/optee_os-3.20.0/core/arch/arm/crypto/ |
A D | aes_armv8a_ce.h | 15 int rounds, int blocks, int first); 17 int rounds, int blocks, int first); 19 int rounds, int blocks, uint8_t iv[]); 21 int rounds, int blocks, uint8_t iv[]); 23 int rounds, int blocks, uint8_t ctr[], int first); 25 int rounds, int blocks, uint8_t const rk2[], 28 int rounds, int blocks, uint8_t const rk2[],
|
A D | aes-gcm-ce.c | 53 enc_key->rounds, state->ctr, k); in internal_aes_gcm_set_key() 110 (const uint8_t *)ek->data, ek->rounds, in encrypt_pl() 126 ek->rounds, 1, (uint8_t *)state->ctr, 1); in decrypt_pl() 157 pmull_gcm_load_round_keys(ek->data, ek->rounds); in update_payload_2block() 159 (uint8_t *)state->ctr, ek->rounds); in update_payload_2block() 162 state->ctr, NULL, ek->rounds, ks); in update_payload_2block() 167 state->ctr, ek->data, ek->rounds); in update_payload_2block()
|
A D | aes_modes_armv8a_ce_a64.S | 15 .macro load_round_keys, rounds, rk 16 cmp \rounds, #12 27 .macro enc_prepare, rounds, rk, ignore 28 load_round_keys \rounds, \rk 33 load_round_keys \rounds, \rk 38 load_round_keys \rounds, \rk 87 cmp \rounds, #12 101 do_block_Nx e, \rounds, \in 105 do_block_Nx e, \rounds, \i0, \i1 113 do_block_Nx d, \rounds, \in [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | aes.c | 15 unsigned int *rounds) in crypto_aes_expand_enc_key() argument 19 enc_keylen, rounds); in crypto_aes_expand_enc_key() 30 *rounds = skey.rijndael.Nr; in crypto_aes_expand_enc_key() 36 unsigned int rounds, const void *src, void *dst) in crypto_aes_enc_block() argument 39 crypto_accel_aes_ecb_enc(dst, src, enc_key, rounds, 1); in crypto_aes_enc_block() 45 skey.rijndael.Nr = rounds; in crypto_aes_enc_block()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/salsa20/ |
A D | salsa20_setup.c | 25 int salsa20_setup(salsa20_state *st, const unsigned char *key, unsigned long keylen, int rounds) in salsa20_setup() argument 33 if (rounds == 0) rounds = 20; in salsa20_setup() 34 LTC_ARGCHK(rounds % 2 == 0); /* number of rounds must be evenly divisible by 2 */ in salsa20_setup() 54 st->rounds = rounds; /* default is 20 for salsa20 */ in salsa20_setup()
|
A D | xsalsa20_setup.c | 24 static void s_xsalsa20_doubleround(ulong32 *x, int rounds) in s_xsalsa20_doubleround() argument 28 for (i = rounds; i > 0; i -= 2) { in s_xsalsa20_doubleround() 56 int rounds) in xsalsa20_setup() argument 68 if (rounds == 0) rounds = 20; in xsalsa20_setup() 69 LTC_ARGCHK(rounds % 2 == 0); /* number of rounds must be evenly divisible by 2 */ in xsalsa20_setup() 90 s_xsalsa20_doubleround(x, rounds); in xsalsa20_setup() 114 st->rounds = rounds; in xsalsa20_setup()
|
A D | salsa20_test.c | 33 int rounds; in salsa20_test() 39 rounds = 12; in salsa20_test() 40 …if ((err = salsa20_setup(&st, k, sizeof(k), rounds)) != CRYPT_OK) return er… in salsa20_test() 50 rounds = 20; in salsa20_test() 51 if ((err = salsa20_setup(&st, k, sizeof(k), rounds)) != CRYPT_OK) return err; in salsa20_test() 57 if ((err = salsa20_memory(k, sizeof(k), rounds, n, sizeof(n), counter, in salsa20_test()
|
A D | xsalsa20_test.c | 39 int rounds = 20; in xsalsa20_test() 45 if ((err = xsalsa20_setup(&st, key, 32, nonce, 24, rounds)) != CRYPT_OK) return err; in xsalsa20_test() 49 if ((err = xsalsa20_setup(&st, key, 32, nonce, 24, rounds)) != CRYPT_OK) return err; in xsalsa20_test() 70 int rounds = 20; in xsalsa20_test() 77 if ((err = xsalsa20_setup(&st, key, 32, nonce, 24, rounds)) != CRYPT_OK) return err; in xsalsa20_test()
|
A D | xsalsa20_memory.c | 20 int xsalsa20_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds, in xsalsa20_memory() argument 27 if ((err = xsalsa20_setup(&st, key, keylen, nonce, noncelen, rounds)) != CRYPT_OK) goto WIPE_KEY; in xsalsa20_memory()
|
A D | salsa20_memory.c | 20 int salsa20_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds, in salsa20_memory() argument 27 if ((err = salsa20_setup(&st, key, keylen, rounds)) != CRYPT_OK) goto WIPE_KEY; in salsa20_memory()
|
A D | salsa20_crypt.c | 20 static void s_salsa20_block(unsigned char *output, const ulong32 *input, int rounds) in s_salsa20_block() argument 25 for (i = rounds; i > 0; i -= 2) { in s_salsa20_block() 70 s_salsa20_block(buf, st->input, st->rounds); in salsa20_crypt()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/safer/ |
A D | saferp.c | 221 static const int rounds[3] = { 8, 12, 16 }; in saferp_setup() local 266 skey->saferp.rounds = 8; in saferp_setup() 293 skey->saferp.rounds = 12; in saferp_setup() 320 skey->saferp.rounds = 16; in saferp_setup() 344 if (skey->saferp.rounds < 8 || skey->saferp.rounds > 16) { in saferp_ecb_encrypt() 361 if (skey->saferp.rounds > 8) { in saferp_ecb_encrypt() 368 if (skey->saferp.rounds > 12) { in saferp_ecb_encrypt() 374 ct[0] = b[0] ^ skey->saferp.K[skey->saferp.rounds*2][0]; in saferp_ecb_encrypt() 412 if (skey->saferp.rounds < 8 || skey->saferp.rounds > 16) { in saferp_ecb_decrypt() 434 if (skey->saferp.rounds > 12) { in saferp_ecb_decrypt() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/chacha/ |
A D | chacha_setup.c | 24 int chacha_setup(chacha_state *st, const unsigned char *key, unsigned long keylen, int rounds) in chacha_setup() argument 32 if (rounds == 0) rounds = 20; in chacha_setup() 52 st->rounds = rounds; /* e.g. 20 for chacha20 */ in chacha_setup()
|
A D | chacha_memory.c | 20 int chacha_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds, in chacha_memory() argument 29 if ((err = chacha_setup(&st, key, keylen, rounds)) != CRYPT_OK) goto WIPE_KEY; in chacha_memory()
|
A D | chacha_crypt.c | 19 static void s_chacha_block(unsigned char *output, const ulong32 *input, int rounds) in s_chacha_block() argument 24 for (i = rounds; i > 0; i -= 2) { in s_chacha_block() 69 s_chacha_block(buf, st->input, st->rounds); in chacha_crypt()
|
/optee_os-3.20.0/lib/libmbedtls/core/ |
A D | aes.c | 18 unsigned int *rounds) in crypto_aes_expand_enc_key() argument 22 enc_keylen, rounds); in crypto_aes_expand_enc_key() 34 *rounds = ctx.nr; in crypto_aes_expand_enc_key() 41 unsigned int rounds, const void *src, void *dst) in crypto_aes_enc_block() argument 44 crypto_accel_aes_ecb_enc(dst, src, enc_key, rounds, 1); in crypto_aes_enc_block() 54 ctx.nr = rounds; in crypto_aes_enc_block()
|
/optee_os-3.20.0/core/arch/arm/include/crypto/ |
A D | ghash-ce-core.h | 25 void pmull_gcm_load_round_keys(const uint64_t rk[30], int rounds); 30 uint64_t ctr[], const uint64_t rk[], int rounds, 37 uint64_t ctr[], const uint64_t rk[], int rounds); 41 void pmull_gcm_encrypt_block(uint8_t dst[], const uint8_t src[], int rounds);
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/ |
A D | rc5.c | 70 skey->rc5.rounds = num_rounds; in s_rc5_setup() 133 if (skey->rc5.rounds < 12 || skey->rc5.rounds > 24) { in s_rc5_ecb_encrypt() 143 if ((skey->rc5.rounds & 1) == 0) { in s_rc5_ecb_encrypt() 144 for (r = 0; r < skey->rc5.rounds; r += 2) { in s_rc5_ecb_encrypt() 152 for (r = 0; r < skey->rc5.rounds; r++) { in s_rc5_ecb_encrypt() 193 if (skey->rc5.rounds < 12 || skey->rc5.rounds > 24) { in s_rc5_ecb_decrypt() 199 K = skey->rc5.K + (skey->rc5.rounds << 1); in s_rc5_ecb_decrypt() 201 if ((skey->rc5.rounds & 1) == 0) { in s_rc5_ecb_decrypt() 203 for (r = skey->rc5.rounds - 1; r >= 0; r -= 2) { in s_rc5_ecb_decrypt() 211 for (r = skey->rc5.rounds - 1; r >= 0; r--) { in s_rc5_ecb_decrypt()
|
A D | blowfish.c | 300 int rounds; in s_blowfish_encipher() local 316 for (rounds = 0; rounds < 16; ) { in s_blowfish_encipher() 317 l ^= skey->blowfish.K[rounds++]; r ^= F(l); in s_blowfish_encipher() 318 r ^= skey->blowfish.K[rounds++]; l ^= F(r); in s_blowfish_encipher() 319 l ^= skey->blowfish.K[rounds++]; r ^= F(l); in s_blowfish_encipher() 320 r ^= skey->blowfish.K[rounds++]; l ^= F(r); in s_blowfish_encipher()
|
A D | kseed.c | 233 static void rounds(ulong32 *P, const ulong32 *K) in rounds() function 258 rounds(P, skey->kseed.K); in kseed_ecb_encrypt() 280 rounds(P, skey->kseed.dK); in kseed_ecb_decrypt()
|
/optee_os-3.20.0/core/crypto/ |
A D | aes-gcm-sw.c | 19 crypto_aes_enc_block(ek->data, sizeof(ek->data), ek->rounds, in internal_aes_gcm_set_key() 64 enc_key->rounds, state->ctr, state->buf_cryp); in encrypt_block() 99 enc_key->rounds, state->ctr, buf_cryp); in decrypt_block()
|
A D | aes-gcm.c | 95 crypto_aes_enc_block(ek->data, sizeof(ek->data), ek->rounds, in __gcm_init() 116 crypto_aes_enc_block(ek->data, sizeof(ek->data), ek->rounds, in __gcm_init() 133 sizeof(ek->data), &ek->rounds); in internal_aes_gcm_init() 216 ek->rounds, state->ctr, in __gcm_update_payload() 241 ek->rounds, state->ctr, in __gcm_update_payload()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/bcrypt/ |
A D | bcrypt.c | 77 unsigned int rounds, int hash_idx, in bcrypt_pbkdf_openbsd() argument 99 if (rounds == 0) { in bcrypt_pbkdf_openbsd() 102 used_rounds = rounds; in bcrypt_pbkdf_openbsd()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_cipher.h | 18 int rounds; member 32 long rounds; member 1015 int rounds; member 1018 int chacha_setup(chacha_state *st, const unsigned char *key, unsigned long keylen, int rounds); 1025 int chacha_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds, 1038 int rounds; member 1041 int salsa20_setup(salsa20_state *st, const unsigned char *key, unsigned long keylen, int rounds); 1047 int salsa20_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds, 1057 int rounds); 1059 int xsalsa20_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds,
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/chachapoly/ |
A D | chacha20poly1305_setiv.c | 37 tmp_st.rounds = 20; in chacha20poly1305_setiv()
|