Home
last modified time | relevance | path

Searched refs:i (Results 1 – 25 of 305) sorted by relevance

12345678910>>...13

/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/gcm/
A Dgcm_gf_mult.c120 for (i = 0; i < 4; i++) { in gcm_gf_mult()
125 for (i = 0; i < 2; i++) { in gcm_gf_mult()
135 for (i = 1; i < (int)WPV; i++) { in gcm_gf_mult()
142 for (i = 0; i < (int)WPV; i++) { in gcm_gf_mult()
143 B[M(3)][i] = B[M(1)][i] ^ B[M(2)][i]; in gcm_gf_mult()
144 B[M(5)][i] = B[M(1)][i] ^ B[M(4)][i]; in gcm_gf_mult()
162 for (i = (BPD/4)-1; i >= 0; i--) { in gcm_gf_mult()
185 for (i = 0; i < 8; i++) { in gcm_gf_mult()
189 for (i = 0; i < 4; i++) { in gcm_gf_mult()
195 for (i = 31; i >= 16; i--) { in gcm_gf_mult()
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pkcs5/
A Dpkcs_5_test.c153 int i, err; in pkcs_5_test()
165 for(i=0; i < (int)(sizeof(cases_5_2) / sizeof(cases_5_2[0])); i++) { in pkcs_5_test()
168 if((err = pkcs_5_alg2((unsigned char*)cases_5_2[i].P, cases_5_2[i].P_len, in pkcs_5_test()
169 (unsigned char*)cases_5_2[i].S, cases_5_2[i].S_len, in pkcs_5_test()
177 … else if (compare_testvector(DK, dkLen, cases_5_2[i].DK, cases_5_2[i].dkLen, "PKCS#5_2", i)) { in pkcs_5_test()
183 for(i=0; i < (int)(sizeof(cases_5_1) / sizeof(case_item)); i++, tested++) { in pkcs_5_test()
185 if((err = pkcs_5_alg1((unsigned char*)cases_5_1[i].P, cases_5_1[i].P_len, in pkcs_5_test()
194 … else if (compare_testvector(DK, dkLen, cases_5_1[i].DK, cases_5_1[i].dkLen, "PKCS#5_1", i)) { in pkcs_5_test()
200 for(i = 0; i < (int)(sizeof(cases_5_1o) / sizeof(cases_5_1o[0])); i++, tested++) { in pkcs_5_test()
202 if ((err = pkcs_5_alg1_openssl((unsigned char*)cases_5_1o[i].P, cases_5_1o[i].P_len, in pkcs_5_test()
[all …]
/optee_os-3.20.0/core/crypto/
A Dsm4.c156 for (i = 0; i < 32; i++) { in sm4_setkey()
157 k[i + 4] = k[i] ^ sm4CalciRK(k[i + 1] ^ k[i + 2] ^ k[i + 3] ^ in sm4_setkey()
176 for (i = 0; i < 32; i++) in sm4_one_round()
199 for (i = 0; i < 16; i++) in sm4_setkey_dec()
226 for (i = 0; i < 16; i++) in sm4_crypt_cbc()
239 for (i = 0; i < 16; i++) in sm4_crypt_cbc()
260 for (i = 0; i < 16; i++) in sm4_crypt_ctr()
263 for (i = 16; i > 0; i--) in sm4_crypt_ctr()
278 for (i = 0; i < 16; i++) { in xts_multi()
291 for (i = 0; i < 16; i++) in xor_128()
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/salsa20/
A Dsalsa20_crypt.c23 int i; in s_salsa20_block() local
25 for (i = rounds; i > 0; i -= 2) { in s_salsa20_block()
35 for (i = 0; i < 16; ++i) { in s_salsa20_block()
36 x[i] += input[i]; in s_salsa20_block()
37 STORE32L(x[i], output + 4 * i); in s_salsa20_block()
52 unsigned long i, j; in salsa20_crypt() local
63 for (i = 0; i < j; ++i, st->ksleft--) out[i] = in[i] ^ st->kstream[64 - st->ksleft]; in salsa20_crypt()
74 for (i = 0; i < inlen; ++i) out[i] = in[i] ^ buf[i]; in salsa20_crypt()
76 for (i = inlen; i < 64; ++i) st->kstream[i] = buf[i]; in salsa20_crypt()
79 for (i = 0; i < 64; ++i) out[i] = in[i] ^ buf[i]; in salsa20_crypt()
/optee_os-3.20.0/core/drivers/imx/dcp/
A Ddcp_utils.c43 unsigned int i = 0; in dcp_left_shift_buffer() local
47 for (i = 0; i < buffer_size; i++) { in dcp_left_shift_buffer()
69 unsigned int i = 0; in dcp_reverse() local
71 for (i = 0; i < size; i++) in dcp_reverse()
72 out[i] = in[size - 1 - i]; in dcp_reverse()
77 unsigned int i = 0; in dcp_xor() local
79 for (i = 0; i < size; i++) in dcp_xor()
80 out[i] = a[i] ^ b[i]; in dcp_xor()
87 for (i = len; i < DCP_AES128_BLOCK_SIZE; i++) { in dcp_cmac_padding()
88 if (i == len) in dcp_cmac_padding()
[all …]
/optee_os-3.20.0/lib/libutils/isoc/newlib/
A Dstr-two-way.h256 while (i < needle_len && (CANON_ELEMENT (needle[i]) in two_way_short_needle()
258 ++i; in two_way_short_needle()
265 --i; in two_way_short_needle()
292 ++i; in two_way_short_needle()
299 --i; in two_way_short_needle()
342 for (i = 0; i < 1U << CHAR_BIT; i++) in two_way_long_needle()
344 for (i = 0; i < needle_len; i++) in two_way_long_needle()
380 ++i; in two_way_long_needle()
387 --i; in two_way_long_needle()
424 ++i; in two_way_long_needle()
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/chacha/
A Dchacha_crypt.c22 int i; in s_chacha_block() local
24 for (i = rounds; i > 0; i -= 2) { in s_chacha_block()
34 for (i = 0; i < 16; ++i) { in s_chacha_block()
35 x[i] += input[i]; in s_chacha_block()
36 STORE32L(x[i], output + 4 * i); in s_chacha_block()
51 unsigned long i, j; in chacha_crypt() local
62 for (i = 0; i < j; ++i, st->ksleft--) out[i] = in[i] ^ st->kstream[64 - st->ksleft]; in chacha_crypt()
79 for (i = 0; i < inlen; ++i) out[i] = in[i] ^ buf[i]; in chacha_crypt()
81 for (i = inlen; i < 64; ++i) st->kstream[i] = buf[i]; in chacha_crypt()
84 for (i = 0; i < 64; ++i) out[i] = in[i] ^ buf[i]; in chacha_crypt()
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ec25519/
A Dtweetnacl.c7 #define FOR(i,n) for (i = 0;i < n;++i) argument
32 FOR(i,n) d |= x[i]^y[i]; in vn()
44 FOR(i,16) r[i]=a[i]; in set25519()
73 FOR(i,16) t[i]=n[i]; in pack25519()
79 for(i=1;i<15;i++) { in pack25519()
119 FOR(i,16) o[i]=a[i]+b[i]; in A()
125 FOR(i,16) o[i]=a[i]-b[i]; in Z()
134 FOR(i,16) o[i]=t[i]; in M()
173 FOR(i,31) z[i]=n[i]; in tweetnacl_crypto_scalarmult()
179 d[i]=a[i]=c[i]=0; in tweetnacl_crypto_scalarmult()
[all …]
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/
A Ddes.c429 for( i = 0; i < 16; i++ ) in mbedtls_des_setkey()
488 for( i = 0; i < 16; i += 2 ) in mbedtls_des_setkey_dec()
506 for( i = 0; i < 32; i += 2 ) in des3_set2key()
560 for( i = 0; i < 32; i += 2 ) in des3_set3key()
619 for( i = 0; i < 8; i++ ) in mbedtls_des_crypt_ecb()
656 for( i = 0; i < 8; i++ ) in mbedtls_des_crypt_cbc()
713 for( i = 0; i < 8; i++ ) in mbedtls_des3_crypt_ecb()
719 for( i = 0; i < 8; i++ ) in mbedtls_des3_crypt_ecb()
725 for( i = 0; i < 8; i++ ) in mbedtls_des3_crypt_ecb()
875 for( i = 0; i < 6; i++ ) in mbedtls_des_self_test()
[all …]
A Dxtea.c58 int i; in mbedtls_xtea_setup() local
62 for( i = 0; i < 4; i++ ) in mbedtls_xtea_setup()
64 ctx->k[i] = MBEDTLS_GET_UINT32_BE( key, i << 2 ); in mbedtls_xtea_setup()
85 for( i = 0; i < 32; i++ ) in mbedtls_xtea_crypt_ecb()
96 for( i = 0; i < 32; i++ ) in mbedtls_xtea_crypt_ecb()
118 int i; in mbedtls_xtea_crypt_cbc() local
131 for( i = 0; i < 8; i++ ) in mbedtls_xtea_crypt_cbc()
132 output[i] = (unsigned char)( output[i] ^ iv[i] ); in mbedtls_xtea_crypt_cbc()
145 for( i = 0; i < 8; i++ ) in mbedtls_xtea_crypt_cbc()
146 output[i] = (unsigned char)( input[i] ^ iv[i] ); in mbedtls_xtea_crypt_cbc()
[all …]
A Dgcm.c113 for( i = 4; i > 0; i >>= 1 ) in gcm_gen_table()
123 for( i = 2; i <= 8; i *= 2 ) in gcm_gen_table()
218 for( i = 15; i >= 0; i-- ) in gcm_mult()
298 for( i = 0; i < use_len; i++ ) in mbedtls_gcm_starts()
307 for( i = 0; i < 16; i++ ) in mbedtls_gcm_starts()
325 for( i = 0; i < use_len; i++ ) in mbedtls_gcm_starts()
371 for( i = 16; i > 12; i-- ) in mbedtls_gcm_update()
381 for( i = 0; i < use_len; i++ ) in mbedtls_gcm_update()
385 out_p[i] = ectr[i] ^ p[i]; in mbedtls_gcm_update()
429 for( i = 0; i < 16; i++ ) in mbedtls_gcm_finish()
[all …]
A Darc4.c64 int i, j, a; in mbedtls_arc4_setup() local
72 for( i = 0; i < 256; i++ ) in mbedtls_arc4_setup()
73 m[i] = (unsigned char) i; in mbedtls_arc4_setup()
77 for( i = 0; i < 256; i++, k++ ) in mbedtls_arc4_setup()
81 a = m[i]; in mbedtls_arc4_setup()
83 m[i] = m[j]; in mbedtls_arc4_setup()
95 size_t i; in mbedtls_arc4_crypt() local
102 for( i = 0; i < length; i++ ) in mbedtls_arc4_crypt()
110 output[i] = (unsigned char) in mbedtls_arc4_crypt()
154 int i, ret = 0; in mbedtls_arc4_self_test() local
[all …]
A Daria.c402 for( i = 0; i < 4; i++ ) in aria_rot128()
458 i = i < 2 ? i + 1 : 0; in mbedtls_aria_setkey_enc()
460 i = i < 2 ? i + 1 : 0; in mbedtls_aria_setkey_enc()
494 for( i = 0, j = ctx->nr; i < j; i++, j-- ) in mbedtls_aria_setkey_dec()
505 for( i = 1; i < ctx->nr; i++ ) in mbedtls_aria_setkey_dec()
618 for( i = 0; i < MBEDTLS_ARIA_BLOCKSIZE; i++ ) in mbedtls_aria_crypt_cbc()
632 for( i = 0; i < MBEDTLS_ARIA_BLOCKSIZE; i++ ) in mbedtls_aria_crypt_cbc()
933 for( i = 0; i < 3; i++ ) in mbedtls_aria_self_test()
958 for( i = 0; i < 3; i++ ) in mbedtls_aria_self_test()
988 for( i = 0; i < 3; i++ ) in mbedtls_aria_self_test()
[all …]
A Dmd2.c119 int i, j; in mbedtls_internal_md2_process() local
122 for( i = 0; i < 16; i++ ) in mbedtls_internal_md2_process()
124 ctx->state[i + 16] = ctx->buffer[i]; in mbedtls_internal_md2_process()
126 (unsigned char)( ctx->buffer[i] ^ ctx->state[i]); in mbedtls_internal_md2_process()
129 for( i = 0; i < 18; i++ ) in mbedtls_internal_md2_process()
143 for( i = 0; i < 16; i++ ) in mbedtls_internal_md2_process()
146 ( ctx->cksum[i] ^ PI_SUBST[ctx->buffer[i] ^ t] ); in mbedtls_internal_md2_process()
214 size_t i; in mbedtls_md2_finish_ret() local
219 for( i = ctx->left; i < 16; i++ ) in mbedtls_md2_finish_ret()
324 int i, ret = 0; in mbedtls_md2_self_test() local
[all …]
A Dcamellia.c344 for( i = 0; i < keybits / 8; ++i ) in mbedtls_camellia_setkey_enc()
348 for( i = 0; i < 8; i++ ) in mbedtls_camellia_setkey_enc()
355 for( i = 0; i < 6; i++ ) { in mbedtls_camellia_setkey_enc()
367 for( i = 0; i < 8; i++ ) in mbedtls_camellia_setkey_enc()
371 for( i = 0; i < 4; ++i ) in mbedtls_camellia_setkey_enc()
377 for( i = 0; i < 4; ++i ) in mbedtls_camellia_setkey_enc()
385 for( i = 0; i < 4; ++i ) in mbedtls_camellia_setkey_enc()
413 for( i = 0; i < 20; i++ ) { in mbedtls_camellia_setkey_enc()
570 for( i = 0; i < 16; i++ ) in mbedtls_camellia_crypt_cbc()
584 for( i = 0; i < 16; i++ ) in mbedtls_camellia_crypt_cbc()
[all …]
A Dchacha20.c143 for( i = 0U; i < 10U; i++ ) in chacha20_block()
163 for( i = 0U; i < 16; i++ ) in chacha20_block()
270 for( i = 0U; i < 64U; i += 8U ) in mbedtls_chacha20_update()
272 output[offset + i ] = input[offset + i ] ^ ctx->keystream8[i ]; in mbedtls_chacha20_update()
273 output[offset + i+1] = input[offset + i+1] ^ ctx->keystream8[i+1]; in mbedtls_chacha20_update()
274 output[offset + i+2] = input[offset + i+2] ^ ctx->keystream8[i+2]; in mbedtls_chacha20_update()
275 output[offset + i+3] = input[offset + i+3] ^ ctx->keystream8[i+3]; in mbedtls_chacha20_update()
276 output[offset + i+4] = input[offset + i+4] ^ ctx->keystream8[i+4]; in mbedtls_chacha20_update()
293 for( i = 0U; i < size; i++) in mbedtls_chacha20_update()
295 output[offset + i] = input[offset + i] ^ ctx->keystream8[i]; in mbedtls_chacha20_update()
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/
A Didea.c57 for (i = 0; i < 15; i++) { in s_mul_inv()
76 for (i = 0; i < 8; i++) { in s_setup_key()
77 LOAD16(e_key[i], key + 2 * i); in s_setup_key()
79 for (; i < LTC_IDEA_KEYLEN; i++) { in s_setup_key()
80 j = (i - i % 8) - 8; in s_setup_key()
81 e_key[i] = LOW16((e_key[j+(i+1)%8] << 9) | (e_key[j+(i+2)%8] >> 7)); in s_setup_key()
85 for (i = 0; i < LTC_IDEA_ROUNDS; i++) { in s_setup_key()
87 d_key[i*6+1] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+1+(i>0 ? 1 : 0)]); in s_setup_key()
88 d_key[i*6+2] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+2-(i>0 ? 1 : 0)]); in s_setup_key()
103 int i; in s_process_block() local
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/
A Dsha1.c48 for (i = 0; i < 16; i++) { in ss_sha1_compress()
49 LOAD32H(W[i], buf + (4*i)); in ss_sha1_compress()
60 for (i = 16; i < 80; i++) { in ss_sha1_compress()
61 W[i] = ROL(W[i-3] ^ W[i-8] ^ W[i-14] ^ W[i-16], 1); in ss_sha1_compress()
73 for (i = 0; i < 20; ) { in ss_sha1_compress()
91 for (i = 0; i < 20; ) { in ss_sha1_compress()
187 int i; in sha1_done() local
224 for (i = 0; i < 5; i++) { in sha1_done()
225 STORE32H(md->sha1.state[i], out+(4*i)); in sha1_done()
258 int i; in sha1_test()
[all …]
A Dblake2b.c174 for (i = 0; i < 8; ++i) { in s_blake2b_init0()
187 for (i = 0; i < 8; ++i) { in s_blake2b_init_param()
311 for (i = 0; i < 16; ++i) { in ss_blake2b_compress()
312 LOAD64L(m[i], buf + i * sizeof(m[i])); in ss_blake2b_compress()
315 for (i = 0; i < 8; ++i) { in ss_blake2b_compress()
341 for (i = 0; i < 8; ++i) { in ss_blake2b_compress()
342 md->blake2b.h[i] = md->blake2b.h[i] ^ v[i] ^ v[i + 8]; in ss_blake2b_compress()
475 for (i = 0; tests[i].msg != NULL; i++) { in blake2b_512_test()
522 for (i = 0; tests[i].msg != NULL; i++) { in blake2b_384_test()
575 for (i = 0; tests[i].msg != NULL; i++) { in blake2b_256_test()
[all …]
A Dblake2s.c166 for (i = 0; i < 8; ++i) { in s_blake2s_init0()
181 for (i = 0; i < 8; ++i) { in s_blake2s_init_param()
303 for (i = 0; i < 16; ++i) { in ss_blake2s_compress()
304 LOAD32L(m[i], buf + i * sizeof(m[i])); in ss_blake2s_compress()
307 for (i = 0; i < 8; ++i) { in ss_blake2s_compress()
331 for (i = 0; i < 8; ++i) { in ss_blake2s_compress()
332 md->blake2s.h[i] = md->blake2s.h[i] ^ v[i] ^ v[i + 8]; in ss_blake2s_compress()
465 for (i = 0; tests[i].msg != NULL; i++) { in blake2s_256_test()
509 for (i = 0; tests[i].msg != NULL; i++) { in blake2s_224_test()
551 for (i = 0; tests[i].msg != NULL; i++) { in blake2s_160_test()
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/hkdf/
A Dhkdf_test.c33 int i; in hkdf_test()
254 for(i=0; i < (int)(sizeof(cases) / sizeof(cases[0])); i++) { in hkdf_test()
255 int hash = find_hash(cases[i].Hash); in hkdf_test()
258 if((err = hkdf(hash, cases[i].salt, cases[i].salt_l, in hkdf_test()
259 cases[i].info, cases[i].info_l, in hkdf_test()
260 cases[i].IKM, cases[i].IKM_l, in hkdf_test()
261 OKM, cases[i].OKM_l)) != CRYPT_OK) { in hkdf_test()
263 printf("LTC_HKDF-%s test #%d, %s\n", cases[i].Hash, i, error_to_string(err)); in hkdf_test()
268 …if(compare_testvector(OKM, cases[i].OKM_l, cases[i].OKM, (size_t)cases[i].OKM_l, "HKDF", cases[i].… in hkdf_test()
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/sha2/
A Dsha512.c95 for (i = 0; i < 8; i++) { in ss_sha512_compress()
96 S[i] = md->sha512.state[i]; in ss_sha512_compress()
100 for (i = 0; i < 16; i++) { in ss_sha512_compress()
101 LOAD64H(W[i], buf + (8*i)); in ss_sha512_compress()
105 for (i = 16; i < 80; i++) { in ss_sha512_compress()
106 W[i] = Gamma1(W[i - 2]) + W[i - 7] + Gamma0(W[i - 15]) + W[i - 16]; in ss_sha512_compress()
111 for (i = 0; i < 80; i++) { in ss_sha512_compress()
130 for (i = 0; i < 80; i += 8) { in ss_sha512_compress()
144 for (i = 0; i < 8; i++) { in ss_sha512_compress()
145 md->sha512.state[i] = md->sha512.state[i] + S[i]; in ss_sha512_compress()
[all …]
/optee_os-3.20.0/core/drivers/clk/sam/
A Dat91_pmc.c25 for (i = 0; i < nclk; i++) { in pmc_clk_get_by_id()
26 if (clks[i].clk && clks[i].id == id) in pmc_clk_get_by_id()
38 for (i = 0; i < nclk; i++) in pmc_clk_get_by_name()
152 int i = 0; in pmc_register_id() local
154 for (i = 0; i < PMC_MAX_IDS; i++) { in pmc_register_id()
172 int i = 0; in pmc_register_pck() local
174 for (i = 0; i < PMC_MAX_PCKS; i++) { in pmc_register_pck()
203 for (i = 0; registered_ids[i]; i++) { in pmc_suspend()
209 for (i = 0; registered_pcks[i]; i++) { in pmc_suspend()
248 for (i = 0; registered_ids[i]; i++) { in pmc_resume()
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/pkcs1/
A Dpkcs_1_v1_5_decode.c32 unsigned long modulus_len, ps_len, i; in pkcs_1_v1_5_decode() local
55 for (i = 2; i < modulus_len; i++) { in pkcs_1_v1_5_decode()
57 if (msg[i] == 0x00) { break; } in pkcs_1_v1_5_decode()
59 ps_len = i++ - 2; in pkcs_1_v1_5_decode()
61 if (i >= modulus_len) { in pkcs_1_v1_5_decode()
67 for (i = 2; i < modulus_len - 1; i++) { in pkcs_1_v1_5_decode()
68 if (msg[i] != 0xFF) { break; } in pkcs_1_v1_5_decode()
72 if (msg[i] != 0) { in pkcs_1_v1_5_decode()
77 ps_len = i - 2; in pkcs_1_v1_5_decode()
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/asn1/oid/
A Dpk_oid_str.c8 unsigned long i, j, limit, oid_j; in pk_oid_str_to_num() local
15 for (i = 0; i < limit; i++) oid[i] = 0; in pk_oid_str_to_num()
22 for (i = 0, j = 0; i < OID_len; i++) { in pk_oid_str_to_num()
23 if (OID[i] == '.') { in pk_oid_str_to_num()
26 else if ((OID[i] >= '0') && (OID[i] <= '9')) { in pk_oid_str_to_num()
29 oid[j] = oid[j] * 10 + (OID[i] - '0'); in pk_oid_str_to_num()
47 int i; in pk_oid_num_to_str() local
55 for (i = oidlen - 1, k = 0; i >= 0; i--) { in pk_oid_num_to_str()
56 j = oid[i]; in pk_oid_num_to_str()
68 if (i > 0) { in pk_oid_num_to_str()

Completed in 103 milliseconds

12345678910>>...13