/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | xts.c | 20 unsigned char *dst, unsigned char *tweak, 23 uint8_t tweak[TEE_AES_BLOCK_SIZE]; member 47 if (iv_len != sizeof(c->tweak)) in ltc_xts_init() 49 memcpy(c->tweak, iv, sizeof(c->tweak)); in ltc_xts_init() 51 memset(c->tweak, 0, sizeof(c->tweak)); in ltc_xts_init() 76 if (c->update && c->update(data, len, dst, c->tweak, in ltc_xts_update() 101 memcpy(dst->tweak, src->tweak, sizeof(src->tweak)); in ltc_xts_copy_state()
|
A D | aes_accel.c | 187 unsigned long blocks, unsigned char *tweak, in aes_xts_encrypt_nblocks() argument 193 LTC_ARGCHK(tweak); in aes_xts_encrypt_nblocks() 201 skey2->rijndael.eK, tweak); in aes_xts_encrypt_nblocks() 207 unsigned long blocks, unsigned char *tweak, in aes_xts_decrypt_nblocks() argument 213 LTC_ARGCHK(tweak); in aes_xts_decrypt_nblocks() 220 skey2->rijndael.eK, tweak); in aes_xts_decrypt_nblocks()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/modes/lrw/ |
A D | lrw_start.c | 26 const unsigned char *tweak, in lrw_start() argument 38 LTC_ARGCHK(tweak != NULL); in lrw_start() 62 XMEMCPY(lrw->tweak, tweak, 16); in lrw_start() 70 gcm_gf_mult(tweak, B, &lrw->PC[0][y][0]); in lrw_start()
|
A D | lrw_test.c | 22 unsigned char key[16], tweak[16], IV[16], P[16], expected_tweak[16], C[16]; in lrw_test() 78 … if ((err = lrw_start(idx, tests[x].IV, tests[x].key, 16, tests[x].tweak, 0, &lrw)) != CRYPT_OK) { in lrw_test()
|
A D | lrw_decrypt.c | 32 …return cipher_descriptor[lrw->cipher]->accel_lrw_decrypt(ct, pt, len, lrw->IV, lrw->tweak, &lrw->k… in lrw_decrypt()
|
A D | lrw_encrypt.c | 32 …return cipher_descriptor[lrw->cipher]->accel_lrw_encrypt(pt, ct, len, lrw->IV, lrw->tweak, &lrw->k… in lrw_encrypt()
|
A D | lrw_setiv.c | 61 gcm_gf_mult(lrw->tweak, IV, lrw->pad); in lrw_setiv()
|
A D | lrw_process.c | 64 gcm_gf_mult(lrw->tweak, lrw->IV, lrw->pad); in lrw_process()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/modes/xts/ |
A D | xts_decrypt.c | 53 … xts_decrypt(const unsigned char *ct, unsigned long ptlen, unsigned char *pt, unsigned char *tweak, in xts_decrypt() argument 63 LTC_ARGCHK(tweak != NULL); in xts_decrypt() 89 …if ((err = cipher_descriptor[xts->cipher]->accel_xts_decrypt(ct, pt, lim, tweak, &xts->key1, &xts-… in xts_decrypt() 97 XMEMCPY(T, tweak, sizeof(T)); in xts_decrypt() 100 if ((err = cipher_descriptor[xts->cipher]->ecb_encrypt(tweak, T, &xts->key2)) != CRYPT_OK) { in xts_decrypt() 139 if ((err = cipher_descriptor[xts->cipher]->ecb_decrypt(T, tweak, &xts->key2)) != CRYPT_OK) { in xts_decrypt()
|
A D | xts_encrypt.c | 55 … xts_encrypt(const unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tweak, in xts_encrypt() argument 65 LTC_ARGCHK(tweak != NULL); in xts_encrypt() 91 …if ((err = cipher_descriptor[xts->cipher]->accel_xts_encrypt(pt, ct, lim, tweak, &xts->key1, &xts-… in xts_encrypt() 99 XMEMCPY(T, tweak, sizeof(T)); in xts_encrypt() 103 if ((err = cipher_descriptor[xts->cipher]->ecb_encrypt(tweak, T, &xts->key2)) != CRYPT_OK) { in xts_encrypt() 140 if ((err = cipher_descriptor[xts->cipher]->ecb_decrypt(T, tweak, &xts->key2)) != CRYPT_OK) { in xts_encrypt()
|
A D | xts_test.c | 9 … unsigned char *tweak, const symmetric_key *skey1, const symmetric_key *skey2) in s_xts_test_accel_xts_encrypt() argument 29 ret = xts_encrypt(pt, blocks << 4, ct, tweak, &xts); in s_xts_test_accel_xts_encrypt() 36 … unsigned char *tweak, const symmetric_key *skey1, const symmetric_key *skey2) in s_xts_test_accel_xts_decrypt() argument 56 ret = xts_decrypt(ct, blocks << 4, pt, tweak, &xts); in s_xts_test_accel_xts_decrypt()
|
/optee_os-3.20.0/core/drivers/crypto/caam/cipher/ |
A D | caam_cipher_xts.c | 84 struct caamdmaobj tweak = { }; in caam_cipher_update_xts() local 107 ret = caam_dmaobj_input_sgtbuf(&tweak, ctx->tweak.data, in caam_cipher_update_xts() 108 ctx->tweak.length); in caam_cipher_update_xts() 116 ret = caam_dmaobj_output_sgtbuf(&enc_tweak, NULL, 0, ctx->tweak.length); in caam_cipher_update_xts() 124 retstatus = caam_cipher_block(ctx, false, NEED_KEY2, true, &tweak, in caam_cipher_update_xts() 243 &tweak); in caam_cipher_update_xts() 250 caam_dmaobj_copy_to_orig(&tweak); in caam_cipher_update_xts() 256 caam_dmaobj_free(&tweak); in caam_cipher_update_xts()
|
A D | caam_cipher.c | 349 caam_free_buf(&ctx->tweak); in do_free_intern() 412 if (src->tweak.length) { in caam_cipher_copy_state() 413 struct drvcrypt_buf tweak = { in caam_cipher_copy_state() local 414 .data = src->tweak.data, in caam_cipher_copy_state() 415 .length = src->tweak.length in caam_cipher_copy_state() 417 copy_ctx_data(&dst->tweak, &tweak); in caam_cipher_copy_state() 509 retstatus = copy_ctx_data(&cipherdata->tweak, in caam_cipher_initialize() 520 if (!cipherdata->tweak.data) { in caam_cipher_initialize() 531 memset(cipherdata->tweak.data, 0, in caam_cipher_initialize() 532 cipherdata->tweak.length); in caam_cipher_initialize() [all …]
|
A D | local.h | 53 struct caambuf tweak; /* XTS Tweak */ member
|
/optee_os-3.20.0/core/crypto/ |
A D | sm4.c | 299 uint8_t tweak[16] = { }; in sm4_crypt_xts() local 306 sm4_one_round(ctx_ek->sk, iv, tweak); in sm4_crypt_xts() 312 xor_128(input, tweak, ct); in sm4_crypt_xts() 314 xor_128(ct, tweak, output); in sm4_crypt_xts() 316 xts_multi(tweak, tweak); in sm4_crypt_xts() 319 sm4_one_round(ctx_dk->sk, tweak, iv); in sm4_crypt_xts() 333 xor_128(ct, tweak, ct); in sm4_crypt_xts() 335 xor_128(ct, tweak, ct); in sm4_crypt_xts() 338 xts_multi(tweak, tweak1); in sm4_crypt_xts() 347 xor_128(ct, tweak, ct); in sm4_crypt_xts() [all …]
|
/optee_os-3.20.0/core/arch/arm/crypto/ |
A D | aes_armv8a_ce.c | 224 void *tweak) in crypto_accel_aes_xts_enc() argument 228 assert(out && in && key1 && key2 && tweak); in crypto_accel_aes_xts_enc() 232 tweak); in crypto_accel_aes_xts_enc() 239 void *tweak) in crypto_accel_aes_xts_dec() argument 243 assert(out && in && key1 && key2 && tweak); in crypto_accel_aes_xts_dec() 247 tweak); in crypto_accel_aes_xts_dec()
|
/optee_os-3.20.0/core/include/crypto/ |
A D | crypto_accel.h | 37 void *tweak); 41 void *tweak);
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_cipher.h | 340 tweak[16], member 486 …d char *ct, unsigned long blocks, unsigned char *IV, const unsigned char *tweak, symmetric_key *sk… 497 …d char *pt, unsigned long blocks, unsigned char *IV, const unsigned char *tweak, symmetric_key *sk… 604 unsigned long blocks, unsigned char *tweak, 619 unsigned long blocks, unsigned char *tweak, 940 const unsigned char *tweak, 983 unsigned char *tweak, 988 unsigned char *tweak,
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | aes.h | 114 mbedtls_aes_context tweak; /*!< The AES context used for tweak member
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | aes.c | 511 mbedtls_aes_init( &ctx->tweak ); in mbedtls_aes_xts_init() 520 mbedtls_aes_free( &ctx->tweak ); in mbedtls_aes_xts_free() 755 ret = mbedtls_aes_setkey_enc( &ctx->tweak, key2, key2bits ); in mbedtls_aes_xts_setkey_enc() 780 ret = mbedtls_aes_setkey_enc( &ctx->tweak, key2, key2bits ); in mbedtls_aes_xts_setkey_dec() 1140 unsigned char tweak[16]; in mbedtls_aes_crypt_xts() local 1161 data_unit, tweak ); in mbedtls_aes_crypt_xts() 1176 memcpy( prev_tweak, tweak, sizeof( tweak ) ); in mbedtls_aes_crypt_xts() 1177 mbedtls_gf128mul_x_ble( tweak, tweak ); in mbedtls_aes_crypt_xts() 1181 tmp[i] = input[i] ^ tweak[i]; in mbedtls_aes_crypt_xts() 1188 output[i] = tmp[i] ^ tweak[i]; in mbedtls_aes_crypt_xts() [all …]
|