/mbedtls-development/3rdparty/everest/library/ |
A D | Hacl_Curve25519.c | 38 b[0U] = b0_; in Hacl_Bignum_Modulo_carry_top() 91 output[0U] = tmp; in Hacl_Bignum_Fmul_shift_reduce() 92 b0 = output[0U]; in Hacl_Bignum_Fmul_shift_reduce() 139 b0 = t[0U]; in Hacl_Bignum_Fmul_fmul() 143 t[0U] = b0_; in Hacl_Bignum_Fmul_fmul() 172 tmp[0U] = s0; in Hacl_Bignum_Fsquare_fsquare__() 192 b0 = tmp[0U]; in Hacl_Bignum_Fsquare_fsquare_() 196 tmp[0U] = b0_; in Hacl_Bignum_Fsquare_fsquare_() 309 b0 = tmp[0U]; in Hacl_Bignum_fdifference() 742 e0 = e[0U]; in Hacl_Curve25519_crypto_scalarmult() [all …]
|
/mbedtls-development/3rdparty/everest/library/legacy/ |
A D | Hacl_Curve25519.c | 41 b[0U] = b0_; in Hacl_Bignum_Modulo_carry_top() 99 output[0U] = tmp; in Hacl_Bignum_Fmul_shift_reduce() 100 b0 = output[0U]; in Hacl_Bignum_Fmul_shift_reduce() 151 b0 = t[0U]; in Hacl_Bignum_Fmul_fmul() 158 t[0U] = b0_; in Hacl_Bignum_Fmul_fmul() 207 tmp[0U] = s0; in Hacl_Bignum_Fsquare_fsquare__() 227 b0 = tmp[0U]; in Hacl_Bignum_Fsquare_fsquare_() 234 tmp[0U] = b0_; in Hacl_Bignum_Fsquare_fsquare_() 351 b0 = tmp[0U]; in Hacl_Bignum_fdifference() 787 e0 = e[0U]; in Hacl_Curve25519_crypto_scalarmult() [all …]
|
/mbedtls-development/library/ |
A D | poly1305.c | 103 size_t offset = 0U; in poly1305_process() 292 ctx->acc[0] = 0U; in mbedtls_poly1305_starts() 293 ctx->acc[1] = 0U; in mbedtls_poly1305_starts() 294 ctx->acc[2] = 0U; in mbedtls_poly1305_starts() 295 ctx->acc[3] = 0U; in mbedtls_poly1305_starts() 296 ctx->acc[4] = 0U; in mbedtls_poly1305_starts() 300 ctx->queue_len = 0U; in mbedtls_poly1305_starts() 309 size_t offset = 0U; in mbedtls_poly1305_update() 316 if( ( remaining > 0U ) && ( ctx->queue_len > 0U ) ) in mbedtls_poly1305_update() 331 remaining = 0U; in mbedtls_poly1305_update() [all …]
|
A D | chachapoly.c | 63 if( partial_block_len == 0U ) in chachapoly_pad_aad() 83 if( partial_block_len == 0U ) in chachapoly_pad_ciphertext() 98 ctx->aad_len = 0U; in mbedtls_chachapoly_init() 99 ctx->ciphertext_len = 0U; in mbedtls_chachapoly_init() 111 ctx->aad_len = 0U; in mbedtls_chachapoly_free() 112 ctx->ciphertext_len = 0U; in mbedtls_chachapoly_free() 139 ret = mbedtls_chacha20_starts( &ctx->chacha20_ctx, nonce, 0U ); in mbedtls_chachapoly_starts() 158 ctx->aad_len = 0U; in mbedtls_chachapoly_starts() 159 ctx->ciphertext_len = 0U; in mbedtls_chachapoly_starts() 483 for( i = 0U; i < 1U; i++ ) in mbedtls_chachapoly_self_test()
|
A D | chacha20.c | 143 for( i = 0U; i < 10U; i++ ) in chacha20_block() 163 for( i = 0U; i < 16; i++ ) in chacha20_block() 245 size_t offset = 0U; in mbedtls_chacha20_update() 253 while( size > 0U && ctx->keystream_bytes_used < CHACHA20_BLOCK_SIZE_BYTES ) in mbedtls_chacha20_update() 270 for( i = 0U; i < 64U; i += 8U ) in mbedtls_chacha20_update() 287 if( size > 0U ) in mbedtls_chacha20_update() 293 for( i = 0U; i < size; i++) in mbedtls_chacha20_update() 371 0U, 529 for( i = 0U; i < 2U; i++ ) in mbedtls_chacha20_self_test()
|
A D | dhm.c | 103 mbedtls_mpi U; in dhm_check_range() local 106 mbedtls_mpi_init( &U ); in dhm_check_range() 108 MBEDTLS_MPI_CHK( mbedtls_mpi_sub_int( &U, P, 2 ) ); in dhm_check_range() 111 mbedtls_mpi_cmp_mpi( param, &U ) > 0 ) in dhm_check_range() 117 mbedtls_mpi_free( &U ); in dhm_check_range()
|
A D | bignum.c | 2222 mbedtls_mpi U; in mpi_montred() local 2224 U.n = U.s = (int) z; in mpi_montred() 2225 U.p = &z; in mpi_montred() 2227 mpi_montmul( A, &U, N, mm, T ); in mpi_montred() 3207 mbedtls_mpi A, E, N, X, Y, U, V; in mbedtls_mpi_self_test() local 3231 MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &U, 16, in mbedtls_mpi_self_test() 3243 if( mbedtls_mpi_cmp_mpi( &X, &U ) != 0 ) in mbedtls_mpi_self_test() 3257 MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &U, 16, in mbedtls_mpi_self_test() 3268 if( mbedtls_mpi_cmp_mpi( &X, &U ) != 0 || in mbedtls_mpi_self_test() 3291 if( mbedtls_mpi_cmp_mpi( &X, &U ) != 0 ) in mbedtls_mpi_self_test() [all …]
|
A D | ecp.c | 1367 mbedtls_mpi M, S, T, U; in ecp_double_jac() local 1369 mbedtls_mpi_init( &M ); mbedtls_mpi_init( &S ); mbedtls_mpi_init( &T ); mbedtls_mpi_init( &U ); in ecp_double_jac() 1377 MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &U, &P->X, &S ) ); in ecp_double_jac() 1378 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &T, &U ) ); in ecp_double_jac() 1405 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &U, &T, &T ) ); in ecp_double_jac() 1406 MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &U, 1 ) ); in ecp_double_jac() 1416 MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S, &S, &U ) ); in ecp_double_jac() 1419 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &U, &P->Y, &P->Z ) ); in ecp_double_jac() 1420 MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &U, 1 ) ); in ecp_double_jac() 1424 MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Z, &U ) ); in ecp_double_jac() [all …]
|
A D | cipher.c | 411 0U ) ) /* Initial counter value */ in mbedtls_cipher_set_iv()
|
/mbedtls-development/tests/suites/ |
A D | test_suite_chacha20.function | 23 TEST_ASSERT( key_str->len == 32U ); 24 TEST_ASSERT( nonce_str->len == 12U );
|
A D | test_suite_chachapoly.function | 31 TEST_ASSERT( memcmp( mac_str->x, mac, 16U ) == 0 );
|
A D | test_suite_psa_crypto.function | 34 static const size_t INVALID_EXPORT_LENGTH = ~0U;
|
/mbedtls-development/3rdparty/everest/library/kremlib/ |
A D | FStar_UInt128_extracted.c | 124 if (s == (uint32_t)0U) in FStar_UInt128_shift_left_small() 139 FStar_UInt128_uint128 flat = { (uint64_t)0U, a.low << (s - FStar_UInt128_u32_64) }; in FStar_UInt128_shift_left_large() 168 if (s == (uint32_t)0U) in FStar_UInt128_shift_right_small() 183 FStar_UInt128_uint128 flat = { a.high >> (s - FStar_UInt128_u32_64), (uint64_t)0U }; in FStar_UInt128_shift_right_large() 254 FStar_UInt128_uint128 flat = { a, (uint64_t)0U }; in FStar_UInt128_uint64_to_uint128()
|
/mbedtls-development/tests/data_files/ |
A D | server5.key | 2 MHcCAQEEIPEqEyB2AnCoPL/9U/YDHvdqXYbIogTywwyp6/UfDw6noAoGCCqGSM49
|
A D | crl-ec-sha1.pem | 9 56meWPhUekgLKKMAobt2oJJY6feuiFU2YFGs1aF0rV6Bj+U=
|
A D | server1.req.sha224 | 11 U/uUxLudP7sbuttRksIAREATT74Pa40bMWiPUlBfA/M2mFTmKb/91uXeIISW8DL3
|
A D | crl-malformed-trailing-spaces.pem | 9 56meWPhUekgLKKMAobt2oJJY6feuiFU2YFGs1aF0rV6Bj+U=
|
A D | rsa_pkcs1_4096_aes128.pem | 35 mxBF0HZKmHm6+U/oASjHeycUi2sXbzu60H+rSQjXVnCuFMubQ7LzJzNddmRc346O
|
/mbedtls-development/docs/proposed/ |
A D | psa-conditional-inclusion-c.md | 144 * (U) indicates a symbol that is defined by the user (application). 150 | `MBEDTLS_xxx_C` | `mbedtls/mbedtls_config.h` (U) or | `mbedtls/mbedtls_config.h` (U) … 152 | `PSA_WANT_xxx` | `psa/crypto_config.h` (U) | `mbedtls/config_psa.h` (D) …
|
/mbedtls-development/programs/test/ |
A D | benchmark.c | 904 TIME_AND_TSC( "ChaCha20", mbedtls_chacha20_crypt( buf, buf, 0U, BUFSIZE, buf, buf ) ); in main()
|