/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/ |
A D | sha1.c | 57 e = md->sha1.state[4]; in ss_sha1_compress() 66 … #define FF0(a,b,c,d,e,i) e = (ROLc(a, 5) + F0(b,c,d) + e + W[i] + 0x5a827999UL); b = ROLc(b, 30); in ss_sha1_compress() argument 67 … #define FF1(a,b,c,d,e,i) e = (ROLc(a, 5) + F1(b,c,d) + e + W[i] + 0x6ed9eba1UL); b = ROLc(b, 30); in ss_sha1_compress() argument 68 … #define FF2(a,b,c,d,e,i) e = (ROLc(a, 5) + F2(b,c,d) + e + W[i] + 0x8f1bbcdcUL); b = ROLc(b, 30); in ss_sha1_compress() argument 69 … #define FF3(a,b,c,d,e,i) e = (ROLc(a, 5) + F3(b,c,d) + e + W[i] + 0xca62c1d6UL); b = ROLc(b, 30); in ss_sha1_compress() argument 74 FF0(a,b,c,d,e,i++); t = e; e = d; d = c; c = b; b = a; a = t; in ss_sha1_compress() 78 FF1(a,b,c,d,e,i++); t = e; e = d; d = c; c = b; b = a; a = t; in ss_sha1_compress() 82 FF2(a,b,c,d,e,i++); t = e; e = d; d = c; c = b; b = a; a = t; in ss_sha1_compress() 86 FF3(a,b,c,d,e,i++); t = e; e = d; d = c; c = b; b = a; a = t; in ss_sha1_compress() 92 FF0(a,b,c,d,e,i++); in ss_sha1_compress() [all …]
|
A D | rmd160.c | 44 #define FF(a, b, c, d, e, x, s) \ argument 46 (a) = ROLc((a), (s)) + (e);\ 51 (a) = ROLc((a), (s)) + (e);\ 56 (a) = ROLc((a), (s)) + (e);\ 61 (a) = ROLc((a), (s)) + (e);\ 66 (a) = ROLc((a), (s)) + (e);\ 71 (a) = ROLc((a), (s)) + (e);\ 76 (a) = ROLc((a), (s)) + (e);\ 81 (a) = ROLc((a), (s)) + (e);\ 86 (a) = ROLc((a), (s)) + (e);\ [all …]
|
A D | rmd320.c | 39 #define FF(a, b, c, d, e, x, s) \ argument 41 (a) = ROLc((a), (s)) + (e);\ 46 (a) = ROLc((a), (s)) + (e);\ 51 (a) = ROLc((a), (s)) + (e);\ 56 (a) = ROLc((a), (s)) + (e);\ 61 (a) = ROLc((a), (s)) + (e);\ 66 (a) = ROLc((a), (s)) + (e);\ 71 (a) = ROLc((a), (s)) + (e);\ 76 (a) = ROLc((a), (s)) + (e);\ 81 (a) = ROLc((a), (s)) + (e);\ [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/rsa/ |
A D | rsa_make_key.c | 12 static int s_rsa_make_key(prng_state *prng, int wprng, int size, void *e, rsa_key *key) in s_rsa_make_key() argument 55 …if ((err = mp_copy( e, key->e)) != CRYPT_OK) { goto errkey; } /* key->e = … in s_rsa_make_key() 92 int rsa_make_key(prng_state *prng, int wprng, int size, long e, rsa_key *key) in rsa_make_key() argument 97 if ((e < 3) || ((e & 1) == 0)) { in rsa_make_key() 105 if ((err = mp_set_int(tmp_e, e)) == CRYPT_OK) in rsa_make_key() 124 const unsigned char *e, unsigned long elen, rsa_key *key) in rsa_make_key_ubin_e() argument 133 if ((err = mp_read_unsigned_bin(tmp_e, (unsigned char *)e, elen)) == CRYPT_OK) in rsa_make_key_ubin_e() 150 int rsa_make_key_bn_e(prng_state *prng, int wprng, int size, void *e, rsa_key *key) in rsa_make_key_bn_e() argument 155 e_bits = mp_count_bits(e); in rsa_make_key_bn_e() 156 if ((e_bits > 1 && e_bits < 256) && (mp_get_digit(e, 0) & 1)) { in rsa_make_key_bn_e() [all …]
|
A D | rsa_set.c | 21 const unsigned char *e, unsigned long elen, in rsa_set_key() argument 29 LTC_ARGCHK(e != NULL); in rsa_set_key() 35 …if ((err = mp_read_unsigned_bin(key->e , (unsigned char *)e , elen)) != CRYPT_OK) { goto LBL_ER… in rsa_set_key()
|
A D | rsa_key.c | 79 …s_mpi_shrink_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP, &key->p, &key->q, NULL… in rsa_shrink_key() 90 …return mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP, &key->p, &key->q, LT… in rsa_init() 100 …mp_cleanup_multi(&key->q, &key->p, &key->qP, &key->dP, &key->dQ, &key->N, &key->d, &key->e, LTC_NU… in rsa_free()
|
A D | rsa_import.c | 38 LTC_ASN1_INTEGER, 1UL, key->e, in rsa_import_pkcs1() 53 LTC_ASN1_INTEGER, 1UL, key->e, in rsa_import_pkcs1() 118 LTC_ASN1_INTEGER, 1UL, key->e, in rsa_import()
|
/optee_os-3.20.0/core/tee/ |
A D | tee_svc_storage.c | 51 *e_out = e; in tee_svc_storage_get_enum() 66 if (e->fops) in tee_svc_close_enum() 67 e->fops->closedir(e->dir); in tee_svc_close_enum() 69 e->dir = NULL; in tee_svc_close_enum() 70 e->fops = NULL; in tee_svc_close_enum() 72 free(e); in tee_svc_close_enum() 531 if (e == NULL) in syscall_storage_alloc_enum() 568 e->fops->closedir(e->dir); in syscall_storage_reset_enum() 591 if (e->dir) { in syscall_storage_start_enum() 592 e->fops->closedir(e->dir); in syscall_storage_start_enum() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/safer/ |
A D | safer.c | 251 { unsigned char a, b, c, d, e, f, g, h, t; in s_safer_ecb_encrypt() local 261 e = pt[4]; f = pt[5]; g = pt[6]; h = pt[7]; in s_safer_ecb_encrypt() 269 e = EXP(e) + *++key; f = LOG(f) ^ *++key; in s_safer_ecb_encrypt() 271 PHT(a, b); PHT(c, d); PHT(e, f); PHT(g, h); in s_safer_ecb_encrypt() 274 t = b; b = e; e = c; c = t; t = d; d = f; f = g; g = t; in s_safer_ecb_encrypt() 280 ct[4] = e & 0xFF; ct[5] = f & 0xFF; in s_safer_ecb_encrypt() 305 { unsigned char a, b, c, d, e, f, g, h, t; in s_safer_ecb_decrypt() local 315 e = ct[4]; f = ct[5]; g = ct[6]; h = ct[7]; in s_safer_ecb_decrypt() 322 t = e; e = b; b = c; c = t; t = f; f = d; d = g; g = t; in s_safer_ecb_decrypt() 329 f = EXP(f) - *--key; e = LOG(e) ^ *--key; in s_safer_ecb_decrypt() [all …]
|
/optee_os-3.20.0/core/kernel/ |
A D | asan.c | 60 vaddr_t e = (vaddr_t)end; in va_range_inside_shadow() local 62 if (b >= e) in va_range_inside_shadow() 70 vaddr_t e = (vaddr_t)end; in va_range_outside_shadow() local 72 if (b >= e) in va_range_outside_shadow() 90 vaddr_t e = (vaddr_t)end; in asan_set_shadowed() local 95 assert(b < e); in asan_set_shadowed() 98 asan_va_size = e - b; in asan_set_shadowed() 173 int8_t *e; in check_access() local 186 e = va_to_shadow((void *)(addr + size - 1)); in check_access() 187 for (a = va_to_shadow(begin); a <= e; a++) in check_access() [all …]
|
A D | lockdep.c | 150 struct lockdep_edge *e = NULL; in lockdep_graph_get_shortest_cycle() local 156 STAILQ_FOREACH(e, &n->edges, link) { in lockdep_graph_get_shortest_cycle() 157 if (e->to->lock_id == node->lock_id) { in lockdep_graph_get_shortest_cycle() 179 if (!(e->to->flags & LOCKDEP_NODE_BFS_VISITED)) { in lockdep_graph_get_shortest_cycle() 183 e->to->flags |= LOCKDEP_NODE_BFS_VISITED; in lockdep_graph_get_shortest_cycle() 189 nqe->node = e->to; in lockdep_graph_get_shortest_cycle() 196 nqe->path[nlen - 1] = e->to->lock_id; in lockdep_graph_get_shortest_cycle() 213 struct lockdep_edge *e = NULL; in lockdep_visit() local 223 STAILQ_FOREACH(e, &node->edges, link) { in lockdep_visit() 224 TEE_Result res = lockdep_visit(e->to); in lockdep_visit()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/ |
A D | serpent.c | 53 #define s_beforeS0(f) f(0,a,b,c,d,e) 451 ulong32 a, b, c, d, e; in s_setup_key() local 487 ulong32 a, b, c, d, e; in s_enc_block() local 509 b = e; in s_enc_block() 510 e = d; in s_enc_block() 512 a = e; in s_enc_block() 520 STORE32L(e, out + 4); in s_enc_block() 529 ulong32 a, b, c, d, e; in s_dec_block() local 536 e = 0; LTC_UNUSED_PARAM(e); /* avoid scan-build warning */ in s_dec_block() 546 d = e; in s_dec_block() [all …]
|
/optee_os-3.20.0/core/pta/ |
A D | hwrng.c | 25 uint8_t *e = NULL; in rng_get_entropy() local 35 e = (uint8_t *)params[0].memref.buffer; in rng_get_entropy() 36 if (!e) in rng_get_entropy() 39 return crypto_rng_read(e, params[0].memref.size); in rng_get_entropy()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_sign_hash.c | 32 void *r, *s, *e, *p, *b; in ecc_sign_hash_ex() local 49 if ((err = mp_init_multi(&r, &s, &e, &b, LTC_NULL)) != CRYPT_OK) { in ecc_sign_hash_ex() 58 … if ((err = mp_read_unsigned_bin(e, (unsigned char *)in, inlen)) != CRYPT_OK) { goto errnokey; } in ecc_sign_hash_ex() 61 … if ((err = mp_read_unsigned_bin(e, (unsigned char *)in, pbytes)) != CRYPT_OK) { goto errnokey; } in ecc_sign_hash_ex() 70 … if ((err = mp_read_unsigned_bin(e, (unsigned char *)buf, pbytes)) != CRYPT_OK) { goto errnokey; } in ecc_sign_hash_ex() 102 … if ((err = mp_mulmod(pubkey.k, e, p, e)) != CRYPT_OK) { goto error; } /* e = e/kb */ in ecc_sign_hash_ex() 103 …if ((err = mp_add(e, s, s)) != CRYPT_OK) { goto error; } /* s = e/kb + xr… in ecc_sign_hash_ex() 177 mp_clear_multi(r, s, e, b, LTC_NULL); in ecc_sign_hash_ex()
|
A D | ecc_verify_hash.c | 29 void *r, *s, *v, *w, *u1, *u2, *e, *p, *m, *a, *a_plus3; in ecc_verify_hash_ex() local 45 if ((err = mp_init_multi(&r, &s, &v, &w, &u1, &u2, &e, &a_plus3, LTC_NULL)) != CRYPT_OK) { in ecc_verify_hash_ex() 133 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, hashlen)) != CRYPT_OK) … in ecc_verify_hash_ex() 136 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, pbytes)) != CRYPT_OK) … in ecc_verify_hash_ex() 145 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)buf, pbytes)) != CRYPT_OK) … in ecc_verify_hash_ex() 152 …if ((err = mp_mulmod(e, w, p, u1)) != CRYPT_OK) … in ecc_verify_hash_ex() 201 mp_clear_multi(r, s, v, w, u1, u2, e, a_plus3, LTC_NULL); in ecc_verify_hash_ex()
|
A D | ecc_recover_key.c | 32 void *r, *s, *v, *w, *t1, *t2, *u1, *u2, *v1, *v2, *e, *x, *y, *a_plus3; in ecc_recover_key() local 49 …if ((err = mp_init_multi(&r, &s, &v, &w, &t1, &t2, &u1, &u2, &v1, &v2, &e, &x, &y, &a_plus3, LTC_N… in ecc_recover_key() 153 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, hashlen)) != CRYPT_OK) … in ecc_recover_key() 156 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, pbytes)) != CRYPT_OK) … in ecc_recover_key() 165 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)buf, pbytes)) != CRYPT_OK) … in ecc_recover_key() 199 …if ((err = mp_mulmod(e, w, p, v2)) != CRYPT_OK) … in ecc_recover_key() 205 …if ((err = mp_mulmod(e, w, p, u1)) != CRYPT_OK) … in ecc_recover_key() 255 mp_clear_multi(a_plus3, y, x, e, v2, v1, u2, u1, t2, t1, w, v, s, r, LTC_NULL); in ecc_recover_key()
|
/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | rsa.c | 96 if (!bn_alloc_max(&s->e)) in sw_crypto_acipher_alloc_rsa_keypair() 128 if (!bn_alloc_max(&s->e)) in sw_crypto_acipher_alloc_rsa_public_key() 134 crypto_bignum_free(s->e); in sw_crypto_acipher_alloc_rsa_public_key() 147 crypto_bignum_free(s->e); in sw_crypto_acipher_free_rsa_public_key() 158 crypto_bignum_free(s->e); in sw_crypto_acipher_free_rsa_keypair() 280 ltc_key.e = key->e; in sw_crypto_acipher_rsanopad_encrypt() 302 ltc_key.e = key->e; in sw_crypto_acipher_rsanopad_decrypt() 340 ltc_key.e = key->e; in sw_crypto_acipher_rsaes_decrypt() 442 .e = key->e, in sw_crypto_acipher_rsaes_encrypt() 506 ltc_key.e = key->e; in sw_crypto_acipher_rsassa_sign() [all …]
|
A D | sm2-dsa.c | 30 void *e = NULL; in sm2_ltc_dsa_sign() local 40 ltc_res = mp_init_multi(&k, &e, &r, &s, &tmp, NULL); in sm2_ltc_dsa_sign() 80 mp_read_unsigned_bin(e, (unsigned char *)msg, msg_len); in sm2_ltc_dsa_sign() 81 ltc_res = mp_addmod(e, x1y1p->x, ltc_key.dp.order, r); in sm2_ltc_dsa_sign() 132 mp_clear_multi(k, e, r, s, tmp, NULL); in sm2_ltc_dsa_sign()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/dsa/ |
A D | dsa_generate_pqg.c | 28 void *t2L1, *t2N1, *t2q, *t2seedlen, *U, *W, *X, *c, *h, *e, *seedinc; in s_dsa_make_params() local 111 err = mp_init_multi(&t2L1, &t2N1, &t2q, &t2seedlen, &U, &W, &X, &c, &h, &e, &seedinc, LTC_NULL); in s_dsa_make_params() 175 if ((err = mp_sub_d(p, 1, e)) != CRYPT_OK) { goto cleanup; } in s_dsa_make_params() 176 if ((err = mp_div(e, q, e, c)) != CRYPT_OK) { goto cleanup; } in s_dsa_make_params() 185 if ((err = mp_exptmod(h, e, p, g)) != CRYPT_OK) { goto cleanup; } in s_dsa_make_params() 190 mp_clear_multi(t2L1, t2N1, t2q, t2seedlen, U, W, X, c, h, e, seedinc, LTC_NULL); in s_dsa_make_params()
|
/optee_os-3.20.0/lib/libmbedtls/core/ |
A D | rsa.c | 102 rsa->E = *(mbedtls_mpi *)key->e; in rsa_init_from_key_pair() 140 if (!s->e) in sw_crypto_acipher_alloc_rsa_keypair() 179 if (!s->e) in sw_crypto_acipher_alloc_rsa_public_key() 186 crypto_bignum_free(s->e); in sw_crypto_acipher_alloc_rsa_public_key() 198 crypto_bignum_free(s->e); in sw_crypto_acipher_free_rsa_public_key() 208 crypto_bignum_free(s->e); in sw_crypto_acipher_free_rsa_keypair() 229 uint32_t e = 0; in sw_crypto_acipher_gen_rsa_key() local 242 e = TEE_U32_FROM_BIG_ENDIAN(e); in sw_crypto_acipher_gen_rsa_key() 244 key_size, (int)e); in sw_crypto_acipher_gen_rsa_key() 291 rsa.E = *(mbedtls_mpi *)key->e; in sw_crypto_acipher_rsanopad_encrypt() [all …]
|
A D | sm2-dsa.c | 34 mbedtls_mpi e = { }; in sm2_mbedtls_dsa_sign() local 45 mbedtls_mpi_init(&e); in sm2_mbedtls_dsa_sign() 82 mbedtls_mpi_read_binary(&e, (unsigned char *)msg, msg_len); in sm2_mbedtls_dsa_sign() 83 mres = mbedtls_mpi_add_mpi(&r, &e, &x1y1p.X); in sm2_mbedtls_dsa_sign() 138 mbedtls_mpi_free(&e); in sm2_mbedtls_dsa_sign()
|
/optee_os-3.20.0/core/mm/ |
A D | tee_mm.c | 227 static inline bool fit_in_gap(tee_mm_pool_t *pool, tee_mm_entry_t *e, in fit_in_gap() argument 231 if (offshi > e->offset || in fit_in_gap() 232 (e->next != NULL && in fit_in_gap() 233 (offslo < e->next->offset + e->next->size)) || in fit_in_gap() 238 if (offslo < (e->offset + e->size) || in fit_in_gap() 239 (e->next != NULL && (offshi > e->next->offset)) || in fit_in_gap()
|
/optee_os-3.20.0/core/arch/arm/plat-synquacer/ |
A D | rng_pta.c | 257 uint8_t *e = NULL; in rng_get_entropy() local 275 e = (uint8_t *)params[0].memref.buffer; in rng_get_entropy() 276 if (!e) in rng_get_entropy() 298 pool_get_entropy(e, pool_size); in rng_get_entropy() 301 pool_get_entropy(e, rq_size); in rng_get_entropy()
|
/optee_os-3.20.0/core/drivers/crypto/se050/core/ |
A D | rsa.c | 158 set_binary_data(key->e, &key_bin.e, &key_bin.e_len); in se050_inject_public_key() 163 free(key_bin.e); in se050_inject_public_key() 205 set_binary_data(key->e, &key_bin.e, &key_bin.e_len); in se050_inject_keypair() 216 free(key_bin.e); in se050_inject_keypair() 521 if (!bn_alloc_max(&s->e)) in do_alloc_keypair() 540 crypto_bignum_free(s->e); in do_alloc_keypair() 556 if (!bn_alloc_max(&s->e)) in do_alloc_publickey() 590 crypto_bignum_free(s->e); in do_free_keypair() 608 uint8_t *e = NULL; in do_gen_keypair() local 651 crypto_bignum_bin2bn(e, e_len, key->e); in do_gen_keypair() [all …]
|
/optee_os-3.20.0/core/drivers/crypto/caam/acipher/ |
A D | caam_rsa.c | 89 crypto_bignum_free(key->e); in do_free_keypair() 106 caam_free_buf(&key->e); in do_keypair_free() 141 crypto_bignum_bn2bin(inkey->e, outkey->e.data); in do_keypub_conv() 142 cache_operation(TEE_CACHECLEAN, outkey->e.data, outkey->e.length); in do_keypub_conv() 361 if (!key->e) in do_allocate_keypair() 425 if (!key->e) in do_allocate_publickey() 438 crypto_bignum_free(key->e); in do_allocate_publickey() 556 retstatus = caam_calloc_buf(&genkey.e, crypto_bignum_num_bytes(key->e)); in do_gen_keypair() 601 crypto_bignum_bn2bin(key->e, genkey.e.data); in do_gen_keypair() 605 prime.e = &genkey.e; in do_gen_keypair() [all …]
|