/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ltc_ecc_is_point_at_infinity.c | 33 if ((err = mp_mulmod(P->y, P->y, modulus, y2)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point_at_infinity() 36 if ((err = mp_mulmod(P->x, P->x, modulus, x3)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point_at_infinity() 37 if ((err = mp_mulmod(P->x, x3, modulus, x3)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point_at_infinity()
|
A D | ltc_ecc_mul2add.c | 98 …if ((err = mp_mulmod(A->x, mu, modulus, precomp[1]->x)) != CRYPT_OK) … in ltc_ecc_mul2add() 99 …if ((err = mp_mulmod(A->y, mu, modulus, precomp[1]->y)) != CRYPT_OK) … in ltc_ecc_mul2add() 100 …if ((err = mp_mulmod(A->z, mu, modulus, precomp[1]->z)) != CRYPT_OK) … in ltc_ecc_mul2add() 102 …if ((err = mp_mulmod(B->x, mu, modulus, precomp[1<<2]->x)) != CRYPT_OK) … in ltc_ecc_mul2add() 103 …if ((err = mp_mulmod(B->y, mu, modulus, precomp[1<<2]->y)) != CRYPT_OK) … in ltc_ecc_mul2add() 104 …if ((err = mp_mulmod(B->z, mu, modulus, precomp[1<<2]->z)) != CRYPT_OK) … in ltc_ecc_mul2add()
|
A D | ecc_recover_key.c | 171 …if ((err = mp_mulmod(p, x, m, x)) != CRYPT_OK) … in ecc_recover_key() 175 …if ((err = mp_mulmod(t1, x, m, t1)) != CRYPT_OK) … in ecc_recover_key() 177 …if ((err = mp_mulmod(a, x, m, t2)) != CRYPT_OK) … in ecc_recover_key() 197 …if ((err = mp_mulmod(s, w, p, v1)) != CRYPT_OK) … in ecc_recover_key() 199 …if ((err = mp_mulmod(e, w, p, v2)) != CRYPT_OK) … in ecc_recover_key() 205 …if ((err = mp_mulmod(e, w, p, u1)) != CRYPT_OK) … in ecc_recover_key() 207 …if ((err = mp_mulmod(r, w, p, u2)) != CRYPT_OK) … in ecc_recover_key() 219 …if ((err = mp_mulmod(a, mu, m, ma)) != CRYPT_OK) … in ecc_recover_key()
|
A D | ltc_ecc_mulmod_timing.c | 54 if ((err = mp_mulmod(a, mu, modulus, ma)) != CRYPT_OK) { goto error; } in ltc_ecc_mulmod() 75 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 76 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 77 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod()
|
A D | ecc_sign_hash.c | 98 … if ((err = mp_mulmod(pubkey.k, b, p, pubkey.k)) != CRYPT_OK) { goto error; } /* k = kb */ in ecc_sign_hash_ex() 100 … if ((err = mp_mulmod(key->k, r, p, s)) != CRYPT_OK) { goto error; } /* s = xr */ in ecc_sign_hash_ex() 101 … if ((err = mp_mulmod(pubkey.k, s, p, s)) != CRYPT_OK) { goto error; } /* s = xr/kb */ in ecc_sign_hash_ex() 102 … if ((err = mp_mulmod(pubkey.k, e, p, e)) != CRYPT_OK) { goto error; } /* e = e/kb */ in ecc_sign_hash_ex() 104 …if ((err = mp_mulmod(s, b, p, s)) != CRYPT_OK) { goto error; } /* s = b(e/kb + … in ecc_sign_hash_ex()
|
A D | ltc_ecc_import_point.c | 34 …if ((err = mp_mulmod(t1, x, prime, t1)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point() 36 …if ((err = mp_mulmod(a, x, prime, t2)) != CRYPT_OK) { goto cleanup;… in ltc_ecc_import_point()
|
A D | ltc_ecc_mulmod.c | 55 if ((err = mp_mulmod(a, mu, modulus, ma)) != CRYPT_OK) { goto error; } in ltc_ecc_mulmod() 78 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 79 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 80 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod()
|
A D | ecc_verify_hash.c | 152 …if ((err = mp_mulmod(e, w, p, u1)) != CRYPT_OK) … in ecc_verify_hash_ex() 155 …if ((err = mp_mulmod(r, w, p, u2)) != CRYPT_OK) … in ecc_verify_hash_ex() 168 …if ((err = mp_mulmod(a, mu, m, ma)) != CRYPT_OK) … in ecc_verify_hash_ex()
|
A D | ltc_ecc_is_point.c | 39 if ((err = mp_mulmod(t2, x, prime, t2)) != CRYPT_OK) goto cleanup; in ltc_ecc_is_point()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/dsa/ |
A D | dsa_verify_hash.c | 57 …if ((err = mp_mulmod(u1, w, key->q, u1)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw() 60 …if ((err = mp_mulmod(r, w, key->q, u2)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw() 65 …if ((err = mp_mulmod(u1, u2, key->p, v)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw()
|
A D | dsa_sign_hash.c | 86 …if ((err = mp_mulmod(s, kinv, key->q, s)) != CRYPT_OK) { goto error; } in dsa_sign_hash_raw()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/rsa/ |
A D | rsa_exptmod.c | 88 err = mp_mulmod( tmp, rnd, key->N, tmp); in rsa_exptmod() 115 …if ((err = mp_mulmod(tmp, key->qP, key->p, tmp)) != CRYPT_OK) { goto … in rsa_exptmod() 124 err = mp_mulmod( tmp, rndi, key->N, tmp); in rsa_exptmod()
|
/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | sm2-dsa.c | 117 ltc_res = mp_mulmod(s, tmp, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 221 ltc_res = mp_mulmod(ltc_key.dp.A, mu, ltc_key.dp.prime, ma); in sm2_ltc_dsa_verify()
|
A D | sm2-kep.c | 261 ltc_res = mp_mulmod(x1bar, my_eph_key->k, n, tA); in sm2_kep_derive() 294 ltc_res = mp_mulmod(peer_key->dp.A, mu, peer_key->dp.prime, ma); in sm2_kep_derive()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/math/fp/ |
A D | ltc_ecc_fp_mulmod.c | 692 if ((mp_mulmod(fp_cache[idx].g->x, mu, modulus, fp_cache[idx].LUT[1]->x) != CRYPT_OK) || in s_build_lut() 693 (mp_mulmod(fp_cache[idx].g->y, mu, modulus, fp_cache[idx].LUT[1]->y) != CRYPT_OK) || in s_build_lut() 694 …(mp_mulmod(fp_cache[idx].g->z, mu, modulus, fp_cache[idx].LUT[1]->z) != CRYPT_OK)) { goto E… in s_build_lut() 736 …if ((err = mp_mulmod(fp_cache[idx].LUT[x]->x, tmp, modulus, fp_cache[idx].LUT[x]->x)) != CRYPT_OK)… in s_build_lut() 739 …if ((err = mp_mulmod(tmp, fp_cache[idx].LUT[x]->z, modulus, tmp)) != CRYPT_OK) … in s_build_lut() 742 …if ((err = mp_mulmod(fp_cache[idx].LUT[x]->y, tmp, modulus, fp_cache[idx].LUT[x]->y)) != CRYPT_OK)… in s_build_lut()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/math/ |
A D | ltm_desc.c | 376 return mpi_to_ltc_error(mp_mulmod(a,b,c,d)); in mulmod()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_private.h | 212 #define mp_mulmod(a, b, c, d) ltc_mp.mulmod(a, b, c, d) macro
|