Home
last modified time | relevance | path

Searched refs:rounds (Results 1 – 25 of 40) sorted by relevance

12

/optee_os-3.20.0/core/arch/arm/crypto/
A Daes_armv8a_ce.h15 int rounds, int blocks, int first);
17 int rounds, int blocks, int first);
19 int rounds, int blocks, uint8_t iv[]);
21 int rounds, int blocks, uint8_t iv[]);
23 int rounds, int blocks, uint8_t ctr[], int first);
25 int rounds, int blocks, uint8_t const rk2[],
28 int rounds, int blocks, uint8_t const rk2[],
A Daes-gcm-ce.c53 enc_key->rounds, state->ctr, k); in internal_aes_gcm_set_key()
110 (const uint8_t *)ek->data, ek->rounds, in encrypt_pl()
126 ek->rounds, 1, (uint8_t *)state->ctr, 1); in decrypt_pl()
157 pmull_gcm_load_round_keys(ek->data, ek->rounds); in update_payload_2block()
159 (uint8_t *)state->ctr, ek->rounds); in update_payload_2block()
162 state->ctr, NULL, ek->rounds, ks); in update_payload_2block()
167 state->ctr, ek->data, ek->rounds); in update_payload_2block()
A Daes_modes_armv8a_ce_a64.S15 .macro load_round_keys, rounds, rk
16 cmp \rounds, #12
27 .macro enc_prepare, rounds, rk, ignore
28 load_round_keys \rounds, \rk
33 load_round_keys \rounds, \rk
38 load_round_keys \rounds, \rk
87 cmp \rounds, #12
101 do_block_Nx e, \rounds, \in
105 do_block_Nx e, \rounds, \i0, \i1
113 do_block_Nx d, \rounds, \in
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/
A Daes.c15 unsigned int *rounds) in crypto_aes_expand_enc_key() argument
19 enc_keylen, rounds); in crypto_aes_expand_enc_key()
30 *rounds = skey.rijndael.Nr; in crypto_aes_expand_enc_key()
36 unsigned int rounds, const void *src, void *dst) in crypto_aes_enc_block() argument
39 crypto_accel_aes_ecb_enc(dst, src, enc_key, rounds, 1); in crypto_aes_enc_block()
45 skey.rijndael.Nr = rounds; in crypto_aes_enc_block()
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/salsa20/
A Dsalsa20_setup.c25 int salsa20_setup(salsa20_state *st, const unsigned char *key, unsigned long keylen, int rounds) in salsa20_setup() argument
33 if (rounds == 0) rounds = 20; in salsa20_setup()
34 LTC_ARGCHK(rounds % 2 == 0); /* number of rounds must be evenly divisible by 2 */ in salsa20_setup()
54 st->rounds = rounds; /* default is 20 for salsa20 */ in salsa20_setup()
A Dxsalsa20_setup.c24 static void s_xsalsa20_doubleround(ulong32 *x, int rounds) in s_xsalsa20_doubleround() argument
28 for (i = rounds; i > 0; i -= 2) { in s_xsalsa20_doubleround()
56 int rounds) in xsalsa20_setup() argument
68 if (rounds == 0) rounds = 20; in xsalsa20_setup()
69 LTC_ARGCHK(rounds % 2 == 0); /* number of rounds must be evenly divisible by 2 */ in xsalsa20_setup()
90 s_xsalsa20_doubleround(x, rounds); in xsalsa20_setup()
114 st->rounds = rounds; in xsalsa20_setup()
A Dsalsa20_test.c33 int rounds; in salsa20_test()
39 rounds = 12; in salsa20_test()
40 …if ((err = salsa20_setup(&st, k, sizeof(k), rounds)) != CRYPT_OK) return er… in salsa20_test()
50 rounds = 20; in salsa20_test()
51 if ((err = salsa20_setup(&st, k, sizeof(k), rounds)) != CRYPT_OK) return err; in salsa20_test()
57 if ((err = salsa20_memory(k, sizeof(k), rounds, n, sizeof(n), counter, in salsa20_test()
A Dxsalsa20_test.c39 int rounds = 20; in xsalsa20_test()
45 if ((err = xsalsa20_setup(&st, key, 32, nonce, 24, rounds)) != CRYPT_OK) return err; in xsalsa20_test()
49 if ((err = xsalsa20_setup(&st, key, 32, nonce, 24, rounds)) != CRYPT_OK) return err; in xsalsa20_test()
70 int rounds = 20; in xsalsa20_test()
77 if ((err = xsalsa20_setup(&st, key, 32, nonce, 24, rounds)) != CRYPT_OK) return err; in xsalsa20_test()
A Dxsalsa20_memory.c20 int xsalsa20_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds, in xsalsa20_memory() argument
27 if ((err = xsalsa20_setup(&st, key, keylen, nonce, noncelen, rounds)) != CRYPT_OK) goto WIPE_KEY; in xsalsa20_memory()
A Dsalsa20_memory.c20 int salsa20_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds, in salsa20_memory() argument
27 if ((err = salsa20_setup(&st, key, keylen, rounds)) != CRYPT_OK) goto WIPE_KEY; in salsa20_memory()
A Dsalsa20_crypt.c20 static void s_salsa20_block(unsigned char *output, const ulong32 *input, int rounds) in s_salsa20_block() argument
25 for (i = rounds; i > 0; i -= 2) { in s_salsa20_block()
70 s_salsa20_block(buf, st->input, st->rounds); in salsa20_crypt()
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/safer/
A Dsaferp.c221 static const int rounds[3] = { 8, 12, 16 }; in saferp_setup() local
266 skey->saferp.rounds = 8; in saferp_setup()
293 skey->saferp.rounds = 12; in saferp_setup()
320 skey->saferp.rounds = 16; in saferp_setup()
344 if (skey->saferp.rounds < 8 || skey->saferp.rounds > 16) { in saferp_ecb_encrypt()
361 if (skey->saferp.rounds > 8) { in saferp_ecb_encrypt()
368 if (skey->saferp.rounds > 12) { in saferp_ecb_encrypt()
374 ct[0] = b[0] ^ skey->saferp.K[skey->saferp.rounds*2][0]; in saferp_ecb_encrypt()
412 if (skey->saferp.rounds < 8 || skey->saferp.rounds > 16) { in saferp_ecb_decrypt()
434 if (skey->saferp.rounds > 12) { in saferp_ecb_decrypt()
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/chacha/
A Dchacha_setup.c24 int chacha_setup(chacha_state *st, const unsigned char *key, unsigned long keylen, int rounds) in chacha_setup() argument
32 if (rounds == 0) rounds = 20; in chacha_setup()
52 st->rounds = rounds; /* e.g. 20 for chacha20 */ in chacha_setup()
A Dchacha_memory.c20 int chacha_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds, in chacha_memory() argument
29 if ((err = chacha_setup(&st, key, keylen, rounds)) != CRYPT_OK) goto WIPE_KEY; in chacha_memory()
A Dchacha_crypt.c19 static void s_chacha_block(unsigned char *output, const ulong32 *input, int rounds) in s_chacha_block() argument
24 for (i = rounds; i > 0; i -= 2) { in s_chacha_block()
69 s_chacha_block(buf, st->input, st->rounds); in chacha_crypt()
/optee_os-3.20.0/lib/libmbedtls/core/
A Daes.c18 unsigned int *rounds) in crypto_aes_expand_enc_key() argument
22 enc_keylen, rounds); in crypto_aes_expand_enc_key()
34 *rounds = ctx.nr; in crypto_aes_expand_enc_key()
41 unsigned int rounds, const void *src, void *dst) in crypto_aes_enc_block() argument
44 crypto_accel_aes_ecb_enc(dst, src, enc_key, rounds, 1); in crypto_aes_enc_block()
54 ctx.nr = rounds; in crypto_aes_enc_block()
/optee_os-3.20.0/core/arch/arm/include/crypto/
A Dghash-ce-core.h25 void pmull_gcm_load_round_keys(const uint64_t rk[30], int rounds);
30 uint64_t ctr[], const uint64_t rk[], int rounds,
37 uint64_t ctr[], const uint64_t rk[], int rounds);
41 void pmull_gcm_encrypt_block(uint8_t dst[], const uint8_t src[], int rounds);
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/
A Drc5.c70 skey->rc5.rounds = num_rounds; in s_rc5_setup()
133 if (skey->rc5.rounds < 12 || skey->rc5.rounds > 24) { in s_rc5_ecb_encrypt()
143 if ((skey->rc5.rounds & 1) == 0) { in s_rc5_ecb_encrypt()
144 for (r = 0; r < skey->rc5.rounds; r += 2) { in s_rc5_ecb_encrypt()
152 for (r = 0; r < skey->rc5.rounds; r++) { in s_rc5_ecb_encrypt()
193 if (skey->rc5.rounds < 12 || skey->rc5.rounds > 24) { in s_rc5_ecb_decrypt()
199 K = skey->rc5.K + (skey->rc5.rounds << 1); in s_rc5_ecb_decrypt()
201 if ((skey->rc5.rounds & 1) == 0) { in s_rc5_ecb_decrypt()
203 for (r = skey->rc5.rounds - 1; r >= 0; r -= 2) { in s_rc5_ecb_decrypt()
211 for (r = skey->rc5.rounds - 1; r >= 0; r--) { in s_rc5_ecb_decrypt()
A Dblowfish.c300 int rounds; in s_blowfish_encipher() local
316 for (rounds = 0; rounds < 16; ) { in s_blowfish_encipher()
317 l ^= skey->blowfish.K[rounds++]; r ^= F(l); in s_blowfish_encipher()
318 r ^= skey->blowfish.K[rounds++]; l ^= F(r); in s_blowfish_encipher()
319 l ^= skey->blowfish.K[rounds++]; r ^= F(l); in s_blowfish_encipher()
320 r ^= skey->blowfish.K[rounds++]; l ^= F(r); in s_blowfish_encipher()
A Dkseed.c233 static void rounds(ulong32 *P, const ulong32 *K) in rounds() function
258 rounds(P, skey->kseed.K); in kseed_ecb_encrypt()
280 rounds(P, skey->kseed.dK); in kseed_ecb_decrypt()
/optee_os-3.20.0/core/crypto/
A Daes-gcm-sw.c19 crypto_aes_enc_block(ek->data, sizeof(ek->data), ek->rounds, in internal_aes_gcm_set_key()
64 enc_key->rounds, state->ctr, state->buf_cryp); in encrypt_block()
99 enc_key->rounds, state->ctr, buf_cryp); in decrypt_block()
A Daes-gcm.c95 crypto_aes_enc_block(ek->data, sizeof(ek->data), ek->rounds, in __gcm_init()
116 crypto_aes_enc_block(ek->data, sizeof(ek->data), ek->rounds, in __gcm_init()
133 sizeof(ek->data), &ek->rounds); in internal_aes_gcm_init()
216 ek->rounds, state->ctr, in __gcm_update_payload()
241 ek->rounds, state->ctr, in __gcm_update_payload()
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/bcrypt/
A Dbcrypt.c77 unsigned int rounds, int hash_idx, in bcrypt_pbkdf_openbsd() argument
99 if (rounds == 0) { in bcrypt_pbkdf_openbsd()
102 used_rounds = rounds; in bcrypt_pbkdf_openbsd()
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_cipher.h18 int rounds; member
32 long rounds; member
1015 int rounds; member
1018 int chacha_setup(chacha_state *st, const unsigned char *key, unsigned long keylen, int rounds);
1025 int chacha_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds,
1038 int rounds; member
1041 int salsa20_setup(salsa20_state *st, const unsigned char *key, unsigned long keylen, int rounds);
1047 int salsa20_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds,
1057 int rounds);
1059 int xsalsa20_memory(const unsigned char *key, unsigned long keylen, unsigned long rounds,
/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/chachapoly/
A Dchacha20poly1305_setiv.c37 tmp_st.rounds = 20; in chacha20poly1305_setiv()

Completed in 22 milliseconds

12