Home
last modified time | relevance | path

Searched refs:prime (Results 1 – 25 of 39) sorted by relevance

12

/optee_os/core/drivers/crypto/caam/acipher/
A Dcaam_prime_dsa.c386 prime->q->length)); in do_desc_prime_p()
509 cache_operation(TEE_CACHEFLUSH, prime->q->data, prime->q->length); in run_prime_q()
520 prime->q->length); in run_prime_q()
521 DSA_DUMPBUF("Prime Q", prime->q->data, prime->q->length); in run_prime_q()
540 cache_operation(TEE_CACHEFLUSH, prime->p->data, prime->p->length); in run_prime_p()
549 prime->p->length); in run_prime_p()
602 prime->p->length)); in do_generator()
610 prime->q->length)); in do_generator()
656 cache_operation(TEE_CACHEFLUSH, prime->g->data, prime->g->length); in do_generator()
667 cache_operation(TEE_CACHEINVALIDATE, prime->g->data, prime->g->length); in do_generator()
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
A Dltc_ecc_is_point.c24 void *prime, *a, *b, *t1, *t2; in ltc_ecc_is_point() local
27 prime = dp->prime; in ltc_ecc_is_point()
38 if ((err = mp_mod(t2, prime, t2)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point()
45 if ((err = mp_submod(prime, a, prime, t2)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point()
46 if ((err = mp_mulmod(t2, x, prime, t2)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point()
47 if ((err = mp_addmod(t1, t2, prime, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point()
51 if ((err = mp_add(t1, prime, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point()
53 while (mp_cmp(t1, prime) != LTC_MP_LT) { in ltc_ecc_is_point()
54 if ((err = mp_sub(t1, prime, t1)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point()
A Decc_sizes.c23 void *prime; in ecc_sizes() local
31 if (mp_init(&prime) == CRYPT_OK) { in ecc_sizes()
32 for (i = 0; ltc_ecc_curves[i].prime != NULL; i++) { in ecc_sizes()
33 if (mp_read_radix(prime, ltc_ecc_curves[i].prime, 16) == CRYPT_OK) { in ecc_sizes()
34 size = mp_unsigned_bin_size(prime); in ecc_sizes()
39 mp_clear(prime); in ecc_sizes()
A Dltc_ecc_import_point.c15 int ltc_ecc_import_point(const unsigned char *in, unsigned long inlen, void *prime, void *a, void *… in ltc_ecc_import_point() argument
26 size = mp_unsigned_bin_size(prime); in ltc_ecc_import_point()
41 …if ((err = mp_mulmod(t1, x, prime, t1)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point()
43 …if ((err = mp_mulmod(a, x, prime, t2)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point()
48 …if ((err = mp_sqrtmod_prime(t1, prime, t2)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point()
51 … if ((err = mp_mod(t2, prime, y)) != CRYPT_OK) { goto cleanup; } in ltc_ecc_import_point()
54 … if ((err = mp_submod(prime, t2, prime, y)) != CRYPT_OK) { goto cleanup; } in ltc_ecc_import_point()
A Decc_set_curve_internal.c29 for (curve = ltc_ecc_curves; curve->prime != NULL; curve++) { in _ecc_oid_lookup()
30 if (_ecc_cmp_hex_bn(curve->prime, key->dp.prime, bn) != 1) continue; in _ecc_oid_lookup()
40 if (curve->prime && curve->OID) { in _ecc_oid_lookup()
54 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve()
62 if ((err = mp_copy(srckey->dp.prime, key->dp.prime )) != CRYPT_OK) { goto error; } in ecc_copy_curve()
86 int ecc_set_curve_from_mpis(void *a, void *b, void *prime, void *order, void *gx, void *gy, unsigne… in ecc_set_curve_from_mpis() argument
93 LTC_ARGCHK(prime != NULL); in ecc_set_curve_from_mpis()
98 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis()
106 if ((err = mp_copy(prime, key->dp.prime )) != CRYPT_OK) { goto error; } in ecc_set_curve_from_mpis()
115 key->dp.size = mp_unsigned_bin_size(prime); in ecc_set_curve_from_mpis()
A Dltc_ecc_verify_key.c27 void *prime = key->dp.prime; in ltc_ecc_verify_key() local
33 if ((ltc_mp.compare(key->pubkey.x, prime) != LTC_MP_LT) || in ltc_ecc_verify_key()
34 (ltc_mp.compare(key->pubkey.y, prime) != LTC_MP_LT) || in ltc_ecc_verify_key()
50 …if ((err = ltc_ecc_mulmod(order, &(key->pubkey), point, a, prime, 1)) != CRYPT_OK) { goto done… in ltc_ecc_verify_key()
52 err = ltc_ecc_is_point_at_infinity(point, prime, &inf); in ltc_ecc_verify_key()
A Decc_shared_secret.c33 void *prime, *a; in ecc_shared_secret() local
52 prime = private_key->dp.prime; in ecc_shared_secret()
55 …if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, a, prime, 1)) != CRYPT_OK… in ecc_shared_secret()
57 x = (unsigned long)mp_unsigned_bin_size(prime); in ecc_shared_secret()
A Decc_set_key.c18 void *prime, *a, *b; in ecc_set_key() local
24 prime = key->dp.prime; in ecc_set_key()
38 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, a, prime, 1)) != CRYPT_OK) … in ecc_set_key()
42 …if ((err = ltc_ecc_import_point(in, inlen, prime, a, b, key->pubkey.x, key->pubkey.y)) != CRYPT_OK… in ecc_set_key()
A Decc_import_x509.c42 void *prime, *order, *a, *b, *gx, *gy; in _ecc_import_x509_with_curve() local
50 if ((err = mp_init_multi(&prime, &order, &a, &b, &gx, &gy, NULL)) != CRYPT_OK) { in _ecc_import_x509_with_curve()
64 LTC_SET_ASN1(seq_fieldid, 1, LTC_ASN1_INTEGER, prime, 1UL); in _ecc_import_x509_with_curve()
82 …if ((err = ltc_ecc_import_point(bin_g, len_g, prime, a, b, gx, gy)) != CRYPT_OK) { goto er… in _ecc_import_x509_with_curve()
84 …if ((err = ecc_set_curve_from_mpis(a, b, prime, order, gx, gy, cofactor, key)) != CRYPT_OK) { goto… in _ecc_import_x509_with_curve()
89 mp_clear_multi(prime, order, a, b, gx, gy, NULL); in _ecc_import_x509_with_curve()
A Decc_import_openssl.c51 void *prime, *order, *a, *b, *gx, *gy; in _ecc_import_private_with_curve() local
59 if ((err = mp_init_multi(&prime, &order, &a, &b, &gx, &gy, NULL)) != CRYPT_OK) { in _ecc_import_private_with_curve()
82 LTC_SET_ASN1(seq_fieldid, 1, LTC_ASN1_INTEGER, prime, 1UL); in _ecc_import_private_with_curve()
98 …if ((err = ltc_ecc_import_point(bin_g, len_g, prime, a, b, gx, gy)) != CRYPT_OK) { goto er… in _ecc_import_private_with_curve()
100 …if ((err = ecc_set_curve_from_mpis(a, b, prime, order, gx, gy, cofactor, key)) != CRYPT_OK) { goto… in _ecc_import_private_with_curve()
105 mp_clear_multi(prime, order, a, b, gx, gy, NULL); in _ecc_import_private_with_curve()
A Decc_set_curve.c22 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve()
30 if ((err = mp_read_radix(key->dp.prime, cu->prime, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve()
39 key->dp.size = mp_unsigned_bin_size(key->dp.prime); in ecc_set_curve()
A Decc_export_openssl.c27 void *prime, *order, *a, *b, *gx, *gy; in ecc_export_openssl() local
44 prime = key->dp.prime; in ecc_export_openssl()
114 LTC_SET_ASN1(seq_fieldid, 1, LTC_ASN1_INTEGER, prime, 1UL); in ecc_export_openssl()
A Decc_import_pkcs8.c142 ltc_asn1_list *prime = field->child->next; in ecc_import_pkcs8() local
149 …if ((err = ltc_ecc_import_point(point_g->data, point_g->size, prime->data, a, b, gx, gy)) != CRYPT… in ecc_import_pkcs8()
152 …if ((err = ecc_set_curve_from_mpis(a, b, prime->data, order->data, gx, gy, cofactor, key)) != CRYP… in ecc_import_pkcs8()
/optee_os/core/lib/libtomcrypt/src/pk/dh/
A Ddh_set.c36 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_set_pg()
41 …if ((err = mp_read_unsigned_bin(key->prime, (unsigned char*)p, plen)) != CRYPT_OK) { goto LBL_ERR… in dh_set_pg()
68 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_set_pg_groupsize()
72 if ((err = mp_read_radix(key->prime, ltc_dh_sets[i].prime, 16)) != CRYPT_OK) { goto LBL_ERR; } in dh_set_pg_groupsize()
102 … if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) { goto LBL_ERR; } in dh_set_key()
A Ddh_import.c32 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_import()
51 LTC_ASN1_INTEGER, 1UL, key->prime, in dh_import()
58 if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) { in dh_import()
67 LTC_ASN1_INTEGER, 1UL, key->prime, in dh_import()
A Ddh_make_key.c63 LTC_ARGCHK(key->prime != NULL); in dh_make_key()
75 key_size_p = mp_unsigned_bin_size(key->prime); in dh_make_key()
93 arg_mod = key->prime; in dh_make_key()
127 err = mp_exptmod(key->base, key->x, key->prime, key->y); in dh_make_key()
A Ddh_shared_secret.c41 … if (mp_cmp(private_key->prime, public_key->prime) != LTC_MP_EQ) { return CRYPT_PK_TYPE_MISMATCH; } in dh_shared_secret()
55 if ((err = mp_exptmod(public_key->y, private_key->x, private_key->prime, tmp)) != CRYPT_OK) { in dh_shared_secret()
A Ddh_set_pg_dhparam.c34 if ((err = mp_init_multi(&key->x, &key->y, &key->base, &key->prime, NULL)) != CRYPT_OK) { in dh_set_pg_dhparam()
38 LTC_ASN1_INTEGER, 1UL, key->prime, in dh_set_pg_dhparam()
A Ddh_export.c39 LTC_ASN1_INTEGER, 1UL, key->prime, in dh_export()
50 LTC_ASN1_INTEGER, 1UL, key->prime, in dh_export()
A Ddh_generate_key.c58 keysize = _dh_groupsize_to_keysize(mp_unsigned_bin_size(key->prime)); in dh_generate_key()
83 if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) { in dh_generate_key()
/optee_os/core/lib/libtomcrypt/src/math/
A Dgmp_desc.c297 LTC_ARGCHK(prime != NULL); in sqrtmod_prime()
319 mpz_add_ui(t1, prime, 1); in sqrtmod_prime()
321 mpz_powm(ret, n, t1, prime); in sqrtmod_prime()
329 mpz_set(Q, prime); in sqrtmod_prime()
351 mpz_powm(C, Z, Q, prime); in sqrtmod_prime()
356 mpz_powm(R, n, t1, prime); in sqrtmod_prime()
358 mpz_powm(T, n, Q, prime); in sqrtmod_prime()
381 mpz_powm(t1, C, t1, prime); in sqrtmod_prime()
384 mpz_mod(C, C, prime); in sqrtmod_prime()
387 mpz_mod(R, R, prime); in sqrtmod_prime()
[all …]
/optee_os/core/lib/libtomcrypt/
A Dsm2-pke.c175 ltc_key.dp.prime, 1); in sm2_ltc_pke_decrypt()
181 ltc_res = ltc_ecc_is_point_at_infinity(S, ltc_key.dp.prime, in sm2_ltc_pke_decrypt()
184 ltc_res = ltc_ecc_is_point_at_infinity(C1, ltc_key.dp.prime, in sm2_ltc_pke_decrypt()
201 ltc_key.dp.prime, 1); in sm2_ltc_pke_decrypt()
375 ltc_key.dp.prime, 1); in sm2_ltc_pke_encrypt()
397 ltc_key.dp.prime, 1); in sm2_ltc_pke_encrypt()
403 ltc_res = ltc_ecc_is_point_at_infinity(S, ltc_key.dp.prime, in sm2_ltc_pke_encrypt()
407 ltc_key.dp.prime, &inf); in sm2_ltc_pke_encrypt()
427 ltc_key.dp.prime, 1); in sm2_ltc_pke_encrypt()
A Dsm2-dsa.c72 ltc_key.dp.prime, 1); in sm2_ltc_dsa_sign()
211 ltc_res = mp_montgomery_setup(ltc_key.dp.prime, &mp); in sm2_ltc_dsa_verify()
216 ltc_res = mp_montgomery_normalization(mu, ltc_key.dp.prime); in sm2_ltc_dsa_verify()
221 ltc_res = mp_mulmod(ltc_key.dp.A, mu, ltc_key.dp.prime, ma); in sm2_ltc_dsa_verify()
227 x1y1p, ma, ltc_key.dp.prime); in sm2_ltc_dsa_verify()
A Dsm2-kep.c286 ltc_res = mp_montgomery_setup(peer_key->dp.prime, &mp); in sm2_kep_derive()
290 ltc_res = mp_montgomery_normalization(mu, peer_key->dp.prime); in sm2_kep_derive()
294 ltc_res = mp_mulmod(peer_key->dp.A, mu, peer_key->dp.prime, ma); in sm2_kep_derive()
303 x2bar, U, ma, peer_key->dp.prime); in sm2_kep_derive()
315 ltc_res = ltc_ecc_mulmod(htA, U, U, peer_key->dp.A, peer_key->dp.prime, in sm2_kep_derive()
320 ltc_res = ltc_ecc_is_point_at_infinity(U, peer_key->dp.prime, &inf); in sm2_kep_derive()
A Ddh.c48 ltc_res = mp_init_multi(&ltc_tmp_key.base, &ltc_tmp_key.prime, NULL); in crypto_acipher_gen_dh_key()
54 mp_copy(key->p, ltc_tmp_key.prime); in crypto_acipher_gen_dh_key()

Completed in 19 milliseconds

12