Home
last modified time | relevance | path

Searched refs:v2 (Results 1 – 11 of 11) sorted by relevance

/optee_os/core/drivers/crypto/caam/utils/
A Dutils_sgt_v2.c19 SGT_TRACE("SGT[%d]->w1 = %" PRIx64, idx, sgt->sgt[idx].v2.w1); in sgt_entry_trace()
20 SGT_TRACE("SGT[%d]->w2 = %" PRIx64, idx, sgt->sgt[idx].v2.w2); in sgt_entry_trace()
29 w2 = caam_read_val64(&sgt->v2.w2); in sgt_entry_offset()
48 caam_write_val64(&sgt->v2.w2, w2); in sgt_entry_offset()
57 caam_write_val64(&sgt->v2.w1, paddr); in caam_sgt_set_entry()
63 caam_write_val64(&sgt->v2.w2, w2); in caam_sgt_set_entry()
/optee_os/lib/libutils/isoc/arch/arm/softfloat/source/include/
A DprimitiveTypes.h71 #define INIT_UINTM4( v3, v2, v1, v0 ) { v0, v1, v2, v3 } argument
82 #define INIT_UINTM4( v3, v2, v1, v0 ) { v3, v2, v1, v0 } argument
/optee_os/core/arch/arm/crypto/
A Daes_modes_armv8a_ce_a64.S332 eor v2.16b, v2.16b, v1.16b
334 eor v3.16b, v3.16b, v2.16b
372 mov v6.16b, v2.16b
378 eor v2.16b, v2.16b, v5.16b
425 mov v2.16b, v4.16b
431 mov v2.s[3], w8
438 eor v2.16b, v7.16b, v2.16b
537 eor v2.16b, v2.16b, v6.16b
544 eor v2.16b, v2.16b, v6.16b
618 eor v2.16b, v2.16b, v6.16b
[all …]
A Dsha256_armv8a_ce_a64.S81 add_update 1, v2, 17, 18, 19, 16
A Dsha1_armv8a_ce_a64.S15 k2 .req v2
A Dghash-ce-core_a64.S22 T1 .req v2
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
A Decc_recover_key.c39 void *r, *s, *v, *w, *t1, *t2, *u1, *u2, *v1, *v2, *e, *x, *y, *a_plus3; in ecc_recover_key() local
56 …if ((err = mp_init_multi(&r, &s, &v, &w, &t1, &t2, &u1, &u2, &v1, &v2, &e, &x, &y, &a_plus3, NULL)… in ecc_recover_key()
205 …if ((err = mp_mulmod(e, w, p, v2)) != CRYPT_OK) … in ecc_recover_key()
206 …if ((err = mp_submod(p, v2, p, v2)) != CRYPT_OK) … in ecc_recover_key()
230 …if ((err = ltc_mp.ecc_mul2add(mR, v1, mG, v2, mQ, ma, m)) != CRYPT_OK) … in ecc_recover_key()
261 mp_clear_multi(a_plus3, y, x, e, v2, v1, u2, u1, t2, t1, w, v, s, r, NULL); in ecc_recover_key()
/optee_os/core/lib/libtomcrypt/src/stream/sosemanuk/
A Dsosemanuk.c662 STORE32L(u ## x2 ^ v2, st->buf + ooff + 8); \ in _sosemanuk_internal()
679 ulong32 v0, v1, v2, v3; in _sosemanuk_internal() local
683 STEP(02, 03, 04, 05, 06, 07, 08, 09, 00, 01, v2, u2); in _sosemanuk_internal()
688 STEP(06, 07, 08, 09, 00, 01, 02, 03, 04, 05, v2, u2); in _sosemanuk_internal()
693 STEP(00, 01, 02, 03, 04, 05, 06, 07, 08, 09, v2, u2); in _sosemanuk_internal()
698 STEP(04, 05, 06, 07, 08, 09, 00, 01, 02, 03, v2, u2); in _sosemanuk_internal()
703 STEP(08, 09, 00, 01, 02, 03, 04, 05, 06, 07, v2, u2); in _sosemanuk_internal()
/optee_os/core/drivers/crypto/caam/include/
A Dcaam_utils_sgt.h54 } v2; member
/optee_os/lib/libmbedtls/mbedtls/library/
A Dcipher.c83 static int mbedtls_constant_time_memcmp( const void *v1, const void *v2, in mbedtls_constant_time_memcmp() argument
87 const unsigned char *p2 = (const unsigned char*) v2; in mbedtls_constant_time_memcmp()
/optee_os/lib/libmbedtls/mbedtls/
A DChangeLog1824 algorithms family when encrypting private keys using PKCS#5 v2.0.
2213 https://arxiv.org/abs/1702.08719v2.
2404 required by PKCS1 v2.2
3254 * Fix typo in rsa_copy() that impacted PKCS#1 v2 contexts
3665 PKCS#1 v2.1 functions
3731 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
3858 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
4003 * Added support for PKCS#1 v2.1 encoding and thus support

Completed in 19 milliseconds