Home
last modified time | relevance | path

Searched refs:B (Results 1 – 25 of 54) sorted by relevance

123

/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/gcm/
A Dgcm_gf_mult.c143 B[M(3)][i] = B[M(1)][i] ^ B[M(2)][i]; in gcm_gf_mult()
144 B[M(5)][i] = B[M(1)][i] ^ B[M(4)][i]; in gcm_gf_mult()
145 B[M(6)][i] = B[M(2)][i] ^ B[M(4)][i]; in gcm_gf_mult()
146 B[M(9)][i] = B[M(1)][i] ^ B[M(8)][i]; in gcm_gf_mult()
147 B[M(10)][i] = B[M(2)][i] ^ B[M(8)][i]; in gcm_gf_mult()
148 B[M(12)][i] = B[M(8)][i] ^ B[M(4)][i]; in gcm_gf_mult()
151 B[M(7)][i] = B[M(3)][i] ^ B[M(4)][i]; in gcm_gf_mult()
152 B[M(11)][i] = B[M(3)][i] ^ B[M(8)][i]; in gcm_gf_mult()
153 B[M(13)][i] = B[M(1)][i] ^ B[M(12)][i]; in gcm_gf_mult()
154 B[M(14)][i] = B[M(6)][i] ^ B[M(8)][i]; in gcm_gf_mult()
[all …]
A Dgcm_init.c24 unsigned char B[16]; in gcm_init() local
52 zeromem(B, 16); in gcm_init()
53 if ((err = cipher_descriptor[cipher]->ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) { in gcm_init()
71 zeromem(B, 16); in gcm_init()
73 B[0] = y; in gcm_init()
74 gcm_gf_mult(gcm->H, B, &gcm->PC[0][y][0]); in gcm_init()
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/
A Drc5.c96 B = L[j] = ROL(L[j] + A + B, (A+B)); in s_rc5_setup()
145 A = ROL(A ^ B, B) + K[0]; in s_rc5_ecb_encrypt()
146 B = ROL(B ^ A, A) + K[1]; in s_rc5_ecb_encrypt()
147 A = ROL(A ^ B, B) + K[2]; in s_rc5_ecb_encrypt()
148 B = ROL(B ^ A, A) + K[3]; in s_rc5_ecb_encrypt()
153 A = ROL(A ^ B, B) + K[0]; in s_rc5_ecb_encrypt()
154 B = ROL(B ^ A, A) + K[1]; in s_rc5_ecb_encrypt()
204 B = ROR(B - K[3], A) ^ A; in s_rc5_ecb_decrypt()
205 A = ROR(A - K[2], B) ^ B; in s_rc5_ecb_decrypt()
206 B = ROR(B - K[1], A) ^ A; in s_rc5_ecb_decrypt()
[all …]
A Dblowfish.c373 ulong32 x, y, A, B[2]; in blowfish_expand() local
388 B[0] = 0; in blowfish_expand()
389 B[1] = 0; in blowfish_expand()
392 B[0] ^= s_blowfish_stream2word(data, datalen, &i); in blowfish_expand()
396 s_blowfish_encipher(&B[0], &B[1], skey); in blowfish_expand()
398 skey->blowfish.K[x] = B[0]; in blowfish_expand()
399 skey->blowfish.K[x+1] = B[1]; in blowfish_expand()
410 s_blowfish_encipher(&B[0], &B[1], skey); in blowfish_expand()
412 skey->blowfish.S[x][y] = B[0]; in blowfish_expand()
413 skey->blowfish.S[x][y+1] = B[1]; in blowfish_expand()
[all …]
A Dxtea.c51 skey->xtea.B[x] = (sum + K[(sum>>11)&3]) & 0xFFFFFFFFUL; in xtea_setup()
81 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt()
84 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+1])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt()
87 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+2])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt()
90 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r+3])) & 0xFFFFFFFFUL; in xtea_ecb_encrypt()
116 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt()
119 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r-1])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt()
122 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r-2])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt()
125 z = (z - ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r-3])) & 0xFFFFFFFFUL; in xtea_ecb_decrypt()
A Drc6.c48 ulong32 L[64], S[50], A, B, i, j, v, s, l; in s_rc6_setup() local
84 for (A = B = i = j = v = 0; v < s; v++) { in s_rc6_setup()
85 A = S[i] = ROLc(S[i] + A + B, 3); in s_rc6_setup()
86 B = L[j] = ROL(L[j] + A + B, (A+B)); in s_rc6_setup()
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/
A Dmd5.c94 uint32_t X[16], A, B, C, D; in mbedtls_internal_md5_process() member
125 local.B = ctx->state[1]; in mbedtls_internal_md5_process()
131 P( local.A, local.B, local.C, local.D, 0, 7, 0xD76AA478 ); in mbedtls_internal_md5_process()
132 P( local.D, local.A, local.B, local.C, 1, 12, 0xE8C7B756 ); in mbedtls_internal_md5_process()
133 P( local.C, local.D, local.A, local.B, 2, 17, 0x242070DB ); in mbedtls_internal_md5_process()
134 P( local.B, local.C, local.D, local.A, 3, 22, 0xC1BDCEEE ); in mbedtls_internal_md5_process()
135 P( local.A, local.B, local.C, local.D, 4, 7, 0xF57C0FAF ); in mbedtls_internal_md5_process()
136 P( local.D, local.A, local.B, local.C, 5, 12, 0x4787C62A ); in mbedtls_internal_md5_process()
137 P( local.C, local.D, local.A, local.B, 6, 17, 0xA8304613 ); in mbedtls_internal_md5_process()
138 P( local.B, local.C, local.D, local.A, 7, 22, 0xFD469501 ); in mbedtls_internal_md5_process()
[all …]
A Dripemd160.c99 uint32_t A, B, C, D, E, Ap, Bp, Cp, Dp, Ep, X[16]; in mbedtls_internal_ripemd160_process() member
120 local.B = local.Bp = ctx->state[1]; in mbedtls_internal_ripemd160_process()
153 P2( local.A, local.B, local.C, local.D, local.E, 0, 11, 5, 8 ); in mbedtls_internal_ripemd160_process()
154 P2( local.E, local.A, local.B, local.C, local.D, 1, 14, 14, 9 ); in mbedtls_internal_ripemd160_process()
155 P2( local.D, local.E, local.A, local.B, local.C, 2, 15, 7, 9 ); in mbedtls_internal_ripemd160_process()
156 P2( local.C, local.D, local.E, local.A, local.B, 3, 12, 0, 11 ); in mbedtls_internal_ripemd160_process()
157 P2( local.B, local.C, local.D, local.E, local.A, 4, 5, 9, 13 ); in mbedtls_internal_ripemd160_process()
158 P2( local.A, local.B, local.C, local.D, local.E, 5, 8, 2, 15 ); in mbedtls_internal_ripemd160_process()
159 P2( local.E, local.A, local.B, local.C, local.D, 6, 7, 11, 15 ); in mbedtls_internal_ripemd160_process()
160 P2( local.D, local.E, local.A, local.B, local.C, 7, 9, 4, 5 ); in mbedtls_internal_ripemd160_process()
[all …]
A Dsha1.c107 uint32_t temp, W[16], A, B, C, D, E; in mbedtls_internal_sha1_process() member
149 local.B = ctx->state[1]; in mbedtls_internal_sha1_process()
173 P( local.E, local.A, local.B, local.C, local.D, R(16) ); in mbedtls_internal_sha1_process()
174 P( local.D, local.E, local.A, local.B, local.C, R(17) ); in mbedtls_internal_sha1_process()
175 P( local.C, local.D, local.E, local.A, local.B, R(18) ); in mbedtls_internal_sha1_process()
176 P( local.B, local.C, local.D, local.E, local.A, R(19) ); in mbedtls_internal_sha1_process()
184 P( local.A, local.B, local.C, local.D, local.E, R(20) ); in mbedtls_internal_sha1_process()
185 P( local.E, local.A, local.B, local.C, local.D, R(21) ); in mbedtls_internal_sha1_process()
186 P( local.D, local.E, local.A, local.B, local.C, R(22) ); in mbedtls_internal_sha1_process()
187 P( local.C, local.D, local.E, local.A, local.B, R(23) ); in mbedtls_internal_sha1_process()
[all …]
A Dmd4.c95 uint32_t X[16], A, B, C, D; in mbedtls_internal_md4_process() member
118 local.B = ctx->state[1]; in mbedtls_internal_md4_process()
131 P( local.A, local.B, local.C, local.D, local.X[ 0], 3 ); in mbedtls_internal_md4_process()
132 P( local.D, local.A, local.B, local.C, local.X[ 1], 7 ); in mbedtls_internal_md4_process()
133 P( local.C, local.D, local.A, local.B, local.X[ 2], 11 ); in mbedtls_internal_md4_process()
134 P( local.B, local.C, local.D, local.A, local.X[ 3], 19 ); in mbedtls_internal_md4_process()
135 P( local.A, local.B, local.C, local.D, local.X[ 4], 3 ); in mbedtls_internal_md4_process()
136 P( local.D, local.A, local.B, local.C, local.X[ 5], 7 ); in mbedtls_internal_md4_process()
137 P( local.C, local.D, local.A, local.B, local.X[ 6], 11 ); in mbedtls_internal_md4_process()
138 P( local.B, local.C, local.D, local.A, local.X[ 7], 19 ); in mbedtls_internal_md4_process()
[all …]
A Dhavege.c79 B = &WALK[PT2 ]; RES[i++] ^= *B; \
84 *A = (*B >> (2)) ^ (*B << (30)) ^ CLK; \
85 *B = IN ^ U1; \
90 B = &WALK[PT2 ^ 2]; RES[i++] ^= *B; \
97 *A = (*B >> (6)) ^ (*B << (26)) ^ CLK; \
103 B = &WALK[PT2 ^ 1]; \
123 RES[i++] ^= *B; \
128 *A = (*B >> (10)) ^ (*B << (22)) ^ CLK; \
134 B = &WALK[PT2 ^ 3]; RES[i++] ^= *B; \
139 *A = (*B >> (14)) ^ (*B << (18)) ^ CLK; \
[all …]
A Daes.c110 V(A5,63,63,C6), V(84,7C,7C,F8), V(99,77,77,EE), V(8D,7B,7B,F6), \
111 V(0D,F2,F2,FF), V(BD,6B,6B,D6), V(B1,6F,6F,DE), V(54,C5,C5,91), \
112 V(50,30,30,60), V(03,01,01,02), V(A9,67,67,CE), V(7D,2B,2B,56), \
117 V(BF,9C,9C,23), V(F7,A4,A4,53), V(96,72,72,E4), V(5B,C0,C0,9B), \
124 V(09,07,07,0E), V(36,12,12,24), V(9B,80,80,1B), V(3D,E2,E2,DF), \
127 V(2D,1B,1B,36), V(B2,6E,6E,DC), V(EE,5A,5A,B4), V(FB,A0,A0,5B), \
128 V(F6,52,52,A4), V(4D,3B,3B,76), V(61,D6,D6,B7), V(CE,B3,B3,7D), \
131 V(60,20,20,40), V(1F,FC,FC,E3), V(C8,B1,B1,79), V(ED,5B,5B,B6), \
161 V(DD,4B,4B,96), V(DC,BD,BD,61), V(86,8B,8B,0D), V(85,8A,8A,0F), \
242 V(CB,6B,AB,3B), V(F1,45,9D,1F), V(AB,58,FA,AC), V(93,03,E3,4B), \
[all …]
A Dbignum.c1171 if( X == B ) in mbedtls_mpi_add_abs()
1382 mbedtls_mpi B; in mbedtls_mpi_add_int() local
1389 B.n = 1; in mbedtls_mpi_add_int()
1390 B.p = p; in mbedtls_mpi_add_int()
1400 mbedtls_mpi B; in mbedtls_mpi_sub_int() local
1407 B.n = 1; in mbedtls_mpi_sub_int()
1408 B.p = p; in mbedtls_mpi_sub_int()
1517 if( X == B ) { MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &TB, B ) ); B = &TB; } in mbedtls_mpi_mul_mpi()
1828 B.n = 1; in mbedtls_mpi_div_int()
1829 B.p = p; in mbedtls_mpi_div_int()
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/asn1/der/set/
A Dder_encode_setof.c19 struct edge *A = (struct edge *)a, *B = (struct edge *)b; in s_qsort_helper() local
24 r = XMEMCMP(A->start, B->start, MIN(A->size, B->size)); in s_qsort_helper()
26 if (r == 0 && A->size != B->size) { in s_qsort_helper()
27 if (A->size > B->size) { in s_qsort_helper()
28 for (x = B->size; x < A->size; x++) { in s_qsort_helper()
34 for (x = A->size; x < B->size; x++) { in s_qsort_helper()
35 if (B->start[x]) { in s_qsort_helper()
A Dder_encode_set.c21 ltc_asn1_list *A = (ltc_asn1_list *)a, *B = (ltc_asn1_list *)b; in s_qsort_helper() local
24 r = s_ltc_to_asn1(A->type) - s_ltc_to_asn1(B->type); in s_qsort_helper()
29 return A->used - B->used; in s_qsort_helper()
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/twofish/
A Dtwofish.c142 B[1] = b; in gf_mult()
146 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult()
147 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult()
148 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult()
149 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult()
150 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult()
151 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult()
152 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult()
348 ulong32 A, B; in s_twofish_setup() local
396 B = ROLc(B, 8); in s_twofish_setup()
[all …]
/optee_os-3.20.0/core/arch/arm/dts/
A Dstm32mp15-pinctrl.dtsi55 pinmux = <STM32_PINMUX('B', 6, AF5)>;
83 <STM32_PINMUX('B', 7, AF13)>,/* DCMI_VSYNC */
91 <STM32_PINMUX('B', 8, AF13)>,/* DCMI_D6 */
112 <STM32_PINMUX('B', 8, ANALOG)>,/* DCMI_D6 */
124 <STM32_PINMUX('B', 7, AF13)>,/* DCMI_VSYNC */
133 <STM32_PINMUX('B', 9, AF13)>;/* DCMI_D7 */
150 <STM32_PINMUX('B', 9, ANALOG)>;/* DCMI_D7 */
464 <STM32_PINMUX('B', 7, AF12)>, /* FMC_NL */
636 <STM32_PINMUX('B', 9, AF5)>, /* I2S2_WS */
680 <STM32_PINMUX('B', 8, AF14)>, /* LCD_B6 */
[all …]
A Dstm32mp13-pinctrl.dtsi12 <STM32_PINMUX('B', 9, AF6)>; /* I2C4_SDA */
41 pinmux = <STM32_PINMUX('B', 0, AF4)>, /* USART1_RX */
/optee_os-3.20.0/core/lib/libtomcrypt/src/modes/lrw/
A Dlrw_start.c32 unsigned char B[16]; in lrw_start() local
67 zeromem(B, 16); in lrw_start()
69 B[0] = y; in lrw_start()
70 gcm_gf_mult(tweak, B, &lrw->PC[0][y][0]); in lrw_start()
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/
A Dbignum.h649 const mbedtls_mpi *B );
664 const mbedtls_mpi *B );
678 const mbedtls_mpi *B );
692 const mbedtls_mpi *B );
736 const mbedtls_mpi *B );
773 const mbedtls_mpi *B );
814 const mbedtls_mpi *B );
936 const mbedtls_mpi *B );
1068 void mbedtls_mpi_montmul( mbedtls_mpi *A, const mbedtls_mpi *B,
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/
A Decc_set_curve_internal.c26 if (s_ecc_cmp_hex_bn(curve->B, key->dp.B, bn) != 1) continue; in s_ecc_oid_lookup()
47 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve()
58 if ((err = mp_copy(srckey->dp.B, key->dp.B )) != CRYPT_OK) { goto error; } in ecc_copy_curve()
91 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis()
102 if ((err = mp_copy(b, key->dp.B )) != CRYPT_OK) { goto error; } in ecc_set_curve_from_mpis()
A Dltc_ecc_mul2add.c26 const ecc_point *B, void *kB, in ltc_ecc_mul2add() argument
40 LTC_ARGCHK(B != NULL); in ltc_ecc_mul2add()
102 …if ((err = mp_mulmod(B->x, mu, modulus, precomp[1<<2]->x)) != CRYPT_OK) … in ltc_ecc_mul2add()
103 …if ((err = mp_mulmod(B->y, mu, modulus, precomp[1<<2]->y)) != CRYPT_OK) … in ltc_ecc_mul2add()
104 …if ((err = mp_mulmod(B->z, mu, modulus, precomp[1<<2]->z)) != CRYPT_OK) … in ltc_ecc_mul2add()
A Decc_set_curve.c15 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve()
26 if ((err = mp_read_radix(key->dp.B, cu->B, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve()
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pkcs12/
A Dpkcs12_kdf.c23 unsigned char D[MAXBLOCKSIZE], A[MAXBLOCKSIZE], B[MAXBLOCKSIZE]; in pkcs12_kdf() local
49 for (j = 0; j < v; j++) B[j] = A[j % Alen]; in pkcs12_kdf()
52 if (++B[j - 1] != 0) break; in pkcs12_kdf()
58 tmp = I[n * v + j - 1] + B[j - 1] + ch; in pkcs12_kdf()
/optee_os-3.20.0/core/crypto/
A Dsm3.c57 uint32_t A, B, C, D, E, F, G, H; in sm3_process() local
114 B = ctx->state[1]; in sm3_process()
125 TT1 = FF0(A, B, C) + D + SS2 + W1[j]; in sm3_process()
128 C = ROTL(B, 9); in sm3_process()
129 B = A; in sm3_process()
140 TT1 = FF1(A, B, C) + D + SS2 + W1[j]; in sm3_process()
143 C = ROTL(B, 9); in sm3_process()
144 B = A; in sm3_process()
153 ctx->state[1] ^= B; in sm3_process()

Completed in 42 milliseconds

123