/hal_espressif-latest/components/newlib/port/riscv/ |
D | port_stdatomic.S | 21 ALIGNED_PTR_2 t0, t1 23 srl t4, t2, t1 33 ALIGNED_PTR_2 t0, t1 35 sll t6, t6, t1 37 sll t5, a1, t1 // t5 - shifted new value to easy place into aligned memory 51 ALIGNED_PTR_2 t0, t1 53 sll t6, t6, t1 55 sll t5, a1, t1 // t5 - shifted new value to easy place into aligned memory 62 srl t4, t2, t1 72 ALIGNED_PTR_2 t0, t1 [all …]
|
/hal_espressif-latest/components/esp_hw_support/ |
D | sleep_cpu_asm.S | 52 sw t1, RV_SLP_CTX_T1(t0) 85 csrr t1, mstatus 86 sw t1, RV_SLP_CTX_MSTATUS(t0) 92 csrr t1, mtval 93 sw t1, RV_SLP_CTX_MTVAL(t0) 98 csrr t1, mepc 99 sw t1, RV_SLP_CTX_MEPC(t0) 108 li t1, ~0x3 110 and t2, t1, t2 121 li t1, 0x10 [all …]
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
D | p_256_ecc_pp.c | 52 DWORD t1[KEY_LENGTH_DWORDS_P256]; in ECC_Double() local 70 multiprecision_mersenns_squa_mod(t1, z1, keyLength); // t1=z1^2 in ECC_Double() 71 multiprecision_sub_mod(t2, x1, t1, keyLength); // t2=x1-t1 in ECC_Double() 72 multiprecision_add_mod(t1, x1, t1, keyLength); // t1=x1+t1 in ECC_Double() 73 multiprecision_mersenns_mult_mod(t2, t1, t2, keyLength); // t2=t2*t1 in ECC_Double() 88 multiprecision_lshift_mod(t1, t3, keyLength); // t1=2t3 in ECC_Double() 89 multiprecision_sub_mod(x3, x3, t1, keyLength); // x3=x3-t1 in ECC_Double() 90 multiprecision_sub_mod(t1, t3, x3, keyLength); // t1=t3-x3 in ECC_Double() 91 multiprecision_mersenns_mult_mod(t1, t1, t2, keyLength); // t1=t1*t2 in ECC_Double() 92 multiprecision_sub_mod(y3, t1, y3, keyLength); // y3=t1-y3 in ECC_Double() [all …]
|
D | aes.c | 538 uint_8t tt, t0, t1, t2, t3; local 541 t1 = ctx->ksch[cc - 3]; 546 t0 = s_box(t1) ^ rc; 547 t1 = s_box(t2); 553 t1 = s_box(t1); 559 ctx->ksch[cc + 1] = ctx->ksch[tt + 1] ^ t1;
|
/hal_espressif-latest/components/esp_system/port/arch/riscv/ |
D | expression_with_stack_asm.S | 22 mv t1, ra 31 sw t1, 4(sp) 38 lw t1, 4(sp) 42 mv ra, t1
|
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/ |
D | sha256.c | 185 unsigned int t1, t2; in compress() local 195 t1 = work_space[i] = n; in compress() 196 t1 += h + Sigma1(e) + Ch(e, f, g) + k256[i]; in compress() 198 h = g; g = f; f = e; e = d + t1; in compress() 199 d = c; c = b; b = a; a = t1 + t2; in compress() 208 t1 = work_space[i&0xf] += s0 + s1 + work_space[(i+9)&0xf]; in compress() 209 t1 += h + Sigma1(e) + Ch(e, f, g) + k256[i]; in compress() 211 h = g; g = f; f = e; e = d + t1; in compress() 212 d = c; c = b; b = a; a = t1 + t2; in compress()
|
D | ecc.c | 630 uECC_word_t t1[NUM_ECC_WORDS]; in apply_z() local 632 uECC_vli_modSquare_fast(t1, Z, curve); /* z^2 */ in apply_z() 633 uECC_vli_modMult_fast(X1, X1, t1, curve); /* x1 * z^2 */ in apply_z() 634 uECC_vli_modMult_fast(t1, t1, Z, curve); /* z^3 */ in apply_z() 635 uECC_vli_modMult_fast(Y1, Y1, t1, curve); /* y1 * z^3 */ in apply_z()
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
D | sha256.c | 185 unsigned int t1, t2; in compress() local 195 t1 = work_space[i] = n; in compress() 196 t1 += h + Sigma1(e) + Ch(e, f, g) + k256[i]; in compress() 198 h = g; g = f; f = e; e = d + t1; in compress() 199 d = c; c = b; b = a; a = t1 + t2; in compress() 208 t1 = work_space[i & 0xf] += s0 + s1 + work_space[(i + 9) & 0xf]; in compress() 209 t1 += h + Sigma1(e) + Ch(e, f, g) + k256[i]; in compress() 211 h = g; g = f; f = e; e = d + t1; in compress() 212 d = c; c = b; b = a; a = t1 + t2; in compress()
|
D | ecc.c | 629 uECC_word_t t1[NUM_ECC_WORDS]; in apply_z() local 631 uECC_vli_modSquare_fast(t1, Z, curve); /* z^2 */ in apply_z() 632 uECC_vli_modMult_fast(X1, X1, t1, curve); /* x1 * z^2 */ in apply_z() 633 uECC_vli_modMult_fast(t1, t1, Z, curve); /* z^3 */ in apply_z() 634 uECC_vli_modMult_fast(Y1, Y1, t1, curve); /* y1 * z^3 */ in apply_z()
|
/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | aes-internal-enc.c | 25 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local 87 s0 = TE41(t0) ^ TE42(t1) ^ TE43(t2) ^ TE44(t3) ^ rk[0]; in rijndaelEncrypt() 89 s1 = TE41(t1) ^ TE42(t2) ^ TE43(t3) ^ TE44(t0) ^ rk[1]; in rijndaelEncrypt() 91 s2 = TE41(t2) ^ TE42(t3) ^ TE43(t0) ^ TE44(t1) ^ rk[2]; in rijndaelEncrypt() 93 s3 = TE41(t3) ^ TE42(t0) ^ TE43(t1) ^ TE44(t2) ^ rk[3]; in rijndaelEncrypt()
|
D | aes-internal-dec.c | 78 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelDecrypt() local 140 s0 = TD41(t0) ^ TD42(t3) ^ TD43(t2) ^ TD44(t1) ^ rk[0]; in rijndaelDecrypt() 142 s1 = TD41(t1) ^ TD42(t0) ^ TD43(t3) ^ TD44(t2) ^ rk[1]; in rijndaelDecrypt() 144 s2 = TD41(t2) ^ TD42(t1) ^ TD43(t0) ^ TD44(t3) ^ rk[2]; in rijndaelDecrypt() 146 s3 = TD41(t3) ^ TD42(t2) ^ TD43(t1) ^ TD44(t0) ^ rk[3]; in rijndaelDecrypt()
|
D | sha256-internal.c | 86 u32 S[8], W[64], t0, t1; in sha256_compress() local 108 t1 = Sigma0(a) + Maj(a, b, c); \ in sha256_compress() 110 h = t0 + t1; in sha256_compress()
|
D | sha512-internal.c | 112 u64 S[8], t0, t1; in sha512_compress() local 138 t1 = Sigma0(S[0]) + Maj(S[0], S[1], S[2]); in sha512_compress() 146 S[0] = t0 + t1; in sha512_compress()
|
/hal_espressif-latest/components/riscv/ |
D | vectors.S | 28 sw t1, RV_STK_T1(sp) 68 lw t1, RV_STK_T1(sp) 246 and t1, s1, t2 /* t1 = mcause & mask */ 247 slli t1, t1, 2 /* t1 = mcause * 4 */ 249 add t1, t2, t1 /* t1 = INTC_INT_PRIO_REG + 4 * mcause */ 250 lw t2, 0(t1) /* t2 = INTC_INT_PRIO_REG[mcause] */
|
/hal_espressif-latest/components/mbedtls/port/sha/dma/ |
D | sha.c | 148 uint8_t t0, t1, t2, t_len; in esp_sha_512_t_init_hash() local 160 t1 = (t / 10) % 10; in esp_sha_512_t_init_hash() 162 (((0x30 + t1) << 24))); in esp_sha_512_t_init_hash() 166 t1 = (t / 10) % 10; in esp_sha_512_t_init_hash() 169 (((0x30 + t1) << 16) + ((0x30 + t2) << 24))); in esp_sha_512_t_init_hash()
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | sae.c | 578 struct crypto_bignum *a, *u2, *t1, *t2, *z, *t, *zero, *one, *two, *three, in sswu() local 601 t1 = crypto_bignum_init(); in sswu() 615 if (!u2 || !t1 || !t2 || !z || !t || !zero || !one || !two || !three || in sswu() 630 crypto_bignum_mulmod(z, u2, prime, t1) < 0 || in sswu() 631 crypto_bignum_sqrmod(t1, prime, t2) < 0 || in sswu() 632 crypto_bignum_addmod(t1, t2, prime, t1) < 0) in sswu() 634 debug_print_bignum("SSWU: m", t1, prime_len); in sswu() 640 m_is_zero = const_time_eq(crypto_bignum_is_zero(t1), 1); in sswu() 643 crypto_bignum_exptmod(t1, t2, prime, t) < 0) in sswu() 648 if (crypto_bignum_mulmod(z, a, prime, t1) < 0 || in sswu() [all …]
|
/hal_espressif-latest/tools/esptool_py/test/secure_images/ |
D | rsa_secure_boot_signing_key3.pem | 9 RSR3qxR20qfi97IauCRffEg38h/t1++YNKGAlM8Nsr7rMr+zfvYygSZ0aV9P1CqN
|
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | libtommath.h | 1717 mp_int q, x, y, t1, t2; in mp_div() local 1743 if ((res = mp_init (&t1)) != MP_OKAY) { in mp_div() 1826 mp_zero (&t1); in mp_div() 1827 t1.dp[0] = (t - 1 < 0) ? 0 : y.dp[t - 1]; in mp_div() 1828 t1.dp[1] = y.dp[t]; in mp_div() 1829 t1.used = 2; in mp_div() 1830 if ((res = mp_mul_d (&t1, q.dp[i - t - 1], &t1)) != MP_OKAY) { in mp_div() 1839 } while (mp_cmp_mag(&t1, &t2) == MP_GT); in mp_div() 1842 if ((res = mp_mul_d (&y, q.dp[i - t - 1], &t1)) != MP_OKAY) { in mp_div() 1846 if ((res = mp_lshd (&t1, i - t - 1)) != MP_OKAY) { in mp_div() [all …]
|
/hal_espressif-latest/components/riscv/include/riscv/ |
D | rvruntime-frames.h | 52 STRUCT_FIELD (long, 4, RV_STK_T1, t1) /* t1-2: Temporaries */
|
D | rvsleep-frames.h | 54 STRUCT_FIELD (long, 4, RV_SLP_CTX_T1, t1) /* t1-2: Temporaries */
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/rfcomm/include/ |
D | rfc_int.h | 92 UINT8 t1; member
|
/hal_espressif-latest/components/esp_wifi/include/ |
D | esp_wifi_types.h | 1033 uint64_t t1; /**< Time of departure of FTM frame from FTM Responder in pSec */ member
|
/hal_espressif-latest/components/bt/host/bluedroid/stack/rfcomm/ |
D | rfc_ts_frames.c | 792 p_rx_frame->u.pn.t1 = *p_data++; in rfc_process_mx_message()
|