/freebsd/crypto/libecc/src/examples/basic/ |
H A D | curve_basic_examples.c | 222 ret = prj_pt_mul_blind(&TMP, &(curve_params.ec_gen_order), &A); EG(ret, err); in check_curve() 238 ret = prj_pt_mul_blind(&TMP, &(curve_params.ec_gen_order), &B); EG(ret, err); in check_curve() 254 ret = prj_pt_mul_blind(&TMP, &(curve_params.ec_gen_order), &C); EG(ret, err); in check_curve() 270 ret = prj_pt_mul_blind(&TMP, &(curve_params.ec_gen_order), &D); EG(ret, err); in check_curve() 331 ret = prj_pt_mul_blind(&TMP, &nn_k, &A); EG(ret, err); in check_curve()
|
/freebsd/crypto/libecc/src/ecdh/ |
H A D | ecccdh.c | 80 ret = prj_pt_mul_blind(&(out_pub->y), &(in_priv->x), G); EG(ret, err); in ecccdh_init_pub_key() 207 ret = prj_pt_mul_blind(Q, &(our_priv_key->x), Q); EG(ret, err); in ecccdh_derive_secret()
|
H A D | x25519_448.c | 266 ret = prj_pt_mul_blind(&Q, &scalar, &Q); EG(ret, err); in x25519_448_core()
|
/freebsd/crypto/libecc/include/libecc/curves/ |
H A D | prj_pt.h | 62 ATTRIBUTE_WARN_UNUSED_RET int prj_pt_mul_blind(prj_pt_t out, nn_src_t m, prj_pt_src_t in);
|
/freebsd/crypto/libecc/src/sig/ |
H A D | ecsdsa_common.c | 51 ret = prj_pt_mul_blind(&(out_pub->y), &(in_priv->x), G); EG(ret, err); in __ecsdsa_init_pub_key() 195 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in __ecsdsa_sign_init()
|
H A D | ecrdsa.c | 91 ret = prj_pt_mul_blind(&(out_pub->y), &(in_priv->x), G); EG(ret, err); in ecrdsa_init_pub_key() 276 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in _ecrdsa_sign_finalize()
|
H A D | ecgdsa.c | 57 ret = prj_pt_mul_blind(&(out_pub->y), &xinv, G); EG(ret, err); in ecgdsa_init_pub_key() 298 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in _ecgdsa_sign_finalize()
|
H A D | sm2.c | 84 ret = prj_pt_mul_blind(&(out_pub->y), &(in_priv->x), G); EG(ret, err); in sm2_init_pub_key() 383 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in _sm2_sign_finalize()
|
H A D | eckcdsa.c | 63 ret = prj_pt_mul_blind(&(out_pub->y), &xinv, G); EG(ret, err); in eckcdsa_init_pub_key() 397 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in _eckcdsa_sign_finalize()
|
H A D | fuzzing_ecgdsa.c | 159 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in ecgdsa_sign_raw()
|
H A D | fuzzing_ecdsa.c | 160 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in ecdsa_sign_raw()
|
H A D | fuzzing_ecrdsa.c | 162 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in ecrdsa_sign_raw()
|
H A D | bign_common.c | 366 ret = prj_pt_mul_blind(&(out_pub->y), &(in_priv->x), G); EG(ret, err); in __bign_init_pub_key() 617 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in __bign_sign_finalize()
|
H A D | ecdsa_common.c | 193 ret = prj_pt_mul_blind(&(out_pub->y), &(in_priv->x), G); EG(ret, err); in __ecdsa_init_pub_key() 477 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in __ecdsa_sign_finalize()
|
H A D | ecfsdsa.c | 51 ret = prj_pt_mul_blind(&(out_pub->y), &(in_priv->x), G); EG(ret, err); in ecfsdsa_init_pub_key() 178 ret = prj_pt_mul_blind(&kG, k, G); EG(ret, err); in _ecfsdsa_sign_init()
|
H A D | eddsa.c | 846 ret = prj_pt_mul_blind(&(out_pub->y), &s, G); EG(ret, err); in eddsa_init_pub_key() 1406 ret = prj_pt_mul_blind(&R, &r_tmp, G); 1426 ret = prj_pt_mul_blind(&R, &r_tmp, G); EG(ret, err2); 1754 ret = prj_pt_mul_blind(&R, &r_tmp, G); 1774 ret = prj_pt_mul_blind(&R, &r_tmp, G); EG(ret, err2);
|
H A D | bip0340.c | 122 ret = prj_pt_mul_blind(&(out_pub->y), &(in_priv->x), G); EG(ret, err); in bip0340_init_pub_key() 299 ret = prj_pt_mul_blind(&kG, &k, G); EG(ret, err); in _bip0340_sign()
|
/freebsd/crypto/libecc/src/curves/ |
H A D | prj_pt.c | 1782 int prj_pt_mul_blind(prj_pt_t out, nn_src_t m, prj_pt_src_t in) in prj_pt_mul_blind() function 1929 ret = prj_pt_mul_blind(&res, in_isorder, in_shortw); EG(ret, err); in check_prj_pt_order()
|
/freebsd/crypto/libecc/src/tests/ |
H A D | ec_utils.c | 1486 ret = prj_pt_mul_blind(&Q, &d, &Q); EG(ret, err); in ec_scalar_mult()
|