/optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_set_curve_internal.c | 27 key->dp.oidlen = 0; in _ecc_oid_lookup() 42 pk_oid_str_to_num(curve->OID, key->dp.oid, &key->dp.oidlen); in _ecc_oid_lookup() 54 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve() 55 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_copy_curve() 56 &key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, in ecc_copy_curve() 73 for (i = 0; i < key->dp.oidlen; i++) key->dp.oid[i] = srckey->dp.oid[i]; in ecc_copy_curve() 82 ecc_free(key); in ecc_copy_curve() 98 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis() 99 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_set_curve_from_mpis() 100 &key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, in ecc_set_curve_from_mpis() [all …]
|
A D | ecc_set_curve.c | 15 int ecc_set_curve(const ltc_ecc_curve *cu, ecc_key *key) in ecc_set_curve() argument 19 LTC_ARGCHK(key != NULL); in ecc_set_curve() 22 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve() 23 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_set_curve() 24 &key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, in ecc_set_curve() 38 key->dp.cofactor = cu->cofactor; in ecc_set_curve() 39 key->dp.size = mp_unsigned_bin_size(key->dp.prime); in ecc_set_curve() 41 key->dp.oidlen = 16; in ecc_set_curve() 42 if ((err = pk_oid_str_to_num(cu->OID, key->dp.oid, &key->dp.oidlen)) != CRYPT_OK) { goto error; } in ecc_set_curve() 47 ecc_free(key); in ecc_set_curve() [all …]
|
A D | ecc_make_key.c | 28 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) in ecc_make_key() argument 32 if ((err = ecc_set_curve_by_size(keysize, key)) != CRYPT_OK) { return err; } in ecc_make_key() 40 if ((err = ecc_set_curve(cu, key)) != CRYPT_OK) { return err; } in ecc_make_key_ex() 41 if ((err = ecc_generate_key(prng, wprng, key)) != CRYPT_OK) { return err; } in ecc_make_key_ex() 45 int ecc_generate_key(prng_state *prng, int wprng, ecc_key *key) in ecc_generate_key() argument 50 LTC_ARGCHK(key != NULL); in ecc_generate_key() 51 LTC_ARGCHK(key->dp.size > 0); in ecc_generate_key() 60 if ((err = rand_bn_upto(key->k, key->dp.order, prng, wprng)) != CRYPT_OK) { in ecc_generate_key() 65 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, key->dp.A, key->dp.prime, 1)) != … in ecc_generate_key() 68 key->type = PK_PRIVATE; in ecc_generate_key() [all …]
|
A D | ecc_set_key.c | 15 int ecc_set_key(const unsigned char *in, unsigned long inlen, int type, ecc_key *key) in ecc_set_key() argument 20 LTC_ARGCHK(key != NULL); in ecc_set_key() 24 prime = key->dp.prime; in ecc_set_key() 25 a = key->dp.A; in ecc_set_key() 26 b = key->dp.B; in ecc_set_key() 33 if (mp_iszero(key->k) || (mp_cmp(key->k, key->dp.order) != LTC_MP_LT)) { in ecc_set_key() 38 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, a, prime, 1)) != CRYPT_OK) … in ecc_set_key() 42 …if ((err = ltc_ecc_import_point(in, inlen, prime, a, b, key->pubkey.x, key->pubkey.y)) != CRYPT_OK… in ecc_set_key() 51 if ((err = ltc_ecc_verify_key(key)) != CRYPT_OK) { in ecc_set_key() 55 key->type = type; in ecc_set_key() [all …]
|
A D | ecc_free.c | 24 void ecc_free(ecc_key *key) in ecc_free() argument 26 LTC_ARGCHKVD(key != NULL); in ecc_free() 28 mp_cleanup_multi(&key->dp.prime, &key->dp.order, in ecc_free() 29 &key->dp.A, &key->dp.B, in ecc_free() 30 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_free() 31 &key->pubkey.x, &key->pubkey.y, &key->pubkey.z, in ecc_free() 32 &key->k, NULL); in ecc_free()
|
/optee_os/core/lib/libtomcrypt/src/pk/rsa/ |
A D | rsa_import.c | 34 LTC_ARGCHK(key != NULL); in rsa_import() 38 if ((err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, in rsa_import() 39 &key->dP, &key->qP, &key->p, &key->q, NULL)) != CRYPT_OK) { in rsa_import() 65 key->type = PK_PUBLIC; in rsa_import() 78 if (mp_cmp_d(key->N, 0) == LTC_MP_EQ) { in rsa_import() 85 LTC_ASN1_INTEGER, 1UL, key->N, in rsa_import() 86 LTC_ASN1_INTEGER, 1UL, key->e, in rsa_import() 98 key->type = PK_PRIVATE; in rsa_import() 99 } else if (mp_cmp_d(key->N, 1) == LTC_MP_EQ) { in rsa_import() 111 key->type = PK_PUBLIC; in rsa_import() [all …]
|
A D | rsa_set.c | 30 rsa_key *key) in rsa_set_key() argument 34 LTC_ARGCHK(key != NULL); in rsa_set_key() 39 …err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP, &key->p, &key->q, NUL… in rsa_set_key() 46 key->type = PK_PRIVATE; in rsa_set_key() 49 key->type = PK_PUBLIC; in rsa_set_key() 54 rsa_free(key); in rsa_set_key() 72 rsa_key *key) in rsa_set_factors() argument 76 LTC_ARGCHK(key != NULL); in rsa_set_factors() 88 rsa_free(key); in rsa_set_factors() 113 LTC_ARGCHK(key != NULL); in rsa_set_crt_params() [all …]
|
A D | rsa_exptmod.c | 32 const rsa_key *key) in rsa_exptmod() argument 44 LTC_ARGCHK(key != NULL); in rsa_exptmod() 68 if (mp_cmp(key->N, tmp) == LTC_MP_LT) { in rsa_exptmod() 83 err = mp_invmod(rnd, key->N, rndi); in rsa_exptmod() 89 err = mp_exptmod( rnd, key->e, key->N, rnd); in rsa_exptmod() 101 has_crt_parameters = (key->p != NULL) && (mp_get_digit_count(key->p) != 0) && in rsa_exptmod() 102 (key->q != NULL) && (mp_get_digit_count(key->q) != 0) && in rsa_exptmod() 103 (key->dP != NULL) && (mp_get_digit_count(key->dP) != 0) && in rsa_exptmod() 104 (key->dQ != NULL) && (mp_get_digit_count(key->dQ) != 0) && in rsa_exptmod() 105 (key->qP != NULL) && (mp_get_digit_count(key->qP) != 0); in rsa_exptmod() [all …]
|
A D | rsa_make_key.c | 25 LTC_ARGCHK(key != NULL); in s_rsa_make_key() 58 …if ((err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP, &key->p, &key->q… in s_rsa_make_key() 63 …if ((err = mp_invmod( key->e, tmp1, key->d)) != CRYPT_OK) { goto errkey; } /* key->d = 1… in s_rsa_make_key() 70 …if ((err = mp_mod( key->d, tmp1, key->dP)) != CRYPT_OK) { goto errkey; } /* dP = d mod… in s_rsa_make_key() 71 …if ((err = mp_mod( key->d, tmp2, key->dQ)) != CRYPT_OK) { goto errkey; } /* dQ = d mod… in s_rsa_make_key() 78 key->type = PK_PRIVATE; in s_rsa_make_key() 84 rsa_free(key); in s_rsa_make_key() 99 int rsa_make_key(prng_state *prng, int wprng, int size, long e, rsa_key *key) in rsa_make_key() argument 113 err = s_rsa_make_key(prng, wprng, size, tmp_e, key); in rsa_make_key() 141 err = rsa_make_key_bn_e(prng, wprng, size, tmp_e, key); in rsa_make_key_ubin_e() [all …]
|
A D | rsa_import_x509.c | 19 static int _rsa_decode(const unsigned char *in, unsigned long inlen, rsa_key *key) in _rsa_decode() argument 23 LTC_ASN1_INTEGER, 1UL, key->N, in _rsa_decode() 24 LTC_ASN1_INTEGER, 1UL, key->e, in _rsa_decode() 35 int rsa_import_x509(const unsigned char *in, unsigned long inlen, rsa_key *key) in rsa_import_x509() argument 40 LTC_ARGCHK(key != NULL); in rsa_import_x509() 44 if ((err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, in rsa_import_x509() 45 &key->dP, &key->qP, &key->p, &key->q, NULL)) != CRYPT_OK) { in rsa_import_x509() 52 … (public_key_decode_cb)_rsa_decode, key)) != CRYPT_OK) { in rsa_import_x509() 53 rsa_free(key); in rsa_import_x509() 55 key->type = PK_PUBLIC; in rsa_import_x509()
|
A D | rsa_import_pkcs8.c | 53 rsa_key *key) in rsa_import_pkcs8() argument 67 LTC_ARGCHK(key != NULL); in rsa_import_pkcs8() 83 …err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP, &key->p, &key->q, &ze… in rsa_import_pkcs8() 109 LTC_ASN1_INTEGER, 1UL, key->N, in rsa_import_pkcs8() 110 LTC_ASN1_INTEGER, 1UL, key->e, in rsa_import_pkcs8() 111 LTC_ASN1_INTEGER, 1UL, key->d, in rsa_import_pkcs8() 112 LTC_ASN1_INTEGER, 1UL, key->p, in rsa_import_pkcs8() 113 LTC_ASN1_INTEGER, 1UL, key->q, in rsa_import_pkcs8() 114 LTC_ASN1_INTEGER, 1UL, key->dP, in rsa_import_pkcs8() 119 key->type = PK_PRIVATE; in rsa_import_pkcs8() [all …]
|
/optee_os/core/lib/libtomcrypt/src/pk/dsa/ |
A D | dsa_verify_key.c | 56 LTC_ARGCHK(key != NULL); in dsa_int_validate_pqg() 61 if ( key->qord >= LTC_MDSA_MAX_GROUP || key->qord <= 15 || in dsa_int_validate_pqg() 62 (unsigned long)key->qord >= mp_unsigned_bin_size(key->p) || in dsa_int_validate_pqg() 63 (mp_unsigned_bin_size(key->p) - key->qord) >= LTC_MDSA_DELTA ) { in dsa_int_validate_pqg() 68 if (mp_cmp_d(key->g, 1) != LTC_MP_GT || mp_cmp(key->g, key->p) != LTC_MP_LT) { in dsa_int_validate_pqg() 85 if ((err = mp_exptmod(key->g, key->q, key->p, tmp1)) != CRYPT_OK) { goto error; } in dsa_int_validate_pqg() 110 LTC_ARGCHK(key != NULL); in dsa_int_validate_primes() 156 if (mp_cmp_d(key->y, 1) != LTC_MP_GT || mp_cmp(key->y, tmp) != LTC_MP_LT) { in dsa_int_validate_xy() 163 if (mp_cmp_d(key->x, 0) != LTC_MP_GT || mp_cmp(key->x, key->q) != LTC_MP_LT) { in dsa_int_validate_xy() 168 if ((err = mp_exptmod(key->g, key->x, key->p, tmp)) != CRYPT_OK) { in dsa_int_validate_xy() [all …]
|
A D | dsa_set.c | 29 dsa_key *key) in dsa_set_pqg() argument 36 LTC_ARGCHK(key != NULL); in dsa_set_pqg() 40 err = mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL); in dsa_set_pqg() 47 key->qord = mp_unsigned_bin_size(key->q); in dsa_set_pqg() 59 dsa_free(key); in dsa_set_pqg() 78 LTC_ARGCHK(key != NULL); in dsa_set_key() 79 LTC_ARGCHK(key->x != NULL); in dsa_set_key() 87 key->type = PK_PRIVATE; in dsa_set_key() 89 …if ((err = mp_exptmod(key->g, key->x, key->p, key->y)) != CRYPT_OK) { goto LBL_ERR; } in dsa_set_key() 92 key->type = PK_PUBLIC; in dsa_set_key() [all …]
|
A D | dsa_import.c | 34 LTC_ARGCHK(key != NULL); in dsa_import() 38 if (mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL) != CRYPT_OK) { in dsa_import() 59 key->type = PK_PRIVATE; in dsa_import() 73 key->type = PK_PUBLIC; in dsa_import() 84 LTC_ASN1_INTEGER, 1UL, key->p, in dsa_import() 85 LTC_ASN1_INTEGER, 1UL, key->q, in dsa_import() 86 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_import() 91 key->type = PK_PRIVATE; in dsa_import() 121 key->type = PK_PUBLIC; in dsa_import() 125 key->qord = mp_unsigned_bin_size(key->q); in dsa_import() [all …]
|
A D | dsa_export.c | 35 LTC_ARGCHK(key != NULL); in dsa_export() 40 if (type == PK_PRIVATE && key->type != PK_PRIVATE) { in dsa_export() 48 LTC_ASN1_INTEGER, 1UL, key->p, in dsa_export() 76 err = der_encode_integer(key->y, tmp, &tmplen); in dsa_export() 81 LTC_SET_ASN1(int_list, 0, LTC_ASN1_INTEGER, key->p, 1UL); in dsa_export() 82 LTC_SET_ASN1(int_list, 1, LTC_ASN1_INTEGER, key->q, 1UL); in dsa_export() 83 LTC_SET_ASN1(int_list, 2, LTC_ASN1_INTEGER, key->g, 1UL); in dsa_export() 96 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_export() 97 LTC_ASN1_INTEGER, 1UL, key->p, in dsa_export() 98 LTC_ASN1_INTEGER, 1UL, key->q, in dsa_export() [all …]
|
A D | dsa_set_pqg_dsaparam.c | 26 dsa_key *key) in dsa_set_pqg_dsaparam() argument 31 LTC_ARGCHK(key != NULL); in dsa_set_pqg_dsaparam() 35 err = mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL); in dsa_set_pqg_dsaparam() 39 LTC_ASN1_INTEGER, 1UL, key->p, in dsa_set_pqg_dsaparam() 40 LTC_ASN1_INTEGER, 1UL, key->q, in dsa_set_pqg_dsaparam() 41 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_set_pqg_dsaparam() 46 key->qord = mp_unsigned_bin_size(key->q); in dsa_set_pqg_dsaparam() 49 if ((err = dsa_int_validate_pqg(key, &stat)) != CRYPT_OK) { in dsa_set_pqg_dsaparam() 60 dsa_free(key); in dsa_set_pqg_dsaparam()
|
/optee_os/core/drivers/crypto/crypto_api/acipher/ |
A D | rsa.c | 62 if (key) { in crypto_acipher_free_rsa_public_key() 75 if (key) { in crypto_acipher_free_rsa_keypair() 123 rsa_data.key.key = key; in crypto_acipher_rsanopad_decrypt() 125 rsa_data.key.n_size = crypto_bignum_num_bytes(key->n); in crypto_acipher_rsanopad_decrypt() 162 rsa_data.key.key = key; in crypto_acipher_rsanopad_encrypt() 164 rsa_data.key.n_size = crypto_bignum_num_bytes(key->n); in crypto_acipher_rsanopad_encrypt() 235 rsa_data.key.key = key; in crypto_acipher_rsaes_decrypt() 279 rsa_data.key.key = key; in crypto_acipher_rsaes_encrypt() 378 rsa_ssa.key.key = key; in crypto_acipher_rsassa_sign() 380 rsa_ssa.key.n_size = crypto_bignum_num_bytes(key->n); in crypto_acipher_rsassa_sign() [all …]
|
/optee_os/core/lib/libtomcrypt/src/pk/dh/ |
A D | dh_set.c | 27 dh_key *key) in dh_set_pg() argument 31 LTC_ARGCHK(key != NULL); in dh_set_pg() 36 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_set_pg() 46 dh_free(key); in dh_set_pg() 61 LTC_ARGCHK(key != NULL); in dh_set_pg_groupsize() 68 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_set_pg_groupsize() 77 dh_free(key); in dh_set_pg_groupsize() 100 key->type = PK_PRIVATE; in dh_set_key() 102 … if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) { goto LBL_ERR; } in dh_set_key() 105 key->type = PK_PUBLIC; in dh_set_key() [all …]
|
A D | dh_import.c | 22 int dh_import(const unsigned char *in, unsigned long inlen, dh_key *key) in dh_import() argument 29 LTC_ARGCHK(key != NULL); in dh_import() 32 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_import() 47 key->type = PK_PRIVATE; in dh_import() 52 LTC_ASN1_INTEGER, 1UL, key->base, in dh_import() 53 LTC_ASN1_INTEGER, 1UL, key->x, in dh_import() 58 if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) { in dh_import() 63 key->type = PK_PUBLIC; in dh_import() 69 LTC_ASN1_INTEGER, 1UL, key->y, in dh_import() 85 if ((err = dh_check_pubkey(key)) != CRYPT_OK) { in dh_import() [all …]
|
A D | dh_make_key.c | 61 LTC_ARGCHK(key != NULL); in dh_make_key() 62 LTC_ARGCHK(key->base != NULL); in dh_make_key() 63 LTC_ARGCHK(key->prime != NULL); in dh_make_key() 75 key_size_p = mp_unsigned_bin_size(key->prime); in dh_make_key() 93 arg_mod = key->prime; in dh_make_key() 96 key->x = NULL; in dh_make_key() 97 key->y = NULL; in dh_make_key() 98 err = mp_init_multi(&key->x, &key->y, NULL); in dh_make_key() 122 err = mp_mod(key->y, arg_mod, key->x); in dh_make_key() 127 err = mp_exptmod(key->base, key->x, key->prime, key->y); in dh_make_key() [all …]
|
/optee_os/core/lib/libtomcrypt/src/ciphers/safer/ |
A D | safer.c | 266 key = skey->safer.key; in _safer_ecb_encrypt() 272 a ^= *++key; b += *++key; c += *++key; d ^= *++key; in _safer_ecb_encrypt() 273 e ^= *++key; f += *++key; g += *++key; h ^= *++key; in _safer_ecb_encrypt() 274 a = EXP(a) + *++key; b = LOG(b) ^ *++key; in _safer_ecb_encrypt() 283 a ^= *++key; b += *++key; c += *++key; d ^= *++key; in _safer_ecb_encrypt() 284 e ^= *++key; f += *++key; g += *++key; h ^= *++key; in _safer_ecb_encrypt() 320 key = skey->safer.key; in _safer_ecb_decrypt() 325 h ^= *key; g -= *--key; f -= *--key; e ^= *--key; in _safer_ecb_decrypt() 326 d ^= *--key; c -= *--key; b -= *--key; a ^= *--key; in _safer_ecb_decrypt() 333 h -= *--key; g ^= *--key; f ^= *--key; e -= *--key; in _safer_ecb_decrypt() [all …]
|
/optee_os/core/lib/libtomcrypt/src/pk/ed25519/ |
A D | ed25519_set_key.c | 34 curve25519_key *key) in ed25519_set_key() argument 36 LTC_ARGCHK(key != NULL); in ed25519_set_key() 40 XMEMCPY(key->priv, sk, sizeof(key->priv)); in ed25519_set_key() 41 tweetnacl_crypto_sk_to_pk(key->pub, key->priv); in ed25519_set_key() 44 if (XMEM_NEQ(pk, key->pub, sizeof(key->pub)) != 0) { in ed25519_set_key() 45 zeromem(key, sizeof(*key)); in ed25519_set_key() 49 key->type = PK_PRIVATE; in ed25519_set_key() 52 XMEMCPY(key->pub, pk, sizeof(key->pub)); in ed25519_set_key() 53 key->type = PK_PUBLIC; in ed25519_set_key() 57 key->algo = PKA_ED25519; in ed25519_set_key()
|
/optee_os/core/lib/libtomcrypt/src/pk/x25519/ |
A D | x25519_set_key.c | 34 curve25519_key *key) in x25519_set_key() argument 36 LTC_ARGCHK(key != NULL); in x25519_set_key() 40 XMEMCPY(key->priv, k, sizeof(key->priv)); in x25519_set_key() 41 tweetnacl_crypto_scalarmult_base(key->pub, key->priv); in x25519_set_key() 44 if (XMEM_NEQ(u, key->pub, sizeof(key->pub)) != 0) { in x25519_set_key() 45 zeromem(key, sizeof(*key)); in x25519_set_key() 49 key->type = PK_PRIVATE; in x25519_set_key() 52 XMEMCPY(key->pub, u, sizeof(key->pub)); in x25519_set_key() 53 key->type = PK_PUBLIC; in x25519_set_key() 57 key->algo = PKA_X25519; in x25519_set_key()
|
/optee_os/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_pk.h | 57 int rsa_get_size(const rsa_key *key); 61 const rsa_key *key); 63 void rsa_free(rsa_key *key); 121 rsa_key *key); 124 rsa_key *key); 128 rsa_key *key); 149 dh_key *key); 159 void dh_free(dh_key *key); 276 void ecc_free(ecc_key *key); 436 dsa_key *key); [all …]
|
A D | tomcrypt_mac.h | 16 unsigned char key[MAXBLOCKSIZE]; member 45 symmetric_key key; member 180 symmetric_key key; member 213 symmetric_key key; member 266 const unsigned char *key, unsigned long keylen, 274 const unsigned char *key, unsigned long keylen, 317 const unsigned char *key, unsigned long keylen, 324 const unsigned char *key, unsigned long keylen, 378 const unsigned char *key, unsigned long keylen, 386 const unsigned char *key, unsigned long keylen, [all …]
|