| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_extra.h | 1105 psa_jpake_round_t MBEDTLS_PRIVATE(round); 1116 #define PSA_JPAKE_EXPECTED_INPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \ argument 1117 ((round) == PSA_JPAKE_FIRST ? 2 : 1)) 1118 #define PSA_JPAKE_EXPECTED_OUTPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \ argument 1119 ((round) == PSA_JPAKE_FIRST ? 2 : 1))
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/safer/ |
| H A D | safer.c | 252 unsigned int round; in s_safer_ecb_encrypt() local 262 if (LTC_SAFER_MAX_NOF_ROUNDS < (round = *key)) round = LTC_SAFER_MAX_NOF_ROUNDS; in s_safer_ecb_encrypt() 263 while(round-- > 0) in s_safer_ecb_encrypt() 306 unsigned int round; in s_safer_ecb_decrypt() local 316 if (LTC_SAFER_MAX_NOF_ROUNDS < (round = *key)) round = LTC_SAFER_MAX_NOF_ROUNDS; in s_safer_ecb_decrypt() 317 key += LTC_SAFER_BLOCK_LEN * (1 + 2 * round); in s_safer_ecb_decrypt() 320 while (round--) in s_safer_ecb_decrypt()
|
| /optee_os/core/arch/arm/crypto/ |
| H A D | sm3_armv8a_ce_a64.S | 44 .macro round, ab, s0, t0, t1, i macro 62 round \ab, \s0, v11, v12, 0 63 round \ab, \s0, v12, v11, 1 64 round \ab, \s0, v11, v12, 2 65 round \ab, \s0, v12, v11, 3
|
| H A D | aes_modes_armv8a_ce_a32.S | 127 add ip, r2, #32 @ 3rd round key 133 add ip, r2, #32 @ 3rd round key 138 add ip, r2, #32 @ 3rd round key 143 add ip, r2, #32 @ 3rd round key 148 vld1.8 {q8-q9}, [\rk] @ load first 2 round keys 149 vld1.8 {q14}, [ip] @ load last round key 264 vmov q15, q14 @ preserve last round key 385 add ip, r6, #32 @ 3rd round key of key 2 482 add ip, r2, #32 @ 3rd round key
|
| H A D | sm4_armv8a_aese_a64.S | 159 .macro round, c0, c1, c2, c3, k macro 179 round m0, m1, m2, m3, \k\().s[0] 180 round m1, m2, m3, m0, \k\().s[1] 181 round m2, m3, m0, m1, \k\().s[2] 182 round m3, m0, m1, m2, \k\().s[3] 186 round m0, m1, m2, m3, \k\().s[3] 187 round m1, m2, m3, m0, \k\().s[2] 188 round m2, m3, m0, m1, \k\().s[1] 189 round m3, m0, m1, m2, \k\().s[0]
|
| /optee_os/core/lib/libtomcrypt/src/hashes/ |
| H A D | sha3.c | 159 int i, j, round; in s_keccakf() local 162 for(round = 0; round < SHA3_KECCAK_ROUNDS; round++) { in s_keccakf() 191 s[0] ^= s_keccakf_rndc[round]; in s_keccakf()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | sha3.c | 107 for (int round = 0; round < 24; round++) { in keccak_f1600() local 240 s[0] ^= ((iota_r_packed[round] & 0x40ull) << 57 | in keccak_f1600() 241 (iota_r_packed[round] & 0x20ull) << 26 | in keccak_f1600() 242 (iota_r_packed[round] & 0x10ull) << 11 | in keccak_f1600() 243 (iota_r_packed[round] & 0x8f)); in keccak_f1600()
|
| H A D | psa_crypto.c | 8908 if (stage->round == PSA_JPAKE_FIRST) { in convert_jpake_computation_stage_to_driver_step() 8920 } else if (stage->round == PSA_JPAKE_SECOND) { in convert_jpake_computation_stage_to_driver_step() 8989 if (computation_stage->round != PSA_JPAKE_FIRST && in psa_jpake_prologue() 8990 computation_stage->round != PSA_JPAKE_SECOND) { in psa_jpake_prologue() 9025 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round)) { in psa_jpake_epilogue() 9031 if (stage->outputs == PSA_JPAKE_EXPECTED_OUTPUTS(stage->round)) { in psa_jpake_epilogue() 9035 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round) && in psa_jpake_epilogue() 9036 stage->outputs == PSA_JPAKE_EXPECTED_OUTPUTS(stage->round)) { in psa_jpake_epilogue() 9040 stage->round++; in psa_jpake_epilogue() 9223 if (computation_stage->round != PSA_JPAKE_FINISHED) { in psa_pake_get_implicit_key()
|
| H A D | ssl_misc.h | 2760 size_t len, mbedtls_ecjpake_rounds_t round); 2779 mbedtls_ecjpake_rounds_t round);
|
| H A D | ecp_curves_new.c | 5506 size_t round; in mbedtls_ecp_mod_p448_raw() local 5584 for (round = 0; round < 2; ++round) { in mbedtls_ecp_mod_p448_raw()
|
| H A D | ssl_tls.c | 9082 size_t len, mbedtls_ecjpake_rounds_t round) in mbedtls_psa_ecjpake_read_round() argument 9090 unsigned int remaining_steps = (round == MBEDTLS_ECJPAKE_ROUND_ONE) ? 2 : 1; in mbedtls_psa_ecjpake_read_round() 9125 mbedtls_ecjpake_rounds_t round) in mbedtls_psa_ecjpake_write_round() argument 9134 unsigned int remaining_steps = (round == MBEDTLS_ECJPAKE_ROUND_ONE) ? 2 : 1; in mbedtls_psa_ecjpake_write_round()
|
| /optee_os/core/lib/qcbor/src/ |
| H A D | qcbor_decode.c | 5872 double dRounded = round(pItem->val.dfnum); in QCBOR_Private_ConvertUInt64()
|
| /optee_os/ |
| H A D | CHANGELOG.md | 1351 - Simplify interface with tee-supplicant. Minimize round trips with normal
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 2935 these variables can be used to recover the last round key. To follow best
|