Home
last modified time | relevance | path

Searched refs:skey (Results 1 – 25 of 37) sorted by relevance

12

/optee_os/core/lib/libtomcrypt/src/ciphers/safer/
H A Dsaferp.c41 b[0] = (safer_ebox[(b[0] ^ skey->saferp.K[i][0]) & 255] + skey->saferp.K[i+1][0]) & 255; \
42 b[1] = safer_lbox[(b[1] + skey->saferp.K[i][1]) & 255] ^ skey->saferp.K[i+1][1]; \
43 b[2] = safer_lbox[(b[2] + skey->saferp.K[i][2]) & 255] ^ skey->saferp.K[i+1][2]; \
44 b[3] = (safer_ebox[(b[3] ^ skey->saferp.K[i][3]) & 255] + skey->saferp.K[i+1][3]) & 255; \
45 b[4] = (safer_ebox[(b[4] ^ skey->saferp.K[i][4]) & 255] + skey->saferp.K[i+1][4]) & 255; \
46 b[5] = safer_lbox[(b[5] + skey->saferp.K[i][5]) & 255] ^ skey->saferp.K[i+1][5]; \
47 b[6] = safer_lbox[(b[6] + skey->saferp.K[i][6]) & 255] ^ skey->saferp.K[i+1][6]; \
48 b[7] = (safer_ebox[(b[7] ^ skey->saferp.K[i][7]) & 255] + skey->saferp.K[i+1][7]) & 255; \
49 b[8] = (safer_ebox[(b[8] ^ skey->saferp.K[i][8]) & 255] + skey->saferp.K[i+1][8]) & 255; \
50 b[9] = safer_lbox[(b[9] + skey->saferp.K[i][9]) & 255] ^ skey->saferp.K[i+1][9]; \
[all …]
H A Dsafer.c174 int safer_k64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_k64_setup() argument
177 LTC_ARGCHK(skey != NULL); in safer_k64_setup()
187 … (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); in safer_k64_setup()
191 int safer_sk64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_sk64_setup() argument
194 LTC_ARGCHK(skey != NULL); in safer_sk64_setup()
204 …(unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key); in safer_sk64_setup()
208 int safer_k128_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_k128_setup() argument
211 LTC_ARGCHK(skey != NULL); in safer_k128_setup()
221 …(unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); in safer_k128_setup()
225 int safer_sk128_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_sk128_setup() argument
[all …]
/optee_os/core/lib/libtomcrypt/src/ciphers/
H A Dcamellia.c202 int camellia_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in camellia_setup() argument
209 LTC_ARGCHK(skey != NULL); in camellia_setup()
217 skey->camellia.R = (keylen == 16) ? 18 : 24; in camellia_setup()
219 if (num_rounds != 0 && num_rounds != skey->camellia.R) { in camellia_setup()
274 LOAD64H(skey->camellia.kw[0], kL); in camellia_setup()
275 LOAD64H(skey->camellia.kw[1], kL+8); in camellia_setup()
278 LOAD64H(skey->camellia.k[0], kA); in camellia_setup()
279 LOAD64H(skey->camellia.k[1], kA+8); in camellia_setup()
283 LOAD64H(skey->camellia.k[2], T+32); in camellia_setup()
284 LOAD64H(skey->camellia.k[3], T+40); in camellia_setup()
[all …]
H A Dblowfish.c295 #define F(x) ((skey->blowfish.S[0][LTC_BYTE(x,3)] + skey->blowfish.S[1][LTC_BYTE(x,2)]) ^ skey->blo…
298 static void s_blowfish_encipher(ulong32 *L, ulong32 *R, const symmetric_key *skey) in s_blowfish_encipher() argument
306 S1 = skey->blowfish.S[0]; in s_blowfish_encipher()
307 S2 = skey->blowfish.S[1]; in s_blowfish_encipher()
308 S3 = skey->blowfish.S[2]; in s_blowfish_encipher()
309 S4 = skey->blowfish.S[3]; in s_blowfish_encipher()
317 l ^= skey->blowfish.K[rounds++]; r ^= F(l); in s_blowfish_encipher()
318 r ^= skey->blowfish.K[rounds++]; l ^= F(r); in s_blowfish_encipher()
319 l ^= skey->blowfish.K[rounds++]; r ^= F(l); in s_blowfish_encipher()
320 r ^= skey->blowfish.K[rounds++]; l ^= F(r); in s_blowfish_encipher()
[all …]
H A Dcast5.c401 static int s_cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_cast5_setup() argument
403 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_cast5_setup()
411 LTC_ARGCHK(skey != NULL); in s_cast5_setup()
439skey->cast5.K[i++] = S5[GB(z, 0x8)] ^ S6[GB(z, 0x9)] ^ S7[GB(z, 0x7)] ^ S8[GB(z, 0x6)] ^ S5[GB(z, … in s_cast5_setup()
440skey->cast5.K[i++] = S5[GB(z, 0xA)] ^ S6[GB(z, 0xB)] ^ S7[GB(z, 0x5)] ^ S8[GB(z, 0x4)] ^ S6[GB(z, … in s_cast5_setup()
441skey->cast5.K[i++] = S5[GB(z, 0xC)] ^ S6[GB(z, 0xd)] ^ S7[GB(z, 0x3)] ^ S8[GB(z, 0x2)] ^ S7[GB(z, … in s_cast5_setup()
442skey->cast5.K[i++] = S5[GB(z, 0xE)] ^ S6[GB(z, 0xF)] ^ S7[GB(z, 0x1)] ^ S8[GB(z, 0x0)] ^ S8[GB(z, … in s_cast5_setup()
448skey->cast5.K[i++] = S5[GB(x, 0x3)] ^ S6[GB(x, 0x2)] ^ S7[GB(x, 0xc)] ^ S8[GB(x, 0xd)] ^ S5[GB(x, … in s_cast5_setup()
449skey->cast5.K[i++] = S5[GB(x, 0x1)] ^ S6[GB(x, 0x0)] ^ S7[GB(x, 0xe)] ^ S8[GB(x, 0xf)] ^ S6[GB(x, … in s_cast5_setup()
450skey->cast5.K[i++] = S5[GB(x, 0x7)] ^ S6[GB(x, 0x6)] ^ S7[GB(x, 0x8)] ^ S8[GB(x, 0x9)] ^ S7[GB(x, … in s_cast5_setup()
[all …]
H A Dxtea.c26 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in xtea_setup() argument
31 LTC_ARGCHK(skey != NULL); in xtea_setup()
49 skey->xtea.A[x] = (sum + K[sum&3]) & 0xFFFFFFFFUL; in xtea_setup()
51 skey->xtea.B[x] = (sum + K[(sum>>11)&3]) & 0xFFFFFFFFUL; in xtea_setup()
68 int xtea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in xtea_ecb_encrypt() argument
75 LTC_ARGCHK(skey != NULL); in xtea_ecb_encrypt()
80 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt()
81 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt()
83 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r+1])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt()
84 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+1])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt()
[all …]
H A Dtea.c29 int tea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in tea_setup() argument
32 LTC_ARGCHK(skey != NULL); in tea_setup()
44 LOAD32H(skey->tea.k[0], key+0); in tea_setup()
45 LOAD32H(skey->tea.k[1], key+4); in tea_setup()
46 LOAD32H(skey->tea.k[2], key+8); in tea_setup()
47 LOAD32H(skey->tea.k[3], key+12); in tea_setup()
59 int tea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in tea_ecb_encrypt() argument
67 LTC_ARGCHK(skey != NULL); in tea_ecb_encrypt()
73 y += ((z<<4) + skey->tea.k[0]) ^ (z + sum) ^ ((z>>5) + skey->tea.k[1]); in tea_ecb_encrypt()
74 z += ((y<<4) + skey->tea.k[2]) ^ (y + sum) ^ ((y>>5) + skey->tea.k[3]); in tea_ecb_encrypt()
[all …]
H A Drc5.c46 static int s_rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc5_setup() argument
48 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc5_setup()
53 LTC_ARGCHK(skey != NULL); in s_rc5_setup()
70 skey->rc5.rounds = num_rounds; in s_rc5_setup()
71 S = skey->rc5.K; in s_rc5_setup()
104 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc5_setup() argument
107 x = s_rc5_setup(key, keylen, num_rounds, skey); in rc5_setup()
121 static int s_rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_rc5_ecb_encrypt() argument
123 int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_rc5_ecb_encrypt()
129 LTC_ARGCHK(skey != NULL); in s_rc5_ecb_encrypt()
[all …]
H A Danubis.c879 static int s_anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_anubis_setup() argument
881 int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_anubis_setup()
890 LTC_ARGCHK(skey != NULL); in s_anubis_setup()
896 skey->anubis.keyBits = keylen*8; in s_anubis_setup()
902 N = skey->anubis.keyBits >> 5; in s_anubis_setup()
907 skey->anubis.R = R = 8 + N; in s_anubis_setup()
909 if (num_rounds != 0 && num_rounds != skey->anubis.R) { in s_anubis_setup()
967 skey->anubis.roundKeyEnc[r][0] = K0; in s_anubis_setup()
968 skey->anubis.roundKeyEnc[r][1] = K1; in s_anubis_setup()
969 skey->anubis.roundKeyEnc[r][2] = K2; in s_anubis_setup()
[all …]
H A Dnoekeon.c67 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in noekeon_setup() argument
72 LTC_ARGCHK(skey != NULL); in noekeon_setup()
82 LOAD32H(skey->noekeon.K[0],&key[0]); in noekeon_setup()
83 LOAD32H(skey->noekeon.K[1],&key[4]); in noekeon_setup()
84 LOAD32H(skey->noekeon.K[2],&key[8]); in noekeon_setup()
85 LOAD32H(skey->noekeon.K[3],&key[12]); in noekeon_setup()
87 LOAD32H(skey->noekeon.dK[0],&key[0]); in noekeon_setup()
88 LOAD32H(skey->noekeon.dK[1],&key[4]); in noekeon_setup()
89 LOAD32H(skey->noekeon.dK[2],&key[8]); in noekeon_setup()
90 LOAD32H(skey->noekeon.dK[3],&key[12]); in noekeon_setup()
[all …]
H A Dkasumi.c133 int kasumi_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in kasumi_ecb_encrypt() argument
140 LTC_ARGCHK(skey != NULL); in kasumi_ecb_encrypt()
146 temp = FL(left, n, skey); in kasumi_ecb_encrypt()
147 temp = FO(temp, n++, skey); in kasumi_ecb_encrypt()
149 temp = FO(right, n, skey); in kasumi_ecb_encrypt()
150 temp = FL(temp, n++, skey); in kasumi_ecb_encrypt()
160 int kasumi_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) in kasumi_ecb_decrypt() argument
167 LTC_ARGCHK(skey != NULL); in kasumi_ecb_decrypt()
173 temp = FO(right, n, skey); in kasumi_ecb_decrypt()
174 temp = FL(temp, n--, skey); in kasumi_ecb_decrypt()
[all …]
H A Drc6.c43 static int s_rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc6_setup() argument
45 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_rc6_setup()
51 LTC_ARGCHK(skey != NULL); in s_rc6_setup()
93 skey->rc6.K[i] = S[i]; in s_rc6_setup()
99 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc6_setup() argument
102 x = s_rc6_setup(key, keylen, num_rounds, skey); in rc6_setup()
115 static int s_rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_rc6_ecb_encrypt() argument
117 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_rc6_ecb_encrypt()
124 LTC_ARGCHK(skey != NULL); in s_rc6_ecb_encrypt()
129 b += skey->rc6.K[0]; in s_rc6_ecb_encrypt()
[all …]
H A Drc2.c63 …t rc2_setup_ex(const unsigned char *key, int keylen, int bits, int num_rounds, symmetric_key *skey) in rc2_setup_ex() argument
65 unsigned *xkey = skey->rc2.xkey; in rc2_setup_ex()
71 LTC_ARGCHK(skey != NULL); in rc2_setup_ex()
126 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in rc2_setup() argument
128 return rc2_setup_ex(key, keylen, keylen * 8, num_rounds, skey); in rc2_setup()
144 const symmetric_key *skey) in s_rc2_ecb_encrypt() argument
148 const symmetric_key *skey) in s_rc2_ecb_encrypt()
156 LTC_ARGCHK(skey != NULL); in s_rc2_ecb_encrypt()
158 xkey = skey->rc2.xkey; in s_rc2_ecb_encrypt()
201 const symmetric_key *skey) in rc2_ecb_encrypt() argument
[all …]
H A Dkseed.c194 int kseed_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in kseed_setup() argument
214 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]); in kseed_setup()
215 skey->kseed.K[2*i+1] = G(k2 - k4 + KCi[i]); in kseed_setup()
226 skey->kseed.dK[2*(15-i)+0] = skey->kseed.K[2*i+0]; in kseed_setup()
227 skey->kseed.dK[2*(15-i)+1] = skey->kseed.K[2*i+1]; in kseed_setup()
251 int kseed_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in kseed_ecb_encrypt() argument
258 rounds(P, skey->kseed.K); in kseed_ecb_encrypt()
273 int kseed_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) in kseed_ecb_decrypt() argument
280 rounds(P, skey->kseed.dK); in kseed_ecb_decrypt()
291 void kseed_done(symmetric_key *skey) in kseed_done() argument
[all …]
H A Dmulti2.c114 int multi2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in multi2_setup() argument
120 LTC_ARGCHK(skey != NULL); in multi2_setup()
125 skey->multi2.N = num_rounds; in multi2_setup()
131 s_setup(dk, sk, skey->multi2.uk); in multi2_setup()
145 int multi2_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in multi2_ecb_encrypt() argument
150 LTC_ARGCHK(skey != NULL); in multi2_ecb_encrypt()
153 s_encrypt(p, skey->multi2.N, skey->multi2.uk); in multi2_ecb_encrypt()
166 int multi2_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) in multi2_ecb_decrypt() argument
171 LTC_ARGCHK(skey != NULL); in multi2_ecb_decrypt()
174 s_decrypt(p, skey->multi2.N, skey->multi2.uk); in multi2_ecb_decrypt()
[all …]
H A Dskipjack.c59 int skipjack_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in skipjack_setup() argument
64 LTC_ARGCHK(skey != NULL); in skipjack_setup()
76 skey->skipjack.key[x] = key[x] & 255; in skipjack_setup()
83 tmp = g_func(w1, &kp, skey->skipjack.key); \
89 tmp = g_func(w1, &kp, skey->skipjack.key); \
96 w1 = ig_func(w2, &kp, skey->skipjack.key); \
100 tmp = ig_func(w2, &kp, skey->skipjack.key); \
136 …c int s_skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_skipjack_ecb_encrypt() argument
138 int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in s_skipjack_ecb_encrypt()
146 LTC_ARGCHK(skey != NULL); in s_skipjack_ecb_encrypt()
[all …]
/optee_os/core/lib/libtomcrypt/
H A Daes_accel.c57 symmetric_key *skey) in rijndael_setup() argument
62 LTC_ARGCHK(skey); in rijndael_setup()
67 skey->rijndael.eK = LTC_ALIGN_BUF(skey->rijndael.K, 16); in rijndael_setup()
68 skey->rijndael.dK = skey->rijndael.eK + EXPANDED_AES_KEY_WORD_COUNT; in rijndael_setup()
70 if (crypto_accel_aes_expand_keys(key, keylen, skey->rijndael.eK, in rijndael_setup()
71 skey->rijndael.dK, in rijndael_setup()
79 skey->rijndael.Nr = round_count; in rijndael_setup()
84 void rijndael_done(symmetric_key *skey __unused) in rijndael_done()
106 const symmetric_key *skey) in aes_ecb_encrypt_nblocks() argument
110 LTC_ARGCHK(skey); in aes_ecb_encrypt_nblocks()
[all …]
H A Daes.c23 symmetric_key skey; in crypto_aes_expand_enc_key()
28 if (aes_setup(key, key_len, 0, &skey)) in crypto_aes_expand_enc_key()
31 memcpy(enc_key, skey.rijndael.eK, AES_ENC_KEY_LEN); in crypto_aes_expand_enc_key()
32 *rounds = skey.rijndael.Nr; in crypto_aes_expand_enc_key()
43 symmetric_key skey = { }; in crypto_aes_enc_block()
46 skey.rijndael.eK = LTC_ALIGN_BUF(skey.rijndael.K, 16); in crypto_aes_enc_block()
47 memcpy(skey.rijndael.eK, enc_key, AES_ENC_KEY_LEN); in crypto_aes_enc_block()
48 skey.rijndael.Nr = rounds; in crypto_aes_enc_block()
49 if (aes_ecb_encrypt(src, dst, &skey)) in crypto_aes_enc_block()
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_cipher.h398 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
405 int (*ecb_encrypt)(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey);
412 int (*ecb_decrypt)(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey);
421 void (*done)(symmetric_key *skey);
437 …rypt)(const unsigned char *pt, unsigned char *ct, unsigned long blocks, const symmetric_key *skey);
446 …rypt)(const unsigned char *ct, unsigned char *pt, unsigned long blocks, const symmetric_key *skey);
456 …nsigned char *pt, unsigned char *ct, unsigned long blocks, unsigned char *IV, symmetric_key *skey);
466 …nsigned char *ct, unsigned char *pt, unsigned long blocks, unsigned char *IV, symmetric_key *skey);
477 …ar *pt, unsigned char *ct, unsigned long blocks, unsigned char *IV, int mode, symmetric_key *skey);
488 …har *ct, unsigned long blocks, unsigned char *IV, const unsigned char *tweak, symmetric_key *skey);
[all …]
/optee_os/core/lib/libtomcrypt/src/ciphers/twofish/
H A Dtwofish.c272 #define S1 skey->twofish.S[0]
273 #define S2 skey->twofish.S[1]
274 #define S3 skey->twofish.S[2]
275 #define S4 skey->twofish.S[3]
338 …atic int s_twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_twofish_setup() argument
340 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in s_twofish_setup()
351 LTC_ARGCHK(skey != NULL); in s_twofish_setup()
377 rs_mult(M+(x*8), skey->twofish.S+(x*4)); in s_twofish_setup()
399 skey->twofish.K[x+x] = (A + B) & 0xFFFFFFFFUL; in s_twofish_setup()
402 skey->twofish.K[x+x+1] = ROLc(B + B + A, 9); in s_twofish_setup()
[all …]
/optee_os/core/lib/libtomcrypt/src/mac/xcbc/
H A Dxcbc_init.c22 symmetric_key *skey; in xcbc_init() local
39 skey = NULL; in xcbc_init()
58 skey = XCALLOC(1, sizeof(*skey)); in xcbc_init()
59 if (skey == NULL) { in xcbc_init()
63 if ((err = cipher_descriptor[cipher]->setup(key, keylen, 0, skey)) != CRYPT_OK) { in xcbc_init()
72 cipher_descriptor[cipher]->ecb_encrypt(xcbc->K[y], xcbc->K[y], skey); in xcbc_init()
85 cipher_descriptor[cipher]->done(skey); in xcbc_init()
86 if (skey != NULL) { in xcbc_init()
88 zeromem(skey, sizeof(*skey)); in xcbc_init()
90 XFREE(skey); in xcbc_init()
/optee_os/core/lib/libtomcrypt/src/ciphers/aes/
H A Daesni.c45 int aesni_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in aesni_setup() argument
52 LTC_ARGCHK(skey != NULL); in aesni_setup()
62 skey->rijndael.Nr = keylen / 4 + 6; in aesni_setup()
63 K = LTC_ALIGN_BUF(skey->rijndael.K, 16); in aesni_setup()
64 skey->rijndael.eK = K; in aesni_setup()
66 skey->rijndael.dK = K; in aesni_setup()
70 rk = skey->rijndael.eK; in aesni_setup()
134 rk = skey->rijndael.dK; in aesni_setup()
135 rrk = skey->rijndael.eK + skey->rijndael.Nr * 4; in aesni_setup()
146 for (i = 1; i < skey->rijndael.Nr; i++) { in aesni_setup()
[all …]
/optee_os/core/lib/libtomcrypt/src/encauth/ccm/
H A Dccm_memory.c45 symmetric_key *skey; in ccm_memory() local
117 skey = XMALLOC(sizeof(*skey)); in ccm_memory()
118 if (skey == NULL) { in ccm_memory()
123 if ((err = cipher_descriptor[cipher]->setup(key, keylen, 0, skey)) != CRYPT_OK) { in ccm_memory()
124 XFREE(skey); in ccm_memory()
128 skey = uskey; in ccm_memory()
173 if ((err = cipher_descriptor[cipher]->ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { in ccm_memory()
198 if ((err = cipher_descriptor[cipher]->ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { in ccm_memory()
207 if ((err = cipher_descriptor[cipher]->ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { in ccm_memory()
242 if ((err = cipher_descriptor[cipher]->ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) { in ccm_memory()
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
H A Decc_encrypt_key.c30 unsigned char *pub_expt, *ecc_shared, *skey; in ecc_encrypt_key() local
54 skey = XMALLOC(MAXBLOCKSIZE); in ecc_encrypt_key()
55 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) { in ecc_encrypt_key()
62 if (skey != NULL) { in ecc_encrypt_key()
63 XFREE(skey); in ecc_encrypt_key()
90 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) { in ecc_encrypt_key()
96 skey[x] ^= in[x]; in ecc_encrypt_key()
102 … LTC_ASN1_OCTET_STRING, inlen, skey, in ecc_encrypt_key()
110 zeromem(skey, MAXBLOCKSIZE); in ecc_encrypt_key()
113 XFREE(skey); in ecc_encrypt_key()
/optee_os/core/lib/libtomcrypt/src/pk/dsa/
H A Ddsa_encrypt_key.c29 unsigned char *expt, *skey; in dsa_encrypt_key() local
58 skey = XMALLOC(MAXBLOCKSIZE); in dsa_encrypt_key()
59 if (expt == NULL || skey == NULL) { in dsa_encrypt_key()
63 if (skey != NULL) { in dsa_encrypt_key()
64 XFREE(skey); in dsa_encrypt_key()
89 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) { in dsa_encrypt_key()
95 skey[x] ^= in[x]; in dsa_encrypt_key()
101 … LTC_ASN1_OCTET_STRING, inlen, skey, in dsa_encrypt_key()
108 zeromem(skey, MAXBLOCKSIZE); in dsa_encrypt_key()
111 XFREE(skey); in dsa_encrypt_key()

12