| /optee_os/core/lib/libtomcrypt/src/ciphers/aes/ |
| H A D | aesni.c | 179 __m128i block; in s_aesni_ecb_encrypt() local 190 block = _mm_loadu_si128((const __m128i*) (pt)); in s_aesni_ecb_encrypt() 192 block = _mm_xor_si128(block, skeys[0]); in s_aesni_ecb_encrypt() 194 block = _mm_aesenc_si128(block, skeys[r]); in s_aesni_ecb_encrypt() 195 block = _mm_aesenc_si128(block, skeys[r + 1]); in s_aesni_ecb_encrypt() 197 block = _mm_aesenc_si128(block, skeys[Nr - 1]); in s_aesni_ecb_encrypt() 198 block = _mm_aesenclast_si128(block, skeys[Nr]); in s_aesni_ecb_encrypt() 200 _mm_storeu_si128((__m128i*) ct, block); in s_aesni_ecb_encrypt() 230 __m128i block; in s_aesni_ecb_decrypt() local 241 block = _mm_loadu_si128((const __m128i*) (ct)); in s_aesni_ecb_decrypt() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/mac/omac/ |
| H A D | omac_done.c | 31 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || in omac_done() 32 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { in omac_done() 39 omac->block[omac->buflen++] = 0x80; in omac_done() 43 omac->block[omac->buflen++] = 0x00; in omac_done() 52 omac->block[x] ^= omac->prev[x] ^ omac->Lu[mode][x]; in omac_done() 56 …if ((err = cipher_descriptor[omac->cipher_idx]->ecb_encrypt(omac->block, omac->block, &omac->key))… in omac_done() 63 out[x] = omac->block[x]; in omac_done()
|
| H A D | omac_process.c | 31 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || in omac_process() 32 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { in omac_process() 60 omac->block[x] ^= omac->prev[x]; in omac_process() 62 …if ((err = cipher_descriptor[omac->cipher_idx]->ecb_encrypt(omac->block, omac->prev, &omac->key)) … in omac_process() 70 XMEMCPY(omac->block + omac->buflen, in, n); in omac_process()
|
| H A D | omac_init.c | 84 zeromem(omac->block, sizeof(omac->block)); in omac_init()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | aesce.c | 159 block = vaeseq_u8(block, vld1q_u8(keys)); \ 160 block = vaesmcq_u8(block); \ 166 static uint8x16_t aesce_encrypt_block(uint8x16_t block, in aesce_encrypt_block() argument 189 block = vaeseq_u8(block, vld1q_u8(keys)); in aesce_encrypt_block() 195 block = veorq_u8(block, vld1q_u8(keys)); in aesce_encrypt_block() 197 return block; in aesce_encrypt_block() 222 block = vaesdq_u8(block, vld1q_u8(keys)); \ 223 block = vaesimcq_u8(block); \ 229 static uint8x16_t aesce_decrypt_block(uint8x16_t block, in aesce_decrypt_block() argument 252 block = vaesdq_u8(block, vld1q_u8(keys)); in aesce_decrypt_block() [all …]
|
| /optee_os/core/crypto/ |
| H A D | cbc-mac.c | 25 uint8_t block[CBCMAC_MAX_BLOCK_LEN]; member 47 memset(mc->block, 0, sizeof(mc->block)); in crypto_cbc_mac_init() 54 NULL, 0, mc->block, mc->block_len); in crypto_cbc_mac_init() 71 memcpy(mc->block + mc->current_block_len, data, pad_len); in crypto_cbc_mac_update() 75 false, mc->block, mc->block_len, in crypto_cbc_mac_update() 118 memcpy(mc->block + mc->current_block_len, data, len); in crypto_cbc_mac_update() 140 memset(mc->block + mc->current_block_len, pad_len, pad_len); in crypto_cbc_mac_final() 142 if (crypto_cbc_mac_update(ctx, mc->block, mc->block_len)) in crypto_cbc_mac_final() 174 memcpy(dst->block, src->block, sizeof(dst->block)); in crypto_cbc_mac_copy_state()
|
| H A D | aes-gcm.c | 31 uint64_t block[2]; in ghash_update_pad_zero() local 41 memcpy(block, data + m * sizeof(block), in ghash_update_pad_zero() 42 sizeof(block)); in ghash_update_pad_zero() 44 (void *)block, 1); in ghash_update_pad_zero() 50 memset(block, 0, sizeof(block)); in ghash_update_pad_zero() 51 memcpy(block, data + n * TEE_AES_BLOCK_SIZE, in ghash_update_pad_zero() 53 internal_aes_gcm_ghash_update(state, block, NULL, 0); in ghash_update_pad_zero()
|
| H A D | rng_fortuna.c | 315 static TEE_Result generate_blocks(void *block, size_t nblocks) in generate_blocks() argument 317 uint8_t *b = block; in generate_blocks() 349 uint8_t block[BLOCK_SIZE]; in generate_random_data() local 352 res = generate_blocks(block, 1); in generate_random_data() 355 memcpy(b, block, blen % BLOCK_SIZE); in generate_random_data()
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | aes_ctr.c | 26 unsigned char block[TEE_AES_BLOCK_SIZE]; member 68 c->block, data, dst)) in mbed_aes_ctr_update() 79 memset(c->block, 0, sizeof(c->block)); in mbed_aes_ctr_final() 94 memcpy(dst->block, src->block, sizeof(dst->block)); in mbed_aes_ctr_copy_state()
|
| /optee_os/core/drivers/crypto/caam/utils/ |
| H A D | utils_mem.c | 199 enum caam_status caam_cpy_block_src(struct caamblock *block, in caam_cpy_block_src() argument 209 if (!block->buf.data) { in caam_cpy_block_src() 210 ret = caam_alloc_align_buf(&block->buf, block->max); in caam_cpy_block_src() 218 MEM_TRACE("Current buffer is %zu (%zu) bytes", block->filled, in caam_cpy_block_src() 219 block->max); in caam_cpy_block_src() 221 cpy_size = block->max - block->filled; in caam_cpy_block_src() 224 memcpy(&block->buf.data[block->filled], &src->data[offset], cpy_size); in caam_cpy_block_src() 226 block->filled += cpy_size; in caam_cpy_block_src()
|
| /optee_os/core/lib/libtomcrypt/src/mac/pmac/ |
| H A D | pmac_done.c | 22 if ((pmac->buflen > (int)sizeof(pmac->block)) || (pmac->buflen < 0) || in pmac_done() 23 (pmac->block_len > (int)sizeof(pmac->block)) || (pmac->buflen > pmac->block_len)) { in pmac_done() 33 pmac->checksum[x] ^= pmac->block[x] ^ pmac->Lr[x]; in pmac_done() 38 pmac->checksum[x] ^= pmac->block[x]; in pmac_done()
|
| H A D | pmac_process.c | 32 if ((pmac->buflen > (int)sizeof(pmac->block)) || (pmac->buflen < 0) || in pmac_process() 33 (pmac->block_len > (int)sizeof(pmac->block)) || (pmac->buflen > pmac->block_len)) { in pmac_process() 62 Z[x] = pmac->Li[x] ^ pmac->block[x]; in pmac_process() 75 XMEMCPY(pmac->block + pmac->buflen, in, n); in pmac_process()
|
| H A D | pmac_init.c | 124 zeromem(pmac->block, sizeof(pmac->block)); in pmac_init()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pkcs5/ |
| H A D | pkcs_5_1.c | 44 unsigned long block = 0, iter; in s_pkcs_5_alg1_common() local 75 while(block * hash_descriptor[hash_idx]->hashsize < *outlen) { in s_pkcs_5_alg1_common() 82 if (openssl_compat && block) { in s_pkcs_5_alg1_common() 108 outidx = block*hash_descriptor[hash_idx]->hashsize; in s_pkcs_5_alg1_common() 117 block++; in s_pkcs_5_alg1_common()
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | ctr.c | 22 unsigned char block[TEE_AES_BLOCK_SIZE]; member 99 c->block, &dst_len); in se050_aes_ctr_update() 108 *dst++ = (unsigned char)(j ^ c->block[n]); in se050_aes_ctr_update() 121 memset(c->block, 0, sizeof(c->block)); in do_final()
|
| /optee_os/core/drivers/imx/dcp/ |
| H A D | dcp_utils.c | 83 void dcp_cmac_padding(uint8_t *block, size_t len) in dcp_cmac_padding() argument 89 block[i] = BIT(7); in dcp_cmac_padding() 91 block[i] = 0x0; in dcp_cmac_padding()
|
| /optee_os/core/tee/ |
| H A D | tee_ree_fs.c | 74 uint8_t *block; in out_of_place_write() local 85 block = get_tmp_block(); in out_of_place_write() 86 if (!block) in out_of_place_write() 99 start_block_num, block); in out_of_place_write() 103 memset(block, 0, BLOCK_SIZE); in out_of_place_write() 107 memcpy(block + offset, data_core_ptr, size_to_write); in out_of_place_write() 109 res = copy_from_user(block + offset, data_user_ptr, in out_of_place_write() 114 memset(block + offset, 0, size_to_write); in out_of_place_write() 118 block); in out_of_place_write() 137 if (block) in out_of_place_write() [all …]
|
| /optee_os/core/include/tee/ |
| H A D | fs_htree.h | 165 const void *block); 175 void *block);
|
| /optee_os/core/lib/libtomcrypt/src/hashes/ |
| H A D | blake2s.c | 229 unsigned char block[BLAKE2S_BLOCKBYTES]; in blake2s_init() local 231 XMEMSET(block, 0, BLAKE2S_BLOCKBYTES); in blake2s_init() 232 XMEMCPY(block, key, keylen); in blake2s_init() 233 blake2s_process(md, block, BLAKE2S_BLOCKBYTES); in blake2s_init() 236 zeromem(block, sizeof(block)); in blake2s_init()
|
| H A D | blake2b.c | 235 unsigned char block[BLAKE2B_BLOCKBYTES]; in blake2b_init() local 237 XMEMSET(block, 0, BLAKE2B_BLOCKBYTES); in blake2b_init() 238 XMEMCPY(block, key, keylen); in blake2b_init() 239 blake2b_process(md, block, BLAKE2B_BLOCKBYTES); in blake2b_init() 242 zeromem(block, sizeof(block)); in blake2b_init()
|
| /optee_os/core/lib/libtomcrypt/src/stream/rabbit/ |
| H A D | rabbit.c | 213 XMEMSET(&(st->block), 0, sizeof(st->block)); in rabbit_setup() 262 XMEMSET(&(st->block), 0, sizeof(st->block)); in rabbit_setiv() 284 for (i = 0; i < j; ++i, st->unused--) out[i] = in[i] ^ st->block[16 - st->unused]; in rabbit_crypt() 298 for (i = inlen; i < 16; ++i) st->block[i] = buf[i]; in rabbit_crypt()
|
| /optee_os/core/pta/tests/ |
| H A D | fs_htree.c | 27 uint8_t *block; member 107 *data = a->block; in test_read_init() 132 memcpy(a->block, a->data + offs, *bytes); in test_read_final() 155 memcpy(a->data + offs, a->block, sz); in test_write_final() 402 free(aux->block); in aux_free() 425 aux->block = malloc(TEST_BLOCK_SIZE); in aux_alloc() 426 if (!aux->block) in aux_alloc()
|
| /optee_os/core/drivers/crypto/stm32/ |
| H A D | stm32_saes.c | 743 uint32_t block[AES_BLOCK_NB_U32] = { }; in stm32_saes_update_assodata() local 745 memcpy(block, ctx->extra, ctx->extra_size); in stm32_saes_update_assodata() 746 memcpy((uint8_t *)block + ctx->extra_size, data, in stm32_saes_update_assodata() 749 write_aligned_block(ctx->base, block); in stm32_saes_update_assodata() 1135 uint8_t block[AES_BLOCK_SIZE] = { }; in stm32_saes_cmac_prf_128() local 1182 key_sel, key, key_size, block, in stm32_saes_cmac_prf_128() 1183 sizeof(block)); in stm32_saes_cmac_prf_128() 1195 memcpy(block, data_out + processed - AES_BLOCK_SIZE, in stm32_saes_cmac_prf_128() 1206 xor_block(block, data + processed, data_size - processed); in stm32_saes_cmac_prf_128() 1208 xor_block(block, k1, AES_BLOCK_SIZE); in stm32_saes_cmac_prf_128() [all …]
|
| /optee_os/core/drivers/imx/dcp/include/ |
| H A D | dcp_utils.h | 78 void dcp_cmac_padding(uint8_t *block, size_t len);
|
| /optee_os/core/drivers/crypto/caam/include/ |
| H A D | caam_utils_mem.h | 104 enum caam_status caam_cpy_block_src(struct caamblock *block,
|