/optee_os/core/lib/libtomcrypt/src/pk/x25519/ |
A D | x25519_import.c | 37 if (inlen == sizeof(key->pub)) { in x25519_import() 38 XMEMCPY(key->pub, in, sizeof(key->pub)); in x25519_import() 44 key_len = sizeof(key->pub); in x25519_import() 45 …if ((err = x509_decode_subject_public_key_info(in, inlen, PKA_X25519, key->pub, &key_len, LTC_ASN1… in x25519_import()
|
A D | x25519_set_key.c | 41 tweetnacl_crypto_scalarmult_base(key->pub, key->priv); in x25519_set_key() 44 if (XMEM_NEQ(u, key->pub, sizeof(key->pub)) != 0) { in x25519_set_key() 52 XMEMCPY(key->pub, u, sizeof(key->pub)); in x25519_set_key()
|
A D | x25519_import_x509.c | 21 if (inlen != sizeof(key->pub)) return CRYPT_PK_INVALID_SIZE; in _x25519_decode() 22 XMEMCPY(key->pub, in, sizeof(key->pub)); in _x25519_decode()
|
A D | x25519_shared_secret.c | 43 tweetnacl_crypto_scalarmult(out, private_key->priv, public_key->pub); in x25519_shared_secret()
|
A D | x25519_make_key.c | 41 tweetnacl_crypto_scalarmult_base(key->pub, key->priv); in x25519_make_key()
|
/optee_os/core/lib/libtomcrypt/src/pk/ed25519/ |
A D | ed25519_set_key.c | 41 tweetnacl_crypto_sk_to_pk(key->pub, key->priv); in ed25519_set_key() 44 if (XMEM_NEQ(pk, key->pub, sizeof(key->pub)) != 0) { in ed25519_set_key() 52 XMEMCPY(key->pub, pk, sizeof(key->pub)); in ed25519_set_key()
|
A D | ed25519_import_x509.c | 21 if (inlen != sizeof(key->pub)) return CRYPT_PK_INVALID_SIZE; in _ed25519_decode() 22 XMEMCPY(key->pub, in, sizeof(key->pub)); in _ed25519_decode()
|
A D | ed25519_import.c | 34 key_len = sizeof(key->pub); in ed25519_import() 35 …if ((err = x509_decode_subject_public_key_info(in, inlen, PKA_ED25519, key->pub, &key_len, LTC_ASN… in ed25519_import()
|
A D | ed25519_make_key.c | 33 if ((err = tweetnacl_crypto_sign_keypair(prng, wprng, key->pub, key->priv)) != CRYPT_OK) { in ed25519_make_key()
|
A D | ed25519_sign.c | 54 private_key->priv, private_key->pub); in ed25519_sign()
|
A D | ed25519_verify.c | 58 public_key->pub); in ed25519_verify()
|
/optee_os/core/lib/libtomcrypt/src/pk/ec25519/ |
A D | ec25519_export.c | 82 …err = x509_encode_subject_public_key_info(out, outlen, key->algo, key->pub, 32uL, LTC_ASN1_EOL, NU… in ec25519_export() 84 if (*outlen < sizeof(key->pub)) { in ec25519_export() 87 XMEMCPY(out, key->pub, sizeof(key->pub)); in ec25519_export() 90 *outlen = sizeof(key->pub); in ec25519_export()
|
A D | ec25519_import_pkcs8.c | 77 fp(key->pub, key->priv); in ec25519_import_pkcs8()
|
/optee_os/core/drivers/crypto/se050/adaptors/include/ |
A D | se050_apdu_apis.h | 66 struct se050_ecc_keypub pub; member 74 struct se050_ecc_keypub *pub); 81 struct se050_ecc_keypub *pub,
|
/optee_os/core/drivers/crypto/se050/core/ |
A D | ecc.c | 320 &key_bin.pub.x, &key_bin.pub.x_len); in se050_inject_keypair() 327 &key_bin.pub.y, &key_bin.pub.y_len); in se050_inject_keypair() 330 free(key_bin.pub.x); in se050_inject_keypair() 334 key_bin.pub.curve = curve_tee2se050(key->curve); in se050_inject_keypair() 338 free(key_bin.pub.x); in se050_inject_keypair() 339 free(key_bin.pub.y); in se050_inject_keypair()
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | pk.c | 507 int mbedtls_pk_check_pair( const mbedtls_pk_context *pub, const mbedtls_pk_context *prv ) in mbedtls_pk_check_pair() argument 509 PK_VALIDATE_RET( pub != NULL ); in mbedtls_pk_check_pair() 512 if( pub->pk_info == NULL || in mbedtls_pk_check_pair() 523 if( pub->pk_info->type != MBEDTLS_PK_RSA ) in mbedtls_pk_check_pair() 528 if( pub->pk_info != prv->pk_info ) in mbedtls_pk_check_pair() 532 return( prv->pk_info->check_pair_func( pub->pk_ctx, prv->pk_ctx ) ); in mbedtls_pk_check_pair()
|
A D | pk_wrap.c | 156 static int rsa_check_pair_wrap( const void *pub, const void *prv ) in rsa_check_pair_wrap() argument 158 return( mbedtls_rsa_check_pub_priv( (const mbedtls_rsa_context *) pub, in rsa_check_pair_wrap() 384 static int eckey_check_pair( const void *pub, const void *prv ) in eckey_check_pair() argument 386 return( mbedtls_ecp_check_pub_priv( (const mbedtls_ecp_keypair *) pub, in eckey_check_pair() 795 static int rsa_alt_check_pair( const void *pub, const void *prv ) in rsa_alt_check_pair() argument 802 if( rsa_alt_get_bitlen( prv ) != rsa_get_bitlen( pub ) ) in rsa_alt_check_pair() 814 if( rsa_verify_wrap( (void *) pub, MBEDTLS_MD_NONE, in rsa_alt_check_pair()
|
/optee_os/core/drivers/crypto/se050/adaptors/apis/ |
A D | apdu.c | 611 k_object->curve_id = keypair->pub.curve; in set_ecc_private() 614 keypair->pub.curve, in set_ecc_private() 637 buf = alloc_pubkey_buf(&keypair->pub, &pubkey_len); in set_ecc_pair() 641 k_object->curve_id = keypair->pub.curve; in set_ecc_pair() 644 keypair->pub.curve, in set_ecc_pair()
|
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/ |
A D | pk_internal.h | 88 int (*check_pair_func)( const void *pub, const void *prv );
|
/optee_os/out/arm/export-ta_arm64/host_include/mbedtls/ |
A D | pk_internal.h | 88 int (*check_pair_func)( const void *pub, const void *prv );
|
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | pk_internal.h | 88 int (*check_pair_func)( const void *pub, const void *prv );
|
A D | rsa.h | 513 int mbedtls_rsa_check_pub_priv( const mbedtls_rsa_context *pub,
|
/optee_os/out/arm/export-ta_arm64/include/mbedtls/ |
A D | pk_internal.h | 88 int (*check_pair_func)( const void *pub, const void *prv );
|
/optee_os/out/arm/export-ta_arm32/include/mbedtls/ |
A D | pk_internal.h | 88 int (*check_pair_func)( const void *pub, const void *prv );
|
A D | rsa.h | 513 int mbedtls_rsa_check_pub_priv( const mbedtls_rsa_context *pub,
|