/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ |
D | CryptEccSignature.c | 48 bigNum bnD, // OUT: the adjusted digest in EcdsaDigest() argument 58 BnSetWord(bnD, 0); in EcdsaDigest() 61 BnFromBytes(bnD, digest->t.buffer, in EcdsaDigest() 63 shift = BnSizeInBits(bnD) - bitsInMax; in EcdsaDigest() 65 BnShiftRight(bnD, bnD, shift); in EcdsaDigest() 67 return bnD; in EcdsaDigest() 87 bigConst bnD, // IN: the private key in BnSchnorrSign() argument 101 BnMult(bnT1, bnT1, bnD); in BnSchnorrSign() 120 bigNum bnD, // IN: private signing key in BnSignEcdsa() argument 179 BnModMult(bnS, bnR, bnD, order); in BnSignEcdsa() [all …]
|
D | CryptEccMain.c | 511 BN_INITIALIZED(bnD, MAX_ECC_PARAMETER_BYTES * 8, d); in CryptEccIsValidPrivateKey() 512 return !BnEqualZero(bnD) && (BnUnsignedCmp(bnD, BnGetCurveOrder(curveId)) < 0); in CryptEccIsValidPrivateKey() 614 bigNum bnD, // OUT: private scalar in BnEccGenerateKeyPair() argument 622 OK = BnEccGetPrivate(bnD, AccessCurveData(E), rand); in BnEccGenerateKeyPair() 625 OK = OK && BnEccModMult(ecQ, NULL, bnD, E); in BnEccGenerateKeyPair() 645 ECC_NUM(bnD); in CryptEccNewKeyPair() 652 OK = BnEccGenerateKeyPair(bnD, ecQ, E, NULL); in CryptEccNewKeyPair() 656 BnTo2B(bnD, &dOut->b, Qout->x.t.size); in CryptEccNewKeyPair() 706 ECC_INITIALIZED(bnD, dIn); // If dIn is null, then bnD is null in CryptEccPointMultiply() 712 retVal = BnPointMult(ecR, ecP, bnD, ecQ, bnU, E); in CryptEccPointMultiply() [all …]
|
D | CryptRsa.c | 1353 BN_RSA(bnD); in CryptRsaGenerateKey() 1428 BnSub(bnD, Z->Q, Z->P); in CryptRsaGenerateKey() 1430 BnSub(bnD, Z->P, Z->Q); in CryptRsaGenerateKey() 1431 if(BnMsb(bnD) < 100) in CryptRsaGenerateKey()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ossl/ |
D | TpmToOsslMath.c | 557 BIG_INITIALIZED(bnD, d); in BnEccModMult() 560 EC_POINT_mul(E->G, pR, bnD, NULL, NULL, E->CTX); in BnEccModMult() 562 EC_POINT_mul(E->G, pR, NULL, pS, bnD, E->CTX); in BnEccModMult() 585 BIG_INITIALIZED(bnD, d); in BnEccModMult2() 590 EC_POINT_mul(E->G, pR, bnD, pQ, bnU, E->CTX); in BnEccModMult2()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/wolf/ |
D | TpmToWolfMath.c | 421 MP_INITIALIZED(bnD, d); in BnEccModMult() 431 OK = (wc_ecc_mulmod(bnD, pS, pR, NULL, bnPrime, 1 ) == MP_OKAY); in BnEccModMult() 463 MP_INITIALIZED(bnD, d); in BnEccModMult2() 472 OK = (ecc_mul2add(pS, bnD, pQ, bnU, pR, bnA, bnPrime, NULL) == MP_OKAY); in BnEccModMult2()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/support/ |
D | MathOnByteBuffers.c | 187 BN_MAX_INITIALIZED(bnD, d); in DivideB() 192 BnDiv(bnQ, bnR, bnN, bnD); in DivideB()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/include/prototypes/ |
D | CryptEccSignature_fp.h | 54 bigNum bnD, // IN: private signing key
|
D | CryptEccMain_fp.h | 277 bigNum bnD, // OUT: private scalar
|