Home
last modified time | relevance | path

Searched refs:bnD (Results 1 – 8 of 8) sorted by relevance

/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/
DCryptEccSignature.c48 bigNum bnD, // OUT: the adjusted digest in EcdsaDigest() argument
58 BnSetWord(bnD, 0); in EcdsaDigest()
61 BnFromBytes(bnD, digest->t.buffer, in EcdsaDigest()
63 shift = BnSizeInBits(bnD) - bitsInMax; in EcdsaDigest()
65 BnShiftRight(bnD, bnD, shift); in EcdsaDigest()
67 return bnD; in EcdsaDigest()
87 bigConst bnD, // IN: the private key in BnSchnorrSign() argument
101 BnMult(bnT1, bnT1, bnD); in BnSchnorrSign()
120 bigNum bnD, // IN: private signing key in BnSignEcdsa() argument
179 BnModMult(bnS, bnR, bnD, order); in BnSignEcdsa()
[all …]
DCryptEccMain.c511 BN_INITIALIZED(bnD, MAX_ECC_PARAMETER_BYTES * 8, d); in CryptEccIsValidPrivateKey()
512 return !BnEqualZero(bnD) && (BnUnsignedCmp(bnD, BnGetCurveOrder(curveId)) < 0); in CryptEccIsValidPrivateKey()
614 bigNum bnD, // OUT: private scalar in BnEccGenerateKeyPair() argument
622 OK = BnEccGetPrivate(bnD, AccessCurveData(E), rand); in BnEccGenerateKeyPair()
625 OK = OK && BnEccModMult(ecQ, NULL, bnD, E); in BnEccGenerateKeyPair()
645 ECC_NUM(bnD); in CryptEccNewKeyPair()
652 OK = BnEccGenerateKeyPair(bnD, ecQ, E, NULL); in CryptEccNewKeyPair()
656 BnTo2B(bnD, &dOut->b, Qout->x.t.size); in CryptEccNewKeyPair()
706 ECC_INITIALIZED(bnD, dIn); // If dIn is null, then bnD is null in CryptEccPointMultiply()
712 retVal = BnPointMult(ecR, ecP, bnD, ecQ, bnU, E); in CryptEccPointMultiply()
[all …]
DCryptRsa.c1353 BN_RSA(bnD); in CryptRsaGenerateKey()
1428 BnSub(bnD, Z->Q, Z->P); in CryptRsaGenerateKey()
1430 BnSub(bnD, Z->P, Z->Q); in CryptRsaGenerateKey()
1431 if(BnMsb(bnD) < 100) in CryptRsaGenerateKey()
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ossl/
DTpmToOsslMath.c557 BIG_INITIALIZED(bnD, d); in BnEccModMult()
560 EC_POINT_mul(E->G, pR, bnD, NULL, NULL, E->CTX); in BnEccModMult()
562 EC_POINT_mul(E->G, pR, NULL, pS, bnD, E->CTX); in BnEccModMult()
585 BIG_INITIALIZED(bnD, d); in BnEccModMult2()
590 EC_POINT_mul(E->G, pR, bnD, pQ, bnU, E->CTX); in BnEccModMult2()
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/wolf/
DTpmToWolfMath.c421 MP_INITIALIZED(bnD, d); in BnEccModMult()
431 OK = (wc_ecc_mulmod(bnD, pS, pR, NULL, bnPrime, 1 ) == MP_OKAY); in BnEccModMult()
463 MP_INITIALIZED(bnD, d); in BnEccModMult2()
472 OK = (ecc_mul2add(pS, bnD, pQ, bnU, pR, bnA, bnPrime, NULL) == MP_OKAY); in BnEccModMult2()
/external/ms-tpm-20-ref/TPMCmd/tpm/src/support/
DMathOnByteBuffers.c187 BN_MAX_INITIALIZED(bnD, d); in DivideB()
192 BnDiv(bnQ, bnR, bnN, bnD); in DivideB()
/external/ms-tpm-20-ref/TPMCmd/tpm/include/prototypes/
DCryptEccSignature_fp.h54 bigNum bnD, // IN: private signing key
DCryptEccMain_fp.h277 bigNum bnD, // OUT: private scalar