| /optee_os/core/include/ |
| A D | scattered_array.h | 30 #define __SCT_ARRAY_DEF_ITEM2(array_name, order, id, element_type) \ argument 33 ".scattered_array_" #array_name "_1_" #order) 35 #define __SCT_ARRAY_DEF_PG_ITEM2(array_name, order, id, element_type) \ argument 38 ".scattered_array_" #array_name "_1_" #order) 40 #define __SCT_ARRAY_DEF_ITEM1(array_name, order, id, element_type) \ argument 41 __SCT_ARRAY_DEF_ITEM2(array_name, order, id, element_type) 43 #define __SCT_ARRAY_DEF_PG_ITEM1(array_name, order, id, element_type) \ argument 44 __SCT_ARRAY_DEF_PG_ITEM2(array_name, order, id, element_type) 53 __SCT_ARRAY_DEF_ITEM1(array_name, order, __COUNTER__, element_type) 60 #define SCATTERED_ARRAY_DEFINE_PG_ITEM_ORDERED(array_name, order, \ argument [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| A D | ecc_set_curve_internal.c | 31 if (_ecc_cmp_hex_bn(curve->order, key->dp.order, bn) != 1) continue; in _ecc_oid_lookup() 54 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve() 63 if ((err = mp_copy(srckey->dp.order, key->dp.order )) != CRYPT_OK) { goto error; } in ecc_copy_curve() 86 int ecc_set_curve_from_mpis(void *a, void *b, void *prime, void *order, void *gx, void *gy, unsigne… in ecc_set_curve_from_mpis() argument 94 LTC_ARGCHK(order != NULL); in ecc_set_curve_from_mpis() 98 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis() 107 if ((err = mp_copy(order, key->dp.order )) != CRYPT_OK) { goto error; } in ecc_set_curve_from_mpis()
|
| A D | ecc_import_x509.c | 42 void *prime, *order, *a, *b, *gx, *gy; in _ecc_import_x509_with_curve() local 50 if ((err = mp_init_multi(&prime, &order, &a, &b, &gx, &gy, NULL)) != CRYPT_OK) { in _ecc_import_x509_with_curve() 59 LTC_SET_ASN1(seq_ecparams, 4, LTC_ASN1_INTEGER, order, 1UL); in _ecc_import_x509_with_curve() 84 …if ((err = ecc_set_curve_from_mpis(a, b, prime, order, gx, gy, cofactor, key)) != CRYPT_OK) { goto… in _ecc_import_x509_with_curve() 89 mp_clear_multi(prime, order, a, b, gx, gy, NULL); in _ecc_import_x509_with_curve()
|
| A D | ecc_import_openssl.c | 51 void *prime, *order, *a, *b, *gx, *gy; in _ecc_import_private_with_curve() local 59 if ((err = mp_init_multi(&prime, &order, &a, &b, &gx, &gy, NULL)) != CRYPT_OK) { in _ecc_import_private_with_curve() 77 LTC_SET_ASN1(seq_ecparams, 4, LTC_ASN1_INTEGER, order, 1UL); in _ecc_import_private_with_curve() 100 …if ((err = ecc_set_curve_from_mpis(a, b, prime, order, gx, gy, cofactor, key)) != CRYPT_OK) { goto… in _ecc_import_private_with_curve() 105 mp_clear_multi(prime, order, a, b, gx, gy, NULL); in _ecc_import_private_with_curve()
|
| A D | ltc_ecc_verify_key.c | 28 void *order = key->dp.order; in ltc_ecc_verify_key() local 50 …if ((err = ltc_ecc_mulmod(order, &(key->pubkey), point, a, prime, 1)) != CRYPT_OK) { goto done… in ltc_ecc_verify_key()
|
| A D | ecc_export_openssl.c | 27 void *prime, *order, *a, *b, *gx, *gy; in ecc_export_openssl() local 45 order = key->dp.order; in ecc_export_openssl() 125 LTC_SET_ASN1(seq_ecparams, 4, LTC_ASN1_INTEGER, order, 1UL); in ecc_export_openssl()
|
| A D | ecc_set_curve.c | 22 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve() 31 if ((err = mp_read_radix(key->dp.order, cu->order, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve()
|
| A D | ecc_import_pkcs8.c | 85 ltc_asn1_list *version, *field, *point, *point_g, *order, *p_cofactor; in ecc_import_pkcs8() local 93 LTC_SET_DER_FLEXI_CHECK(flexi_should, n++, LTC_ASN1_INTEGER, &order); in ecc_import_pkcs8() 152 …if ((err = ecc_set_curve_from_mpis(a, b, prime->data, order->data, gx, gy, cofactor, key)) != CRYP… in ecc_import_pkcs8()
|
| A D | ecc_free.c | 28 mp_cleanup_multi(&key->dp.prime, &key->dp.order, in ecc_free()
|
| A D | ecc_make_key.c | 60 if ((err = rand_bn_upto(key->k, key->dp.order, prng, wprng)) != CRYPT_OK) { in ecc_generate_key()
|
| A D | ecc_set_key.c | 33 if (mp_iszero(key->k) || (mp_cmp(key->k, key->dp.order) != LTC_MP_LT)) { in ecc_set_key()
|
| A D | ecc_verify_hash.c | 56 p = key->dp.order; in ecc_verify_hash_ex() 80 i = mp_unsigned_bin_size(key->dp.order); in ecc_verify_hash_ex()
|
| A D | ecc_recover_key.c | 60 p = key->dp.order; in ecc_recover_key() 86 i = mp_unsigned_bin_size(key->dp.order); in ecc_recover_key()
|
| A D | ecc_sign_hash.c | 61 p = key->dp.order; in ecc_sign_hash_ex()
|
| /optee_os/core/lib/libtomcrypt/ |
| A D | sm2-dsa.c | 62 ltc_res = rand_bn_upto(k, ltc_key.dp.order, NULL, in sm2_ltc_dsa_sign() 81 ltc_res = mp_addmod(e, x1y1p->x, ltc_key.dp.order, r); in sm2_ltc_dsa_sign() 92 mp_cmp(tmp, ltc_key.dp.order) == LTC_MP_EQ) in sm2_ltc_dsa_sign() 102 ltc_res = mp_invmod(s, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 117 ltc_res = mp_mulmod(s, tmp, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 174 mp_cmp(rprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 182 mp_cmp(sprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 194 ltc_res = mp_addmod(rprime, sprime, ltc_key.dp.order, t); in sm2_ltc_dsa_verify() 236 ltc_res = mp_addmod(eprime, x1y1p->x, ltc_key.dp.order, R); in sm2_ltc_dsa_verify()
|
| A D | sm2-kep.c | 221 void *n = my_key->dp.order; in sm2_kep_derive()
|
| /optee_os/core/lib/libtomcrypt/src/math/fp/ |
| A D | ltc_ecc_fp_mulmod.c | 784 void *tk, *order; in _accel_fp_mul() local 800 if ((err = mp_read_radix(order, ltc_ecc_sets[x].order, 16)) != CRYPT_OK) { in _accel_fp_mul() 801 mp_clear(&order); in _accel_fp_mul() 808 mp_clear(order); in _accel_fp_mul() 819 mp_clear(order); in _accel_fp_mul() 925 if ((err = mp_read_radix(order, ltc_ecc_sets[x].order, 16)) != CRYPT_OK) { in _accel_fp_mul2add() 926 mp_clear(&order); in _accel_fp_mul2add() 944 mp_clear(order); in _accel_fp_mul2add() 963 if ((err = mp_read_radix(order, ltc_ecc_sets[x].order, 16)) != CRYPT_OK) { in _accel_fp_mul2add() 964 mp_clear(&order); in _accel_fp_mul2add() [all …]
|
| /optee_os/core/kernel/ |
| A D | pm.c | 89 enum pm_callback_order order) in call_callbacks() argument 105 if (hdl->order == order) { in call_callbacks()
|
| /optee_os/core/include/kernel/ |
| A D | pm.h | 58 .order = (_order), \ 108 uint8_t order; member
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| A D | rsa_internal.c | 71 uint16_t order; /* Order of 2 in DE - 1 */ in mbedtls_rsa_deduce_primes() local 111 if( ( order = (uint16_t) mbedtls_mpi_lsb( &T ) ) == 0 ) in mbedtls_rsa_deduce_primes() 118 MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &T, order ) ); in mbedtls_rsa_deduce_primes() 144 for( iter = 1; iter <= order; ++iter ) in mbedtls_rsa_deduce_primes()
|
| /optee_os/ |
| A D | typedefs.checkpatch | 2 # order (sort -r)
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| A D | README.md | 41 …edcrypto. As a result, some linkers will expect flags to be in a specific order, for example the G… 56 We intentionally only use a minimum of functionality in the makefiles in order to keep them as simp… 58 In order to build from the source code using GNU Make, just enter at the command line: 62 In order to run the tests, enter: 74 In order to build for a Windows platform, you should use `WINDOWS_BUILD=1` if the target is Windows… 86 In order to build the source using CMake in a separate directory (recommended), just enter at the c… 92 In order to run the tests, enter: 140 prevent `git status` from showing them as modified). In order to do so, from 212 …ng alternative implementations at build time or run time, for example, in order to take advantage …
|
| /optee_os/core/arch/arm/plat-totalcompute/fdts/ |
| A D | optee_sp_manifest.dts | 25 boot-order = <0>;
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| A D | tomcrypt_pk.h | 186 const char *order; member 224 void *order; member
|
| /optee_os/core/lib/zlib/ |
| A D | inflate.c | 643 static const unsigned short order[19] = /* permutation of code lengths */ local 947 state->lens[order[state->have++]] = (unsigned short)BITS(3); 951 state->lens[order[state->have++]] = 0;
|