Home
last modified time | relevance | path

Searched refs:ecQ (Results 1 – 4 of 4) sorted by relevance

/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/
DCryptEccMain.c615 bn_point_t *ecQ, // OUT: public point in BnEccGenerateKeyPair() argument
625 OK = OK && BnEccModMult(ecQ, NULL, bnD, E); in BnEccGenerateKeyPair()
627 BnSetWord(ecQ->z, 0); in BnEccGenerateKeyPair()
629 BnSetWord(ecQ->z, 1); in BnEccGenerateKeyPair()
644 POINT(ecQ); in CryptEccNewKeyPair()
652 OK = BnEccGenerateKeyPair(bnD, ecQ, E, NULL); in CryptEccNewKeyPair()
655 BnPointTo2B(Qout, ecQ, E); in CryptEccNewKeyPair()
708 POINT_INITIALIZED(ecQ, Qin); in CryptEccPointMultiply()
712 retVal = BnPointMult(ecR, ecP, bnD, ecQ, bnU, E); in CryptEccPointMultiply()
737 POINT_INITIALIZED(ecQ, Qin); in CryptEccIsPointOnCurve()
[all …]
DCryptEccSignature.c583 bn_point_t *ecQ, // IN: the public point of the key in BnValidateSignatureEcdsa() argument
615 if(BnPointMult(ecR, CurveGetG(AccessCurveData(E)), bnU1, ecQ, bnU2, E) in BnValidateSignatureEcdsa()
643 bigPoint ecQ, // IN: the public point of the key in BnValidateSignatureEcSm2() argument
678 OK = BnEccModMult2(P, NULL, bnS, ecQ, bnT, E); in BnValidateSignatureEcSm2()
712 bigPoint ecQ, // IN: the public point of the key in BnValidateSignatureEcSchnorr() argument
732 OK = BnPointMult(ecE, CurveGetG(C), bnS, ecQ, bnRn, E) == TPM_RC_SUCCESS; in BnValidateSignatureEcSchnorr()
769 POINT_INITIALIZED(ecQ, &signKey->publicArea.unique.ecc); in CryptEccValidateSignature()
809 retVal = BnValidateSignatureEcdsa(bnR, bnS, E, ecQ, digest); in CryptEccValidateSignature()
816 E, ecQ, digest); in CryptEccValidateSignature()
821 retVal = BnValidateSignatureEcSm2(bnR, bnS, E, ecQ, digest); in CryptEccValidateSignature()
/external/ms-tpm-20-ref/TPMCmd/tpm/include/prototypes/
DCryptEccSignature_fp.h93 bn_point_t *ecQ, // IN: the public point of the key
DCryptEccMain_fp.h278 bn_point_t *ecQ, // OUT: public point