| /hal_espressif-latest/components/bootloader/subproject/components/micro-ecc/ |
| D | uECC_verify_antifault.c | 24 uECC_word_t z[uECC_MAX_WORDS]; in uECC_verify_antifault() local 71 uECC_vli_modInv(z, s, curve->n, num_n_words); /* z = 1/s */ in uECC_verify_antifault() 74 uECC_vli_modMult(u1, u1, z, curve->n, num_n_words); /* u1 = e/s */ in uECC_verify_antifault() 75 uECC_vli_modMult(u2, r, z, curve->n, num_n_words); /* u2 = r/s */ in uECC_verify_antifault() 82 uECC_vli_modSub(z, sum, tx, curve->p, num_words); /* z = x2 - x1 */ in uECC_verify_antifault() 84 uECC_vli_modInv(z, z, curve->p, num_words); /* z = 1/z */ in uECC_verify_antifault() 85 apply_z(sum, sum + num_words, z, curve); in uECC_verify_antifault() 99 uECC_vli_clear(z, num_words); in uECC_verify_antifault() 100 z[0] = 1; in uECC_verify_antifault() 104 curve->double_jacobian(rx, ry, z, curve); in uECC_verify_antifault() [all …]
|
| /hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
| D | p_256_ecc_pp.c | 62 if (multiprecision_iszero(p->z, keyLength)) { in ECC_Double() 63 multiprecision_init(q->z, keyLength); in ECC_Double() 67 x1 = p->x; y1 = p->y; z1 = p->z; in ECC_Double() 68 x3 = q->x; y3 = q->y; z3 = q->z; in ECC_Double() 110 x1 = p->x; y1 = p->y; z1 = p->z; in ECC_Add() 111 x2 = q->x; y2 = q->y; z2 = q->z; in ECC_Add() 112 x3 = r->x; y3 = r->y; z3 = r->z; in ECC_Add() 211 multiprecision_init(p->z, keyLength); in ECC_PointMult_Bin_NAF() 212 p->z[0] = 1; in ECC_PointMult_Bin_NAF() 221 multiprecision_init(minus_p.z, keyLength); in ECC_PointMult_Bin_NAF() [all …]
|
| /hal_espressif-latest/components/bt/porting/ext/tinycrypt/src/ |
| D | ecc_dsa.c | 198 uECC_word_t z[NUM_ECC_WORDS]; in uECC_verify() local 237 uECC_vli_modInv(z, s, curve->n, num_n_words); /* z = 1/s */ in uECC_verify() 240 uECC_vli_modMult(u1, u1, z, curve->n, num_n_words); /* u1 = e/s */ in uECC_verify() 241 uECC_vli_modMult(u2, r, z, curve->n, num_n_words); /* u2 = r/s */ in uECC_verify() 248 uECC_vli_modSub(z, sum, tx, curve->p, num_words); /* z = x2 - x1 */ in uECC_verify() 250 uECC_vli_modInv(z, z, curve->p, num_words); /* z = 1/z */ in uECC_verify() 251 apply_z(sum, sum + num_words, z, curve); in uECC_verify() 265 uECC_vli_clear(z, num_words); in uECC_verify() 266 z[0] = 1; in uECC_verify() 270 curve->double_jacobian(rx, ry, z, curve); in uECC_verify() [all …]
|
| D | ecc.c | 644 uECC_word_t z[NUM_ECC_WORDS]; in XYcZ_initial_double() local 647 uECC_vli_set(z, initial_Z, num_words); in XYcZ_initial_double() 649 uECC_vli_clear(z, num_words); in XYcZ_initial_double() 650 z[0] = 1; in XYcZ_initial_double() 656 apply_z(X1, Y1, z, curve); in XYcZ_initial_double() 657 curve->double_jacobian(X1, Y1, z, curve); in XYcZ_initial_double() 658 apply_z(X2, Y2, z, curve); in XYcZ_initial_double() 737 uECC_word_t z[NUM_ECC_WORDS]; in EccPoint_mult() local 757 uECC_vli_modSub(z, Rx[1], Rx[0], curve->p, num_words); /* X1 - X0 */ in EccPoint_mult() 758 uECC_vli_modMult_fast(z, z, Ry[1 - nb], curve); /* Yb * (X1 - X0) */ in EccPoint_mult() [all …]
|
| /hal_espressif-latest/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
| D | ecc_dsa.c | 197 uECC_word_t z[NUM_ECC_WORDS]; in uECC_verify() local 236 uECC_vli_modInv(z, s, curve->n, num_n_words); /* z = 1/s */ in uECC_verify() 239 uECC_vli_modMult(u1, u1, z, curve->n, num_n_words); /* u1 = e/s */ in uECC_verify() 240 uECC_vli_modMult(u2, r, z, curve->n, num_n_words); /* u2 = r/s */ in uECC_verify() 247 uECC_vli_modSub(z, sum, tx, curve->p, num_words); /* z = x2 - x1 */ in uECC_verify() 249 uECC_vli_modInv(z, z, curve->p, num_words); /* z = 1/z */ in uECC_verify() 250 apply_z(sum, sum + num_words, z, curve); in uECC_verify() 264 uECC_vli_clear(z, num_words); in uECC_verify() 265 z[0] = 1; in uECC_verify() 269 curve->double_jacobian(rx, ry, z, curve); in uECC_verify() [all …]
|
| D | ecc.c | 643 uECC_word_t z[NUM_ECC_WORDS]; in XYcZ_initial_double() local 646 uECC_vli_set(z, initial_Z, num_words); in XYcZ_initial_double() 648 uECC_vli_clear(z, num_words); in XYcZ_initial_double() 649 z[0] = 1; in XYcZ_initial_double() 655 apply_z(X1, Y1, z, curve); in XYcZ_initial_double() 656 curve->double_jacobian(X1, Y1, z, curve); in XYcZ_initial_double() 657 apply_z(X2, Y2, z, curve); in XYcZ_initial_double() 736 uECC_word_t z[NUM_ECC_WORDS]; in EccPoint_mult() local 756 uECC_vli_modSub(z, Rx[1], Rx[0], curve->p, num_words); /* X1 - X0 */ in EccPoint_mult() 757 uECC_vli_modMult_fast(z, z, Ry[1 - nb], curve); /* Yb * (X1 - X0) */ in EccPoint_mult() [all …]
|
| /hal_espressif-latest/components/esp_rom/include/esp32/rom/ |
| D | bigint.h | 42 bool ets_bigint_mod_power_getz(uint32_t *z, uint32_t len); 46 bool ets_bigint_mult_getz(uint32_t *z, uint32_t len); 51 bool ets_bigint_montgomery_mult_getz(uint32_t *z, uint32_t len); 56 bool ets_bigint_mod_mult_getz(uint32_t *m, uint32_t *z, uint32_t len);
|
| /hal_espressif-latest/components/esp_rom/linux/ |
| D | esp_rom_md5.c | 150 #define F1(x, y, z) (z ^ (x & (y ^ z))) argument 151 #define F2(x, y, z) F1(z, x, y) argument 152 #define F3(x, y, z) (x ^ y ^ z) argument 153 #define F4(x, y, z) (y ^ (x | ~z)) argument 156 #define MD5STEP(f, w, x, y, z, data, s) \ argument 157 ( w += f(x, y, z) + data, w = w<<s | w>>(32-s), w += x )
|
| /hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
| D | md4-internal.c | 184 #define F1(x, y, z) (z ^ (x & (y ^ z))) argument 185 #define F2(x, y, z) ((x & y) | (x & z) | (y & z)) argument 186 #define F3(x, y, z) (x ^ y ^ z) argument 189 #define MD4STEP(f, w, x, y, z, data, s) \ argument 190 ( w += f(x, y, z) + data, w = w<<s | w>>(32-s) )
|
| D | md5-internal.c | 194 #define F1(x, y, z) (z ^ (x & (y ^ z))) argument 195 #define F2(x, y, z) F1(z, x, y) argument 196 #define F3(x, y, z) (x ^ y ^ z) argument 197 #define F4(x, y, z) (y ^ (x | ~z)) argument 200 #define MD5STEP(f, w, x, y, z, data, s) \ argument 201 ( w += f(x, y, z) + data, w = w<<s | w>>(32-s), w += x )
|
| D | sha1-internal.c | 144 #define R0(v,w,x,y,z,i) \ argument 145 z += ((w & (x ^ y)) ^ y) + blk0(i) + 0x5A827999 + rol(v, 5); \ 147 #define R1(v,w,x,y,z,i) \ argument 148 z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \ 150 #define R2(v,w,x,y,z,i) \ argument 151 z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5); w = rol(w, 30); 152 #define R3(v,w,x,y,z,i) \ argument 153 z += (((w | x) & y) | (w & x)) + blk(i) + 0x8F1BBCDC + rol(v, 5); \ 155 #define R4(v,w,x,y,z,i) \ argument 156 z += (w ^ x ^ y) + blk(i) + 0xCA62C1D6 + rol(v, 5); \
|
| D | sha256-internal.c | 71 #define Ch(x,y,z) (z ^ (x & (y ^ z))) argument 72 #define Maj(x,y,z) (((x | y) & z) | (x & y)) argument
|
| D | sha512-internal.c | 92 #define Ch(x,y,z) (z ^ (x & (y ^ z))) argument 93 #define Maj(x,y,z) (((x | y) & z) | (x & y)) argument
|
| D | aes-gcm.c | 65 static void gf_mult(const u8 *x, const u8 *y, u8 *z) in gf_mult() argument 70 os_memset(z, 0, 16); /* Z_0 = 0^128 */ in gf_mult() 77 xor_block(z, v); in gf_mult()
|
| /hal_espressif-latest/components/mbedtls/port/sha/parallel_engine/ |
| D | esp_sha1.c | 165 #define F(x,y,z) (z ^ (x & (y ^ z))) in mbedtls_sha1_software_process() argument 192 #define F(x,y,z) (x ^ y ^ z) in mbedtls_sha1_software_process() argument 219 #define F(x,y,z) ((x & y) | (z & (x | y))) in mbedtls_sha1_software_process() argument 246 #define F(x,y,z) (x ^ y ^ z) in mbedtls_sha1_software_process() argument
|
| D | esp_sha512.c | 225 #define F0(x,y,z) ((x & y) | (z & (x | y))) in mbedtls_sha512_software_process() argument 226 #define F1(x,y,z) (z ^ (x & (y ^ z))) in mbedtls_sha512_software_process() argument
|
| D | esp_sha256.c | 166 #define F0(x,y,z) ((x & y) | (z & (x | y))) argument 167 #define F1(x,y,z) (z ^ (x & (y ^ z))) argument
|
| /hal_espressif-latest/components/mbedtls/port/aes/ |
| D | esp_aes_gcm.c | 50 static void esp_gcm_ghash(esp_gcm_context *ctx, const unsigned char *x, size_t x_len, uint8_t *z); 300 static void esp_gcm_ghash(esp_gcm_context *ctx, const unsigned char *x, size_t x_len, uint8_t *z) in esp_gcm_ghash() argument 321 xor_data(z, x); in esp_gcm_ghash() 322 gcm_mult(ctx, z, z); in esp_gcm_ghash() 333 xor_data(z, tmp); in esp_gcm_ghash() 334 gcm_mult(ctx, z, z); in esp_gcm_ghash()
|
| /hal_espressif-latest/components/esp_rom/include/esp32s3/rom/ |
| D | bigint.h | 36 int ets_bigint_getz(uint32_t *z, uint32_t len_words);
|
| /hal_espressif-latest/components/esp_rom/include/esp32c6/rom/ |
| D | bigint.h | 29 int ets_bigint_getz(uint32_t *z, uint32_t len_words);
|
| /hal_espressif-latest/components/esp_rom/include/esp32h2/rom/ |
| D | bigint.h | 29 int ets_bigint_getz(uint32_t *z, uint32_t len_words);
|
| /hal_espressif-latest/components/esp_rom/include/esp32s2/rom/ |
| D | bigint.h | 44 int ets_bigint_getz(uint32_t *z, uint32_t len_words);
|
| /hal_espressif-latest/components/esp_rom/include/esp32c3/rom/ |
| D | bigint.h | 37 int ets_bigint_getz(uint32_t *z, uint32_t len_words);
|
| /hal_espressif-latest/components/bt/host/bluedroid/stack/smp/include/ |
| D | p_256_ecc_pp.h | 35 DWORD z[KEY_LENGTH_DWORDS_P256]; member
|
| /hal_espressif-latest/components/soc/esp32c6/include/soc/ |
| D | ds_struct.h | 129 volatile uint32_t z[128]; member
|