Home
last modified time | relevance | path

Searched refs:g (Results 1 – 25 of 55) sorted by relevance

123

/optee_os/scripts/
H A Dupdate_changelog.py77 for g in gits:
78 gu = g.replace('/', '_')
82 "[{}_pr_{}]\n".format(g, gu, rvu, gu, rvu, gu, rvu)
86 for g in gits:
87 gu = g.replace('/', '_')
90 "{}\n".format(gu, rvu, g, rv)
92 "{}...{}\n".format(gu, rvu, g, prv, rv)
95 gu, rvu, g, prd, rd)
H A Dnotify_maintainers.py108 g = Github(token)
109 repo = g.get_repo(repo_name)
/optee_os/core/lib/libtomcrypt/src/stream/rabbit/
H A Drabbit.c93 ulong32 g[8], c_old[8], i; in ss_rabbit_next_state() local
113 g[i] = ss_rabbit_g_func((ulong32)(p_instance->x[i] + p_instance->c[i])); in ss_rabbit_next_state()
117 p_instance->x[0] = (ulong32)(g[0] + ROLc(g[7],16) + ROLc(g[6], 16)); in ss_rabbit_next_state()
118 p_instance->x[1] = (ulong32)(g[1] + ROLc(g[0], 8) + g[7]); in ss_rabbit_next_state()
119 p_instance->x[2] = (ulong32)(g[2] + ROLc(g[1],16) + ROLc(g[0], 16)); in ss_rabbit_next_state()
120 p_instance->x[3] = (ulong32)(g[3] + ROLc(g[2], 8) + g[1]); in ss_rabbit_next_state()
121 p_instance->x[4] = (ulong32)(g[4] + ROLc(g[3],16) + ROLc(g[2], 16)); in ss_rabbit_next_state()
122 p_instance->x[5] = (ulong32)(g[5] + ROLc(g[4], 8) + g[3]); in ss_rabbit_next_state()
123 p_instance->x[6] = (ulong32)(g[6] + ROLc(g[5],16) + ROLc(g[4], 16)); in ss_rabbit_next_state()
124 p_instance->x[7] = (ulong32)(g[7] + ROLc(g[6], 8) + g[5]); in ss_rabbit_next_state()
/optee_os/core/drivers/crypto/caam/acipher/
H A Dcaam_dsa.c40 struct caambuf g; /* Generator */ member
54 caam_free_buf(&key->g); in do_keypair_free()
87 retstatus = caam_calloc_buf(&outkey->g, l_bytes); in get_keypair_domain_params()
99 in_g_size = crypto_bignum_num_bytes(key->g); in get_keypair_domain_params()
105 prime.g = &outkey->g; in get_keypair_domain_params()
117 crypto_bignum_bin2bn(outkey->g.data, outkey->g.length, key->g); in get_keypair_domain_params()
129 crypto_bignum_bn2bin(key->g, in get_keypair_domain_params()
130 outkey->g.data + l_bytes - in_g_size); in get_keypair_domain_params()
131 cache_operation(TEE_CACHECLEAN, outkey->g.data, in get_keypair_domain_params()
132 outkey->g.length); in get_keypair_domain_params()
[all …]
H A Dcaam_dh.c32 struct caambuf g; /* Generator */ member
45 caam_free_buf(&key->g); in do_keypair_free()
78 retstatus = caam_calloc_buf(&outkey->g, p_size); in do_keypair_conv_p_g()
83 field_size = crypto_bignum_num_bytes(inkey->g); in do_keypair_conv_p_g()
84 crypto_bignum_bn2bin(inkey->g, outkey->g.data + p_size - field_size); in do_keypair_conv_p_g()
85 cache_operation(TEE_CACHECLEAN, outkey->g.data, outkey->g.length); in do_keypair_conv_p_g()
169 key->g = crypto_bignum_allocate(size_bits); in do_allocate_keypair()
170 if (!key->g) in do_allocate_keypair()
198 crypto_bignum_free(&key->g); in do_allocate_keypair()
308 caam_desc_add_ptr(desc, caam_dh_key.g.paddr); in do_gen_keypair()
H A Dlocal.h35 struct caambuf *g; /* Generator g */ member
/optee_os/core/lib/libtomcrypt/src/pk/dsa/
H A Ddsa_set.c21 const unsigned char *g, unsigned long glen, in dsa_set_pqg() argument
28 LTC_ARGCHK(g != NULL); in dsa_set_pqg()
33 err = mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, LTC_NULL); in dsa_set_pqg()
37 … if ((err = mp_read_unsigned_bin(key->g, (unsigned char *)g , glen)) != CRYPT_OK) { goto LBL_ERR; } in dsa_set_pqg()
75 LTC_ARGCHK(key->g != NULL); in dsa_set_key()
82 …if ((err = mp_exptmod(key->g, key->x, key->p, key->y)) != CRYPT_OK) { goto LBL_ERR; } in dsa_set_key()
H A Ddsa_import.c31 if (mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, LTC_NULL) != CRYPT_OK) { in dsa_import()
44 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_import()
59 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_import()
79 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_import()
91 LTC_SET_ASN1(params, 2, LTC_ASN1_INTEGER, key->g, 1UL); in dsa_import()
H A Ddsa_export.c43 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_export()
51 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_export()
76 LTC_SET_ASN1(int_list, 2, LTC_ASN1_INTEGER, key->g, 1UL); in dsa_export()
89 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_export()
H A Ddsa_verify_key.c61 if (mp_cmp_d(key->g, 1) != LTC_MP_GT || mp_cmp(key->g, key->p) != LTC_MP_LT) { in dsa_int_validate_pqg()
78 if ((err = mp_exptmod(key->g, key->q, key->p, tmp1)) != CRYPT_OK) { goto error; } in dsa_int_validate_pqg()
161 if ((err = mp_exptmod(key->g, key->x, key->p, tmp)) != CRYPT_OK) { in dsa_int_validate_xy()
H A Ddsa_set_pqg_dsaparam.c28 err = mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, LTC_NULL); in dsa_set_pqg_dsaparam()
34 LTC_ASN1_INTEGER, 1UL, key->g, in dsa_set_pqg_dsaparam()
H A Ddsa_generate_pqg.c23 …ke_params(prng_state *prng, int wprng, int group_size, int modulus_size, void *p, void *q, void *g) in s_dsa_make_params() argument
185 if ((err = mp_exptmod(h, e, p, g)) != CRYPT_OK) { goto cleanup; } in s_dsa_make_params()
186 } while (mp_cmp_d(g, 1) == LTC_MP_EQ); in s_dsa_make_params()
216 if ((err = mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, LTC_NULL)) != CRYPT_OK) { in dsa_generate_pqg()
220 err = s_dsa_make_params(prng, wprng, group_size, modulus_size, key->p, key->q, key->g); in dsa_generate_pqg()
H A Ddsa_free.c19 mp_cleanup_multi(&key->y, &key->x, &key->q, &key->g, &key->p, LTC_NULL); in dsa_free()
H A Ddsa_generate_key.c31 if ((err = mp_exptmod(key->g, key->x, key->p, key->y)) != CRYPT_OK) { return err; } in dsa_generate_key()
/optee_os/core/lib/libtomcrypt/
H A Ddsa.c20 if (!bn_alloc_max(&s->g)) in crypto_acipher_alloc_dsa_keypair()
33 crypto_bignum_free(&s->g); in crypto_acipher_alloc_dsa_keypair()
44 if (!bn_alloc_max(&s->g)) in crypto_acipher_alloc_dsa_public_key()
55 crypto_bignum_free(&s->g); in crypto_acipher_alloc_dsa_public_key()
69 ltc_res = mp_init_multi(&ltc_tmp_key.g, &ltc_tmp_key.p, &ltc_tmp_key.q, in crypto_acipher_gen_dsa_key()
75 mp_copy(key->g, ltc_tmp_key.g); in crypto_acipher_gen_dsa_key()
106 .g = key->g, in crypto_acipher_dsa_sign()
174 .g = key->g, in crypto_acipher_dsa_verify()
H A Ddh.c19 if (!bn_alloc_max(&s->g)) in crypto_acipher_alloc_dh_keypair()
31 crypto_bignum_free(&s->g); in crypto_acipher_alloc_dh_keypair()
53 mp_copy(key->g, ltc_tmp_key.base); in crypto_acipher_gen_dh_key()
/optee_os/core/lib/libtomcrypt/src/ciphers/safer/
H A Dsafer.c251 { unsigned char a, b, c, d, e, f, g, h, t; in s_safer_ecb_encrypt() local
261 e = pt[4]; f = pt[5]; g = pt[6]; h = pt[7]; in s_safer_ecb_encrypt()
266 e ^= *++key; f += *++key; g += *++key; h ^= *++key; in s_safer_ecb_encrypt()
270 g = LOG(g) ^ *++key; h = EXP(h) + *++key; in s_safer_ecb_encrypt()
271 PHT(a, b); PHT(c, d); PHT(e, f); PHT(g, h); in s_safer_ecb_encrypt()
272 PHT(a, c); PHT(e, g); PHT(b, d); PHT(f, h); in s_safer_ecb_encrypt()
273 PHT(a, e); PHT(b, f); PHT(c, g); PHT(d, h); in s_safer_ecb_encrypt()
274 t = b; b = e; e = c; c = t; t = d; d = f; f = g; g = t; in s_safer_ecb_encrypt()
277 e ^= *++key; f += *++key; g += *++key; h ^= *++key; in s_safer_ecb_encrypt()
281 ct[6] = g & 0xFF; ct[7] = h & 0xFF; in s_safer_ecb_encrypt()
[all …]
/optee_os/core/lib/libtomcrypt/src/math/fp/
H A Dltc_ecc_fp_mulmod.c29 ecc_point *g, /* cached COPY of base point */ member
588 if (z >= 0 && fp_cache[z].g) { in s_find_hole()
593 ltc_ecc_del_point(fp_cache[z].g); in s_find_hole()
594 fp_cache[z].g = NULL; in s_find_hole()
605 static int s_find_base(ecc_point *g) in s_find_base() argument
609 if (fp_cache[x].g != NULL && in s_find_base()
610 mp_cmp(fp_cache[x].g->x, g->x) == LTC_MP_EQ && in s_find_base()
611 mp_cmp(fp_cache[x].g->y, g->y) == LTC_MP_EQ && in s_find_base()
612 mp_cmp(fp_cache[x].g->z, g->z) == LTC_MP_EQ) { in s_find_base()
623 static int s_add_entry(int idx, ecc_point *g) in s_add_entry() argument
[all …]
/optee_os/core/lib/libtomcrypt/src/misc/base64/
H A Dbase64_decode.c84 int g; in s_base64_decode_internal() local
90 g = 0; /* '=' counter */ in s_base64_decode_internal()
97 g++; in s_base64_decode_internal()
112 if ((g > 0) && (mode != insane)) { in s_base64_decode_internal()
130 if (((y + g) != 4) && (mode == strict) && (map != map_base64url)) return CRYPT_INVALID_PACKET; in s_base64_decode_internal()
/optee_os/core/drivers/crypto/hisilicon/
H A Dhpre_dh.c29 key->g = crypto_bignum_allocate(size_bits); in hpre_dh_alloc_keypair()
30 if (!key->g) in hpre_dh_alloc_keypair()
58 crypto_bignum_free(&key->g); in hpre_dh_alloc_keypair()
190 msg->g = msg->x_p + (msg->key_bytes << 1); in hpre_dh_params_alloc()
192 msg->out = msg->g + msg->key_bytes; in hpre_dh_params_alloc()
220 msg->gbytes = crypto_bignum_num_bytes(key->g); in hpre_dh_params_bn2bin()
221 crypto_bignum_bn2bin(key->g, msg->g); in hpre_dh_params_bn2bin()
226 crypto_bignum_bn2bin(pubkey, msg->g); in hpre_dh_params_bn2bin()
241 ret = hpre_bin_from_crypto_bin(msg->g, msg->g, msg->key_bytes, in hpre_dh_params_bn2bin()
286 if (!key || !key->g || !key->p || !key->x || !key->y) { in hpre_dh_gen_keypair()
H A Dhpre_dh.h19 uint8_t *g; member
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dasn1write.h17 #define MBEDTLS_ASN1_CHK_ADD(g, f) \ argument
23 (g) += ret; \
26 #define MBEDTLS_ASN1_CHK_CLEANUP_ADD(g, f) \ argument
32 (g) += ret; \
/optee_os/lib/libmbedtls/core/
H A Ddh.c21 s->g = crypto_bignum_allocate(key_size_bits); in crypto_acipher_alloc_dh_keypair()
22 if (!s->g) in crypto_acipher_alloc_dh_keypair()
38 crypto_bignum_free(&s->g); in crypto_acipher_alloc_dh_keypair()
59 dhm.G = *(mbedtls_mpi *)key->g; in crypto_acipher_gen_dh_key()
111 dhm.G = *(mbedtls_mpi *)private_key->g; in crypto_acipher_dh_shared_secret()
/optee_os/core/lib/zlib/
H A Dzlib.h1843 # define z_gzgetc(g) \ argument
1844 ((g)->have ? ((g)->have--, (g)->pos++, *((g)->next)++) : (gzgetc)(g))
1846 # define gzgetc(g) \ argument
1847 ((g)->have ? ((g)->have--, (g)->pos++, *((g)->next)++) : (gzgetc)(g))
/optee_os/core/lib/libtomcrypt/src/pk/dh/
H A Ddh_set.c19 const unsigned char *g, unsigned long glen, in dh_set_pg() argument
26 LTC_ARGCHK(g != NULL); in dh_set_pg()
33 …if ((err = mp_read_unsigned_bin(key->base, (unsigned char*)g, glen)) != CRYPT_OK) { goto LBL_E… in dh_set_pg()

123