Home
last modified time | relevance | path

Searched refs:G (Results 1 – 18 of 18) sorted by relevance

/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Dp_256_curvepara.c60 ec->G.x[7] = 0x6b17d1f2; in p_256_init_curve()
61 ec->G.x[6] = 0xe12c4247; in p_256_init_curve()
62 ec->G.x[5] = 0xf8bce6e5; in p_256_init_curve()
63 ec->G.x[4] = 0x63a440f2; in p_256_init_curve()
64 ec->G.x[3] = 0x77037d81; in p_256_init_curve()
65 ec->G.x[2] = 0x2deb33a0; in p_256_init_curve()
66 ec->G.x[1] = 0xf4a13945; in p_256_init_curve()
67 ec->G.x[0] = 0xd898c296; in p_256_init_curve()
69 ec->G.y[7] = 0x4fe342e2; in p_256_init_curve()
70 ec->G.y[6] = 0xfe1a7f9b; in p_256_init_curve()
[all …]
Dp_256_multprecision.c363 DWORD G; in multiprecision_fast_mod_P256() local
392 G = a[10]; in multiprecision_fast_mod_P256()
393 G += a[11]; in multiprecision_fast_mod_P256()
394 UG = (G < a[11]); in multiprecision_fast_mod_P256()
453 c[2] += G; in multiprecision_fast_mod_P256()
454 U += (c[2] < G); in multiprecision_fast_mod_P256()
525 U -= (c[5] < G); in multiprecision_fast_mod_P256()
527 c[5] -= G; in multiprecision_fast_mod_P256()
Dsmp_keys.c1135 ECC_PointMult(&public_key, &(curve_p256.G), (DWORD *) private_key, KEY_LENGTH_DWORDS_P256); in smp_process_private_key()
/hal_espressif-latest/components/mbedtls/port/sha/parallel_engine/
Desp_sha512.c214 uint64_t A, B, C, D, E, F, G, H; in mbedtls_sha512_software_process() local
250 G = ctx->state[6]; in mbedtls_sha512_software_process()
255 P( A, B, C, D, E, F, G, H, W[i], K[i] ); i++; in mbedtls_sha512_software_process()
256 P( H, A, B, C, D, E, F, G, W[i], K[i] ); i++; in mbedtls_sha512_software_process()
257 P( G, H, A, B, C, D, E, F, W[i], K[i] ); i++; in mbedtls_sha512_software_process()
258 P( F, G, H, A, B, C, D, E, W[i], K[i] ); i++; in mbedtls_sha512_software_process()
259 P( E, F, G, H, A, B, C, D, W[i], K[i] ); i++; in mbedtls_sha512_software_process()
260 P( D, E, F, G, H, A, B, C, W[i], K[i] ); i++; in mbedtls_sha512_software_process()
261 P( C, D, E, F, G, H, A, B, W[i], K[i] ); i++; in mbedtls_sha512_software_process()
262 P( B, C, D, E, F, G, H, A, W[i], K[i] ); i++; in mbedtls_sha512_software_process()
[all …]
/hal_espressif-latest/components/bootloader/subproject/components/micro-ecc/
DuECC_verify_antifault.c80 uECC_vli_set(tx, curve->G, num_words); in uECC_verify_antifault()
81 uECC_vli_set(ty, curve->G + num_words, num_words); in uECC_verify_antifault()
89 points[1] = curve->G; in uECC_verify_antifault()
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/
Decc_dsa.c120 EccPoint_mult(p, curve->G, k2[!carry], 0, num_n_bits + 1, curve); in uECC_sign_with_k()
246 uECC_vli_set(tx, curve->G, num_words); in uECC_verify()
247 uECC_vli_set(ty, curve->G + num_words, num_words); in uECC_verify()
255 points[1] = curve->G; in uECC_verify()
Decc.c805 EccPoint_mult(result, curve->G, p2[!carry], 0, curve->num_n_bits + 1, curve); in EccPoint_compute_public_key()
901 if (uECC_vli_cmp_unsafe(_public, curve->G, NUM_ECC_WORDS * 2) == 0) { in uECC_valid_public_key()
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/
Decc_dsa.c120 EccPoint_mult(p, curve->G, k2[!carry], 0, num_n_bits + 1, curve); in uECC_sign_with_k()
245 uECC_vli_set(tx, curve->G, num_words); in uECC_verify()
246 uECC_vli_set(ty, curve->G + num_words, num_words); in uECC_verify()
254 points[1] = curve->G; in uECC_verify()
Decc.c804 EccPoint_mult(result, curve->G, p2[!carry], 0, curve->num_n_bits + 1, curve); in EccPoint_compute_public_key()
901 if (uECC_vli_cmp_unsafe(_public, curve->G, NUM_ECC_WORDS * 2) == 0) { in uECC_valid_public_key()
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/include/
Dp_256_ecc_pp.h53 Point G; member
/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dlibtommath.h131 static int s_mp_exptmod(mp_int * G, mp_int * X, mp_int * P, mp_int * Y, int redmode);
176 static int mp_exptmod_fast (mp_int * G, mp_int * X, mp_int * P, mp_int * Y, int redmode);
591 mp_exptmod (mp_int * G, mp_int * X, mp_int * P, mp_int * Y) in mp_exptmod() argument
615 if ((err = mp_invmod(G, P, &tmpG)) != MP_OKAY) { in mp_exptmod()
645 return s_mp_exptmod(G, X, P, Y, 1); in mp_exptmod()
664 return mp_exptmod_fast (G, X, P, Y, dr); in mp_exptmod()
669 return s_mp_exptmod (G, X, P, Y, 0); in mp_exptmod()
1908 s_mp_exptmod (mp_int * G, mp_int * X, mp_int * P, mp_int * Y, int redmode) in s_mp_exptmod() argument
1981 if ((err = mp_mod (G, P, &M[1])) != MP_OKAY) { in s_mp_exptmod()
2995 mp_exptmod_fast (mp_int * G, mp_int * X, mp_int * P, mp_int * Y, int redmode) in mp_exptmod_fast() argument
[all …]
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/include/tinycrypt/
Decc.h118 uECC_word_t G[NUM_ECC_WORDS * 2]; member
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/
Decc.h118 uECC_word_t G[NUM_ECC_WORDS * 2]; member
/hal_espressif-latest/tools/esptool_py/docs/en/esptool/
Dbasic-options.rst37 …``ls -l /dev/ttyUSB0`` to find the group) with a command like ``sudo usermod -a -G dialout $USER``.
/hal_espressif-latest/components/mbedtls/port/mbedtls_rom/
Dmbedtls_rom_osi.h121 int (*_rom_mbedtls_mpi_gcd)( mbedtls_mpi *G, const mbedtls_mpi *A, const mbedtls_mpi *B );
204 …int (*_rom_mbedtls_ecp_gen_keypair_base)( mbedtls_ecp_group *grp, const mbedtls_ecp_point *G, mbed…
473 int (*_rom_mbedtls_mpi_gcd)(mbedtls_mpi *G, const mbedtls_mpi *A, const mbedtls_mpi *B);
589 …int (*_rom_mbedtls_ecp_gen_keypair_base)(mbedtls_ecp_group *grp, const mbedtls_ecp_point *G, mbedt…
/hal_espressif-latest/components/mbedtls/esp_crt_bundle/
Dcacrt_all.pem1053 cSQy9sgL8rxq+JOssgfCX5/bzMiKqr5qb+FJEMwx14C7u8jYog5kV+qi9cKpMRXSIGrs/CIBKM+G
1101 MDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRlcmV2b2NhdGlvbmxpc3QwQ6BBoD+G
1967 DQEBCwUAA4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDIU5PM
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/bluedroid_host/
Dmesh_bearer_adapt.c1861 ECC_PointMult(&public_key, &(curve_p256.G), (DWORD *)private_key, KEY_LENGTH_DWORDS_P256); in bt_mesh_pub_key_get()
/hal_espressif-latest/components/newlib/
DCOPYING.NEWLIB174 (11) Christopher G. Demetriou
176 Copyright (c) 2001 Christopher G. Demetriou