Searched refs:X1 (Results 1 – 3 of 3) sorted by relevance
/mbedtls-latest/library/ |
D | aes.c | 831 #define AES_FROUND(X0, X1, X2, X3, Y0, Y1, Y2, Y3) \ argument 839 (X1) = *RK++ ^ AES_FT0(MBEDTLS_BYTE_0(Y1)) ^ \ 855 #define AES_RROUND(X0, X1, X2, X3, Y0, Y1, Y2, Y3) \ argument 863 (X1) = *RK++ ^ AES_RT0(MBEDTLS_BYTE_0(Y1)) ^ \
|
D | ecp_curves_new.c | 5345 mbedtls_mpi_uint *X1 = X + X0_limbs; in mbedtls_ecp_mod_p521_raw() local 5361 carry = mbedtls_mpi_core_mla(X0, X0_limbs, X1, X1_limbs, shift); in mbedtls_ecp_mod_p521_raw() 5363 memset(X1, 0, X1_limbs * sizeof(mbedtls_mpi_uint)); in mbedtls_ecp_mod_p521_raw()
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-interface.md | 705 * `PSA_JPAKE_X1_STEP_KEY_SHARE` Round 1: output our key share (for ephemeral private key X1) 706 * `PSA_JPAKE_X1_STEP_ZK_PUBLIC` Round 1: output Schnorr NIZKP public key for the X1 key 707 * `PSA_JPAKE_X1_STEP_ZK_PROOF` Round 1: output Schnorr NIZKP proof for the X1 key 729 …`PSA_JPAKE_X1_STEP_KEY_SHARE` Round 1: input key share from peer (for ephemeral private key X1) 730 * `PSA_JPAKE_X1_STEP_ZK_PUBLIC` Round 1: input Schnorr NIZKP public key for the X1 key 731 * `PSA_JPAKE_X1_STEP_ZK_PROOF` Round 1: input Schnorr NIZKP proof for the X1 key
|