/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | ecjpake.c | 188 const mbedtls_ecp_point *G, in ecjpake_hash() argument 285 &VV, &h, X, &r, G ) ); in ecjpake_zkp_read() 514 &ctx->grp.G, in mbedtls_ecjpake_read_round_one() 533 &ctx->grp.G, in mbedtls_ecjpake_write_round_one() 572 mbedtls_ecp_point G; /* C: GB, S: GA */ in mbedtls_ecjpake_read_round_two() local 578 mbedtls_ecp_point_init( &G ); in mbedtls_ecjpake_read_round_two() 586 MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G, in mbedtls_ecjpake_read_round_two() 617 mbedtls_ecp_point_free( &G ); in mbedtls_ecjpake_read_round_two() 662 mbedtls_ecp_point G; /* C: GA, S: GB */ in mbedtls_ecjpake_write_round_two() local 674 mbedtls_ecp_point_init( &G ); in mbedtls_ecjpake_write_round_two() [all …]
|
A D | ecp_curves.c | 674 G ## _p, sizeof( G ## _p ), \ 675 G ## _a, sizeof( G ## _a ), \ 676 G ## _b, sizeof( G ## _b ), \ 677 G ## _gx, sizeof( G ## _gx ), \ 678 G ## _gy, sizeof( G ## _gy ), \ 679 G ## _n, sizeof( G ## _n ) ) 682 G ## _p, sizeof( G ## _p ), \ 684 G ## _b, sizeof( G ## _b ), \ 685 G ## _gx, sizeof( G ## _gx ), \ 686 G ## _gy, sizeof( G ## _gy ), \ [all …]
|
A D | dhm.c | 140 ( ret = dhm_read_bignum( &ctx->G, p, end ) ) != 0 || in mbedtls_dhm_read_params() 195 MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &ctx->GX, &ctx->G, &ctx->X, in dhm_make_common() 240 n2 = mbedtls_mpi_size( &ctx->G ); in mbedtls_dhm_make_params() 245 DHM_MPI_EXPORT( &ctx->G , n2 ); in mbedtls_dhm_make_params() 263 const mbedtls_mpi *G ) in mbedtls_dhm_set_group() argument 268 DHM_VALIDATE_RET( G != NULL ); in mbedtls_dhm_set_group() 271 ( ret = mbedtls_mpi_copy( &ctx->G, G ) ) != 0 ) in mbedtls_dhm_set_group() 470 mbedtls_mpi_free( &ctx->G ); in mbedtls_dhm_free() 538 ( ret = mbedtls_asn1_get_mpi( &p, end, &dhm->G ) ) != 0 ) in mbedtls_dhm_parse_dhm()
|
A D | pkparse.c | 345 if( ( ret = mbedtls_ecp_point_read_binary( grp, &grp->G, in pk_group_from_specified() 355 mbedtls_mpi_read_binary( &grp->G.X, p + 1, len - 1 ) != 0 || in pk_group_from_specified() 356 mbedtls_mpi_lset( &grp->G.Y, p[0] - 2 ) != 0 || in pk_group_from_specified() 357 mbedtls_mpi_lset( &grp->G.Z, 1 ) != 0 ) in pk_group_from_specified() 404 mbedtls_mpi_cmp_mpi( &grp->G.X, &ref.G.X ) == 0 && in pk_group_id_from_group() 405 mbedtls_mpi_cmp_mpi( &grp->G.Z, &ref.G.Z ) == 0 && in pk_group_id_from_group() 407 mbedtls_mpi_get_bit( &grp->G.Y, 0 ) == mbedtls_mpi_get_bit( &ref.G.Y, 0 ) ) in pk_group_id_from_group() 969 ( ret = mbedtls_ecp_mul( &eck->grp, &eck->Q, &eck->d, &eck->grp.G, in pk_parse_key_sec1_der()
|
A D | ecp.c | 666 if( grp->G.X.p == NULL ) in mbedtls_ecp_get_type() 669 if( grp->G.Y.p == NULL ) in mbedtls_ecp_get_type() 698 mbedtls_ecp_point_init( &grp->G ); in mbedtls_ecp_group_init() 751 mbedtls_ecp_point_free( &grp->G ); in mbedtls_ecp_group_free() 2314 p_eq_g = ( mbedtls_mpi_cmp_mpi( &P->Y, &grp->G.Y ) == 0 && in ecp_mul_comb() 2315 mbedtls_mpi_cmp_mpi( &P->X, &grp->G.X ) == 0 ); in ecp_mul_comb() 3197 const mbedtls_ecp_point *G, in mbedtls_ecp_gen_keypair_base() argument 3205 ECP_VALIDATE_RET( G != NULL ); in mbedtls_ecp_gen_keypair_base() 3210 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( grp, Q, d, G, f_rng, p_rng ) ); in mbedtls_ecp_gen_keypair_base() 3550 &grp, &R, &m, &grp.G, in mbedtls_ecp_self_test() [all …]
|
/optee_os-3.20.0/core/arch/arm/dts/ |
A D | stm32mp15-pinctrl.dtsi | 345 <STM32_PINMUX('G', 13, AF11)>, /* ETH1_TXD0 */ 346 <STM32_PINMUX('G', 14, AF11)>; /* ETH1_TXD1 */ 482 <STM32_PINMUX('G', 12, AF12)>; /* FMC_NE4 */ 675 <STM32_PINMUX('G', 12, AF14)>, /* LCD_B1 */ 676 <STM32_PINMUX('G', 10, AF14)>, /* LCD_B2 */ 711 <STM32_PINMUX('G', 12, ANALOG)>, /* LCD_B1 */ 712 <STM32_PINMUX('G', 10, ANALOG)>, /* LCD_B2 */ 863 <STM32_PINMUX('G', 13, AF14)>, /* LCD_R0 */ 878 <STM32_PINMUX('G', 8, AF14)>, /* LCD_G7 */ 880 <STM32_PINMUX('G', 12, AF14)>, /* LCD_B1 */ [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/ |
A D | kseed.c | 178 #define G(x) (SS3[((x)>>24)&255] ^ SS2[((x)>>16)&255] ^ SS1[((x)>>8)&255] ^ SS0[(x)&255]) macro 181 T2 = G((R1 ^ K1) ^ (R2 ^ K2)); \ 182 T = G( G(T2 + (R1 ^ K1)) + T2); \ 184 L1 ^= (T + G(T2 + (R1 ^ K1))); \ 214 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]); in kseed_setup() 215 skey->kseed.K[2*i+1] = G(k2 - k4 + KCi[i]); in kseed_setup()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ltc_ecc_mulmod_timing.c | 25 int ltc_ecc_mulmod(void *k, const ecc_point *G, ecc_point *R, void *a, void *modulus, int map) in ltc_ecc_mulmod() argument 34 LTC_ARGCHK(G != NULL); in ltc_ecc_mulmod() 38 if ((err = ltc_ecc_is_point_at_infinity(G, modulus, &inf)) != CRYPT_OK) return err; in ltc_ecc_mulmod() 75 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 76 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 77 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod()
|
A D | ltc_ecc_mulmod.c | 26 int ltc_ecc_mulmod(void *k, const ecc_point *G, ecc_point *R, void *a, void *modulus, int map) in ltc_ecc_mulmod() argument 35 LTC_ARGCHK(G != NULL); in ltc_ecc_mulmod() 39 if ((err = ltc_ecc_is_point_at_infinity(G, modulus, &inf)) != CRYPT_OK) return err; in ltc_ecc_mulmod() 76 if ((err = ltc_ecc_copy_point(G, tG)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 78 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 79 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 80 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/ |
A D | blake2b.c | 277 #define G(r, i, a, b, c, d) … macro 291 …G(r, 0, v[0], v[4], v[8], v[12]); … 292 …G(r, 1, v[1], v[5], v[9], v[13]); … 293 …G(r, 2, v[2], v[6], v[10], v[14]); … 294 …G(r, 3, v[3], v[7], v[11], v[15]); … 295 …G(r, 4, v[0], v[5], v[10], v[15]); … 296 …G(r, 5, v[1], v[6], v[11], v[12]); … 297 …G(r, 6, v[2], v[7], v[8], v[13]); … 298 …G(r, 7, v[3], v[4], v[9], v[14]); … 347 #undef G
|
A D | blake2s.c | 270 #define G(r, i, a, b, c, d) … macro 283 …G(r, 0, v[0], v[4], v[8], v[12]); … 284 …G(r, 1, v[1], v[5], v[9], v[13]); … 285 …G(r, 2, v[2], v[6], v[10], v[14]); … 286 …G(r, 3, v[3], v[7], v[11], v[15]); … 287 …G(r, 4, v[0], v[5], v[10], v[15]); … 288 …G(r, 5, v[1], v[6], v[11], v[12]); … 289 …G(r, 6, v[2], v[7], v[8], v[13]); … 290 …G(r, 7, v[3], v[4], v[9], v[14]); … 336 #undef G
|
A D | md5.c | 32 #define G(x,y,z) (y ^ (z & (y ^ x))) macro 42 a = (a + G(b,c,d) + M + t); a = ROL(a, s) + b; 81 a = (a + G(b,c,d) + M + t); a = ROLc(a, s) + b;
|
A D | md4.c | 45 #define G(x, y, z) ((x & y) | (z & (x | y))) macro 59 (a) += G ((b), (c), (d)) + (x) + 0x5a827999UL; \
|
A D | rmd128.c | 38 #define G(x, y, z) (((x) & (y)) | (~(x) & (z))) macro 48 (a) += G((b), (c), (d)) + (x) + 0x5a827999UL;\ 64 (a) += G((b), (c), (d)) + (x) + 0x6d703ef3UL;\
|
A D | rmd256.c | 32 #define G(x, y, z) (((x) & (y)) | (~(x) & (z))) macro 42 (a) += G((b), (c), (d)) + (x) + 0x5a827999UL;\ 58 (a) += G((b), (c), (d)) + (x) + 0x6d703ef3UL;\
|
/optee_os-3.20.0/core/crypto/ |
A D | sm3.c | 57 uint32_t A, B, C, D, E, F, G, H; in sm3_process() local 119 G = ctx->state[6]; in sm3_process() 126 TT2 = GG0(E, F, G) + H + SS1 + W[j]; in sm3_process() 131 H = G; in sm3_process() 132 G = ROTL(F, 19); in sm3_process() 141 TT2 = GG1(E, F, G) + H + SS1 + W[j]; in sm3_process() 146 H = G; in sm3_process() 147 G = ROTL(F, 19); in sm3_process() 158 ctx->state[6] ^= G; in sm3_process()
|
/optee_os-3.20.0/lib/libmbedtls/core/ |
A D | dh.c | 58 dhm.G = *(mbedtls_mpi *)key->g; in crypto_acipher_gen_dh_key() 90 mbedtls_mpi_init(&dhm.G); in crypto_acipher_gen_dh_key() 109 dhm.G = *(mbedtls_mpi *)private_key->g; in crypto_acipher_dh_shared_secret() 135 mbedtls_mpi_init(&dhm.G); in crypto_acipher_dh_shared_secret()
|
A D | sm2-dsa.c | 75 mres = mbedtls_ecp_mul(&grp, &x1y1p, &k, &grp.G, mbd_rand, in sm2_mbedtls_dsa_sign() 237 mres = mbedtls_ecp_muladd(&grp, &x1y1p, &sprime, &grp.G, &t, &PA); in sm2_mbedtls_dsa_verify()
|
A D | sm2-kep.c | 83 mres = mbedtls_mpi_write_binary(&grp->G.X, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 92 mres = mbedtls_mpi_write_binary(&grp->G.Y, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | dhm.h | 115 mbedtls_mpi G; /*!< The generator. */ member 218 const mbedtls_mpi *G );
|
A D | ecp.h | 272 mbedtls_ecp_point G; /*!< The generator of the subgroup used. */ member 1189 const mbedtls_ecp_point *G,
|
/optee_os-3.20.0/core/arch/arm/plat-stm32mp1/ |
A D | conf.mk | 16 flavorlist-cryp-1G = $(flavor_dts_file-157C_DHCOM_PDK2) \ 20 flavorlist-no_cryp-1G = $(flavor_dts_file-157A_DHCOR_AVENGER96) 23 $(flavorlist-no_cryp-1G) 28 flavorlist-1G = $(flavorlist-cryp-1G) \ 29 $(flavorlist-no_cryp-1G)
|
/optee_os-3.20.0/core/arch/arm/plat-hikey/ |
A D | platform_config.h | 147 cannot support boards with 4G RAM or more
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_math.h | 385 const ecc_point *G,
|
/optee_os-3.20.0/core/arch/arm/crypto/ |
A D | ghash-ce-core_a32.S | 95 vmull.p8 t3q, \ad, \b2 @ G = A*B2 102 veor t1q, t1q, t3q @ M = G + H
|