Searched refs:ecQ (Results 1 – 4 of 4) sorted by relevance
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ |
D | CryptEccMain.c | 615 bn_point_t *ecQ, // OUT: public point in BnEccGenerateKeyPair() argument 625 OK = OK && BnEccModMult(ecQ, NULL, bnD, E); in BnEccGenerateKeyPair() 627 BnSetWord(ecQ->z, 0); in BnEccGenerateKeyPair() 629 BnSetWord(ecQ->z, 1); in BnEccGenerateKeyPair() 644 POINT(ecQ); in CryptEccNewKeyPair() 652 OK = BnEccGenerateKeyPair(bnD, ecQ, E, NULL); in CryptEccNewKeyPair() 655 BnPointTo2B(Qout, ecQ, E); in CryptEccNewKeyPair() 708 POINT_INITIALIZED(ecQ, Qin); in CryptEccPointMultiply() 712 retVal = BnPointMult(ecR, ecP, bnD, ecQ, bnU, E); in CryptEccPointMultiply() 737 POINT_INITIALIZED(ecQ, Qin); in CryptEccIsPointOnCurve() [all …]
|
D | CryptEccSignature.c | 583 bn_point_t *ecQ, // IN: the public point of the key in BnValidateSignatureEcdsa() argument 615 if(BnPointMult(ecR, CurveGetG(AccessCurveData(E)), bnU1, ecQ, bnU2, E) in BnValidateSignatureEcdsa() 643 bigPoint ecQ, // IN: the public point of the key in BnValidateSignatureEcSm2() argument 678 OK = BnEccModMult2(P, NULL, bnS, ecQ, bnT, E); in BnValidateSignatureEcSm2() 712 bigPoint ecQ, // IN: the public point of the key in BnValidateSignatureEcSchnorr() argument 732 OK = BnPointMult(ecE, CurveGetG(C), bnS, ecQ, bnRn, E) == TPM_RC_SUCCESS; in BnValidateSignatureEcSchnorr() 769 POINT_INITIALIZED(ecQ, &signKey->publicArea.unique.ecc); in CryptEccValidateSignature() 809 retVal = BnValidateSignatureEcdsa(bnR, bnS, E, ecQ, digest); in CryptEccValidateSignature() 816 E, ecQ, digest); in CryptEccValidateSignature() 821 retVal = BnValidateSignatureEcSm2(bnR, bnS, E, ecQ, digest); in CryptEccValidateSignature()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/include/prototypes/ |
D | CryptEccSignature_fp.h | 93 bn_point_t *ecQ, // IN: the public point of the key
|
D | CryptEccMain_fp.h | 278 bn_point_t *ecQ, // OUT: public point
|