| /optee_os/core/lib/libtomcrypt/src/ciphers/safer/ |
| H A D | saferp.c | 41 b[0] = (safer_ebox[(b[0] ^ skey->saferp.K[i][0]) & 255] + skey->saferp.K[i+1][0]) & 255; \ 42 b[1] = safer_lbox[(b[1] + skey->saferp.K[i][1]) & 255] ^ skey->saferp.K[i+1][1]; \ 43 b[2] = safer_lbox[(b[2] + skey->saferp.K[i][2]) & 255] ^ skey->saferp.K[i+1][2]; \ 44 b[3] = (safer_ebox[(b[3] ^ skey->saferp.K[i][3]) & 255] + skey->saferp.K[i+1][3]) & 255; \ 45 b[4] = (safer_ebox[(b[4] ^ skey->saferp.K[i][4]) & 255] + skey->saferp.K[i+1][4]) & 255; \ 46 b[5] = safer_lbox[(b[5] + skey->saferp.K[i][5]) & 255] ^ skey->saferp.K[i+1][5]; \ 47 b[6] = safer_lbox[(b[6] + skey->saferp.K[i][6]) & 255] ^ skey->saferp.K[i+1][6]; \ 48 b[7] = (safer_ebox[(b[7] ^ skey->saferp.K[i][7]) & 255] + skey->saferp.K[i+1][7]) & 255; \ 49 b[8] = (safer_ebox[(b[8] ^ skey->saferp.K[i][8]) & 255] + skey->saferp.K[i+1][8]) & 255; \ 50 b[9] = safer_lbox[(b[9] + skey->saferp.K[i][9]) & 255] ^ skey->saferp.K[i+1][9]; \ [all …]
|
| H A D | safer.c | 174 int safer_k64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_k64_setup() argument 177 LTC_ARGCHK(skey != NULL); in safer_k64_setup() 187 … (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); in safer_k64_setup() 191 int safer_sk64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_sk64_setup() argument 194 LTC_ARGCHK(skey != NULL); in safer_sk64_setup() 204 …(unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key); in safer_sk64_setup() 208 int safer_k128_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_k128_setup() argument 211 LTC_ARGCHK(skey != NULL); in safer_k128_setup() 221 …(unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); in safer_k128_setup() 225 int safer_sk128_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_sk128_setup() argument [all …]
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/ |
| H A D | camellia.c | 202 int camellia_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in camellia_setup() argument 209 LTC_ARGCHK(skey != NULL); in camellia_setup() 217 skey->camellia.R = (keylen == 16) ? 18 : 24; in camellia_setup() 219 if (num_rounds != 0 && num_rounds != skey->camellia.R) { in camellia_setup() 274 LOAD64H(skey->camellia.kw[0], kL); in camellia_setup() 275 LOAD64H(skey->camellia.kw[1], kL+8); in camellia_setup() 278 LOAD64H(skey->camellia.k[0], kA); in camellia_setup() 279 LOAD64H(skey->camellia.k[1], kA+8); in camellia_setup() 283 LOAD64H(skey->camellia.k[2], T+32); in camellia_setup() 284 LOAD64H(skey->camellia.k[3], T+40); in camellia_setup() [all …]
|
| H A D | blowfish.c | 295 #define F(x) ((skey->blowfish.S[0][LTC_BYTE(x,3)] + skey->blowfish.S[1][LTC_BYTE(x,2)]) ^ skey->blo… 298 static void s_blowfish_encipher(ulong32 *L, ulong32 *R, const symmetric_key *skey) in s_blowfish_encipher() argument 306 S1 = skey->blowfish.S[0]; in s_blowfish_encipher() 307 S2 = skey->blowfish.S[1]; in s_blowfish_encipher() 308 S3 = skey->blowfish.S[2]; in s_blowfish_encipher() 309 S4 = skey->blowfish.S[3]; in s_blowfish_encipher() 317 l ^= skey->blowfish.K[rounds++]; r ^= F(l); in s_blowfish_encipher() 318 r ^= skey->blowfish.K[rounds++]; l ^= F(r); in s_blowfish_encipher() 319 l ^= skey->blowfish.K[rounds++]; r ^= F(l); in s_blowfish_encipher() 320 r ^= skey->blowfish.K[rounds++]; l ^= F(r); in s_blowfish_encipher() [all …]
|
| H A D | cast5.c | 401 static int s_cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_cast5_setup() argument 403 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_cast5_setup() 411 LTC_ARGCHK(skey != NULL); in s_cast5_setup() 439 …skey->cast5.K[i++] = S5[GB(z, 0x8)] ^ S6[GB(z, 0x9)] ^ S7[GB(z, 0x7)] ^ S8[GB(z, 0x6)] ^ S5[GB(z, … in s_cast5_setup() 440 …skey->cast5.K[i++] = S5[GB(z, 0xA)] ^ S6[GB(z, 0xB)] ^ S7[GB(z, 0x5)] ^ S8[GB(z, 0x4)] ^ S6[GB(z, … in s_cast5_setup() 441 …skey->cast5.K[i++] = S5[GB(z, 0xC)] ^ S6[GB(z, 0xd)] ^ S7[GB(z, 0x3)] ^ S8[GB(z, 0x2)] ^ S7[GB(z, … in s_cast5_setup() 442 …skey->cast5.K[i++] = S5[GB(z, 0xE)] ^ S6[GB(z, 0xF)] ^ S7[GB(z, 0x1)] ^ S8[GB(z, 0x0)] ^ S8[GB(z, … in s_cast5_setup() 448 …skey->cast5.K[i++] = S5[GB(x, 0x3)] ^ S6[GB(x, 0x2)] ^ S7[GB(x, 0xc)] ^ S8[GB(x, 0xd)] ^ S5[GB(x, … in s_cast5_setup() 449 …skey->cast5.K[i++] = S5[GB(x, 0x1)] ^ S6[GB(x, 0x0)] ^ S7[GB(x, 0xe)] ^ S8[GB(x, 0xf)] ^ S6[GB(x, … in s_cast5_setup() 450 …skey->cast5.K[i++] = S5[GB(x, 0x7)] ^ S6[GB(x, 0x6)] ^ S7[GB(x, 0x8)] ^ S8[GB(x, 0x9)] ^ S7[GB(x, … in s_cast5_setup() [all …]
|
| H A D | xtea.c | 26 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in xtea_setup() argument 31 LTC_ARGCHK(skey != NULL); in xtea_setup() 49 skey->xtea.A[x] = (sum + K[sum&3]) & 0xFFFFFFFFUL; in xtea_setup() 51 skey->xtea.B[x] = (sum + K[(sum>>11)&3]) & 0xFFFFFFFFUL; in xtea_setup() 68 int xtea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in xtea_ecb_encrypt() argument 75 LTC_ARGCHK(skey != NULL); in xtea_ecb_encrypt() 80 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 81 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 83 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r+1])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 84 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+1])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() [all …]
|
| H A D | tea.c | 29 int tea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in tea_setup() argument 32 LTC_ARGCHK(skey != NULL); in tea_setup() 44 LOAD32H(skey->tea.k[0], key+0); in tea_setup() 45 LOAD32H(skey->tea.k[1], key+4); in tea_setup() 46 LOAD32H(skey->tea.k[2], key+8); in tea_setup() 47 LOAD32H(skey->tea.k[3], key+12); in tea_setup() 59 int tea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in tea_ecb_encrypt() argument 67 LTC_ARGCHK(skey != NULL); in tea_ecb_encrypt() 73 y += ((z<<4) + skey->tea.k[0]) ^ (z + sum) ^ ((z>>5) + skey->tea.k[1]); in tea_ecb_encrypt() 74 z += ((y<<4) + skey->tea.k[2]) ^ (y + sum) ^ ((y>>5) + skey->tea.k[3]); in tea_ecb_encrypt() [all …]
|
| H A D | rc5.c | 46 static int s_rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc5_setup() argument 48 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc5_setup() 53 LTC_ARGCHK(skey != NULL); in s_rc5_setup() 70 skey->rc5.rounds = num_rounds; in s_rc5_setup() 71 S = skey->rc5.K; in s_rc5_setup() 104 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc5_setup() argument 107 x = s_rc5_setup(key, keylen, num_rounds, skey); in rc5_setup() 121 static int s_rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_rc5_ecb_encrypt() argument 123 int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_rc5_ecb_encrypt() 129 LTC_ARGCHK(skey != NULL); in s_rc5_ecb_encrypt() [all …]
|
| H A D | anubis.c | 879 static int s_anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_anubis_setup() argument 881 int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_anubis_setup() 890 LTC_ARGCHK(skey != NULL); in s_anubis_setup() 896 skey->anubis.keyBits = keylen*8; in s_anubis_setup() 902 N = skey->anubis.keyBits >> 5; in s_anubis_setup() 907 skey->anubis.R = R = 8 + N; in s_anubis_setup() 909 if (num_rounds != 0 && num_rounds != skey->anubis.R) { in s_anubis_setup() 967 skey->anubis.roundKeyEnc[r][0] = K0; in s_anubis_setup() 968 skey->anubis.roundKeyEnc[r][1] = K1; in s_anubis_setup() 969 skey->anubis.roundKeyEnc[r][2] = K2; in s_anubis_setup() [all …]
|
| H A D | noekeon.c | 67 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in noekeon_setup() argument 72 LTC_ARGCHK(skey != NULL); in noekeon_setup() 82 LOAD32H(skey->noekeon.K[0],&key[0]); in noekeon_setup() 83 LOAD32H(skey->noekeon.K[1],&key[4]); in noekeon_setup() 84 LOAD32H(skey->noekeon.K[2],&key[8]); in noekeon_setup() 85 LOAD32H(skey->noekeon.K[3],&key[12]); in noekeon_setup() 87 LOAD32H(skey->noekeon.dK[0],&key[0]); in noekeon_setup() 88 LOAD32H(skey->noekeon.dK[1],&key[4]); in noekeon_setup() 89 LOAD32H(skey->noekeon.dK[2],&key[8]); in noekeon_setup() 90 LOAD32H(skey->noekeon.dK[3],&key[12]); in noekeon_setup() [all …]
|
| H A D | kasumi.c | 133 int kasumi_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in kasumi_ecb_encrypt() argument 140 LTC_ARGCHK(skey != NULL); in kasumi_ecb_encrypt() 146 temp = FL(left, n, skey); in kasumi_ecb_encrypt() 147 temp = FO(temp, n++, skey); in kasumi_ecb_encrypt() 149 temp = FO(right, n, skey); in kasumi_ecb_encrypt() 150 temp = FL(temp, n++, skey); in kasumi_ecb_encrypt() 160 int kasumi_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) in kasumi_ecb_decrypt() argument 167 LTC_ARGCHK(skey != NULL); in kasumi_ecb_decrypt() 173 temp = FO(right, n, skey); in kasumi_ecb_decrypt() 174 temp = FL(temp, n--, skey); in kasumi_ecb_decrypt() [all …]
|
| H A D | rc6.c | 43 static int s_rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc6_setup() argument 45 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc6_setup() 51 LTC_ARGCHK(skey != NULL); in s_rc6_setup() 93 skey->rc6.K[i] = S[i]; in s_rc6_setup() 99 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc6_setup() argument 102 x = s_rc6_setup(key, keylen, num_rounds, skey); in rc6_setup() 115 static int s_rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_rc6_ecb_encrypt() argument 117 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_rc6_ecb_encrypt() 124 LTC_ARGCHK(skey != NULL); in s_rc6_ecb_encrypt() 129 b += skey->rc6.K[0]; in s_rc6_ecb_encrypt() [all …]
|
| H A D | rc2.c | 63 …t rc2_setup_ex(const unsigned char *key, int keylen, int bits, int num_rounds, symmetric_key *skey) in rc2_setup_ex() argument 65 unsigned *xkey = skey->rc2.xkey; in rc2_setup_ex() 71 LTC_ARGCHK(skey != NULL); in rc2_setup_ex() 126 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc2_setup() argument 128 return rc2_setup_ex(key, keylen, keylen * 8, num_rounds, skey); in rc2_setup() 144 const symmetric_key *skey) in s_rc2_ecb_encrypt() argument 148 const symmetric_key *skey) in s_rc2_ecb_encrypt() 156 LTC_ARGCHK(skey != NULL); in s_rc2_ecb_encrypt() 158 xkey = skey->rc2.xkey; in s_rc2_ecb_encrypt() 201 const symmetric_key *skey) in rc2_ecb_encrypt() argument [all …]
|
| H A D | kseed.c | 194 int kseed_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in kseed_setup() argument 214 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]); in kseed_setup() 215 skey->kseed.K[2*i+1] = G(k2 - k4 + KCi[i]); in kseed_setup() 226 skey->kseed.dK[2*(15-i)+0] = skey->kseed.K[2*i+0]; in kseed_setup() 227 skey->kseed.dK[2*(15-i)+1] = skey->kseed.K[2*i+1]; in kseed_setup() 251 int kseed_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in kseed_ecb_encrypt() argument 258 rounds(P, skey->kseed.K); in kseed_ecb_encrypt() 273 int kseed_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) in kseed_ecb_decrypt() argument 280 rounds(P, skey->kseed.dK); in kseed_ecb_decrypt() 291 void kseed_done(symmetric_key *skey) in kseed_done() argument [all …]
|
| H A D | multi2.c | 114 int multi2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in multi2_setup() argument 120 LTC_ARGCHK(skey != NULL); in multi2_setup() 125 skey->multi2.N = num_rounds; in multi2_setup() 131 s_setup(dk, sk, skey->multi2.uk); in multi2_setup() 145 int multi2_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in multi2_ecb_encrypt() argument 150 LTC_ARGCHK(skey != NULL); in multi2_ecb_encrypt() 153 s_encrypt(p, skey->multi2.N, skey->multi2.uk); in multi2_ecb_encrypt() 166 int multi2_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) in multi2_ecb_decrypt() argument 171 LTC_ARGCHK(skey != NULL); in multi2_ecb_decrypt() 174 s_decrypt(p, skey->multi2.N, skey->multi2.uk); in multi2_ecb_decrypt() [all …]
|
| H A D | skipjack.c | 59 int skipjack_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in skipjack_setup() argument 64 LTC_ARGCHK(skey != NULL); in skipjack_setup() 76 skey->skipjack.key[x] = key[x] & 255; in skipjack_setup() 83 tmp = g_func(w1, &kp, skey->skipjack.key); \ 89 tmp = g_func(w1, &kp, skey->skipjack.key); \ 96 w1 = ig_func(w2, &kp, skey->skipjack.key); \ 100 tmp = ig_func(w2, &kp, skey->skipjack.key); \ 136 …c int s_skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_skipjack_ecb_encrypt() argument 138 int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_skipjack_ecb_encrypt() 146 LTC_ARGCHK(skey != NULL); in s_skipjack_ecb_encrypt() [all …]
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | aes_accel.c | 57 symmetric_key *skey) in rijndael_setup() argument 62 LTC_ARGCHK(skey); in rijndael_setup() 67 skey->rijndael.eK = LTC_ALIGN_BUF(skey->rijndael.K, 16); in rijndael_setup() 68 skey->rijndael.dK = skey->rijndael.eK + EXPANDED_AES_KEY_WORD_COUNT; in rijndael_setup() 70 if (crypto_accel_aes_expand_keys(key, keylen, skey->rijndael.eK, in rijndael_setup() 71 skey->rijndael.dK, in rijndael_setup() 79 skey->rijndael.Nr = round_count; in rijndael_setup() 84 void rijndael_done(symmetric_key *skey __unused) in rijndael_done() 106 const symmetric_key *skey) in aes_ecb_encrypt_nblocks() argument 110 LTC_ARGCHK(skey); in aes_ecb_encrypt_nblocks() [all …]
|
| H A D | aes.c | 23 symmetric_key skey; in crypto_aes_expand_enc_key() 28 if (aes_setup(key, key_len, 0, &skey)) in crypto_aes_expand_enc_key() 31 memcpy(enc_key, skey.rijndael.eK, AES_ENC_KEY_LEN); in crypto_aes_expand_enc_key() 32 *rounds = skey.rijndael.Nr; in crypto_aes_expand_enc_key() 43 symmetric_key skey = { }; in crypto_aes_enc_block() 46 skey.rijndael.eK = LTC_ALIGN_BUF(skey.rijndael.K, 16); in crypto_aes_enc_block() 47 memcpy(skey.rijndael.eK, enc_key, AES_ENC_KEY_LEN); in crypto_aes_enc_block() 48 skey.rijndael.Nr = rounds; in crypto_aes_enc_block() 49 if (aes_ecb_encrypt(src, dst, &skey)) in crypto_aes_enc_block()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_cipher.h | 398 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 405 int (*ecb_encrypt)(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey); 412 int (*ecb_decrypt)(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey); 421 void (*done)(symmetric_key *skey); 437 …rypt)(const unsigned char *pt, unsigned char *ct, unsigned long blocks, const symmetric_key *skey); 446 …rypt)(const unsigned char *ct, unsigned char *pt, unsigned long blocks, const symmetric_key *skey); 456 …nsigned char *pt, unsigned char *ct, unsigned long blocks, unsigned char *IV, symmetric_key *skey); 466 …nsigned char *ct, unsigned char *pt, unsigned long blocks, unsigned char *IV, symmetric_key *skey); 477 …ar *pt, unsigned char *ct, unsigned long blocks, unsigned char *IV, int mode, symmetric_key *skey); 488 …har *ct, unsigned long blocks, unsigned char *IV, const unsigned char *tweak, symmetric_key *skey); [all …]
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/twofish/ |
| H A D | twofish.c | 272 #define S1 skey->twofish.S[0] 273 #define S2 skey->twofish.S[1] 274 #define S3 skey->twofish.S[2] 275 #define S4 skey->twofish.S[3] 338 …atic int s_twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_twofish_setup() argument 340 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_twofish_setup() 351 LTC_ARGCHK(skey != NULL); in s_twofish_setup() 377 rs_mult(M+(x*8), skey->twofish.S+(x*4)); in s_twofish_setup() 399 skey->twofish.K[x+x] = (A + B) & 0xFFFFFFFFUL; in s_twofish_setup() 402 skey->twofish.K[x+x+1] = ROLc(B + B + A, 9); in s_twofish_setup() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/mac/xcbc/ |
| H A D | xcbc_init.c | 22 symmetric_key *skey; in xcbc_init() local 39 skey = NULL; in xcbc_init() 58 skey = XCALLOC(1, sizeof(*skey)); in xcbc_init() 59 if (skey == NULL) { in xcbc_init() 63 if ((err = cipher_descriptor[cipher]->setup(key, keylen, 0, skey)) != CRYPT_OK) { in xcbc_init() 72 cipher_descriptor[cipher]->ecb_encrypt(xcbc->K[y], xcbc->K[y], skey); in xcbc_init() 85 cipher_descriptor[cipher]->done(skey); in xcbc_init() 86 if (skey != NULL) { in xcbc_init() 88 zeromem(skey, sizeof(*skey)); in xcbc_init() 90 XFREE(skey); in xcbc_init()
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/aes/ |
| H A D | aesni.c | 45 int aesni_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in aesni_setup() argument 52 LTC_ARGCHK(skey != NULL); in aesni_setup() 62 skey->rijndael.Nr = keylen / 4 + 6; in aesni_setup() 63 K = LTC_ALIGN_BUF(skey->rijndael.K, 16); in aesni_setup() 64 skey->rijndael.eK = K; in aesni_setup() 66 skey->rijndael.dK = K; in aesni_setup() 70 rk = skey->rijndael.eK; in aesni_setup() 134 rk = skey->rijndael.dK; in aesni_setup() 135 rrk = skey->rijndael.eK + skey->rijndael.Nr * 4; in aesni_setup() 146 for (i = 1; i < skey->rijndael.Nr; i++) { in aesni_setup() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/encauth/ccm/ |
| H A D | ccm_memory.c | 45 symmetric_key *skey; in ccm_memory() local 117 skey = XMALLOC(sizeof(*skey)); in ccm_memory() 118 if (skey == NULL) { in ccm_memory() 123 if ((err = cipher_descriptor[cipher]->setup(key, keylen, 0, skey)) != CRYPT_OK) { in ccm_memory() 124 XFREE(skey); in ccm_memory() 128 skey = uskey; in ccm_memory() 173 if ((err = cipher_descriptor[cipher]->ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { in ccm_memory() 198 if ((err = cipher_descriptor[cipher]->ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { in ccm_memory() 207 if ((err = cipher_descriptor[cipher]->ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { in ccm_memory() 242 if ((err = cipher_descriptor[cipher]->ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) { in ccm_memory() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_encrypt_key.c | 30 unsigned char *pub_expt, *ecc_shared, *skey; in ecc_encrypt_key() local 54 skey = XMALLOC(MAXBLOCKSIZE); in ecc_encrypt_key() 55 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) { in ecc_encrypt_key() 62 if (skey != NULL) { in ecc_encrypt_key() 63 XFREE(skey); in ecc_encrypt_key() 90 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) { in ecc_encrypt_key() 96 skey[x] ^= in[x]; in ecc_encrypt_key() 102 … LTC_ASN1_OCTET_STRING, inlen, skey, in ecc_encrypt_key() 110 zeromem(skey, MAXBLOCKSIZE); in ecc_encrypt_key() 113 XFREE(skey); in ecc_encrypt_key()
|
| /optee_os/core/lib/libtomcrypt/src/pk/dsa/ |
| H A D | dsa_encrypt_key.c | 29 unsigned char *expt, *skey; in dsa_encrypt_key() local 58 skey = XMALLOC(MAXBLOCKSIZE); in dsa_encrypt_key() 59 if (expt == NULL || skey == NULL) { in dsa_encrypt_key() 63 if (skey != NULL) { in dsa_encrypt_key() 64 XFREE(skey); in dsa_encrypt_key() 89 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) { in dsa_encrypt_key() 95 skey[x] ^= in[x]; in dsa_encrypt_key() 101 … LTC_ASN1_OCTET_STRING, inlen, skey, in dsa_encrypt_key() 108 zeromem(skey, MAXBLOCKSIZE); in dsa_encrypt_key() 111 XFREE(skey); in dsa_encrypt_key()
|