/optee_os-3.20.0/core/include/ |
A D | scattered_array.h | 30 #define __SCT_ARRAY_DEF_ITEM2(array_name, order, id, element_type) \ argument 33 ".scattered_array_" #array_name "_1_" #order) 35 #define __SCT_ARRAY_DEF_PG_ITEM2(array_name, order, id, element_type) \ argument 38 ".scattered_array_" #array_name "_1_" #order) 40 #define __SCT_ARRAY_DEF_ITEM1(array_name, order, id, element_type) \ argument 41 __SCT_ARRAY_DEF_ITEM2(array_name, order, id, element_type) 43 #define __SCT_ARRAY_DEF_PG_ITEM1(array_name, order, id, element_type) \ argument 44 __SCT_ARRAY_DEF_PG_ITEM2(array_name, order, id, element_type) 53 __SCT_ARRAY_DEF_ITEM1(array_name, order, __COUNTER__, element_type) 60 #define SCATTERED_ARRAY_DEFINE_PG_ITEM_ORDERED(array_name, order, \ argument [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_set_curve_internal.c | 24 if (s_ecc_cmp_hex_bn(curve->order, key->dp.order, bn) != 1) continue; in s_ecc_oid_lookup() 47 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve() 56 if ((err = mp_copy(srckey->dp.order, key->dp.order )) != CRYPT_OK) { goto error; } in ecc_copy_curve() 79 int ecc_set_curve_from_mpis(void *a, void *b, void *prime, void *order, void *gx, void *gy, unsigne… in ecc_set_curve_from_mpis() argument 87 LTC_ARGCHK(order != NULL); in ecc_set_curve_from_mpis() 91 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis() 100 if ((err = mp_copy(order, key->dp.order )) != CRYPT_OK) { goto error; } in ecc_set_curve_from_mpis()
|
A D | ltc_ecc_verify_key.c | 21 void *order = key->dp.order; in ltc_ecc_verify_key() local 43 …if ((err = ltc_ecc_mulmod(order, &(key->pubkey), point, a, prime, 1)) != CRYPT_OK) { goto done… in ltc_ecc_verify_key()
|
A D | ecc_import_x509.c | 35 void *prime, *order, *a, *b, *gx, *gy; in s_ecc_import_x509_with_curve() local 43 if ((err = mp_init_multi(&prime, &order, &a, &b, &gx, &gy, LTC_NULL)) != CRYPT_OK) { in s_ecc_import_x509_with_curve() 52 LTC_SET_ASN1(seq_ecparams, 4, LTC_ASN1_INTEGER, order, 1UL); in s_ecc_import_x509_with_curve() 77 …if ((err = ecc_set_curve_from_mpis(a, b, prime, order, gx, gy, cofactor, key)) != CRYPT_OK) { goto… in s_ecc_import_x509_with_curve() 82 mp_clear_multi(prime, order, a, b, gx, gy, LTC_NULL); in s_ecc_import_x509_with_curve()
|
A D | ecc_import_openssl.c | 44 void *prime, *order, *a, *b, *gx, *gy; in s_ecc_import_private_with_curve() local 52 if ((err = mp_init_multi(&prime, &order, &a, &b, &gx, &gy, LTC_NULL)) != CRYPT_OK) { in s_ecc_import_private_with_curve() 70 LTC_SET_ASN1(seq_ecparams, 4, LTC_ASN1_INTEGER, order, 1UL); in s_ecc_import_private_with_curve() 93 …if ((err = ecc_set_curve_from_mpis(a, b, prime, order, gx, gy, cofactor, key)) != CRYPT_OK) { goto… in s_ecc_import_private_with_curve() 98 mp_clear_multi(prime, order, a, b, gx, gy, LTC_NULL); in s_ecc_import_private_with_curve()
|
A D | ecc_set_curve.c | 15 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve() 24 if ((err = mp_read_radix(key->dp.order, cu->order, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve()
|
A D | ecc_export_openssl.c | 20 void *prime, *order, *a, *b, *gx, *gy; in ecc_export_openssl() local 48 order = key->dp.order; in ecc_export_openssl() 111 LTC_SET_ASN1(seq_ecparams, 4, LTC_ASN1_INTEGER, order, 1UL); in ecc_export_openssl()
|
A D | ecc_free.c | 21 mp_cleanup_multi(&key->dp.prime, &key->dp.order, in ecc_free()
|
A D | ecc_import_pkcs8.c | 78 ltc_asn1_list *version, *field, *point, *point_g, *order, *p_cofactor; in ecc_import_pkcs8() local 86 LTC_SET_DER_FLEXI_CHECK(flexi_should, n++, LTC_ASN1_INTEGER, &order); in ecc_import_pkcs8() 145 …if ((err = ecc_set_curve_from_mpis(a, b, prime->data, order->data, gx, gy, cofactor, key)) != CRYP… in ecc_import_pkcs8()
|
A D | ecc_make_key.c | 53 if ((err = rand_bn_upto(key->k, key->dp.order, prng, wprng)) != CRYPT_OK) { in ecc_generate_key()
|
A D | ecc_set_key.c | 26 if (mp_iszero(key->k) || (mp_cmp(key->k, key->dp.order) != LTC_MP_LT)) { in ecc_set_key()
|
A D | ecc_verify_hash.c | 49 p = key->dp.order; in ecc_verify_hash_ex() 73 i = mp_unsigned_bin_size(key->dp.order); in ecc_verify_hash_ex()
|
A D | ecc_recover_key.c | 53 p = key->dp.order; in ecc_recover_key() 79 i = mp_unsigned_bin_size(key->dp.order); in ecc_recover_key()
|
A D | ecc_sign_hash.c | 54 p = key->dp.order; in ecc_sign_hash_ex()
|
/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | sm2-dsa.c | 62 ltc_res = rand_bn_upto(k, ltc_key.dp.order, NULL, in sm2_ltc_dsa_sign() 81 ltc_res = mp_addmod(e, x1y1p->x, ltc_key.dp.order, r); in sm2_ltc_dsa_sign() 92 mp_cmp(tmp, ltc_key.dp.order) == LTC_MP_EQ) in sm2_ltc_dsa_sign() 102 ltc_res = mp_invmod(s, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 117 ltc_res = mp_mulmod(s, tmp, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 174 mp_cmp(rprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 182 mp_cmp(sprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 194 ltc_res = mp_addmod(rprime, sprime, ltc_key.dp.order, t); in sm2_ltc_dsa_verify() 236 ltc_res = mp_addmod(eprime, x1y1p->x, ltc_key.dp.order, R); in sm2_ltc_dsa_verify()
|
A D | sm2-kep.c | 221 void *n = my_key->dp.order; in sm2_kep_derive()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/math/fp/ |
A D | ltc_ecc_fp_mulmod.c | 777 void *tk, *order; in s_accel_fp_mul() local 793 if ((err = mp_read_radix(order, ltc_ecc_sets[x].order, 16)) != CRYPT_OK) { in s_accel_fp_mul() 794 mp_clear(&order); in s_accel_fp_mul() 801 mp_clear(order); in s_accel_fp_mul() 812 mp_clear(order); in s_accel_fp_mul() 918 if ((err = mp_read_radix(order, ltc_ecc_sets[x].order, 16)) != CRYPT_OK) { in ss_accel_fp_mul2add() 919 mp_clear(&order); in ss_accel_fp_mul2add() 937 mp_clear(order); in ss_accel_fp_mul2add() 956 if ((err = mp_read_radix(order, ltc_ecc_sets[x].order, 16)) != CRYPT_OK) { in ss_accel_fp_mul2add() 957 mp_clear(&order); in ss_accel_fp_mul2add() [all …]
|
/optee_os-3.20.0/core/include/kernel/ |
A D | pm.h | 58 .order = (_order), \ 110 uint8_t order; member
|
/optee_os-3.20.0/core/kernel/ |
A D | pm.c | 89 enum pm_callback_order order) in call_callbacks() argument 105 if (hdl->order == order) { in call_callbacks()
|
/optee_os-3.20.0/ |
A D | typedefs.checkpatch | 2 # order (sort -r)
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | rsa_internal.c | 71 uint16_t order; /* Order of 2 in DE - 1 */ in mbedtls_rsa_deduce_primes() local 111 if( ( order = (uint16_t) mbedtls_mpi_lsb( &T ) ) == 0 ) in mbedtls_rsa_deduce_primes() 118 MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &T, order ) ); in mbedtls_rsa_deduce_primes() 144 for( iter = 1; iter <= order; ++iter ) in mbedtls_rsa_deduce_primes()
|
/optee_os-3.20.0/core/arch/arm/plat-totalcompute/fdts/ |
A D | optee_sp_manifest.dts | 25 boot-order = <0>;
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | README.md | 41 …edcrypto. As a result, some linkers will expect flags to be in a specific order, for example the G… 56 We intentionally only use a minimum of functionality in the makefiles in order to keep them as simp… 58 In order to build from the source code using GNU Make, just enter at the command line: 62 In order to run the tests, enter: 74 In order to build for a Windows platform, you should use `WINDOWS_BUILD=1` if the target is Windows… 86 In order to build the source using CMake in a separate directory (recommended), just enter at the c… 92 In order to run the tests, enter: 140 prevent `git status` from showing them as modified). In order to do so, from 220 …ng alternative implementations at build time or run time, for example, in order to take advantage …
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_pk.h | 179 const char *order; member 217 void *order; member
|
/optee_os-3.20.0/core/arch/arm/dts/ |
A D | stm32mp157c-ev1.dts | 349 * the connector. SB23 needs to be soldered in order to use it, and R77
|