| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| A D | ecc_set_curve_internal.c | 27 key->dp.oidlen = 0; in _ecc_oid_lookup() 42 pk_oid_str_to_num(curve->OID, key->dp.oid, &key->dp.oidlen); in _ecc_oid_lookup() 54 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve() 55 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_copy_curve() 62 if ((err = mp_copy(srckey->dp.prime, key->dp.prime )) != CRYPT_OK) { goto error; } in ecc_copy_curve() 68 key->dp.cofactor = srckey->dp.cofactor; in ecc_copy_curve() 69 key->dp.size = srckey->dp.size; in ecc_copy_curve() 72 key->dp.oidlen = srckey->dp.oidlen; in ecc_copy_curve() 73 for (i = 0; i < key->dp.oidlen; i++) key->dp.oid[i] = srckey->dp.oid[i]; in ecc_copy_curve() 98 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis() [all …]
|
| A D | ecc_set_curve.c | 22 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve() 23 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_set_curve() 30 if ((err = mp_read_radix(key->dp.prime, cu->prime, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 31 if ((err = mp_read_radix(key->dp.order, cu->order, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 32 if ((err = mp_read_radix(key->dp.A, cu->A, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 33 if ((err = mp_read_radix(key->dp.B, cu->B, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 34 if ((err = mp_read_radix(key->dp.base.x, cu->Gx, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 38 key->dp.cofactor = cu->cofactor; in ecc_set_curve() 39 key->dp.size = mp_unsigned_bin_size(key->dp.prime); in ecc_set_curve() 41 key->dp.oidlen = 16; in ecc_set_curve() [all …]
|
| A D | ecc_free.c | 28 mp_cleanup_multi(&key->dp.prime, &key->dp.order, in ecc_free() 29 &key->dp.A, &key->dp.B, in ecc_free() 30 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_free()
|
| A D | ecc_export_openssl.c | 44 prime = key->dp.prime; in ecc_export_openssl() 45 order = key->dp.order; in ecc_export_openssl() 46 b = key->dp.B; in ecc_export_openssl() 47 a = key->dp.A; in ecc_export_openssl() 48 gx = key->dp.base.x; in ecc_export_openssl() 49 gy = key->dp.base.y; in ecc_export_openssl() 65 err = ltc_ecc_export_point(bin_g, &len_g, gx, gy, key->dp.size, flag_com); in ecc_export_openssl() 70 … err = ltc_ecc_export_point(bin_xy, &len_xy, key->pubkey.x, key->pubkey.y, key->dp.size, flag_com); in ecc_export_openssl() 74 cofactor = key->dp.cofactor; in ecc_export_openssl() 85 … if (key->dp.oidlen == 0) { err = CRYPT_INVALID_ARG; goto error; } in ecc_export_openssl() [all …]
|
| A D | ecc_make_key.c | 51 LTC_ARGCHK(key->dp.size > 0); in ecc_generate_key() 60 if ((err = rand_bn_upto(key->k, key->dp.order, prng, wprng)) != CRYPT_OK) { in ecc_generate_key() 65 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, key->dp.A, key->dp.prime, 1)) != … in ecc_generate_key()
|
| A D | ecc_set_key.c | 24 prime = key->dp.prime; in ecc_set_key() 25 a = key->dp.A; in ecc_set_key() 26 b = key->dp.B; in ecc_set_key() 33 if (mp_iszero(key->k) || (mp_cmp(key->k, key->dp.order) != LTC_MP_LT)) { in ecc_set_key() 38 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, a, prime, 1)) != CRYPT_OK) … in ecc_set_key()
|
| A D | ltc_ecc_verify_key.c | 27 void *prime = key->dp.prime; in ltc_ecc_verify_key() 28 void *order = key->dp.order; in ltc_ecc_verify_key() 29 void *a = key->dp.A; in ltc_ecc_verify_key() 46 …if ((err = ltc_ecc_is_point(&key->dp, key->pubkey.x, key->pubkey.y)) != CRYPT_OK) { goto done… in ltc_ecc_verify_key()
|
| A D | ltc_ecc_is_point.c | 22 int ltc_ecc_is_point(const ltc_ecc_dp *dp, void *x, void *y) in ltc_ecc_is_point() argument 27 prime = dp->prime; in ltc_ecc_is_point() 28 b = dp->B; in ltc_ecc_is_point() 29 a = dp->A; in ltc_ecc_is_point()
|
| A D | ecc_recover_key.c | 60 p = key->dp.order; in ecc_recover_key() 61 m = key->dp.prime; in ecc_recover_key() 62 a = key->dp.A; in ecc_recover_key() 63 b = key->dp.B; in ecc_recover_key() 86 i = mp_unsigned_bin_size(key->dp.order); in ecc_recover_key() 96 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_recover_key() 142 if (recid < 0 || (unsigned long)recid >= 2*(key->dp.cofactor+1)) { in ecc_recover_key() 216 …if ((err = ltc_ecc_copy_point(&key->dp.base, mG)) != CRYPT_OK) … in ecc_recover_key()
|
| A D | ecc_verify_hash.c | 56 p = key->dp.order; in ecc_verify_hash_ex() 57 m = key->dp.prime; in ecc_verify_hash_ex() 58 a = key->dp.A; in ecc_verify_hash_ex() 80 i = mp_unsigned_bin_size(key->dp.order); in ecc_verify_hash_ex() 90 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_verify_hash_ex() 164 …if ((err = ltc_ecc_copy_point(&key->dp.base, mG)) != CRYPT_OK) … in ecc_verify_hash_ex()
|
| A D | ecc_get_oid_str.c | 26 return pk_oid_num_to_str(key->dp.oid, key->dp.oidlen, out, outlen); in ecc_get_oid_str()
|
| A D | ecc_shared_secret.c | 52 prime = private_key->dp.prime; in ecc_shared_secret() 53 a = private_key->dp.A; in ecc_shared_secret()
|
| A D | ecc_sign_hash.c | 61 p = key->dp.order; in ecc_sign_hash_ex() 145 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_sign_hash_ex()
|
| A D | ecc_get_size.c | 30 return key->dp.size; in ecc_get_size()
|
| A D | ecc_export.c | 44 key_size = key->dp.size; in ecc_export()
|
| A D | ecc_get_key.c | 32 size = key->dp.size; in ecc_get_key()
|
| /optee_os/core/lib/libtomcrypt/ |
| A D | sm2-dsa.c | 62 ltc_res = rand_bn_upto(k, ltc_key.dp.order, NULL, in sm2_ltc_dsa_sign() 71 ltc_res = ltc_ecc_mulmod(k, <c_key.dp.base, x1y1p, ltc_key.dp.A, in sm2_ltc_dsa_sign() 72 ltc_key.dp.prime, 1); in sm2_ltc_dsa_sign() 81 ltc_res = mp_addmod(e, x1y1p->x, ltc_key.dp.order, r); in sm2_ltc_dsa_sign() 92 mp_cmp(tmp, ltc_key.dp.order) == LTC_MP_EQ) in sm2_ltc_dsa_sign() 102 ltc_res = mp_invmod(s, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 117 ltc_res = mp_mulmod(s, tmp, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 174 mp_cmp(rprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 182 mp_cmp(sprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 221 ltc_res = mp_mulmod(ltc_key.dp.A, mu, ltc_key.dp.prime, ma); in sm2_ltc_dsa_verify() [all …]
|
| A D | sm2-pke.c | 44 ltc_res = ltc_ecc_is_point(dp, p->x, p->y); in sm2_uncompressed_bytes_to_point() 155 if (ltc_key.dp.cofactor != 1) { in sm2_ltc_pke_decrypt() 168 ltc_res = mp_set_int(h, ltc_key.dp.cofactor); in sm2_ltc_pke_decrypt() 175 ltc_key.dp.prime, 1); in sm2_ltc_pke_decrypt() 201 ltc_key.dp.prime, 1); in sm2_ltc_pke_decrypt() 374 ltc_res = ltc_ecc_mulmod(k, <c_key.dp.base, C1, ltc_key.dp.A, in sm2_ltc_pke_encrypt() 375 ltc_key.dp.prime, 1); in sm2_ltc_pke_encrypt() 383 if (ltc_key.dp.cofactor != 1) { in sm2_ltc_pke_encrypt() 397 ltc_key.dp.prime, 1); in sm2_ltc_pke_encrypt() 407 ltc_key.dp.prime, &inf); in sm2_ltc_pke_encrypt() [all …]
|
| A D | sm2-kep.c | 59 mp_to_unsigned_bin2(key->dp.A, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 64 mp_to_unsigned_bin2(key->dp.B, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 69 mp_to_unsigned_bin2(key->dp.base.x, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 74 mp_to_unsigned_bin2(key->dp.base.y, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 221 void *n = my_key->dp.order; in sm2_kep_derive() 286 ltc_res = mp_montgomery_setup(peer_key->dp.prime, &mp); in sm2_kep_derive() 290 ltc_res = mp_montgomery_normalization(mu, peer_key->dp.prime); in sm2_kep_derive() 294 ltc_res = mp_mulmod(peer_key->dp.A, mu, peer_key->dp.prime, ma); in sm2_kep_derive() 303 x2bar, U, ma, peer_key->dp.prime); in sm2_kep_derive() 307 ltc_res = mp_set_int(h, peer_key->dp.cofactor); in sm2_kep_derive() [all …]
|
| A D | rsa.c | 101 if (!bn_alloc_max(&s->dp)) in crypto_acipher_alloc_rsa_keypair() 144 crypto_bignum_free(s->dp); in crypto_acipher_free_rsa_keypair() 169 ltc_mp.copy(ltc_tmp_key.dP, key->dp); in crypto_acipher_gen_rsa_key() 271 ltc_key.dP = key->dp; in crypto_acipher_rsanopad_decrypt() 299 ltc_key.dP = key->dp; in crypto_acipher_rsaes_decrypt() 451 ltc_key.dP = key->dp; in crypto_acipher_rsassa_sign()
|
| /optee_os/core/drivers/crypto/caam/acipher/ |
| A D | caam_rsa.c | 95 crypto_bignum_free(key->dp); in do_free_keypair() 117 caam_free_buf(&key->dp); in do_keypair_free() 210 outkey->dp.length = size_p; in do_keypair_conv_f3() 216 crypto_bignum_bn2bin(inkey->dp, outkey->dp.data + size_p - size_dp); in do_keypair_conv_f3() 386 if (!key->dp) in do_allocate_keypair() 470 RSA_DUMPBUF("dp", genkey->dp.data, genkey->dp.length); in gen_keypair_get_f3() 474 ret = crypto_bignum_bin2bn(genkey->dp.data, genkey->dp.length, key->dp); in gen_keypair_get_f3() 590 genkey.dp.length /= 3; in do_gen_keypair() 592 genkey.dq.data = genkey.dp.data + genkey.dp.length; in do_gen_keypair() 593 genkey.dq.length = genkey.dp.length; in do_gen_keypair() [all …]
|
| /optee_os/core/drivers/crypto/se050/core/ |
| A D | rsa.c | 166 set_binary_data(key->dp, &key_bin.dp, &key_bin.dp_len); in se050_inject_keypair() 177 free(key_bin.dp); in se050_inject_keypair() 488 if (!bn_alloc_max(&s->dp)) in do_alloc_keypair() 501 crypto_bignum_free(s->dp); in do_alloc_keypair() 551 crypto_bignum_free(s->dp); in do_free_keypair() 604 crypto_bignum_bin2bn((uint8_t *)&oid, sizeof(oid), key->dp); in do_gen_keypair()
|
| /optee_os/lib/libmbedtls/core/ |
| A D | rsa.c | 107 rsa->DP = *(mbedtls_mpi *)key->dp; in rsa_init_from_key_pair() 151 s->dp = crypto_bignum_allocate(key_size_bits); in crypto_acipher_alloc_rsa_keypair() 152 if (!s->dp) in crypto_acipher_alloc_rsa_keypair() 198 crypto_bignum_free(s->dp); in crypto_acipher_free_rsa_keypair() 231 crypto_bignum_copy(key->dp, (void *)&rsa.DP); in crypto_acipher_gen_rsa_key()
|
| /optee_os/core/drivers/crypto/se050/adaptors/include/ |
| A D | se050_apdu_apis.h | 32 uint8_t *dp; member
|
| /optee_os/core/drivers/crypto/se050/adaptors/apis/ |
| A D | apdu.c | 198 keypair->dp, in set_rsa_private_rsa_crt() 359 keypair->dp, keypair->dp_len, in set_rsa_keypair_rsa_crt()
|