Home
last modified time | relevance | path

Searched refs:k (Results 1 – 25 of 82) sorted by relevance

1234

/optee_os/core/lib/libtomcrypt/src/ciphers/
A Dcamellia.c450 R ^= F(L ^ skey->camellia.k[0]); in camellia_ecb_encrypt()
451 L ^= F(R ^ skey->camellia.k[1]); in camellia_ecb_encrypt()
452 R ^= F(L ^ skey->camellia.k[2]); in camellia_ecb_encrypt()
453 L ^= F(R ^ skey->camellia.k[3]); in camellia_ecb_encrypt()
454 R ^= F(L ^ skey->camellia.k[4]); in camellia_ecb_encrypt()
455 L ^= F(R ^ skey->camellia.k[5]); in camellia_ecb_encrypt()
472 R ^= F(L ^ skey->camellia.k[6]); in camellia_ecb_encrypt()
473 L ^= F(R ^ skey->camellia.k[7]); in camellia_ecb_encrypt()
474 R ^= F(L ^ skey->camellia.k[8]); in camellia_ecb_encrypt()
475 L ^= F(R ^ skey->camellia.k[9]); in camellia_ecb_encrypt()
[all …]
A Dmulti2.c24 static void pi2(ulong32 *p, const ulong32 *k) in pi2() argument
27 t = (p[1] + k[0]) & 0xFFFFFFFFUL; in pi2()
36 t = p[0] + k[1]; in pi3()
39 t = (t + k[2]) & 0xFFFFFFFFUL; in pi3()
48 t = (p[1] + k[3]) & 0xFFFFFFFFUL; in pi4()
63 pi2(p, k); in setup()
65 pi3(p, k); in setup()
67 pi4(p, k); in setup()
71 pi2(p, k+t); in setup()
73 pi3(p, k+t); in setup()
[all …]
A Dserpent.c433 a ^= k[4 * r + 0]; \
434 b ^= k[4 * r + 1]; \
435 c ^= k[4 * r + 2]; \
436 d ^= k[4 * r + 3]; \
440 a = k[(8-r)*4 + 0]; \
472 k[i] = t = ROLc(k[i-8] ^ k[i-5] ^ k[i-3] ^ t ^ 0x9e3779b9 ^ i, 11); in _setup_key()
474 k -= 20; in _setup_key()
481 k += 8*4; in _setup_key()
520 k += 32; in _enc_block()
545 k += 96; in _dec_block()
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/asn1/oid/
A Dpk_oid_str.c54 unsigned long j, k; in pk_oid_num_to_str() local
61 for (i = oidlen - 1, k = 0; i >= 0; i--) { in pk_oid_num_to_str()
64 tmp[k] = '0'; in pk_oid_num_to_str()
65 if (++k >= sizeof(tmp)) return CRYPT_ERROR; in pk_oid_num_to_str()
69 tmp[k] = '0' + (j % 10); in pk_oid_num_to_str()
75 tmp[k] = '.'; in pk_oid_num_to_str()
76 if (++k >= sizeof(tmp)) return CRYPT_ERROR; in pk_oid_num_to_str()
79 if (*outlen < k + 1) { in pk_oid_num_to_str()
80 *outlen = k + 1; in pk_oid_num_to_str()
83 for (j = 0; j < k; j++) OID[j] = tmp[k - j - 1]; in pk_oid_num_to_str()
[all …]
/optee_os/lib/libutils/isoc/newlib/
A Dstr-two-way.h145 k = p = 1; in critical_factorization()
153 j += k; in critical_factorization()
154 k = 1; in critical_factorization()
161 ++k; in critical_factorization()
165 k = 1; in critical_factorization()
172 k = p = 1; in critical_factorization()
180 k = p = 1; in critical_factorization()
188 j += k; in critical_factorization()
189 k = 1; in critical_factorization()
196 ++k; in critical_factorization()
[all …]
/optee_os/core/lib/libtomcrypt/src/stream/chacha/
A Dchacha_test.c28 …unsigned char k[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0… in chacha_test()
46 …if ((err = chacha_setup(&st, k, sizeof(k), 20)) != CRYPT_OK) return err; in chacha_test()
56 …if ((err = chacha_setup(&st, k, sizeof(k), 20)) != CRYPT_OK) return err; in chacha_test()
62 …if ((err = chacha_setup(&st, k, sizeof(k), 20)) != CRYPT_OK) return err; in chacha_test()
68 if ((err = chacha_memory(k, sizeof(k), 20, in chacha_test()
73 if ((err = chacha_memory(k, sizeof(k), 20, in chacha_test()
/optee_os/core/lib/libtomcrypt/src/encauth/chachapoly/
A Dchacha20poly1305_test.c21 …unsigned char k[] = { 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, 0x89, 0x8a, 0x8b, 0x… in chacha20poly1305_test()
44 if ((err = chacha20poly1305_init(&st1, k, sizeof(k))) != CRYPT_OK) return err; in chacha20poly1305_test()
61 if ((err = chacha20poly1305_init(&st2, k, sizeof(k))) != CRYPT_OK) return err; in chacha20poly1305_test()
74 …if ((err = chacha20poly1305_memory(k, sizeof(k), i12, sizeof(i12), aad, sizeof(aad), (unsigned cha… in chacha20poly1305_test()
82 if ((err = chacha20poly1305_memory(k, sizeof(k), i12, sizeof(i12), aad, sizeof(aad), in chacha20poly1305_test()
87 if ((err = chacha20poly1305_init(&st1, k, sizeof(k))) != CRYPT_OK) return err; in chacha20poly1305_test()
98 if ((err = chacha20poly1305_init(&st1, k, sizeof(k))) != CRYPT_OK) return err; in chacha20poly1305_test()
109 if ((err = chacha20poly1305_init(&st1, k, sizeof(k))) != CRYPT_OK) return err; in chacha20poly1305_test()
117 if ((err = chacha20poly1305_init(&st2, k, sizeof(k))) != CRYPT_OK) return err; in chacha20poly1305_test()
/optee_os/core/lib/libtomcrypt/src/encauth/gcm/
A Dgcm_mult_h_arm_ce.c21 uint64_t k[2]; in gcm_mult_h() local
29 k[0] = (a << 1) | (b >> 63); in gcm_mult_h()
30 k[1] = (b << 1) | (a >> 63); in gcm_mult_h()
32 k[1] ^= 0xc200000000000000UL; in gcm_mult_h()
39 pmull_ghash_update_p64(1, dg, zeroes, k, NULL); in gcm_mult_h()
41 pmull_ghash_update_p8(1, dg, zeroes, k, NULL); in gcm_mult_h()
/optee_os/core/lib/libtomcrypt/src/pk/dsa/
A Ddsa_sign_hash.c34 void *k, *kinv, *tmp; in dsa_sign_hash_raw() local
61 …if ((err = mp_init_multi(&k, &kinv, &tmp, NULL)) != CRYPT_OK) { goto ERRBUF;… in dsa_sign_hash_raw()
68 … if ((err = rand_bn_bits(k, qbits, prng, wprng)) != CRYPT_OK) { goto error; } in dsa_sign_hash_raw()
71 … if (mp_cmp_d(k, 0) != LTC_MP_GT || mp_cmp(k, key->q) != LTC_MP_LT) { goto retry; } in dsa_sign_hash_raw()
74 … if ((err = mp_gcd(k, key->q, tmp)) != CRYPT_OK) { goto error; } in dsa_sign_hash_raw()
78 …if ((err = mp_invmod(k, key->q, kinv)) != CRYPT_OK) { goto error; } in dsa_sign_hash_raw()
81 …if ((err = mp_exptmod(key->g, k, key->p, r)) != CRYPT_OK) { goto error; } in dsa_sign_hash_raw()
99 mp_clear_multi(k, kinv, tmp, NULL); in dsa_sign_hash_raw()
/optee_os/core/lib/libtomcrypt/src/stream/sosemanuk/
A Dsosemanuk_test.c24 …unsigned char k[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0… in sosemanuk_test()
34 …if ((err = sosemanuk_setup(&st, k, sizeof(k))) != CRYPT_OK) return … in sosemanuk_test()
43 if ((err = sosemanuk_setup(&st, k, sizeof(k))) != CRYPT_OK) return err; in sosemanuk_test()
49 if ((err = sosemanuk_memory(k, sizeof(k), n, sizeof(n), in sosemanuk_test()
/optee_os/core/lib/libtomcrypt/src/misc/pbes/
A Dpbes.c25 unsigned char k[32], *iv; in pbes_decrypt() local
54 iv = k + klen; in pbes_decrypt()
58 if (klen > sizeof(k)) return CRYPT_INVALID_ARG; in pbes_decrypt()
60 …->pwd, arg->pwdlen, arg->salt->data, arg->salt->size, arg->iterations, hid, k, &klen)) != CRYPT_OK… in pbes_decrypt()
61 if ((err = cbc_start(cid, iv, k, keylen, 0, &cbc)) != CRYPT_OK) goto LBL_ERROR; in pbes_decrypt()
75 zeromem(k, sizeof(k)); in pbes_decrypt()
/optee_os/core/lib/libtomcrypt/src/stream/salsa20/
A Dsalsa20_test.c27 …unsigned char k[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x… in salsa20_test()
47 …if ((err = salsa20_setup(&st, k, sizeof(k), rounds)) != CRYPT_OK) return er… in salsa20_test()
58 if ((err = salsa20_setup(&st, k, sizeof(k), rounds)) != CRYPT_OK) return err; in salsa20_test()
64 if ((err = salsa20_memory(k, sizeof(k), rounds, n, sizeof(n), counter, in salsa20_test()
/optee_os/core/lib/libtomcrypt/src/hashes/
A Dmd2.c75 int j, k; in md2_compress() local
88 for (k = 0; k < 48; k++) { in md2_compress()
89 t = (md->md2.X[k] ^= PI_SUBST[(int)(t & 255)]); in md2_compress()
152 unsigned long i, k; in md2_done() local
163 k = 16 - md->md2.curlen; in md2_done()
165 md->md2.buf[i] = (unsigned char)k; in md2_done()
/optee_os/lib/libmbedtls/mbedtls/library/
A Dxtea.c87 GET_UINT32_BE( ctx->k[i], key, i << 2 ); in mbedtls_xtea_setup()
97 uint32_t *k, v0, v1, i; in mbedtls_xtea_crypt_ecb() local
99 k = ctx->k; in mbedtls_xtea_crypt_ecb()
110 v0 += (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb()
112 v1 += (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb()
121 v1 -= (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb()
123 v0 -= (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb()
A Darc4.c65 unsigned int k; in mbedtls_arc4_setup() local
75 j = k = 0; in mbedtls_arc4_setup()
77 for( i = 0; i < 256; i++, k++ ) in mbedtls_arc4_setup()
79 if( k >= keylen ) k = 0; in mbedtls_arc4_setup()
82 j = ( j + a + key[k] ) & 0xFF; in mbedtls_arc4_setup()
/optee_os/core/crypto/
A Dsm4.c143 uint32_t k[36]; in sm4_setkey() local
151 k[0] = MK[0] ^ FK[0]; in sm4_setkey()
152 k[1] = MK[1] ^ FK[1]; in sm4_setkey()
153 k[2] = MK[2] ^ FK[2]; in sm4_setkey()
154 k[3] = MK[3] ^ FK[3]; in sm4_setkey()
157 k[i + 4] = k[i] ^ sm4CalciRK(k[i + 1] ^ k[i + 2] ^ k[i + 3] ^ in sm4_setkey()
159 SK[i] = k[i + 4]; in sm4_setkey()
/optee_os/core/lib/libtomcrypt/src/ciphers/twofish/
A Dtwofish.c252 switch (k) { in h_func()
353 int k, x, y; in _twofish_setup() local
370 k = keylen / 8; in _twofish_setup()
379 for (x = 0; x < k; x++) { in _twofish_setup()
414 if (k == 2) { in _twofish_setup()
423 } else if (k == 3) { in _twofish_setup()
445 switch (k) { in _twofish_setup()
478 const ulong32 *k; in _twofish_ecb_encrypt() local
513 k += 4; in _twofish_ecb_encrypt()
552 const ulong32 *k; in _twofish_ecb_decrypt() local
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/dh/
A Ddh_export_key.c26 void *k; in dh_export_key() local
32 k = (type == PK_PRIVATE) ? key->x : key->y; in dh_export_key()
33 len = mp_unsigned_bin_size(k); in dh_export_key()
41 return mp_to_unsigned_bin(k, out); in dh_export_key()
/optee_os/core/arch/arm/crypto/
A Daes-gcm-ce.c35 static void ghash_reflect(uint64_t h[2], const uint64_t k[2]) in ghash_reflect()
37 uint64_t b = get_be64(k); in ghash_reflect()
38 uint64_t a = get_be64(k + 1); in ghash_reflect()
49 uint64_t k[2] = { 0 }; in internal_aes_gcm_set_key() local
53 enc_key->rounds, state->ctr, k); in internal_aes_gcm_set_key()
55 ghash_reflect(state->ghash_key.h, k); in internal_aes_gcm_set_key()
57 internal_aes_gcm_gfmul(k, k, h); in internal_aes_gcm_set_key()
60 internal_aes_gcm_gfmul(k, h, h); in internal_aes_gcm_set_key()
63 internal_aes_gcm_gfmul(k, h, h); in internal_aes_gcm_set_key()
/optee_os/core/lib/libtomcrypt/
A Dsm2-dsa.c29 void *k = NULL; in sm2_ltc_dsa_sign() local
40 ltc_res = mp_init_multi(&k, &e, &r, &s, &tmp, NULL); in sm2_ltc_dsa_sign()
62 ltc_res = rand_bn_upto(k, ltc_key.dp.order, NULL, in sm2_ltc_dsa_sign()
71 ltc_res = ltc_ecc_mulmod(k, &ltc_key.dp.base, x1y1p, ltc_key.dp.A, in sm2_ltc_dsa_sign()
86 ltc_res = mp_add(r, k, tmp); in sm2_ltc_dsa_sign()
97 ltc_res = mp_add_d(ltc_key.k, 1, s); in sm2_ltc_dsa_sign()
107 ltc_res = mp_mul(r, ltc_key.k, tmp); in sm2_ltc_dsa_sign()
112 ltc_res = mp_sub(k, tmp, tmp); in sm2_ltc_dsa_sign()
132 mp_clear_multi(k, e, r, s, tmp, NULL); in sm2_ltc_dsa_sign()
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
A Decc_set_key.c30 if ((err = mp_read_unsigned_bin(key->k, (unsigned char *)in, inlen)) != CRYPT_OK) { in ecc_set_key()
33 if (mp_iszero(key->k) || (mp_cmp(key->k, key->dp.order) != LTC_MP_LT)) { in ecc_set_key()
38 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, a, prime, 1)) != CRYPT_OK) … in ecc_set_key()
A Decc_sign_hash.c105 … if ((err = mp_mulmod(pubkey.k, b, p, pubkey.k)) != CRYPT_OK) { goto error; } /* k = kb */ in ecc_sign_hash_ex()
106 … if ((err = mp_invmod(pubkey.k, p, pubkey.k)) != CRYPT_OK) { goto error; } /* k = 1/kb */ in ecc_sign_hash_ex()
107 … if ((err = mp_mulmod(key->k, r, p, s)) != CRYPT_OK) { goto error; } /* s = xr */ in ecc_sign_hash_ex()
108 … if ((err = mp_mulmod(pubkey.k, s, p, s)) != CRYPT_OK) { goto error; } /* s = xr/kb */ in ecc_sign_hash_ex()
109 … if ((err = mp_mulmod(pubkey.k, e, p, e)) != CRYPT_OK) { goto error; } /* e = e/kb */ in ecc_sign_hash_ex()
/optee_os/core/lib/libtomcrypt/src/modes/xts/
A Dxts_test.c205 int i, j, k, err, idx; in xts_test()
214 for (k = 0; k < 4; ++k) { in xts_test()
217 if (k & 0x1) { in xts_test()
220 if (k & 0x2) { in xts_test()
232 if ((k > 0) && (j == 1)) { in xts_test()
/optee_os/core/lib/libtomcrypt/src/ciphers/safer/
A Dsafer.c113 { unsigned int i, j, k; in _Safer_Expand_Userkey() local
123 k = 0; in _Safer_Expand_Userkey()
136 k = 2 * i - 1; in _Safer_Expand_Userkey()
137 while (k >= (LTC_SAFER_BLOCK_LEN + 1)) { k -= LTC_SAFER_BLOCK_LEN + 1; } in _Safer_Expand_Userkey()
141 *key++ = (ka[k] in _Safer_Expand_Userkey()
143 if (++k == (LTC_SAFER_BLOCK_LEN + 1)) { k = 0; } in _Safer_Expand_Userkey()
149 k = 2 * i; in _Safer_Expand_Userkey()
150 while (k >= (LTC_SAFER_BLOCK_LEN + 1)) { k -= LTC_SAFER_BLOCK_LEN + 1; } in _Safer_Expand_Userkey()
154 *key++ = (kb[k] in _Safer_Expand_Userkey()
156 if (++k == (LTC_SAFER_BLOCK_LEN + 1)) { k = 0; } in _Safer_Expand_Userkey()
/optee_os/core/lib/libtomcrypt/src/stream/sober128/
A Dsober128_stream.c122 #define ADDKEY(k) \ argument
123 st->R[KEYP] += (k);
162 ulong32 i, k; in sober128_stream_setup() local
182 k = BYTE2WORD((unsigned char *)&key[i]); in sober128_stream_setup()
183 ADDKEY(k); in sober128_stream_setup()
209 ulong32 i, k; in sober128_stream_setiv() local
224 k = BYTE2WORD((unsigned char *)&iv[i]); in sober128_stream_setiv()
225 ADDKEY(k); in sober128_stream_setiv()

Completed in 27 milliseconds

1234