/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/omac/ |
A D | omac_done.c | 31 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || in omac_done() 32 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { in omac_done() 39 omac->block[omac->buflen++] = 0x80; in omac_done() 43 omac->block[omac->buflen++] = 0x00; in omac_done() 52 omac->block[x] ^= omac->prev[x] ^ omac->Lu[mode][x]; in omac_done() 56 …if ((err = cipher_descriptor[omac->cipher_idx]->ecb_encrypt(omac->block, omac->block, &omac->key))… in omac_done() 63 out[x] = omac->block[x]; in omac_done()
|
A D | omac_process.c | 31 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || in omac_process() 32 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { in omac_process() 60 omac->block[x] ^= omac->prev[x]; in omac_process() 62 …if ((err = cipher_descriptor[omac->cipher_idx]->ecb_encrypt(omac->block, omac->prev, &omac->key)) … in omac_process() 70 XMEMCPY(omac->block + omac->buflen, in, n); in omac_process()
|
A D | omac_init.c | 84 zeromem(omac->block, sizeof(omac->block)); in omac_init()
|
/optee_os-3.20.0/core/crypto/ |
A D | cbc-mac.c | 25 uint8_t block[CBCMAC_MAX_BLOCK_LEN]; member 47 memset(mc->block, 0, sizeof(mc->block)); in crypto_cbc_mac_init() 54 NULL, 0, mc->block, mc->block_len); in crypto_cbc_mac_init() 71 memcpy(mc->block + mc->current_block_len, data, pad_len); in crypto_cbc_mac_update() 75 false, mc->block, mc->block_len, in crypto_cbc_mac_update() 118 memcpy(mc->block + mc->current_block_len, data, len); in crypto_cbc_mac_update() 140 memset(mc->block + mc->current_block_len, pad_len, pad_len); in crypto_cbc_mac_final() 142 if (crypto_cbc_mac_update(ctx, mc->block, mc->block_len)) in crypto_cbc_mac_final() 174 memcpy(dst->block, src->block, sizeof(dst->block)); in crypto_cbc_mac_copy_state()
|
A D | aes-gcm.c | 31 uint64_t block[2]; in ghash_update_pad_zero() local 41 memcpy(block, data + m * sizeof(block), in ghash_update_pad_zero() 42 sizeof(block)); in ghash_update_pad_zero() 44 (void *)block, 1); in ghash_update_pad_zero() 50 memset(block, 0, sizeof(block)); in ghash_update_pad_zero() 51 memcpy(block, data + n * TEE_AES_BLOCK_SIZE, in ghash_update_pad_zero() 53 internal_aes_gcm_ghash_update(state, block, NULL, 0); in ghash_update_pad_zero()
|
A D | rng_fortuna.c | 315 static TEE_Result generate_blocks(void *block, size_t nblocks) in generate_blocks() argument 317 uint8_t *b = block; in generate_blocks() 349 uint8_t block[BLOCK_SIZE]; in generate_random_data() local 352 res = generate_blocks(block, 1); in generate_random_data() 355 memcpy(b, block, blen % BLOCK_SIZE); in generate_random_data()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/pmac/ |
A D | pmac_done.c | 22 if ((pmac->buflen > (int)sizeof(pmac->block)) || (pmac->buflen < 0) || in pmac_done() 23 (pmac->block_len > (int)sizeof(pmac->block)) || (pmac->buflen > pmac->block_len)) { in pmac_done() 33 pmac->checksum[x] ^= pmac->block[x] ^ pmac->Lr[x]; in pmac_done() 38 pmac->checksum[x] ^= pmac->block[x]; in pmac_done()
|
A D | pmac_process.c | 32 if ((pmac->buflen > (int)sizeof(pmac->block)) || (pmac->buflen < 0) || in pmac_process() 33 (pmac->block_len > (int)sizeof(pmac->block)) || (pmac->buflen > pmac->block_len)) { in pmac_process() 62 Z[x] = pmac->Li[x] ^ pmac->block[x]; in pmac_process() 75 XMEMCPY(pmac->block + pmac->buflen, in, n); in pmac_process()
|
A D | pmac_init.c | 124 zeromem(pmac->block, sizeof(pmac->block)); in pmac_init()
|
/optee_os-3.20.0/lib/libmbedtls/core/ |
A D | aes_ctr.c | 26 unsigned char block[TEE_AES_BLOCK_SIZE]; member 68 c->block, data, dst)) in mbed_aes_ctr_update() 79 memset(c->block, 0, sizeof(c->block)); in mbed_aes_ctr_final() 94 memcpy(dst->block, src->block, sizeof(dst->block)); in mbed_aes_ctr_copy_state()
|
/optee_os-3.20.0/core/drivers/crypto/caam/utils/ |
A D | utils_mem.c | 198 enum caam_status caam_cpy_block_src(struct caamblock *block, in caam_cpy_block_src() argument 208 if (!block->buf.data) { in caam_cpy_block_src() 209 ret = caam_alloc_align_buf(&block->buf, block->max); in caam_cpy_block_src() 217 MEM_TRACE("Current buffer is %zu (%zu) bytes", block->filled, in caam_cpy_block_src() 218 block->max); in caam_cpy_block_src() 220 cpy_size = block->max - block->filled; in caam_cpy_block_src() 223 memcpy(&block->buf.data[block->filled], &src->data[offset], cpy_size); in caam_cpy_block_src() 225 block->filled += cpy_size; in caam_cpy_block_src()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pkcs5/ |
A D | pkcs_5_1.c | 44 unsigned long block = 0, iter; in s_pkcs_5_alg1_common() local 75 while(block * hash_descriptor[hash_idx]->hashsize < *outlen) { in s_pkcs_5_alg1_common() 82 if (openssl_compat && block) { in s_pkcs_5_alg1_common() 108 outidx = block*hash_descriptor[hash_idx]->hashsize; in s_pkcs_5_alg1_common() 117 block++; in s_pkcs_5_alg1_common()
|
/optee_os-3.20.0/core/drivers/imx/dcp/ |
A D | dcp_utils.c | 83 void dcp_cmac_padding(uint8_t *block, size_t len) in dcp_cmac_padding() argument 89 block[i] = BIT(7); in dcp_cmac_padding() 91 block[i] = 0x0; in dcp_cmac_padding()
|
/optee_os-3.20.0/core/drivers/crypto/se050/core/ |
A D | ctr.c | 22 unsigned char block[TEE_AES_BLOCK_SIZE]; member 99 c->block, &dst_len); in se050_aes_ctr_update() 108 *dst++ = (unsigned char)(j ^ c->block[n]); in se050_aes_ctr_update() 121 memset(c->block, 0, sizeof(c->block)); in do_final()
|
/optee_os-3.20.0/core/tee/ |
A D | tee_ree_fs.c | 72 uint8_t *block; in out_of_place_write() local 83 block = get_tmp_block(); in out_of_place_write() 84 if (!block) in out_of_place_write() 110 block); in out_of_place_write() 127 if (block) in out_of_place_write() 128 put_tmp_block(block); in out_of_place_write() 306 uint8_t *block = NULL; in ree_fs_read_primitive() local 326 block = get_tmp_block(); in ree_fs_read_primitive() 327 if (!block) { in ree_fs_read_primitive() 353 if (block) in ree_fs_read_primitive() [all …]
|
/optee_os-3.20.0/core/include/tee/ |
A D | fs_htree.h | 162 const void *block); 172 void *block);
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/ |
A D | blake2b.c | 235 unsigned char block[BLAKE2B_BLOCKBYTES]; in blake2b_init() local 237 XMEMSET(block, 0, BLAKE2B_BLOCKBYTES); in blake2b_init() 238 XMEMCPY(block, key, keylen); in blake2b_init() 239 blake2b_process(md, block, BLAKE2B_BLOCKBYTES); in blake2b_init() 242 zeromem(block, sizeof(block)); in blake2b_init()
|
A D | blake2s.c | 229 unsigned char block[BLAKE2S_BLOCKBYTES]; in blake2s_init() local 231 XMEMSET(block, 0, BLAKE2S_BLOCKBYTES); in blake2s_init() 232 XMEMCPY(block, key, keylen); in blake2s_init() 233 blake2s_process(md, block, BLAKE2S_BLOCKBYTES); in blake2s_init() 236 zeromem(block, sizeof(block)); in blake2s_init()
|
/optee_os-3.20.0/core/drivers/imx/dcp/include/ |
A D | dcp_utils.h | 78 void dcp_cmac_padding(uint8_t *block, size_t len);
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/rabbit/ |
A D | rabbit.c | 213 XMEMSET(&(st->block), 0, sizeof(st->block)); in rabbit_setup() 262 XMEMSET(&(st->block), 0, sizeof(st->block)); in rabbit_setiv() 284 for (i = 0; i < j; ++i, st->unused--) out[i] = in[i] ^ st->block[16 - st->unused]; in rabbit_crypt() 298 for (i = inlen; i < 16; ++i) st->block[i] = buf[i]; in rabbit_crypt()
|
/optee_os-3.20.0/core/drivers/crypto/caam/include/ |
A D | caam_utils_mem.h | 104 enum caam_status caam_cpy_block_src(struct caamblock *block,
|
A D | caam_utils_dmaobj.h | 127 struct caamblock *block);
|
/optee_os-3.20.0/core/pta/tests/ |
A D | fs_htree.c | 27 uint8_t *block; member 107 *data = a->block; in test_read_init() 132 memcpy(a->block, a->data + offs, *bytes); in test_read_final() 155 memcpy(a->data + offs, a->block, sz); in test_write_final() 399 free(aux->block); in aux_free() 422 aux->block = malloc(TEST_BLOCK_SIZE); in aux_alloc() 423 if (!aux->block) in aux_alloc()
|
/optee_os-3.20.0/core/arch/arm/crypto/ |
A D | aes_modes_armv8a_ce_a32.S | 225 vld1.8 {q1}, [r1]! @ get next pt block 266 vld1.8 {q0}, [r1]! @ get next ct block 323 bmi .Lctrtailblock @ blocks < 0 means tail block 382 @ be done at the start of a block. 400 teq r6, #0 @ start of a block? 451 teq r6, #0 @ start of a block?
|
/optee_os-3.20.0/lib/libutils/isoc/ |
A D | bget.doc | 146 standard pool block can be managed "off the books" by BGET in this mode. 148 a pointer to the new block and BGET expands the buffer pool; if it 240 expansion block size. Providing an <acquire> function will cause 242 linked-block scheme (in other words, larger than <pool_incr> minus the 253 the size of the largest single block in the free space pool is stored 263 Extended statistics: The expansion block size will be stored into the 265 expansion block releases are disabled. The number of currently active 268 respectively, the number of expansion block acquisitions and releases
|