/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | des.c | 239 (Y) = (((Y) << 1) | ((Y) >> 31)) & 0xFFFFFFFF; \ 252 (Y) = (((Y) << 31) | ((Y) >> 1)) & 0xFFFFFFFF; \ 410 T = ((Y >> 4) ^ X) & 0x0F0F0F0F; X ^= T; Y ^= (T << 4); in mbedtls_des_setkey() 411 T = ((Y ) ^ X) & 0x10101010; X ^= T; Y ^= (T ); in mbedtls_des_setkey() 418 Y = (RHs[ (Y >> 1) & 0xF] << 3) | (RHs[ (Y >> 9) & 0xF ] << 2) in mbedtls_des_setkey() 434 Y = ((Y << 1) | (Y >> 27)) & 0x0FFFFFFF; in mbedtls_des_setkey() 439 Y = ((Y << 2) | (Y >> 26)) & 0x0FFFFFFF; in mbedtls_des_setkey() 617 DES_IP( X, Y ); in mbedtls_des_crypt_ecb() 625 DES_FP( Y, X ); in mbedtls_des_crypt_ecb() 711 DES_IP( X, Y ); in mbedtls_des3_crypt_ecb() [all …]
|
A D | constant_time.c | 557 MPI_VALIDATE_RET( Y != NULL ); in mbedtls_mpi_safe_cond_assign() 566 mbedtls_ct_mpi_uint_cond_assign( Y->n, X->p, Y->p, assign ); in mbedtls_mpi_safe_cond_assign() 568 for( i = Y->n; i < X->n; i++ ) in mbedtls_mpi_safe_cond_assign() 582 mbedtls_mpi *Y, in mbedtls_mpi_safe_cond_swap() argument 590 MPI_VALIDATE_RET( Y != NULL ); in mbedtls_mpi_safe_cond_swap() 592 if( X == Y ) in mbedtls_mpi_safe_cond_swap() 603 Y->s = mbedtls_ct_cond_select_sign( swap, s, Y->s ); in mbedtls_mpi_safe_cond_swap() 610 Y->p[i] = ( Y->p[i] & ~limb_mask ) | ( tmp & limb_mask ); in mbedtls_mpi_safe_cond_swap() 629 MPI_VALIDATE_RET( Y != NULL ); in mbedtls_mpi_lt_mpi_ct() 632 if( X->n != Y->n ) in mbedtls_mpi_lt_mpi_ct() [all …]
|
A D | bignum.c | 270 if( X == Y ) in mbedtls_mpi_copy() 273 if( Y->n == 0 ) in mbedtls_mpi_copy() 284 if( Y->p[i] != 0 ) in mbedtls_mpi_copy() 288 X->s = Y->s; in mbedtls_mpi_copy() 1147 mbedtls_mpi Y; in mbedtls_mpi_cmp_int() local 1153 Y.n = 1; in mbedtls_mpi_cmp_int() 1154 Y.p = p; in mbedtls_mpi_cmp_int() 1725 X.s = Y.s = 1; in mbedtls_mpi_div_mpi() 1741 t = Y.n - 1; in mbedtls_mpi_div_mpi() 2891 mbedtls_mpi Y; in mbedtls_mpi_gen_prime() local [all …]
|
A D | aes.c | 850 uint32_t Y[4]; in mbedtls_internal_aes_encrypt() member 860 AES_FROUND( t.Y[0], t.Y[1], t.Y[2], t.Y[3], t.X[0], t.X[1], t.X[2], t.X[3] ); in mbedtls_internal_aes_encrypt() 861 AES_FROUND( t.X[0], t.X[1], t.X[2], t.X[3], t.Y[0], t.Y[1], t.Y[2], t.Y[3] ); in mbedtls_internal_aes_encrypt() 864 AES_FROUND( t.Y[0], t.Y[1], t.Y[2], t.Y[3], t.X[0], t.X[1], t.X[2], t.X[3] ); in mbedtls_internal_aes_encrypt() 870 ( (uint32_t) FSb[ MBEDTLS_BYTE_3( t.Y[3] ) ] << 24 ); in mbedtls_internal_aes_encrypt() 876 ( (uint32_t) FSb[ MBEDTLS_BYTE_3( t.Y[0] ) ] << 24 ); in mbedtls_internal_aes_encrypt() 882 ( (uint32_t) FSb[ MBEDTLS_BYTE_3( t.Y[1] ) ] << 24 ); in mbedtls_internal_aes_encrypt() 923 uint32_t Y[4]; in mbedtls_internal_aes_decrypt() member 933 AES_RROUND( t.Y[0], t.Y[1], t.Y[2], t.Y[3], t.X[0], t.X[1], t.X[2], t.X[3] ); in mbedtls_internal_aes_decrypt() 934 AES_RROUND( t.X[0], t.X[1], t.X[2], t.X[3], t.Y[0], t.Y[1], t.Y[2], t.Y[3] ); in mbedtls_internal_aes_decrypt() [all …]
|
A D | ecp.c | 788 MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->Y, &Q->Y ) ); in mbedtls_ecp_copy() 842 mbedtls_mpi_cmp_mpi( &P->Y, &Q->Y ) == 0 && in mbedtls_ecp_point_cmp() 1436 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->Y, &T[i]->Y, &ZZi ) ); in ecp_normalize_jac_many() 1551 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &P->Y, &P->Y ) ); in ecp_double_jac() 1676 MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Y, &Y ) ); in ecp_add_mixed() 1723 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &ll ) ); in ecp_randomize_jac() 2314 p_eq_g = ( mbedtls_mpi_cmp_mpi( &P->Y, &grp->G.Y ) == 0 && in ecp_mul_comb() 2762 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &YY, &pt->Y, &pt->Y ) ); in ecp_check_pubkey_sw() 2814 MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &R->Y, &grp->P, &R->Y ) ); in mbedtls_ecp_mul_shortcuts() 3370 mbedtls_mpi_cmp_mpi( &pub->Q.Y, &prv->Q.Y ) || in mbedtls_ecp_check_pub_priv() [all …]
|
A D | havege.c | 52 #define SWAP(X,Y) { uint32_t *T = (X); (X) = (Y); (Y) = T; } argument
|
A D | ecp_curves.c | 620 ecp_mpi_load( &grp->G.Y, gy, gylen ); in ecp_group_load() 723 mbedtls_mpi_free( &grp->G.Y ); in ecp_use_curve25519() 771 mbedtls_mpi_free( &grp->G.Y ); in ecp_use_curve448() 1326 #define DIV_ROUND_UP( X, Y ) ( ( ( X ) + ( Y ) - 1 ) / ( Y ) ) argument
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/ocb/ |
A D | s_ocb_done.c | 35 unsigned char *Z, *Y, *X; in s_ocb_done() local 53 Y = XMALLOC(MAXBLOCKSIZE); in s_ocb_done() 55 if (X == NULL || Y == NULL || Z == NULL) { in s_ocb_done() 59 if (Y != NULL) { in s_ocb_done() 60 XFREE(Y); in s_ocb_done() 79 if ((err = cipher_descriptor[ocb->cipher]->ecb_encrypt(X, Y, &ocb->key)) != CRYPT_OK) { in s_ocb_done() 93 ct[x] = pt[x] ^ Y[x]; in s_ocb_done() 106 ocb->checksum[x] ^= Y[x] ^ Z[x]; in s_ocb_done() 123 zeromem(Y, MAXBLOCKSIZE); in s_ocb_done() 129 XFREE(Y); in s_ocb_done()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/gcm/ |
A D | gcm_add_aad.c | 64 XMEMCPY(gcm->Y, gcm->X, 16); in gcm_add_aad() 67 XMEMCPY(gcm->Y, gcm->buf, 12); in gcm_add_aad() 68 gcm->Y[12] = 0; in gcm_add_aad() 69 gcm->Y[13] = 0; in gcm_add_aad() 70 gcm->Y[14] = 0; in gcm_add_aad() 71 gcm->Y[15] = 1; in gcm_add_aad() 73 XMEMCPY(gcm->Y_0, gcm->Y, 16); in gcm_add_aad()
|
A D | gcm_process.c | 64 if (++gcm->Y[y] & 255) { break; } in gcm_process() 67 … if ((err = cipher_descriptor[gcm->cipher]->ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { in gcm_process() 94 if (++gcm->Y[y] & 255) { break; } in gcm_process() 96 … if ((err = cipher_descriptor[gcm->cipher]->ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { in gcm_process() 112 if (++gcm->Y[y] & 255) { break; } in gcm_process() 114 … if ((err = cipher_descriptor[gcm->cipher]->ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { in gcm_process() 130 if (++gcm->Y[y] & 255) { break; } in gcm_process() 132 … if ((err = cipher_descriptor[gcm->cipher]->ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { in gcm_process()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | bignum.h | 268 int mbedtls_mpi_copy( mbedtls_mpi *X, const mbedtls_mpi *Y ); 276 void mbedtls_mpi_swap( mbedtls_mpi *X, mbedtls_mpi *Y ); 302 int mbedtls_mpi_safe_cond_assign( mbedtls_mpi *X, const mbedtls_mpi *Y, unsigned char assign ); 327 int mbedtls_mpi_safe_cond_swap( mbedtls_mpi *X, mbedtls_mpi *Y, unsigned char assign ); 593 int mbedtls_mpi_cmp_abs( const mbedtls_mpi *X, const mbedtls_mpi *Y ); 605 int mbedtls_mpi_cmp_mpi( const mbedtls_mpi *X, const mbedtls_mpi *Y ); 622 int mbedtls_mpi_lt_mpi_ct( const mbedtls_mpi *X, const mbedtls_mpi *Y,
|
/optee_os-3.20.0/lib/libutils/isoc/newlib/ |
A D | memcmp.c | 74 #define UNALIGNED(X, Y) \ argument 75 (((long)X & (sizeof(long) - 1)) | ((long)Y & (sizeof(long) - 1)))
|
A D | strcpy.c | 75 #define UNALIGNED(X, Y) \ argument 76 (((long)X & (sizeof (long) - 1)) | ((long)Y & (sizeof (long) - 1)))
|
A D | strcmp.c | 77 #define UNALIGNED(X, Y) \ argument 78 (((long)X & (sizeof(long) - 1)) | ((long)Y & (sizeof(long) - 1)))
|
A D | memcpy.c | 72 #define UNALIGNED(X, Y) \ argument 73 (((long)X & (sizeof(long) - 1)) | ((long)Y & (sizeof(long) - 1)))
|
A D | strncmp.c | 76 #define UNALIGNED(X, Y) \ argument 77 (((long)X & (sizeof (long) - 1)) | ((long)Y & (sizeof (long) - 1)))
|
A D | strncpy.c | 81 #define UNALIGNED(X, Y) \ argument 82 (((long)X & (sizeof (long) - 1)) | ((long)Y & (sizeof (long) - 1)))
|
A D | memmove.c | 75 #define UNALIGNED(X, Y) \ argument 76 (((long)X & (sizeof(long) - 1)) | ((long)Y & (sizeof(long) - 1)))
|
/optee_os-3.20.0/lib/libmbedtls/core/ |
A D | sm2-pke.c | 40 mres = mbedtls_mpi_read_binary(&p->Y, ptr, SM2_INT_SIZE_BYTES); in sm2_uncompressed_bytes_to_point() 168 mbedtls_mpi_size(&x2y2p.Y) > SM2_INT_SIZE_BYTES) { in sm2_mbedtls_pke_decrypt() 178 mres = mbedtls_mpi_write_binary(&x2y2p.Y, x2y2 + SM2_INT_SIZE_BYTES, in sm2_mbedtls_pke_decrypt() 275 size_t ysize = mbedtls_mpi_size(&p->Y); in sm2_point_to_bytes() 288 mres = mbedtls_mpi_write_binary(&p->Y, buf + 1 + SM2_INT_SIZE_BYTES, in sm2_point_to_bytes() 354 mbedtls_mpi_copy(&PB.Y, (mbedtls_mpi *)key->y); in sm2_mbedtls_pke_encrypt() 364 mbedtls_mpi_size(&x2y2p.Y) > SM2_INT_SIZE_BYTES) { in sm2_mbedtls_pke_encrypt() 374 mres = mbedtls_mpi_write_binary(&x2y2p.Y, x2y2 + SM2_INT_SIZE_BYTES, in sm2_mbedtls_pke_encrypt()
|
A D | ecc.c | 179 (mbedtls_mpi_bitlen(&ecdsa.Q.Y) > key_size_bits) || in ecc_generate_keypair() 196 crypto_bignum_copy(key->y, (void *)&ecdsa.Q.Y); in ecc_generate_keypair() 317 ecdsa.Q.Y = *(mbedtls_mpi *)key->y; in ecc_verify() 347 mbedtls_mpi_init(&ecdsa.Q.Y); in ecc_verify() 375 ecdh.Qp.Y = *(mbedtls_mpi *)public_key->y; in ecc_shared_secret() 389 mbedtls_mpi_init(&ecdh.Qp.Y); in ecc_shared_secret()
|
A D | sm2-kep.c | 92 mres = mbedtls_mpi_write_binary(&grp->G.Y, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 233 mres = mbedtls_mpi_write_binary(&UV->Y, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_S() 366 mbedtls_mpi_copy(&RB.Y, (mbedtls_mpi *)peer_eph_key->y); in crypto_acipher_sm2_kep_derive() 389 mres = mbedtls_mpi_copy(&PB.Y, (mbedtls_mpi *)peer_key->y); in crypto_acipher_sm2_kep_derive() 424 mres = mbedtls_mpi_write_binary(&U.Y, xUyUZAZB + SM2_INT_SIZE_BYTES, in crypto_acipher_sm2_kep_derive()
|
A D | sm2-dsa.c | 230 mres = mbedtls_mpi_copy(&PA.Y, (mbedtls_mpi *)key->y); in sm2_mbedtls_dsa_verify()
|
/optee_os-3.20.0/core/include/crypto/ |
A D | internal_aes-gcm.h | 87 void internal_aes_gcm_gfmul(const uint64_t X[2], const uint64_t Y[2],
|
/optee_os-3.20.0/core/crypto/ |
A D | aes-gcm.c | 523 void internal_aes_gcm_gfmul(const uint64_t X[2], const uint64_t Y[2], in internal_aes_gcm_gfmul() 532 y[0] = TEE_U64_FROM_BIG_ENDIAN(Y[0]); in internal_aes_gcm_gfmul() 533 y[1] = TEE_U64_FROM_BIG_ENDIAN(Y[1]); in internal_aes_gcm_gfmul()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ec25519/ |
A D | tweetnacl.c | 25 …Y = {0x6658, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x666… variable 304 set25519(q[1],Y); in scalarbase() 306 M(q[3],X,Y); in scalarbase()
|