/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/chacha/ |
A D | chacha_setup.c | 34 LOAD32L(st->input[4], key + 0); in chacha_setup() 35 LOAD32L(st->input[5], key + 4); in chacha_setup() 36 LOAD32L(st->input[6], key + 8); in chacha_setup() 37 LOAD32L(st->input[7], key + 12); in chacha_setup() 44 LOAD32L(st->input[8], key + 0); in chacha_setup() 45 LOAD32L(st->input[9], key + 4); in chacha_setup() 46 LOAD32L(st->input[10], key + 8); in chacha_setup() 47 LOAD32L(st->input[11], key + 12); in chacha_setup() 48 LOAD32L(st->input[0], constants + 0); in chacha_setup() 49 LOAD32L(st->input[1], constants + 4); in chacha_setup() [all …]
|
A D | chacha_ivctr32.c | 28 st->input[12] = counter; in chacha_ivctr32() 29 LOAD32L(st->input[13], iv + 0); in chacha_ivctr32() 30 LOAD32L(st->input[14], iv + 4); in chacha_ivctr32() 31 LOAD32L(st->input[15], iv + 8); in chacha_ivctr32()
|
A D | chacha_ivctr64.c | 28 st->input[12] = (ulong32)(counter & 0xFFFFFFFF); in chacha_ivctr64() 29 st->input[13] = (ulong32)(counter >> 32); in chacha_ivctr64() 30 LOAD32L(st->input[14], iv + 0); in chacha_ivctr64() 31 LOAD32L(st->input[15], iv + 4); in chacha_ivctr64()
|
A D | chacha_crypt.c | 19 static void s_chacha_block(unsigned char *output, const ulong32 *input, int rounds) in s_chacha_block() argument 23 XMEMCPY(x, input, sizeof(x)); in s_chacha_block() 35 x[i] += input[i]; in s_chacha_block() 69 s_chacha_block(buf, st->input, st->rounds); in chacha_crypt() 72 if (0 == ++st->input[12] && 0 == ++st->input[13]) return CRYPT_OVERFLOW; in chacha_crypt() 76 if (0 == ++st->input[12]) return CRYPT_OVERFLOW; in chacha_crypt()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/salsa20/ |
A D | salsa20_setup.c | 36 LOAD32L(st->input[1], key + 0); in salsa20_setup() 37 LOAD32L(st->input[2], key + 4); in salsa20_setup() 38 LOAD32L(st->input[3], key + 8); in salsa20_setup() 39 LOAD32L(st->input[4], key + 12); in salsa20_setup() 46 LOAD32L(st->input[11], key + 0); in salsa20_setup() 47 LOAD32L(st->input[12], key + 4); in salsa20_setup() 48 LOAD32L(st->input[13], key + 8); in salsa20_setup() 49 LOAD32L(st->input[14], key + 12); in salsa20_setup() 50 LOAD32L(st->input[ 0], constants + 0); in salsa20_setup() 51 LOAD32L(st->input[ 5], constants + 4); in salsa20_setup() [all …]
|
A D | xsalsa20_setup.c | 98 LOAD32L(st->input[ 0], constants + 0); in xsalsa20_setup() 102 LOAD32L(st->input[ 1], subkey + 0); in xsalsa20_setup() 103 LOAD32L(st->input[ 2], subkey + 4); in xsalsa20_setup() 104 LOAD32L(st->input[ 3], subkey + 8); in xsalsa20_setup() 105 LOAD32L(st->input[ 4], subkey + 12); in xsalsa20_setup() 106 LOAD32L(st->input[11], subkey + 16); in xsalsa20_setup() 107 LOAD32L(st->input[12], subkey + 20); in xsalsa20_setup() 108 LOAD32L(st->input[13], subkey + 24); in xsalsa20_setup() 109 LOAD32L(st->input[14], subkey + 28); in xsalsa20_setup() 112 st->input[ 8] = 0; in xsalsa20_setup() [all …]
|
A D | salsa20_ivctr64.c | 29 LOAD32L(st->input[6], iv + 0); in salsa20_ivctr64() 30 LOAD32L(st->input[7], iv + 4); in salsa20_ivctr64() 31 st->input[8] = (ulong32)(counter & 0xFFFFFFFF); in salsa20_ivctr64() 32 st->input[9] = (ulong32)(counter >> 32); in salsa20_ivctr64()
|
A D | salsa20_crypt.c | 20 static void s_salsa20_block(unsigned char *output, const ulong32 *input, int rounds) in s_salsa20_block() argument 24 XMEMCPY(x, input, sizeof(x)); in s_salsa20_block() 36 x[i] += input[i]; in s_salsa20_block() 70 s_salsa20_block(buf, st->input, st->rounds); in salsa20_crypt() 72 if (0 == ++st->input[8] && 0 == ++st->input[9]) return CRYPT_OVERFLOW; in salsa20_crypt()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/ |
A D | adler32.c | 27 LTC_ARGCHKVD(input != NULL); in adler32_update() 33 s1 += *input++; in adler32_update() 45 s1 += input[0]; in adler32_update() 47 s1 += input[1]; in adler32_update() 49 s1 += input[2]; in adler32_update() 51 s1 += input[3]; in adler32_update() 53 s1 += input[4]; in adler32_update() 55 s1 += input[5]; in adler32_update() 57 s1 += input[6]; in adler32_update() 59 s1 += input[7]; in adler32_update() [all …]
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | aes.h | 271 const unsigned char input[16], 321 const unsigned char *input, 366 const unsigned char *input, 416 const unsigned char *input, 460 const unsigned char *input, 515 const unsigned char *input, 599 const unsigned char *input, 616 const unsigned char input[16], 632 const unsigned char input[16], 652 const unsigned char input[16], [all …]
|
A D | cipher_internal.h | 53 const unsigned char *input, unsigned char *output ); 58 unsigned char *iv, const unsigned char *input, 65 unsigned char *iv, const unsigned char *input, 73 const unsigned char *input, 81 const unsigned char *input, unsigned char *output ); 88 const unsigned char *input, unsigned char *output ); 94 const unsigned char *input, unsigned char *output );
|
A D | camellia.h | 141 const unsigned char input[16], 177 const unsigned char *input, 224 const unsigned char *input, 308 const unsigned char *input,
|
A D | blowfish.h | 130 const unsigned char input[MBEDTLS_BLOWFISH_BLOCKSIZE], 166 const unsigned char *input, 207 const unsigned char *input, 280 const unsigned char *input,
|
A D | md2.h | 138 const unsigned char *input, 206 const unsigned char *input, 254 int mbedtls_md2_ret( const unsigned char *input, 278 MBEDTLS_DEPRECATED void mbedtls_md2( const unsigned char *input,
|
A D | md4.h | 137 const unsigned char *input, 207 const unsigned char *input, 259 int mbedtls_md4_ret( const unsigned char *input, 283 MBEDTLS_DEPRECATED void mbedtls_md4( const unsigned char *input,
|
/optee_os-3.20.0/core/crypto/ |
A D | sm4.c | 171 GET_UINT32_BE(ulbuf[0], input, 0); in sm4_one_round() 210 input += 16; in sm4_crypt_ecb() 230 input += 16; in sm4_crypt_cbc() 237 memcpy(temp, input, 16); in sm4_crypt_cbc() 242 input += 16; in sm4_crypt_cbc() 266 input += 16; in sm4_crypt_ctr() 312 xor_128(input, tweak, ct); in sm4_crypt_xts() 322 input += 16; in sm4_crypt_xts() 330 ct[i] = input[i]; in sm4_crypt_xts() 339 xor_128(input, tweak1, ct); in sm4_crypt_xts() [all …]
|
A D | sm3.h | 27 void sm3_update(struct sm3_context *ctx, const uint8_t *input, size_t ilen); 29 void sm3(const uint8_t *input, size_t ilen, uint8_t output[32]); 32 void sm3_hmac_update(struct sm3_context *ctx, const uint8_t *input, 35 void sm3_hmac(const uint8_t *key, size_t keylen, const uint8_t *input,
|
A D | sm4.h | 21 void sm4_crypt_ecb(struct sm4_context *ctx, size_t length, const uint8_t *input, 24 const uint8_t *input, uint8_t *output); 26 const uint8_t *input, uint8_t *output); 29 const uint8_t *input, uint8_t *output);
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | cipher.c | 593 if( input == output && in mbedtls_cipher_update() 642 input += copy_len; in mbedtls_cipher_update() 693 input, output ) ) ) in mbedtls_cipher_update() 795 if( NULL == input || NULL == data_len ) in get_pkcs_padding() 798 padding_len = input[input_len - 1]; in get_pkcs_padding() 836 if( NULL == input || NULL == data_len ) in get_one_and_zeros_padding() 844 done |= ( input[i - 1] != 0 ); in get_one_and_zeros_padding() 875 if( NULL == input || NULL == data_len ) in get_zeros_and_len_padding() 878 padding_len = input[input_len - 1]; in get_zeros_and_len_padding() 920 done |= ( input[i-1] != 0 ); in get_zeros_padding() [all …]
|
A D | xtea.c | 72 const unsigned char input[8], unsigned char output[8]) in mbedtls_xtea_crypt_ecb() 78 v0 = MBEDTLS_GET_UINT32_BE( input, 0 ); in mbedtls_xtea_crypt_ecb() 79 v1 = MBEDTLS_GET_UINT32_BE( input, 4 ); in mbedtls_xtea_crypt_ecb() 115 unsigned char iv[8], const unsigned char *input, in mbedtls_xtea_crypt_cbc() argument 128 memcpy( temp, input, 8 ); in mbedtls_xtea_crypt_cbc() 129 mbedtls_xtea_crypt_ecb( ctx, mode, input, output ); in mbedtls_xtea_crypt_cbc() 136 input += 8; in mbedtls_xtea_crypt_cbc() 146 output[i] = (unsigned char)( input[i] ^ iv[i] ); in mbedtls_xtea_crypt_cbc() 151 input += 8; in mbedtls_xtea_crypt_cbc()
|
A D | blowfish.c | 219 BLOWFISH_VALIDATE_RET( input != NULL ); in mbedtls_blowfish_crypt_ecb() 222 X0 = MBEDTLS_GET_UINT32_BE( input, 0 ); in mbedtls_blowfish_crypt_ecb() 223 X1 = MBEDTLS_GET_UINT32_BE( input, 4 ); in mbedtls_blowfish_crypt_ecb() 248 const unsigned char *input, in mbedtls_blowfish_crypt_cbc() argument 257 BLOWFISH_VALIDATE_RET( length == 0 || input != NULL ); in mbedtls_blowfish_crypt_cbc() 275 input += MBEDTLS_BLOWFISH_BLOCKSIZE; in mbedtls_blowfish_crypt_cbc() 290 input += MBEDTLS_BLOWFISH_BLOCKSIZE; in mbedtls_blowfish_crypt_cbc() 309 const unsigned char *input, in mbedtls_blowfish_crypt_cfb64() argument 334 c = *input++; in mbedtls_blowfish_crypt_cfb64() 369 const unsigned char *input, in mbedtls_blowfish_crypt_ctr() argument [all …]
|
A D | padlock.c | 76 const unsigned char input[16], in mbedtls_padlock_xcryptecb() 87 memcpy( blk, input, 16 ); in mbedtls_padlock_xcryptecb() 118 const unsigned char *input, in mbedtls_padlock_xcryptcbc() argument 128 if( ( (long) input & 15 ) != 0 || in mbedtls_padlock_xcryptcbc() 154 "m" (rk), "m" (input), "m" (output), "m" (iw) in mbedtls_padlock_xcryptcbc()
|
A D | md2.c | 168 const unsigned char *input, in mbedtls_md2_update_ret() argument 181 memcpy( ctx->buffer + ctx->left, input, fill ); in mbedtls_md2_update_ret() 184 input += fill; in mbedtls_md2_update_ret() 200 const unsigned char *input, in mbedtls_md2_update() argument 203 mbedtls_md2_update_ret( ctx, input, ilen ); in mbedtls_md2_update() 247 int mbedtls_md2_ret( const unsigned char *input, in mbedtls_md2_ret() argument 259 if( ( ret = mbedtls_md2_update_ret( &ctx, input, ilen ) ) != 0 ) in mbedtls_md2_ret() 272 void mbedtls_md2( const unsigned char *input, in mbedtls_md2() argument 276 mbedtls_md2_ret( input, ilen, output ); in mbedtls_md2()
|
A D | chacha20.c | 242 const unsigned char *input, in mbedtls_chacha20_update() argument 249 CHACHA20_VALIDATE_RET( size == 0 || input != NULL ); in mbedtls_chacha20_update() 255 output[offset] = input[offset] in mbedtls_chacha20_update() 272 output[offset + i ] = input[offset + i ] ^ ctx->keystream8[i ]; in mbedtls_chacha20_update() 273 output[offset + i+1] = input[offset + i+1] ^ ctx->keystream8[i+1]; in mbedtls_chacha20_update() 274 output[offset + i+2] = input[offset + i+2] ^ ctx->keystream8[i+2]; in mbedtls_chacha20_update() 275 output[offset + i+3] = input[offset + i+3] ^ ctx->keystream8[i+3]; in mbedtls_chacha20_update() 295 output[offset + i] = input[offset + i] ^ ctx->keystream8[i]; in mbedtls_chacha20_update() 309 const unsigned char* input, in mbedtls_chacha20_crypt() argument 317 CHACHA20_VALIDATE_RET( data_len == 0 || input != NULL ); in mbedtls_chacha20_crypt() [all …]
|
A D | cipher_wrap.c | 140 const unsigned char *input, unsigned char *output ) in aes_crypt_ecb_wrap() argument 157 const unsigned char *input, unsigned char *output ) in aes_crypt_cfb128_wrap() argument 160 input, output ); in aes_crypt_cfb128_wrap() 169 iv, input, output ); in aes_crypt_ofb_wrap() 176 const unsigned char *input, unsigned char *output ) in aes_crypt_ctr_wrap() argument 179 stream_block, input, output ); in aes_crypt_ctr_wrap() 187 const unsigned char *input, in aes_crypt_xts_wrap() argument 689 input, output ); in camellia_crypt_cbc_wrap() 1073 input, output ); in aria_crypt_cbc_wrap() 1733 input, output ); in blowfish_crypt_cbc_wrap() [all …]
|