| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_set_curve_internal.c | 20 key->dp.oidlen = 0; in s_ecc_oid_lookup() 23 if (s_ecc_cmp_hex_bn(curve->prime, key->dp.prime, bn) != 1) continue; in s_ecc_oid_lookup() 24 if (s_ecc_cmp_hex_bn(curve->order, key->dp.order, bn) != 1) continue; in s_ecc_oid_lookup() 25 if (s_ecc_cmp_hex_bn(curve->A, key->dp.A, bn) != 1) continue; in s_ecc_oid_lookup() 26 if (s_ecc_cmp_hex_bn(curve->B, key->dp.B, bn) != 1) continue; in s_ecc_oid_lookup() 27 if (s_ecc_cmp_hex_bn(curve->Gx, key->dp.base.x, bn) != 1) continue; in s_ecc_oid_lookup() 28 if (s_ecc_cmp_hex_bn(curve->Gy, key->dp.base.y, bn) != 1) continue; in s_ecc_oid_lookup() 29 if (key->dp.cofactor != curve->cofactor) continue; in s_ecc_oid_lookup() 34 key->dp.oidlen = 16; /* size of key->dp.oid */ in s_ecc_oid_lookup() 35 pk_oid_str_to_num(curve->OID, key->dp.oid, &key->dp.oidlen); in s_ecc_oid_lookup() [all …]
|
| H A D | ecc_set_curve.c | 15 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve() 16 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_set_curve() 23 if ((err = mp_read_radix(key->dp.prime, cu->prime, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 24 if ((err = mp_read_radix(key->dp.order, cu->order, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 25 if ((err = mp_read_radix(key->dp.A, cu->A, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 26 if ((err = mp_read_radix(key->dp.B, cu->B, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 27 if ((err = mp_read_radix(key->dp.base.x, cu->Gx, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 28 if ((err = mp_read_radix(key->dp.base.y, cu->Gy, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve() 29 if ((err = mp_set(key->dp.base.z, 1)) != CRYPT_OK) { goto error; } in ecc_set_curve() 31 key->dp.cofactor = cu->cofactor; in ecc_set_curve() [all …]
|
| H A D | ecc_free.c | 21 mp_cleanup_multi(&key->dp.prime, &key->dp.order, in ecc_free() 22 &key->dp.A, &key->dp.B, in ecc_free() 23 &key->dp.base.x, &key->dp.base.y, &key->dp.base.z, in ecc_free()
|
| H A D | ecc_export_openssl.c | 43 … if (key->dp.oidlen == 0) { err = CRYPT_INVALID_ARG; goto error; } in ecc_export_openssl() 44 LTC_SET_ASN1(&ecparams, 0, LTC_ASN1_OBJECT_IDENTIFIER, key->dp.oid, key->dp.oidlen); in ecc_export_openssl() 47 prime = key->dp.prime; in ecc_export_openssl() 48 order = key->dp.order; in ecc_export_openssl() 49 a = key->dp.A; in ecc_export_openssl() 50 b = key->dp.B; in ecc_export_openssl() 51 gx = key->dp.base.x; in ecc_export_openssl() 52 gy = key->dp.base.y; in ecc_export_openssl() 53 cofactor = key->dp.cofactor; in ecc_export_openssl() 69 err = ltc_ecc_export_point(bin_g, &len_g, gx, gy, key->dp.size, flag_com); in ecc_export_openssl() [all …]
|
| H A D | ecc_make_key.c | 44 LTC_ARGCHK(key->dp.size > 0); in ecc_generate_key() 53 if ((err = rand_bn_upto(key->k, key->dp.order, prng, wprng)) != CRYPT_OK) { in ecc_generate_key() 58 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, key->dp.A, key->dp.prime, 1)) != … in ecc_generate_key()
|
| H A D | ecc_set_key.c | 17 prime = key->dp.prime; in ecc_set_key() 18 a = key->dp.A; in ecc_set_key() 19 b = key->dp.B; in ecc_set_key() 26 if (mp_iszero(key->k) || (mp_cmp(key->k, key->dp.order) != LTC_MP_LT)) { in ecc_set_key() 31 …if ((err = ltc_mp.ecc_ptmul(key->k, &key->dp.base, &key->pubkey, a, prime, 1)) != CRYPT_OK) … in ecc_set_key()
|
| H A D | ltc_ecc_verify_key.c | 20 void *prime = key->dp.prime; in ltc_ecc_verify_key() 21 void *order = key->dp.order; in ltc_ecc_verify_key() 22 void *a = key->dp.A; in ltc_ecc_verify_key() 39 …if ((err = ltc_ecc_is_point(&key->dp, key->pubkey.x, key->pubkey.y)) != CRYPT_OK) { goto done… in ltc_ecc_verify_key()
|
| H A D | ltc_ecc_is_point.c | 15 int ltc_ecc_is_point(const ltc_ecc_dp *dp, void *x, void *y) in ltc_ecc_is_point() argument 20 prime = dp->prime; in ltc_ecc_is_point() 21 b = dp->B; in ltc_ecc_is_point() 22 a = dp->A; in ltc_ecc_is_point()
|
| H A D | ecc_get_oid_str.c | 19 return pk_oid_num_to_str(key->dp.oid, key->dp.oidlen, out, outlen); in ecc_get_oid_str()
|
| H A D | ecc_recover_key.c | 53 p = key->dp.order; in ecc_recover_key() 54 m = key->dp.prime; in ecc_recover_key() 55 a = key->dp.A; in ecc_recover_key() 56 b = key->dp.B; in ecc_recover_key() 79 i = mp_unsigned_bin_size(key->dp.order); in ecc_recover_key() 89 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_recover_key() 136 if (recid < 0 || (unsigned long)recid >= 2*(key->dp.cofactor+1)) { in ecc_recover_key() 210 …if ((err = ltc_ecc_copy_point(&key->dp.base, mG)) != CRYPT_OK) … in ecc_recover_key()
|
| H A D | ecc_verify_hash.c | 49 p = key->dp.order; in ecc_verify_hash_ex() 50 m = key->dp.prime; in ecc_verify_hash_ex() 51 a = key->dp.A; in ecc_verify_hash_ex() 73 i = mp_unsigned_bin_size(key->dp.order); in ecc_verify_hash_ex() 83 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_verify_hash_ex() 158 …if ((err = ltc_ecc_copy_point(&key->dp.base, mG)) != CRYPT_OK) … in ecc_verify_hash_ex()
|
| H A D | ecc_shared_secret.c | 45 prime = private_key->dp.prime; in ecc_shared_secret() 46 a = private_key->dp.A; in ecc_shared_secret()
|
| H A D | ecc_get_size.c | 23 return key->dp.size; in ecc_get_size()
|
| H A D | ecc_sign_hash.c | 54 p = key->dp.order; in ecc_sign_hash_ex() 138 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_sign_hash_ex()
|
| H A D | ecc_export.c | 37 key_size = key->dp.size; in ecc_export()
|
| H A D | ecc_get_key.c | 25 size = key->dp.size; in ecc_get_key()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | sm2-dsa.c | 62 ltc_res = rand_bn_upto(k, ltc_key.dp.order, NULL, in sm2_ltc_dsa_sign() 71 ltc_res = ltc_ecc_mulmod(k, <c_key.dp.base, x1y1p, ltc_key.dp.A, in sm2_ltc_dsa_sign() 72 ltc_key.dp.prime, 1); in sm2_ltc_dsa_sign() 81 ltc_res = mp_addmod(e, x1y1p->x, ltc_key.dp.order, r); in sm2_ltc_dsa_sign() 92 mp_cmp(tmp, ltc_key.dp.order) == LTC_MP_EQ) in sm2_ltc_dsa_sign() 102 ltc_res = mp_invmod(s, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 117 ltc_res = mp_mulmod(s, tmp, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 174 mp_cmp(rprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 182 mp_cmp(sprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 194 ltc_res = mp_addmod(rprime, sprime, ltc_key.dp.order, t); in sm2_ltc_dsa_verify() [all …]
|
| H A D | sm2-pke.c | 24 sm2_uncompressed_bytes_to_point(ecc_point *p, const ltc_ecc_dp *dp, in sm2_uncompressed_bytes_to_point() argument 45 ltc_res = ltc_ecc_is_point(dp, p->x, p->y); in sm2_uncompressed_bytes_to_point() 63 static TEE_Result sm2_bytes_to_point(ecc_point *p, const ltc_ecc_dp *dp, in sm2_bytes_to_point() argument 81 return sm2_uncompressed_bytes_to_point(p, dp, buf + 1, in sm2_bytes_to_point() 150 res = sm2_bytes_to_point(C1, <c_key.dp, src, src_len, &C1_len); in sm2_ltc_pke_decrypt() 156 if (ltc_key.dp.cofactor != 1) { in sm2_ltc_pke_decrypt() 169 ltc_res = mp_set_int(h, ltc_key.dp.cofactor); in sm2_ltc_pke_decrypt() 175 ltc_res = ltc_ecc_mulmod(h, C1, S, ltc_key.dp.A, in sm2_ltc_pke_decrypt() 176 ltc_key.dp.prime, 1); in sm2_ltc_pke_decrypt() 182 ltc_res = ltc_ecc_is_point_at_infinity(S, ltc_key.dp.prime, in sm2_ltc_pke_decrypt() [all …]
|
| H A D | sm2-kep.c | 59 mp_to_unsigned_bin2(key->dp.A, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 64 mp_to_unsigned_bin2(key->dp.B, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 69 mp_to_unsigned_bin2(key->dp.base.x, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 74 mp_to_unsigned_bin2(key->dp.base.y, buf, SM2_INT_SIZE_BYTES); in sm2_kep_compute_Z() 221 void *n = my_key->dp.order; in sm2_kep_derive() 271 ltc_res = ltc_ecc_is_point(&peer_eph_key->dp, peer_eph_key->pubkey.x, in sm2_kep_derive() 286 ltc_res = mp_montgomery_setup(peer_key->dp.prime, &mp); in sm2_kep_derive() 290 ltc_res = mp_montgomery_normalization(mu, peer_key->dp.prime); in sm2_kep_derive() 294 ltc_res = mp_mulmod(peer_key->dp.A, mu, peer_key->dp.prime, ma); in sm2_kep_derive() 303 x2bar, U, ma, peer_key->dp.prime); in sm2_kep_derive() [all …]
|
| H A D | rsa.c | 116 if (!bn_alloc_max(&s->dp)) in sw_crypto_acipher_alloc_rsa_keypair() 172 crypto_bignum_free(&s->dp); in sw_crypto_acipher_free_rsa_keypair() 202 ltc_mp.copy(ltc_tmp_key.dP, key->dp); in sw_crypto_acipher_gen_rsa_key() 317 ltc_key.dP = key->dp; in sw_crypto_acipher_rsanopad_decrypt() 359 ltc_key.dP = key->dp; in sw_crypto_acipher_rsaes_decrypt() 548 ltc_key.dP = key->dp; in sw_crypto_acipher_rsassa_sign()
|
| /optee_os/core/drivers/crypto/caam/acipher/ |
| H A D | caam_rsa.c | 77 struct caamkey dp; /* Private [dp = d mod (p-1)] */ member 102 crypto_bignum_free(&key->dp); in do_free_keypair() 119 caam_key_free(&key->dp); in do_keypair_free() 182 size_dp = crypto_bignum_num_bytes(inkey->dp); in do_keypair_conv_f3() 202 retstatus = caam_key_deserialize_from_bn(inkey->dp, in do_keypair_conv_f3() 203 &outkey->dp, size_p); in do_keypair_conv_f3() 220 caam_key_cache_op(TEE_CACHECLEAN, &outkey->dp); in do_keypair_conv_f3() 358 key->dp = crypto_bignum_allocate(CFG_CORE_BIGNUM_MAX_BITS); in do_allocate_keypair() 359 if (!key->dp) in do_allocate_keypair() 439 caam_key_cache_op(TEE_CACHEINVALIDATE, &genkey->dp); in gen_keypair_get_f3() [all …]
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | rsa.c | 46 key->dp && crypto_bignum_num_bytes(key->dp) && in rsa_keypair_has_crt() 211 set_binary_data(key->dp, &key_bin.dp, &key_bin.dp_len); in se050_inject_keypair() 222 free(key_bin.dp); in se050_inject_keypair() 533 if (!bn_alloc_max(&s->dp)) in do_alloc_keypair() 546 crypto_bignum_free(&s->dp); in do_alloc_keypair() 596 crypto_bignum_free(&s->dp); in do_free_keypair() 657 crypto_bignum_bin2bn((uint8_t *)&oid, sizeof(oid), key->dp); in do_gen_keypair()
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | hpre_rsa.c | 586 uint32_t dp_len = crypto_bignum_num_bytes(key->dp); in hpre_rsa_crt_decrypt_bn2bin() 591 uint8_t *dp = msg->prikey + p_bytes; in hpre_rsa_crt_decrypt_bn2bin() local 592 uint8_t *q = dp + p_bytes; in hpre_rsa_crt_decrypt_bn2bin() 598 crypto_bignum_bn2bin(key->dp, dp); in hpre_rsa_crt_decrypt_bn2bin() 609 ret = hpre_bin_from_crypto_bin(dp, dp, p_bytes, dp_len); in hpre_rsa_crt_decrypt_bn2bin() 683 key->dp && crypto_bignum_num_bits(key->dp) && in hpre_rsa_is_crt_mod()
|
| /optee_os/core/drivers/crypto/se050/adaptors/include/ |
| H A D | se050_apdu_apis.h | 32 uint8_t *dp; member
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | rsa.c | 114 rsa->DP = *(mbedtls_mpi *)key->dp; in rsa_complete_from_key_pair() 218 s->dp = crypto_bignum_allocate(key_size_bits); in sw_crypto_acipher_alloc_rsa_keypair() 219 if (!s->dp) in sw_crypto_acipher_alloc_rsa_keypair() 275 crypto_bignum_free(&s->dp); in sw_crypto_acipher_free_rsa_keypair() 320 crypto_bignum_copy(key->dp, (void *)&rsa.DP); in sw_crypto_acipher_gen_rsa_key()
|