/optee_os/core/drivers/crypto/caam/acipher/ |
A D | caam_prime_dsa.c | 386 prime->q->length)); in do_desc_prime_p() 509 cache_operation(TEE_CACHEFLUSH, prime->q->data, prime->q->length); in run_prime_q() 520 prime->q->length); in run_prime_q() 521 DSA_DUMPBUF("Prime Q", prime->q->data, prime->q->length); in run_prime_q() 540 cache_operation(TEE_CACHEFLUSH, prime->p->data, prime->p->length); in run_prime_p() 549 prime->p->length); in run_prime_p() 602 prime->p->length)); in do_generator() 610 prime->q->length)); in do_generator() 656 cache_operation(TEE_CACHEFLUSH, prime->g->data, prime->g->length); in do_generator() 667 cache_operation(TEE_CACHEINVALIDATE, prime->g->data, prime->g->length); in do_generator() [all …]
|
/optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ltc_ecc_is_point.c | 24 void *prime, *a, *b, *t1, *t2; in ltc_ecc_is_point() local 27 prime = dp->prime; in ltc_ecc_is_point() 38 if ((err = mp_mod(t2, prime, t2)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point() 45 if ((err = mp_submod(prime, a, prime, t2)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point() 46 if ((err = mp_mulmod(t2, x, prime, t2)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point() 47 if ((err = mp_addmod(t1, t2, prime, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point() 51 if ((err = mp_add(t1, prime, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point() 53 while (mp_cmp(t1, prime) != LTC_MP_LT) { in ltc_ecc_is_point() 54 if ((err = mp_sub(t1, prime, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point()
|
A D | ecc_sizes.c | 23 void *prime; in ecc_sizes() local 31 if (mp_init(&prime) == CRYPT_OK) { in ecc_sizes() 32 for (i = 0; ltc_ecc_curves[i].prime != NULL; i++) { in ecc_sizes() 33 if (mp_read_radix(prime, ltc_ecc_curves[i].prime, 16) == CRYPT_OK) { in ecc_sizes() 34 size = mp_unsigned_bin_size(prime); in ecc_sizes() 39 mp_clear(prime); in ecc_sizes()
|
A D | ltc_ecc_import_point.c | 15 int ltc_ecc_import_point(const unsigned char *in, unsigned long inlen, void *prime, void *a, void *… in ltc_ecc_import_point() argument 26 size = mp_unsigned_bin_size(prime); in ltc_ecc_import_point() 41 …if ((err = mp_mulmod(t1, x, prime, t1)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point() 43 …if ((err = mp_mulmod(a, x, prime, t2)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point() 48 …if ((err = mp_sqrtmod_prime(t1, prime, t2)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point() 51 … if ((err = mp_mod(t2, prime, y)) != CRYPT_OK) { goto cleanup; } in ltc_ecc_import_point() 54 … if ((err = mp_submod(prime, t2, prime, y)) != CRYPT_OK) { goto cleanup; } in ltc_ecc_import_point()
|
A D | ecc_set_curve_internal.c | 29 for (curve = ltc_ecc_curves; curve->prime != NULL; curve++) { in _ecc_oid_lookup() 30 if (_ecc_cmp_hex_bn(curve->prime, key->dp.prime, bn) != 1) continue; in _ecc_oid_lookup() 40 if (curve->prime && curve->OID) { in _ecc_oid_lookup() 54 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve() 62 if ((err = mp_copy(srckey->dp.prime, key->dp.prime )) != CRYPT_OK) { goto error; } in ecc_copy_curve() 86 int ecc_set_curve_from_mpis(void *a, void *b, void *prime, void *order, void *gx, void *gy, unsigne… in ecc_set_curve_from_mpis() argument 93 LTC_ARGCHK(prime != NULL); in ecc_set_curve_from_mpis() 98 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis() 106 if ((err = mp_copy(prime, key->dp.prime )) != CRYPT_OK) { goto error; } in ecc_set_curve_from_mpis() 115 key->dp.size = mp_unsigned_bin_size(prime); in ecc_set_curve_from_mpis()
|
A D | ltc_ecc_verify_key.c | 27 void *prime = key->dp.prime; in ltc_ecc_verify_key() local 33 if ((ltc_mp.compare(key->pubkey.x, prime) != LTC_MP_LT) || in ltc_ecc_verify_key() 34 (ltc_mp.compare(key->pubkey.y, prime) != LTC_MP_LT) || in ltc_ecc_verify_key() 50 …if ((err = ltc_ecc_mulmod(order, &(key->pubkey), point, a, prime, 1)) != CRYPT_OK) { goto done… in ltc_ecc_verify_key() 52 err = ltc_ecc_is_point_at_infinity(point, prime, &inf); in ltc_ecc_verify_key()
|
A D | ecc_shared_secret.c | 33 void *prime, *a; in ecc_shared_secret() local 52 prime = private_key->dp.prime; in ecc_shared_secret() 55 …if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, a, prime, 1)) != CRYPT_OK… in ecc_shared_secret() 57 x = (unsigned long)mp_unsigned_bin_size(prime); in ecc_shared_secret()
|
A D | ecc_set_key.c | 18 void *prime, *a, *b; in ecc_set_key() local 24 prime = key->dp.prime; in ecc_set_key() 38 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, a, prime, 1)) != CRYPT_OK) … in ecc_set_key() 42 …if ((err = ltc_ecc_import_point(in, inlen, prime, a, b, key->pubkey.x, key->pubkey.y)) != CRYPT_OK… in ecc_set_key()
|
A D | ecc_import_x509.c | 42 void *prime, *order, *a, *b, *gx, *gy; in _ecc_import_x509_with_curve() local 50 if ((err = mp_init_multi(&prime, &order, &a, &b, &gx, &gy, NULL)) != CRYPT_OK) { in _ecc_import_x509_with_curve() 64 LTC_SET_ASN1(seq_fieldid, 1, LTC_ASN1_INTEGER, prime, 1UL); in _ecc_import_x509_with_curve() 82 …if ((err = ltc_ecc_import_point(bin_g, len_g, prime, a, b, gx, gy)) != CRYPT_OK) { goto er… in _ecc_import_x509_with_curve() 84 …if ((err = ecc_set_curve_from_mpis(a, b, prime, order, gx, gy, cofactor, key)) != CRYPT_OK) { goto… in _ecc_import_x509_with_curve() 89 mp_clear_multi(prime, order, a, b, gx, gy, NULL); in _ecc_import_x509_with_curve()
|
A D | ecc_import_openssl.c | 51 void *prime, *order, *a, *b, *gx, *gy; in _ecc_import_private_with_curve() local 59 if ((err = mp_init_multi(&prime, &order, &a, &b, &gx, &gy, NULL)) != CRYPT_OK) { in _ecc_import_private_with_curve() 82 LTC_SET_ASN1(seq_fieldid, 1, LTC_ASN1_INTEGER, prime, 1UL); in _ecc_import_private_with_curve() 98 …if ((err = ltc_ecc_import_point(bin_g, len_g, prime, a, b, gx, gy)) != CRYPT_OK) { goto er… in _ecc_import_private_with_curve() 100 …if ((err = ecc_set_curve_from_mpis(a, b, prime, order, gx, gy, cofactor, key)) != CRYPT_OK) { goto… in _ecc_import_private_with_curve() 105 mp_clear_multi(prime, order, a, b, gx, gy, NULL); in _ecc_import_private_with_curve()
|
A D | ecc_set_curve.c | 22 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve() 30 if ((err = mp_read_radix(key->dp.prime, cu->prime, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 39 key->dp.size = mp_unsigned_bin_size(key->dp.prime); in ecc_set_curve()
|
A D | ecc_export_openssl.c | 27 void *prime, *order, *a, *b, *gx, *gy; in ecc_export_openssl() local 44 prime = key->dp.prime; in ecc_export_openssl() 114 LTC_SET_ASN1(seq_fieldid, 1, LTC_ASN1_INTEGER, prime, 1UL); in ecc_export_openssl()
|
A D | ecc_import_pkcs8.c | 142 ltc_asn1_list *prime = field->child->next; in ecc_import_pkcs8() local 149 …if ((err = ltc_ecc_import_point(point_g->data, point_g->size, prime->data, a, b, gx, gy)) != CRYPT… in ecc_import_pkcs8() 152 …if ((err = ecc_set_curve_from_mpis(a, b, prime->data, order->data, gx, gy, cofactor, key)) != CRYP… in ecc_import_pkcs8()
|
/optee_os/core/lib/libtomcrypt/src/pk/dh/ |
A D | dh_set.c | 36 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_set_pg() 41 …if ((err = mp_read_unsigned_bin(key->prime, (unsigned char*)p, plen)) != CRYPT_OK) { goto LBL_ERR… in dh_set_pg() 68 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_set_pg_groupsize() 72 if ((err = mp_read_radix(key->prime, ltc_dh_sets[i].prime, 16)) != CRYPT_OK) { goto LBL_ERR; } in dh_set_pg_groupsize() 102 … if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) { goto LBL_ERR; } in dh_set_key()
|
A D | dh_import.c | 32 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_import() 51 LTC_ASN1_INTEGER, 1UL, key->prime, in dh_import() 58 if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) { in dh_import() 67 LTC_ASN1_INTEGER, 1UL, key->prime, in dh_import()
|
A D | dh_make_key.c | 63 LTC_ARGCHK(key->prime != NULL); in dh_make_key() 75 key_size_p = mp_unsigned_bin_size(key->prime); in dh_make_key() 93 arg_mod = key->prime; in dh_make_key() 127 err = mp_exptmod(key->base, key->x, key->prime, key->y); in dh_make_key()
|
A D | dh_shared_secret.c | 41 … if (mp_cmp(private_key->prime, public_key->prime) != LTC_MP_EQ) { return CRYPT_PK_TYPE_MISMATCH; } in dh_shared_secret() 55 if ((err = mp_exptmod(public_key->y, private_key->x, private_key->prime, tmp)) != CRYPT_OK) { in dh_shared_secret()
|
A D | dh_set_pg_dhparam.c | 34 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_set_pg_dhparam() 38 LTC_ASN1_INTEGER, 1UL, key->prime, in dh_set_pg_dhparam()
|
A D | dh_export.c | 39 LTC_ASN1_INTEGER, 1UL, key->prime, in dh_export() 50 LTC_ASN1_INTEGER, 1UL, key->prime, in dh_export()
|
A D | dh_generate_key.c | 58 keysize = _dh_groupsize_to_keysize(mp_unsigned_bin_size(key->prime)); in dh_generate_key() 83 if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) { in dh_generate_key()
|
/optee_os/core/lib/libtomcrypt/src/math/ |
A D | gmp_desc.c | 297 LTC_ARGCHK(prime != NULL); in sqrtmod_prime() 319 mpz_add_ui(t1, prime, 1); in sqrtmod_prime() 321 mpz_powm(ret, n, t1, prime); in sqrtmod_prime() 329 mpz_set(Q, prime); in sqrtmod_prime() 351 mpz_powm(C, Z, Q, prime); in sqrtmod_prime() 356 mpz_powm(R, n, t1, prime); in sqrtmod_prime() 358 mpz_powm(T, n, Q, prime); in sqrtmod_prime() 381 mpz_powm(t1, C, t1, prime); in sqrtmod_prime() 384 mpz_mod(C, C, prime); in sqrtmod_prime() 387 mpz_mod(R, R, prime); in sqrtmod_prime() [all …]
|
/optee_os/core/lib/libtomcrypt/ |
A D | sm2-pke.c | 175 ltc_key.dp.prime, 1); in sm2_ltc_pke_decrypt() 181 ltc_res = ltc_ecc_is_point_at_infinity(S, ltc_key.dp.prime, in sm2_ltc_pke_decrypt() 184 ltc_res = ltc_ecc_is_point_at_infinity(C1, ltc_key.dp.prime, in sm2_ltc_pke_decrypt() 201 ltc_key.dp.prime, 1); in sm2_ltc_pke_decrypt() 375 ltc_key.dp.prime, 1); in sm2_ltc_pke_encrypt() 397 ltc_key.dp.prime, 1); in sm2_ltc_pke_encrypt() 403 ltc_res = ltc_ecc_is_point_at_infinity(S, ltc_key.dp.prime, in sm2_ltc_pke_encrypt() 407 ltc_key.dp.prime, &inf); in sm2_ltc_pke_encrypt() 427 ltc_key.dp.prime, 1); in sm2_ltc_pke_encrypt()
|
A D | sm2-dsa.c | 72 ltc_key.dp.prime, 1); in sm2_ltc_dsa_sign() 211 ltc_res = mp_montgomery_setup(ltc_key.dp.prime, &mp); in sm2_ltc_dsa_verify() 216 ltc_res = mp_montgomery_normalization(mu, ltc_key.dp.prime); in sm2_ltc_dsa_verify() 221 ltc_res = mp_mulmod(ltc_key.dp.A, mu, ltc_key.dp.prime, ma); in sm2_ltc_dsa_verify() 227 x1y1p, ma, ltc_key.dp.prime); in sm2_ltc_dsa_verify()
|
A D | sm2-kep.c | 286 ltc_res = mp_montgomery_setup(peer_key->dp.prime, &mp); in sm2_kep_derive() 290 ltc_res = mp_montgomery_normalization(mu, peer_key->dp.prime); in sm2_kep_derive() 294 ltc_res = mp_mulmod(peer_key->dp.A, mu, peer_key->dp.prime, ma); in sm2_kep_derive() 303 x2bar, U, ma, peer_key->dp.prime); in sm2_kep_derive() 315 ltc_res = ltc_ecc_mulmod(htA, U, U, peer_key->dp.A, peer_key->dp.prime, in sm2_kep_derive() 320 ltc_res = ltc_ecc_is_point_at_infinity(U, peer_key->dp.prime, &inf); in sm2_kep_derive()
|
A D | dh.c | 48 ltc_res = mp_init_multi(<c_tmp_key.base, <c_tmp_key.prime, NULL); in crypto_acipher_gen_dh_key() 54 mp_copy(key->p, ltc_tmp_key.prime); in crypto_acipher_gen_dh_key()
|