/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ltc_ecc_is_point.c | 17 void *prime, *a, *b, *t1, *t2; in ltc_ecc_is_point() local 24 if ((err = mp_init_multi(&t1, &t2, LTC_NULL)) != CRYPT_OK) return err; in ltc_ecc_is_point() 27 if ((err = mp_sqr(y, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point() 35 if ((err = mp_sub(t1, t2, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point() 40 if ((err = mp_addmod(t1, t2, prime, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point() 43 while (mp_cmp_d(t1, 0) == LTC_MP_LT) { in ltc_ecc_is_point() 44 if ((err = mp_add(t1, prime, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point() 46 while (mp_cmp(t1, prime) != LTC_MP_LT) { in ltc_ecc_is_point() 47 if ((err = mp_sub(t1, prime, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point() 51 if (mp_cmp(t1, b) != LTC_MP_EQ) { in ltc_ecc_is_point() [all …]
|
A D | ltc_ecc_projective_dbl_point.c | 42 void *t1, *t2; in ltc_ecc_projective_dbl_point() local 84 if ((err = mp_add(t1, R->x, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 86 if ((err = mp_sub(t1, modulus, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 94 if ((err = mp_sub(t1, modulus, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 97 if ((err = mp_add(t1, t2, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 99 if ((err = mp_sub(t1, modulus, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 113 if ((err = mp_add(t1, t2, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 115 if ((err = mp_sub(t1, modulus, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 118 if ((err = mp_add(t1, t2, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 120 if ((err = mp_sub(t1, modulus, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() [all …]
|
A D | ltc_ecc_projective_add_point.c | 25 void *t1, *t2, *x, *y, *z; in ltc_ecc_projective_add_point() local 59 if (mp_cmp(P->y, t1) == LTC_MP_EQ) { in ltc_ecc_projective_add_point() 79 if ((err = mp_mul(Q->z, t1, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 93 if ((err = mp_mul(z, t1, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 96 if ((err = mp_mul(Q->y, t1, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 105 if ((err = mp_add(t1, t1, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 107 if ((err = mp_sub(t1, modulus, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 110 if ((err = mp_add(t1, y, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 112 if ((err = mp_sub(t1, modulus, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 142 if ((err = mp_mul(t1, x, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() [all …]
|
A D | ltc_ecc_import_point.c | 12 void *t1, *t2; in ltc_ecc_import_point() local 15 if (mp_init_multi(&t1, &t2, LTC_NULL) != CRYPT_OK) { in ltc_ecc_import_point() 33 …if ((err = mp_sqr(x, t1)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point() 34 …if ((err = mp_mulmod(t1, x, prime, t1)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point() 37 …if ((err = mp_add(t1, t2, t1)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point() 39 …if ((err = mp_add(t1, b, t1)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point() 41 …if ((err = mp_sqrtmod_prime(t1, prime, t2)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point() 57 mp_clear_multi(t1, t2, LTC_NULL); in ltc_ecc_import_point()
|
A D | ltc_ecc_map.c | 22 void *t1, *t2; in ltc_ecc_map() local 33 if ((err = mp_init_multi(&t1, &t2, LTC_NULL)) != CRYPT_OK) { in ltc_ecc_map() 41 if ((err = mp_invmod(P->z, modulus, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_map() 44 if ((err = mp_sqr(t1, t2)) != CRYPT_OK) { goto done; } in ltc_ecc_map() 46 if ((err = mp_mul(t1, t2, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_map() 47 if ((err = mp_mod(t1, modulus, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_map() 52 if ((err = mp_mul(P->y, t1, P->y)) != CRYPT_OK) { goto done; } in ltc_ecc_map() 58 mp_clear_multi(t1, t2, LTC_NULL); in ltc_ecc_map()
|
A D | ecc_recover_key.c | 32 void *r, *s, *v, *w, *t1, *t2, *u1, *u2, *v1, *v2, *e, *x, *y, *a_plus3; in ecc_recover_key() local 49 …if ((err = mp_init_multi(&r, &s, &v, &w, &t1, &t2, &u1, &u2, &v1, &v2, &e, &x, &y, &a_plus3, LTC_N… in ecc_recover_key() 174 …if ((err = mp_sqr(x, t1)) != CRYPT_OK) … in ecc_recover_key() 175 …if ((err = mp_mulmod(t1, x, m, t1)) != CRYPT_OK) … in ecc_recover_key() 178 …if ((err = mp_add(t1, t2, t1)) != CRYPT_OK) … in ecc_recover_key() 180 …if ((err = mp_add(t1, b, t1)) != CRYPT_OK) … in ecc_recover_key() 182 …if ((err = mp_sqrtmod_prime(t1, m, t2)) != CRYPT_OK) … in ecc_recover_key() 255 mp_clear_multi(a_plus3, y, x, e, v2, v1, u2, u1, t2, t1, w, v, s, r, LTC_NULL); in ecc_recover_key()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/math/ |
A D | tfm_desc.c | 473 fp_add(&t1, R->x, &t1); in tfm_ecc_projective_dbl_point() 486 fp_add(&t1, &t2, &t1); in tfm_ecc_projective_dbl_point() 502 fp_add(&t1, &t2, &t1); in tfm_ecc_projective_dbl_point() 507 fp_add(&t1, &t2, &t1); in tfm_ecc_projective_dbl_point() 512 fp_add(&t1, &t2, &t1); in tfm_ecc_projective_dbl_point() 651 fp_mul(&z, &t1, &t1); in tfm_ecc_projective_add_point() 654 fp_mul(Q->y, &t1, &t1); in tfm_ecc_projective_add_point() 663 fp_add(&t1, &t1, &t1); in tfm_ecc_projective_add_point() 668 fp_add(&t1, &y, &t1); in tfm_ecc_projective_add_point() 700 fp_mul(&t1, &x, &t1); in tfm_ecc_projective_add_point() [all …]
|
A D | gmp_desc.c | 313 mpz_fdiv_q_2exp(t1, t1, 2); in sqrtmod_prime() 346 mpz_add_ui(t1, Q, 1); in sqrtmod_prime() 347 mpz_fdiv_q_2exp(t1, t1, 1); in sqrtmod_prime() 358 mpz_set(t1, T); in sqrtmod_prime() 362 mpz_powm(t1, t1, two, prime); in sqrtmod_prime() 370 mpz_sub_ui(t1, M, i); in sqrtmod_prime() 371 mpz_sub_ui(t1, t1, 1); in sqrtmod_prime() 372 mpz_powm(t1, two, t1, prime); in sqrtmod_prime() 374 mpz_powm(t1, C, t1, prime); in sqrtmod_prime() 376 mpz_mul(C, t1, t1); in sqrtmod_prime() [all …]
|
/optee_os-3.20.0/lib/libutee/include/ |
A D | utee_defines.h | 276 #define TEE_TIME_LT(t1, t2) \ argument 277 (((t1).seconds == (t2).seconds) ? \ 278 ((t1).millis < (t2).millis) : \ 279 ((t1).seconds < (t2).seconds)) 281 #define TEE_TIME_LE(t1, t2) \ argument 282 (((t1).seconds == (t2).seconds) ? \ 283 ((t1).millis <= (t2).millis) : \ 284 ((t1).seconds <= (t2).seconds)) 286 #define TEE_TIME_ADD(t1, t2, dst) do { \ argument 287 (dst).seconds = (t1).seconds + (t2).seconds; \ [all …]
|
/optee_os-3.20.0/ldelf/ |
A D | start_rv64.S | 35 ld t1, 0(a2) /* t1 = r_offset */ 44 add t1, a1, t1 45 ld t4, 0(t1) 48 sd t4, 0(t1)
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/prngs/ |
A D | rng_get_bytes.c | 59 clock_t t1; in s_rng_ansic() local 69 t1 = XCLOCK(); while (t1 == XCLOCK()) a ^= 1; in s_rng_ansic() 70 t1 = XCLOCK(); while (t1 == XCLOCK()) b ^= 1; in s_rng_ansic()
|
A D | chacha20.c | 187 unsigned char t1[] = { 0x59, 0xB2, 0x26, 0x95, 0x2B, 0x01, 0x8F, 0x05, 0xBE, 0xD8 }; in chacha20_prng_test() 197 …if (compare_testvector(out, 10, t1, sizeof(t1), "CHACHA-PRNG", 1)) return CRYPT_FAIL_TESTVECT… in chacha20_prng_test()
|
A D | sober128.c | 189 unsigned char t1[] = { 0x31, 0x82, 0xA7, 0xA5, 0x8B, 0xD7, 0xCB, 0x39, 0x86, 0x1A }; in sober128_test() 199 … if (compare_testvector(out, 10, t1, sizeof(t1), "SOBER128-PRNG", 1)) return CRYPT_FAIL_TESTVECTOR; in sober128_test()
|
A D | rc4.c | 190 unsigned char t1[] = { 0xE0, 0x4D, 0x9A, 0xF6, 0xA8, 0x9D, 0x77, 0x53, 0xAE, 0x09 }; in rc4_test() 200 if (compare_testvector(out, 10, t1, sizeof(t1), "RC4-PRNG", 1)) return CRYPT_FAIL_TESTVECTOR; in rc4_test()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/aes/ |
A D | aes.c | 317 t1 = in s_rijndael_ecb_encrypt() 355 t1 = in s_rijndael_ecb_encrypt() 381 Te1(LTC_BYTE(t1, 2)) ^ in s_rijndael_ecb_encrypt() 386 Te0(LTC_BYTE(t1, 3)) ^ in s_rijndael_ecb_encrypt() 395 Te3(LTC_BYTE(t1, 0)) ^ in s_rijndael_ecb_encrypt() 400 Te2(LTC_BYTE(t1, 1)) ^ in s_rijndael_ecb_encrypt() 413 (Te4_2[LTC_BYTE(t1, 2)]) ^ in s_rijndael_ecb_encrypt() 419 (Te4_3[LTC_BYTE(t1, 3)]) ^ in s_rijndael_ecb_encrypt() 429 (Te4_0[LTC_BYTE(t1, 0)]) ^ in s_rijndael_ecb_encrypt() 500 t1 = in s_rijndael_ecb_decrypt() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/ |
A D | idea.c | 104 ushort16 x0, x1, x2, x3, t0, t1; in s_process_block() local 118 t1 = t0 + (x1^x3); in s_process_block() 119 MUL(t1, m_key[i*6+5]); in s_process_block() 120 t0 += t1; in s_process_block() 121 x0 ^= t1; in s_process_block() 124 x1 = x2^t1; in s_process_block()
|
/optee_os-3.20.0/core/arch/arm/crypto/ |
A D | sha256_armv8a_ce_a64.S | 19 t1 .req v23 31 add t1.4s, v\s0\().4s, \rc\().4s 38 sha256h dg0q, dg1q, t1.4s 39 sha256h2 dg1q, dg2q, t1.4s
|
A D | sha1_armv8a_ce_a64.S | 19 t1 .req v5 35 add t1.4s, v\s0\().4s, \rc\().4s 47 sha1\op dg0q, dg2s, t1.4s
|
A D | sm3_armv8a_ce_a64.S | 44 .macro round, ab, s0, t0, t1, i 46 shl \t1\().4s, \t0\().4s, #1 47 sri \t1\().4s, \t0\().4s, #31
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/twofish/ |
A D | twofish.c | 470 ulong32 a,b,c,d,ta,tb,tc,td,t1,t2; in s_twofish_ecb_encrypt() local 498 t1 = g_func(a, skey) + t2; in s_twofish_ecb_encrypt() 499 c = RORc(c ^ (t1 + k[0]), 1); in s_twofish_ecb_encrypt() 503 t1 = g_func(c, skey) + t2; in s_twofish_ecb_encrypt() 504 a = RORc(a ^ (t1 + k[2]), 1); in s_twofish_ecb_encrypt() 544 ulong32 a,b,c,d,ta,tb,tc,td,t1,t2; in s_twofish_ecb_decrypt() local 575 t1 = g_func(c, skey) + t2; in s_twofish_ecb_decrypt() 576 a = ROLc(a, 1) ^ (t1 + k[2]); in s_twofish_ecb_decrypt() 577 b = RORc(b ^ (t2 + t1 + k[3]), 1); in s_twofish_ecb_decrypt() 580 t1 = g_func(a, skey) + t2; in s_twofish_ecb_decrypt() [all …]
|
/optee_os-3.20.0/core/arch/riscv/include/kernel/ |
A D | thread_arch.h | 53 unsigned long t1; member 81 unsigned long t1; member
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/pelican/ |
A D | pelican.c | 50 ulong32 s0, s1, s2, s3, t0, t1, t2, t3; in s_four_rounds() local 63 t1 = in s_four_rounds() 78 s0 = t0; s1 = t1; s2 = t2; s3 = t3; in s_four_rounds()
|
/optee_os-3.20.0/lib/libutee/arch/riscv/ |
A D | utee_syscalls_rv.S | 18 li t1, \num_args
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/sha2/ |
A D | sha512.c | 91 ulong64 S[8], W[80], t0, t1; in ss_sha512_compress() local 113 t1 = Sigma0(S[0]) + Maj(S[0], S[1], S[2]); in ss_sha512_compress() 121 S[0] = t0 + t1; in ss_sha512_compress() 126 t1 = Sigma0(a) + Maj(a, b, c); \ in ss_sha512_compress() 128 h = t0 + t1; in ss_sha512_compress()
|
A D | sha256.c | 66 ulong32 S[8], W[64], t0, t1; in ss_sha256_compress() local 91 t1 = Sigma0(a) + Maj(a, b, c); \ in ss_sha256_compress() 93 h = t0 + t1; in ss_sha256_compress() 103 t1 = Sigma0(a) + Maj(a, b, c); \ in ss_sha256_compress() 105 h = t0 + t1; in ss_sha256_compress()
|