/optee_os-3.20.0/core/drivers/crypto/caam/utils/ |
A D | utils_sgt_v2.c | 19 SGT_TRACE("SGT[%d]->w1 = %" PRIx64, idx, sgt->sgt[idx].v2.w1); in sgt_entry_trace() 20 SGT_TRACE("SGT[%d]->w2 = %" PRIx64, idx, sgt->sgt[idx].v2.w2); in sgt_entry_trace() 29 w2 = caam_read_val64(&sgt->v2.w2); in sgt_entry_offset() 48 caam_write_val64(&sgt->v2.w2, w2); in sgt_entry_offset() 57 caam_write_val64(&sgt->v2.w1, paddr); in caam_sgt_set_entry() 63 caam_write_val64(&sgt->v2.w2, w2); in caam_sgt_set_entry()
|
/optee_os-3.20.0/core/arch/arm/crypto/ |
A D | sm3_armv8a_ce_a64.S | 96 rev32 v2.16b, v2.16b 101 qround a, v0, v1, v2, v3, v4 102 qround a, v1, v2, v3, v4, v0 103 qround a, v2, v3, v4, v0, v1 104 qround a, v3, v4, v0, v1, v2 108 qround b, v4, v0, v1, v2, v3 109 qround b, v0, v1, v2, v3, v4 110 qround b, v1, v2, v3, v4, v0 111 qround b, v2, v3, v4, v0, v1 112 qround b, v3, v4, v0, v1, v2 [all …]
|
A D | aes_modes_armv8a_ce_a64.S | 332 eor v2.16b, v2.16b, v1.16b 334 eor v3.16b, v3.16b, v2.16b 372 mov v6.16b, v2.16b 378 eor v2.16b, v2.16b, v5.16b 425 mov v2.16b, v4.16b 431 mov v2.s[3], w8 438 eor v2.16b, v7.16b, v2.16b 537 eor v2.16b, v2.16b, v6.16b 544 eor v2.16b, v2.16b, v6.16b 618 eor v2.16b, v2.16b, v6.16b [all …]
|
A D | sha512_armv8a_ce_a64.S | 132 mov v2.16b, v10.16b 192 add v10.2d, v10.2d, v2.2d
|
A D | sha256_armv8a_ce_a64.S | 81 add_update 1, v2, 17, 18, 19, 16
|
A D | sha1_armv8a_ce_a64.S | 15 k2 .req v2
|
A D | ghash-ce-core_a64.S | 22 T1 .req v2
|
/optee_os-3.20.0/lib/libutils/isoc/arch/arm/softfloat/source/include/ |
A D | primitiveTypes.h | 71 #define INIT_UINTM4( v3, v2, v1, v0 ) { v0, v1, v2, v3 } argument 82 #define INIT_UINTM4( v3, v2, v1, v0 ) { v3, v2, v1, v0 } argument
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_recover_key.c | 32 void *r, *s, *v, *w, *t1, *t2, *u1, *u2, *v1, *v2, *e, *x, *y, *a_plus3; in ecc_recover_key() local 49 …if ((err = mp_init_multi(&r, &s, &v, &w, &t1, &t2, &u1, &u2, &v1, &v2, &e, &x, &y, &a_plus3, LTC_N… in ecc_recover_key() 199 …if ((err = mp_mulmod(e, w, p, v2)) != CRYPT_OK) … in ecc_recover_key() 200 …if ((err = mp_submod(p, v2, p, v2)) != CRYPT_OK) … in ecc_recover_key() 224 …if ((err = ltc_mp.ecc_mul2add(mR, v1, mG, v2, mQ, ma, m)) != CRYPT_OK) … in ecc_recover_key() 255 mp_clear_multi(a_plus3, y, x, e, v2, v1, u2, u1, t2, t1, w, v, s, r, LTC_NULL); in ecc_recover_key()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/sosemanuk/ |
A D | sosemanuk.c | 655 STORE32L(u ## x2 ^ v2, st->buf + ooff + 8); \ in s_sosemanuk_internal() 672 ulong32 v0, v1, v2, v3; in s_sosemanuk_internal() local 676 STEP(02, 03, 04, 05, 06, 07, 08, 09, 00, 01, v2, u2); in s_sosemanuk_internal() 681 STEP(06, 07, 08, 09, 00, 01, 02, 03, 04, 05, v2, u2); in s_sosemanuk_internal() 686 STEP(00, 01, 02, 03, 04, 05, 06, 07, 08, 09, v2, u2); in s_sosemanuk_internal() 691 STEP(04, 05, 06, 07, 08, 09, 00, 01, 02, 03, v2, u2); in s_sosemanuk_internal() 696 STEP(08, 09, 00, 01, 02, 03, 04, 05, 06, 07, v2, u2); in s_sosemanuk_internal()
|
/optee_os-3.20.0/core/drivers/crypto/caam/include/ |
A D | caam_utils_sgt.h | 54 } v2; member
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 2039 algorithms family when encrypting private keys using PKCS#5 v2.0. 2428 https://arxiv.org/abs/1702.08719v2. 2619 required by PKCS1 v2.2 3469 * Fix typo in rsa_copy() that impacted PKCS#1 v2 contexts 3880 PKCS#1 v2.1 functions 3946 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1 4073 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1 4218 * Added support for PKCS#1 v2.1 encoding and thus support
|