Searched refs:tmp2 (Results 1 – 3 of 3) sorted by relevance
/optee_os/core/lib/libtomcrypt/src/pk/rsa/ |
A D | rsa_make_key.c | 21 void *p, *q, *tmp1, *tmp2; in s_rsa_make_key() local 32 if ((err = mp_init_multi(&p, &q, &tmp1, &tmp2, NULL)) != CRYPT_OK) { in s_rsa_make_key() 42 …if ((err = mp_gcd( tmp1, e, tmp2)) != CRYPT_OK) { goto cleanup; } /* tmp2 = gcd(p-1… in s_rsa_make_key() 43 …} while (mp_cmp_d( tmp2, 1) != 0); /* while e div… in s_rsa_make_key() 49 …if ((err = mp_gcd( tmp1, e, tmp2)) != CRYPT_OK) { goto cleanup; } /* tmp2 = gcd(q-1, e)… in s_rsa_make_key() 50 …} while (mp_cmp_d( tmp2, 1) != 0); /* while e divi… in s_rsa_make_key() 53 …if ((err = mp_sub_d( p, 1, tmp2)) != CRYPT_OK) { goto cleanup; } /* tmp2 = p-1 … in s_rsa_make_key() 55 …if ((err = mp_lcm( tmp1, tmp2, tmp1)) != CRYPT_OK) { goto cleanup; } /* tmp1 = lcm(… in s_rsa_make_key() 69 …if ((err = mp_sub_d( q, 1, tmp2)) != CRYPT_OK) { goto errkey; } /* tmp2 = p-1… in s_rsa_make_key() 71 …if ((err = mp_mod( key->d, tmp2, key->dQ)) != CRYPT_OK) { goto errkey; } /* dQ = d mod… in s_rsa_make_key() [all …]
|
/optee_os/core/lib/libtomcrypt/src/pk/dsa/ |
A D | dsa_verify_key.c | 53 void *tmp1, *tmp2; in dsa_int_validate_pqg() local 72 if ((err = mp_init_multi(&tmp1, &tmp2, NULL)) != CRYPT_OK) { return err; } in dsa_int_validate_pqg() 76 if ((err = mp_div(tmp1, key->q, tmp1, tmp2)) != CRYPT_OK) { goto error; } in dsa_int_validate_pqg() 77 if (mp_iszero(tmp2) != LTC_MP_YES) { in dsa_int_validate_pqg() 94 mp_clear_multi(tmp2, tmp1, NULL); in dsa_int_validate_pqg()
|
/optee_os/core/lib/libtomcrypt/src/ciphers/twofish/ |
A D | twofish.c | 354 unsigned char tmp[4], tmp2[4], M[8*4]; in _twofish_setup() local 394 h_func(tmp, tmp2, M, k, 0); in _twofish_setup() 395 LOAD32L(A, tmp2); in _twofish_setup() 401 h_func(tmp, tmp2, M, k, 1); in _twofish_setup() 402 LOAD32L(B, tmp2); in _twofish_setup()
|
Completed in 5 milliseconds