| /optee_os/core/include/ |
| H A D | scattered_array.h | 30 #define __SCT_ARRAY_DEF_ITEM2(array_name, order, id, element_type) \ argument 33 ".scattered_array_" #array_name "_1_" #order) 35 #define __SCT_ARRAY_DEF_PG_ITEM2(array_name, order, id, element_type) \ argument 38 ".scattered_array_" #array_name "_1_" #order) 40 #define __SCT_ARRAY_DEF_ITEM1(array_name, order, id, element_type) \ argument 41 __SCT_ARRAY_DEF_ITEM2(array_name, order, id, element_type) 43 #define __SCT_ARRAY_DEF_PG_ITEM1(array_name, order, id, element_type) \ argument 44 __SCT_ARRAY_DEF_PG_ITEM2(array_name, order, id, element_type) 52 #define SCATTERED_ARRAY_DEFINE_ITEM_ORDERED(array_name, order, element_type) \ argument 53 __SCT_ARRAY_DEF_ITEM1(array_name, order, __COUNTER__, element_type) [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_set_curve_internal.c | 24 if (s_ecc_cmp_hex_bn(curve->order, key->dp.order, bn) != 1) continue; in s_ecc_oid_lookup() 47 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_copy_curve() 56 if ((err = mp_copy(srckey->dp.order, key->dp.order )) != CRYPT_OK) { goto error; } in ecc_copy_curve() 79 int ecc_set_curve_from_mpis(void *a, void *b, void *prime, void *order, void *gx, void *gy, unsigne… in ecc_set_curve_from_mpis() argument 87 LTC_ARGCHK(order != NULL); in ecc_set_curve_from_mpis() 91 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve_from_mpis() 100 if ((err = mp_copy(order, key->dp.order )) != CRYPT_OK) { goto error; } in ecc_set_curve_from_mpis()
|
| H A D | ltc_ecc_verify_key.c | 21 void *order = key->dp.order; in ltc_ecc_verify_key() local 43 …if ((err = ltc_ecc_mulmod(order, &(key->pubkey), point, a, prime, 1)) != CRYPT_OK) { goto done… in ltc_ecc_verify_key()
|
| H A D | ecc_import_x509.c | 35 void *prime, *order, *a, *b, *gx, *gy; in s_ecc_import_x509_with_curve() local 43 if ((err = mp_init_multi(&prime, &order, &a, &b, &gx, &gy, LTC_NULL)) != CRYPT_OK) { in s_ecc_import_x509_with_curve() 52 LTC_SET_ASN1(seq_ecparams, 4, LTC_ASN1_INTEGER, order, 1UL); in s_ecc_import_x509_with_curve() 77 …if ((err = ecc_set_curve_from_mpis(a, b, prime, order, gx, gy, cofactor, key)) != CRYPT_OK) { goto… in s_ecc_import_x509_with_curve() 82 mp_clear_multi(prime, order, a, b, gx, gy, LTC_NULL); in s_ecc_import_x509_with_curve()
|
| H A D | ecc_import_openssl.c | 44 void *prime, *order, *a, *b, *gx, *gy; in s_ecc_import_private_with_curve() local 52 if ((err = mp_init_multi(&prime, &order, &a, &b, &gx, &gy, LTC_NULL)) != CRYPT_OK) { in s_ecc_import_private_with_curve() 70 LTC_SET_ASN1(seq_ecparams, 4, LTC_ASN1_INTEGER, order, 1UL); in s_ecc_import_private_with_curve() 93 …if ((err = ecc_set_curve_from_mpis(a, b, prime, order, gx, gy, cofactor, key)) != CRYPT_OK) { goto… in s_ecc_import_private_with_curve() 98 mp_clear_multi(prime, order, a, b, gx, gy, LTC_NULL); in s_ecc_import_private_with_curve()
|
| H A D | ecc_export_openssl.c | 20 void *prime, *order, *a, *b, *gx, *gy; in ecc_export_openssl() local 48 order = key->dp.order; in ecc_export_openssl() 111 LTC_SET_ASN1(seq_ecparams, 4, LTC_ASN1_INTEGER, order, 1UL); in ecc_export_openssl()
|
| H A D | ecc_set_curve.c | 15 if ((err = mp_init_multi(&key->dp.prime, &key->dp.order, &key->dp.A, &key->dp.B, in ecc_set_curve() 24 if ((err = mp_read_radix(key->dp.order, cu->order, 16)) != CRYPT_OK) { goto error; } in ecc_set_curve()
|
| H A D | ecc_import_pkcs8.c | 78 ltc_asn1_list *version, *field, *point, *point_g, *order, *p_cofactor; in ecc_import_pkcs8() local 86 LTC_SET_DER_FLEXI_CHECK(flexi_should, n++, LTC_ASN1_INTEGER, &order); in ecc_import_pkcs8() 145 …if ((err = ecc_set_curve_from_mpis(a, b, prime->data, order->data, gx, gy, cofactor, key)) != CRYP… in ecc_import_pkcs8()
|
| H A D | ecc_free.c | 21 mp_cleanup_multi(&key->dp.prime, &key->dp.order, in ecc_free()
|
| H A D | ecc_make_key.c | 53 if ((err = rand_bn_upto(key->k, key->dp.order, prng, wprng)) != CRYPT_OK) { in ecc_generate_key()
|
| H A D | ecc_set_key.c | 26 if (mp_iszero(key->k) || (mp_cmp(key->k, key->dp.order) != LTC_MP_LT)) { in ecc_set_key()
|
| H A D | ecc_verify_hash.c | 49 p = key->dp.order; in ecc_verify_hash_ex() 73 i = mp_unsigned_bin_size(key->dp.order); in ecc_verify_hash_ex()
|
| H A D | ecc_recover_key.c | 53 p = key->dp.order; in ecc_recover_key() 79 i = mp_unsigned_bin_size(key->dp.order); in ecc_recover_key()
|
| H A D | ecc_sign_hash.c | 54 p = key->dp.order; in ecc_sign_hash_ex()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | sm2-dsa.c | 62 ltc_res = rand_bn_upto(k, ltc_key.dp.order, NULL, in sm2_ltc_dsa_sign() 81 ltc_res = mp_addmod(e, x1y1p->x, ltc_key.dp.order, r); in sm2_ltc_dsa_sign() 92 mp_cmp(tmp, ltc_key.dp.order) == LTC_MP_EQ) in sm2_ltc_dsa_sign() 102 ltc_res = mp_invmod(s, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 117 ltc_res = mp_mulmod(s, tmp, ltc_key.dp.order, s); in sm2_ltc_dsa_sign() 174 mp_cmp(rprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 182 mp_cmp(sprime, ltc_key.dp.order) != LTC_MP_LT) { in sm2_ltc_dsa_verify() 194 ltc_res = mp_addmod(rprime, sprime, ltc_key.dp.order, t); in sm2_ltc_dsa_verify() 236 ltc_res = mp_addmod(eprime, x1y1p->x, ltc_key.dp.order, R); in sm2_ltc_dsa_verify()
|
| H A D | sm2-kep.c | 221 void *n = my_key->dp.order; in sm2_kep_derive()
|
| /optee_os/core/include/kernel/ |
| H A D | pm.h | 75 .order = (_order), \ 127 uint8_t order; member 211 enum pm_callback_order order = PM_CB_ORDER_CORE_SERVICE; in unregister_pm_core_service_cb() local 214 order, NULL)); in unregister_pm_core_service_cb()
|
| /optee_os/core/lib/libtomcrypt/src/math/fp/ |
| H A D | ltc_ecc_fp_mulmod.c | 777 void *tk, *order; in s_accel_fp_mul() local 790 if ((err = mp_init(&order)) != CRYPT_OK) { in s_accel_fp_mul() 793 if ((err = mp_read_radix(order, ltc_ecc_sets[x].order, 16)) != CRYPT_OK) { in s_accel_fp_mul() 794 mp_clear(&order); in s_accel_fp_mul() 799 if (mp_cmp(k, order) != LTC_MP_LT) { in s_accel_fp_mul() 801 mp_clear(order); in s_accel_fp_mul() 804 if ((err = mp_mod(k, order, tk)) != CRYPT_OK) { in s_accel_fp_mul() 806 mp_clear(order); in s_accel_fp_mul() 812 mp_clear(order); in s_accel_fp_mul() 902 void *tka, *tkb, *order; in ss_accel_fp_mul2add() local [all …]
|
| /optee_os/core/kernel/ |
| H A D | pm.c | 79 pm_cb_ref[n].order == pm_hdl->order) in unregister_pm_cb() 118 enum pm_callback_order order) in call_callbacks() argument 134 if (hdl->order == order) { in call_callbacks()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | rsa_alt_helpers.c | 59 uint16_t order; /* Order of 2 in DE - 1 */ in mbedtls_rsa_deduce_primes() local 98 if ((order = (uint16_t) mbedtls_mpi_lsb(&T)) == 0) { in mbedtls_rsa_deduce_primes() 104 MBEDTLS_MPI_CHK(mbedtls_mpi_shift_r(&T, order)); in mbedtls_rsa_deduce_primes() 131 for (iter = 1; iter <= order; ++iter) { in mbedtls_rsa_deduce_primes()
|
| /optee_os/ |
| H A D | typedefs.checkpatch | 2 # order (sort -r)
|
| /optee_os/core/arch/arm/plat-totalcompute/fdts/ |
| H A D | optee_sp_manifest.dts | 25 boot-order = <0>;
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | README.md | 43 …edcrypto. As a result, some linkers will expect flags to be in a specific order, for example the G… 89 We intentionally only use a minimum of functionality in the makefiles in order to keep them as simp… 91 In order to build from the source code using GNU Make, just enter at the command line: 95 In order to run the tests, enter: 107 In order to build for a Windows platform, you should use `WINDOWS_BUILD=1` if the target is Windows… 119 In order to build the source using CMake in a separate directory (recommended), just enter at the c… 125 In order to run the tests, enter: 173 prevent `git status` from showing them as modified). In order to do so, from 286 …ng alternative implementations at build time or run time, for example, in order to take advantage …
|
| /optee_os/core/arch/arm/dts/ |
| H A D | at91-sama5d27_wlsom1_ek.dts | 94 * disable bias in order to be in the same
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_pk.h | 181 const char *order; member 219 void *order; member
|