/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | sha1_accel.c | 104 md->sha1.curlen = 0; in sha1_init() 122 if (md->sha1.curlen >= sizeof(md->sha1.buf)) { in sha1_done() 127 md->sha1.length += md->sha1.curlen * 8; in sha1_done() 130 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0x80; in sha1_done() 136 if (md->sha1.curlen > 56) { in sha1_done() 137 while (md->sha1.curlen < 64) { in sha1_done() 138 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; in sha1_done() 141 md->sha1.curlen = 0; in sha1_done() 145 while (md->sha1.curlen < 56) { in sha1_done() 146 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; in sha1_done()
|
A D | sha256_accel.c | 93 md->sha256.curlen = 0; in sha256_init() 128 if (md->sha256.curlen >= sizeof(md->sha256.buf)) { in sha256_done() 134 md->sha256.length += md->sha256.curlen * 8; in sha256_done() 137 md->sha256.buf[md->sha256.curlen++] = (unsigned char)0x80; in sha256_done() 143 if (md->sha256.curlen > 56) { in sha256_done() 144 while (md->sha256.curlen < 64) { in sha256_done() 145 md->sha256.buf[md->sha256.curlen++] = (unsigned char)0; in sha256_done() 148 md->sha256.curlen = 0; in sha256_done() 152 while (md->sha256.curlen < 56) { in sha256_done() 153 md->sha256.buf[md->sha256.curlen++] = (unsigned char)0; in sha256_done()
|
A D | sha512_accel.c | 61 md->sha512.curlen = 0; in sha512_init() 89 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha512_done() 94 md->sha512.length += md->sha512.curlen * CONST64(8); in sha512_done() 97 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0x80; in sha512_done() 103 if (md->sha512.curlen > 112) { in sha512_done() 104 while (md->sha512.curlen < 128) { in sha512_done() 105 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; in sha512_done() 108 md->sha512.curlen = 0; in sha512_done() 115 while (md->sha512.curlen < 120) { in sha512_done() 116 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; in sha512_done()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/ |
A D | md2.c | 101 md->md2.curlen = 0; in md2_init() 117 if (md-> md2 .curlen > sizeof(md-> md2 .buf)) { in md2_process() 121 n = MIN(inlen, (16 - md->md2.curlen)); in md2_process() 122 XMEMCPY(md->md2.buf + md->md2.curlen, in, (size_t)n); in md2_process() 123 md->md2.curlen += n; in md2_process() 128 if (md->md2.curlen == 16) { in md2_process() 131 md->md2.curlen = 0; in md2_process() 150 if (md->md2.curlen >= sizeof(md->md2.buf)) { in md2_done() 156 k = 16 - md->md2.curlen; in md2_done() 157 for (i = md->md2.curlen; i < 16; i++) { in md2_done()
|
A D | sha1.c | 165 md->sha1.curlen = 0; in sha1_init() 192 if (md->sha1.curlen >= sizeof(md->sha1.buf)) { in sha1_done() 197 md->sha1.length += md->sha1.curlen * 8; in sha1_done() 200 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0x80; in sha1_done() 206 if (md->sha1.curlen > 56) { in sha1_done() 207 while (md->sha1.curlen < 64) { in sha1_done() 208 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; in sha1_done() 211 md->sha1.curlen = 0; in sha1_done() 215 while (md->sha1.curlen < 56) { in sha1_done() 216 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; in sha1_done()
|
A D | md4.c | 174 md->md4.curlen = 0; in md4_init() 200 if (md->md4.curlen >= sizeof(md->md4.buf)) { in md4_done() 205 md->md4.length += md->md4.curlen * 8; in md4_done() 208 md->md4.buf[md->md4.curlen++] = (unsigned char)0x80; in md4_done() 214 if (md->md4.curlen > 56) { in md4_done() 215 while (md->md4.curlen < 64) { in md4_done() 216 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done() 219 md->md4.curlen = 0; in md4_done() 223 while (md->md4.curlen < 56) { in md4_done() 224 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done()
|
A D | md5.c | 232 md->md5.curlen = 0; in md5_init() 259 if (md->md5.curlen >= sizeof(md->md5.buf)) { in md5_done() 265 md->md5.length += md->md5.curlen * 8; in md5_done() 268 md->md5.buf[md->md5.curlen++] = (unsigned char)0x80; in md5_done() 274 if (md->md5.curlen > 56) { in md5_done() 275 while (md->md5.curlen < 64) { in md5_done() 276 md->md5.buf[md->md5.curlen++] = (unsigned char)0; in md5_done() 279 md->md5.curlen = 0; in md5_done() 283 while (md->md5.curlen < 56) { in md5_done() 284 md->md5.buf[md->md5.curlen++] = (unsigned char)0; in md5_done()
|
A D | blake2b.c | 372 if (md->blake2b.curlen > sizeof(md->blake2b.buf)) { in blake2b_process() 377 unsigned long left = md->blake2b.curlen; in blake2b_process() 380 md->blake2b.curlen = 0; in blake2b_process() 393 XMEMCPY(md->blake2b.buf + md->blake2b.curlen, in, inlen); in blake2b_process() 394 md->blake2b.curlen += inlen; in blake2b_process() 419 s_blake2b_increment_counter(md, md->blake2b.curlen); in blake2b_done() 421 …XMEMSET(md->blake2b.buf + md->blake2b.curlen, 0, BLAKE2B_BLOCKBYTES - md->blake2b.curlen); /* Padd… in blake2b_done()
|
A D | blake2s.c | 361 if (md->blake2s.curlen > sizeof(md->blake2s.buf)) { in blake2s_process() 366 unsigned long left = md->blake2s.curlen; in blake2s_process() 369 md->blake2s.curlen = 0; in blake2s_process() 382 XMEMCPY(md->blake2s.buf + md->blake2s.curlen, in, inlen); in blake2s_process() 383 md->blake2s.curlen += inlen; in blake2s_process() 407 s_blake2s_increment_counter(md, md->blake2s.curlen); in blake2s_done() 409 …XMEMSET(md->blake2s.buf + md->blake2s.curlen, 0, BLAKE2S_BLOCKBYTES - md->blake2s.curlen); /* Padd… in blake2s_done()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/blake2/ |
A D | blake2bmac_memory_multi.c | 26 unsigned long curlen; in blake2bmac_memory_multi() local 35 curlen = inlen; in blake2bmac_memory_multi() 38 if ((err = blake2bmac_process(&st, curptr, curlen)) != CRYPT_OK) { goto LBL_ERR; } in blake2bmac_memory_multi() 41 curlen = va_arg(args, unsigned long); in blake2bmac_memory_multi()
|
A D | blake2smac_memory_multi.c | 26 unsigned long curlen; in blake2smac_memory_multi() local 35 curlen = inlen; in blake2smac_memory_multi() 38 if ((err = blake2smac_process(&st, curptr, curlen)) != CRYPT_OK) { goto LBL_ERR; } in blake2smac_memory_multi() 41 curlen = va_arg(args, unsigned long); in blake2smac_memory_multi()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/poly1305/ |
A D | poly1305_memory_multi.c | 31 unsigned long curlen; in poly1305_memory_multi() local 40 curlen = inlen; in poly1305_memory_multi() 43 if ((err = poly1305_process(&st, curptr, curlen)) != CRYPT_OK) { goto LBL_ERR; } in poly1305_memory_multi() 46 curlen = va_arg(args, unsigned long); in poly1305_memory_multi()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/whirl/ |
A D | whirl.c | 150 if (md->whirlpool.curlen >= sizeof(md->whirlpool.buf)) { in whirlpool_done() 155 md->whirlpool.length += md->whirlpool.curlen * 8; in whirlpool_done() 158 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0x80; in whirlpool_done() 164 if (md->whirlpool.curlen > 32) { in whirlpool_done() 165 while (md->whirlpool.curlen < 64) { in whirlpool_done() 166 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0; in whirlpool_done() 169 md->whirlpool.curlen = 0; in whirlpool_done() 173 while (md->whirlpool.curlen < 56) { in whirlpool_done() 174 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0; in whirlpool_done()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/omac/ |
A D | omac_memory_multi.c | 34 unsigned long curlen; in omac_memory_multi() local 53 curlen = inlen; in omac_memory_multi() 56 if ((err = omac_process(omac, curptr, curlen)) != CRYPT_OK) { in omac_memory_multi() 64 curlen = va_arg(args, unsigned long); in omac_memory_multi()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/pmac/ |
A D | pmac_memory_multi.c | 34 unsigned long curlen; in pmac_memory_multi() local 52 curlen = inlen; in pmac_memory_multi() 55 if ((err = pmac_process(pmac, curptr, curlen)) != CRYPT_OK) { in pmac_memory_multi() 63 curlen = va_arg(args, unsigned long); in pmac_memory_multi()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/f9/ |
A D | f9_memory_multi.c | 34 unsigned long curlen; in f9_memory_multi() local 53 curlen = inlen; in f9_memory_multi() 56 if ((err = f9_process(f9, curptr, curlen)) != CRYPT_OK) { in f9_memory_multi() 64 curlen = va_arg(args, unsigned long); in f9_memory_multi()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/hmac/ |
A D | hmac_memory_multi.c | 35 unsigned long curlen; in hmac_memory_multi() local 54 curlen = inlen; in hmac_memory_multi() 57 if ((err = hmac_process(hmac, curptr, curlen)) != CRYPT_OK) { in hmac_memory_multi() 65 curlen = va_arg(args, unsigned long); in hmac_memory_multi()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/xcbc/ |
A D | xcbc_memory_multi.c | 34 unsigned long curlen; in xcbc_memory_multi() local 53 curlen = inlen; in xcbc_memory_multi() 56 if ((err = xcbc_process(xcbc, curptr, curlen)) != CRYPT_OK) { in xcbc_memory_multi() 64 curlen = va_arg(args, unsigned long); in xcbc_memory_multi()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/helper/ |
A D | hash_memory_multi.c | 29 unsigned long curlen; in hash_memory_multi() local 55 curlen = inlen; in hash_memory_multi() 58 if ((err = hash_descriptor[hash]->process(md, curptr, curlen)) != CRYPT_OK) { in hash_memory_multi() 66 curlen = va_arg(args, unsigned long); in hash_memory_multi()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/chc/ |
A D | chc.c | 112 md->chc.curlen = 0; in chc_init() 206 if (md->chc.curlen >= sizeof(md->chc.buf)) { in chc_done() 211 md->chc.length += md->chc.curlen * 8; in chc_done() 214 md->chc.buf[md->chc.curlen++] = (unsigned char)0x80; in chc_done() 220 if (md->chc.curlen > (unsigned long)(cipher_blocksize - 8)) { in chc_done() 221 while (md->chc.curlen < (unsigned long)cipher_blocksize) { in chc_done() 222 md->chc.buf[md->chc.curlen++] = (unsigned char)0; in chc_done() 225 md->chc.curlen = 0; in chc_done() 229 while (md->chc.curlen < (unsigned long)(cipher_blocksize - 8)) { in chc_done() 230 md->chc.buf[md->chc.curlen++] = (unsigned char)0; in chc_done()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_hash.h | 20 unsigned long curlen; member 28 ulong32 state[8], curlen; member 36 ulong32 state[5], curlen; member 44 ulong32 state[4], curlen; member 52 ulong32 state[4], curlen; member 60 unsigned long curlen; member 68 unsigned long curlen; member 108 ulong32 curlen; member 116 ulong32 curlen; member 126 unsigned long curlen; member [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/sha2/ |
A D | sha512.c | 170 md->sha512.curlen = 0; in sha512_init() 205 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha512_done() 210 md->sha512.length += md->sha512.curlen * CONST64(8); in sha512_done() 213 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0x80; in sha512_done() 219 if (md->sha512.curlen > 112) { in sha512_done() 220 while (md->sha512.curlen < 128) { in sha512_done() 221 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; in sha512_done() 224 md->sha512.curlen = 0; in sha512_done() 231 while (md->sha512.curlen < 120) { in sha512_done() 232 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; in sha512_done()
|
A D | sha512_224.c | 39 md->sha512.curlen = 0; in sha512_224_init() 65 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha512_224_done()
|
A D | sha384.c | 39 md->sha512.curlen = 0; in sha384_init() 65 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha384_done()
|
A D | sha512_256.c | 39 md->sha512.curlen = 0; in sha512_256_init() 65 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha512_256_done()
|