Home
last modified time | relevance | path

Searched refs:t1 (Results 1 – 23 of 23) sorted by relevance

/hal_espressif-latest/components/newlib/port/riscv/
Dport_stdatomic.S21 ALIGNED_PTR_2 t0, t1
23 srl t4, t2, t1
33 ALIGNED_PTR_2 t0, t1
35 sll t6, t6, t1
37 sll t5, a1, t1 // t5 - shifted new value to easy place into aligned memory
51 ALIGNED_PTR_2 t0, t1
53 sll t6, t6, t1
55 sll t5, a1, t1 // t5 - shifted new value to easy place into aligned memory
62 srl t4, t2, t1
72 ALIGNED_PTR_2 t0, t1
[all …]
/hal_espressif-latest/components/esp_hw_support/
Dsleep_cpu_asm.S52 sw t1, RV_SLP_CTX_T1(t0)
85 csrr t1, mstatus
86 sw t1, RV_SLP_CTX_MSTATUS(t0)
92 csrr t1, mtval
93 sw t1, RV_SLP_CTX_MTVAL(t0)
98 csrr t1, mepc
99 sw t1, RV_SLP_CTX_MEPC(t0)
108 li t1, ~0x3
110 and t2, t1, t2
121 li t1, 0x10
[all …]
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Dp_256_ecc_pp.c52 DWORD t1[KEY_LENGTH_DWORDS_P256]; in ECC_Double() local
70 multiprecision_mersenns_squa_mod(t1, z1, keyLength); // t1=z1^2 in ECC_Double()
71 multiprecision_sub_mod(t2, x1, t1, keyLength); // t2=x1-t1 in ECC_Double()
72 multiprecision_add_mod(t1, x1, t1, keyLength); // t1=x1+t1 in ECC_Double()
73 multiprecision_mersenns_mult_mod(t2, t1, t2, keyLength); // t2=t2*t1 in ECC_Double()
88 multiprecision_lshift_mod(t1, t3, keyLength); // t1=2t3 in ECC_Double()
89 multiprecision_sub_mod(x3, x3, t1, keyLength); // x3=x3-t1 in ECC_Double()
90 multiprecision_sub_mod(t1, t3, x3, keyLength); // t1=t3-x3 in ECC_Double()
91 multiprecision_mersenns_mult_mod(t1, t1, t2, keyLength); // t1=t1*t2 in ECC_Double()
92 multiprecision_sub_mod(y3, t1, y3, keyLength); // y3=t1-y3 in ECC_Double()
[all …]
Daes.c538 uint_8t tt, t0, t1, t2, t3; local
541 t1 = ctx->ksch[cc - 3];
546 t0 = s_box(t1) ^ rc;
547 t1 = s_box(t2);
553 t1 = s_box(t1);
559 ctx->ksch[cc + 1] = ctx->ksch[tt + 1] ^ t1;
/hal_espressif-latest/components/esp_system/port/arch/riscv/
Dexpression_with_stack_asm.S22 mv t1, ra
31 sw t1, 4(sp)
38 lw t1, 4(sp)
42 mv ra, t1
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/
Dsha256.c185 unsigned int t1, t2; in compress() local
195 t1 = work_space[i] = n; in compress()
196 t1 += h + Sigma1(e) + Ch(e, f, g) + k256[i]; in compress()
198 h = g; g = f; f = e; e = d + t1; in compress()
199 d = c; c = b; b = a; a = t1 + t2; in compress()
208 t1 = work_space[i&0xf] += s0 + s1 + work_space[(i+9)&0xf]; in compress()
209 t1 += h + Sigma1(e) + Ch(e, f, g) + k256[i]; in compress()
211 h = g; g = f; f = e; e = d + t1; in compress()
212 d = c; c = b; b = a; a = t1 + t2; in compress()
Decc.c630 uECC_word_t t1[NUM_ECC_WORDS]; in apply_z() local
632 uECC_vli_modSquare_fast(t1, Z, curve); /* z^2 */ in apply_z()
633 uECC_vli_modMult_fast(X1, X1, t1, curve); /* x1 * z^2 */ in apply_z()
634 uECC_vli_modMult_fast(t1, t1, Z, curve); /* z^3 */ in apply_z()
635 uECC_vli_modMult_fast(Y1, Y1, t1, curve); /* y1 * z^3 */ in apply_z()
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/
Dsha256.c185 unsigned int t1, t2; in compress() local
195 t1 = work_space[i] = n; in compress()
196 t1 += h + Sigma1(e) + Ch(e, f, g) + k256[i]; in compress()
198 h = g; g = f; f = e; e = d + t1; in compress()
199 d = c; c = b; b = a; a = t1 + t2; in compress()
208 t1 = work_space[i & 0xf] += s0 + s1 + work_space[(i + 9) & 0xf]; in compress()
209 t1 += h + Sigma1(e) + Ch(e, f, g) + k256[i]; in compress()
211 h = g; g = f; f = e; e = d + t1; in compress()
212 d = c; c = b; b = a; a = t1 + t2; in compress()
Decc.c629 uECC_word_t t1[NUM_ECC_WORDS]; in apply_z() local
631 uECC_vli_modSquare_fast(t1, Z, curve); /* z^2 */ in apply_z()
632 uECC_vli_modMult_fast(X1, X1, t1, curve); /* x1 * z^2 */ in apply_z()
633 uECC_vli_modMult_fast(t1, t1, Z, curve); /* z^3 */ in apply_z()
634 uECC_vli_modMult_fast(Y1, Y1, t1, curve); /* y1 * z^3 */ in apply_z()
/hal_espressif-latest/components/wpa_supplicant/src/crypto/
Daes-internal-enc.c25 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local
87 s0 = TE41(t0) ^ TE42(t1) ^ TE43(t2) ^ TE44(t3) ^ rk[0]; in rijndaelEncrypt()
89 s1 = TE41(t1) ^ TE42(t2) ^ TE43(t3) ^ TE44(t0) ^ rk[1]; in rijndaelEncrypt()
91 s2 = TE41(t2) ^ TE42(t3) ^ TE43(t0) ^ TE44(t1) ^ rk[2]; in rijndaelEncrypt()
93 s3 = TE41(t3) ^ TE42(t0) ^ TE43(t1) ^ TE44(t2) ^ rk[3]; in rijndaelEncrypt()
Daes-internal-dec.c78 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelDecrypt() local
140 s0 = TD41(t0) ^ TD42(t3) ^ TD43(t2) ^ TD44(t1) ^ rk[0]; in rijndaelDecrypt()
142 s1 = TD41(t1) ^ TD42(t0) ^ TD43(t3) ^ TD44(t2) ^ rk[1]; in rijndaelDecrypt()
144 s2 = TD41(t2) ^ TD42(t1) ^ TD43(t0) ^ TD44(t3) ^ rk[2]; in rijndaelDecrypt()
146 s3 = TD41(t3) ^ TD42(t2) ^ TD43(t1) ^ TD44(t0) ^ rk[3]; in rijndaelDecrypt()
Dsha256-internal.c86 u32 S[8], W[64], t0, t1; in sha256_compress() local
108 t1 = Sigma0(a) + Maj(a, b, c); \ in sha256_compress()
110 h = t0 + t1; in sha256_compress()
Dsha512-internal.c112 u64 S[8], t0, t1; in sha512_compress() local
138 t1 = Sigma0(S[0]) + Maj(S[0], S[1], S[2]); in sha512_compress()
146 S[0] = t0 + t1; in sha512_compress()
/hal_espressif-latest/components/riscv/
Dvectors.S28 sw t1, RV_STK_T1(sp)
68 lw t1, RV_STK_T1(sp)
246 and t1, s1, t2 /* t1 = mcause & mask */
247 slli t1, t1, 2 /* t1 = mcause * 4 */
249 add t1, t2, t1 /* t1 = INTC_INT_PRIO_REG + 4 * mcause */
250 lw t2, 0(t1) /* t2 = INTC_INT_PRIO_REG[mcause] */
/hal_espressif-latest/components/mbedtls/port/sha/dma/
Dsha.c148 uint8_t t0, t1, t2, t_len; in esp_sha_512_t_init_hash() local
160 t1 = (t / 10) % 10; in esp_sha_512_t_init_hash()
162 (((0x30 + t1) << 24))); in esp_sha_512_t_init_hash()
166 t1 = (t / 10) % 10; in esp_sha_512_t_init_hash()
169 (((0x30 + t1) << 16) + ((0x30 + t2) << 24))); in esp_sha_512_t_init_hash()
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dsae.c578 struct crypto_bignum *a, *u2, *t1, *t2, *z, *t, *zero, *one, *two, *three, in sswu() local
601 t1 = crypto_bignum_init(); in sswu()
615 if (!u2 || !t1 || !t2 || !z || !t || !zero || !one || !two || !three || in sswu()
630 crypto_bignum_mulmod(z, u2, prime, t1) < 0 || in sswu()
631 crypto_bignum_sqrmod(t1, prime, t2) < 0 || in sswu()
632 crypto_bignum_addmod(t1, t2, prime, t1) < 0) in sswu()
634 debug_print_bignum("SSWU: m", t1, prime_len); in sswu()
640 m_is_zero = const_time_eq(crypto_bignum_is_zero(t1), 1); in sswu()
643 crypto_bignum_exptmod(t1, t2, prime, t) < 0) in sswu()
648 if (crypto_bignum_mulmod(z, a, prime, t1) < 0 || in sswu()
[all …]
/hal_espressif-latest/tools/esptool_py/test/secure_images/
Drsa_secure_boot_signing_key3.pem9 RSR3qxR20qfi97IauCRffEg38h/t1++YNKGAlM8Nsr7rMr+zfvYygSZ0aV9P1CqN
/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dlibtommath.h1717 mp_int q, x, y, t1, t2; in mp_div() local
1743 if ((res = mp_init (&t1)) != MP_OKAY) { in mp_div()
1826 mp_zero (&t1); in mp_div()
1827 t1.dp[0] = (t - 1 < 0) ? 0 : y.dp[t - 1]; in mp_div()
1828 t1.dp[1] = y.dp[t]; in mp_div()
1829 t1.used = 2; in mp_div()
1830 if ((res = mp_mul_d (&t1, q.dp[i - t - 1], &t1)) != MP_OKAY) { in mp_div()
1839 } while (mp_cmp_mag(&t1, &t2) == MP_GT); in mp_div()
1842 if ((res = mp_mul_d (&y, q.dp[i - t - 1], &t1)) != MP_OKAY) { in mp_div()
1846 if ((res = mp_lshd (&t1, i - t - 1)) != MP_OKAY) { in mp_div()
[all …]
/hal_espressif-latest/components/riscv/include/riscv/
Drvruntime-frames.h52 STRUCT_FIELD (long, 4, RV_STK_T1, t1) /* t1-2: Temporaries */
Drvsleep-frames.h54 STRUCT_FIELD (long, 4, RV_SLP_CTX_T1, t1) /* t1-2: Temporaries */
/hal_espressif-latest/components/bt/host/bluedroid/stack/rfcomm/include/
Drfc_int.h92 UINT8 t1; member
/hal_espressif-latest/components/esp_wifi/include/
Desp_wifi_types.h1033 uint64_t t1; /**< Time of departure of FTM frame from FTM Responder in pSec */ member
/hal_espressif-latest/components/bt/host/bluedroid/stack/rfcomm/
Drfc_ts_frames.c792 p_rx_frame->u.pn.t1 = *p_data++; in rfc_process_mx_message()