/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/gcm/ |
A D | gcm_gf_mult.c | 120 for (i = 0; i < 4; i++) { in gcm_gf_mult() 125 for (i = 0; i < 2; i++) { in gcm_gf_mult() 135 for (i = 1; i < (int)WPV; i++) { in gcm_gf_mult() 142 for (i = 0; i < (int)WPV; i++) { in gcm_gf_mult() 143 B[M(3)][i] = B[M(1)][i] ^ B[M(2)][i]; in gcm_gf_mult() 144 B[M(5)][i] = B[M(1)][i] ^ B[M(4)][i]; in gcm_gf_mult() 162 for (i = (BPD/4)-1; i >= 0; i--) { in gcm_gf_mult() 185 for (i = 0; i < 8; i++) { in gcm_gf_mult() 189 for (i = 0; i < 4; i++) { in gcm_gf_mult() 195 for (i = 31; i >= 16; i--) { in gcm_gf_mult() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pkcs5/ |
A D | pkcs_5_test.c | 153 int i, err; in pkcs_5_test() 165 for(i=0; i < (int)(sizeof(cases_5_2) / sizeof(cases_5_2[0])); i++) { in pkcs_5_test() 168 if((err = pkcs_5_alg2((unsigned char*)cases_5_2[i].P, cases_5_2[i].P_len, in pkcs_5_test() 169 (unsigned char*)cases_5_2[i].S, cases_5_2[i].S_len, in pkcs_5_test() 177 … else if (compare_testvector(DK, dkLen, cases_5_2[i].DK, cases_5_2[i].dkLen, "PKCS#5_2", i)) { in pkcs_5_test() 183 for(i=0; i < (int)(sizeof(cases_5_1) / sizeof(case_item)); i++, tested++) { in pkcs_5_test() 185 if((err = pkcs_5_alg1((unsigned char*)cases_5_1[i].P, cases_5_1[i].P_len, in pkcs_5_test() 194 … else if (compare_testvector(DK, dkLen, cases_5_1[i].DK, cases_5_1[i].dkLen, "PKCS#5_1", i)) { in pkcs_5_test() 200 for(i = 0; i < (int)(sizeof(cases_5_1o) / sizeof(cases_5_1o[0])); i++, tested++) { in pkcs_5_test() 202 if ((err = pkcs_5_alg1_openssl((unsigned char*)cases_5_1o[i].P, cases_5_1o[i].P_len, in pkcs_5_test() [all …]
|
/optee_os-3.20.0/core/crypto/ |
A D | sm4.c | 156 for (i = 0; i < 32; i++) { in sm4_setkey() 157 k[i + 4] = k[i] ^ sm4CalciRK(k[i + 1] ^ k[i + 2] ^ k[i + 3] ^ in sm4_setkey() 176 for (i = 0; i < 32; i++) in sm4_one_round() 199 for (i = 0; i < 16; i++) in sm4_setkey_dec() 226 for (i = 0; i < 16; i++) in sm4_crypt_cbc() 239 for (i = 0; i < 16; i++) in sm4_crypt_cbc() 260 for (i = 0; i < 16; i++) in sm4_crypt_ctr() 263 for (i = 16; i > 0; i--) in sm4_crypt_ctr() 278 for (i = 0; i < 16; i++) { in xts_multi() 291 for (i = 0; i < 16; i++) in xor_128() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/salsa20/ |
A D | salsa20_crypt.c | 23 int i; in s_salsa20_block() local 25 for (i = rounds; i > 0; i -= 2) { in s_salsa20_block() 35 for (i = 0; i < 16; ++i) { in s_salsa20_block() 36 x[i] += input[i]; in s_salsa20_block() 37 STORE32L(x[i], output + 4 * i); in s_salsa20_block() 52 unsigned long i, j; in salsa20_crypt() local 63 for (i = 0; i < j; ++i, st->ksleft--) out[i] = in[i] ^ st->kstream[64 - st->ksleft]; in salsa20_crypt() 74 for (i = 0; i < inlen; ++i) out[i] = in[i] ^ buf[i]; in salsa20_crypt() 76 for (i = inlen; i < 64; ++i) st->kstream[i] = buf[i]; in salsa20_crypt() 79 for (i = 0; i < 64; ++i) out[i] = in[i] ^ buf[i]; in salsa20_crypt()
|
/optee_os-3.20.0/core/drivers/imx/dcp/ |
A D | dcp_utils.c | 43 unsigned int i = 0; in dcp_left_shift_buffer() local 47 for (i = 0; i < buffer_size; i++) { in dcp_left_shift_buffer() 69 unsigned int i = 0; in dcp_reverse() local 71 for (i = 0; i < size; i++) in dcp_reverse() 72 out[i] = in[size - 1 - i]; in dcp_reverse() 77 unsigned int i = 0; in dcp_xor() local 79 for (i = 0; i < size; i++) in dcp_xor() 80 out[i] = a[i] ^ b[i]; in dcp_xor() 87 for (i = len; i < DCP_AES128_BLOCK_SIZE; i++) { in dcp_cmac_padding() 88 if (i == len) in dcp_cmac_padding() [all …]
|
/optee_os-3.20.0/lib/libutils/isoc/newlib/ |
A D | str-two-way.h | 256 while (i < needle_len && (CANON_ELEMENT (needle[i]) in two_way_short_needle() 258 ++i; in two_way_short_needle() 265 --i; in two_way_short_needle() 292 ++i; in two_way_short_needle() 299 --i; in two_way_short_needle() 342 for (i = 0; i < 1U << CHAR_BIT; i++) in two_way_long_needle() 344 for (i = 0; i < needle_len; i++) in two_way_long_needle() 380 ++i; in two_way_long_needle() 387 --i; in two_way_long_needle() 424 ++i; in two_way_long_needle() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/chacha/ |
A D | chacha_crypt.c | 22 int i; in s_chacha_block() local 24 for (i = rounds; i > 0; i -= 2) { in s_chacha_block() 34 for (i = 0; i < 16; ++i) { in s_chacha_block() 35 x[i] += input[i]; in s_chacha_block() 36 STORE32L(x[i], output + 4 * i); in s_chacha_block() 51 unsigned long i, j; in chacha_crypt() local 62 for (i = 0; i < j; ++i, st->ksleft--) out[i] = in[i] ^ st->kstream[64 - st->ksleft]; in chacha_crypt() 79 for (i = 0; i < inlen; ++i) out[i] = in[i] ^ buf[i]; in chacha_crypt() 81 for (i = inlen; i < 64; ++i) st->kstream[i] = buf[i]; in chacha_crypt() 84 for (i = 0; i < 64; ++i) out[i] = in[i] ^ buf[i]; in chacha_crypt()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ec25519/ |
A D | tweetnacl.c | 7 #define FOR(i,n) for (i = 0;i < n;++i) argument 32 FOR(i,n) d |= x[i]^y[i]; in vn() 44 FOR(i,16) r[i]=a[i]; in set25519() 73 FOR(i,16) t[i]=n[i]; in pack25519() 79 for(i=1;i<15;i++) { in pack25519() 119 FOR(i,16) o[i]=a[i]+b[i]; in A() 125 FOR(i,16) o[i]=a[i]-b[i]; in Z() 134 FOR(i,16) o[i]=t[i]; in M() 173 FOR(i,31) z[i]=n[i]; in tweetnacl_crypto_scalarmult() 179 d[i]=a[i]=c[i]=0; in tweetnacl_crypto_scalarmult() [all …]
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | des.c | 429 for( i = 0; i < 16; i++ ) in mbedtls_des_setkey() 488 for( i = 0; i < 16; i += 2 ) in mbedtls_des_setkey_dec() 506 for( i = 0; i < 32; i += 2 ) in des3_set2key() 560 for( i = 0; i < 32; i += 2 ) in des3_set3key() 619 for( i = 0; i < 8; i++ ) in mbedtls_des_crypt_ecb() 656 for( i = 0; i < 8; i++ ) in mbedtls_des_crypt_cbc() 713 for( i = 0; i < 8; i++ ) in mbedtls_des3_crypt_ecb() 719 for( i = 0; i < 8; i++ ) in mbedtls_des3_crypt_ecb() 725 for( i = 0; i < 8; i++ ) in mbedtls_des3_crypt_ecb() 875 for( i = 0; i < 6; i++ ) in mbedtls_des_self_test() [all …]
|
A D | xtea.c | 58 int i; in mbedtls_xtea_setup() local 62 for( i = 0; i < 4; i++ ) in mbedtls_xtea_setup() 64 ctx->k[i] = MBEDTLS_GET_UINT32_BE( key, i << 2 ); in mbedtls_xtea_setup() 85 for( i = 0; i < 32; i++ ) in mbedtls_xtea_crypt_ecb() 96 for( i = 0; i < 32; i++ ) in mbedtls_xtea_crypt_ecb() 118 int i; in mbedtls_xtea_crypt_cbc() local 131 for( i = 0; i < 8; i++ ) in mbedtls_xtea_crypt_cbc() 132 output[i] = (unsigned char)( output[i] ^ iv[i] ); in mbedtls_xtea_crypt_cbc() 145 for( i = 0; i < 8; i++ ) in mbedtls_xtea_crypt_cbc() 146 output[i] = (unsigned char)( input[i] ^ iv[i] ); in mbedtls_xtea_crypt_cbc() [all …]
|
A D | gcm.c | 113 for( i = 4; i > 0; i >>= 1 ) in gcm_gen_table() 123 for( i = 2; i <= 8; i *= 2 ) in gcm_gen_table() 218 for( i = 15; i >= 0; i-- ) in gcm_mult() 298 for( i = 0; i < use_len; i++ ) in mbedtls_gcm_starts() 307 for( i = 0; i < 16; i++ ) in mbedtls_gcm_starts() 325 for( i = 0; i < use_len; i++ ) in mbedtls_gcm_starts() 371 for( i = 16; i > 12; i-- ) in mbedtls_gcm_update() 381 for( i = 0; i < use_len; i++ ) in mbedtls_gcm_update() 385 out_p[i] = ectr[i] ^ p[i]; in mbedtls_gcm_update() 429 for( i = 0; i < 16; i++ ) in mbedtls_gcm_finish() [all …]
|
A D | arc4.c | 64 int i, j, a; in mbedtls_arc4_setup() local 72 for( i = 0; i < 256; i++ ) in mbedtls_arc4_setup() 73 m[i] = (unsigned char) i; in mbedtls_arc4_setup() 77 for( i = 0; i < 256; i++, k++ ) in mbedtls_arc4_setup() 81 a = m[i]; in mbedtls_arc4_setup() 83 m[i] = m[j]; in mbedtls_arc4_setup() 95 size_t i; in mbedtls_arc4_crypt() local 102 for( i = 0; i < length; i++ ) in mbedtls_arc4_crypt() 110 output[i] = (unsigned char) in mbedtls_arc4_crypt() 154 int i, ret = 0; in mbedtls_arc4_self_test() local [all …]
|
A D | aria.c | 402 for( i = 0; i < 4; i++ ) in aria_rot128() 458 i = i < 2 ? i + 1 : 0; in mbedtls_aria_setkey_enc() 460 i = i < 2 ? i + 1 : 0; in mbedtls_aria_setkey_enc() 494 for( i = 0, j = ctx->nr; i < j; i++, j-- ) in mbedtls_aria_setkey_dec() 505 for( i = 1; i < ctx->nr; i++ ) in mbedtls_aria_setkey_dec() 618 for( i = 0; i < MBEDTLS_ARIA_BLOCKSIZE; i++ ) in mbedtls_aria_crypt_cbc() 632 for( i = 0; i < MBEDTLS_ARIA_BLOCKSIZE; i++ ) in mbedtls_aria_crypt_cbc() 933 for( i = 0; i < 3; i++ ) in mbedtls_aria_self_test() 958 for( i = 0; i < 3; i++ ) in mbedtls_aria_self_test() 988 for( i = 0; i < 3; i++ ) in mbedtls_aria_self_test() [all …]
|
A D | md2.c | 119 int i, j; in mbedtls_internal_md2_process() local 122 for( i = 0; i < 16; i++ ) in mbedtls_internal_md2_process() 124 ctx->state[i + 16] = ctx->buffer[i]; in mbedtls_internal_md2_process() 126 (unsigned char)( ctx->buffer[i] ^ ctx->state[i]); in mbedtls_internal_md2_process() 129 for( i = 0; i < 18; i++ ) in mbedtls_internal_md2_process() 143 for( i = 0; i < 16; i++ ) in mbedtls_internal_md2_process() 146 ( ctx->cksum[i] ^ PI_SUBST[ctx->buffer[i] ^ t] ); in mbedtls_internal_md2_process() 214 size_t i; in mbedtls_md2_finish_ret() local 219 for( i = ctx->left; i < 16; i++ ) in mbedtls_md2_finish_ret() 324 int i, ret = 0; in mbedtls_md2_self_test() local [all …]
|
A D | camellia.c | 344 for( i = 0; i < keybits / 8; ++i ) in mbedtls_camellia_setkey_enc() 348 for( i = 0; i < 8; i++ ) in mbedtls_camellia_setkey_enc() 355 for( i = 0; i < 6; i++ ) { in mbedtls_camellia_setkey_enc() 367 for( i = 0; i < 8; i++ ) in mbedtls_camellia_setkey_enc() 371 for( i = 0; i < 4; ++i ) in mbedtls_camellia_setkey_enc() 377 for( i = 0; i < 4; ++i ) in mbedtls_camellia_setkey_enc() 385 for( i = 0; i < 4; ++i ) in mbedtls_camellia_setkey_enc() 413 for( i = 0; i < 20; i++ ) { in mbedtls_camellia_setkey_enc() 570 for( i = 0; i < 16; i++ ) in mbedtls_camellia_crypt_cbc() 584 for( i = 0; i < 16; i++ ) in mbedtls_camellia_crypt_cbc() [all …]
|
A D | chacha20.c | 143 for( i = 0U; i < 10U; i++ ) in chacha20_block() 163 for( i = 0U; i < 16; i++ ) in chacha20_block() 270 for( i = 0U; i < 64U; i += 8U ) in mbedtls_chacha20_update() 272 output[offset + i ] = input[offset + i ] ^ ctx->keystream8[i ]; in mbedtls_chacha20_update() 273 output[offset + i+1] = input[offset + i+1] ^ ctx->keystream8[i+1]; in mbedtls_chacha20_update() 274 output[offset + i+2] = input[offset + i+2] ^ ctx->keystream8[i+2]; in mbedtls_chacha20_update() 275 output[offset + i+3] = input[offset + i+3] ^ ctx->keystream8[i+3]; in mbedtls_chacha20_update() 276 output[offset + i+4] = input[offset + i+4] ^ ctx->keystream8[i+4]; in mbedtls_chacha20_update() 293 for( i = 0U; i < size; i++) in mbedtls_chacha20_update() 295 output[offset + i] = input[offset + i] ^ ctx->keystream8[i]; in mbedtls_chacha20_update() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/ |
A D | idea.c | 57 for (i = 0; i < 15; i++) { in s_mul_inv() 76 for (i = 0; i < 8; i++) { in s_setup_key() 77 LOAD16(e_key[i], key + 2 * i); in s_setup_key() 79 for (; i < LTC_IDEA_KEYLEN; i++) { in s_setup_key() 80 j = (i - i % 8) - 8; in s_setup_key() 81 e_key[i] = LOW16((e_key[j+(i+1)%8] << 9) | (e_key[j+(i+2)%8] >> 7)); in s_setup_key() 85 for (i = 0; i < LTC_IDEA_ROUNDS; i++) { in s_setup_key() 87 d_key[i*6+1] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+1+(i>0 ? 1 : 0)]); in s_setup_key() 88 d_key[i*6+2] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+2-(i>0 ? 1 : 0)]); in s_setup_key() 103 int i; in s_process_block() local [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/ |
A D | sha1.c | 48 for (i = 0; i < 16; i++) { in ss_sha1_compress() 49 LOAD32H(W[i], buf + (4*i)); in ss_sha1_compress() 60 for (i = 16; i < 80; i++) { in ss_sha1_compress() 61 W[i] = ROL(W[i-3] ^ W[i-8] ^ W[i-14] ^ W[i-16], 1); in ss_sha1_compress() 73 for (i = 0; i < 20; ) { in ss_sha1_compress() 91 for (i = 0; i < 20; ) { in ss_sha1_compress() 187 int i; in sha1_done() local 224 for (i = 0; i < 5; i++) { in sha1_done() 225 STORE32H(md->sha1.state[i], out+(4*i)); in sha1_done() 258 int i; in sha1_test() [all …]
|
A D | blake2b.c | 174 for (i = 0; i < 8; ++i) { in s_blake2b_init0() 187 for (i = 0; i < 8; ++i) { in s_blake2b_init_param() 311 for (i = 0; i < 16; ++i) { in ss_blake2b_compress() 312 LOAD64L(m[i], buf + i * sizeof(m[i])); in ss_blake2b_compress() 315 for (i = 0; i < 8; ++i) { in ss_blake2b_compress() 341 for (i = 0; i < 8; ++i) { in ss_blake2b_compress() 342 md->blake2b.h[i] = md->blake2b.h[i] ^ v[i] ^ v[i + 8]; in ss_blake2b_compress() 475 for (i = 0; tests[i].msg != NULL; i++) { in blake2b_512_test() 522 for (i = 0; tests[i].msg != NULL; i++) { in blake2b_384_test() 575 for (i = 0; tests[i].msg != NULL; i++) { in blake2b_256_test() [all …]
|
A D | blake2s.c | 166 for (i = 0; i < 8; ++i) { in s_blake2s_init0() 181 for (i = 0; i < 8; ++i) { in s_blake2s_init_param() 303 for (i = 0; i < 16; ++i) { in ss_blake2s_compress() 304 LOAD32L(m[i], buf + i * sizeof(m[i])); in ss_blake2s_compress() 307 for (i = 0; i < 8; ++i) { in ss_blake2s_compress() 331 for (i = 0; i < 8; ++i) { in ss_blake2s_compress() 332 md->blake2s.h[i] = md->blake2s.h[i] ^ v[i] ^ v[i + 8]; in ss_blake2s_compress() 465 for (i = 0; tests[i].msg != NULL; i++) { in blake2s_256_test() 509 for (i = 0; tests[i].msg != NULL; i++) { in blake2s_224_test() 551 for (i = 0; tests[i].msg != NULL; i++) { in blake2s_160_test() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/hkdf/ |
A D | hkdf_test.c | 33 int i; in hkdf_test() 254 for(i=0; i < (int)(sizeof(cases) / sizeof(cases[0])); i++) { in hkdf_test() 255 int hash = find_hash(cases[i].Hash); in hkdf_test() 258 if((err = hkdf(hash, cases[i].salt, cases[i].salt_l, in hkdf_test() 259 cases[i].info, cases[i].info_l, in hkdf_test() 260 cases[i].IKM, cases[i].IKM_l, in hkdf_test() 261 OKM, cases[i].OKM_l)) != CRYPT_OK) { in hkdf_test() 263 printf("LTC_HKDF-%s test #%d, %s\n", cases[i].Hash, i, error_to_string(err)); in hkdf_test() 268 …if(compare_testvector(OKM, cases[i].OKM_l, cases[i].OKM, (size_t)cases[i].OKM_l, "HKDF", cases[i].… in hkdf_test()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/sha2/ |
A D | sha512.c | 95 for (i = 0; i < 8; i++) { in ss_sha512_compress() 96 S[i] = md->sha512.state[i]; in ss_sha512_compress() 100 for (i = 0; i < 16; i++) { in ss_sha512_compress() 101 LOAD64H(W[i], buf + (8*i)); in ss_sha512_compress() 105 for (i = 16; i < 80; i++) { in ss_sha512_compress() 106 W[i] = Gamma1(W[i - 2]) + W[i - 7] + Gamma0(W[i - 15]) + W[i - 16]; in ss_sha512_compress() 111 for (i = 0; i < 80; i++) { in ss_sha512_compress() 130 for (i = 0; i < 80; i += 8) { in ss_sha512_compress() 144 for (i = 0; i < 8; i++) { in ss_sha512_compress() 145 md->sha512.state[i] = md->sha512.state[i] + S[i]; in ss_sha512_compress() [all …]
|
/optee_os-3.20.0/core/drivers/clk/sam/ |
A D | at91_pmc.c | 25 for (i = 0; i < nclk; i++) { in pmc_clk_get_by_id() 26 if (clks[i].clk && clks[i].id == id) in pmc_clk_get_by_id() 38 for (i = 0; i < nclk; i++) in pmc_clk_get_by_name() 152 int i = 0; in pmc_register_id() local 154 for (i = 0; i < PMC_MAX_IDS; i++) { in pmc_register_id() 172 int i = 0; in pmc_register_pck() local 174 for (i = 0; i < PMC_MAX_PCKS; i++) { in pmc_register_pck() 203 for (i = 0; registered_ids[i]; i++) { in pmc_suspend() 209 for (i = 0; registered_pcks[i]; i++) { in pmc_suspend() 248 for (i = 0; registered_ids[i]; i++) { in pmc_resume() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/pkcs1/ |
A D | pkcs_1_v1_5_decode.c | 32 unsigned long modulus_len, ps_len, i; in pkcs_1_v1_5_decode() local 55 for (i = 2; i < modulus_len; i++) { in pkcs_1_v1_5_decode() 57 if (msg[i] == 0x00) { break; } in pkcs_1_v1_5_decode() 59 ps_len = i++ - 2; in pkcs_1_v1_5_decode() 61 if (i >= modulus_len) { in pkcs_1_v1_5_decode() 67 for (i = 2; i < modulus_len - 1; i++) { in pkcs_1_v1_5_decode() 68 if (msg[i] != 0xFF) { break; } in pkcs_1_v1_5_decode() 72 if (msg[i] != 0) { in pkcs_1_v1_5_decode() 77 ps_len = i - 2; in pkcs_1_v1_5_decode()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/asn1/oid/ |
A D | pk_oid_str.c | 8 unsigned long i, j, limit, oid_j; in pk_oid_str_to_num() local 15 for (i = 0; i < limit; i++) oid[i] = 0; in pk_oid_str_to_num() 22 for (i = 0, j = 0; i < OID_len; i++) { in pk_oid_str_to_num() 23 if (OID[i] == '.') { in pk_oid_str_to_num() 26 else if ((OID[i] >= '0') && (OID[i] <= '9')) { in pk_oid_str_to_num() 29 oid[j] = oid[j] * 10 + (OID[i] - '0'); in pk_oid_str_to_num() 47 int i; in pk_oid_num_to_str() local 55 for (i = oidlen - 1, k = 0; i >= 0; i--) { in pk_oid_num_to_str() 56 j = oid[i]; in pk_oid_num_to_str() 68 if (i > 0) { in pk_oid_num_to_str()
|