| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_ffdh.c | 32 mbedtls_mpi *G) in mbedtls_psa_ffdh_set_prime_generator() argument 40 if (P == NULL && G == NULL) { in mbedtls_psa_ffdh_set_prime_generator() 124 if (G != NULL) { in mbedtls_psa_ffdh_set_prime_generator() 125 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G, in mbedtls_psa_ffdh_set_prime_generator() 153 mbedtls_mpi GX, G, X, P; in mbedtls_psa_ffdh_export_public_key() local 167 mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G); in mbedtls_psa_ffdh_export_public_key() 172 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G); in mbedtls_psa_ffdh_export_public_key() 181 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL)); in mbedtls_psa_ffdh_export_public_key() 188 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G); in mbedtls_psa_ffdh_export_public_key() 269 mbedtls_mpi P, G, X, GY, K; in mbedtls_psa_ffdh_key_agreement() local [all …]
|
| H A D | ecjpake.c | 195 const mbedtls_ecp_point *G, in ecjpake_hash() argument 209 MBEDTLS_MPI_CHK(ecjpake_write_len_point(&p, end, grp, pf, G)); in ecjpake_hash() 246 const mbedtls_ecp_point *G, in ecjpake_zkp_read() argument 292 MBEDTLS_MPI_CHK(ecjpake_hash(md_type, grp, pf, G, &V, X, id, &h)); in ecjpake_zkp_read() 294 &VV, &h, X, &r, G)); in ecjpake_zkp_read() 316 const mbedtls_ecp_point *G, in ecjpake_zkp_write() argument 341 G, &v, &V, f_rng, p_rng)); in ecjpake_zkp_write() 342 MBEDTLS_MPI_CHK(ecjpake_hash(md_type, grp, pf, G, &V, X, id, &h)); in ecjpake_zkp_write() 377 const mbedtls_ecp_point *G, in ecjpake_kkp_read() argument 401 MBEDTLS_MPI_CHK(ecjpake_zkp_read(md_type, grp, pf, G, X, id, p, end)); in ecjpake_kkp_read() [all …]
|
| H A D | dhm.c | 123 src = &ctx->G; in mbedtls_dhm_get_value() 153 (ret = dhm_read_bignum(&ctx->G, p, end)) != 0 || in mbedtls_dhm_read_params() 209 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&ctx->GX, &ctx->G, &ctx->X, in dhm_make_common() 252 n2 = mbedtls_mpi_size(&ctx->G); in mbedtls_dhm_make_params() 257 DHM_MPI_EXPORT(&ctx->G, n2); in mbedtls_dhm_make_params() 274 const mbedtls_mpi *G) in mbedtls_dhm_set_group() argument 279 (ret = mbedtls_mpi_copy(&ctx->G, G)) != 0) { in mbedtls_dhm_set_group() 472 mbedtls_mpi_free(&ctx->G); in mbedtls_dhm_free() 536 (ret = mbedtls_asn1_get_mpi(&p, end, &dhm->G)) != 0) { in mbedtls_dhm_parse_dhm()
|
| H A D | pkparse.c | 222 if ((ret = mbedtls_ecp_point_read_binary(grp, &grp->G, in pk_group_from_specified() 231 mbedtls_mpi_read_binary(&grp->G.X, p + 1, len - 1) != 0 || in pk_group_from_specified() 232 mbedtls_mpi_lset(&grp->G.Y, p[0] - 2) != 0 || in pk_group_from_specified() 233 mbedtls_mpi_lset(&grp->G.Z, 1) != 0) { in pk_group_from_specified() 279 mbedtls_mpi_cmp_mpi(&grp->G.X, &ref.G.X) == 0 && in pk_group_id_from_group() 280 mbedtls_mpi_cmp_mpi(&grp->G.Z, &ref.G.Z) == 0 && in pk_group_id_from_group() 282 mbedtls_mpi_get_bit(&grp->G.Y, 0) == mbedtls_mpi_get_bit(&ref.G.Y, 0)) { in pk_group_id_from_group() 328 mbedtls_ecp_point_free(&grp.G); in pk_ecc_group_id_from_specified()
|
| H A D | ecp_curves.c | 4572 ecp_mpi_load(&grp->G.X, gx, gxlen); in ecp_group_load() 4573 ecp_mpi_load(&grp->G.Y, gy, gylen); in ecp_group_load() 4574 ecp_mpi_set1(&grp->G.Z); in ecp_group_load() 4632 #define LOAD_GROUP_A(G) ecp_group_load(grp, \ argument 4633 G ## _p, sizeof(G ## _p), \ 4634 G ## _a, sizeof(G ## _a), \ 4635 G ## _b, sizeof(G ## _b), \ 4636 G ## _gx, sizeof(G ## _gx), \ 4637 G ## _gy, sizeof(G ## _gy), \ 4638 G ## _n, sizeof(G ## _n), \ [all …]
|
| H A D | ecp_curves_new.c | 4540 ecp_mpi_load(&grp->G.X, gx, gxlen); in ecp_group_load() 4541 ecp_mpi_load(&grp->G.Y, gy, gylen); in ecp_group_load() 4542 ecp_mpi_set1(&grp->G.Z); in ecp_group_load() 4620 #define LOAD_GROUP_A(G) ecp_group_load(grp, \ argument 4621 G ## _p, sizeof(G ## _p), \ 4622 G ## _a, sizeof(G ## _a), \ 4623 G ## _b, sizeof(G ## _b), \ 4624 G ## _gx, sizeof(G ## _gx), \ 4625 G ## _gy, sizeof(G ## _gy), \ 4626 G ## _n, sizeof(G ## _n), \ [all …]
|
| H A D | ecp.c | 492 if (grp->G.X.p == NULL) { in mbedtls_ecp_get_type() 496 if (grp->G.Y.p == NULL) { in mbedtls_ecp_get_type() 522 mbedtls_ecp_point_init(&grp->G); in mbedtls_ecp_group_init() 586 mbedtls_ecp_point_free(&grp->G); in mbedtls_ecp_group_free() 2309 p_eq_g = (MPI_ECP_CMP(&P->Y, &grp->G.Y) == 0 && in ecp_mul_comb() 2310 MPI_ECP_CMP(&P->X, &grp->G.X) == 0); in ecp_mul_comb() 3166 const mbedtls_ecp_point *G, in mbedtls_ecp_gen_keypair_base() argument 3173 MBEDTLS_MPI_CHK(mbedtls_ecp_mul(grp, Q, d, G, f_rng, p_rng)); in mbedtls_ecp_gen_keypair_base() 3187 return mbedtls_ecp_gen_keypair_base(grp, &grp->G, d, Q, f_rng, p_rng); in mbedtls_ecp_gen_keypair() 3412 MBEDTLS_MPI_CHK(mbedtls_ecp_mul(&grp, &Q, &prv->d, &prv->grp.G, f_rng, p_rng)); in mbedtls_ecp_check_pub_priv() [all …]
|
| H A D | psa_crypto_ecp.c | 264 mbedtls_ecp_mul(&ecp->grp, &ecp->Q, &ecp->d, &ecp->grp.G, in mbedtls_psa_ecp_export_key() 441 &ecp->d, &ecp->grp.G, in mbedtls_psa_ecp_load_public_part()
|
| /optee_os/core/arch/arm/dts/ |
| H A D | stm32mp15-pinctrl.dtsi | 156 pinmux = <STM32_PINMUX('G', 5, AF11)>, /* ETH_RGMII_CLK125 */ 157 <STM32_PINMUX('G', 4, AF11)>, /* ETH_RGMII_GTX_CLK */ 158 <STM32_PINMUX('G', 13, AF11)>, /* ETH_RGMII_TXD0 */ 159 <STM32_PINMUX('G', 14, AF11)>, /* ETH_RGMII_TXD1 */ 187 pinmux = <STM32_PINMUX('G', 5, ANALOG)>, /* ETH_RGMII_CLK125 */ 188 <STM32_PINMUX('G', 4, ANALOG)>, /* ETH_RGMII_GTX_CLK */ 189 <STM32_PINMUX('G', 13, ANALOG)>, /* ETH_RGMII_TXD0 */ 190 <STM32_PINMUX('G', 14, ANALOG)>, /* ETH_RGMII_TXD1 */ 207 pinmux = <STM32_PINMUX('G', 5, AF11)>, /* ETH_RGMII_CLK125 */ 208 <STM32_PINMUX('G', 4, AF11)>, /* ETH_RGMII_GTX_CLK */ [all …]
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/ |
| H A D | kseed.c | 178 #define G(x) (SS3[((x)>>24)&255] ^ SS2[((x)>>16)&255] ^ SS1[((x)>>8)&255] ^ SS0[(x)&255]) macro 181 T2 = G((R1 ^ K1) ^ (R2 ^ K2)); \ 182 T = G( G(T2 + (R1 ^ K1)) + T2); \ 184 L1 ^= (T + G(T2 + (R1 ^ K1))); \ 214 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]); in kseed_setup() 215 skey->kseed.K[2*i+1] = G(k2 - k4 + KCi[i]); in kseed_setup()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ltc_ecc_mulmod_timing.c | 25 int ltc_ecc_mulmod(void *k, const ecc_point *G, ecc_point *R, void *a, void *modulus, int map) in ltc_ecc_mulmod() argument 34 LTC_ARGCHK(G != NULL); in ltc_ecc_mulmod() 38 if ((err = ltc_ecc_is_point_at_infinity(G, modulus, &inf)) != CRYPT_OK) return err; in ltc_ecc_mulmod() 75 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 76 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 77 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod()
|
| H A D | ltc_ecc_mulmod.c | 26 int ltc_ecc_mulmod(void *k, const ecc_point *G, ecc_point *R, void *a, void *modulus, int map) in ltc_ecc_mulmod() argument 35 LTC_ARGCHK(G != NULL); in ltc_ecc_mulmod() 39 if ((err = ltc_ecc_is_point_at_infinity(G, modulus, &inf)) != CRYPT_OK) return err; in ltc_ecc_mulmod() 76 if ((err = ltc_ecc_copy_point(G, tG)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 78 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 79 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 80 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod()
|
| /optee_os/core/lib/libtomcrypt/src/hashes/ |
| H A D | blake2s.c | 270 #define G(r, i, a, b, c, d) … macro 283 …G(r, 0, v[0], v[4], v[8], v[12]); … 284 …G(r, 1, v[1], v[5], v[9], v[13]); … 285 …G(r, 2, v[2], v[6], v[10], v[14]); … 286 …G(r, 3, v[3], v[7], v[11], v[15]); … 287 …G(r, 4, v[0], v[5], v[10], v[15]); … 288 …G(r, 5, v[1], v[6], v[11], v[12]); … 289 …G(r, 6, v[2], v[7], v[8], v[13]); … 290 …G(r, 7, v[3], v[4], v[9], v[14]); … 336 #undef G
|
| H A D | blake2b.c | 277 #define G(r, i, a, b, c, d) … macro 291 …G(r, 0, v[0], v[4], v[8], v[12]); … 292 …G(r, 1, v[1], v[5], v[9], v[13]); … 293 …G(r, 2, v[2], v[6], v[10], v[14]); … 294 …G(r, 3, v[3], v[7], v[11], v[15]); … 295 …G(r, 4, v[0], v[5], v[10], v[15]); … 296 …G(r, 5, v[1], v[6], v[11], v[12]); … 297 …G(r, 6, v[2], v[7], v[8], v[13]); … 298 …G(r, 7, v[3], v[4], v[9], v[14]); … 347 #undef G
|
| H A D | md5.c | 32 #define G(x,y,z) (y ^ (z & (y ^ x))) macro 42 a = (a + G(b,c,d) + M + t); a = ROL(a, s) + b; 81 a = (a + G(b,c,d) + M + t); a = ROLc(a, s) + b;
|
| H A D | md4.c | 45 #define G(x, y, z) ((x & y) | (z & (x | y))) macro 59 (a) += G ((b), (c), (d)) + (x) + 0x5a827999UL; \
|
| /optee_os/core/crypto/ |
| H A D | sm3.c | 71 uint32_t A, B, C, D, E, F, G, H; in sm3_process() local 130 G = ctx->state[6]; in sm3_process() 137 TT2 = GG0(E, F, G) + H + SS1 + W[j]; in sm3_process() 142 H = G; in sm3_process() 143 G = ROTL(F, 19); in sm3_process() 152 TT2 = GG1(E, F, G) + H + SS1 + W[j]; in sm3_process() 157 H = G; in sm3_process() 158 G = ROTL(F, 19); in sm3_process() 169 ctx->state[6] ^= G; in sm3_process()
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | dh.c | 59 dhm.G = *(mbedtls_mpi *)key->g; in crypto_acipher_gen_dh_key() 91 mbedtls_mpi_init(&dhm.G); in crypto_acipher_gen_dh_key() 111 dhm.G = *(mbedtls_mpi *)private_key->g; in crypto_acipher_dh_shared_secret() 137 mbedtls_mpi_init(&dhm.G); in crypto_acipher_dh_shared_secret()
|
| H A D | sm2-dsa.c | 75 mres = mbedtls_ecp_mul(&grp, &x1y1p, &k, &grp.G, mbd_rand, in sm2_mbedtls_dsa_sign() 237 mres = mbedtls_ecp_muladd(&grp, &x1y1p, &sprime, &grp.G, &t, &PA); in sm2_mbedtls_dsa_verify()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | dhm.h | 103 mbedtls_mpi MBEDTLS_PRIVATE(G); /*!< The generator. */ 206 const mbedtls_mpi *G);
|
| H A D | ecp.h | 245 mbedtls_ecp_point G; /*!< The generator of the subgroup used. */ member 1215 const mbedtls_ecp_point *G,
|
| /optee_os/core/arch/arm/plat-stm32mp1/ |
| H A D | conf.mk | 22 flavorlist-cryp-1G = $(flavor_dts_file-157C_DHCOM_PDK2) \ 28 flavorlist-no_cryp-1G = $(flavor_dts_file-157A_DHCOR_AVENGER96) 31 $(flavorlist-no_cryp-1G) 36 flavorlist-1G = $(flavorlist-cryp-1G) \ 37 $(flavorlist-no_cryp-1G)
|
| /optee_os/core/arch/arm/plat-hikey/ |
| H A D | platform_config.h | 148 cannot support boards with 4G RAM or more
|
| /optee_os/core/arch/arm/crypto/ |
| H A D | ghash-ce-core_a32.S | 95 vmull.p8 t3q, \ad, \b2 @ G = A*B2 102 veor t1q, t1q, t3q @ M = G + H
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_math.h | 385 const ecc_point *G,
|