/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | ecjpake.c | 191 const mbedtls_ecp_point *G, in ecjpake_hash() argument 290 &VV, &h, X, &r, G ) ); in ecjpake_zkp_read() 519 &ctx->grp.G, in mbedtls_ecjpake_read_round_one() 538 &ctx->grp.G, in mbedtls_ecjpake_write_round_one() 577 mbedtls_ecp_point G; /* C: GB, S: GA */ in mbedtls_ecjpake_read_round_two() local 583 mbedtls_ecp_point_init( &G ); in mbedtls_ecjpake_read_round_two() 591 MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G, in mbedtls_ecjpake_read_round_two() 622 mbedtls_ecp_point_free( &G ); in mbedtls_ecjpake_read_round_two() 667 mbedtls_ecp_point G; /* C: GA, S: GB */ in mbedtls_ecjpake_write_round_two() local 679 mbedtls_ecp_point_init( &G ); in mbedtls_ecjpake_write_round_two() [all …]
|
A D | ecp_curves.c | 674 G ## _p, sizeof( G ## _p ), \ 675 G ## _a, sizeof( G ## _a ), \ 676 G ## _b, sizeof( G ## _b ), \ 677 G ## _gx, sizeof( G ## _gx ), \ 678 G ## _gy, sizeof( G ## _gy ), \ 679 G ## _n, sizeof( G ## _n ) ) 682 G ## _p, sizeof( G ## _p ), \ 684 G ## _b, sizeof( G ## _b ), \ 685 G ## _gx, sizeof( G ## _gx ), \ 686 G ## _gy, sizeof( G ## _gy ), \ [all …]
|
A D | dhm.c | 140 ( ret = dhm_read_bignum( &ctx->G, p, end ) ) != 0 || in mbedtls_dhm_read_params() 195 MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &ctx->GX, &ctx->G, &ctx->X, in dhm_make_common() 240 n2 = mbedtls_mpi_size( &ctx->G ); in mbedtls_dhm_make_params() 245 DHM_MPI_EXPORT( &ctx->G , n2 ); in mbedtls_dhm_make_params() 263 const mbedtls_mpi *G ) in mbedtls_dhm_set_group() argument 268 DHM_VALIDATE_RET( G != NULL ); in mbedtls_dhm_set_group() 271 ( ret = mbedtls_mpi_copy( &ctx->G, G ) ) != 0 ) in mbedtls_dhm_set_group() 470 mbedtls_mpi_free( &ctx->G ); in mbedtls_dhm_free() 538 ( ret = mbedtls_asn1_get_mpi( &p, end, &dhm->G ) ) != 0 ) in mbedtls_dhm_parse_dhm()
|
A D | pkparse.c | 345 if( ( ret = mbedtls_ecp_point_read_binary( grp, &grp->G, in pk_group_from_specified() 355 mbedtls_mpi_read_binary( &grp->G.X, p + 1, len - 1 ) != 0 || in pk_group_from_specified() 356 mbedtls_mpi_lset( &grp->G.Y, p[0] - 2 ) != 0 || in pk_group_from_specified() 357 mbedtls_mpi_lset( &grp->G.Z, 1 ) != 0 ) in pk_group_from_specified() 404 mbedtls_mpi_cmp_mpi( &grp->G.X, &ref.G.X ) == 0 && in pk_group_id_from_group() 405 mbedtls_mpi_cmp_mpi( &grp->G.Z, &ref.G.Z ) == 0 && in pk_group_id_from_group() 407 mbedtls_mpi_get_bit( &grp->G.Y, 0 ) == mbedtls_mpi_get_bit( &ref.G.Y, 0 ) ) in pk_group_id_from_group() 969 ( ret = mbedtls_ecp_mul( &eck->grp, &eck->Q, &eck->d, &eck->grp.G, in pk_parse_key_sec1_der()
|
/optee_os/core/lib/libtomcrypt/src/ciphers/ |
A D | kseed.c | 185 #define G(x) (SS3[((x)>>24)&255] ^ SS2[((x)>>16)&255] ^ SS1[((x)>>8)&255] ^ SS0[(x)&255]) macro 188 T2 = G((R1 ^ K1) ^ (R2 ^ K2)); \ 189 T = G( G(T2 + (R1 ^ K1)) + T2); \ 191 L1 ^= (T + G(T2 + (R1 ^ K1))); \ 221 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]); in kseed_setup() 222 skey->kseed.K[2*i+1] = G(k2 - k4 + KCi[i]); in kseed_setup()
|
/optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ltc_ecc_mulmod_timing.c | 32 int ltc_ecc_mulmod(void *k, const ecc_point *G, ecc_point *R, void *a, void *modulus, int map) in ltc_ecc_mulmod() argument 41 LTC_ARGCHK(G != NULL); in ltc_ecc_mulmod() 45 if ((err = ltc_ecc_is_point_at_infinity(G, modulus, &inf)) != CRYPT_OK) return err; in ltc_ecc_mulmod() 82 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 83 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 84 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod()
|
A D | ltc_ecc_mulmod.c | 33 int ltc_ecc_mulmod(void *k, const ecc_point *G, ecc_point *R, void *a, void *modulus, int map) in ltc_ecc_mulmod() argument 42 LTC_ARGCHK(G != NULL); in ltc_ecc_mulmod() 46 if ((err = ltc_ecc_is_point_at_infinity(G, modulus, &inf)) != CRYPT_OK) return err; in ltc_ecc_mulmod() 83 if ((err = ltc_ecc_copy_point(G, tG)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 85 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 86 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 87 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod()
|
/optee_os/core/arch/arm/dts/ |
A D | stm32mp15-pinctrl.dtsi | 118 <STM32_PINMUX('G', 13, AF11)>, /* ETH_RGMII_TXD0 */ 119 <STM32_PINMUX('G', 14, AF11)>, /* ETH_RGMII_TXD1 */ 335 <STM32_PINMUX('G', 12, AF14)>, /* LCD_B1 */ 336 <STM32_PINMUX('G', 10, AF14)>, /* LCD_B2 */ 371 <STM32_PINMUX('G', 12, ANALOG)>, /* LCD_B1 */ 372 <STM32_PINMUX('G', 10, ANALOG)>, /* LCD_B2 */ 644 <STM32_PINMUX('G', 7, AF11)>; /* QSPI_BK2_IO3 */ 824 <STM32_PINMUX('G', 6, AF10)>; /* SDMMC2_CMD */ 868 <STM32_PINMUX('G', 6, ANALOG)>; /* SDMMC2_CMD */ 878 <STM32_PINMUX('G', 6, AF10)>; /* SDMMC2_CMD */ [all …]
|
/optee_os/core/crypto/ |
A D | sm3.c | 52 uint32_t A, B, C, D, E, F, G, H; in sm3_process() local 114 G = ctx->state[6]; in sm3_process() 121 TT2 = GG0(E, F, G) + H + SS1 + W[j]; in sm3_process() 126 H = G; in sm3_process() 127 G = ROTL(F, 19); in sm3_process() 136 TT2 = GG1(E, F, G) + H + SS1 + W[j]; in sm3_process() 141 H = G; in sm3_process() 142 G = ROTL(F, 19); in sm3_process() 153 ctx->state[6] ^= G; in sm3_process()
|
/optee_os/core/lib/libtomcrypt/src/hashes/ |
A D | blake2b.c | 284 #define G(r, i, a, b, c, d) … macro 298 …G(r, 0, v[0], v[4], v[8], v[12]); … 299 …G(r, 1, v[1], v[5], v[9], v[13]); … 300 …G(r, 2, v[2], v[6], v[10], v[14]); … 301 …G(r, 3, v[3], v[7], v[11], v[15]); … 302 …G(r, 4, v[0], v[5], v[10], v[15]); … 303 …G(r, 5, v[1], v[6], v[11], v[12]); … 304 …G(r, 6, v[2], v[7], v[8], v[13]); … 305 …G(r, 7, v[3], v[4], v[9], v[14]); … 354 #undef G
|
A D | blake2s.c | 277 #define G(r, i, a, b, c, d) … macro 290 …G(r, 0, v[0], v[4], v[8], v[12]); … 291 …G(r, 1, v[1], v[5], v[9], v[13]); … 292 …G(r, 2, v[2], v[6], v[10], v[14]); … 293 …G(r, 3, v[3], v[7], v[11], v[15]); … 294 …G(r, 4, v[0], v[5], v[10], v[15]); … 295 …G(r, 5, v[1], v[6], v[11], v[12]); … 296 …G(r, 6, v[2], v[7], v[8], v[13]); … 297 …G(r, 7, v[3], v[4], v[9], v[14]); … 343 #undef G
|
/optee_os/lib/libmbedtls/core/ |
A D | dh.c | 58 dhm.G = *(mbedtls_mpi *)key->g; in crypto_acipher_gen_dh_key() 90 mbedtls_mpi_init(&dhm.G); in crypto_acipher_gen_dh_key() 109 dhm.G = *(mbedtls_mpi *)private_key->g; in crypto_acipher_dh_shared_secret() 135 mbedtls_mpi_init(&dhm.G); in crypto_acipher_dh_shared_secret()
|
A D | sm2-dsa.c | 75 mres = mbedtls_ecp_mul(&grp, &x1y1p, &k, &grp.G, mbd_rand, in sm2_mbedtls_dsa_sign() 237 mres = mbedtls_ecp_muladd(&grp, &x1y1p, &sprime, &grp.G, &t, &PA); in sm2_mbedtls_dsa_verify()
|
/optee_os/core/arch/arm/plat-stm32mp1/ |
A D | conf.mk | 11 flavorlist-cryp-1G = $(flavor_dts_file-157C_ED1) \ 19 flavorlist-1G = $(flavorlist-cryp-1G)
|
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | dhm.h | 104 mbedtls_mpi G; /*!< The generator. */ member 207 const mbedtls_mpi *G );
|
A D | ecp.h | 262 mbedtls_ecp_point G; /*!< The generator of the subgroup used. */ member 1179 const mbedtls_ecp_point *G,
|
/optee_os/out/arm/export-ta_arm64/include/mbedtls/ |
A D | dhm.h | 104 mbedtls_mpi G; /*!< The generator. */ member 207 const mbedtls_mpi *G );
|
A D | ecp.h | 262 mbedtls_ecp_point G; /*!< The generator of the subgroup used. */ member 1179 const mbedtls_ecp_point *G,
|
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/ |
A D | dhm.h | 104 mbedtls_mpi G; /*!< The generator. */ member 207 const mbedtls_mpi *G );
|
A D | ecp.h | 262 mbedtls_ecp_point G; /*!< The generator of the subgroup used. */ member 1179 const mbedtls_ecp_point *G,
|
/optee_os/out/arm/export-ta_arm32/include/mbedtls/ |
A D | dhm.h | 104 mbedtls_mpi G; /*!< The generator. */ member 207 const mbedtls_mpi *G );
|
A D | ecp.h | 262 mbedtls_ecp_point G; /*!< The generator of the subgroup used. */ member 1179 const mbedtls_ecp_point *G,
|
/optee_os/out/arm/export-ta_arm64/host_include/mbedtls/ |
A D | dhm.h | 104 mbedtls_mpi G; /*!< The generator. */ member 207 const mbedtls_mpi *G );
|
A D | ecp.h | 262 mbedtls_ecp_point G; /*!< The generator of the subgroup used. */ member 1179 const mbedtls_ecp_point *G,
|
/optee_os/core/arch/arm/plat-hikey/ |
A D | platform_config.h | 147 cannot support boards with 4G RAM or more
|