Lines Matching full:curve

46 /* Returns curv25519 curve param */
583 * Handbook of Elliptic and Hyperelliptic Curve Cryptography.
933 const struct ecc_curve *curve) in vli_mmod_fast() argument
936 const u64 *curve_prime = curve->p; in vli_mmod_fast()
937 const unsigned int ndigits = curve->g.ndigits; in vli_mmod_fast()
940 if (strncmp(curve->name, "nist_", 5) != 0) { in vli_mmod_fast()
975 * Assumes that mod is big enough curve order.
989 const struct ecc_curve *curve) in vli_mod_mult_fast() argument
993 vli_mult(product, left, right, curve->g.ndigits); in vli_mod_mult_fast()
994 vli_mmod_fast(result, product, curve); in vli_mod_mult_fast()
999 const struct ecc_curve *curve) in vli_mod_square_fast() argument
1003 vli_square(product, left, curve->g.ndigits); in vli_mod_square_fast()
1004 vli_mmod_fast(result, product, curve); in vli_mod_square_fast()
1103 const struct ecc_curve *curve) in ecc_point_double_jacobian() argument
1108 const u64 *curve_prime = curve->p; in ecc_point_double_jacobian()
1109 const unsigned int ndigits = curve->g.ndigits; in ecc_point_double_jacobian()
1115 vli_mod_square_fast(t4, y1, curve); in ecc_point_double_jacobian()
1117 vli_mod_mult_fast(t5, x1, t4, curve); in ecc_point_double_jacobian()
1119 vli_mod_square_fast(t4, t4, curve); in ecc_point_double_jacobian()
1121 vli_mod_mult_fast(y1, y1, z1, curve); in ecc_point_double_jacobian()
1123 vli_mod_square_fast(z1, z1, curve); in ecc_point_double_jacobian()
1132 vli_mod_mult_fast(x1, x1, z1, curve); in ecc_point_double_jacobian()
1149 vli_mod_square_fast(z1, x1, curve); in ecc_point_double_jacobian()
1157 vli_mod_mult_fast(x1, x1, t5, curve); in ecc_point_double_jacobian()
1167 static void apply_z(u64 *x1, u64 *y1, u64 *z, const struct ecc_curve *curve) in apply_z() argument
1171 vli_mod_square_fast(t1, z, curve); /* z^2 */ in apply_z()
1172 vli_mod_mult_fast(x1, x1, t1, curve); /* x1 * z^2 */ in apply_z()
1173 vli_mod_mult_fast(t1, t1, z, curve); /* z^3 */ in apply_z()
1174 vli_mod_mult_fast(y1, y1, t1, curve); /* y1 * z^3 */ in apply_z()
1179 u64 *p_initial_z, const struct ecc_curve *curve) in xycz_initial_double() argument
1182 const unsigned int ndigits = curve->g.ndigits; in xycz_initial_double()
1193 apply_z(x1, y1, z, curve); in xycz_initial_double()
1195 ecc_point_double_jacobian(x1, y1, z, curve); in xycz_initial_double()
1197 apply_z(x2, y2, z, curve); in xycz_initial_double()
1205 const struct ecc_curve *curve) in xycz_add() argument
1209 const u64 *curve_prime = curve->p; in xycz_add()
1210 const unsigned int ndigits = curve->g.ndigits; in xycz_add()
1215 vli_mod_square_fast(t5, t5, curve); in xycz_add()
1217 vli_mod_mult_fast(x1, x1, t5, curve); in xycz_add()
1219 vli_mod_mult_fast(x2, x2, t5, curve); in xycz_add()
1223 vli_mod_square_fast(t5, y2, curve); in xycz_add()
1232 vli_mod_mult_fast(y1, y1, x2, curve); in xycz_add()
1236 vli_mod_mult_fast(y2, y2, x2, curve); in xycz_add()
1248 const struct ecc_curve *curve) in xycz_add_c() argument
1254 const u64 *curve_prime = curve->p; in xycz_add_c()
1255 const unsigned int ndigits = curve->g.ndigits; in xycz_add_c()
1260 vli_mod_square_fast(t5, t5, curve); in xycz_add_c()
1262 vli_mod_mult_fast(x1, x1, t5, curve); in xycz_add_c()
1264 vli_mod_mult_fast(x2, x2, t5, curve); in xycz_add_c()
1273 vli_mod_mult_fast(y1, y1, t6, curve); in xycz_add_c()
1277 vli_mod_square_fast(x2, y2, curve); in xycz_add_c()
1284 vli_mod_mult_fast(y2, y2, t7, curve); in xycz_add_c()
1289 vli_mod_square_fast(t7, t5, curve); in xycz_add_c()
1295 vli_mod_mult_fast(t6, t6, t5, curve); in xycz_add_c()
1304 u64 *initial_z, const struct ecc_curve *curve, in ecc_point_mult() argument
1312 u64 *curve_prime = curve->p; in ecc_point_mult()
1317 carry = vli_add(sk[0], scalar, curve->n, ndigits); in ecc_point_mult()
1318 vli_add(sk[1], sk[0], curve->n, ndigits); in ecc_point_mult()
1325 xycz_initial_double(rx[1], ry[1], rx[0], ry[0], initial_z, curve); in ecc_point_mult()
1329 xycz_add_c(rx[1 - nb], ry[1 - nb], rx[nb], ry[nb], curve); in ecc_point_mult()
1330 xycz_add(rx[nb], ry[nb], rx[1 - nb], ry[1 - nb], curve); in ecc_point_mult()
1334 xycz_add_c(rx[1 - nb], ry[1 - nb], rx[nb], ry[nb], curve); in ecc_point_mult()
1340 vli_mod_mult_fast(z, z, ry[1 - nb], curve); in ecc_point_mult()
1342 vli_mod_mult_fast(z, z, point->x, curve); in ecc_point_mult()
1348 vli_mod_mult_fast(z, z, point->y, curve); in ecc_point_mult()
1350 vli_mod_mult_fast(z, z, rx[1 - nb], curve); in ecc_point_mult()
1353 xycz_add(rx[nb], ry[nb], rx[1 - nb], ry[1 - nb], curve); in ecc_point_mult()
1355 apply_z(rx[0], ry[0], z, curve); in ecc_point_mult()
1364 const struct ecc_curve *curve) in ecc_point_add() argument
1369 unsigned int ndigits = curve->g.ndigits; in ecc_point_add()
1373 vli_mod_sub(z, result->x, p->x, curve->p, ndigits); in ecc_point_add()
1376 xycz_add(px, py, result->x, result->y, curve); in ecc_point_add()
1377 vli_mod_inv(z, z, curve->p, ndigits); in ecc_point_add()
1378 apply_z(result->x, result->y, z, curve); in ecc_point_add()
1387 const struct ecc_curve *curve) in ecc_point_mult_shamir() argument
1393 unsigned int ndigits = curve->g.ndigits; in ecc_point_mult_shamir()
1401 ecc_point_add(&sum, p, q, curve); in ecc_point_mult_shamir()
1419 ecc_point_double_jacobian(rx, ry, z, curve); in ecc_point_mult_shamir()
1430 apply_z(tx, ty, z, curve); in ecc_point_mult_shamir()
1431 vli_mod_sub(tz, rx, tx, curve->p, ndigits); in ecc_point_mult_shamir()
1432 xycz_add(tx, ty, rx, ry, curve); in ecc_point_mult_shamir()
1433 vli_mod_mult_fast(z, z, tz, curve); in ecc_point_mult_shamir()
1436 vli_mod_inv(z, z, curve->p, ndigits); in ecc_point_mult_shamir()
1437 apply_z(rx, ry, z, curve); in ecc_point_mult_shamir()
1441 static int __ecc_is_key_valid(const struct ecc_curve *curve, in __ecc_is_key_valid() argument
1450 if (curve->g.ndigits != ndigits) in __ecc_is_key_valid()
1456 vli_sub(res, curve->n, one, ndigits); in __ecc_is_key_valid()
1468 const struct ecc_curve *curve = ecc_get_curve(curve_id); in ecc_is_key_valid() local
1475 return __ecc_is_key_valid(curve, private_key, ndigits); in ecc_is_key_valid()
1493 const struct ecc_curve *curve = ecc_get_curve(curve_id); in ecc_gen_privkey() local
1496 unsigned int nbits = vli_num_bits(curve->n, ndigits); in ecc_gen_privkey()
1523 if (__ecc_is_key_valid(curve, priv, ndigits)) in ecc_gen_privkey()
1538 const struct ecc_curve *curve = ecc_get_curve(curve_id); in ecc_make_pub_key() local
1540 if (!private_key || !curve || ndigits > ARRAY_SIZE(priv)) { in ecc_make_pub_key()
1553 ecc_point_mult(pk, &curve->g, priv, NULL, curve, ndigits); in ecc_make_pub_key()
1556 if (ecc_is_pubkey_valid_full(curve, pk)) { in ecc_make_pub_key()
1572 int ecc_is_pubkey_valid_partial(const struct ecc_curve *curve, in ecc_is_pubkey_valid_partial() argument
1577 if (WARN_ON(pk->ndigits != curve->g.ndigits)) in ecc_is_pubkey_valid_partial()
1585 if (vli_cmp(curve->p, pk->x, pk->ndigits) != 1) in ecc_is_pubkey_valid_partial()
1587 if (vli_cmp(curve->p, pk->y, pk->ndigits) != 1) in ecc_is_pubkey_valid_partial()
1591 vli_mod_square_fast(yy, pk->y, curve); /* y^2 */ in ecc_is_pubkey_valid_partial()
1592 vli_mod_square_fast(xxx, pk->x, curve); /* x^2 */ in ecc_is_pubkey_valid_partial()
1593 vli_mod_mult_fast(xxx, xxx, pk->x, curve); /* x^3 */ in ecc_is_pubkey_valid_partial()
1594 vli_mod_mult_fast(w, curve->a, pk->x, curve); /* a·x */ in ecc_is_pubkey_valid_partial()
1595 vli_mod_add(w, w, curve->b, curve->p, pk->ndigits); /* a·x + b */ in ecc_is_pubkey_valid_partial()
1596 vli_mod_add(w, w, xxx, curve->p, pk->ndigits); /* x^3 + a·x + b */ in ecc_is_pubkey_valid_partial()
1605 int ecc_is_pubkey_valid_full(const struct ecc_curve *curve, in ecc_is_pubkey_valid_full() argument
1611 int ret = ecc_is_pubkey_valid_partial(curve, pk); in ecc_is_pubkey_valid_full()
1621 ecc_point_mult(nQ, pk, curve->n, NULL, curve, pk->ndigits); in ecc_is_pubkey_valid_full()
1640 const struct ecc_curve *curve = ecc_get_curve(curve_id); in crypto_ecdh_shared_secret() local
1642 if (!private_key || !public_key || !curve || in crypto_ecdh_shared_secret()
1660 ret = ecc_is_pubkey_valid_partial(curve, pk); in crypto_ecdh_shared_secret()
1672 ecc_point_mult(product, pk, priv, rand_z, curve, ndigits); in crypto_ecdh_shared_secret()