/optee_os-3.20.0/lib/libmbedtls/core/ |
A D | aes.c | 26 memset(&ctx, 0, sizeof(ctx)); in crypto_aes_expand_enc_key() 34 *rounds = ctx.nr; in crypto_aes_expand_enc_key() 48 memset(&ctx, 0, sizeof(ctx)); in crypto_aes_enc_block() 53 ctx.rk = ctx.buf; in crypto_aes_enc_block() 54 ctx.nr = rounds; in crypto_aes_enc_block() 63 assert(ctx); in mbedtls_aes_init() 64 memset(ctx, 0, sizeof(*ctx)); in mbedtls_aes_init() 69 if (ctx) in mbedtls_aes_free() 70 mbedtls_platform_zeroize(ctx, sizeof(*ctx)); in mbedtls_aes_free() 82 sizeof(ctx->key), &ctx->round_count)) in mbedtls_aes_setkey_enc() [all …]
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | ecdh.c | 231 ecdh_init_internal( &ctx->ctx.mbed_ecdh ); in mbedtls_ecdh_setup() 280 mbedtls_everest_free( &ctx->ctx.everest_ecdh ); in mbedtls_ecdh_free() 284 ecdh_free_internal( &ctx->ctx.mbed_ecdh ); in mbedtls_ecdh_free() 323 if( ( ret = ecdh_gen_public_restartable( &ctx->grp, &ctx->d, &ctx->Q, in ecdh_make_params_internal() 327 if( ( ret = mbedtls_ecdh_gen_public( &ctx->grp, &ctx->d, &ctx->Q, in ecdh_make_params_internal() 397 return( mbedtls_ecp_tls_read_point( &ctx->grp, &ctx->Qp, buf, in ecdh_read_params_internal() 544 if( ( ret = ecdh_gen_public_restartable( &ctx->grp, &ctx->d, &ctx->Q, in ecdh_make_public_internal() 548 if( ( ret = mbedtls_ecdh_gen_public( &ctx->grp, &ctx->d, &ctx->Q, in ecdh_make_public_internal() 655 if( ctx == NULL || ctx->grp.pbits == 0 ) in ecdh_calc_secret_internal() 666 if( ( ret = ecdh_compute_shared_restartable( &ctx->grp, &ctx->z, &ctx->Qp, in ecdh_calc_secret_internal() [all …]
|
A D | md2.c | 84 if( ctx == NULL ) in mbedtls_md2_free() 104 ctx->left = 0; in mbedtls_md2_starts_ret() 124 ctx->state[i + 16] = ctx->buffer[i]; in mbedtls_internal_md2_process() 126 (unsigned char)( ctx->buffer[i] ^ ctx->state[i]); in mbedtls_internal_md2_process() 141 t = ctx->cksum[15]; in mbedtls_internal_md2_process() 146 ( ctx->cksum[i] ^ PI_SUBST[ctx->buffer[i] ^ t] ); in mbedtls_internal_md2_process() 147 t = ctx->cksum[i]; in mbedtls_internal_md2_process() 181 memcpy( ctx->buffer + ctx->left, input, fill ); in mbedtls_md2_update_ret() 183 ctx->left += fill; in mbedtls_md2_update_ret() 189 ctx->left = 0; in mbedtls_md2_update_ret() [all …]
|
A D | hmac_drbg.c | 98 if( ( ret = mbedtls_md_hmac_finish( &ctx->md_ctx, ctx->V ) ) != 0 ) in mbedtls_hmac_drbg_update_ret() 137 if( ( ret = mbedtls_md_hmac_starts( &ctx->md_ctx, ctx->V, in mbedtls_hmac_drbg_seed_buf() 180 if( ( ret = ctx->f_entropy( ctx->p_entropy, in hmac_drbg_reseed_core() 198 if( ( ret = ctx->f_entropy( ctx->p_entropy, in hmac_drbg_reseed_core() 221 ctx->reseed_counter = 1; in hmac_drbg_reseed_core() 269 if( ( ret = mbedtls_md_hmac_starts( &ctx->md_ctx, ctx->V, md_size ) ) != 0 ) in mbedtls_hmac_drbg_seed() 313 ctx->entropy_len = len; in mbedtls_hmac_drbg_set_entropy_len() 349 ctx->reseed_counter > ctx->reseed_interval ) ) in mbedtls_hmac_drbg_random_with_add() 375 if( ( ret = mbedtls_md_hmac_finish( &ctx->md_ctx, ctx->V ) ) != 0 ) in mbedtls_hmac_drbg_random_with_add() 389 ctx->reseed_counter++; in mbedtls_hmac_drbg_random_with_add() [all …]
|
A D | chachapoly.c | 98 ctx->aad_len = 0U; in mbedtls_chachapoly_init() 99 ctx->ciphertext_len = 0U; in mbedtls_chachapoly_init() 106 if( ctx == NULL ) in mbedtls_chachapoly_free() 111 ctx->aad_len = 0U; in mbedtls_chachapoly_free() 112 ctx->ciphertext_len = 0U; in mbedtls_chachapoly_free() 158 ctx->aad_len = 0U; in mbedtls_chachapoly_starts() 159 ctx->ciphertext_len = 0U; in mbedtls_chachapoly_starts() 161 ctx->mode = mode; in mbedtls_chachapoly_starts() 179 ctx->aad_len += aad_len; in mbedtls_chachapoly_update_aad() 209 ctx->ciphertext_len += len; in mbedtls_chachapoly_update() [all …]
|
A D | cipher.c | 152 if( ctx == NULL ) in mbedtls_cipher_free() 179 if( ctx->cmac_ctx ) in mbedtls_cipher_free() 188 ctx->cipher_info->base->ctx_free_func( ctx->cipher_ctx ); in mbedtls_cipher_free() 632 ctx->operation, block_size, ctx->iv, in mbedtls_cipher_update() 676 ctx->operation, ilen, ctx->iv, input, output ) ) ) in mbedtls_cipher_update() 692 ctx->operation, ilen, &ctx->unprocessed_len, ctx->iv, in mbedtls_cipher_update() 723 ilen, &ctx->unprocessed_len, ctx->iv, in mbedtls_cipher_update() 743 ret = ctx->cipher_info->base->xts_func( ctx->cipher_ctx, in mbedtls_cipher_update() 744 ctx->operation, ilen, ctx->iv, input, output ); in mbedtls_cipher_update() 1007 ctx->add_padding( ctx->unprocessed_data, mbedtls_cipher_get_iv_size( ctx ), in mbedtls_cipher_finish() [all …]
|
A D | md.c | 272 if( ctx == NULL || ctx->md_info == NULL ) in mbedtls_md_free() 482 if( ctx == NULL || ctx->md_info == NULL ) in mbedtls_md_starts() 528 if( ctx == NULL || ctx->md_info == NULL ) in mbedtls_md_update() 572 if( ctx == NULL || ctx->md_info == NULL ) in mbedtls_md_finish() 709 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL ) in mbedtls_md_hmac_starts() 726 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; in mbedtls_md_hmac_starts() 751 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL ) in mbedtls_md_hmac_update() 763 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL ) in mbedtls_md_hmac_finish() 766 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; in mbedtls_md_hmac_finish() 786 if( ctx == NULL || ctx->md_info == NULL || ctx->hmac_ctx == NULL ) in mbedtls_md_hmac_reset() [all …]
|
A D | dhm.c | 147 ctx->len = mbedtls_mpi_size( &ctx->P ); in mbedtls_dhm_read_params() 195 MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &ctx->GX, &ctx->G, &ctx->X, in dhm_make_common() 276 ctx->len = mbedtls_mpi_size( &ctx->P ); in mbedtls_dhm_set_group() 364 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->Vi, &ctx->Vi, &ctx->P ) ); in dhm_update_blinding() 367 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->Vf, &ctx->Vf, &ctx->P ) ); in dhm_update_blinding() 384 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->Vf, &ctx->Vf, &ctx->P ) ); in dhm_update_blinding() 385 MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &ctx->Vf, &ctx->Vf, &ctx->P ) ); in dhm_update_blinding() 387 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->Vf, &ctx->Vf, &ctx->P ) ); in dhm_update_blinding() 389 MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &ctx->Vf, &ctx->Vf, &ctx->X, &ctx->P, &ctx->RP ) ); in dhm_update_blinding() 436 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &ctx->K, &ctx->K, &ctx->Vf ) ); in mbedtls_dhm_calc_secret() [all …]
|
A D | ssl_ticket.c | 104 ((void) ctx); in ssl_ticket_update_keys() 109 uint32_t key_time = ctx->keys[ctx->active].generation_time; in ssl_ticket_update_keys() 117 ctx->active = 1 - ctx->active; in ssl_ticket_update_keys() 119 return( ssl_ticket_gen_key( ctx, ctx->active ) ); in ssl_ticket_update_keys() 156 ret = mbedtls_cipher_setup_psa( &ctx->keys[0].ctx, in mbedtls_ssl_ticket_setup() 168 ret = mbedtls_cipher_setup_psa( &ctx->keys[1].ctx, in mbedtls_ssl_ticket_setup() 218 if( ctx == NULL || ctx->f_rng == NULL ) in mbedtls_ssl_ticket_write() 233 key = &ctx->keys[ctx->active]; in mbedtls_ssl_ticket_write() 313 if( ctx == NULL || ctx->f_rng == NULL ) in mbedtls_ssl_ticket_parse() 396 mbedtls_cipher_free( &ctx->keys[0].ctx ); in mbedtls_ssl_ticket_free() [all …]
|
A D | pk.c | 72 ctx->pk_info->ctx_free_func( ctx->pk_ctx ); in mbedtls_pk_free() 93 if( ctx == NULL || ctx->pk_info == NULL || in mbedtls_pk_restart_free() 99 ctx->pk_info->rs_free_func( ctx->rs_ctx ); in mbedtls_pk_restart_free() 161 if( ctx == NULL || ctx->pk_info != NULL ) in mbedtls_pk_setup_opaque() 225 if( ctx == NULL || ctx->pk_info == NULL ) in mbedtls_pk_can_do() 259 if( ctx == NULL || ctx->pk_info != NULL ) in pk_restart_setup() 542 if( ctx == NULL || ctx->pk_info == NULL ) in mbedtls_pk_get_bitlen() 545 return( ctx->pk_info->get_bitlen( ctx->pk_ctx ) ); in mbedtls_pk_get_bitlen() 560 ctx->pk_info->debug_func( ctx->pk_ctx, items ); in mbedtls_pk_debug() 569 if( ctx == NULL || ctx->pk_info == NULL ) in mbedtls_pk_get_name() [all …]
|
A D | entropy.c | 62 ctx->source_count = 0; in mbedtls_entropy_init() 63 memset( ctx->source, 0, sizeof( ctx->source ) ); in mbedtls_entropy_init() 69 ctx->accumulator_started = 0; in mbedtls_entropy_init() 99 mbedtls_entropy_add_source( ctx, mbedtls_havege_poll, &ctx->havege_data, in mbedtls_entropy_init() 112 ctx->initial_entropy_run = 0; in mbedtls_entropy_init() 138 ctx->source_count = 0; in mbedtls_entropy_free() 139 mbedtls_platform_zeroize( ctx->source, sizeof( ctx->source ) ); in mbedtls_entropy_free() 154 idx = ctx->source_count; in mbedtls_entropy_add_source() 166 ctx->source_count++; in mbedtls_entropy_add_source() 279 if( ( ret = ctx->source[i].f_source( ctx->source[i].p_source, in entropy_gather_internal() [all …]
|
A D | gcm.c | 110 ctx->HH[0] = 0; in gcm_gen_table() 125 uint64_t *HiL = ctx->HL + i, *HiH = ctx->HH + i; in gcm_gen_table() 275 memset( ctx->y, 0x00, sizeof(ctx->y) ); in mbedtls_gcm_starts() 276 memset( ctx->buf, 0x00, sizeof(ctx->buf) ); in mbedtls_gcm_starts() 279 ctx->len = 0; in mbedtls_gcm_starts() 301 gcm_mult( ctx, ctx->y, ctx->y ); in mbedtls_gcm_starts() 310 gcm_mult( ctx, ctx->y, ctx->y ); in mbedtls_gcm_starts() 328 gcm_mult( ctx, ctx->buf, ctx->buf ); in mbedtls_gcm_starts() 358 if( ctx->len + length < ctx->len || in mbedtls_gcm_update() 390 gcm_mult( ctx, ctx->buf, ctx->buf ); in mbedtls_gcm_update() [all …]
|
A D | rsa.c | 296 ret = mbedtls_rsa_deduce_primes( &ctx->N, &ctx->E, &ctx->D, in mbedtls_rsa_complete() 321 ret = mbedtls_rsa_deduce_crt( &ctx->P, &ctx->Q, &ctx->D, in mbedtls_rsa_complete() 322 &ctx->DP, &ctx->DQ, &ctx->QP ); in mbedtls_rsa_complete() 455 if( ( ret = mbedtls_rsa_deduce_crt( &ctx->P, &ctx->Q, &ctx->D, in mbedtls_rsa_export_crt() 600 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &ctx->N, &ctx->P, &ctx->Q ) ); in mbedtls_rsa_gen_key() 610 MBEDTLS_MPI_CHK( mbedtls_rsa_deduce_crt( &ctx->P, &ctx->Q, &ctx->D, in mbedtls_rsa_gen_key() 675 if( mbedtls_rsa_validate_params( &ctx->N, &ctx->P, &ctx->Q, in mbedtls_rsa_check_privkey() 682 else if( mbedtls_rsa_validate_crt( &ctx->P, &ctx->Q, &ctx->D, in mbedtls_rsa_check_privkey() 810 ret = mbedtls_mpi_inv_mod( &ctx->Vi, &ctx->Vi, &ctx->N ); in rsa_prepare_blinding() 818 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->Vi, &ctx->Vi, &ctx->N ) ); in rsa_prepare_blinding() [all …]
|
A D | ctr_drbg.c | 56 ctx->reseed_counter = -1; in mbedtls_ctr_drbg_init() 67 if( ctx == NULL ) in mbedtls_ctr_drbg_free() 72 if( ctx->f_entropy != NULL ) in mbedtls_ctr_drbg_free() 78 ctx->reseed_counter = -1; in mbedtls_ctr_drbg_free() 90 ctx->entropy_len = len; in mbedtls_ctr_drbg_set_entropy_len() 98 if( ctx->f_entropy != NULL ) in mbedtls_ctr_drbg_set_nonce_len() 380 if( 0 != ctx->f_entropy( ctx->p_entropy, seed, ctx->entropy_len ) ) in mbedtls_ctr_drbg_reseed_internal() 389 if( 0 != ctx->f_entropy( ctx->p_entropy, seed + seedlen, nonce_len ) ) in mbedtls_ctr_drbg_reseed_internal() 410 ctx->reseed_counter = 1; in mbedtls_ctr_drbg_reseed_internal() 534 if( ctx->reseed_counter > ctx->reseed_interval || in mbedtls_ctr_drbg_random_with_add() [all …]
|
A D | poly1305.c | 106 r0 = ctx->r[0]; in poly1305_process() 107 r1 = ctx->r[1]; in poly1305_process() 108 r2 = ctx->r[2]; in poly1305_process() 109 r3 = ctx->r[3]; in poly1305_process() 268 if( ctx == NULL ) in mbedtls_poly1305_free() 292 ctx->acc[0] = 0U; in mbedtls_poly1305_starts() 299 mbedtls_platform_zeroize( ctx->queue, sizeof( ctx->queue ) ); in mbedtls_poly1305_starts() 325 memcpy( &ctx->queue[ctx->queue_len], in mbedtls_poly1305_update() 336 memcpy( &ctx->queue[ctx->queue_len], in mbedtls_poly1305_update() 379 ctx->queue[ctx->queue_len] = 1U; in mbedtls_poly1305_finish() [all …]
|
A D | chacha20.c | 177 mbedtls_platform_zeroize( ctx->state, sizeof( ctx->state ) ); in mbedtls_chacha20_init() 178 mbedtls_platform_zeroize( ctx->keystream8, sizeof( ctx->keystream8 ) ); in mbedtls_chacha20_init() 186 if( ctx != NULL ) in mbedtls_chacha20_free() 199 ctx->state[0] = 0x61707865; in mbedtls_chacha20_setkey() 200 ctx->state[1] = 0x3320646e; in mbedtls_chacha20_setkey() 201 ctx->state[2] = 0x79622d32; in mbedtls_chacha20_setkey() 225 ctx->state[12] = counter; in mbedtls_chacha20_starts() 232 mbedtls_platform_zeroize( ctx->keystream8, sizeof( ctx->keystream8 ) ); in mbedtls_chacha20_starts() 256 ^ ctx->keystream8[ctx->keystream_bytes_used]; in mbedtls_chacha20_update() 267 chacha20_block( ctx->state, ctx->keystream8 ); in mbedtls_chacha20_update() [all …]
|
A D | cipher_wrap.c | 95 if( ctx != NULL ) in gcm_ctx_alloc() 98 return( ctx ); in gcm_ctx_alloc() 119 if( ctx != NULL ) in ccm_ctx_alloc() 122 return( ctx ); in ccm_ctx_alloc() 735 return( ctx ); in camellia_ctx_alloc() 1119 return( ctx ); in aria_ctx_alloc() 1773 return( ctx ); in blowfish_ctx_alloc() 1895 return( ctx ); in arc4_ctx_alloc() 2122 ((void) ctx); in null_crypt_stream() 2130 ((void) ctx); in null_setkey() [all …]
|
/optee_os-3.20.0/core/drivers/crypto/stm32/ |
A D | stm32_cryp.c | 372 ctx->pm_gcmccm[i] = io_read32(ctx->base + in cryp_save_suspend() 458 ctx->cr = io_read32(ctx->base + _CRYP_CR); in save_context() 487 io_write32(ctx->base + _CRYP_CR, ctx->cr); in restore_context() 529 io_write32(ctx->base + _CRYP_CR, ctx->cr); in ccm_first_context() 611 res = write_align_block(ctx, ctx->extra); in do_from_header_to_phase() 770 memset(ctx->pm_gcm, 0, sizeof(ctx->pm_gcm)); in stm32_cryp_init() 824 memcpy(block, ctx->extra, ctx->extra_size); in stm32_cryp_update_assodata() 922 res = write_align_block(ctx, ctx->extra); in stm32_cryp_update_load() 977 res = write_align_block(ctx, ctx->extra); in stm32_cryp_update_load() 1047 res = write_align_block(ctx, ctx->extra); in stm32_cryp_final() [all …]
|
/optee_os-3.20.0/core/drivers/crypto/caam/hash/ |
A D | caam_hash.c | 326 cache_operation(TEE_CACHEFLUSH, ctx->ctx.data, ctx->ctx.length); in caam_hash_hmac_allocate() 329 ctx->ctx.length = 0; in caam_hash_hmac_allocate() 376 ctx->ctx.length = 0; in caam_hash_hmac_init() 404 if (ctx->ctx.length) { in do_update_hash() 449 ctx->ctx.length); in do_update_hash() 462 HASH_DUMPBUF("CTX", ctx->ctx.data, ctx->ctx.length); in do_update_hash() 488 if (!ctx->ctx.data) in caam_hash_hmac_update() 588 if (!ctx->ctx.data) in caam_hash_hmac_final() 621 ctx->ctx.length); in caam_hash_hmac_final() 622 HASH_DUMPBUF("CTX", ctx->ctx.data, ctx->ctx.length); in caam_hash_hmac_final() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | hmac.c | 17 struct crypto_mac_ctx ctx; member 26 assert(ctx && ctx->ops == <c_hmac_ops); in to_hmac_ctx() 28 return container_of(ctx, struct ltc_hmac_ctx, ctx); in to_hmac_ctx() 34 struct ltc_hmac_ctx *hc = to_hmac_ctx(ctx); in ltc_hmac_init() 64 free(to_hmac_ctx(ctx)); in ltc_hmac_free_ctx() 88 struct ltc_hmac_ctx *ctx = NULL; in ltc_hmac_alloc_ctx() local 93 ctx = calloc(1, sizeof(*ctx)); in ltc_hmac_alloc_ctx() 94 if (!ctx) in ltc_hmac_alloc_ctx() 97 ctx->ctx.ops = <c_hmac_ops; in ltc_hmac_alloc_ctx() 98 ctx->hash_idx = hash_idx; in ltc_hmac_alloc_ctx() [all …]
|
A D | cmac.c | 18 struct crypto_mac_ctx ctx; member 27 assert(ctx && ctx->ops == <c_omac_ops); in to_omac_ctx() 29 return container_of(ctx, struct ltc_omac_ctx, ctx); in to_omac_ctx() 35 struct ltc_omac_ctx *hc = to_omac_ctx(ctx); in ltc_omac_init() 65 free(to_omac_ctx(ctx)); in ltc_omac_free_ctx() 89 struct ltc_omac_ctx *ctx = NULL; in crypto_common_cmac_alloc_ctx() local 98 ctx = calloc(1, sizeof(*ctx)); in crypto_common_cmac_alloc_ctx() 99 if (!ctx) in crypto_common_cmac_alloc_ctx() 102 ctx->ctx.ops = <c_omac_ops; in crypto_common_cmac_alloc_ctx() 103 ctx->cipher_idx = cipher_idx; in crypto_common_cmac_alloc_ctx() [all …]
|
A D | hash.c | 22 struct crypto_hash_ctx ctx; member 31 assert(ctx && ctx->ops == <c_hash_ops); in to_hash_ctx() 33 return container_of(ctx, struct ltc_hash_ctx, ctx); in to_hash_ctx() 38 struct ltc_hash_ctx *hc = to_hash_ctx(ctx); in ltc_hash_init() 49 struct ltc_hash_ctx *hc = to_hash_ctx(ctx); in ltc_hash_update() 88 free(to_hash_ctx(ctx)); in ltc_hash_free_ctx() 112 struct ltc_hash_ctx *ctx = NULL; in ltc_hash_alloc_ctx() local 117 ctx = calloc(1, sizeof(*ctx)); in ltc_hash_alloc_ctx() 118 if (!ctx) in ltc_hash_alloc_ctx() 121 ctx->ctx.ops = <c_hash_ops; in ltc_hash_alloc_ctx() [all …]
|
/optee_os-3.20.0/core/crypto/ |
A D | sm3.c | 40 ctx->total[0] = 0; in sm3_init() 41 ctx->total[1] = 0; in sm3_init() 195 sm3_process_blocks(ctx, ctx->buffer, 1); in sm3_update() 223 high = (ctx->total[0] >> 29) | (ctx->total[1] << 3); in sm3_final() 249 sm3_init(&ctx); in sm3() 253 memzero_explicit(&ctx, sizeof(ctx)); in sm3() 275 sm3_init(ctx); in sm3_hmac_init() 276 sm3_update(ctx, ctx->ipad, 64); in sm3_hmac_init() 291 sm3_init(ctx); in sm3_hmac_final() 292 sm3_update(ctx, ctx->opad, 64); in sm3_hmac_final() [all …]
|
/optee_os-3.20.0/core/drivers/crypto/caam/cipher/ |
A D | caam_cipher_mac.c | 105 assert(ctx && ctx->ops == &cmac_ops); in to_mac_ctx() 145 struct cipherdata *ctx = dupdate->ctx; in do_update_mac() local 179 memcpy(dupdate->dst.data, ctx->ctx.data, in do_update_mac() 317 if (ctx->ctx.length) { in run_cmac_desc() 320 ctx->ctx.length, in run_cmac_desc() 322 caam_desc_add_ptr(desc, ctx->ctx.paddr); in run_cmac_desc() 338 if (!ctx->ctx.data) { in run_cmac_desc() 387 ctx->ctx.length, in run_cmac_desc() 395 if (ctx->ctx.length) in run_cmac_desc() 397 ctx->ctx.length); in run_cmac_desc() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/ |
A D | adler32.c | 15 void adler32_init(adler32_state *ctx) in adler32_init() argument 17 LTC_ARGCHKVD(ctx != NULL); in adler32_init() 18 ctx->s[0] = 1; in adler32_init() 19 ctx->s[1] = 0; in adler32_init() 26 LTC_ARGCHKVD(ctx != NULL); in adler32_update() 28 s1 = ctx->s[0]; in adler32_update() 29 s2 = ctx->s[1]; in adler32_update() 82 LTC_ARGCHKVD(ctx != NULL); in adler32_finish() 113 adler32_state ctx; in adler32_test() 114 adler32_init(&ctx); in adler32_test() [all …]
|