| /optee_os/core/lib/libtomcrypt/src/hashes/ |
| H A D | md5.c | 38 #define FF(a,b,c,d,M,s,t) \ argument 39 a = (a + F(b,c,d) + M + t); a = ROL(a, s) + b; 41 #define GG(a,b,c,d,M,s,t) \ argument 42 a = (a + G(b,c,d) + M + t); a = ROL(a, s) + b; 44 #define HH(a,b,c,d,M,s,t) \ argument 45 a = (a + H(b,c,d) + M + t); a = ROL(a, s) + b; 47 #define II(a,b,c,d,M,s,t) \ argument 48 a = (a + I(b,c,d) + M + t); a = ROL(a, s) + b; 77 #define FF(a,b,c,d,M,s,t) \ argument 78 a = (a + F(b,c,d) + M + t); a = ROLc(a, s) + b; [all …]
|
| H A D | md4.c | 54 #define FF(a, b, c, d, x, s) { \ argument 55 (a) += F ((b), (c), (d)) + (x); \ 58 #define GG(a, b, c, d, x, s) { \ argument 59 (a) += G ((b), (c), (d)) + (x) + 0x5a827999UL; \ 62 #define HH(a, b, c, d, x, s) { \ argument 63 (a) += H ((b), (c), (d)) + (x) + 0x6ed9eba1UL; \ 73 ulong32 x[16], a, b, c, d; in ss_md4_compress() local 80 d = md->md4.state[3]; in ss_md4_compress() 88 FF (a, b, c, d, x[ 0], S11); /* 1 */ in ss_md4_compress() 89 FF (d, a, b, c, x[ 1], S12); /* 2 */ in ss_md4_compress() [all …]
|
| H A D | sha1.c | 42 ulong32 a,b,c,d,e,W[80],i; in ss_sha1_compress() local 56 d = md->sha1.state[3]; in ss_sha1_compress() 66 … #define FF0(a,b,c,d,e,i) e = (ROLc(a, 5) + F0(b,c,d) + e + W[i] + 0x5a827999UL); b = ROLc(b, 30); in ss_sha1_compress() argument 67 … #define FF1(a,b,c,d,e,i) e = (ROLc(a, 5) + F1(b,c,d) + e + W[i] + 0x6ed9eba1UL); b = ROLc(b, 30); in ss_sha1_compress() argument 68 … #define FF2(a,b,c,d,e,i) e = (ROLc(a, 5) + F2(b,c,d) + e + W[i] + 0x8f1bbcdcUL); b = ROLc(b, 30); in ss_sha1_compress() argument 69 … #define FF3(a,b,c,d,e,i) e = (ROLc(a, 5) + F3(b,c,d) + e + W[i] + 0xca62c1d6UL); b = ROLc(b, 30); in ss_sha1_compress() argument 74 FF0(a,b,c,d,e,i++); t = e; e = d; d = c; c = b; b = a; a = t; in ss_sha1_compress() 78 FF1(a,b,c,d,e,i++); t = e; e = d; d = c; c = b; b = a; a = t; in ss_sha1_compress() 82 FF2(a,b,c,d,e,i++); t = e; e = d; d = c; c = b; b = a; a = t; in ss_sha1_compress() 86 FF3(a,b,c,d,e,i++); t = e; e = d; d = c; c = b; b = a; a = t; in ss_sha1_compress() [all …]
|
| /optee_os/core/tee/ |
| H A D | uuid.c | 10 void tee_uuid_to_octets(uint8_t *d, const TEE_UUID *s) in tee_uuid_to_octets() argument 12 d[0] = s->timeLow >> 24; in tee_uuid_to_octets() 13 d[1] = s->timeLow >> 16; in tee_uuid_to_octets() 14 d[2] = s->timeLow >> 8; in tee_uuid_to_octets() 15 d[3] = s->timeLow; in tee_uuid_to_octets() 16 d[4] = s->timeMid >> 8; in tee_uuid_to_octets() 17 d[5] = s->timeMid; in tee_uuid_to_octets() 18 d[6] = s->timeHiAndVersion >> 8; in tee_uuid_to_octets() 19 d[7] = s->timeHiAndVersion; in tee_uuid_to_octets() 20 memcpy(d + 8, s->clockSeqAndNode, sizeof(s->clockSeqAndNode)); in tee_uuid_to_octets() [all …]
|
| H A D | tee_ree_fs.c | 43 struct tee_fs_dirent d; member 1028 struct tee_fs_dir *d = calloc(1, sizeof(*d)); in ree_fs_opendir_rpc() local 1030 if (!d) in ree_fs_opendir_rpc() 1033 d->uuid = uuid; in ree_fs_opendir_rpc() 1042 d->idx = -1; in ree_fs_opendir_rpc() 1043 d->d.oidlen = sizeof(d->d.oid); in ree_fs_opendir_rpc() 1044 res = tee_fs_dirfile_get_next(dirh, d->uuid, &d->idx, d->d.oid, in ree_fs_opendir_rpc() 1045 &d->d.oidlen); in ree_fs_opendir_rpc() 1046 d->idx = -1; in ree_fs_opendir_rpc() 1050 *dir = d; in ree_fs_opendir_rpc() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | bn_mul.h | 38 #define MBEDTLS_BYTES_TO_T_UINT_4(a, b, c, d) \ argument 42 ((mbedtls_mpi_uint) (d) << 24) 47 #define MBEDTLS_BYTES_TO_T_UINT_8(a, b, c, d, e, f, g, h) \ argument 48 MBEDTLS_BYTES_TO_T_UINT_4(a, b, c, d), \ 53 #define MBEDTLS_BYTES_TO_T_UINT_8(a, b, c, d, e, f, g, h) \ argument 57 ((mbedtls_mpi_uint) (d) << 24) | \ 63 #define MBEDTLS_BYTES_TO_T_UINT_4(a, b, c, d) \ argument 64 MBEDTLS_BYTES_TO_T_UINT_8(a, b, c, d, 0, 0, 0, 0) 126 : "=m" (t), "=m" (c), "=m" (d), "=m" (s) \ 127 : "m" (t), "m" (s), "m" (d), "m" (c), "m" (b) \ [all …]
|
| H A D | poly1305.c | 174 uint64_t d; in poly1305_compute_mac() local 192 d = ((uint64_t) acc0 + 5U); in poly1305_compute_mac() 193 g0 = (uint32_t) d; in poly1305_compute_mac() 194 d = ((uint64_t) acc1 + (d >> 32)); in poly1305_compute_mac() 195 g1 = (uint32_t) d; in poly1305_compute_mac() 196 d = ((uint64_t) acc2 + (d >> 32)); in poly1305_compute_mac() 197 g2 = (uint32_t) d; in poly1305_compute_mac() 198 d = ((uint64_t) acc3 + (d >> 32)); in poly1305_compute_mac() 199 g3 = (uint32_t) d; in poly1305_compute_mac() 200 g4 = acc4 + (uint32_t) (d >> 32U); in poly1305_compute_mac() [all …]
|
| H A D | aria.c | 110 uint32_t *c, uint32_t *d) in aria_a() argument 116 tb = ARIA_P2(*d); // efcd in aria_a() 117 *d = ARIA_P1(*c); // 98ba in aria_a() 119 ta ^= *d; // 4567+98ba in aria_a() 122 tb ^= ARIA_P2(*d); // ba98+efcd in aria_a() 128 *d ^= ARIA_P1(ta) ^ tc; // 1032+2301+6745+7654+98ba+ba98+cdef OUT in aria_a() 142 uint32_t *c, uint32_t *d, in aria_sl() argument 158 *d = ((uint32_t) sa[MBEDTLS_BYTE_0(*d)]) ^ in aria_sl() 159 (((uint32_t) sb[MBEDTLS_BYTE_1(*d)]) << 8) ^ in aria_sl() 160 (((uint32_t) sc[MBEDTLS_BYTE_2(*d)]) << 16) ^ in aria_sl() [all …]
|
| H A D | ecdh.c | 55 mbedtls_mpi *d, mbedtls_ecp_point *Q, in ecdh_gen_public_restartable() argument 68 MBEDTLS_MPI_CHK(mbedtls_ecp_gen_privkey(grp, d, f_rng, p_rng)); in ecdh_gen_public_restartable() 71 MBEDTLS_MPI_CHK(mbedtls_ecp_mul_restartable(grp, Q, d, &grp->G, in ecdh_gen_public_restartable() 81 int mbedtls_ecdh_gen_public(mbedtls_ecp_group *grp, mbedtls_mpi *d, mbedtls_ecp_point *Q, in mbedtls_ecdh_gen_public() argument 85 return ecdh_gen_public_restartable(grp, d, Q, f_rng, p_rng, NULL); in mbedtls_ecdh_gen_public() 95 const mbedtls_ecp_point *Q, const mbedtls_mpi *d, in ecdh_compute_shared_restartable() argument 105 MBEDTLS_MPI_CHK(mbedtls_ecp_mul_restartable(grp, &P, d, Q, in ecdh_compute_shared_restartable() 125 const mbedtls_ecp_point *Q, const mbedtls_mpi *d, in mbedtls_ecdh_compute_shared() argument 129 return ecdh_compute_shared_restartable(grp, z, Q, d, in mbedtls_ecdh_compute_shared() 137 mbedtls_mpi_init(&ctx->d); in ecdh_init_internal() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/ |
| H A D | noekeon.c | 33 #define kTHETA(a, b, c, d) \ argument 35 b ^= temp; d ^= temp; \ 36 temp = b^d; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \ 39 #define THETA(k, a, b, c, d) \ argument 41 b ^= temp ^ k[1]; d ^= temp ^ k[3]; \ 42 temp = b^d; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \ 45 #define GAMMA(a, b, c, d) \ argument 46 b ^= ~(d|c); \ 48 temp = d; d = a; a = temp;\ 49 c ^= a ^ b ^ d; \ [all …]
|
| H A D | rc6.c | 120 ulong32 a,b,c,d,t,u; in s_rc6_ecb_encrypt() local 127 LOAD32L(a,&pt[0]);LOAD32L(b,&pt[4]);LOAD32L(c,&pt[8]);LOAD32L(d,&pt[12]); in s_rc6_ecb_encrypt() 130 d += skey->rc6.K[1]; in s_rc6_ecb_encrypt() 132 #define RND(a,b,c,d) \ in s_rc6_ecb_encrypt() argument 134 u = (d * (d + d + 1)); u = ROLc(u, 5); \ in s_rc6_ecb_encrypt() 140 RND(a,b,c,d); in s_rc6_ecb_encrypt() 141 RND(b,c,d,a); in s_rc6_ecb_encrypt() 142 RND(c,d,a,b); in s_rc6_ecb_encrypt() 143 RND(d,a,b,c); in s_rc6_ecb_encrypt() 150 STORE32L(a,&ct[0]);STORE32L(b,&ct[4]);STORE32L(c,&ct[8]);STORE32L(d,&ct[12]); in s_rc6_ecb_encrypt() [all …]
|
| H A D | serpent.c | 30 #define s_lt(i,a,b,c,d,e) { \ argument 33 d = ROLc(d ^ c ^ (a << 3), 7); \ 35 a = ROLc(a ^ b ^ d, 5); \ 36 c = ROLc(c ^ d ^ (b << 7), 22); \ 40 #define s_ilt(i,a,b,c,d,e) { \ argument 43 c ^= d ^ (b << 7); \ 44 a ^= b ^ d; \ 46 d = RORc(d, 7) ^ c ^ (a << 3); \ 53 #define s_beforeS0(f) f(0,a,b,c,d,e) 54 #define s_afterS0(f) f(1,b,e,c,a,d) [all …]
|
| /optee_os/core/drivers/crypto/stm32/ |
| H A D | ecc.c | 73 struct stm32_pka_bn d = { }; in stm32_gen_keypair() local 91 crypto_bignum_num_bytes(key->d) > bytes || in stm32_gen_keypair() 96 d.val = calloc(1, bytes); in stm32_gen_keypair() 97 d.size = bytes; in stm32_gen_keypair() 98 if (!d.val) in stm32_gen_keypair() 102 res = crypto_rng_read(d.val, d.size); in stm32_gen_keypair() 104 free(d.val); in stm32_gen_keypair() 111 free(d.val); in stm32_gen_keypair() 119 free(d.val); in stm32_gen_keypair() 123 res = stm32_pka_edac_gen_pubkey(&d, &pk, cid); in stm32_gen_keypair() [all …]
|
| /optee_os/lib/libutils/compiler-rt/lib/builtins/ |
| H A D | int_div_impl.inc | 16 static __inline fixuint_t __udivXi3(fixuint_t n, fixuint_t d) { 18 // d == 0 cases are unspecified. 19 unsigned sr = (d ? clz(d) : N) - (n ? clz(n) : N); 21 if (sr > N - 1) // n < d 23 if (sr == N - 1) // d == 1 35 // if (r >= d) r -= d, carry = 1; 36 const fixint_t s = (fixint_t)(d - r - 1) >> (N - 1); 38 r -= d & s; 45 static __inline fixuint_t __umodXi3(fixuint_t n, fixuint_t d) { 47 // d == 0 cases are unspecified. [all …]
|
| /optee_os/lib/libutils/ext/ |
| H A D | strlcat.c | 52 register char *d = dst; in strlcat() local 58 while (n-- != 0 && *d != '\0') in strlcat() 59 d++; in strlcat() 60 dlen = d - dst; in strlcat() 68 *d++ = *s; in strlcat() 73 *d = '\0'; in strlcat()
|
| H A D | strlcpy.c | 48 register char *d = dst; in strlcpy() local 55 if ((*d++ = *s++) == 0) in strlcpy() 63 *d = '\0'; /* NUL-terminate dst */ in strlcpy()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ec25519/ |
| H A D | tweetnacl.c | 31 u32 d = 0; in vn() local 32 FOR(i,n) d |= x[i]^y[i]; in vn() 33 return (1 & ((d - 1) >> 8)) - 1; in vn() 96 u8 c[32],d[32]; in neq25519() local 98 pack25519(d,b); in neq25519() 99 return tweetnacl_crypto_verify_32(c,d); in neq25519() 104 u8 d[32]; in par25519() local 105 pack25519(d,a); in par25519() 106 return d[0]&1; in par25519() 172 gf a,b,c,d,e,f; in tweetnacl_crypto_scalarmult() local [all …]
|
| /optee_os/core/tests/ |
| H A D | notif_test_wd.c | 129 struct periodic_data *d = container_of(co, struct periodic_data, in periodic_callback() local 135 d->count++; in periodic_callback() 137 t.seconds, t.millis, d->count); in periodic_callback() 139 if (d->count > 20) { in periodic_callback() 150 struct periodic_data *d = nex_calloc(1, sizeof(*d)); in nex_init_periodic_callback() local 152 if (!d) in nex_init_periodic_callback() 156 callout_add(&d->callout, periodic_callback, TEST_WD_TIMER_PERIOD_MS); in nex_init_periodic_callback()
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/safer/ |
| H A D | safer.c | 251 { unsigned char a, b, c, d, e, f, g, h, t; in s_safer_ecb_encrypt() local 260 a = pt[0]; b = pt[1]; c = pt[2]; d = pt[3]; in s_safer_ecb_encrypt() 265 a ^= *++key; b += *++key; c += *++key; d ^= *++key; in s_safer_ecb_encrypt() 268 c = LOG(c) ^ *++key; d = EXP(d) + *++key; in s_safer_ecb_encrypt() 271 PHT(a, b); PHT(c, d); PHT(e, f); PHT(g, h); in s_safer_ecb_encrypt() 272 PHT(a, c); PHT(e, g); PHT(b, d); PHT(f, h); in s_safer_ecb_encrypt() 273 PHT(a, e); PHT(b, f); PHT(c, g); PHT(d, h); in s_safer_ecb_encrypt() 274 t = b; b = e; e = c; c = t; t = d; d = f; f = g; g = t; in s_safer_ecb_encrypt() 276 a ^= *++key; b += *++key; c += *++key; d ^= *++key; in s_safer_ecb_encrypt() 279 ct[2] = c & 0xFF; ct[3] = d & 0xFF; in s_safer_ecb_encrypt() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/stream/chacha/ |
| H A D | chacha_crypt.c | 13 #define QUARTERROUND(a,b,c,d) \ argument 14 x[a] += x[b]; x[d] = ROL(x[d] ^ x[a], 16); \ 15 x[c] += x[d]; x[b] = ROL(x[b] ^ x[c], 12); \ 16 x[a] += x[b]; x[d] = ROL(x[d] ^ x[a], 8); \ 17 x[c] += x[d]; x[b] = ROL(x[b] ^ x[c], 7);
|
| /optee_os/lib/libutils/isoc/newlib/ |
| H A D | memchr.c | 109 unsigned char d = c; variable 119 if (*src == d) 134 mask = d << 8 | d; 154 if (*src == d)
|
| /optee_os/core/crypto/ |
| H A D | aes-gcm-sw.c | 77 void *d = dst + n * TEE_AES_BLOCK_SIZE; in encrypt_pl() local 79 encrypt_block(state, ek, s, d); in encrypt_pl() 84 void *d = dst + n * TEE_AES_BLOCK_SIZE; in encrypt_pl() local 87 encrypt_block(state, ek, tmp, d); in encrypt_pl() 116 void *d = dst + n * TEE_AES_BLOCK_SIZE; in decrypt_pl() local 118 decrypt_block(state, ek, s, d); in decrypt_pl() 123 void *d = dst + n * TEE_AES_BLOCK_SIZE; in decrypt_pl() local 126 decrypt_block(state, ek, tmp, d); in decrypt_pl()
|
| /optee_os/core/lib/libtomcrypt/src/math/ |
| H A D | gmp_desc.c | 397 static int divide(void *a, void *b, void *c, void *d) in divide() argument 406 if (d != NULL) { in divide() 407 mpz_mod(d, a, b); in divide() 454 static int addmod(void *a, void *b, void *c, void *d) in addmod() argument 459 LTC_ARGCHK(d != NULL); in addmod() 460 mpz_add(d, a, b); in addmod() 461 mpz_mod(d, d, c); in addmod() 465 static int submod(void *a, void *b, void *c, void *d) in submod() argument 470 LTC_ARGCHK(d != NULL); in submod() 471 mpz_sub(d, a, b); in submod() [all …]
|
| /optee_os/core/drivers/crypto/caam/acipher/ |
| H A D | caam_ecc.c | 42 struct caamkey d; member 53 caam_key_free(&key->d); in do_keypair_free() 107 retstatus = caam_key_deserialize_from_bn(inkey->d, &outkey->d, in do_keypair_conv() 112 caam_key_cache_op(TEE_CACHEFLUSH, &outkey->d); in do_keypair_conv() 114 ECC_DUMPBUF("Outkey", outkey->d.buf.data, outkey->d.buf.length); in do_keypair_conv() 167 key->d = crypto_bignum_allocate(CFG_CORE_BIGNUM_MAX_BITS); in do_allocate_keypair() 168 if (!key->d) in do_allocate_keypair() 186 crypto_bignum_free(&key->d); in do_allocate_keypair() 259 struct caamkey d = { }; in do_gen_keypair() local 288 d.key_type = key_type; in do_gen_keypair() [all …]
|
| /optee_os/lib/libutils/isoc/ |
| H A D | qsort.c | 79 int d, r, swaptype, swap_cnt; in qsort() local 95 d = (n / 8) * es; in qsort() 96 pl = med3(pl, pl + d, pl + 2 * d, cmp); in qsort() 97 pm = med3(pm - d, pm, pm + d, cmp); in qsort() 98 pn = med3(pn - 2 * d, pn - d, pn, cmp); in qsort()
|