTC_PAD_ZERO)) { in s_padding_padded_length() 61 pad = block_length; in s_padding_padded_length() 64 *length += pad; in s_padding_padded_length() 85 unsigned char diff, pad; in padding_pad() local 130 pad = 0x1; in padding_pad() 132 data[n] = pad++; in padding_pad()
|
| /optee_os/core/mm/ |
| H A D | boot_mem.c | 84 struct boot_mem_padding *pad = NULL; in add_padding() local 91 rounded = ROUNDUP(start, alignof(*pad)); in add_padding() 92 if (rounded < va && va - rounded > sizeof(*pad)) { in add_padding() 93 pad = (struct boot_mem_padding *)rounded; in add_padding() 94 pad->start = start; in add_padding() 95 pad->len = va - start; in add_padding() 96 DMSG("%#"PRIxVA" len %#zx", pad->start, pad->len); in add_padding() 97 pad->next = desc->padding; in add_padding() 98 desc->padding = pad; in add_padding() 199 struct boot_mem_padding *pad = NULL; in boot_mem_relocate() local [all …]
|
| /optee_os/core/include/drivers/ |
| H A D | versal_nvm.h | 73 uint8_t pad[53]; member 83 uint8_t pad[25]; member 93 uint8_t pad[89]; member 98 uint8_t pad[63]; member 104 uint8_t pad[89]; member 110 uint8_t pad[89]; member 117 uint8_t pad[48]; member 126 uint8_t pad[104]; member 138 uint8_t pad[12]; member 152 uint8_t pad[54]; member [all …]
|
| H A D | versal_puf.h | 59 uint8_t pad[8]; member
|
| /optee_os/core/lib/libtomcrypt/src/misc/base64/ |
| H A D | base64_encode.c | 26 pad = 1, enumerator 83 if (mode & pad) { in s_base64_encode_internal() 112 return s_base64_encode_internal(in, inlen, out, outlen, codes_base64, pad); in base64_encode() 129 int use_crlf = flags & BASE64_PEM_CRLF ? pad | crlf : pad | lf; in base64_encode_pem() 154 return s_base64_encode_internal(in, inlen, out, outlen, codes_base64url, pad); in base64url_strict_encode()
|
| /optee_os/core/drivers/crypto/caam/include/ |
| H A D | caam_desc_ccb_defines.h | 44 #define NFIFO_PTYPE(pad) SHIFT_U32(NFIFO_PTYPE_##pad & 0x7, 16) argument 54 #define NFIFO_PAD(cla, options, data, pad, len) \ argument 56 NFIFO_PTYPE(pad) | NFIFO_PAD_LENGTH(len))
|
| /optee_os/scripts/ |
| H A D | gen_ldelf_hex.py | 45 pad = 0 54 pad = segment['p_vaddr'] - (prev_segment['p_vaddr'] + 64 pad = 0 71 if pad > 31: 77 'segment {}, please check'.format(pad, n-1)) 78 pad_size.append(pad)
|
| /optee_os/core/lib/libtomcrypt/src/mac/poly1305/ |
| H A D | poly1305.c | 104 LOAD32L(st->pad[0], key + 16); in poly1305_init() 105 LOAD32L(st->pad[1], key + 20); in poly1305_init() 106 LOAD32L(st->pad[2], key + 24); in poly1305_init() 107 LOAD32L(st->pad[3], key + 28); in poly1305_init() 228 f = (ulong64)h0 + st->pad[0] ; h0 = (ulong32)f; in poly1305_done() 229 f = (ulong64)h1 + st->pad[1] + (f >> 32); h1 = (ulong32)f; in poly1305_done() 230 f = (ulong64)h2 + st->pad[2] + (f >> 32); h2 = (ulong32)f; in poly1305_done() 231 f = (ulong64)h3 + st->pad[3] + (f >> 32); h3 = (ulong32)f; in poly1305_done() 249 st->pad[0] = 0; in poly1305_done() 250 st->pad[1] = 0; in poly1305_done() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/modes/cfb/ |
| H A D | cfb_encrypt.c | 34 cfb->padlen < 0 || cfb->padlen > (int)sizeof(cfb->pad)) { in cfb_encrypt() 40 …if ((err = cipher_descriptor[cfb->cipher]->ecb_encrypt(cfb->pad, cfb->IV, &cfb->key)) != CRYPT_OK)… in cfb_encrypt() 45 cfb->pad[cfb->padlen] = (*ct = *pt ^ cfb->IV[cfb->padlen]); in cfb_encrypt()
|
| H A D | cfb_decrypt.c | 34 cfb->padlen < 0 || cfb->padlen > (int)sizeof(cfb->pad)) { in cfb_decrypt() 40 …if ((err = cipher_descriptor[cfb->cipher]->ecb_encrypt(cfb->pad, cfb->IV, &cfb->key)) != CRYPT_OK)… in cfb_decrypt() 45 cfb->pad[cfb->padlen] = *ct; in cfb_decrypt()
|
| /optee_os/ldelf/ |
| H A D | ftrace.c | 30 size_t pad = 0; in ftrace_init() local 66 pad = 8 - (vaddr_t)p % 8; in ftrace_init() 67 if (pad == 8) in ftrace_init() 68 pad = 0; in ftrace_init() 69 while (pad--) { in ftrace_init()
|
| /optee_os/core/lib/libtomcrypt/src/modes/lrw/ |
| H A D | lrw_process.c | 39 XMEMCPY(prod, lrw->pad, 16); in lrw_process() 55 …*(LTC_FAST_TYPE_PTR_CAST(lrw->pad + y)) ^= *(LTC_FAST_TYPE_PTR_CAST(&lrw->PC[x][lrw->IV[x]][y])) ^… in lrw_process() 59 lrw->pad[y] ^= lrw->PC[x][lrw->IV[x]][y] ^ lrw->PC[x][(lrw->IV[x]-1)&255][y]; in lrw_process() 64 gcm_gf_mult(lrw->tweak, lrw->IV, lrw->pad); in lrw_process()
|
| H A D | lrw_setiv.c | 59 XMEMCPY(lrw->pad, T, 16); in lrw_setiv() 61 gcm_gf_mult(lrw->tweak, IV, lrw->pad); in lrw_setiv()
|
| H A D | lrw_test.c | 83 if (compare_testvector(tests[x].expected_tweak, 16, lrw.pad, 16, "LRW Tweak", x)) { in lrw_test()
|
| /optee_os/core/lib/libtomcrypt/src/modes/ctr/ |
| H A D | ctr_encrypt.c | 49 …if ((err = cipher_descriptor[ctr->cipher]->ecb_encrypt(ctr->ctr, ctr->pad, &ctr->key)) != CRYPT_OK… in s_ctr_encrypt() 58 … *(LTC_FAST_TYPE_PTR_CAST((unsigned char *)ctr->pad + x)); in s_ctr_encrypt() 68 *ct++ = *pt++ ^ ctr->pad[ctr->padlen++]; in s_ctr_encrypt() 102 (ctr->padlen < 0) || (ctr->padlen > (int)sizeof(ctr->pad))) { in ctr_encrypt()
|
| H A D | ctr_setiv.c | 40 return cipher_descriptor[ctr->cipher]->ecb_encrypt(IV, ctr->pad, &ctr->key); in ctr_setiv()
|
| H A D | ctr_start.c | 86 return cipher_descriptor[ctr->cipher]->ecb_encrypt(ctr->ctr, ctr->pad, &ctr->key); in ctr_start()
|
| /optee_os/core/arch/arm/include/sm/ |
| H A D | sm.h | 42 uint32_t pad; member 88 uint32_t pad; member 92 uint32_t pad; member
|
| /optee_os/core/drivers/crypto/aspeed/ |
| H A D | hace_ast2600.c | 222 uint8_t pad[HASH_BLK_BUFSZ * 2] = { }; in ast2600_hace_final() local 231 memset(pad, 0, sizeof(pad)); in ast2600_hace_final() 232 pad[0] = 0x80; in ast2600_hace_final() 250 rc = ast2600_hace_update(ctx, pad, padn); in ast2600_hace_final() 266 rc = ast2600_hace_update(ctx, pad, padn); in ast2600_hace_final()
|
| /optee_os/core/arch/arm/include/kernel/ |
| H A D | thread_private_arch.h | 74 uint64_t pad; member 222 uint32_t pad[THREAD_RPC_NUM_ARGS]; member 228 __thread_rpc(rpc_arg->pad); in thread_rpc()
|
| H A D | thread_arch.h | 172 uint32_t pad; member 289 uint64_t pad; member
|
| /optee_os/core/arch/riscv/include/kernel/ |
| H A D | thread_private_arch.h | 51 unsigned long pad; member
|
| /optee_os/core/drivers/crypto/versal/ |
| H A D | ecc.c | 113 uint8_t pad[66] = { 0 }; in crypto_bignum_bn2bin_eswap() local 121 crypto_bignum_bn2bin(from, pad + bytes - len); in crypto_bignum_bn2bin_eswap() 122 memcpy_swp(to, pad, bytes); in crypto_bignum_bn2bin_eswap()
|
| /optee_os/core/include/ |
| H A D | optee_msg.h | 215 uint32_t pad; member
|