/optee_os/core/drivers/crypto/caam/utils/ |
A D | utils_sgt_v1.c | 22 SGT_TRACE("SGT[%d]->ptr_ms = %" PRIx32, idx, sgt->sgt[idx].v1.ptr_ms); in sgt_entry_trace() 23 SGT_TRACE("SGT[%d]->ptr_ls = %" PRIx32, idx, sgt->sgt[idx].v1.ptr_ls); in sgt_entry_trace() 25 sgt->sgt[idx].v1.len_f_e); in sgt_entry_trace() 33 len_f_e = caam_read_val32(&sgt->v1.len_f_e); in sgt_entry_offset() 38 caam_write_val32(&sgt->v1.len_f_e, len_f_e); in sgt_entry_offset() 39 caam_write_val32(&sgt->v1.offset, offset); in sgt_entry_offset() 47 caam_write_val32(&sgt->v1.ptr_ls, paddr); in caam_sgt_set_entry() 49 caam_write_val32(&sgt->v1.ptr_ms, paddr >> 32); in caam_sgt_set_entry() 51 caam_write_val32(&sgt->v1.ptr_ms, 0); in caam_sgt_set_entry() 58 caam_write_val32(&sgt->v1.len_f_e, len_f_e); in caam_sgt_set_entry() [all …]
|
/optee_os/core/arch/arm/crypto/ |
A D | aes_modes_armv8a_ce_a64.S | 330 eor v1.16b, v1.16b, v0.16b 376 eor v1.16b, v1.16b, v4.16b 437 eor v1.16b, v6.16b, v1.16b 520 eor v1.16b, v1.16b, v5.16b 523 eor v1.16b, v1.16b, v5.16b 536 eor v1.16b, v1.16b, v5.16b 543 eor v1.16b, v1.16b, v5.16b 601 eor v1.16b, v1.16b, v5.16b 604 eor v1.16b, v1.16b, v5.16b 617 eor v1.16b, v1.16b, v5.16b [all …]
|
A D | sha256_armv8a_ce_a64.S | 80 add_update 0, v1, 16, 17, 18, 19
|
A D | sha1_armv8a_ce_a64.S | 14 k1 .req v1
|
A D | ghash-ce-core_a64.S | 21 SHASH2 .req v1 643 dup v1.4s, w0 645 aese v0.16b, v1.16b
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | xtea.c | 97 uint32_t *k, v0, v1, i; in mbedtls_xtea_crypt_ecb() local 102 GET_UINT32_BE( v1, input, 4 ); in mbedtls_xtea_crypt_ecb() 110 v0 += (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb() 112 v1 += (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb() 121 v1 -= (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb() 123 v0 -= (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb() 128 PUT_UINT32_BE( v1, output, 4 ); in mbedtls_xtea_crypt_ecb()
|
A D | bignum.c | 1190 size_t i, v0, v1; in mbedtls_mpi_shift_r() local 1195 v1 = count & (biL - 1); in mbedtls_mpi_shift_r() 1197 if( v0 > X->n || ( v0 == X->n && v1 > 0 ) ) in mbedtls_mpi_shift_r() 1215 if( v1 > 0 ) in mbedtls_mpi_shift_r() 1219 r1 = X->p[i - 1] << (biL - v1); in mbedtls_mpi_shift_r() 1220 X->p[i - 1] >>= v1; in mbedtls_mpi_shift_r()
|
A D | cipher.c | 83 static int mbedtls_constant_time_memcmp( const void *v1, const void *v2, in mbedtls_constant_time_memcmp() argument 86 const unsigned char *p1 = (const unsigned char*) v1; in mbedtls_constant_time_memcmp()
|
/optee_os/lib/libutils/isoc/arch/arm/ |
A D | arm32_aeabi_ldivmod.c | 60 unsigned long long v1; member 68 unsigned long long denominator = asm_ulqr->v1; in __ul_divmod() 74 asm_ulqr->v1 = qr.r; in __ul_divmod() 79 long long v1; member 87 long long denominator = asm_lqr->v1; in __l_divmod() 103 asm_lqr->v1 = qr.r; in __l_divmod()
|
A D | setjmp_a32.S | 205 stmea a1!, { v1-v7, fp, ip, lr } 207 stmea a1!, { v1-v7, fp, ip} 256 ldmfd a1!, { v1-v7, fp, ip, lr } 259 ldmfd a1!, { v1-v7, fp, ip }
|
/optee_os/lib/libutils/isoc/arch/arm/softfloat/source/include/ |
A D | primitiveTypes.h | 71 #define INIT_UINTM4( v3, v2, v1, v0 ) { v0, v1, v2, v3 } argument 82 #define INIT_UINTM4( v3, v2, v1, v0 ) { v3, v2, v1, v0 } argument
|
/optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_recover_key.c | 39 void *r, *s, *v, *w, *t1, *t2, *u1, *u2, *v1, *v2, *e, *x, *y, *a_plus3; in ecc_recover_key() local 56 …if ((err = mp_init_multi(&r, &s, &v, &w, &t1, &t2, &u1, &u2, &v1, &v2, &e, &x, &y, &a_plus3, NULL)… in ecc_recover_key() 203 …if ((err = mp_mulmod(s, w, p, v1)) != CRYPT_OK) … in ecc_recover_key() 230 …if ((err = ltc_mp.ecc_mul2add(mR, v1, mG, v2, mQ, ma, m)) != CRYPT_OK) … in ecc_recover_key() 261 mp_clear_multi(a_plus3, y, x, e, v2, v1, u2, u1, t2, t1, w, v, s, r, NULL); in ecc_recover_key()
|
/optee_os/core/lib/libtomcrypt/src/stream/sosemanuk/ |
A D | sosemanuk.c | 661 STORE32L(u ## x1 ^ v1, st->buf + ooff + 4); \ in _sosemanuk_internal() 679 ulong32 v0, v1, v2, v3; in _sosemanuk_internal() local 682 STEP(01, 02, 03, 04, 05, 06, 07, 08, 09, 00, v1, u1); in _sosemanuk_internal() 687 STEP(05, 06, 07, 08, 09, 00, 01, 02, 03, 04, v1, u1); in _sosemanuk_internal() 692 STEP(09, 00, 01, 02, 03, 04, 05, 06, 07, 08, v1, u1); in _sosemanuk_internal() 697 STEP(03, 04, 05, 06, 07, 08, 09, 00, 01, 02, v1, u1); in _sosemanuk_internal() 702 STEP(07, 08, 09, 00, 01, 02, 03, 04, 05, 06, v1, u1); in _sosemanuk_internal()
|
/optee_os/core/arch/arm/dts/ |
A D | stm32mp157a-dk1.dts | 7 /dts-v1/;
|
A D | stm32mp157c-dk2.dts | 7 /dts-v1/;
|
A D | fsl-lx2160a-rdb.dts | 7 /dts-v1/;
|
A D | fsl-lx2160a-qds.dts | 7 /dts-v1/;
|
A D | stm32mp157c-ev1.dts | 6 /dts-v1/;
|
A D | stm32mp157c-ed1.dts | 6 /dts-v1/;
|
A D | at91-sama5d27_som1_ek.dts | 10 /dts-v1/;
|
A D | at91-sama5d2_xplained.dts | 8 /dts-v1/;
|
/optee_os/core/arch/arm/plat-totalcompute/fdts/ |
A D | optee_sp_manifest.dts | 9 /dts-v1/;
|
/optee_os/core/drivers/crypto/caam/include/ |
A D | caam_utils_sgt.h | 50 } v1; member
|
/optee_os/ |
A D | CHANGELOG.md | 669 v1.1.0.4. 809 v1.1.0.4. 939 v1.1.0.4. 1052 v1.1.0.4. 1118 …s | optee_test with tests from the GlobalPlatform™ TEE Initial Configuration Test Suite v1.1.0.4. | 1278 * GlobalPlatform™ TEE Internal Core API Specification v1.1, 1429 * GlobalPlatform Client API v1.0 support. 1431 * GlobalPlatform Internal API v1.0 support. 1433 * GlobalPlatform Secure Elements v1.0 support. 1483 …sts | optee_test with tests from the GlobalPlatform™ TEE Initial Configuration Test Suite v1.0.0. | [all …]
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 1288 * Fix timing variations and memory access variations in RSA PKCS#1 v1.5 2018 * Don't print X.509 version tag for v1 CRT's, and omit extensions for 2169 * Tighten parsing of RSA PKCS#1 v1.5 signatures, to avoid a 2569 * Add countermeasure against Lenstra's RSA-CRT attack for PKCS#1 v1.5 3234 * Fixed bug in RSA PKCS#1 v1.5 "reversed" operations 3410 * Support faulty X509 v1 certificates with extensions 3551 * Fix bug in RSA PKCS#1 v1.5 "reversed" operations 3664 rsa_pkcs1_sign() and rsa_pkcs1_verify() to separate PKCS#1 v1.5 and 4092 * Added support for TLS v1.1 4207 one way hash functions with the PKCS#1 v1.5 signing and [all …]
|