| /optee_os/core/lib/libtomcrypt/src/prngs/ |
| H A D | yarrow.c | 40 prng->u.yarrow.cipher = register_cipher(&rijndael_enc_desc); in yarrow_start() 42 prng->u.yarrow.cipher = register_cipher(&aes_enc_desc); in yarrow_start() 44 prng->u.yarrow.cipher = register_cipher(&rijndael_desc); in yarrow_start() 46 prng->u.yarrow.cipher = register_cipher(&aes_desc); in yarrow_start() 49 prng->u.yarrow.cipher = register_cipher(&blowfish_desc); in yarrow_start() 51 prng->u.yarrow.cipher = register_cipher(&twofish_desc); in yarrow_start() 53 prng->u.yarrow.cipher = register_cipher(&rc6_desc); in yarrow_start() 55 prng->u.yarrow.cipher = register_cipher(&rc5_desc); in yarrow_start() 57 prng->u.yarrow.cipher = register_cipher(&saferp_desc); in yarrow_start() 59 prng->u.yarrow.cipher = register_cipher(&rc2_desc); in yarrow_start() [all …]
|
| H A D | fortuna.c | 73 IV = prng->u.fortuna.IV; in s_fortuna_update_iv() 117 if (now == prng->u.fortuna.wd) { in s_fortuna_reseed() 121 if (++prng->u.fortuna.wd < LTC_FORTUNA_WD) { in s_fortuna_reseed() 128 if ((err = sha256_process(&md, prng->u.fortuna.K, 32)) != CRYPT_OK) { in s_fortuna_reseed() 133 reset_cnt = prng->u.fortuna.reset_cnt + 1; in s_fortuna_reseed() 138 if ((err = sha256_done(&prng->u.fortuna.pool[x], tmp)) != CRYPT_OK) { in s_fortuna_reseed() 148 if ((err = sha256_init(&prng->u.fortuna.pool[x])) != CRYPT_OK) { in s_fortuna_reseed() 158 if ((err = sha256_done(&md, prng->u.fortuna.K)) != CRYPT_OK) { in s_fortuna_reseed() 161 if ((err = AES_SETUP(prng->u.fortuna.K, 32, 0, &prng->u.fortuna.skey)) != CRYPT_OK) { in s_fortuna_reseed() 167 prng->u.fortuna.pool0_len = 0; in s_fortuna_reseed() [all …]
|
| H A D | chacha20.c | 35 XMEMSET(&prng->u.chacha.ent, 0, sizeof(prng->u.chacha.ent)); in chacha20_prng_start() 36 prng->u.chacha.idx = 0; in chacha20_prng_start() 61 … if ((err = chacha_keystream(&prng->u.chacha.s, buf, sizeof(buf))) != CRYPT_OK) goto LBL_UNLOCK; in chacha20_prng_add_entropy() 64 if ((err = chacha_setup(&prng->u.chacha.s, buf, 32, 20)) != CRYPT_OK) goto LBL_UNLOCK; in chacha20_prng_add_entropy() 66 if ((err = chacha_ivctr64(&prng->u.chacha.s, buf + 32, 8, 0)) != CRYPT_OK) goto LBL_UNLOCK; in chacha20_prng_add_entropy() 72 … while (inlen--) prng->u.chacha.ent[prng->u.chacha.idx++ % sizeof(prng->u.chacha.ent)] ^= *in++; in chacha20_prng_add_entropy() 94 …if ((err = chacha_setup(&prng->u.chacha.s, prng->u.chacha.ent, 32, 20)) != CRYPT_OK) goto LBL… in chacha20_prng_ready() 96 …if ((err = chacha_ivctr64(&prng->u.chacha.s, prng->u.chacha.ent + 32, 8, 0)) != CRYPT_OK) goto LBL… in chacha20_prng_ready() 97 XMEMSET(&prng->u.chacha.ent, 0, sizeof(prng->u.chacha.ent)); in chacha20_prng_ready() 98 prng->u.chacha.idx = 0; in chacha20_prng_ready() [all …]
|
| H A D | sober128.c | 37 XMEMSET(&prng->u.sober128.ent, 0, sizeof(prng->u.sober128.ent)); in sober128_start() 38 prng->u.sober128.idx = 0; in sober128_start() 63 …if ((err = sober128_stream_keystream(&prng->u.sober128.s, buf, sizeof(buf))) != CRYPT_OK) goto LBL… in sober128_add_entropy() 66 … if ((err = sober128_stream_setup(&prng->u.sober128.s, buf, 32)) != CRYPT_OK) goto LBL_UNLOCK; in sober128_add_entropy() 68 … if ((err = sober128_stream_setiv(&prng->u.sober128.s, buf + 32, 8)) != CRYPT_OK) goto LBL_UNLOCK; in sober128_add_entropy() 74 …while (inlen--) prng->u.sober128.ent[prng->u.sober128.idx++ % sizeof(prng->u.sober128.ent)] ^= *in… in sober128_add_entropy() 96 …if ((err = sober128_stream_setup(&prng->u.sober128.s, prng->u.sober128.ent, 32)) != CRYPT_OK) … in sober128_ready() 98 …if ((err = sober128_stream_setiv(&prng->u.sober128.s, prng->u.sober128.ent + 32, 8)) != CRYPT_OK) … in sober128_ready() 99 XMEMSET(&prng->u.sober128.ent, 0, sizeof(prng->u.sober128.ent)); in sober128_ready() 100 prng->u.sober128.idx = 0; in sober128_ready() [all …]
|
| H A D | rc4.c | 36 prng->u.rc4.s.x = 0; in rc4_start() 38 XMEMSET(&prng->u.rc4.s.buf, 0, sizeof(prng->u.rc4.s.buf)); in rc4_start() 63 … if ((err = rc4_stream_keystream(&prng->u.rc4.s, buf, sizeof(buf))) != CRYPT_OK) goto LBL_UNLOCK; in rc4_add_entropy() 66 if ((err = rc4_stream_setup(&prng->u.rc4.s, buf, sizeof(buf))) != CRYPT_OK) goto LBL_UNLOCK; in rc4_add_entropy() 68 for (i = 0; i < 12; i++) rc4_stream_keystream(&prng->u.rc4.s, buf, sizeof(buf)); in rc4_add_entropy() 73 while (inlen--) prng->u.rc4.s.buf[prng->u.rc4.s.x++ % sizeof(prng->u.rc4.s.buf)] ^= *in++; in rc4_add_entropy() 96 XMEMCPY(buf, prng->u.rc4.s.buf, sizeof(buf)); in rc4_ready() 98 len = MIN(prng->u.rc4.s.x, 256); /* TODO: we can perhaps always use all 256 bytes */ in rc4_ready() 99 if ((err = rc4_stream_setup(&prng->u.rc4.s, buf, len)) != CRYPT_OK) goto LBL_UNLOCK; in rc4_ready() 101 for (i = 0; i < 12; i++) rc4_stream_keystream(&prng->u.rc4.s, buf, sizeof(buf)); in rc4_ready() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_se.c | 50 } u; member 84 return &driver->u.context; in psa_get_se_driver_context() 96 *p_drv_context = (driver ? &driver->u.context : NULL); in psa_get_se_driver() 116 if (driver->u.internal.persistent_data_size > UINT32_MAX) { in psa_get_se_driver_its_file_uid() 145 (uint32_t) driver->u.internal.persistent_data_size, in psa_load_se_persistent_data() 146 driver->u.internal.persistent_data, in psa_load_se_persistent_data() 165 (uint32_t) driver->u.internal.persistent_data_size, in psa_save_se_persistent_data() 166 driver->u.internal.persistent_data, in psa_save_se_persistent_data() 210 status = p_validate_slot_number(&driver->u.context, in psa_find_se_slot_for_key() 211 driver->u.internal.persistent_data, in psa_find_se_slot_for_key() [all …]
|
| H A D | camellia.c | 864 int i, j, u, v; in mbedtls_camellia_self_test() local 885 u = j >> 1; in mbedtls_camellia_self_test() 889 mbedtls_printf(" CAMELLIA-ECB-%3d (%s): ", 128 + u * 64, in mbedtls_camellia_self_test() 903 memcpy(key, camellia_test_ecb_key[u][i], 16 + 8 * u); in mbedtls_camellia_self_test() 907 mbedtls_camellia_setkey_dec(&ctx, key, 128 + u * 64); in mbedtls_camellia_self_test() 908 memcpy(src, camellia_test_ecb_cipher[u][i], 16); in mbedtls_camellia_self_test() 913 mbedtls_camellia_setkey_enc(&ctx, key, 128 + u * 64); in mbedtls_camellia_self_test() 915 memcpy(dst, camellia_test_ecb_cipher[u][i], 16); in mbedtls_camellia_self_test() 942 u = j >> 1; in mbedtls_camellia_self_test() 946 mbedtls_printf(" CAMELLIA-CBC-%3d (%s): ", 128 + u * 64, in mbedtls_camellia_self_test() [all …]
|
| H A D | des.c | 836 int i, j, u, v, ret = 0; in mbedtls_des_self_test() local 851 u = i >> 1; in mbedtls_des_self_test() 856 (u == 0) ? ' ' : '3', 56 + u * 56, in mbedtls_des_self_test() 895 if (u == 0) { in mbedtls_des_self_test() 906 memcmp(buf, des3_test_ecb_dec[u], 8) != 0) || in mbedtls_des_self_test() 908 memcmp(buf, des3_test_ecb_enc[u], 8) != 0)) { in mbedtls_des_self_test() 931 u = i >> 1; in mbedtls_des_self_test() 936 (u == 0) ? ' ' : '3', 56 + u * 56, in mbedtls_des_self_test() 978 if (u == 0) { in mbedtls_des_self_test() 991 if (u == 0) { in mbedtls_des_self_test() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_sizes.h | 75 0u) 107 0u) 191 ((void) (key_bits), 0u)) 239 #define PSA_VENDOR_FFDH_MAX_KEY_BITS 0u 271 #define PSA_VENDOR_ECC_MAX_CURVE_BITS 0u 332 ((void) (key_type), (void) (key_bits), 0u)) 363 0u) 417 0u) 469 0u : \ 472 0u) [all …]
|
| /optee_os/core/tee/ |
| H A D | entry_std.c | 216 ta_param->u[n].val.a = READ_ONCE(params[n].u.value.a); in copy_in_params() 217 ta_param->u[n].val.b = READ_ONCE(params[n].u.value.b); in copy_in_params() 223 res = set_fmem_param(¶ms[n].u.fmem, in copy_in_params() 224 &ta_param->u[n].mem); in copy_in_params() 234 res = set_tmem_param(¶ms[n].u.tmem, saved_attr[n], in copy_in_params() 235 &ta_param->u[n].mem); in copy_in_params() 245 res = set_rmem_param(¶ms[n].u.rmem, in copy_in_params() 246 &ta_param->u[n].mem); in copy_in_params() 279 mobj_put(param->u[n].mem.mobj); in cleanup_shm_refs() 299 params[n].u.tmem.size = ta_param->u[n].mem.size; in copy_out_param() [all …]
|
| H A D | tee_cryp_pbkdf2.c | 31 uint8_t u[TEE_MAX_HASH_SIZE]; in pbkdf2_f() local 56 res = crypto_mac_update(h->ctx, u, h->hash_len); in pbkdf2_f() 61 res = crypto_mac_final(h->ctx, u, sizeof(u)); in pbkdf2_f() 66 out[j] ^= u[j]; in pbkdf2_f()
|
| H A D | socket.c | 59 params[3].value.a = tpm[3].u.value.a; in socket_open() 121 params[2].value.a = tpm[2].u.value.b; /* transmitted bytes */ in socket_send() 164 tpm[1].u.memref.size)); in socket_recv() 168 params[1].memref.size = tpm[1].u.memref.size; in socket_recv() 209 if (tpm[1].u.memref.size <= params[1].memref.size) { in socket_ioctl() 213 tpm[1].u.memref.size); in socket_ioctl() 218 params[1].memref.size = tpm[1].u.memref.size; in socket_ioctl() 257 .attr = THREAD_PARAM_ATTR_VALUE_IN, .u.value = { in pta_socket_close_session()
|
| H A D | tee_svc.c | 614 p->u[n].mem.offs = memtag_strip_tag_vaddr((void *)a); in utee_param_to_param() 615 p->u[n].mem.size = b; in utee_param_to_param() 617 if (!p->u[n].mem.offs) { in utee_param_to_param() 619 if (p->u[n].mem.size) { in utee_param_to_param() 623 p->u[n].mem.mobj = NULL; in utee_param_to_param() 627 p->u[n].mem.mobj = &mobj_virt; in utee_param_to_param() 635 p->u[n].val.a = a; in utee_param_to_param() 636 p->u[n].val.b = b; in utee_param_to_param() 639 memset(&p->u[n], 0, sizeof(p->u[n])); in utee_param_to_param() 701 va = (void *)param->u[n].mem.offs; in tee_svc_copy_param() [all …]
|
| /optee_os/core/arch/riscv/kernel/ |
| H A D | thread_optee_abi.c | 424 param->u.rmem.offs = tpm->u.memref.offs; in set_rmem() 425 param->u.rmem.size = tpm->u.memref.size; in set_rmem() 426 if (tpm->u.memref.mobj) { in set_rmem() 427 param->u.rmem.shm_ref = mobj_get_cookie(tpm->u.memref.mobj); in set_rmem() 428 if (!param->u.rmem.shm_ref) in set_rmem() 431 param->u.rmem.shm_ref = 0; in set_rmem() 442 struct mobj *mobj = tpm->u.memref.mobj; in set_tmem() 450 if (mobj_get_pa(mobj, tpm->u.memref.offs, 0, &pa)) in set_tmem() 454 param->u.tmem.size = tpm->u.memref.size; in set_tmem() 455 param->u.tmem.buf_ptr = pa; in set_tmem() [all …]
|
| /optee_os/core/arch/arm/kernel/ |
| H A D | thread_optee_smc.c | 423 param->u.rmem.offs = tpm->u.memref.offs; in set_rmem() 424 param->u.rmem.size = tpm->u.memref.size; in set_rmem() 425 if (tpm->u.memref.mobj) { in set_rmem() 426 param->u.rmem.shm_ref = mobj_get_cookie(tpm->u.memref.mobj); in set_rmem() 427 if (!param->u.rmem.shm_ref) in set_rmem() 430 param->u.rmem.shm_ref = 0; in set_rmem() 441 struct mobj *mobj = tpm->u.memref.mobj; in set_tmem() 449 if (mobj_get_pa(mobj, tpm->u.memref.offs, 0, &pa)) in set_tmem() 453 param->u.tmem.size = tpm->u.memref.size; in set_tmem() 454 param->u.tmem.buf_ptr = pa; in set_tmem() [all …]
|
| /optee_os/lib/libutee/ |
| H A D | tee_uuid_from_str.c | 45 TEE_UUID u = { }; in tee_uuid_from_str() local 54 u.timeLow = parse_hex(p, 8, &res); in tee_uuid_from_str() 58 u.timeMid = parse_hex(p, 4, &res); in tee_uuid_from_str() 62 u.timeHiAndVersion = parse_hex(p, 4, &res); in tee_uuid_from_str() 67 u.clockSeqAndNode[i] = parse_hex(p, 2, &res); in tee_uuid_from_str() 75 *uuid = u; in tee_uuid_from_str()
|
| /optee_os/lib/libutils/isoc/arch/arm/softfloat/source/ |
| H A D | ui64_to_f32.c | 46 union ui32_f32 u; in ui64_to_f32() local 51 u.ui = in ui64_to_f32() 55 return u.f; in ui64_to_f32()
|
| H A D | i64_to_f32.c | 49 union ui32_f32 u; in i64_to_f32() local 56 u.ui = in i64_to_f32() 60 return u.f; in i64_to_f32()
|
| H A D | extF80M_to_i64_r_minMag.c | 65 union { uint64_t ui; int64_t i; } u; in extF80M_to_i64_r_minMag() local 96 u.ui = -absZ; in extF80M_to_i64_r_minMag() 97 z = u.i; in extF80M_to_i64_r_minMag()
|
| H A D | extF80M_to_i32_r_minMag.c | 66 union { uint32_t ui; int32_t i; } u; in extF80M_to_i32_r_minMag() local 99 u.ui = -absZ; in extF80M_to_i32_r_minMag() 100 z = u.i; in extF80M_to_i32_r_minMag()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pkcs12/ |
| H A D | pkcs12_kdf.c | 14 unsigned long u = hash_descriptor[hash_id]->hashsize; in pkcs12_kdf() local 16 unsigned long c = (outlen + u - 1) / u; in pkcs12_kdf() 31 key = XMALLOC(u * c); in pkcs12_kdf() 34 zeromem(key, u * c); in pkcs12_kdf() 76 zeromem(key, u * c); in pkcs12_kdf()
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/ |
| H A D | rc6.c | 120 ulong32 a,b,c,d,t,u; in s_rc6_ecb_encrypt() local 134 u = (d * (d + d + 1)); u = ROLc(u, 5); \ in s_rc6_ecb_encrypt() 135 a = ROL(a^t,u) + K[0]; \ in s_rc6_ecb_encrypt() 136 c = ROL(c^u,t) + K[1]; K += 2; in s_rc6_ecb_encrypt() 175 ulong32 a,b,c,d,t,u; in s_rc6_ecb_decrypt() local 189 u = (d * (d + d + 1)); u = ROLc(u, 5); \ in s_rc6_ecb_decrypt() 190 c = ROR(c - K[1], t) ^ u; \ in s_rc6_ecb_decrypt() 191 a = ROR(a - K[0], u) ^ t; K -= 2; in s_rc6_ecb_decrypt()
|
| /optee_os/lib/libutils/ext/ |
| H A D | consttime_memcmp.c | 39 unsigned int isLT = 0u; in consttime_memcmp() 40 unsigned int isGT = 0u; in consttime_memcmp()
|
| /optee_os/core/kernel/ |
| H A D | tee_time.c | 38 time->seconds = params.u.value.a; in tee_time_get_ree_time() 39 time->millis = params.u.value.b / 1000000; in tee_time_get_ree_time()
|
| /optee_os/lib/libutils/compiler-rt/lib/builtins/ |
| H A D | int_types.h | 134 su_int u; member 139 udwords u; member 170 uqwords u; member 215 uqwords u; member
|