/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_set_curve_internal.c | 20 key->dp.oidlen = 0; in s_ecc_oid_lookup() 35 pk_oid_str_to_num(curve->OID, key->dp.oid, &key->dp.oidlen); in s_ecc_oid_lookup() 47 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve() 48 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_copy_curve() 55 if ((err = mp_copy(srckey->dp.prime, key->dp.prime )) != CRYPT_OK) { goto error; } in ecc_copy_curve() 61 key->dp.cofactor = srckey->dp.cofactor; in ecc_copy_curve() 62 key->dp.size = srckey->dp.size; in ecc_copy_curve() 65 key->dp.oidlen = srckey->dp.oidlen; in ecc_copy_curve() 66 for (i = 0; i < key->dp.oidlen; i++) key->dp.oid[i] = srckey->dp.oid[i]; in ecc_copy_curve() 91 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis() [all …]
|
A D | ecc_set_curve.c | 15 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve() 16 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_set_curve() 23 if ((err = mp_read_radix(key->dp.prime, cu->prime, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 24 if ((err = mp_read_radix(key->dp.order, cu->order, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 25 if ((err = mp_read_radix(key->dp.A, cu->A, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 26 if ((err = mp_read_radix(key->dp.B, cu->B, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 27 if ((err = mp_read_radix(key->dp.base.x, cu->Gx, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 31 key->dp.cofactor = cu->cofactor; in ecc_set_curve() 32 key->dp.size = mp_unsigned_bin_size(key->dp.prime); in ecc_set_curve() 34 key->dp.oidlen = 16; in ecc_set_curve() [all …]
|
A D | ecc_free.c | 21 mp_cleanup_multi(&key->dp.prime, &key->dp.order, in ecc_free() 22 &key->dp.A, &key->dp.B, in ecc_free() 23 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_free()
|
A D | ecc_export_openssl.c | 43 … if (key->dp.oidlen == 0) { err = CRYPT_INVALID_ARG; goto error; } in ecc_export_openssl() 44 LTC_SET_ASN1(&ecparams, 0, LTC_ASN1_OBJECT_IDENTIFIER, key->dp.oid, key->dp.oidlen); in ecc_export_openssl() 47 prime = key->dp.prime; in ecc_export_openssl() 48 order = key->dp.order; in ecc_export_openssl() 49 a = key->dp.A; in ecc_export_openssl() 50 b = key->dp.B; in ecc_export_openssl() 51 gx = key->dp.base.x; in ecc_export_openssl() 52 gy = key->dp.base.y; in ecc_export_openssl() 53 cofactor = key->dp.cofactor; in ecc_export_openssl() 69 err = ltc_ecc_export_point(bin_g, &len_g, gx, gy, key->dp.size, flag_com); in ecc_export_openssl() [all …]
|
A D | ecc_make_key.c | 44 LTC_ARGCHK(key->dp.size > 0); in ecc_generate_key() 53 if ((err = rand_bn_upto(key->k, key->dp.order, prng, wprng)) != CRYPT_OK) { in ecc_generate_key() 58 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, key->dp.A, key->dp.prime, 1)) != … in ecc_generate_key()
|
A D | ecc_set_key.c | 17 prime = key->dp.prime; in ecc_set_key() 18 a = key->dp.A; in ecc_set_key() 19 b = key->dp.B; in ecc_set_key() 26 if (mp_iszero(key->k) || (mp_cmp(key->k, key->dp.order) != LTC_MP_LT)) { in ecc_set_key() 31 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, a, prime, 1)) != CRYPT_OK) … in ecc_set_key()
|
A D | ltc_ecc_verify_key.c | 20 void *prime = key->dp.prime; in ltc_ecc_verify_key() 21 void *order = key->dp.order; in ltc_ecc_verify_key() 22 void *a = key->dp.A; in ltc_ecc_verify_key() 39 …if ((err = ltc_ecc_is_point(&key->dp, key->pubkey.x, key->pubkey.y)) != CRYPT_OK) { goto done… in ltc_ecc_verify_key()
|
A D | ltc_ecc_is_point.c | 15 int ltc_ecc_is_point(const ltc_ecc_dp *dp, void *x, void *y) in ltc_ecc_is_point() argument 20 prime = dp->prime; in ltc_ecc_is_point() 21 b = dp->B; in ltc_ecc_is_point() 22 a = dp->A; in ltc_ecc_is_point()
|
A D | ecc_get_oid_str.c | 19 return pk_oid_num_to_str(key->dp.oid, key->dp.oidlen, out, outlen); in ecc_get_oid_str()
|
A D | ecc_verify_hash.c | 49 p = key->dp.order; in ecc_verify_hash_ex() 50 m = key->dp.prime; in ecc_verify_hash_ex() 51 a = key->dp.A; in ecc_verify_hash_ex() 73 i = mp_unsigned_bin_size(key->dp.order); in ecc_verify_hash_ex() 83 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_verify_hash_ex() 158 …if ((err = ltc_ecc_copy_point(&key->dp.base, mG)) != CRYPT_OK) … in ecc_verify_hash_ex()
|
A D | ecc_recover_key.c | 53 p = key->dp.order; in ecc_recover_key() 54 m = key->dp.prime; in ecc_recover_key() 55 a = key->dp.A; in ecc_recover_key() 56 b = key->dp.B; in ecc_recover_key() 79 i = mp_unsigned_bin_size(key->dp.order); in ecc_recover_key() 89 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_recover_key() 136 if (recid < 0 || (unsigned long)recid >= 2*(key->dp.cofactor+1)) { in ecc_recover_key() 210 …if ((err = ltc_ecc_copy_point(&key->dp.base, mG)) != CRYPT_OK) … in ecc_recover_key()
|
A D | ecc_shared_secret.c | 45 prime = private_key->dp.prime; in ecc_shared_secret() 46 a = private_key->dp.A; in ecc_shared_secret()
|
A D | ecc_get_size.c | 23 return key->dp.size; in ecc_get_size()
|
A D | ecc_sign_hash.c | 54 p = key->dp.order; in ecc_sign_hash_ex() 138 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_sign_hash_ex()
|
A D | ecc_export.c | 37 key_size = key->dp.size; in ecc_export()
|
A D | ecc_get_key.c | 25 size = key->dp.size; in ecc_get_key()
|
/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | sm2-dsa.c | 62 ltc_res = rand_bn_upto(k, ltc_key.dp.order, NULL, in sm2_ltc_dsa_sign() 71 ltc_res = ltc_ecc_mulmod(k, <c_key.dp.base, x1y1p, ltc_key.dp.A, in sm2_ltc_dsa_sign() 72 ltc_key.dp.prime, 1); in sm2_ltc_dsa_sign() 81 ltc_res = mp_addmod(e, x1y1p->x, ltc_key.dp.order, r); in sm2_ltc_dsa_sign() 92 mp_cmp(tmp, ltc_key.dp.order) == LTC_MP_EQ) in sm2_ltc_dsa_sign() 102 ltc_res = mp_invmod(s, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 117 ltc_res = mp_mulmod(s, tmp, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 174 mp_cmp(rprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 182 mp_cmp(sprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 221 ltc_res = mp_mulmod(ltc_key.dp.A, mu, ltc_key.dp.prime, ma); in sm2_ltc_dsa_verify() [all …]
|
A D | sm2-pke.c | 45 ltc_res = ltc_ecc_is_point(dp, p->x, p->y); in sm2_uncompressed_bytes_to_point() 156 if (ltc_key.dp.cofactor != 1) { in sm2_ltc_pke_decrypt() 169 ltc_res = mp_set_int(h, ltc_key.dp.cofactor); in sm2_ltc_pke_decrypt() 176 ltc_key.dp.prime, 1); in sm2_ltc_pke_decrypt() 202 ltc_key.dp.prime, 1); in sm2_ltc_pke_decrypt() 375 ltc_res = ltc_ecc_mulmod(k, <c_key.dp.base, C1, ltc_key.dp.A, in sm2_ltc_pke_encrypt() 376 ltc_key.dp.prime, 1); in sm2_ltc_pke_encrypt() 384 if (ltc_key.dp.cofactor != 1) { in sm2_ltc_pke_encrypt() 398 ltc_key.dp.prime, 1); in sm2_ltc_pke_encrypt() 408 ltc_key.dp.prime, &inf); in sm2_ltc_pke_encrypt() [all …]
|
A D | sm2-kep.c | 59 mp_to_unsigned_bin2(key->dp.A, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 64 mp_to_unsigned_bin2(key->dp.B, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 69 mp_to_unsigned_bin2(key->dp.base.x, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 74 mp_to_unsigned_bin2(key->dp.base.y, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 221 void *n = my_key->dp.order; in sm2_kep_derive() 286 ltc_res = mp_montgomery_setup(peer_key->dp.prime, &mp); in sm2_kep_derive() 290 ltc_res = mp_montgomery_normalization(mu, peer_key->dp.prime); in sm2_kep_derive() 294 ltc_res = mp_mulmod(peer_key->dp.A, mu, peer_key->dp.prime, ma); in sm2_kep_derive() 303 x2bar, U, ma, peer_key->dp.prime); in sm2_kep_derive() 307 ltc_res = mp_set_int(h, peer_key->dp.cofactor); in sm2_kep_derive() [all …]
|
A D | rsa.c | 108 if (!bn_alloc_max(&s->dp)) in sw_crypto_acipher_alloc_rsa_keypair() 164 crypto_bignum_free(s->dp); in sw_crypto_acipher_free_rsa_keypair() 194 ltc_mp.copy(ltc_tmp_key.dP, key->dp); in sw_crypto_acipher_gen_rsa_key() 309 ltc_key.dP = key->dp; in sw_crypto_acipher_rsanopad_decrypt() 347 ltc_key.dP = key->dp; in sw_crypto_acipher_rsaes_decrypt() 513 ltc_key.dP = key->dp; in sw_crypto_acipher_rsassa_sign()
|
/optee_os-3.20.0/core/drivers/crypto/caam/acipher/ |
A D | caam_rsa.c | 95 crypto_bignum_free(key->dp); in do_free_keypair() 117 caam_free_buf(&key->dp); in do_keypair_free() 210 outkey->dp.length = size_p; in do_keypair_conv_f3() 216 crypto_bignum_bn2bin(inkey->dp, outkey->dp.data + size_p - size_dp); in do_keypair_conv_f3() 386 if (!key->dp) in do_allocate_keypair() 470 RSA_DUMPBUF("dp", genkey->dp.data, genkey->dp.length); in gen_keypair_get_f3() 474 ret = crypto_bignum_bin2bn(genkey->dp.data, genkey->dp.length, key->dp); in gen_keypair_get_f3() 590 genkey.dp.length /= 3; in do_gen_keypair() 592 genkey.dq.data = genkey.dp.data + genkey.dp.length; in do_gen_keypair() 593 genkey.dq.length = genkey.dp.length; in do_gen_keypair() [all …]
|
/optee_os-3.20.0/core/drivers/crypto/se050/core/ |
A D | rsa.c | 46 key->dp && crypto_bignum_num_bytes(key->dp) && in rsa_keypair_has_crt() 211 set_binary_data(key->dp, &key_bin.dp, &key_bin.dp_len); in se050_inject_keypair() 222 free(key_bin.dp); in se050_inject_keypair() 533 if (!bn_alloc_max(&s->dp)) in do_alloc_keypair() 546 crypto_bignum_free(s->dp); in do_alloc_keypair() 596 crypto_bignum_free(s->dp); in do_free_keypair() 657 crypto_bignum_bin2bn((uint8_t *)&oid, sizeof(oid), key->dp); in do_gen_keypair()
|
/optee_os-3.20.0/core/drivers/crypto/se050/adaptors/include/ |
A D | se050_apdu_apis.h | 32 uint8_t *dp; member
|
/optee_os-3.20.0/lib/libmbedtls/core/ |
A D | rsa.c | 109 rsa->DP = *(mbedtls_mpi *)key->dp; in rsa_init_from_key_pair() 157 s->dp = crypto_bignum_allocate(key_size_bits); in sw_crypto_acipher_alloc_rsa_keypair() 158 if (!s->dp) in sw_crypto_acipher_alloc_rsa_keypair() 214 crypto_bignum_free(s->dp); in sw_crypto_acipher_free_rsa_keypair() 259 crypto_bignum_copy(key->dp, (void *)&rsa.DP); in sw_crypto_acipher_gen_rsa_key()
|
/optee_os-3.20.0/core/drivers/crypto/se050/adaptors/apis/ |
A D | apdu.c | 198 keypair->dp, in set_rsa_private_rsa_crt() 359 keypair->dp, keypair->dp_len, in set_rsa_keypair_rsa_crt()
|