/optee_os/core/lib/libtomcrypt/src/modes/f8/ |
A D | f8_encrypt.c | 39 if (f8->blocklen < 0 || f8->blocklen > (int)sizeof(f8->IV) || in f8_encrypt() 40 f8->padlen < 0 || f8->padlen > (int)sizeof(f8->IV)) { in f8_encrypt() 47 if (f8->padlen == f8->blocklen) { in f8_encrypt() 49 STORE32H(f8->blockcnt, (buf+(f8->blocklen-4))); in f8_encrypt() 52 f8->IV[x] ^= f8->MIV[x] ^ buf[x]; in f8_encrypt() 54 … if ((err = cipher_descriptor[f8->cipher]->ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { in f8_encrypt() 69 … if ((err = cipher_descriptor[f8->cipher]->ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { in f8_encrypt() 80 if (f8->padlen == f8->blocklen) { in f8_encrypt() 85 f8->IV[x] ^= f8->MIV[x] ^ buf[x]; in f8_encrypt() 87 … if ((err = cipher_descriptor[f8->cipher]->ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { in f8_encrypt() [all …]
|
A D | f8_start.c | 35 int num_rounds, symmetric_F8 *f8) in f8_start() argument 43 LTC_ARGCHK(f8 != NULL); in f8_start() 56 f8->blockcnt = 0; in f8_start() 57 f8->cipher = cipher; in f8_start() 58 f8->blocklen = cipher_descriptor[cipher]->block_length; in f8_start() 59 f8->padlen = f8->blocklen; in f8_start() 79 if ((err = cipher_descriptor[f8->cipher]->ecb_encrypt(IV, f8->MIV, &f8->key)) != CRYPT_OK) { in f8_start() 80 cipher_descriptor[f8->cipher]->done(&f8->key); in f8_start() 84 zeromem(f8->IV, sizeof(f8->IV)); in f8_start() 87 cipher_descriptor[f8->cipher]->done(&f8->key); in f8_start() [all …]
|
A D | f8_setiv.c | 26 int f8_setiv(const unsigned char *IV, unsigned long len, symmetric_F8 *f8) in f8_setiv() argument 31 LTC_ARGCHK(f8 != NULL); in f8_setiv() 33 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) { in f8_setiv() 37 if (len != (unsigned long)f8->blocklen) { in f8_setiv() 42 f8->padlen = 0; in f8_setiv() 43 return cipher_descriptor[f8->cipher]->ecb_encrypt(IV, f8->IV, &f8->key); in f8_setiv()
|
A D | f8_getiv.c | 26 int f8_getiv(unsigned char *IV, unsigned long *len, const symmetric_F8 *f8) in f8_getiv() argument 30 LTC_ARGCHK(f8 != NULL); in f8_getiv() 31 if ((unsigned long)f8->blocklen > *len) { in f8_getiv() 32 *len = f8->blocklen; in f8_getiv() 35 XMEMCPY(IV, f8->IV, f8->blocklen); in f8_getiv() 36 *len = f8->blocklen; in f8_getiv()
|
A D | f8_done.c | 23 int f8_done(symmetric_F8 *f8) in f8_done() argument 26 LTC_ARGCHK(f8 != NULL); in f8_done() 28 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) { in f8_done() 31 cipher_descriptor[f8->cipher]->done(&f8->key); in f8_done()
|
A D | f8_test_mode.c | 41 symmetric_F8 f8; in f8_test_mode() 51 if ((err = f8_start(idx, IV, key, sizeof(key), salt, sizeof(salt), 0, &f8)) != CRYPT_OK) { in f8_test_mode() 56 if ((err = f8_encrypt(pt, buf, sizeof(pt), &f8)) != CRYPT_OK) { in f8_test_mode() 57 f8_done(&f8); in f8_test_mode() 60 f8_done(&f8); in f8_test_mode()
|
A D | f8_decrypt.c | 27 int f8_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_F8 *f8) in f8_decrypt() argument 31 LTC_ARGCHK(f8 != NULL); in f8_decrypt() 32 return f8_encrypt(ct, pt, len, f8); in f8_decrypt()
|
/optee_os/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_cipher.h | 946 int num_rounds, symmetric_F8 *f8); 947 int f8_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_F8 *f8); 948 int f8_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_F8 *f8); 949 int f8_getiv(unsigned char *IV, unsigned long *len, const symmetric_F8 *f8); 950 int f8_setiv(const unsigned char *IV, unsigned long len, symmetric_F8 *f8); 951 int f8_done(symmetric_F8 *f8);
|
/optee_os/out/arm/ldelf/ |
A D | ldelf.dmp | 55 10 .bss 00000018 00000000000081f8 00000000000081f8 000091f4 2**3 861 4f8: aa0103f6 mov x22, x1 2371 14f8: d65f03c0 ret 2643 17f8: eb0100ff cmp x7, x1 3467 20f8: aa1303e0 mov x0, x19 5869 39f8: 2a1403e0 mov w0, w20 6754 43f8: eb02007f cmp x3, x2 8455 00000000000055f8 <raw_realloc>: 8657 00000000000057f8 <isxdigit>: 8766 58f8: d65f03c0 ret [all …]
|
/optee_os/out/arm/ta/trusted_keys/ |
A D | f04a0fe7-1f5d-4b9b-abf7-619b85b4ce8c.dmp | 891 1f8: 4650 mov r0, sl 1201 3f8: 461a mov r2, r3 1645 000006f8 <kprintf.constprop.0>: 3544 13f8: 429a cmp r2, r3 3710 14f8: 4607 mov r7, r0 6687 000028f8 <TEE_CipherInit>: 10337 40f8: e3a06001 mov r6, #1 10449 41f8: e3a06000 mov r6, #0 10561 42f8: e3a06003 mov r6, #3 10673 43f8: e3a06000 mov r6, #0 [all …]
|
/optee_os/out/arm/core/ |
A D | tee.symb_sizes | 51 000000000e118910 00000000000003f8 t ree_fs_ta_open 81 000000000e1148ec 00000000000002f8 T ldelf_syscall_map_bin 82 000000000e141780 00000000000002f8 T der_encode_sequence_ex 410 000000000e126d44 00000000000000f8 T syscall_storage_obj_write 411 000000000e1471b8 00000000000000f8 T der_decode_teletex_string 412 000000000e146a5c 00000000000000f8 T der_decode_printable_string 413 000000000e145c00 00000000000000f8 T der_decode_ia5_string 414 000000000e10ee78 00000000000000f8 t __gcm_update_aad
|
A D | tee.dmp | 16130 e10a660: 910103f8 add x24, sp, #0x40 17030 e10af94: 910223f8 add x24, sp, #0x88 23578 e10f140: 910143f8 add x24, sp, #0x50 26601 e110fd0: 910303f8 add x24, sp, #0xc0 36373 e1174d4: 910123f8 add x24, sp, #0x48 36616 e117748: 910123f8 add x24, sp, #0x48 38171 e118700: 910283f8 add x24, sp, #0xa0 38396 e118950: 910243f8 add x24, sp, #0x90 39786 e119724: 910123f8 add x24, sp, #0x48 43838 e11c064: 910143f8 add x24, sp, #0x50 [all …]
|
/optee_os/out/arm/ta/avb/ |
A D | 023f8f1a-292a-432b-8fc4-de8471358067.dmp | 739 f8: 3604 adds r6, #4 1051 2f8: 447b add r3, pc 6053 2442: 44f8 add r8, pc 6308 25f8: 460a mov r2, r1 6621 27f8: 4478 add r0, pc 6758 28f8: 4478 add r0, pc 7921 316c: 44f8 add r8, pc 8140 32f8: 4478 add r0, pc 9074 3970: 44f8 add r8, pc 10733 44f8: 4641 mov r1, r8 [all …]
|
/optee_os/out/arm/ta/pkcs11/ |
A D | fd02c9da-306c-48c7-a49c-bbd827ae86ee.dmp | 1329 1f8: 4628 mov r0, r5 3827 11f8: 460c mov r4, r1 6052 000020f8 <get_u32_attribute>: 6603 24ba: 44f8 add r8, pc 6915 26f8: 4630 mov r0, r6 7271 29f8: 4604 mov r4, r0 10482 41f8: 2800 cmp r0, #0 10969 000044f8 <pkcs11_init>: 11311 46f8: 4638 mov r0, r7 38838 102f8: bf2c ite cs [all …]
|