Home
last modified time | relevance | path

Searched refs:v2 (Results 1 – 12 of 12) sorted by relevance

/optee_os-3.20.0/core/drivers/crypto/caam/utils/
A Dutils_sgt_v2.c19 SGT_TRACE("SGT[%d]->w1 = %" PRIx64, idx, sgt->sgt[idx].v2.w1); in sgt_entry_trace()
20 SGT_TRACE("SGT[%d]->w2 = %" PRIx64, idx, sgt->sgt[idx].v2.w2); in sgt_entry_trace()
29 w2 = caam_read_val64(&sgt->v2.w2); in sgt_entry_offset()
48 caam_write_val64(&sgt->v2.w2, w2); in sgt_entry_offset()
57 caam_write_val64(&sgt->v2.w1, paddr); in caam_sgt_set_entry()
63 caam_write_val64(&sgt->v2.w2, w2); in caam_sgt_set_entry()
/optee_os-3.20.0/core/arch/arm/crypto/
A Dsm3_armv8a_ce_a64.S96 rev32 v2.16b, v2.16b
101 qround a, v0, v1, v2, v3, v4
102 qround a, v1, v2, v3, v4, v0
103 qround a, v2, v3, v4, v0, v1
104 qround a, v3, v4, v0, v1, v2
108 qround b, v4, v0, v1, v2, v3
109 qround b, v0, v1, v2, v3, v4
110 qround b, v1, v2, v3, v4, v0
111 qround b, v2, v3, v4, v0, v1
112 qround b, v3, v4, v0, v1, v2
[all …]
A Daes_modes_armv8a_ce_a64.S332 eor v2.16b, v2.16b, v1.16b
334 eor v3.16b, v3.16b, v2.16b
372 mov v6.16b, v2.16b
378 eor v2.16b, v2.16b, v5.16b
425 mov v2.16b, v4.16b
431 mov v2.s[3], w8
438 eor v2.16b, v7.16b, v2.16b
537 eor v2.16b, v2.16b, v6.16b
544 eor v2.16b, v2.16b, v6.16b
618 eor v2.16b, v2.16b, v6.16b
[all …]
A Dsha512_armv8a_ce_a64.S132 mov v2.16b, v10.16b
192 add v10.2d, v10.2d, v2.2d
A Dsha256_armv8a_ce_a64.S81 add_update 1, v2, 17, 18, 19, 16
A Dsha1_armv8a_ce_a64.S15 k2 .req v2
A Dghash-ce-core_a64.S22 T1 .req v2
/optee_os-3.20.0/lib/libutils/isoc/arch/arm/softfloat/source/include/
A DprimitiveTypes.h71 #define INIT_UINTM4( v3, v2, v1, v0 ) { v0, v1, v2, v3 } argument
82 #define INIT_UINTM4( v3, v2, v1, v0 ) { v3, v2, v1, v0 } argument
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/
A Decc_recover_key.c32 void *r, *s, *v, *w, *t1, *t2, *u1, *u2, *v1, *v2, *e, *x, *y, *a_plus3; in ecc_recover_key() local
49 …if ((err = mp_init_multi(&r, &s, &v, &w, &t1, &t2, &u1, &u2, &v1, &v2, &e, &x, &y, &a_plus3, LTC_N… in ecc_recover_key()
199 …if ((err = mp_mulmod(e, w, p, v2)) != CRYPT_OK) … in ecc_recover_key()
200 …if ((err = mp_submod(p, v2, p, v2)) != CRYPT_OK) … in ecc_recover_key()
224 …if ((err = ltc_mp.ecc_mul2add(mR, v1, mG, v2, mQ, ma, m)) != CRYPT_OK) … in ecc_recover_key()
255 mp_clear_multi(a_plus3, y, x, e, v2, v1, u2, u1, t2, t1, w, v, s, r, LTC_NULL); in ecc_recover_key()
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/sosemanuk/
A Dsosemanuk.c655 STORE32L(u ## x2 ^ v2, st->buf + ooff + 8); \ in s_sosemanuk_internal()
672 ulong32 v0, v1, v2, v3; in s_sosemanuk_internal() local
676 STEP(02, 03, 04, 05, 06, 07, 08, 09, 00, 01, v2, u2); in s_sosemanuk_internal()
681 STEP(06, 07, 08, 09, 00, 01, 02, 03, 04, 05, v2, u2); in s_sosemanuk_internal()
686 STEP(00, 01, 02, 03, 04, 05, 06, 07, 08, 09, v2, u2); in s_sosemanuk_internal()
691 STEP(04, 05, 06, 07, 08, 09, 00, 01, 02, 03, v2, u2); in s_sosemanuk_internal()
696 STEP(08, 09, 00, 01, 02, 03, 04, 05, 06, 07, v2, u2); in s_sosemanuk_internal()
/optee_os-3.20.0/core/drivers/crypto/caam/include/
A Dcaam_utils_sgt.h54 } v2; member
/optee_os-3.20.0/lib/libmbedtls/mbedtls/
A DChangeLog2039 algorithms family when encrypting private keys using PKCS#5 v2.0.
2428 https://arxiv.org/abs/1702.08719v2.
2619 required by PKCS1 v2.2
3469 * Fix typo in rsa_copy() that impacted PKCS#1 v2 contexts
3880 PKCS#1 v2.1 functions
3946 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
4073 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
4218 * Added support for PKCS#1 v2.1 encoding and thus support

Completed in 46 milliseconds