/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/gcm/ |
A D | gcm_gf_mult.c | 143 B[M(3)][i] = B[M(1)][i] ^ B[M(2)][i]; in gcm_gf_mult() 144 B[M(5)][i] = B[M(1)][i] ^ B[M(4)][i]; in gcm_gf_mult() 145 B[M(6)][i] = B[M(2)][i] ^ B[M(4)][i]; in gcm_gf_mult() 146 B[M(9)][i] = B[M(1)][i] ^ B[M(8)][i]; in gcm_gf_mult() 147 B[M(10)][i] = B[M(2)][i] ^ B[M(8)][i]; in gcm_gf_mult() 148 B[M(12)][i] = B[M(8)][i] ^ B[M(4)][i]; in gcm_gf_mult() 151 B[M(7)][i] = B[M(3)][i] ^ B[M(4)][i]; in gcm_gf_mult() 152 B[M(11)][i] = B[M(3)][i] ^ B[M(8)][i]; in gcm_gf_mult() 153 B[M(13)][i] = B[M(1)][i] ^ B[M(12)][i]; in gcm_gf_mult() 154 B[M(14)][i] = B[M(6)][i] ^ B[M(8)][i]; in gcm_gf_mult() [all …]
|
A D | gcm_init.c | 24 unsigned char B[16]; in gcm_init() local 52 zeromem(B, 16); in gcm_init() 53 if ((err = cipher_descriptor[cipher]->ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) { in gcm_init() 71 zeromem(B, 16); in gcm_init() 73 B[0] = y; in gcm_init() 74 gcm_gf_mult(gcm->H, B, &gcm->PC[0][y][0]); in gcm_init()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/ |
A D | rc5.c | 96 B = L[j] = ROL(L[j] + A + B, (A+B)); in s_rc5_setup() 145 A = ROL(A ^ B, B) + K[0]; in s_rc5_ecb_encrypt() 146 B = ROL(B ^ A, A) + K[1]; in s_rc5_ecb_encrypt() 147 A = ROL(A ^ B, B) + K[2]; in s_rc5_ecb_encrypt() 148 B = ROL(B ^ A, A) + K[3]; in s_rc5_ecb_encrypt() 153 A = ROL(A ^ B, B) + K[0]; in s_rc5_ecb_encrypt() 154 B = ROL(B ^ A, A) + K[1]; in s_rc5_ecb_encrypt() 204 B = ROR(B - K[3], A) ^ A; in s_rc5_ecb_decrypt() 205 A = ROR(A - K[2], B) ^ B; in s_rc5_ecb_decrypt() 206 B = ROR(B - K[1], A) ^ A; in s_rc5_ecb_decrypt() [all …]
|
A D | blowfish.c | 373 ulong32 x, y, A, B[2]; in blowfish_expand() local 388 B[0] = 0; in blowfish_expand() 389 B[1] = 0; in blowfish_expand() 392 B[0] ^= s_blowfish_stream2word(data, datalen, &i); in blowfish_expand() 396 s_blowfish_encipher(&B[0], &B[1], skey); in blowfish_expand() 398 skey->blowfish.K[x] = B[0]; in blowfish_expand() 399 skey->blowfish.K[x+1] = B[1]; in blowfish_expand() 410 s_blowfish_encipher(&B[0], &B[1], skey); in blowfish_expand() 412 skey->blowfish.S[x][y] = B[0]; in blowfish_expand() 413 skey->blowfish.S[x][y+1] = B[1]; in blowfish_expand() [all …]
|
A D | xtea.c | 51 skey->xtea.B[x] = (sum + K[(sum>>11)&3]) & 0xFFFFFFFFUL; in xtea_setup() 81 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 84 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+1])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 87 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+2])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 90 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+3])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt() 116 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt() 119 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r-1])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt() 122 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r-2])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt() 125 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r-3])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt()
|
A D | rc6.c | 48 ulong32 L[64], S[50], A, B, i, j, v, s, l; in s_rc6_setup() local 84 for (A = B = i = j = v = 0; v < s; v++) { in s_rc6_setup() 85 A = S[i] = ROLc(S[i] + A + B, 3); in s_rc6_setup() 86 B = L[j] = ROL(L[j] + A + B, (A+B)); in s_rc6_setup()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | md5.c | 94 uint32_t X[16], A, B, C, D; in mbedtls_internal_md5_process() member 125 local.B = ctx->state[1]; in mbedtls_internal_md5_process() 131 P( local.A, local.B, local.C, local.D, 0, 7, 0xD76AA478 ); in mbedtls_internal_md5_process() 132 P( local.D, local.A, local.B, local.C, 1, 12, 0xE8C7B756 ); in mbedtls_internal_md5_process() 133 P( local.C, local.D, local.A, local.B, 2, 17, 0x242070DB ); in mbedtls_internal_md5_process() 134 P( local.B, local.C, local.D, local.A, 3, 22, 0xC1BDCEEE ); in mbedtls_internal_md5_process() 135 P( local.A, local.B, local.C, local.D, 4, 7, 0xF57C0FAF ); in mbedtls_internal_md5_process() 136 P( local.D, local.A, local.B, local.C, 5, 12, 0x4787C62A ); in mbedtls_internal_md5_process() 137 P( local.C, local.D, local.A, local.B, 6, 17, 0xA8304613 ); in mbedtls_internal_md5_process() 138 P( local.B, local.C, local.D, local.A, 7, 22, 0xFD469501 ); in mbedtls_internal_md5_process() [all …]
|
A D | ripemd160.c | 99 uint32_t A, B, C, D, E, Ap, Bp, Cp, Dp, Ep, X[16]; in mbedtls_internal_ripemd160_process() member 120 local.B = local.Bp = ctx->state[1]; in mbedtls_internal_ripemd160_process() 153 P2( local.A, local.B, local.C, local.D, local.E, 0, 11, 5, 8 ); in mbedtls_internal_ripemd160_process() 154 P2( local.E, local.A, local.B, local.C, local.D, 1, 14, 14, 9 ); in mbedtls_internal_ripemd160_process() 155 P2( local.D, local.E, local.A, local.B, local.C, 2, 15, 7, 9 ); in mbedtls_internal_ripemd160_process() 156 P2( local.C, local.D, local.E, local.A, local.B, 3, 12, 0, 11 ); in mbedtls_internal_ripemd160_process() 157 P2( local.B, local.C, local.D, local.E, local.A, 4, 5, 9, 13 ); in mbedtls_internal_ripemd160_process() 158 P2( local.A, local.B, local.C, local.D, local.E, 5, 8, 2, 15 ); in mbedtls_internal_ripemd160_process() 159 P2( local.E, local.A, local.B, local.C, local.D, 6, 7, 11, 15 ); in mbedtls_internal_ripemd160_process() 160 P2( local.D, local.E, local.A, local.B, local.C, 7, 9, 4, 5 ); in mbedtls_internal_ripemd160_process() [all …]
|
A D | sha1.c | 107 uint32_t temp, W[16], A, B, C, D, E; in mbedtls_internal_sha1_process() member 149 local.B = ctx->state[1]; in mbedtls_internal_sha1_process() 173 P( local.E, local.A, local.B, local.C, local.D, R(16) ); in mbedtls_internal_sha1_process() 174 P( local.D, local.E, local.A, local.B, local.C, R(17) ); in mbedtls_internal_sha1_process() 175 P( local.C, local.D, local.E, local.A, local.B, R(18) ); in mbedtls_internal_sha1_process() 176 P( local.B, local.C, local.D, local.E, local.A, R(19) ); in mbedtls_internal_sha1_process() 184 P( local.A, local.B, local.C, local.D, local.E, R(20) ); in mbedtls_internal_sha1_process() 185 P( local.E, local.A, local.B, local.C, local.D, R(21) ); in mbedtls_internal_sha1_process() 186 P( local.D, local.E, local.A, local.B, local.C, R(22) ); in mbedtls_internal_sha1_process() 187 P( local.C, local.D, local.E, local.A, local.B, R(23) ); in mbedtls_internal_sha1_process() [all …]
|
A D | md4.c | 95 uint32_t X[16], A, B, C, D; in mbedtls_internal_md4_process() member 118 local.B = ctx->state[1]; in mbedtls_internal_md4_process() 131 P( local.A, local.B, local.C, local.D, local.X[ 0], 3 ); in mbedtls_internal_md4_process() 132 P( local.D, local.A, local.B, local.C, local.X[ 1], 7 ); in mbedtls_internal_md4_process() 133 P( local.C, local.D, local.A, local.B, local.X[ 2], 11 ); in mbedtls_internal_md4_process() 134 P( local.B, local.C, local.D, local.A, local.X[ 3], 19 ); in mbedtls_internal_md4_process() 135 P( local.A, local.B, local.C, local.D, local.X[ 4], 3 ); in mbedtls_internal_md4_process() 136 P( local.D, local.A, local.B, local.C, local.X[ 5], 7 ); in mbedtls_internal_md4_process() 137 P( local.C, local.D, local.A, local.B, local.X[ 6], 11 ); in mbedtls_internal_md4_process() 138 P( local.B, local.C, local.D, local.A, local.X[ 7], 19 ); in mbedtls_internal_md4_process() [all …]
|
A D | havege.c | 79 B = &WALK[PT2 ]; RES[i++] ^= *B; \ 84 *A = (*B >> (2)) ^ (*B << (30)) ^ CLK; \ 85 *B = IN ^ U1; \ 90 B = &WALK[PT2 ^ 2]; RES[i++] ^= *B; \ 97 *A = (*B >> (6)) ^ (*B << (26)) ^ CLK; \ 103 B = &WALK[PT2 ^ 1]; \ 123 RES[i++] ^= *B; \ 128 *A = (*B >> (10)) ^ (*B << (22)) ^ CLK; \ 134 B = &WALK[PT2 ^ 3]; RES[i++] ^= *B; \ 139 *A = (*B >> (14)) ^ (*B << (18)) ^ CLK; \ [all …]
|
A D | aes.c | 110 V(A5,63,63,C6), V(84,7C,7C,F8), V(99,77,77,EE), V(8D,7B,7B,F6), \ 111 V(0D,F2,F2,FF), V(BD,6B,6B,D6), V(B1,6F,6F,DE), V(54,C5,C5,91), \ 112 V(50,30,30,60), V(03,01,01,02), V(A9,67,67,CE), V(7D,2B,2B,56), \ 117 V(BF,9C,9C,23), V(F7,A4,A4,53), V(96,72,72,E4), V(5B,C0,C0,9B), \ 124 V(09,07,07,0E), V(36,12,12,24), V(9B,80,80,1B), V(3D,E2,E2,DF), \ 127 V(2D,1B,1B,36), V(B2,6E,6E,DC), V(EE,5A,5A,B4), V(FB,A0,A0,5B), \ 128 V(F6,52,52,A4), V(4D,3B,3B,76), V(61,D6,D6,B7), V(CE,B3,B3,7D), \ 131 V(60,20,20,40), V(1F,FC,FC,E3), V(C8,B1,B1,79), V(ED,5B,5B,B6), \ 161 V(DD,4B,4B,96), V(DC,BD,BD,61), V(86,8B,8B,0D), V(85,8A,8A,0F), \ 242 V(CB,6B,AB,3B), V(F1,45,9D,1F), V(AB,58,FA,AC), V(93,03,E3,4B), \ [all …]
|
A D | bignum.c | 1171 if( X == B ) in mbedtls_mpi_add_abs() 1382 mbedtls_mpi B; in mbedtls_mpi_add_int() local 1389 B.n = 1; in mbedtls_mpi_add_int() 1390 B.p = p; in mbedtls_mpi_add_int() 1400 mbedtls_mpi B; in mbedtls_mpi_sub_int() local 1407 B.n = 1; in mbedtls_mpi_sub_int() 1408 B.p = p; in mbedtls_mpi_sub_int() 1517 if( X == B ) { MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &TB, B ) ); B = &TB; } in mbedtls_mpi_mul_mpi() 1828 B.n = 1; in mbedtls_mpi_div_int() 1829 B.p = p; in mbedtls_mpi_div_int() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/asn1/der/set/ |
A D | der_encode_setof.c | 19 struct edge *A = (struct edge *)a, *B = (struct edge *)b; in s_qsort_helper() local 24 r = XMEMCMP(A->start, B->start, MIN(A->size, B->size)); in s_qsort_helper() 26 if (r == 0 && A->size != B->size) { in s_qsort_helper() 27 if (A->size > B->size) { in s_qsort_helper() 28 for (x = B->size; x < A->size; x++) { in s_qsort_helper() 34 for (x = A->size; x < B->size; x++) { in s_qsort_helper() 35 if (B->start[x]) { in s_qsort_helper()
|
A D | der_encode_set.c | 21 ltc_asn1_list *A = (ltc_asn1_list *)a, *B = (ltc_asn1_list *)b; in s_qsort_helper() local 24 r = s_ltc_to_asn1(A->type) - s_ltc_to_asn1(B->type); in s_qsort_helper() 29 return A->used - B->used; in s_qsort_helper()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/twofish/ |
A D | twofish.c | 142 B[1] = b; in gf_mult() 146 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 147 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 148 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 149 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 150 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 151 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 152 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 348 ulong32 A, B; in s_twofish_setup() local 396 B = ROLc(B, 8); in s_twofish_setup() [all …]
|
/optee_os-3.20.0/core/arch/arm/dts/ |
A D | stm32mp15-pinctrl.dtsi | 55 pinmux = <STM32_PINMUX('B', 6, AF5)>; 83 <STM32_PINMUX('B', 7, AF13)>,/* DCMI_VSYNC */ 91 <STM32_PINMUX('B', 8, AF13)>,/* DCMI_D6 */ 112 <STM32_PINMUX('B', 8, ANALOG)>,/* DCMI_D6 */ 124 <STM32_PINMUX('B', 7, AF13)>,/* DCMI_VSYNC */ 133 <STM32_PINMUX('B', 9, AF13)>;/* DCMI_D7 */ 150 <STM32_PINMUX('B', 9, ANALOG)>;/* DCMI_D7 */ 464 <STM32_PINMUX('B', 7, AF12)>, /* FMC_NL */ 636 <STM32_PINMUX('B', 9, AF5)>, /* I2S2_WS */ 680 <STM32_PINMUX('B', 8, AF14)>, /* LCD_B6 */ [all …]
|
A D | stm32mp13-pinctrl.dtsi | 12 <STM32_PINMUX('B', 9, AF6)>; /* I2C4_SDA */ 41 pinmux = <STM32_PINMUX('B', 0, AF4)>, /* USART1_RX */
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/modes/lrw/ |
A D | lrw_start.c | 32 unsigned char B[16]; in lrw_start() local 67 zeromem(B, 16); in lrw_start() 69 B[0] = y; in lrw_start() 70 gcm_gf_mult(tweak, B, &lrw->PC[0][y][0]); in lrw_start()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | bignum.h | 649 const mbedtls_mpi *B ); 664 const mbedtls_mpi *B ); 678 const mbedtls_mpi *B ); 692 const mbedtls_mpi *B ); 736 const mbedtls_mpi *B ); 773 const mbedtls_mpi *B ); 814 const mbedtls_mpi *B ); 936 const mbedtls_mpi *B ); 1068 void mbedtls_mpi_montmul( mbedtls_mpi *A, const mbedtls_mpi *B,
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_set_curve_internal.c | 26 if (s_ecc_cmp_hex_bn(curve->B, key->dp.B, bn) != 1) continue; in s_ecc_oid_lookup() 47 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve() 58 if ((err = mp_copy(srckey->dp.B, key->dp.B )) != CRYPT_OK) { goto error; } in ecc_copy_curve() 91 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis() 102 if ((err = mp_copy(b, key->dp.B )) != CRYPT_OK) { goto error; } in ecc_set_curve_from_mpis()
|
A D | ltc_ecc_mul2add.c | 26 const ecc_point *B, void *kB, in ltc_ecc_mul2add() argument 40 LTC_ARGCHK(B != NULL); in ltc_ecc_mul2add() 102 …if ((err = mp_mulmod(B->x, mu, modulus, precomp[1<<2]->x)) != CRYPT_OK) … in ltc_ecc_mul2add() 103 …if ((err = mp_mulmod(B->y, mu, modulus, precomp[1<<2]->y)) != CRYPT_OK) … in ltc_ecc_mul2add() 104 …if ((err = mp_mulmod(B->z, mu, modulus, precomp[1<<2]->z)) != CRYPT_OK) … in ltc_ecc_mul2add()
|
A D | ecc_set_curve.c | 15 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve() 26 if ((err = mp_read_radix(key->dp.B, cu->B, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pkcs12/ |
A D | pkcs12_kdf.c | 23 unsigned char D[MAXBLOCKSIZE], A[MAXBLOCKSIZE], B[MAXBLOCKSIZE]; in pkcs12_kdf() local 49 for (j = 0; j < v; j++) B[j] = A[j % Alen]; in pkcs12_kdf() 52 if (++B[j - 1] != 0) break; in pkcs12_kdf() 58 tmp = I[n * v + j - 1] + B[j - 1] + ch; in pkcs12_kdf()
|
/optee_os-3.20.0/core/crypto/ |
A D | sm3.c | 57 uint32_t A, B, C, D, E, F, G, H; in sm3_process() local 114 B = ctx->state[1]; in sm3_process() 125 TT1 = FF0(A, B, C) + D + SS2 + W1[j]; in sm3_process() 128 C = ROTL(B, 9); in sm3_process() 129 B = A; in sm3_process() 140 TT1 = FF1(A, B, C) + D + SS2 + W1[j]; in sm3_process() 143 C = ROTL(B, 9); in sm3_process() 144 B = A; in sm3_process() 153 ctx->state[1] ^= B; in sm3_process()
|