/mbedtls-latest/tests/suites/ |
D | test_suite_ccm.data | 177 CCM encrypt and tag AES-128 (P=0, N=13, A=0, T=16) 181 CCM encrypt and tag NIST VTT AES-128 #1 (P=24, N=13, A=32, T=4) 185 CCM encrypt and tag NIST VTT AES-128 #2 (P=24, N=13, A=32, T=6) 189 CCM encrypt and tag NIST VTT AES-128 #3 (P=24, N=13, A=32, T=8) 193 CCM encrypt and tag NIST VTT AES-128 #4 (P=24, N=13, A=32, T=10) 197 CCM encrypt and tag NIST VTT AES-128 #5 (P=24, N=13, A=32, T=12) 201 CCM encrypt and tag NIST VTT AES-128 #6 (P=24, N=13, A=32, T=14) 205 CCM encrypt and tag NIST VTT AES-128 #7 (P=24, N=13, A=32, T=16) 209 CCM encrypt and tag NIST VTT AES-192 #1 (P=24, N=13, A=32, T=4) 213 CCM encrypt and tag NIST VTT AES-192 #2 (P=24, N=13, A=32, T=6) [all …]
|
D | test_suite_cipher.ccm.data | 1 AES-128-CCM test vector NIST #1 (P=0, N=7, A=0, T=4) 5 AES-128-CCM test vector NIST #2 (P=0, N=7, A=0, T=4) 9 AES-128-CCM test vector NIST #3 (P=0, N=7, A=0, T=16) 13 AES-128-CCM test vector NIST #4 (P=0, N=7, A=0, T=16) 17 AES-128-CCM test vector NIST #5 (P=0, N=13, A=0, T=4) 21 AES-128-CCM test vector NIST #6 (P=0, N=13, A=0, T=4) 25 AES-128-CCM test vector NIST #7 (P=0, N=13, A=0, T=16) 29 AES-128-CCM test vector NIST #8 (P=0, N=13, A=0, T=16) 33 AES-128-CCM test vector NIST #9 (P=24, N=7, A=0, T=4) 37 AES-128-CCM test vector NIST #10 (P=24, N=7, A=0, T=4) [all …]
|
D | test_suite_bignum_mod_raw.function | 393 mbedtls_mpi_uint *T = NULL; 420 TEST_CALLOC(T, limbs_T); 422 mbedtls_mpi_mod_raw_mul(X, A, B, &m, T); 427 mbedtls_mpi_mod_raw_mul(X, X, B, &m, T); 432 mbedtls_mpi_mod_raw_mul(X, A, X, &m, T); 437 mbedtls_mpi_mod_raw_mul(X, A, A, &m, T); 442 mbedtls_mpi_mod_raw_mul(X, X, X, &m, T); 447 mbedtls_mpi_mod_raw_mul(X, B, A, &m, T); 452 mbedtls_mpi_mod_raw_mul(X, B, X, &m, T); 457 mbedtls_mpi_mod_raw_mul(X, X, A, &m, T); [all …]
|
D | test_suite_bignum_core.function | 845 mbedtls_mpi A, B, N, X4, X8, T, R; 852 mbedtls_mpi_init(&T); 884 TEST_EQUAL(0, mbedtls_mpi_grow(&T, working_limbs)); 891 mbedtls_mpi_core_montmul(R.p, A.p, B.p, B.n, N.p, N.n, mm, T.p); 899 mbedtls_mpi_core_montmul(A.p, A.p, B.p, B.n, N.p, N.n, mm, T.p); 908 mbedtls_mpi_core_montmul(N.p, A.p, B.p, B.n, N.p, N.n, mm, T.p); 919 mbedtls_mpi_core_montmul(B.p, B.p, B.p, B.n, N.p, N.n, mm, T.p); 927 mbedtls_mpi_core_montmul(B.p, A.p, B.p, B.n, N.p, N.n, mm, T.p); 937 mbedtls_mpi_free(&T); 1188 mbedtls_mpi_uint *T = NULL; [all …]
|
D | test_suite_psa_crypto.data | 2834 PSA AEAD encrypt: AES-CCM, 24 bytes, T=4 2838 PSA AEAD encrypt: AES-CCM, 24 bytes, T=6 2842 PSA AEAD encrypt: AES-CCM, 24 bytes, T=8 2846 PSA AEAD encrypt: AES-CCM, 24 bytes, T=10 2850 PSA AEAD encrypt: AES-CCM, 24 bytes, T=12 2854 PSA AEAD encrypt: AES-CCM, 24 bytes, T=14 2858 PSA AEAD encrypt: AES-CCM, 24 bytes, T=16 2870 PSA AEAD decrypt: AES-CCM, 24 bytes, T=4 2874 PSA AEAD decrypt: AES-CCM, 24 bytes, T=6 2878 PSA AEAD decrypt: AES-CCM, 24 bytes, T=8 [all …]
|
D | test_suite_bignum_random.function | 56 { 'T', 'h', 'i', 's', ' ', 'i', 's', ' ',
|
D | test_suite_ecp.function | 64 if (grp1->T != grp2->T) {
|
/mbedtls-latest/library/ |
D | des.c | 216 T = (((X) >> 4) ^ (Y)) & 0x0F0F0F0F; (Y) ^= T; (X) ^= (T << 4); \ 217 T = (((X) >> 16) ^ (Y)) & 0x0000FFFF; (Y) ^= T; (X) ^= (T << 16); \ 218 T = (((Y) >> 2) ^ (X)) & 0x33333333; (X) ^= T; (Y) ^= (T << 2); \ 219 T = (((Y) >> 8) ^ (X)) & 0x00FF00FF; (X) ^= T; (Y) ^= (T << 8); \ 221 T = ((X) ^ (Y)) & 0xAAAAAAAA; (Y) ^= T; (X) ^= T; \ 232 T = ((X) ^ (Y)) & 0xAAAAAAAA; (X) ^= T; (Y) ^= T; \ 234 T = (((Y) >> 8) ^ (X)) & 0x00FF00FF; (X) ^= T; (Y) ^= (T << 8); \ 235 T = (((Y) >> 2) ^ (X)) & 0x33333333; (X) ^= T; (Y) ^= (T << 2); \ 236 T = (((X) >> 16) ^ (Y)) & 0x0000FFFF; (Y) ^= T; (X) ^= (T << 16); \ 237 T = (((X) >> 4) ^ (Y)) & 0x0F0F0F0F; (Y) ^= T; (X) ^= (T << 4); \ [all …]
|
D | ecp.c | 127 mbedtls_ecp_point *T; /* table for precomputed points */ member 147 ctx->T = NULL; in ecp_restart_rsm_init() 165 if (ctx->T != NULL) { in ecp_restart_rsm_free() 167 mbedtls_ecp_point_free(ctx->T + i); in ecp_restart_rsm_free() 169 mbedtls_free(ctx->T); in ecp_restart_rsm_free() 527 grp->T = NULL; in mbedtls_ecp_group_init() 561 return grp->T != NULL && grp->T_size == 0; in ecp_group_is_static_comb_table() 590 if (!ecp_group_is_static_comb_table(grp) && grp->T != NULL) { in mbedtls_ecp_group_free() 592 mbedtls_ecp_point_free(&grp->T[i]); in mbedtls_ecp_group_free() 594 mbedtls_free(grp->T); in mbedtls_ecp_group_free() [all …]
|
D | rsa.c | 85 mbedtls_mpi T; in mbedtls_rsa_parse_key() local 86 mbedtls_mpi_init(&T); in mbedtls_rsa_parse_key() 125 if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 || in mbedtls_rsa_parse_key() 126 (ret = mbedtls_rsa_import(rsa, &T, NULL, NULL, in mbedtls_rsa_parse_key() 132 if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 || in mbedtls_rsa_parse_key() 134 NULL, &T)) != 0) { in mbedtls_rsa_parse_key() 139 if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 || in mbedtls_rsa_parse_key() 141 &T, NULL)) != 0) { in mbedtls_rsa_parse_key() 146 if ((ret = asn1_get_nonzero_mpi(&p, end, &T)) != 0 || in mbedtls_rsa_parse_key() 147 (ret = mbedtls_rsa_import(rsa, NULL, &T, NULL, in mbedtls_rsa_parse_key() [all …]
|
D | bignum_mod_raw.c | 119 mbedtls_mpi_uint *T) in mbedtls_mpi_mod_raw_mul() argument 130 N->rep.mont.mm, T); in mbedtls_mpi_mod_raw_mul() 133 mbedtls_mpi_core_mul(T, A, N->limbs, B, N->limbs); in mbedtls_mpi_mod_raw_mul() 136 (*N->rep.ored.modp)(T, T_limbs); in mbedtls_mpi_mod_raw_mul() 139 mbedtls_mpi_mod_raw_fix_quasi_reduction(T, N); in mbedtls_mpi_mod_raw_mul() 140 memcpy(X, T, N->limbs * sizeof(mbedtls_mpi_uint)); in mbedtls_mpi_mod_raw_mul() 162 mbedtls_mpi_uint *T) in mbedtls_mpi_mod_raw_inv_prime() argument 170 mbedtls_mpi_uint *Nminus2 = T; in mbedtls_mpi_mod_raw_inv_prime() 176 RR, T + AN_limbs); in mbedtls_mpi_mod_raw_inv_prime() 234 mbedtls_mpi_uint *T; in mbedtls_mpi_mod_raw_to_mont_rep() local [all …]
|
D | bignum_core.c | 533 mbedtls_mpi_uint *T) in mbedtls_mpi_core_montmul() argument 535 memset(T, 0, (2 * AN_limbs + 1) * ciL); in mbedtls_mpi_core_montmul() 540 mbedtls_mpi_uint u1 = (T[0] + u0 * B[0]) * mm; in mbedtls_mpi_core_montmul() 542 (void) mbedtls_mpi_core_mla(T, AN_limbs + 2, B, B_limbs, u0); in mbedtls_mpi_core_montmul() 543 (void) mbedtls_mpi_core_mla(T, AN_limbs + 2, N, AN_limbs, u1); in mbedtls_mpi_core_montmul() 545 T++; in mbedtls_mpi_core_montmul() 558 mbedtls_mpi_uint carry = T[AN_limbs]; in mbedtls_mpi_core_montmul() 559 mbedtls_mpi_uint borrow = mbedtls_mpi_core_sub(X, T, N, AN_limbs); in mbedtls_mpi_core_montmul() 577 (unsigned char *) T, in mbedtls_mpi_core_montmul() 855 mbedtls_mpi_uint *T) in mbedtls_mpi_core_exp_mod_optionally_safe() argument [all …]
|
D | rsa_alt_helpers.c | 61 mbedtls_mpi T; /* Holds largest odd divisor of DE - 1 */ in mbedtls_rsa_deduce_primes() local 92 mbedtls_mpi_init(&T); in mbedtls_rsa_deduce_primes() 95 MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(&T, D, E)); in mbedtls_rsa_deduce_primes() 96 MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&T, &T, 1)); in mbedtls_rsa_deduce_primes() 98 if ((order = (uint16_t) mbedtls_mpi_lsb(&T)) == 0) { in mbedtls_rsa_deduce_primes() 104 MBEDTLS_MPI_CHK(mbedtls_mpi_shift_r(&T, order)); in mbedtls_rsa_deduce_primes() 127 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &K, &T, N, in mbedtls_rsa_deduce_primes() 174 mbedtls_mpi_free(&T); in mbedtls_rsa_deduce_primes()
|
D | bignum.c | 351 mbedtls_mpi T; in mbedtls_mpi_swap() local 353 memcpy(&T, X, sizeof(mbedtls_mpi)); in mbedtls_mpi_swap() 355 memcpy(Y, &T, sizeof(mbedtls_mpi)); in mbedtls_mpi_swap() 519 mbedtls_mpi T; in mbedtls_mpi_read_string() local 525 mbedtls_mpi_init(&T); in mbedtls_mpi_read_string() 558 MBEDTLS_MPI_CHK(mbedtls_mpi_mul_int(&T, X, radix)); in mbedtls_mpi_read_string() 559 MBEDTLS_MPI_CHK(mbedtls_mpi_add_int(X, &T, d)); in mbedtls_mpi_read_string() 569 mbedtls_mpi_free(&T); in mbedtls_mpi_read_string() 621 mbedtls_mpi T; in mbedtls_mpi_write_string() local 652 mbedtls_mpi_init(&T); in mbedtls_mpi_write_string() [all …]
|
D | bignum_core.h | 508 mbedtls_mpi_uint mm, mbedtls_mpi_uint *T); 662 mbedtls_mpi_uint *T); 696 mbedtls_mpi_uint *T); 782 mbedtls_mpi_uint *T); 818 mbedtls_mpi_uint *T);
|
D | bignum_mod.c | 176 mbedtls_mpi_uint *T = mbedtls_calloc(N->limbs * 2 + 1, ciL); in mbedtls_mpi_mod_mul() local 177 if (T == NULL) { in mbedtls_mpi_mod_mul() 181 mbedtls_mpi_mod_raw_mul(X->p, A->p, B->p, N, T); in mbedtls_mpi_mod_mul() 183 mbedtls_free(T); in mbedtls_mpi_mod_mul()
|
D | bignum_mod_raw.h | 233 mbedtls_mpi_uint *T); 282 mbedtls_mpi_uint *T);
|
D | ecp_internal_alt.h | 211 mbedtls_ecp_point *T[], size_t t_len);
|
D | ecp_curves.c | 4521 const mbedtls_ecp_point *T) in ecp_group_load() argument 4539 grp->T = (mbedtls_ecp_point *) T; in ecp_group_load()
|
D | ecp_curves_new.c | 4531 const mbedtls_ecp_point *T) in ecp_group_load() argument 4549 grp->T = (mbedtls_ecp_point *) T; in ecp_group_load()
|
/mbedtls-latest/include/mbedtls/ |
D | ecp.h | 257 mbedtls_ecp_point *MBEDTLS_PRIVATE(T); /*!< Pre-computed points for ecp_mul_comb(). */
|
/mbedtls-latest/docs/architecture/ |
D | psa-keystore-design.md | 181 …ould be some hysteresis, e.g. only deallocate a slice if there are at least T free slots in the pr…
|