Home
last modified time | relevance | path

Searched refs:key (Results 1 – 25 of 518) sorted by relevance

12345678910>>...21

/optee_os/core/lib/libtomcrypt/src/pk/ecc/
A Decc_set_curve_internal.c27 key->dp.oidlen = 0; in _ecc_oid_lookup()
42 pk_oid_str_to_num(curve->OID, key->dp.oid, &key->dp.oidlen); in _ecc_oid_lookup()
54 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve()
55 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_copy_curve()
56 &key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, in ecc_copy_curve()
73 for (i = 0; i < key->dp.oidlen; i++) key->dp.oid[i] = srckey->dp.oid[i]; in ecc_copy_curve()
82 ecc_free(key); in ecc_copy_curve()
98 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis()
99 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_set_curve_from_mpis()
100 &key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, in ecc_set_curve_from_mpis()
[all …]
A Decc_set_curve.c15 int ecc_set_curve(const ltc_ecc_curve *cu, ecc_key *key) in ecc_set_curve() argument
19 LTC_ARGCHK(key != NULL); in ecc_set_curve()
22 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve()
23 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_set_curve()
24 &key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, in ecc_set_curve()
38 key->dp.cofactor = cu->cofactor; in ecc_set_curve()
39 key->dp.size = mp_unsigned_bin_size(key->dp.prime); in ecc_set_curve()
41 key->dp.oidlen = 16; in ecc_set_curve()
42 if ((err = pk_oid_str_to_num(cu->OID, key->dp.oid, &key->dp.oidlen)) != CRYPT_OK) { goto error; } in ecc_set_curve()
47 ecc_free(key); in ecc_set_curve()
[all …]
A Decc_make_key.c28 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) in ecc_make_key() argument
32 if ((err = ecc_set_curve_by_size(keysize, key)) != CRYPT_OK) { return err; } in ecc_make_key()
40 if ((err = ecc_set_curve(cu, key)) != CRYPT_OK) { return err; } in ecc_make_key_ex()
41 if ((err = ecc_generate_key(prng, wprng, key)) != CRYPT_OK) { return err; } in ecc_make_key_ex()
45 int ecc_generate_key(prng_state *prng, int wprng, ecc_key *key) in ecc_generate_key() argument
50 LTC_ARGCHK(key != NULL); in ecc_generate_key()
51 LTC_ARGCHK(key->dp.size > 0); in ecc_generate_key()
60 if ((err = rand_bn_upto(key->k, key->dp.order, prng, wprng)) != CRYPT_OK) { in ecc_generate_key()
65 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, key->dp.A, key->dp.prime, 1)) != … in ecc_generate_key()
68 key->type = PK_PRIVATE; in ecc_generate_key()
[all …]
A Decc_set_key.c15 int ecc_set_key(const unsigned char *in, unsigned long inlen, int type, ecc_key *key) in ecc_set_key() argument
20 LTC_ARGCHK(key != NULL); in ecc_set_key()
24 prime = key->dp.prime; in ecc_set_key()
25 a = key->dp.A; in ecc_set_key()
26 b = key->dp.B; in ecc_set_key()
33 if (mp_iszero(key->k) || (mp_cmp(key->k, key->dp.order) != LTC_MP_LT)) { in ecc_set_key()
38 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, a, prime, 1)) != CRYPT_OK) … in ecc_set_key()
42 …if ((err = ltc_ecc_import_point(in, inlen, prime, a, b, key->pubkey.x, key->pubkey.y)) != CRYPT_OK… in ecc_set_key()
51 if ((err = ltc_ecc_verify_key(key)) != CRYPT_OK) { in ecc_set_key()
55 key->type = type; in ecc_set_key()
[all …]
A Decc_free.c24 void ecc_free(ecc_key *key) in ecc_free() argument
26 LTC_ARGCHKVD(key != NULL); in ecc_free()
28 mp_cleanup_multi(&key->dp.prime, &key->dp.order, in ecc_free()
29 &key->dp.A, &key->dp.B, in ecc_free()
30 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_free()
31 &key->pubkey.x, &key->pubkey.y, &key->pubkey.z, in ecc_free()
32 &key->k, NULL); in ecc_free()
/optee_os/core/lib/libtomcrypt/src/pk/rsa/
A Drsa_import.c34 LTC_ARGCHK(key != NULL); in rsa_import()
38 if ((err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, in rsa_import()
39 &key->dP, &key->qP, &key->p, &key->q, NULL)) != CRYPT_OK) { in rsa_import()
65 key->type = PK_PUBLIC; in rsa_import()
78 if (mp_cmp_d(key->N, 0) == LTC_MP_EQ) { in rsa_import()
85 LTC_ASN1_INTEGER, 1UL, key->N, in rsa_import()
86 LTC_ASN1_INTEGER, 1UL, key->e, in rsa_import()
98 key->type = PK_PRIVATE; in rsa_import()
99 } else if (mp_cmp_d(key->N, 1) == LTC_MP_EQ) { in rsa_import()
111 key->type = PK_PUBLIC; in rsa_import()
[all …]
A Drsa_set.c30 rsa_key *key) in rsa_set_key() argument
34 LTC_ARGCHK(key != NULL); in rsa_set_key()
39 …err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP, &key->p, &key->q, NUL… in rsa_set_key()
46 key->type = PK_PRIVATE; in rsa_set_key()
49 key->type = PK_PUBLIC; in rsa_set_key()
54 rsa_free(key); in rsa_set_key()
72 rsa_key *key) in rsa_set_factors() argument
76 LTC_ARGCHK(key != NULL); in rsa_set_factors()
88 rsa_free(key); in rsa_set_factors()
113 LTC_ARGCHK(key != NULL); in rsa_set_crt_params()
[all …]
A Drsa_exptmod.c32 const rsa_key *key) in rsa_exptmod() argument
44 LTC_ARGCHK(key != NULL); in rsa_exptmod()
68 if (mp_cmp(key->N, tmp) == LTC_MP_LT) { in rsa_exptmod()
83 err = mp_invmod(rnd, key->N, rndi); in rsa_exptmod()
89 err = mp_exptmod( rnd, key->e, key->N, rnd); in rsa_exptmod()
101 has_crt_parameters = (key->p != NULL) && (mp_get_digit_count(key->p) != 0) && in rsa_exptmod()
102 (key->q != NULL) && (mp_get_digit_count(key->q) != 0) && in rsa_exptmod()
103 (key->dP != NULL) && (mp_get_digit_count(key->dP) != 0) && in rsa_exptmod()
104 (key->dQ != NULL) && (mp_get_digit_count(key->dQ) != 0) && in rsa_exptmod()
105 (key->qP != NULL) && (mp_get_digit_count(key->qP) != 0); in rsa_exptmod()
[all …]
A Drsa_make_key.c25 LTC_ARGCHK(key != NULL); in s_rsa_make_key()
58 …if ((err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP, &key->p, &key->q… in s_rsa_make_key()
63 …if ((err = mp_invmod( key->e, tmp1, key->d)) != CRYPT_OK) { goto errkey; } /* key->d = 1… in s_rsa_make_key()
70 …if ((err = mp_mod( key->d, tmp1, key->dP)) != CRYPT_OK) { goto errkey; } /* dP = d mod… in s_rsa_make_key()
71 …if ((err = mp_mod( key->d, tmp2, key->dQ)) != CRYPT_OK) { goto errkey; } /* dQ = d mod… in s_rsa_make_key()
78 key->type = PK_PRIVATE; in s_rsa_make_key()
84 rsa_free(key); in s_rsa_make_key()
99 int rsa_make_key(prng_state *prng, int wprng, int size, long e, rsa_key *key) in rsa_make_key() argument
113 err = s_rsa_make_key(prng, wprng, size, tmp_e, key); in rsa_make_key()
141 err = rsa_make_key_bn_e(prng, wprng, size, tmp_e, key); in rsa_make_key_ubin_e()
[all …]
A Drsa_import_x509.c19 static int _rsa_decode(const unsigned char *in, unsigned long inlen, rsa_key *key) in _rsa_decode() argument
23 LTC_ASN1_INTEGER, 1UL, key->N, in _rsa_decode()
24 LTC_ASN1_INTEGER, 1UL, key->e, in _rsa_decode()
35 int rsa_import_x509(const unsigned char *in, unsigned long inlen, rsa_key *key) in rsa_import_x509() argument
40 LTC_ARGCHK(key != NULL); in rsa_import_x509()
44 if ((err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, in rsa_import_x509()
45 &key->dP, &key->qP, &key->p, &key->q, NULL)) != CRYPT_OK) { in rsa_import_x509()
52 … (public_key_decode_cb)_rsa_decode, key)) != CRYPT_OK) { in rsa_import_x509()
53 rsa_free(key); in rsa_import_x509()
55 key->type = PK_PUBLIC; in rsa_import_x509()
A Drsa_import_pkcs8.c53 rsa_key *key) in rsa_import_pkcs8() argument
67 LTC_ARGCHK(key != NULL); in rsa_import_pkcs8()
83 …err = mp_init_multi(&key->e, &key->d, &key->N, &key->dQ, &key->dP, &key->qP, &key->p, &key->q, &ze… in rsa_import_pkcs8()
109 LTC_ASN1_INTEGER, 1UL, key->N, in rsa_import_pkcs8()
110 LTC_ASN1_INTEGER, 1UL, key->e, in rsa_import_pkcs8()
111 LTC_ASN1_INTEGER, 1UL, key->d, in rsa_import_pkcs8()
112 LTC_ASN1_INTEGER, 1UL, key->p, in rsa_import_pkcs8()
113 LTC_ASN1_INTEGER, 1UL, key->q, in rsa_import_pkcs8()
114 LTC_ASN1_INTEGER, 1UL, key->dP, in rsa_import_pkcs8()
119 key->type = PK_PRIVATE; in rsa_import_pkcs8()
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/dsa/
A Ddsa_verify_key.c56 LTC_ARGCHK(key != NULL); in dsa_int_validate_pqg()
61 if ( key->qord >= LTC_MDSA_MAX_GROUP || key->qord <= 15 || in dsa_int_validate_pqg()
62 (unsigned long)key->qord >= mp_unsigned_bin_size(key->p) || in dsa_int_validate_pqg()
63 (mp_unsigned_bin_size(key->p) - key->qord) >= LTC_MDSA_DELTA ) { in dsa_int_validate_pqg()
68 if (mp_cmp_d(key->g, 1) != LTC_MP_GT || mp_cmp(key->g, key->p) != LTC_MP_LT) { in dsa_int_validate_pqg()
85 if ((err = mp_exptmod(key->g, key->q, key->p, tmp1)) != CRYPT_OK) { goto error; } in dsa_int_validate_pqg()
110 LTC_ARGCHK(key != NULL); in dsa_int_validate_primes()
156 if (mp_cmp_d(key->y, 1) != LTC_MP_GT || mp_cmp(key->y, tmp) != LTC_MP_LT) { in dsa_int_validate_xy()
163 if (mp_cmp_d(key->x, 0) != LTC_MP_GT || mp_cmp(key->x, key->q) != LTC_MP_LT) { in dsa_int_validate_xy()
168 if ((err = mp_exptmod(key->g, key->x, key->p, tmp)) != CRYPT_OK) { in dsa_int_validate_xy()
[all …]
A Ddsa_set.c29 dsa_key *key) in dsa_set_pqg() argument
36 LTC_ARGCHK(key != NULL); in dsa_set_pqg()
40 err = mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL); in dsa_set_pqg()
47 key->qord = mp_unsigned_bin_size(key->q); in dsa_set_pqg()
59 dsa_free(key); in dsa_set_pqg()
78 LTC_ARGCHK(key != NULL); in dsa_set_key()
79 LTC_ARGCHK(key->x != NULL); in dsa_set_key()
87 key->type = PK_PRIVATE; in dsa_set_key()
89 …if ((err = mp_exptmod(key->g, key->x, key->p, key->y)) != CRYPT_OK) { goto LBL_ERR; } in dsa_set_key()
92 key->type = PK_PUBLIC; in dsa_set_key()
[all …]
A Ddsa_import.c34 LTC_ARGCHK(key != NULL); in dsa_import()
38 if (mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL) != CRYPT_OK) { in dsa_import()
59 key->type = PK_PRIVATE; in dsa_import()
73 key->type = PK_PUBLIC; in dsa_import()
84 LTC_ASN1_INTEGER, 1UL, key->p, in dsa_import()
85 LTC_ASN1_INTEGER, 1UL, key->q, in dsa_import()
86 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_import()
91 key->type = PK_PRIVATE; in dsa_import()
121 key->type = PK_PUBLIC; in dsa_import()
125 key->qord = mp_unsigned_bin_size(key->q); in dsa_import()
[all …]
A Ddsa_export.c35 LTC_ARGCHK(key != NULL); in dsa_export()
40 if (type == PK_PRIVATE && key->type != PK_PRIVATE) { in dsa_export()
48 LTC_ASN1_INTEGER, 1UL, key->p, in dsa_export()
76 err = der_encode_integer(key->y, tmp, &tmplen); in dsa_export()
81 LTC_SET_ASN1(int_list, 0, LTC_ASN1_INTEGER, key->p, 1UL); in dsa_export()
82 LTC_SET_ASN1(int_list, 1, LTC_ASN1_INTEGER, key->q, 1UL); in dsa_export()
83 LTC_SET_ASN1(int_list, 2, LTC_ASN1_INTEGER, key->g, 1UL); in dsa_export()
96 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_export()
97 LTC_ASN1_INTEGER, 1UL, key->p, in dsa_export()
98 LTC_ASN1_INTEGER, 1UL, key->q, in dsa_export()
[all …]
A Ddsa_set_pqg_dsaparam.c26 dsa_key *key) in dsa_set_pqg_dsaparam() argument
31 LTC_ARGCHK(key != NULL); in dsa_set_pqg_dsaparam()
35 err = mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL); in dsa_set_pqg_dsaparam()
39 LTC_ASN1_INTEGER, 1UL, key->p, in dsa_set_pqg_dsaparam()
40 LTC_ASN1_INTEGER, 1UL, key->q, in dsa_set_pqg_dsaparam()
41 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_set_pqg_dsaparam()
46 key->qord = mp_unsigned_bin_size(key->q); in dsa_set_pqg_dsaparam()
49 if ((err = dsa_int_validate_pqg(key, &stat)) != CRYPT_OK) { in dsa_set_pqg_dsaparam()
60 dsa_free(key); in dsa_set_pqg_dsaparam()
/optee_os/core/drivers/crypto/crypto_api/acipher/
A Drsa.c62 if (key) { in crypto_acipher_free_rsa_public_key()
75 if (key) { in crypto_acipher_free_rsa_keypair()
123 rsa_data.key.key = key; in crypto_acipher_rsanopad_decrypt()
125 rsa_data.key.n_size = crypto_bignum_num_bytes(key->n); in crypto_acipher_rsanopad_decrypt()
162 rsa_data.key.key = key; in crypto_acipher_rsanopad_encrypt()
164 rsa_data.key.n_size = crypto_bignum_num_bytes(key->n); in crypto_acipher_rsanopad_encrypt()
235 rsa_data.key.key = key; in crypto_acipher_rsaes_decrypt()
279 rsa_data.key.key = key; in crypto_acipher_rsaes_encrypt()
378 rsa_ssa.key.key = key; in crypto_acipher_rsassa_sign()
380 rsa_ssa.key.n_size = crypto_bignum_num_bytes(key->n); in crypto_acipher_rsassa_sign()
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/dh/
A Ddh_set.c27 dh_key *key) in dh_set_pg() argument
31 LTC_ARGCHK(key != NULL); in dh_set_pg()
36 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_set_pg()
46 dh_free(key); in dh_set_pg()
61 LTC_ARGCHK(key != NULL); in dh_set_pg_groupsize()
68 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_set_pg_groupsize()
77 dh_free(key); in dh_set_pg_groupsize()
100 key->type = PK_PRIVATE; in dh_set_key()
102 … if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) { goto LBL_ERR; } in dh_set_key()
105 key->type = PK_PUBLIC; in dh_set_key()
[all …]
A Ddh_import.c22 int dh_import(const unsigned char *in, unsigned long inlen, dh_key *key) in dh_import() argument
29 LTC_ARGCHK(key != NULL); in dh_import()
32 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_import()
47 key->type = PK_PRIVATE; in dh_import()
52 LTC_ASN1_INTEGER, 1UL, key->base, in dh_import()
53 LTC_ASN1_INTEGER, 1UL, key->x, in dh_import()
58 if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) { in dh_import()
63 key->type = PK_PUBLIC; in dh_import()
69 LTC_ASN1_INTEGER, 1UL, key->y, in dh_import()
85 if ((err = dh_check_pubkey(key)) != CRYPT_OK) { in dh_import()
[all …]
A Ddh_make_key.c61 LTC_ARGCHK(key != NULL); in dh_make_key()
62 LTC_ARGCHK(key->base != NULL); in dh_make_key()
63 LTC_ARGCHK(key->prime != NULL); in dh_make_key()
75 key_size_p = mp_unsigned_bin_size(key->prime); in dh_make_key()
93 arg_mod = key->prime; in dh_make_key()
96 key->x = NULL; in dh_make_key()
97 key->y = NULL; in dh_make_key()
98 err = mp_init_multi(&key->x, &key->y, NULL); in dh_make_key()
122 err = mp_mod(key->y, arg_mod, key->x); in dh_make_key()
127 err = mp_exptmod(key->base, key->x, key->prime, key->y); in dh_make_key()
[all …]
/optee_os/core/lib/libtomcrypt/src/ciphers/safer/
A Dsafer.c266 key = skey->safer.key; in _safer_ecb_encrypt()
272 a ^= *++key; b += *++key; c += *++key; d ^= *++key; in _safer_ecb_encrypt()
273 e ^= *++key; f += *++key; g += *++key; h ^= *++key; in _safer_ecb_encrypt()
274 a = EXP(a) + *++key; b = LOG(b) ^ *++key; in _safer_ecb_encrypt()
283 a ^= *++key; b += *++key; c += *++key; d ^= *++key; in _safer_ecb_encrypt()
284 e ^= *++key; f += *++key; g += *++key; h ^= *++key; in _safer_ecb_encrypt()
320 key = skey->safer.key; in _safer_ecb_decrypt()
325 h ^= *key; g -= *--key; f -= *--key; e ^= *--key; in _safer_ecb_decrypt()
326 d ^= *--key; c -= *--key; b -= *--key; a ^= *--key; in _safer_ecb_decrypt()
333 h -= *--key; g ^= *--key; f ^= *--key; e -= *--key; in _safer_ecb_decrypt()
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/ed25519/
A Ded25519_set_key.c34 curve25519_key *key) in ed25519_set_key() argument
36 LTC_ARGCHK(key != NULL); in ed25519_set_key()
40 XMEMCPY(key->priv, sk, sizeof(key->priv)); in ed25519_set_key()
41 tweetnacl_crypto_sk_to_pk(key->pub, key->priv); in ed25519_set_key()
44 if (XMEM_NEQ(pk, key->pub, sizeof(key->pub)) != 0) { in ed25519_set_key()
45 zeromem(key, sizeof(*key)); in ed25519_set_key()
49 key->type = PK_PRIVATE; in ed25519_set_key()
52 XMEMCPY(key->pub, pk, sizeof(key->pub)); in ed25519_set_key()
53 key->type = PK_PUBLIC; in ed25519_set_key()
57 key->algo = PKA_ED25519; in ed25519_set_key()
/optee_os/core/lib/libtomcrypt/src/pk/x25519/
A Dx25519_set_key.c34 curve25519_key *key) in x25519_set_key() argument
36 LTC_ARGCHK(key != NULL); in x25519_set_key()
40 XMEMCPY(key->priv, k, sizeof(key->priv)); in x25519_set_key()
41 tweetnacl_crypto_scalarmult_base(key->pub, key->priv); in x25519_set_key()
44 if (XMEM_NEQ(u, key->pub, sizeof(key->pub)) != 0) { in x25519_set_key()
45 zeromem(key, sizeof(*key)); in x25519_set_key()
49 key->type = PK_PRIVATE; in x25519_set_key()
52 XMEMCPY(key->pub, u, sizeof(key->pub)); in x25519_set_key()
53 key->type = PK_PUBLIC; in x25519_set_key()
57 key->algo = PKA_X25519; in x25519_set_key()
/optee_os/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_pk.h57 int rsa_get_size(const rsa_key *key);
61 const rsa_key *key);
63 void rsa_free(rsa_key *key);
121 rsa_key *key);
124 rsa_key *key);
128 rsa_key *key);
149 dh_key *key);
159 void dh_free(dh_key *key);
276 void ecc_free(ecc_key *key);
436 dsa_key *key);
[all …]
A Dtomcrypt_mac.h16 unsigned char key[MAXBLOCKSIZE]; member
45 symmetric_key key; member
180 symmetric_key key; member
213 symmetric_key key; member
266 const unsigned char *key, unsigned long keylen,
274 const unsigned char *key, unsigned long keylen,
317 const unsigned char *key, unsigned long keylen,
324 const unsigned char *key, unsigned long keylen,
378 const unsigned char *key, unsigned long keylen,
386 const unsigned char *key, unsigned long keylen,
[all …]

Completed in 27 milliseconds

12345678910>>...21