Searched refs:R2 (Results 1 – 5 of 5) sorted by relevance
| /mbedtls-latest/library/ |
| D | nist_kw.c | 206 unsigned char *R2 = output + KW_SEMIBLOCK_LENGTH; in mbedtls_nist_kw_wrap() local 220 memcpy(inbuff + KW_SEMIBLOCK_LENGTH, R2, KW_SEMIBLOCK_LENGTH); in mbedtls_nist_kw_wrap() 231 memcpy(R2, outbuff + KW_SEMIBLOCK_LENGTH, KW_SEMIBLOCK_LENGTH); in mbedtls_nist_kw_wrap() 232 R2 += KW_SEMIBLOCK_LENGTH; in mbedtls_nist_kw_wrap() 233 if (R2 >= output + (semiblocks * KW_SEMIBLOCK_LENGTH)) { in mbedtls_nist_kw_wrap() 234 R2 = output + KW_SEMIBLOCK_LENGTH; in mbedtls_nist_kw_wrap()
|
| /mbedtls-latest/tests/suites/ |
| D | test_suite_bignum_mod_raw.function | 482 const mbedtls_mpi_uint *R2 = NULL; 484 /* Legacy MPIs for computing R2 */ 502 R2 = R2_mpi.p; 524 mbedtls_mpi_mod_raw_inv_prime(Y, A, N, N_limbs, R2, T); 530 mbedtls_mpi_mod_raw_inv_prime(A, A, N, N_limbs, R2, T); 541 // R2 doesn't need to be freed as it is only aliasing R2_mpi
|
| D | test_suite_bignum_core.function | 1186 const mbedtls_mpi_uint *R2 = NULL; 1189 /* Legacy MPIs for computing R2 */ 1210 R2 = R2_mpi.p; 1238 mbedtls_mpi_core_exp_mod(Y, A, N, N_limbs, E, E_limbs, R2, T); 1249 mbedtls_mpi_core_exp_mod_unsafe(Y, A, N, N_limbs, E, E_limbs, R2, T); 1263 mbedtls_mpi_core_exp_mod(A, A, N, N_limbs, E, E_limbs, R2, T); 1273 mbedtls_mpi_core_exp_mod_unsafe(A, A, N, N_limbs, E, E_limbs, R2, T); 1289 // R2 doesn't need to be freed as it is only aliasing R2_mpi
|
| D | test_suite_psa_crypto_metadata.data | 406 ECC key family: SECP R2 415 ECC key family: SECT R2
|
| /mbedtls-latest/3rdparty/p256-m/p256-m/ |
| D | p256-m.c | 467 uint32_t R2[8]; member 639 m256_mul(z, z, mod->R2, mod); in m256_prep()
|