/optee_os/core/drivers/crypto/caam/utils/ |
A D | utils_sgt_v2.c | 19 SGT_TRACE("SGT[%d]->w1 = %" PRIx64, idx, sgt->sgt[idx].v2.w1); in sgt_entry_trace() 20 SGT_TRACE("SGT[%d]->w2 = %" PRIx64, idx, sgt->sgt[idx].v2.w2); in sgt_entry_trace() 29 w2 = caam_read_val64(&sgt->v2.w2); in sgt_entry_offset() 48 caam_write_val64(&sgt->v2.w2, w2); in sgt_entry_offset() 57 caam_write_val64(&sgt->v2.w1, paddr); in caam_sgt_set_entry() 63 caam_write_val64(&sgt->v2.w2, w2); in caam_sgt_set_entry()
|
/optee_os/lib/libutils/isoc/arch/arm/softfloat/source/include/ |
A D | primitiveTypes.h | 71 #define INIT_UINTM4( v3, v2, v1, v0 ) { v0, v1, v2, v3 } argument 82 #define INIT_UINTM4( v3, v2, v1, v0 ) { v3, v2, v1, v0 } argument
|
/optee_os/core/arch/arm/crypto/ |
A D | aes_modes_armv8a_ce_a64.S | 332 eor v2.16b, v2.16b, v1.16b 334 eor v3.16b, v3.16b, v2.16b 372 mov v6.16b, v2.16b 378 eor v2.16b, v2.16b, v5.16b 425 mov v2.16b, v4.16b 431 mov v2.s[3], w8 438 eor v2.16b, v7.16b, v2.16b 537 eor v2.16b, v2.16b, v6.16b 544 eor v2.16b, v2.16b, v6.16b 618 eor v2.16b, v2.16b, v6.16b [all …]
|
A D | sha256_armv8a_ce_a64.S | 81 add_update 1, v2, 17, 18, 19, 16
|
A D | sha1_armv8a_ce_a64.S | 15 k2 .req v2
|
A D | ghash-ce-core_a64.S | 22 T1 .req v2
|
/optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_recover_key.c | 39 void *r, *s, *v, *w, *t1, *t2, *u1, *u2, *v1, *v2, *e, *x, *y, *a_plus3; in ecc_recover_key() local 56 …if ((err = mp_init_multi(&r, &s, &v, &w, &t1, &t2, &u1, &u2, &v1, &v2, &e, &x, &y, &a_plus3, NULL)… in ecc_recover_key() 205 …if ((err = mp_mulmod(e, w, p, v2)) != CRYPT_OK) … in ecc_recover_key() 206 …if ((err = mp_submod(p, v2, p, v2)) != CRYPT_OK) … in ecc_recover_key() 230 …if ((err = ltc_mp.ecc_mul2add(mR, v1, mG, v2, mQ, ma, m)) != CRYPT_OK) … in ecc_recover_key() 261 mp_clear_multi(a_plus3, y, x, e, v2, v1, u2, u1, t2, t1, w, v, s, r, NULL); in ecc_recover_key()
|
/optee_os/core/lib/libtomcrypt/src/stream/sosemanuk/ |
A D | sosemanuk.c | 662 STORE32L(u ## x2 ^ v2, st->buf + ooff + 8); \ in _sosemanuk_internal() 679 ulong32 v0, v1, v2, v3; in _sosemanuk_internal() local 683 STEP(02, 03, 04, 05, 06, 07, 08, 09, 00, 01, v2, u2); in _sosemanuk_internal() 688 STEP(06, 07, 08, 09, 00, 01, 02, 03, 04, 05, v2, u2); in _sosemanuk_internal() 693 STEP(00, 01, 02, 03, 04, 05, 06, 07, 08, 09, v2, u2); in _sosemanuk_internal() 698 STEP(04, 05, 06, 07, 08, 09, 00, 01, 02, 03, v2, u2); in _sosemanuk_internal() 703 STEP(08, 09, 00, 01, 02, 03, 04, 05, 06, 07, v2, u2); in _sosemanuk_internal()
|
/optee_os/core/drivers/crypto/caam/include/ |
A D | caam_utils_sgt.h | 54 } v2; member
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | cipher.c | 83 static int mbedtls_constant_time_memcmp( const void *v1, const void *v2, in mbedtls_constant_time_memcmp() argument 87 const unsigned char *p2 = (const unsigned char*) v2; in mbedtls_constant_time_memcmp()
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 1824 algorithms family when encrypting private keys using PKCS#5 v2.0. 2213 https://arxiv.org/abs/1702.08719v2. 2404 required by PKCS1 v2.2 3254 * Fix typo in rsa_copy() that impacted PKCS#1 v2 contexts 3665 PKCS#1 v2.1 functions 3731 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1 3858 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1 4003 * Added support for PKCS#1 v2.1 encoding and thus support
|