/optee_os/core/lib/libtomcrypt/ |
A D | aes_accel.c | 101 LTC_ARGCHK(pt); in aes_ecb_encrypt_nblocks() 114 LTC_ARGCHK(pt); in aes_ecb_decrypt_nblocks() 127 return aes_ecb_encrypt_nblocks(pt, ct, 1, skey); in rijndael_ecb_encrypt() 133 return aes_ecb_decrypt_nblocks(ct, pt, 1, skey); in rijndael_ecb_decrypt() 140 LTC_ARGCHK(pt); in aes_cbc_encrypt_nblocks() 155 LTC_ARGCHK(pt); in aes_cbc_decrypt_nblocks() 170 LTC_ARGCHK(pt); in aes_ctr_encrypt_nblocks() 191 LTC_ARGCHK(pt); in aes_xts_encrypt_nblocks() 199 crypto_accel_aes_xts_enc(ct, pt, skey1->rijndael.eK, in aes_xts_encrypt_nblocks() 211 LTC_ARGCHK(pt); in aes_xts_decrypt_nblocks() [all …]
|
/optee_os/core/lib/libtomcrypt/src/ciphers/ |
A D | skipjack.c | 151 LTC_ARGCHK(pt != NULL); in _skipjack_ecb_encrypt() 156 w1 = ((unsigned)pt[0]<<8)|pt[1]; in _skipjack_ecb_encrypt() 157 w2 = ((unsigned)pt[2]<<8)|pt[3]; in _skipjack_ecb_encrypt() 158 w3 = ((unsigned)pt[4]<<8)|pt[5]; in _skipjack_ecb_encrypt() 159 w4 = ((unsigned)pt[6]<<8)|pt[7]; in _skipjack_ecb_encrypt() 215 LTC_ARGCHK(pt != NULL); in _skipjack_ecb_decrypt() 250 pt[0] = (w1>>8)&255; pt[1] = w1&255; in _skipjack_ecb_decrypt() 251 pt[2] = (w2>>8)&255; pt[3] = w2&255; in _skipjack_ecb_decrypt() 252 pt[4] = (w3>>8)&255; pt[5] = w3&255; in _skipjack_ecb_decrypt() 253 pt[6] = (w4>>8)&255; pt[7] = w4&255; in _skipjack_ecb_decrypt() [all …]
|
A D | rc2.c | 161 LTC_ARGCHK(pt != NULL); in _rc2_ecb_encrypt() 167 x76 = ((unsigned)pt[7] << 8) + (unsigned)pt[6]; in _rc2_ecb_encrypt() 168 x54 = ((unsigned)pt[5] << 8) + (unsigned)pt[4]; in _rc2_ecb_encrypt() 169 x32 = ((unsigned)pt[3] << 8) + (unsigned)pt[2]; in _rc2_ecb_encrypt() 170 x10 = ((unsigned)pt[1] << 8) + (unsigned)pt[0]; in _rc2_ecb_encrypt() 240 LTC_ARGCHK(pt != NULL); in _rc2_ecb_decrypt() 272 pt[0] = (unsigned char)x10; in _rc2_ecb_decrypt() 273 pt[1] = (unsigned char)(x10 >> 8); in _rc2_ecb_decrypt() 274 pt[2] = (unsigned char)x32; in _rc2_ecb_decrypt() 276 pt[4] = (unsigned char)x54; in _rc2_ecb_decrypt() [all …]
|
A D | noekeon.c | 121 LTC_ARGCHK(pt != NULL); in _noekeon_ecb_encrypt() 124 LOAD32H(a,&pt[0]); LOAD32H(b,&pt[4]); in _noekeon_ecb_encrypt() 125 LOAD32H(c,&pt[8]); LOAD32H(d,&pt[12]); in _noekeon_ecb_encrypt() 152 int err = _noekeon_ecb_encrypt(pt, ct, skey); in noekeon_ecb_encrypt() 175 LTC_ARGCHK(pt != NULL); in _noekeon_ecb_decrypt() 197 STORE32H(a,&pt[0]); STORE32H(b, &pt[4]); in _noekeon_ecb_decrypt() 198 STORE32H(c,&pt[8]); STORE32H(d, &pt[12]); in _noekeon_ecb_decrypt() 205 int err = _noekeon_ecb_decrypt(ct, pt, skey); in noekeon_ecb_decrypt() 222 unsigned char key[16], pt[16], ct[16]; in noekeon_test() 283 noekeon_ecb_encrypt(tests[i].pt, tmp[0], &key); in noekeon_test() [all …]
|
A D | rc6.c | 124 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in _rc6_ecb_encrypt() 132 LTC_ARGCHK(pt != NULL); in _rc6_ecb_encrypt() 134 LOAD32L(a,&pt[0]);LOAD32L(b,&pt[4]);LOAD32L(c,&pt[8]);LOAD32L(d,&pt[12]); in _rc6_ecb_encrypt() 162 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in rc6_ecb_encrypt() argument 164 int err = _rc6_ecb_encrypt(pt, ct, skey); in rc6_ecb_encrypt() 187 LTC_ARGCHK(pt != NULL); in _rc6_ecb_decrypt() 213 STORE32L(a,&pt[0]);STORE32L(b,&pt[4]);STORE32L(c,&pt[8]);STORE32L(d,&pt[12]); in _rc6_ecb_decrypt() 221 int err = _rc6_ecb_decrypt(ct, pt, skey); in rc6_ecb_decrypt() 238 unsigned char key[32], pt[16], ct[16]; in rc6_test() 285 rc6_ecb_encrypt(tests[x].pt, tmp[0], &key); in rc6_test() [all …]
|
A D | kseed.c | 261 LOAD32H(P[0], pt); in kseed_ecb_encrypt() 262 LOAD32H(P[1], pt+4); in kseed_ecb_encrypt() 263 LOAD32H(P[2], pt+8); in kseed_ecb_encrypt() 264 LOAD32H(P[3], pt+12); in kseed_ecb_encrypt() 288 STORE32H(P[2], pt); in kseed_ecb_decrypt() 289 STORE32H(P[3], pt+4); in kseed_ecb_decrypt() 290 STORE32H(P[0], pt+8); in kseed_ecb_decrypt() 291 STORE32H(P[1], pt+12); in kseed_ecb_decrypt() 313 unsigned char pt[16], ct[16], key[16]; in kseed_test() 346 kseed_ecb_encrypt(tests[x].pt, buf[0], &skey); in kseed_test() [all …]
|
A D | blowfish.c | 401 LTC_ARGCHK(pt != NULL); in _blowfish_ecb_encrypt() 413 LOAD32H(L, &pt[0]); in _blowfish_ecb_encrypt() 414 LOAD32H(R, &pt[4]); in _blowfish_ecb_encrypt() 438 int err = _blowfish_ecb_encrypt(pt, ct, skey); in blowfish_ecb_encrypt() 463 LTC_ARGCHK(pt != NULL); in _blowfish_ecb_decrypt() 491 STORE32H(L, &pt[0]); in _blowfish_ecb_decrypt() 492 STORE32H(R, &pt[4]); in _blowfish_ecb_decrypt() 499 int err = _blowfish_ecb_decrypt(ct, pt, skey); in blowfish_ecb_decrypt() 518 unsigned char key[8], pt[8], ct[8]; in blowfish_test() 546 blowfish_ecb_encrypt(tests[x].pt, tmp[0], &key); in blowfish_test() [all …]
|
A D | rc5.c | 137 LTC_ARGCHK(pt != NULL); in _rc5_ecb_encrypt() 140 LOAD32L(A, &pt[0]); in _rc5_ecb_encrypt() 141 LOAD32L(B, &pt[4]); in _rc5_ecb_encrypt() 170 int err = _rc5_ecb_encrypt(pt, ct, skey); in rc5_ecb_encrypt() 193 LTC_ARGCHK(pt != NULL); in _rc5_ecb_decrypt() 218 STORE32L(A, &pt[0]); in _rc5_ecb_decrypt() 219 STORE32L(B, &pt[4]); in _rc5_ecb_decrypt() 227 int err = _rc5_ecb_decrypt(ct, pt, skey); in rc5_ecb_decrypt() 243 unsigned char key[16], pt[8], ct[8]; in rc5_test() 275 rc5_ecb_encrypt(tests[x].pt, tmp[0], &key); in rc5_test() [all …]
|
A D | multi2.c | 155 LTC_ARGCHK(pt != NULL); in multi2_ecb_encrypt() 158 LOAD32H(p[0], pt); in multi2_ecb_encrypt() 159 LOAD32H(p[1], pt+4); in multi2_ecb_encrypt() 176 LTC_ARGCHK(pt != NULL); in multi2_ecb_decrypt() 182 STORE32H(p[0], pt); in multi2_ecb_decrypt() 183 STORE32H(p[1], pt+4); in multi2_ecb_decrypt() 195 unsigned char pt[8], ct[8]; in multi2_test() member 256 if ((err = multi2_ecb_encrypt(tests[x].pt, buf, &skey)) != CRYPT_OK) { in multi2_test() 267 if (compare_testvector(buf, 8, tests[x].pt, 8, "Multi2 Decrypt", x)) { in multi2_test() 278 if ((err = multi2_ecb_encrypt(tests[0].pt, ct, &skey)) != CRYPT_OK) { in multi2_test() [all …]
|
A D | xtea.c | 75 int xtea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in xtea_ecb_encrypt() argument 80 LTC_ARGCHK(pt != NULL); in xtea_ecb_encrypt() 84 LOAD32H(y, &pt[0]); in xtea_ecb_encrypt() 85 LOAD32H(z, &pt[4]); in xtea_ecb_encrypt() 111 int xtea_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) in xtea_ecb_decrypt() argument 116 LTC_ARGCHK(pt != NULL); in xtea_ecb_decrypt() 135 STORE32H(y, &pt[0]); in xtea_ecb_decrypt() 136 STORE32H(z, &pt[4]); in xtea_ecb_decrypt() 150 unsigned char key[16], pt[8], ct[8]; in xtea_test() 212 xtea_ecb_encrypt(tests[i].pt, tmp[0], &skey); in xtea_test() [all …]
|
/optee_os/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_cipher.h | 518 unsigned char *pt, unsigned long ptlen, 542 unsigned char *pt, unsigned long ptlen, 601 int (*accel_xts_encrypt)(const unsigned char *pt, unsigned char *ct, 616 int (*accel_xts_decrypt)(const unsigned char *ct, unsigned char *pt, 633 int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey); 634 int rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey); 643 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey); 644 int rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey); 654 int rc2_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey); 969 const unsigned char *pt, unsigned long ptlen, [all …]
|
A D | tomcrypt_mac.h | 269 const unsigned char *pt, unsigned long ptlen, 278 unsigned char *pt, 313 unsigned char *pt, 319 const unsigned char *pt, unsigned long ptlen, 327 unsigned char *pt, 381 const unsigned char *pt, unsigned long ptlen, 390 unsigned char *pt, 434 unsigned char *pt, unsigned long ptlen, 446 unsigned char *pt, unsigned long ptlen, 513 unsigned char *pt, unsigned long ptlen, [all …]
|
/optee_os/core/lib/libtomcrypt/src/stream/chacha/ |
A D | chacha_test.c | 39 …char pt[] = "Ladies and Gentlemen of the class of '99: If I could offer you only one tip for the f… in chacha_test() 43 len = strlen(pt); in chacha_test() 48 …if ((err = chacha_crypt(&st, (unsigned char*)pt, 35, out )) != CRYPT_OK) return err; in chacha_test() 49 …if ((err = chacha_crypt(&st, (unsigned char*)pt + 35, 35, out + 35)) != CRYPT_OK) return err; in chacha_test() 50 …if ((err = chacha_crypt(&st, (unsigned char*)pt + 70, 5, out + 70)) != CRYPT_OK) return err; in chacha_test() 51 …if ((err = chacha_crypt(&st, (unsigned char*)pt + 75, 5, out + 75)) != CRYPT_OK) return err; in chacha_test() 52 …if ((err = chacha_crypt(&st, (unsigned char*)pt + 80, len - 80, out + 80)) != CRYPT_OK) return err; in chacha_test() 58 …if ((err = chacha_crypt(&st, (unsigned char*)pt, len, out)) != CRYPT_OK) return err; in chacha_test() 64 …if ((err = chacha_crypt(&st, (unsigned char*)pt, len, out)) != CRYPT_OK) return err; in chacha_test() 69 … n, sizeof(n), 1, (unsigned char*)pt, len, out)) != CRYPT_OK) return err; in chacha_test() [all …]
|
/optee_os/core/lib/libtomcrypt/src/modes/ctr/ |
A D | ctr_encrypt.c | 48 static int _ctr_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CT… in _ctr_encrypt() argument 64 …FAST_TYPE_PTR_CAST((unsigned char *)ct + x)) = *(LTC_FAST_TYPE_PTR_CAST((unsigned char *)pt + x)) ^ in _ctr_encrypt() 67 pt += ctr->blocklen; in _ctr_encrypt() 74 *ct++ = *pt++ ^ ctr->pad[ctr->padlen++]; in _ctr_encrypt() 93 int ctr_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CTR *ctr) in ctr_encrypt() argument 98 LTC_ARGCHK(pt != NULL); in ctr_encrypt() 124 pt += (len / ctr->blocklen) * ctr->blocklen; in ctr_encrypt() 134 if ((err = _ctr_encrypt(pt, ct, incr, ctr)) != CRYPT_OK) { in ctr_encrypt() 137 pt += incr; in ctr_encrypt() 140 return ctr_encrypt(pt, ct, len, ctr); in ctr_encrypt() [all …]
|
/optee_os/ta/avb/ |
A D | entry.c | 85 if (pt != exp_pt) in read_rb_idx() 141 if (pt != exp_pt) in write_rb_idx() 189 if (pt != exp_pt) in read_lock_state() 227 if (pt != exp_pt) in write_lock_state() 267 if (pt != exp_pt) in write_persist_value() 317 if (pt != exp_pt) in read_persist_value() 378 uint32_t pt, in TA_InvokeCommandEntryPoint() argument 383 return read_rb_idx(pt, params); in TA_InvokeCommandEntryPoint() 385 return write_rb_idx(pt, params); in TA_InvokeCommandEntryPoint() 387 return read_lock_state(pt, params); in TA_InvokeCommandEntryPoint() [all …]
|
/optee_os/core/lib/libtomcrypt/src/ciphers/safer/ |
A D | safer.c | 254 int safer_ecb_encrypt(const unsigned char *pt, in _safer_ecb_encrypt() 262 LTC_ARGCHK(pt != NULL); in _safer_ecb_encrypt() 267 a = pt[0]; b = pt[1]; c = pt[2]; d = pt[3]; in _safer_ecb_encrypt() 268 e = pt[4]; f = pt[5]; g = pt[6]; h = pt[7]; in _safer_ecb_encrypt() 293 int safer_ecb_encrypt(const unsigned char *pt, in safer_ecb_encrypt() argument 297 int err = _safer_ecb_encrypt(pt, ct, skey); in safer_ecb_encrypt() 317 LTC_ARGCHK(pt != NULL); in _safer_ecb_decrypt() 340 pt[0] = a & 0xFF; pt[1] = b & 0xFF; in _safer_ecb_decrypt() 341 pt[2] = c & 0xFF; pt[3] = d & 0xFF; in _safer_ecb_decrypt() 342 pt[4] = e & 0xFF; pt[5] = f & 0xFF; in _safer_ecb_decrypt() [all …]
|
A D | saferp.c | 347 LTC_ARGCHK(pt != NULL); in saferp_ecb_encrypt() 353 b[x] = pt[x]; in saferp_ecb_encrypt() 434 iLT(b, pt); iROUND(pt, 30); in saferp_ecb_decrypt() 436 iLT(b, pt); iROUND(pt, 26); in saferp_ecb_decrypt() 441 iLT(b, pt); iROUND(pt, 22); in saferp_ecb_decrypt() 443 iLT(b, pt); iROUND(pt, 18); in saferp_ecb_decrypt() 446 iLT(b, pt); iROUND(pt, 14); in saferp_ecb_decrypt() 448 iLT(b, pt); iROUND(pt,10); in saferp_ecb_decrypt() 450 iLT(b, pt); iROUND(pt,6); in saferp_ecb_decrypt() 452 iLT(b, pt); iROUND(pt,2); in saferp_ecb_decrypt() [all …]
|
/optee_os/core/lib/libtomcrypt/src/stream/sosemanuk/ |
A D | sosemanuk_test.c | 30 … char pt[] = "Kilroy was here, and there. ...and everywhere!"; /* len = 46 bytes */ in sosemanuk_test() 32 len = strlen(pt); in sosemanuk_test() 36 …if ((err = sosemanuk_crypt(&st, (unsigned char*)pt, 5, out)) != CRYPT_OK) return … in sosemanuk_test() 37 …if ((err = sosemanuk_crypt(&st, (unsigned char*)pt + 5, 25, out + 5)) != CRYPT_OK) return … in sosemanuk_test() 38 …if ((err = sosemanuk_crypt(&st, (unsigned char*)pt + 30, 10, out + 30)) != CRYPT_OK) return … in sosemanuk_test() 39 …if ((err = sosemanuk_crypt(&st, (unsigned char*)pt + 40, len - 40, out + 40)) != CRYPT_OK) return … in sosemanuk_test() 45 if ((err = sosemanuk_crypt(&st, (unsigned char*)pt, len, out)) != CRYPT_OK) return err; in sosemanuk_test() 50 (unsigned char*)pt, len, out)) != CRYPT_OK) return err; in sosemanuk_test()
|
/optee_os/core/lib/libtomcrypt/src/stream/salsa20/ |
A D | salsa20_test.c | 36 char pt[] = "Kilroy was here, and there. ...and everywhere!"; /* len = 46 bytes */ in salsa20_test() 42 len = strlen(pt); in salsa20_test() 49 …if ((err = salsa20_crypt(&st, (unsigned char*)pt, 5, out)) != CRYPT_OK) return er… in salsa20_test() 50 …if ((err = salsa20_crypt(&st, (unsigned char*)pt + 5, 25, out + 5)) != CRYPT_OK) return er… in salsa20_test() 51 …if ((err = salsa20_crypt(&st, (unsigned char*)pt + 30, 10, out + 30)) != CRYPT_OK) return er… in salsa20_test() 52 …if ((err = salsa20_crypt(&st, (unsigned char*)pt + 40, len - 40, out + 40)) != CRYPT_OK) return er… in salsa20_test() 60 if ((err = salsa20_crypt(&st, (unsigned char*)pt, len, out)) != CRYPT_OK) return err; in salsa20_test() 65 (unsigned char*)pt, len, out)) != CRYPT_OK) return err; in salsa20_test()
|
/optee_os/core/lib/libtomcrypt/src/modes/xts/ |
A D | xts_decrypt.c | 60 int xts_decrypt(const unsigned char *ct, unsigned long ptlen, unsigned char *pt, unsigned char *twe… in xts_decrypt() argument 68 LTC_ARGCHK(pt != NULL); in xts_decrypt() 96 …if ((err = cipher_descriptor[xts->cipher]->accel_xts_decrypt(ct, pt, lim, tweak, &xts->key1, &xts-… in xts_decrypt() 101 pt += lim * 16; in xts_decrypt() 112 if ((err = _tweak_uncrypt(ct, pt, T, xts)) != CRYPT_OK) { in xts_decrypt() 116 pt += 16; in xts_decrypt() 133 pt[16 + i] = PP[i]; in xts_decrypt() 140 if ((err = _tweak_uncrypt(CC, pt, T, xts)) != CRYPT_OK) { in xts_decrypt()
|
A D | xts_encrypt.c | 62 int xts_encrypt(const unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *twe… in xts_encrypt() argument 70 LTC_ARGCHK(pt != NULL); in xts_encrypt() 98 …if ((err = cipher_descriptor[xts->cipher]->accel_xts_encrypt(pt, ct, lim, tweak, &xts->key1, &xts-… in xts_encrypt() 103 pt += lim * 16; in xts_encrypt() 115 if ((err = _tweak_crypt(pt, ct, T, xts)) != CRYPT_OK) { in xts_encrypt() 119 pt += 16; in xts_encrypt() 126 if ((err = _tweak_crypt(pt, CC, T, xts)) != CRYPT_OK) { in xts_encrypt() 132 PP[i] = pt[16 + i]; in xts_encrypt()
|
/optee_os/core/lib/libtomcrypt/src/stream/rc4/ |
A D | rc4_test.c | 23 const unsigned char pt[] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }; in rc4_stream_test() 28 if ((err = rc4_stream_crypt(&st, pt, sizeof(pt), buf)) != CRYPT_OK) return err; in rc4_stream_test() 33 if ((err = rc4_stream_memory(key, sizeof(key), pt, sizeof(pt), buf)) != CRYPT_OK) return err; in rc4_stream_test()
|
/optee_os/core/lib/libtomcrypt/src/modes/ecb/ |
A D | ecb_decrypt.c | 27 int ecb_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_ECB *ecb) in ecb_decrypt() argument 30 LTC_ARGCHK(pt != NULL); in ecb_decrypt() 42 …return cipher_descriptor[ecb->cipher]->accel_ecb_decrypt(ct, pt, len / cipher_descriptor[ecb->ciph… in ecb_decrypt() 45 if ((err = cipher_descriptor[ecb->cipher]->ecb_decrypt(ct, pt, &ecb->key)) != CRYPT_OK) { in ecb_decrypt() 48 pt += cipher_descriptor[ecb->cipher]->block_length; in ecb_decrypt()
|
A D | ecb_encrypt.c | 27 int ecb_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_ECB *ecb) in ecb_encrypt() argument 30 LTC_ARGCHK(pt != NULL); in ecb_encrypt() 42 …return cipher_descriptor[ecb->cipher]->accel_ecb_encrypt(pt, ct, len / cipher_descriptor[ecb->ciph… in ecb_encrypt() 45 if ((err = cipher_descriptor[ecb->cipher]->ecb_encrypt(pt, ct, &ecb->key)) != CRYPT_OK) { in ecb_encrypt() 48 pt += cipher_descriptor[ecb->cipher]->block_length; in ecb_encrypt()
|
/optee_os/core/lib/libtomcrypt/src/modes/cbc/ |
A D | cbc_encrypt.c | 28 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc) in cbc_encrypt() argument 32 LTC_ARGCHK(pt != NULL); in cbc_encrypt() 55 …return cipher_descriptor[cbc->cipher]->accel_cbc_encrypt(pt, ct, len / cbc->blocklen, cbc->IV, &cb… in cbc_encrypt() 61 …TYPE_PTR_CAST((unsigned char *)cbc->IV + x)) ^= *(LTC_FAST_TYPE_PTR_CAST((unsigned char *)pt + x)); in cbc_encrypt() 65 cbc->IV[x] ^= pt[x]; in cbc_encrypt() 86 pt += cbc->blocklen; in cbc_encrypt()
|