Home
last modified time | relevance | path

Searched refs:T (Results 1 – 22 of 22) sorted by relevance

/mbedtls-latest/tests/suites/
Dtest_suite_ccm.data177 CCM encrypt and tag AES-128 (P=0, N=13, A=0, T=16)
181 CCM encrypt and tag NIST VTT AES-128 #1 (P=24, N=13, A=32, T=4)
185 CCM encrypt and tag NIST VTT AES-128 #2 (P=24, N=13, A=32, T=6)
189 CCM encrypt and tag NIST VTT AES-128 #3 (P=24, N=13, A=32, T=8)
193 CCM encrypt and tag NIST VTT AES-128 #4 (P=24, N=13, A=32, T=10)
197 CCM encrypt and tag NIST VTT AES-128 #5 (P=24, N=13, A=32, T=12)
201 CCM encrypt and tag NIST VTT AES-128 #6 (P=24, N=13, A=32, T=14)
205 CCM encrypt and tag NIST VTT AES-128 #7 (P=24, N=13, A=32, T=16)
209 CCM encrypt and tag NIST VTT AES-192 #1 (P=24, N=13, A=32, T=4)
213 CCM encrypt and tag NIST VTT AES-192 #2 (P=24, N=13, A=32, T=6)
[all …]
Dtest_suite_cipher.ccm.data1 AES-128-CCM test vector NIST #1 (P=0, N=7, A=0, T=4)
5 AES-128-CCM test vector NIST #2 (P=0, N=7, A=0, T=4)
9 AES-128-CCM test vector NIST #3 (P=0, N=7, A=0, T=16)
13 AES-128-CCM test vector NIST #4 (P=0, N=7, A=0, T=16)
17 AES-128-CCM test vector NIST #5 (P=0, N=13, A=0, T=4)
21 AES-128-CCM test vector NIST #6 (P=0, N=13, A=0, T=4)
25 AES-128-CCM test vector NIST #7 (P=0, N=13, A=0, T=16)
29 AES-128-CCM test vector NIST #8 (P=0, N=13, A=0, T=16)
33 AES-128-CCM test vector NIST #9 (P=24, N=7, A=0, T=4)
37 AES-128-CCM test vector NIST #10 (P=24, N=7, A=0, T=4)
[all …]
Dtest_suite_bignum_mod_raw.function393 mbedtls_mpi_uint *T = NULL;
420 TEST_CALLOC(T, limbs_T);
422 mbedtls_mpi_mod_raw_mul(X, A, B, &m, T);
427 mbedtls_mpi_mod_raw_mul(X, X, B, &m, T);
432 mbedtls_mpi_mod_raw_mul(X, A, X, &m, T);
437 mbedtls_mpi_mod_raw_mul(X, A, A, &m, T);
442 mbedtls_mpi_mod_raw_mul(X, X, X, &m, T);
447 mbedtls_mpi_mod_raw_mul(X, B, A, &m, T);
452 mbedtls_mpi_mod_raw_mul(X, B, X, &m, T);
457 mbedtls_mpi_mod_raw_mul(X, X, A, &m, T);
[all …]
Dtest_suite_bignum_core.function845 mbedtls_mpi A, B, N, X4, X8, T, R;
852 mbedtls_mpi_init(&T);
884 TEST_EQUAL(0, mbedtls_mpi_grow(&T, working_limbs));
891 mbedtls_mpi_core_montmul(R.p, A.p, B.p, B.n, N.p, N.n, mm, T.p);
899 mbedtls_mpi_core_montmul(A.p, A.p, B.p, B.n, N.p, N.n, mm, T.p);
908 mbedtls_mpi_core_montmul(N.p, A.p, B.p, B.n, N.p, N.n, mm, T.p);
919 mbedtls_mpi_core_montmul(B.p, B.p, B.p, B.n, N.p, N.n, mm, T.p);
927 mbedtls_mpi_core_montmul(B.p, A.p, B.p, B.n, N.p, N.n, mm, T.p);
937 mbedtls_mpi_free(&T);
1188 mbedtls_mpi_uint *T = NULL;
[all …]
Dtest_suite_psa_crypto.data2834 PSA AEAD encrypt: AES-CCM, 24 bytes, T=4
2838 PSA AEAD encrypt: AES-CCM, 24 bytes, T=6
2842 PSA AEAD encrypt: AES-CCM, 24 bytes, T=8
2846 PSA AEAD encrypt: AES-CCM, 24 bytes, T=10
2850 PSA AEAD encrypt: AES-CCM, 24 bytes, T=12
2854 PSA AEAD encrypt: AES-CCM, 24 bytes, T=14
2858 PSA AEAD encrypt: AES-CCM, 24 bytes, T=16
2870 PSA AEAD decrypt: AES-CCM, 24 bytes, T=4
2874 PSA AEAD decrypt: AES-CCM, 24 bytes, T=6
2878 PSA AEAD decrypt: AES-CCM, 24 bytes, T=8
[all …]
Dtest_suite_bignum_random.function56 { 'T', 'h', 'i', 's', ' ', 'i', 's', ' ',
Dtest_suite_ecp.function64 if (grp1->T != grp2->T) {
/mbedtls-latest/library/
Ddes.c216 T = (((X) >> 4) ^ (Y)) & 0x0F0F0F0F; (Y) ^= T; (X) ^= (T << 4); \
217 T = (((X) >> 16) ^ (Y)) & 0x0000FFFF; (Y) ^= T; (X) ^= (T << 16); \
218 T = (((Y) >> 2) ^ (X)) & 0x33333333; (X) ^= T; (Y) ^= (T << 2); \
219 T = (((Y) >> 8) ^ (X)) & 0x00FF00FF; (X) ^= T; (Y) ^= (T << 8); \
221 T = ((X) ^ (Y)) & 0xAAAAAAAA; (Y) ^= T; (X) ^= T; \
232 T = ((X) ^ (Y)) & 0xAAAAAAAA; (X) ^= T; (Y) ^= T; \
234 T = (((Y) >> 8) ^ (X)) & 0x00FF00FF; (X) ^= T; (Y) ^= (T << 8); \
235 T = (((Y) >> 2) ^ (X)) & 0x33333333; (X) ^= T; (Y) ^= (T << 2); \
236 T = (((X) >> 16) ^ (Y)) & 0x0000FFFF; (Y) ^= T; (X) ^= (T << 16); \
237 T = (((X) >> 4) ^ (Y)) & 0x0F0F0F0F; (Y) ^= T; (X) ^= (T << 4); \
[all …]
Decp.c127 mbedtls_ecp_point *T; /* table for precomputed points */ member
147 ctx->T = NULL; in ecp_restart_rsm_init()
165 if (ctx->T != NULL) { in ecp_restart_rsm_free()
167 mbedtls_ecp_point_free(ctx->T + i); in ecp_restart_rsm_free()
169 mbedtls_free(ctx->T); in ecp_restart_rsm_free()
527 grp->T = NULL; in mbedtls_ecp_group_init()
561 return grp->T != NULL && grp->T_size == 0; in ecp_group_is_static_comb_table()
590 if (!ecp_group_is_static_comb_table(grp) && grp->T != NULL) { in mbedtls_ecp_group_free()
592 mbedtls_ecp_point_free(&grp->T[i]); in mbedtls_ecp_group_free()
594 mbedtls_free(grp->T); in mbedtls_ecp_group_free()
[all …]
Drsa.c85 mbedtls_mpi T; in mbedtls_rsa_parse_key() local
86 mbedtls_mpi_init(&T); in mbedtls_rsa_parse_key()
125 if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 || in mbedtls_rsa_parse_key()
126 (ret = mbedtls_rsa_import(rsa, &T, NULL, NULL, in mbedtls_rsa_parse_key()
132 if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 || in mbedtls_rsa_parse_key()
134 NULL, &T)) != 0) { in mbedtls_rsa_parse_key()
139 if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 || in mbedtls_rsa_parse_key()
141 &T, NULL)) != 0) { in mbedtls_rsa_parse_key()
146 if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 || in mbedtls_rsa_parse_key()
147 (ret = mbedtls_rsa_import(rsa, NULL, &T, NULL, in mbedtls_rsa_parse_key()
[all …]
Dbignum_mod_raw.c119 mbedtls_mpi_uint *T) in mbedtls_mpi_mod_raw_mul() argument
130 N->rep.mont.mm, T); in mbedtls_mpi_mod_raw_mul()
133 mbedtls_mpi_core_mul(T, A, N->limbs, B, N->limbs); in mbedtls_mpi_mod_raw_mul()
136 (*N->rep.ored.modp)(T, T_limbs); in mbedtls_mpi_mod_raw_mul()
139 mbedtls_mpi_mod_raw_fix_quasi_reduction(T, N); in mbedtls_mpi_mod_raw_mul()
140 memcpy(X, T, N->limbs * sizeof(mbedtls_mpi_uint)); in mbedtls_mpi_mod_raw_mul()
162 mbedtls_mpi_uint *T) in mbedtls_mpi_mod_raw_inv_prime() argument
170 mbedtls_mpi_uint *Nminus2 = T; in mbedtls_mpi_mod_raw_inv_prime()
176 RR, T + AN_limbs); in mbedtls_mpi_mod_raw_inv_prime()
234 mbedtls_mpi_uint *T; in mbedtls_mpi_mod_raw_to_mont_rep() local
[all …]
Dbignum_core.c533 mbedtls_mpi_uint *T) in mbedtls_mpi_core_montmul() argument
535 memset(T, 0, (2 * AN_limbs + 1) * ciL); in mbedtls_mpi_core_montmul()
540 mbedtls_mpi_uint u1 = (T[0] + u0 * B[0]) * mm; in mbedtls_mpi_core_montmul()
542 (void) mbedtls_mpi_core_mla(T, AN_limbs + 2, B, B_limbs, u0); in mbedtls_mpi_core_montmul()
543 (void) mbedtls_mpi_core_mla(T, AN_limbs + 2, N, AN_limbs, u1); in mbedtls_mpi_core_montmul()
545 T++; in mbedtls_mpi_core_montmul()
558 mbedtls_mpi_uint carry = T[AN_limbs]; in mbedtls_mpi_core_montmul()
559 mbedtls_mpi_uint borrow = mbedtls_mpi_core_sub(X, T, N, AN_limbs); in mbedtls_mpi_core_montmul()
577 (unsigned char *) T, in mbedtls_mpi_core_montmul()
855 mbedtls_mpi_uint *T) in mbedtls_mpi_core_exp_mod_optionally_safe() argument
[all …]
Drsa_alt_helpers.c61 mbedtls_mpi T; /* Holds largest odd divisor of DE - 1 */ in mbedtls_rsa_deduce_primes() local
92 mbedtls_mpi_init(&T); in mbedtls_rsa_deduce_primes()
95 MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(&T, D, E)); in mbedtls_rsa_deduce_primes()
96 MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&T, &T, 1)); in mbedtls_rsa_deduce_primes()
98 if ((order = (uint16_t) mbedtls_mpi_lsb(&T)) == 0) { in mbedtls_rsa_deduce_primes()
104 MBEDTLS_MPI_CHK(mbedtls_mpi_shift_r(&T, order)); in mbedtls_rsa_deduce_primes()
127 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &K, &T, N, in mbedtls_rsa_deduce_primes()
174 mbedtls_mpi_free(&T); in mbedtls_rsa_deduce_primes()
Dbignum.c351 mbedtls_mpi T; in mbedtls_mpi_swap() local
353 memcpy(&T, X, sizeof(mbedtls_mpi)); in mbedtls_mpi_swap()
355 memcpy(Y, &T, sizeof(mbedtls_mpi)); in mbedtls_mpi_swap()
519 mbedtls_mpi T; in mbedtls_mpi_read_string() local
525 mbedtls_mpi_init(&T); in mbedtls_mpi_read_string()
558 MBEDTLS_MPI_CHK(mbedtls_mpi_mul_int(&T, X, radix)); in mbedtls_mpi_read_string()
559 MBEDTLS_MPI_CHK(mbedtls_mpi_add_int(X, &T, d)); in mbedtls_mpi_read_string()
569 mbedtls_mpi_free(&T); in mbedtls_mpi_read_string()
621 mbedtls_mpi T; in mbedtls_mpi_write_string() local
652 mbedtls_mpi_init(&T); in mbedtls_mpi_write_string()
[all …]
Dbignum_core.h508 mbedtls_mpi_uint mm, mbedtls_mpi_uint *T);
662 mbedtls_mpi_uint *T);
696 mbedtls_mpi_uint *T);
782 mbedtls_mpi_uint *T);
818 mbedtls_mpi_uint *T);
Dbignum_mod.c176 mbedtls_mpi_uint *T = mbedtls_calloc(N->limbs * 2 + 1, ciL); in mbedtls_mpi_mod_mul() local
177 if (T == NULL) { in mbedtls_mpi_mod_mul()
181 mbedtls_mpi_mod_raw_mul(X->p, A->p, B->p, N, T); in mbedtls_mpi_mod_mul()
183 mbedtls_free(T); in mbedtls_mpi_mod_mul()
Dbignum_mod_raw.h233 mbedtls_mpi_uint *T);
282 mbedtls_mpi_uint *T);
Decp_internal_alt.h211 mbedtls_ecp_point *T[], size_t t_len);
Decp_curves.c4521 const mbedtls_ecp_point *T) in ecp_group_load() argument
4539 grp->T = (mbedtls_ecp_point *) T; in ecp_group_load()
Decp_curves_new.c4531 const mbedtls_ecp_point *T) in ecp_group_load() argument
4549 grp->T = (mbedtls_ecp_point *) T; in ecp_group_load()
/mbedtls-latest/include/mbedtls/
Decp.h257 mbedtls_ecp_point *MBEDTLS_PRIVATE(T); /*!< Pre-computed points for ecp_mul_comb(). */
/mbedtls-latest/docs/architecture/
Dpsa-keystore-design.md181 …ould be some hysteresis, e.g. only deallocate a slice if there are at least T free slots in the pr…