/optee_os/core/lib/libtomcrypt/src/ciphers/ |
A D | blowfish.c | 377 #define F(x) ((S1[LTC_BYTE(x,3)] + S2[LTC_BYTE(x,2)]) ^ S3[LTC_BYTE(x,1)]) + S4[LTC_BYTE(x,0)] 398 const ulong32 *S1, *S2, *S3, *S4; in _blowfish_ecb_encrypt() local 406 S1 = skey->blowfish.S[0]; in _blowfish_ecb_encrypt() 460 const ulong32 *S1, *S2, *S3, *S4; in _blowfish_ecb_decrypt() local 468 S1 = skey->blowfish.S[0]; in _blowfish_ecb_decrypt()
|
A D | cast5.c | 32 static const ulong32 S1[256] = { variable 512 return ((S1[LTC_BYTE(I, 3)] ^ S2[LTC_BYTE(I,2)]) - S3[LTC_BYTE(I,1)]) + S4[LTC_BYTE(I,0)]; in FI() 520 return ((S1[LTC_BYTE(I, 3)] - S2[LTC_BYTE(I,2)]) + S3[LTC_BYTE(I,1)]) ^ S4[LTC_BYTE(I,0)]; in FII() 528 return ((S1[LTC_BYTE(I, 3)] + S2[LTC_BYTE(I,2)]) ^ S3[LTC_BYTE(I,1)]) - S4[LTC_BYTE(I,0)]; in FIII()
|
/optee_os/core/lib/libtomcrypt/ |
A D | sm2-kep.c | 358 uint8_t S1[TEE_SM3_HASH_SIZE]; in sm2_kep_derive() local 365 res = sm2_kep_compute_S(S1, sizeof(S1), flag, U, in sm2_kep_derive() 372 if (consttime_memcmp(S1, p->conf_in, sizeof(S1))) { in sm2_kep_derive()
|
/optee_os/lib/libmbedtls/core/ |
A D | sm2-kep.c | 451 uint8_t S1[TEE_SM3_HASH_SIZE] = { }; in crypto_acipher_sm2_kep_derive() local 458 res = sm2_kep_compute_S(S1, sizeof(S1), flag, &U, in crypto_acipher_sm2_kep_derive() 465 if (consttime_memcmp(S1, p->conf_in, sizeof(S1))) { in crypto_acipher_sm2_kep_derive()
|
/optee_os/core/lib/libtomcrypt/src/ciphers/twofish/ |
A D | twofish.c | 279 #define S1 skey->twofish.S[0] macro 286 #define g_func(x, dum) (S1[LTC_BYTE(x,0)] ^ S2[LTC_BYTE(x,1)] ^ S3[LTC_BYTE(x,2)] ^ S4[LTC_BYTE(x,… 287 #define g1_func(x, dum) (S2[LTC_BYTE(x,0)] ^ S3[LTC_BYTE(x,1)] ^ S4[LTC_BYTE(x,2)] ^ S1[LTC_BYTE(x,… 481 const ulong32 *S1, *S2, *S3, *S4; in _twofish_ecb_encrypt() local 489 S1 = skey->twofish.S[0]; in _twofish_ecb_encrypt() 555 const ulong32 *S1, *S2, *S3, *S4; in _twofish_ecb_decrypt() local 563 S1 = skey->twofish.S[0]; in _twofish_ecb_decrypt()
|
/optee_os/core/lib/libtomcrypt/src/stream/sosemanuk/ |
A D | sosemanuk.c | 89 #define S1(r0, r1, r2, r3, r4) do { \ macro 227 #define SKS1 SKS(S1, 0, 1, 2, 3, 2, 0, 3, 1) in sosemanuk_setup() 397 FSS(4, S1, 1, 4, 2, 0, 3, 2, 1, 0, 4); in sosemanuk_setiv() 405 FSS(36, S1, 1, 3, 2, 4, 0, 2, 1, 4, 3); in sosemanuk_setiv() 418 FSS(68, S1, 1, 0, 2, 3, 4, 2, 1, 3, 0); in sosemanuk_setiv()
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | sha512.c | 248 #define S1(x) (ROTR(x,19) ^ ROTR(x,61) ^ SHR(x, 6)) in mbedtls_internal_sha512_process() macro 276 local.W[i] = S1(local.W[i - 2]) + local.W[i - 7] + in mbedtls_internal_sha512_process() 297 local.W[i] = S1(local.W[i - 2]) + local.W[i - 7] + in mbedtls_internal_sha512_process()
|
A D | sha256.c | 174 #define S1(x) (ROTR(x,17) ^ ROTR(x,19) ^ SHR(x,10)) macro 184 local.W[t] = S1(local.W[(t) - 2]) + local.W[(t) - 7] + \
|
A D | ssl_tls.c | 403 const unsigned char *S1, *S2; in tls1_prf() local 422 S1 = secret; in tls1_prf() 444 mbedtls_md_hmac_starts( &md_ctx, S1, hs ); in tls1_prf()
|