| /lib/zlib/ |
| A D | adler32.c | 25 if (a >= (BASE << 16)) a -= (BASE << 16); \ 26 if (a >= (BASE << 15)) a -= (BASE << 15); \ 32 if (a >= (BASE << 9)) a -= (BASE << 9); \ 33 if (a >= (BASE << 8)) a -= (BASE << 8); \ 34 if (a >= (BASE << 7)) a -= (BASE << 7); \ 35 if (a >= (BASE << 6)) a -= (BASE << 6); \ 36 if (a >= (BASE << 5)) a -= (BASE << 5); \ 41 if (a >= BASE) a -= BASE; \ 49 if (a >= BASE) a -= BASE; \ 52 # define MOD(a) a %= BASE argument [all …]
|
| /lib/mbedtls/external/mbedtls/3rdparty/everest/library/kremlib/ |
| A D | FStar_UInt128_extracted.c | 27 return (a ^ ((a ^ b) | ((a - b) ^ b))) >> (uint32_t)63U; in FStar_UInt128_constant_time_carry() 38 flat = { a.low + b.low, a.high + b.high + FStar_UInt128_carry(a.low + b.low, b.low) }; in FStar_UInt128_add() 60 flat = { a.low - b.low, a.high - b.high - FStar_UInt128_carry(a.low, a.low - b.low) }; in FStar_UInt128_sub() 68 flat = { a.low - b.low, a.high - b.high - FStar_UInt128_carry(a.low, a.low - b.low) }; in FStar_UInt128_sub_underspec() 76 flat = { a.low - b.low, a.high - b.high - FStar_UInt128_carry(a.low, a.low - b.low) }; in FStar_UInt128_sub_mod_impl() 131 flat = { a.low << s, FStar_UInt128_add_u64_shift_left_respec(a.high, a.low, s) }; in FStar_UInt128_shift_left_small() 201 return a.low == b.low && a.high == b.high; in FStar_UInt128_eq() 206 return a.high > b.high || (a.high == b.high && a.low > b.low); in FStar_UInt128_gt() 211 return a.high < b.high || (a.high == b.high && a.low < b.low); in FStar_UInt128_lt() 216 return a.high > b.high || (a.high == b.high && a.low >= b.low); in FStar_UInt128_gte() [all …]
|
| A D | FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.c | 13 uint64_t FStar_UInt64_eq_mask(uint64_t a, uint64_t b) in FStar_UInt64_eq_mask() argument 15 uint64_t x = a ^ b; in FStar_UInt64_eq_mask() 24 uint64_t x = a; in FStar_UInt64_gte_mask() 37 uint32_t x = a ^ b; in FStar_UInt32_eq_mask() 46 uint32_t x = a; in FStar_UInt32_gte_mask() 59 uint16_t x = a ^ b; in FStar_UInt16_eq_mask() 68 uint16_t x = a; in FStar_UInt16_gte_mask() 79 uint8_t FStar_UInt8_eq_mask(uint8_t a, uint8_t b) in FStar_UInt8_eq_mask() argument 81 uint8_t x = a ^ b; in FStar_UInt8_eq_mask() 88 uint8_t FStar_UInt8_gte_mask(uint8_t a, uint8_t b) in FStar_UInt8_gte_mask() argument [all …]
|
| /lib/lwip/lwip/src/include/netif/ppp/ |
| A D | pppdebug.h | 58 #define MAINDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument 59 #define SYSDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument 60 #define FSMDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument 61 #define LCPDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument 62 #define IPCPDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument 63 #define IPV6CPDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument 64 #define UPAPDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument 65 #define CHAPDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument 66 #define PPPDEBUG(a, b) LWIP_DEBUGF(a, b) argument 71 #define SYSDEBUG(a) [all …]
|
| /lib/ |
| A D | md5.c | 184 register __u32 a, b, c, d; in MD5Transform() local 186 a = buf[0]; in MD5Transform() 191 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in MD5Transform() 195 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in MD5Transform() 199 MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); in MD5Transform() 208 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in MD5Transform() 209 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in MD5Transform() 212 MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); in MD5Transform() 216 MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); in MD5Transform() 221 MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9); in MD5Transform() [all …]
|
| A D | list_sort.c | 29 while (a && b) { in merge() 31 if ((*cmp)(priv, a, b) <= 0) { in merge() 32 tail->next = a; in merge() 33 a = a->next; in merge() 40 tail->next = a?:b; in merge() 59 while (a && b) { in merge_and_restore_back_links() 61 if ((*cmp)(priv, a, b) <= 0) { in merge_and_restore_back_links() 62 tail->next = a; in merge_and_restore_back_links() 63 a->prev = tail; in merge_and_restore_back_links() 64 a = a->next; in merge_and_restore_back_links() [all …]
|
| /lib/lwip/lwip/src/include/lwip/ |
| A D | inet.h | 97 #define IN_CLASSA(a) IP_CLASSA(a) argument 121 #define IN_MULTICAST(a) IP_MULTICAST(a) argument 123 #define IN_EXPERIMENTAL(a) IP_EXPERIMENTAL(a) argument 124 #define IN_BADCLASS(a) IP_BADCLASS(a) argument 128 #define IN6_IS_ADDR_UNSPECIFIED(a) ip6_addr_isany((ip6_addr_t*)(a)) argument 129 #define IN6_IS_ADDR_LOOPBACK(a) ip6_addr_isloopback((ip6_addr_t*)(a)) argument 130 #define IN6_IS_ADDR_MULTICAST(a) ip6_addr_ismulticast((ip6_addr_t*)(a)) argument 131 #define IN6_IS_ADDR_LINKLOCAL(a) ip6_addr_islinklocal((ip6_addr_t*)(a)) argument 132 #define IN6_IS_ADDR_SITELOCAL(a) ip6_addr_issitelocal((ip6_addr_t*)(a)) argument 133 #define IN6_IS_ADDR_V4MAPPED(a) ip6_addr_isipv4mappedipv6((ip6_addr_t*)(a)) argument [all …]
|
| A D | ip4_addr.h | 75 #define IP_CLASSA(a) ((((u32_t)(a)) & 0x80000000UL) == 0) argument 81 #define IP_CLASSB(a) ((((u32_t)(a)) & 0xc0000000UL) == 0x80000000UL) argument 87 #define IP_CLASSC(a) ((((u32_t)(a)) & 0xe0000000UL) == 0xc0000000UL) argument 92 #define IP_CLASSD(a) (((u32_t)(a) & 0xf0000000UL) == 0xe0000000UL) argument 96 #define IP_MULTICAST(a) IP_CLASSD(a) argument 98 #define IP_EXPERIMENTAL(a) (((u32_t)(a) & 0xf0000000UL) == 0xf0000000UL) argument 99 #define IP_BADCLASS(a) (((u32_t)(a) & 0xf0000000UL) == 0xf0000000UL) argument 104 #define IP4_ADDR(ipaddr, a,b,c,d) (ipaddr)->addr = PP_HTONL(LWIP_MAKEU32(a,b,c,d)) argument 169 #define ip4_addr_debug_print_parts(debug, a, b, c, d) \ argument 170 LWIP_DEBUGF(debug, ("%" U16_F ".%" U16_F ".%" U16_F ".%" U16_F, a, b, c, d))
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_common.function | 20 TEST_CALLOC(a, n + 1); 28 r1[i] = a[i] ^ b[i]; 30 mbedtls_xor(r2, a, b, n); 33 /* Test r == a */ 44 r1[i] = a[i] ^ r1[i]; 46 mbedtls_xor(r2, a, r2, n); 49 /* Test a == b */ 52 r1[i] = a[i] ^ a[i]; 54 mbedtls_xor(r2, a, a, n); 57 /* Test a == b == r */ [all …]
|
| A D | test_suite_bignum_mod.function | 10 TEST_MEMORY_COMPARE((a).p, (a).limbs * sizeof(mbedtls_mpi_uint), \ 301 /* a - b: alias x to a => Correct result */ 312 /* a == b: alias a and b */ 314 /* a - a => Correct result */ 318 /* a - a: x, a, b all aliased together => Correct result */ 369 /* a^-1: alias x to a => Correct result */ 419 /* a^-1: alias x to a => Correct result */ 505 /* a + b: alias x to a => Correct result */ 516 /* a == b: alias a and b */ 518 /* a + a => Correct result */ [all …]
|
| /lib/mbedtls/external/mbedtls/3rdparty/everest/include/everest/kremlib/ |
| A D | FStar_UInt128.h | 29 FStar_UInt128_add_underspec(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b); 36 FStar_UInt128_sub_underspec(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b); 46 FStar_UInt128_uint128 FStar_UInt128_lognot(FStar_UInt128_uint128 a); 48 FStar_UInt128_uint128 FStar_UInt128_shift_left(FStar_UInt128_uint128 a, uint32_t s); 52 bool FStar_UInt128_eq(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b); 54 bool FStar_UInt128_gt(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b); 56 bool FStar_UInt128_lt(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b); 58 bool FStar_UInt128_gte(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b); 60 bool FStar_UInt128_lte(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b); 66 FStar_UInt128_uint128 FStar_UInt128_uint64_to_uint128(uint64_t a); [all …]
|
| /lib/mbedtls/external/mbedtls/programs/ |
| A D | README.md | 20 …ey.c`](pkey/gen_key.c): generates a key for any of the supported public-key algorithms (RSA or ECC… 24 …app_writer.c`](pkey/key_app_writer.c): loads a PEM or DER public key or private key file and write… 26 …_decrypt.c`](pkey/pk_decrypt.c): loads a PEM or DER public/private key file and uses the key to en… 28 …y/pk_verify.c`](pkey/pk_verify.c): loads a PEM or DER private/public key file and uses the key to … 69 …nt.c): a minimalistic SSL client, which sends a short string and disconnects. This is primarily in… 71 * [`ssl/ssl_client1.c`](ssl/ssl_client1.c): a simple HTTPS client that sends a fixed request and di… 73 …](ssl/ssl_fork_server.c): a simple HTTPS server using one process per client to send a fixed respo… 77 …_pthread_server.c`](ssl/ssl_pthread_server.c): a simple HTTPS server using one thread per client t… 79 …l/ssl_server.c`](ssl/ssl_server.c): a simple HTTPS server that sends a fixed response. It serves a… 111 * [`x509/cert_req.c`](x509/cert_req.c): generates a certificate signing request (CSR) for a private… [all …]
|
| /lib/mbedtls/external/mbedtls/tests/data_files/ |
| A D | dh.optlen.pem | 5 80:0a:bf:e7:dc:66:7a:a1:7b:cd:7c:04:61:4b:c2: 6 21:a6:54:82:cc:c0:4b:60:46:02:b0:e1:31:90:8a: 7 93:8e:a1:1b:48:dc:51:5d:ab:7a:bc:bb:1e:0c:7f: 9 43:57:e1:c4:ea:07:a7:ce:1e:38:1a:2f:ca:fd:ff: 16 c8:75:5c:7a:46:8d:47:f5:6d:6d:b9:ea:01:29:24: 18 8e:e5:4e:eb:59:45:48:28:5f:06:a9:73:cb:be:2a: 19 0c:b0:2e:90:f3:23:fe:04:55:21:f3:4c:68:35:4a: 20 6d:3e:95:db:ff:f1:eb:64:69:2e:dc:0a:44:f3:d3: 25 b3:12:6a:ea:f4:71:53:c7:d6:7f:40:30:30:b2:92: 26 b5:bd:5a:6c:9e:ae:1c:13:7a:f3:40:87:fc:e2:a3: [all …]
|
| /lib/mbedtls/external/mbedtls/ |
| A D | .uncrustify.cfg | 82 # No space after a unary negation '-' 133 # No space after a pointer star 148 # Remove a space before a ';' 150 # (Uncrustify >= 0.73.0) Remove space before a semi in a non-empty for 157 # Add a space after a ';' (unless a comment follows) 159 # (Uncrustify >= 0.73.0) Add a space after a semi in non-empty for statements 167 # Must have at least 1 space after a comma 170 # Must not have a space before a comma 209 # Force exactly 1 space between a '}' and the name of a typedef if on the same line 222 # Remove newlines at the start of a file [all …]
|
| A D | CONTRIBUTING.md | 12 - [Changelog](#documentation): if needed, please provide a changelog entry. 20 - The code should be secure, and will be reviewed from a security point of view as well. 22 Making a Contribution 24 …es) or [start a discussion](https://lists.trustedfirmware.org/mailman3/lists/mbed-tls.lists.truste… 25 … your changes. As a general rule, you should use the ["development" branch](https://github.com/Mbe… 26 1. Write a test which shows that the bug was fixed or that the feature works as expected. 39 … functions from the library which will be a breaking change in the API, but such changes will be m… 48 …orrect a defect that is also present in an LTS branch must be backported to that LTS branch. If a … 49 1. If a contribution is a new feature or enhancement, no backporting is required. Exceptions to thi… 80 1. If needed, a Readme file is advised. [all …]
|
| /lib/mbedtls/external/mbedtls/library/ |
| A D | aesce.c | 410 #define vreinterpretq_u64_p64(a) ((uint64x2_t) a) argument 414 static inline poly128_t vmull_p64(poly64_t a, poly64_t b) in vmull_p64() argument 417 asm ("vmull.p64 %[r], %[a], %[b]" : [r] "=w" (r) : [a] "w" (a), [b] "w" (b) :); in vmull_p64() 470 #define vreinterpretq_p64_u8(a) ((poly64x2_t) a) argument 471 #define vreinterpretq_u8_p128(a) ((uint8x16_t) a) argument 473 static inline poly64x1_t vget_low_p64(poly64x2_t a) in vget_low_p64() argument 490 #define MBEDTLS_VMULL_P64(a, b) vmull_p64((poly64_t) a, (poly64_t) b) argument 495 #define MBEDTLS_VMULL_P64(a, b) vmull_p64(a, b) argument 511 vmull_high_p64(vreinterpretq_p64_u8(a), in pmull_high() 595 const unsigned char a[16], in mbedtls_aesce_gcm_mult() [all …]
|
| A D | aria.c | 146 *a = ((uint32_t) sa[MBEDTLS_BYTE_0(*a)]) ^ in aria_sl() 277 uint32_t a, b, c, d; in aria_fo_xor() local 279 a = p[0] ^ k[0]; in aria_fo_xor() 285 aria_a(&a, &b, &c, &d); in aria_fo_xor() 287 r[0] = a ^ x[0]; in aria_fo_xor() 299 uint32_t a, b, c, d; in aria_fe_xor() local 301 a = p[0] ^ k[0]; in aria_fe_xor() 307 aria_a(&a, &b, &c, &d); in aria_fe_xor() 309 r[0] = a ^ x[0]; in aria_fe_xor() 447 uint32_t a, b, c, d; in mbedtls_aria_crypt_ecb() local [all …]
|
| /lib/mbedtls/external/mbedtls/docs/architecture/psa-migration/ |
| A D | psa-legacy-bridges.md | 155 Reasons for needing a PSA key object: 160 …a way to create a PSA key object from an `mbedtls_pk_context`. This partially exists in the form o… 162 #### Using a PSA key as a PK context 177 Gap: a way to copy a PSA key into a PK context. This can only be expected to work if the PSA key is… 247 #### API to create a PSA key from a PK context 277 …a key pair if the context contains a private key and the indicated usage is a private-key usage. T… 295 #### API to copy a PSA key to a PK context 297 Based on the [gap analysis](#using-a-psa-key-as-a-pk-context): 307 * It is an error if the key is neither a key pair nor a public key. 316 #### API to create a PK object that wraps a PSA key [all …]
|
| /lib/mbedtls/external/mbedtls/docs/proposed/ |
| A D | psa-driver-interface.md | 47 ### Deliverables for a driver 111 * If the mechanism involves a key: 181 …a capability of a driver, such as a cryptographic operation, a part of a cryptographic operation, … 213 Buffers of size 0 may be represented with either a null pointer or a non-null pointer. 319 1. If this step is passed via `psa_key_derivation_input_key()` for a key in a secure element: 804 * If a cryptographic operation involves a division by an integer which is provided as part of a key… 1080 * For a symmetric key (not a key pair or public key): 1303 ### Creating a key in a secure element 1310 To declare a volatile key: 1317 Generally speaking, to declare a key with a specified persistence: [all …]
|
| /lib/mbedtls/external/mbedtls/docs/architecture/ |
| A D | mbed-crypto-storage-specification.md | 53 The layout of a key file is: 203 The layout of a key file is: 225 * The layout of a key file now has a lifetime field before the type field. 262 The layout of a key file is: 284 All currently existing transactions concern a key in a secure element. 290 * lifetime (4 bytes): `psa_key_lifetime_t` value that corresponds to a key in a secure element. 315 * The type field has been split into a type and a bits field of 2 bytes each. 321 The layout of a key file is: 412 The layout of a key file is: 448 All currently existing transactions concern a key in a dynamic secure element. [all …]
|
| A D | psa-storage-resilience.md | 9 This document explores the problem space, defines a library design and a test design. 26 * `remove()` removes a file (returning a specific error code if the file does not exist). 56 For a secure element key, key management requires a commitment on both sites. For example, consider… 58 1. The core sends a request to the secure element to create a key. 67 Accomplishing a transaction across system boundaries is a well-known problem in database management… 71 …a key in a stateful secure element, a successful creation process goes as follows (see [“Key manag… 80 If there is a loss of power: 93 If there is a loss of power: 345 For a given key, we have to consider three a priori independent boolean states: 517 * Create a transaction list file with a certain content. [all …]
|
| /lib/lwip/lwip/contrib/apps/LwipMibCompiler/SharpSnmpLib/ |
| A D | license.txt | 61 effectively restrict the users of a free program by obtaining a 74 a shared library, the combination of the two is legally speaking a 98 programs enables a greater number of people to use a large body of 131 copyright law: that is to say, a work containing the Library or a 158 You may charge a fee for the physical act of transferring a copy, 167 a) The modified work must itself be a software library. 175 d) If a facility in the modified Library refers to a function or a 225 the Library into a program that is not a library. 242 linked with it, is called a "work that uses the Library". Such a 272 link a "work that uses the Library" with the Library to produce a [all …]
|
| /lib/mbedtls/external/mbedtls/docs/architecture/testing/ |
| A D | driver-interface-test-strategy.md | 21 …a driver usable by Mbed TLS, the initialization code must call `psa_register_se_driver` with a str… 27 …rface unit tests could be covered by running the existing API tests with a key in a secure element. 34 * Make at least one failing call to `psa_register_se_driver` followed by a successful call. 42 * Make at least one test with a key that is not in a secure element that checks that the driver met… 43 * Make at least one test with a key in a secure element with a driver that does not have the requis… 44 * Make at least one test with a key in a secure element with a driver that does not have the substr… 48 Some methods only make sense as a group (for example a driver that provides the MAC methods must pr… 60 For each API function that leads to a driver call, call it with parameters that cause a driver to b… 64 * Expected errors (e.g. `PSA_ERROR_INVALID_SIGNATURE` from a signature verification method). 76 * Test that keys in a secure element survive `psa_close_key(); psa_open_key()`. [all …]
|
| /lib/lwip/lwip/src/netif/ppp/polarssl/ |
| A D | arc4.c | 50 int i, j, k, a; in arc4_setup() local 66 a = m[i]; in arc4_setup() 67 j = ( j + a + key[k] ) & 0xFF; in arc4_setup() 69 m[j] = (unsigned char) a; in arc4_setup() 78 int i, x, y, a, b; in arc4_crypt() local 87 x = ( x + 1 ) & 0xFF; a = m[x]; in arc4_crypt() 88 y = ( y + a ) & 0xFF; b = m[y]; in arc4_crypt() 91 m[y] = (unsigned char) a; in arc4_crypt() 94 ( buf[i] ^ m[(unsigned char)( a + b )] ); in arc4_crypt()
|
| /lib/libavb/ |
| A D | avb_rsa.c | 92 A += (uint64_t)a[i] - key->n[i]; in subM() 93 a[i] = (uint32_t)A; in subM() 103 if (a[i] < key->n[i]) { in geM() 106 if (a[i] > key->n[i]) { in geM() 116 const uint32_t a, in montMulAdd() argument 118 uint64_t A = (uint64_t)a * b[0] + c[0]; in montMulAdd() 124 A = (A >> 32) + (uint64_t)a * b[i] + c[i]; in montMulAdd() 145 montMulAdd(key, c, a[i], b); in montMul() 169 a[i] = tmp; in modpowF4() 194 if (a != NULL) { in modpowF4() [all …]
|