Home
last modified time | relevance | path

Searched refs:a (Results 1 – 25 of 362) sorted by relevance

12345678910>>...15

/lib/zlib/
A Dadler32.c25 if (a >= (BASE << 16)) a -= (BASE << 16); \
26 if (a >= (BASE << 15)) a -= (BASE << 15); \
32 if (a >= (BASE << 9)) a -= (BASE << 9); \
33 if (a >= (BASE << 8)) a -= (BASE << 8); \
34 if (a >= (BASE << 7)) a -= (BASE << 7); \
35 if (a >= (BASE << 6)) a -= (BASE << 6); \
36 if (a >= (BASE << 5)) a -= (BASE << 5); \
41 if (a >= BASE) a -= BASE; \
49 if (a >= BASE) a -= BASE; \
52 # define MOD(a) a %= BASE argument
[all …]
/lib/mbedtls/external/mbedtls/3rdparty/everest/library/kremlib/
A DFStar_UInt128_extracted.c27 return (a ^ ((a ^ b) | ((a - b) ^ b))) >> (uint32_t)63U; in FStar_UInt128_constant_time_carry()
38 flat = { a.low + b.low, a.high + b.high + FStar_UInt128_carry(a.low + b.low, b.low) }; in FStar_UInt128_add()
60 flat = { a.low - b.low, a.high - b.high - FStar_UInt128_carry(a.low, a.low - b.low) }; in FStar_UInt128_sub()
68 flat = { a.low - b.low, a.high - b.high - FStar_UInt128_carry(a.low, a.low - b.low) }; in FStar_UInt128_sub_underspec()
76 flat = { a.low - b.low, a.high - b.high - FStar_UInt128_carry(a.low, a.low - b.low) }; in FStar_UInt128_sub_mod_impl()
131 flat = { a.low << s, FStar_UInt128_add_u64_shift_left_respec(a.high, a.low, s) }; in FStar_UInt128_shift_left_small()
201 return a.low == b.low && a.high == b.high; in FStar_UInt128_eq()
206 return a.high > b.high || (a.high == b.high && a.low > b.low); in FStar_UInt128_gt()
211 return a.high < b.high || (a.high == b.high && a.low < b.low); in FStar_UInt128_lt()
216 return a.high > b.high || (a.high == b.high && a.low >= b.low); in FStar_UInt128_gte()
[all …]
A DFStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.c13 uint64_t FStar_UInt64_eq_mask(uint64_t a, uint64_t b) in FStar_UInt64_eq_mask() argument
15 uint64_t x = a ^ b; in FStar_UInt64_eq_mask()
24 uint64_t x = a; in FStar_UInt64_gte_mask()
37 uint32_t x = a ^ b; in FStar_UInt32_eq_mask()
46 uint32_t x = a; in FStar_UInt32_gte_mask()
59 uint16_t x = a ^ b; in FStar_UInt16_eq_mask()
68 uint16_t x = a; in FStar_UInt16_gte_mask()
79 uint8_t FStar_UInt8_eq_mask(uint8_t a, uint8_t b) in FStar_UInt8_eq_mask() argument
81 uint8_t x = a ^ b; in FStar_UInt8_eq_mask()
88 uint8_t FStar_UInt8_gte_mask(uint8_t a, uint8_t b) in FStar_UInt8_gte_mask() argument
[all …]
/lib/lwip/lwip/src/include/netif/ppp/
A Dpppdebug.h58 #define MAINDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument
59 #define SYSDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument
60 #define FSMDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument
61 #define LCPDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument
62 #define IPCPDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument
63 #define IPV6CPDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument
64 #define UPAPDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument
65 #define CHAPDEBUG(a) LWIP_DEBUGF(LWIP_DBG_LEVEL_WARNING, a) argument
66 #define PPPDEBUG(a, b) LWIP_DEBUGF(a, b) argument
71 #define SYSDEBUG(a)
[all …]
/lib/
A Dmd5.c184 register __u32 a, b, c, d; in MD5Transform() local
186 a = buf[0]; in MD5Transform()
191 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in MD5Transform()
195 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in MD5Transform()
199 MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); in MD5Transform()
208 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in MD5Transform()
209 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in MD5Transform()
212 MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); in MD5Transform()
216 MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); in MD5Transform()
221 MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9); in MD5Transform()
[all …]
A Dlist_sort.c29 while (a && b) { in merge()
31 if ((*cmp)(priv, a, b) <= 0) { in merge()
32 tail->next = a; in merge()
33 a = a->next; in merge()
40 tail->next = a?:b; in merge()
59 while (a && b) { in merge_and_restore_back_links()
61 if ((*cmp)(priv, a, b) <= 0) { in merge_and_restore_back_links()
62 tail->next = a; in merge_and_restore_back_links()
63 a->prev = tail; in merge_and_restore_back_links()
64 a = a->next; in merge_and_restore_back_links()
[all …]
/lib/lwip/lwip/src/include/lwip/
A Dinet.h97 #define IN_CLASSA(a) IP_CLASSA(a) argument
121 #define IN_MULTICAST(a) IP_MULTICAST(a) argument
123 #define IN_EXPERIMENTAL(a) IP_EXPERIMENTAL(a) argument
124 #define IN_BADCLASS(a) IP_BADCLASS(a) argument
128 #define IN6_IS_ADDR_UNSPECIFIED(a) ip6_addr_isany((ip6_addr_t*)(a)) argument
129 #define IN6_IS_ADDR_LOOPBACK(a) ip6_addr_isloopback((ip6_addr_t*)(a)) argument
130 #define IN6_IS_ADDR_MULTICAST(a) ip6_addr_ismulticast((ip6_addr_t*)(a)) argument
131 #define IN6_IS_ADDR_LINKLOCAL(a) ip6_addr_islinklocal((ip6_addr_t*)(a)) argument
132 #define IN6_IS_ADDR_SITELOCAL(a) ip6_addr_issitelocal((ip6_addr_t*)(a)) argument
133 #define IN6_IS_ADDR_V4MAPPED(a) ip6_addr_isipv4mappedipv6((ip6_addr_t*)(a)) argument
[all …]
A Dip4_addr.h75 #define IP_CLASSA(a) ((((u32_t)(a)) & 0x80000000UL) == 0) argument
81 #define IP_CLASSB(a) ((((u32_t)(a)) & 0xc0000000UL) == 0x80000000UL) argument
87 #define IP_CLASSC(a) ((((u32_t)(a)) & 0xe0000000UL) == 0xc0000000UL) argument
92 #define IP_CLASSD(a) (((u32_t)(a) & 0xf0000000UL) == 0xe0000000UL) argument
96 #define IP_MULTICAST(a) IP_CLASSD(a) argument
98 #define IP_EXPERIMENTAL(a) (((u32_t)(a) & 0xf0000000UL) == 0xf0000000UL) argument
99 #define IP_BADCLASS(a) (((u32_t)(a) & 0xf0000000UL) == 0xf0000000UL) argument
104 #define IP4_ADDR(ipaddr, a,b,c,d) (ipaddr)->addr = PP_HTONL(LWIP_MAKEU32(a,b,c,d)) argument
169 #define ip4_addr_debug_print_parts(debug, a, b, c, d) \ argument
170 LWIP_DEBUGF(debug, ("%" U16_F ".%" U16_F ".%" U16_F ".%" U16_F, a, b, c, d))
/lib/mbedtls/external/mbedtls/tests/suites/
A Dtest_suite_common.function20 TEST_CALLOC(a, n + 1);
28 r1[i] = a[i] ^ b[i];
30 mbedtls_xor(r2, a, b, n);
33 /* Test r == a */
44 r1[i] = a[i] ^ r1[i];
46 mbedtls_xor(r2, a, r2, n);
49 /* Test a == b */
52 r1[i] = a[i] ^ a[i];
54 mbedtls_xor(r2, a, a, n);
57 /* Test a == b == r */
[all …]
A Dtest_suite_bignum_mod.function10 TEST_MEMORY_COMPARE((a).p, (a).limbs * sizeof(mbedtls_mpi_uint), \
301 /* a - b: alias x to a => Correct result */
312 /* a == b: alias a and b */
314 /* a - a => Correct result */
318 /* a - a: x, a, b all aliased together => Correct result */
369 /* a^-1: alias x to a => Correct result */
419 /* a^-1: alias x to a => Correct result */
505 /* a + b: alias x to a => Correct result */
516 /* a == b: alias a and b */
518 /* a + a => Correct result */
[all …]
/lib/mbedtls/external/mbedtls/3rdparty/everest/include/everest/kremlib/
A DFStar_UInt128.h29 FStar_UInt128_add_underspec(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b);
36 FStar_UInt128_sub_underspec(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b);
46 FStar_UInt128_uint128 FStar_UInt128_lognot(FStar_UInt128_uint128 a);
48 FStar_UInt128_uint128 FStar_UInt128_shift_left(FStar_UInt128_uint128 a, uint32_t s);
52 bool FStar_UInt128_eq(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b);
54 bool FStar_UInt128_gt(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b);
56 bool FStar_UInt128_lt(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b);
58 bool FStar_UInt128_gte(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b);
60 bool FStar_UInt128_lte(FStar_UInt128_uint128 a, FStar_UInt128_uint128 b);
66 FStar_UInt128_uint128 FStar_UInt128_uint64_to_uint128(uint64_t a);
[all …]
/lib/mbedtls/external/mbedtls/programs/
A DREADME.md20 …ey.c`](pkey/gen_key.c): generates a key for any of the supported public-key algorithms (RSA or ECC…
24 …app_writer.c`](pkey/key_app_writer.c): loads a PEM or DER public key or private key file and write…
26 …_decrypt.c`](pkey/pk_decrypt.c): loads a PEM or DER public/private key file and uses the key to en…
28 …y/pk_verify.c`](pkey/pk_verify.c): loads a PEM or DER private/public key file and uses the key to …
69 …nt.c): a minimalistic SSL client, which sends a short string and disconnects. This is primarily in…
71 * [`ssl/ssl_client1.c`](ssl/ssl_client1.c): a simple HTTPS client that sends a fixed request and di…
73 …](ssl/ssl_fork_server.c): a simple HTTPS server using one process per client to send a fixed respo…
77 …_pthread_server.c`](ssl/ssl_pthread_server.c): a simple HTTPS server using one thread per client t…
79 …l/ssl_server.c`](ssl/ssl_server.c): a simple HTTPS server that sends a fixed response. It serves a
111 * [`x509/cert_req.c`](x509/cert_req.c): generates a certificate signing request (CSR) for a private…
[all …]
/lib/mbedtls/external/mbedtls/tests/data_files/
A Ddh.optlen.pem5 80:0a:bf:e7:dc:66:7a:a1:7b:cd:7c:04:61:4b:c2:
6 21:a6:54:82:cc:c0:4b:60:46:02:b0:e1:31:90:8a:
7 93:8e:a1:1b:48:dc:51:5d:ab:7a:bc:bb:1e:0c:7f:
9 43:57:e1:c4:ea:07:a7:ce:1e:38:1a:2f:ca:fd:ff:
16 c8:75:5c:7a:46:8d:47:f5:6d:6d:b9:ea:01:29:24:
18 8e:e5:4e:eb:59:45:48:28:5f:06:a9:73:cb:be:2a:
19 0c:b0:2e:90:f3:23:fe:04:55:21:f3:4c:68:35:4a:
20 6d:3e:95:db:ff:f1:eb:64:69:2e:dc:0a:44:f3:d3:
25 b3:12:6a:ea:f4:71:53:c7:d6:7f:40:30:30:b2:92:
26 b5:bd:5a:6c:9e:ae:1c:13:7a:f3:40:87:fc:e2:a3:
[all …]
/lib/mbedtls/external/mbedtls/
A D.uncrustify.cfg82 # No space after a unary negation '-'
133 # No space after a pointer star
148 # Remove a space before a ';'
150 # (Uncrustify >= 0.73.0) Remove space before a semi in a non-empty for
157 # Add a space after a ';' (unless a comment follows)
159 # (Uncrustify >= 0.73.0) Add a space after a semi in non-empty for statements
167 # Must have at least 1 space after a comma
170 # Must not have a space before a comma
209 # Force exactly 1 space between a '}' and the name of a typedef if on the same line
222 # Remove newlines at the start of a file
[all …]
A DCONTRIBUTING.md12 - [Changelog](#documentation): if needed, please provide a changelog entry.
20 - The code should be secure, and will be reviewed from a security point of view as well.
22 Making a Contribution
24 …es) or [start a discussion](https://lists.trustedfirmware.org/mailman3/lists/mbed-tls.lists.truste…
25 … your changes. As a general rule, you should use the ["development" branch](https://github.com/Mbe…
26 1. Write a test which shows that the bug was fixed or that the feature works as expected.
39 … functions from the library which will be a breaking change in the API, but such changes will be m…
48 …orrect a defect that is also present in an LTS branch must be backported to that LTS branch. If a
49 1. If a contribution is a new feature or enhancement, no backporting is required. Exceptions to thi…
80 1. If needed, a Readme file is advised.
[all …]
/lib/mbedtls/external/mbedtls/library/
A Daesce.c410 #define vreinterpretq_u64_p64(a) ((uint64x2_t) a) argument
414 static inline poly128_t vmull_p64(poly64_t a, poly64_t b) in vmull_p64() argument
417 asm ("vmull.p64 %[r], %[a], %[b]" : [r] "=w" (r) : [a] "w" (a), [b] "w" (b) :); in vmull_p64()
470 #define vreinterpretq_p64_u8(a) ((poly64x2_t) a) argument
471 #define vreinterpretq_u8_p128(a) ((uint8x16_t) a) argument
473 static inline poly64x1_t vget_low_p64(poly64x2_t a) in vget_low_p64() argument
490 #define MBEDTLS_VMULL_P64(a, b) vmull_p64((poly64_t) a, (poly64_t) b) argument
495 #define MBEDTLS_VMULL_P64(a, b) vmull_p64(a, b) argument
511 vmull_high_p64(vreinterpretq_p64_u8(a), in pmull_high()
595 const unsigned char a[16], in mbedtls_aesce_gcm_mult()
[all …]
A Daria.c146 *a = ((uint32_t) sa[MBEDTLS_BYTE_0(*a)]) ^ in aria_sl()
277 uint32_t a, b, c, d; in aria_fo_xor() local
279 a = p[0] ^ k[0]; in aria_fo_xor()
285 aria_a(&a, &b, &c, &d); in aria_fo_xor()
287 r[0] = a ^ x[0]; in aria_fo_xor()
299 uint32_t a, b, c, d; in aria_fe_xor() local
301 a = p[0] ^ k[0]; in aria_fe_xor()
307 aria_a(&a, &b, &c, &d); in aria_fe_xor()
309 r[0] = a ^ x[0]; in aria_fe_xor()
447 uint32_t a, b, c, d; in mbedtls_aria_crypt_ecb() local
[all …]
/lib/mbedtls/external/mbedtls/docs/architecture/psa-migration/
A Dpsa-legacy-bridges.md155 Reasons for needing a PSA key object:
160a way to create a PSA key object from an `mbedtls_pk_context`. This partially exists in the form o…
162 #### Using a PSA key as a PK context
177 Gap: a way to copy a PSA key into a PK context. This can only be expected to work if the PSA key is…
247 #### API to create a PSA key from a PK context
277a key pair if the context contains a private key and the indicated usage is a private-key usage. T…
295 #### API to copy a PSA key to a PK context
297 Based on the [gap analysis](#using-a-psa-key-as-a-pk-context):
307 * It is an error if the key is neither a key pair nor a public key.
316 #### API to create a PK object that wraps a PSA key
[all …]
/lib/mbedtls/external/mbedtls/docs/proposed/
A Dpsa-driver-interface.md47 ### Deliverables for a driver
111 * If the mechanism involves a key:
181a capability of a driver, such as a cryptographic operation, a part of a cryptographic operation, …
213 Buffers of size 0 may be represented with either a null pointer or a non-null pointer.
319 1. If this step is passed via `psa_key_derivation_input_key()` for a key in a secure element:
804 * If a cryptographic operation involves a division by an integer which is provided as part of a key…
1080 * For a symmetric key (not a key pair or public key):
1303 ### Creating a key in a secure element
1310 To declare a volatile key:
1317 Generally speaking, to declare a key with a specified persistence:
[all …]
/lib/mbedtls/external/mbedtls/docs/architecture/
A Dmbed-crypto-storage-specification.md53 The layout of a key file is:
203 The layout of a key file is:
225 * The layout of a key file now has a lifetime field before the type field.
262 The layout of a key file is:
284 All currently existing transactions concern a key in a secure element.
290 * lifetime (4 bytes): `psa_key_lifetime_t` value that corresponds to a key in a secure element.
315 * The type field has been split into a type and a bits field of 2 bytes each.
321 The layout of a key file is:
412 The layout of a key file is:
448 All currently existing transactions concern a key in a dynamic secure element.
[all …]
A Dpsa-storage-resilience.md9 This document explores the problem space, defines a library design and a test design.
26 * `remove()` removes a file (returning a specific error code if the file does not exist).
56 For a secure element key, key management requires a commitment on both sites. For example, consider…
58 1. The core sends a request to the secure element to create a key.
67 Accomplishing a transaction across system boundaries is a well-known problem in database management…
71a key in a stateful secure element, a successful creation process goes as follows (see [“Key manag…
80 If there is a loss of power:
93 If there is a loss of power:
345 For a given key, we have to consider three a priori independent boolean states:
517 * Create a transaction list file with a certain content.
[all …]
/lib/lwip/lwip/contrib/apps/LwipMibCompiler/SharpSnmpLib/
A Dlicense.txt61 effectively restrict the users of a free program by obtaining a
74 a shared library, the combination of the two is legally speaking a
98 programs enables a greater number of people to use a large body of
131 copyright law: that is to say, a work containing the Library or a
158 You may charge a fee for the physical act of transferring a copy,
167 a) The modified work must itself be a software library.
175 d) If a facility in the modified Library refers to a function or a
225 the Library into a program that is not a library.
242 linked with it, is called a "work that uses the Library". Such a
272 link a "work that uses the Library" with the Library to produce a
[all …]
/lib/mbedtls/external/mbedtls/docs/architecture/testing/
A Ddriver-interface-test-strategy.md21a driver usable by Mbed TLS, the initialization code must call `psa_register_se_driver` with a str…
27 …rface unit tests could be covered by running the existing API tests with a key in a secure element.
34 * Make at least one failing call to `psa_register_se_driver` followed by a successful call.
42 * Make at least one test with a key that is not in a secure element that checks that the driver met…
43 * Make at least one test with a key in a secure element with a driver that does not have the requis…
44 * Make at least one test with a key in a secure element with a driver that does not have the substr…
48 Some methods only make sense as a group (for example a driver that provides the MAC methods must pr…
60 For each API function that leads to a driver call, call it with parameters that cause a driver to b…
64 * Expected errors (e.g. `PSA_ERROR_INVALID_SIGNATURE` from a signature verification method).
76 * Test that keys in a secure element survive `psa_close_key(); psa_open_key()`.
[all …]
/lib/lwip/lwip/src/netif/ppp/polarssl/
A Darc4.c50 int i, j, k, a; in arc4_setup() local
66 a = m[i]; in arc4_setup()
67 j = ( j + a + key[k] ) & 0xFF; in arc4_setup()
69 m[j] = (unsigned char) a; in arc4_setup()
78 int i, x, y, a, b; in arc4_crypt() local
87 x = ( x + 1 ) & 0xFF; a = m[x]; in arc4_crypt()
88 y = ( y + a ) & 0xFF; b = m[y]; in arc4_crypt()
91 m[y] = (unsigned char) a; in arc4_crypt()
94 ( buf[i] ^ m[(unsigned char)( a + b )] ); in arc4_crypt()
/lib/libavb/
A Davb_rsa.c92 A += (uint64_t)a[i] - key->n[i]; in subM()
93 a[i] = (uint32_t)A; in subM()
103 if (a[i] < key->n[i]) { in geM()
106 if (a[i] > key->n[i]) { in geM()
116 const uint32_t a, in montMulAdd() argument
118 uint64_t A = (uint64_t)a * b[0] + c[0]; in montMulAdd()
124 A = (A >> 32) + (uint64_t)a * b[i] + c[i]; in montMulAdd()
145 montMulAdd(key, c, a[i], b); in montMul()
169 a[i] = tmp; in modpowF4()
194 if (a != NULL) { in modpowF4()
[all …]

Completed in 71 milliseconds

12345678910>>...15