| /optee_os/core/lib/libtomcrypt/src/pk/dsa/ |
| H A D | dsa_verify_hash.c | 27 void *w, *v, *u1, *u2; in dsa_verify_hash_raw() local 39 if ((err = mp_init_multi(&w, &v, &u1, &u2, LTC_NULL)) != CRYPT_OK) { in dsa_verify_hash_raw() 56 …if ((err = mp_read_unsigned_bin(u1, (unsigned char *)hash, hashlen)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw() 57 …if ((err = mp_mulmod(u1, w, key->q, u1)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw() 63 …if ((err = mp_exptmod(key->g, u1, key->p, u1)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw() 65 …if ((err = mp_mulmod(u1, u2, key->p, v)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw() 75 mp_clear_multi(w, v, u1, u2, LTC_NULL); in dsa_verify_hash_raw()
|
| /optee_os/lib/libutils/compiler-rt/lib/builtins/ |
| H A D | udivmodti4.c | 23 static inline du_int udiv128by64to64default(du_int u1, du_int u0, du_int v, in udiv128by64to64default() argument 38 un64 = (u1 << s) | (u0 >> (n_udword_bits - s)); in udiv128by64to64default() 42 un64 = u1; in udiv128by64to64default() 84 static inline du_int udiv128by64to64(du_int u1, du_int u0, du_int v, in udiv128by64to64() argument 90 : [ v ] "r"(v), "a"(u0), "d"(u1)); in udiv128by64to64() 93 return udiv128by64to64default(u1, u0, v, r); in udiv128by64to64()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_verify_hash.c | 29 void *r, *s, *v, *w, *u1, *u2, *e, *p, *m, *a, *a_plus3; in ecc_verify_hash_ex() local 45 if ((err = mp_init_multi(&r, &s, &v, &w, &u1, &u2, &e, &a_plus3, LTC_NULL)) != CRYPT_OK) { in ecc_verify_hash_ex() 152 …if ((err = mp_mulmod(e, w, p, u1)) != CRYPT_OK) … in ecc_verify_hash_ex() 173 …if ((err = ltc_mp.ecc_ptmul(u1, mG, mG, a, m, 0)) != CRYPT_OK) … in ecc_verify_hash_ex() 183 …if ((err = ltc_mp.ecc_mul2add(mG, u1, mQ, u2, mG, ma, m)) != CRYPT_OK) … in ecc_verify_hash_ex() 201 mp_clear_multi(r, s, v, w, u1, u2, e, a_plus3, LTC_NULL); in ecc_verify_hash_ex()
|
| H A D | ecc_recover_key.c | 32 void *r, *s, *v, *w, *t1, *t2, *u1, *u2, *v1, *v2, *e, *x, *y, *a_plus3; in ecc_recover_key() local 49 …if ((err = mp_init_multi(&r, &s, &v, &w, &t1, &t2, &u1, &u2, &v1, &v2, &e, &x, &y, &a_plus3, LTC_N… in ecc_recover_key() 205 …if ((err = mp_mulmod(e, w, p, u1)) != CRYPT_OK) … in ecc_recover_key() 227 …if ((err = ltc_mp.ecc_mul2add(mG, u1, mQ, u2, mG, ma, m)) != CRYPT_OK) … in ecc_recover_key() 255 mp_clear_multi(a_plus3, y, x, e, v2, v1, u2, u1, t2, t1, w, v, s, r, LTC_NULL); in ecc_recover_key()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ecdsa.c | 38 mbedtls_mpi u1, u2; /* intermediate values */ member 50 mbedtls_mpi_init(&ctx->u1); in ecdsa_restart_ver_init() 64 mbedtls_mpi_free(&ctx->u1); in ecdsa_restart_ver_free() 496 mbedtls_mpi e, s_inv, u1, u2; in mbedtls_ecdsa_verify_restartable() local 498 mbedtls_mpi *pu1 = &u1, *pu2 = &u2; in mbedtls_ecdsa_verify_restartable() 502 mbedtls_mpi_init(&u1); mbedtls_mpi_init(&u2); in mbedtls_ecdsa_verify_restartable() 514 pu1 = &rs_ctx->ver->u1; in mbedtls_ecdsa_verify_restartable() 586 mbedtls_mpi_free(&u1); mbedtls_mpi_free(&u2); in mbedtls_ecdsa_verify_restartable()
|
| H A D | bignum.c | 1341 static mbedtls_mpi_uint mbedtls_int_div_int(mbedtls_mpi_uint u1, in mbedtls_int_div_int() argument 1359 if (0 == d || u1 >= d) { in mbedtls_int_div_int() 1368 dividend = (mbedtls_t_udbl) u1 << biL; in mbedtls_int_div_int() 1393 u1 = u1 << s; in mbedtls_int_div_int() 1394 u1 |= (u0 >> (biL - s)) & (-(mbedtls_mpi_sint) s >> (biL - 1)); in mbedtls_int_div_int() 1406 q1 = u1 / d1; in mbedtls_int_div_int() 1407 r0 = u1 - d1 * q1; in mbedtls_int_div_int() 1418 rAX = (u1 * radix) + (u0_msw - q1 * d); in mbedtls_int_div_int()
|
| H A D | bignum_core.c | 540 mbedtls_mpi_uint u1 = (T[0] + u0 * B[0]) * mm; in mbedtls_mpi_core_montmul() local 543 (void) mbedtls_mpi_core_mla(T, AN_limbs + 2, N, AN_limbs, u1); in mbedtls_mpi_core_montmul()
|
| /optee_os/core/lib/libtomcrypt/src/stream/sosemanuk/ |
| H A D | sosemanuk.c | 652 S(u0, u1, u2, u3, u4); \ in s_sosemanuk_internal() 671 ulong32 u0, u1, u2, u3, u4; in s_sosemanuk_internal() local 675 STEP(01, 02, 03, 04, 05, 06, 07, 08, 09, 00, v1, u1); in s_sosemanuk_internal() 680 STEP(05, 06, 07, 08, 09, 00, 01, 02, 03, 04, v1, u1); in s_sosemanuk_internal() 685 STEP(09, 00, 01, 02, 03, 04, 05, 06, 07, 08, v1, u1); in s_sosemanuk_internal() 690 STEP(03, 04, 05, 06, 07, 08, 09, 00, 01, 02, v1, u1); in s_sosemanuk_internal() 695 STEP(07, 08, 09, 00, 01, 02, 03, 04, 05, 06, v1, u1); in s_sosemanuk_internal()
|