/mbedtls-latest/scripts/ |
D | generate_psa_constants.py | 265 return ''.join([make(k, d[k]) for k in sorted(d.keys())]) 270 return ''.join([make(k, d[k]) for k in sorted(d.keys())]) 293 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
|
/mbedtls-latest/library/ |
D | aria.c | 275 const uint32_t k[4], const uint32_t x[4]) in aria_fo_xor() 279 a = p[0] ^ k[0]; in aria_fo_xor() 280 b = p[1] ^ k[1]; in aria_fo_xor() 281 c = p[2] ^ k[2]; in aria_fo_xor() 282 d = p[3] ^ k[3]; in aria_fo_xor() 297 const uint32_t k[4], const uint32_t x[4]) in aria_fe_xor() 301 a = p[0] ^ k[0]; in aria_fe_xor() 302 b = p[1] ^ k[1]; in aria_fe_xor() 303 c = p[2] ^ k[2]; in aria_fe_xor() 304 d = p[3] ^ k[3]; in aria_fe_xor() [all …]
|
D | bignum.c | 661 size_t i, j, k; in mbedtls_mpi_write_string() local 663 for (i = X->n, k = 0; i > 0; i--) { in mbedtls_mpi_write_string() 667 if (c == 0 && k == 0 && (i + j) != 2) { in mbedtls_mpi_write_string() 673 k = 1; in mbedtls_mpi_write_string() 1397 size_t i, n, t, k; in mbedtls_mpi_div_mpi() local 1436 k = mbedtls_mpi_bitlen(&Y) % biL; in mbedtls_mpi_div_mpi() 1437 if (k < biL - 1) { in mbedtls_mpi_div_mpi() 1438 k = biL - 1 - k; in mbedtls_mpi_div_mpi() 1439 MBEDTLS_MPI_CHK(mbedtls_mpi_shift_l(&X, k)); in mbedtls_mpi_div_mpi() 1440 MBEDTLS_MPI_CHK(mbedtls_mpi_shift_l(&Y, k)); in mbedtls_mpi_div_mpi() [all …]
|
D | ecdsa.c | 76 mbedtls_mpi k; /* per-signature random */ member 92 mbedtls_mpi_init(&ctx->k); in ecdsa_restart_sig_init() 106 mbedtls_mpi_free(&ctx->k); in ecdsa_restart_sig_free() 254 mbedtls_mpi k, e, t; in mbedtls_ecdsa_sign_restartable() local 255 mbedtls_mpi *pk = &k, *pr = r; in mbedtls_ecdsa_sign_restartable() 268 mbedtls_mpi_init(&k); mbedtls_mpi_init(&e); mbedtls_mpi_init(&t); in mbedtls_ecdsa_sign_restartable() 277 pk = &rs_ctx->sig->k; in mbedtls_ecdsa_sign_restartable() 370 mbedtls_mpi_free(&k); mbedtls_mpi_free(&e); mbedtls_mpi_free(&t); in mbedtls_ecdsa_sign_restartable()
|
D | pem.c | 50 size_t i, j, k; in pem_get_iv() local 67 k = ((i & 1) != 0) ? j : j << 4; in pem_get_iv() 69 iv[i >> 1] = (unsigned char) (iv[i >> 1] | k); in pem_get_iv()
|
D | ssl_ticket.c | 156 const unsigned char *k, size_t klength, in mbedtls_ssl_ticket_rotate() argument 187 if ((status = psa_import_key(&attributes, k, in mbedtls_ssl_ticket_rotate() 194 ret = mbedtls_cipher_setkey(&key->ctx, k, bitlen, MBEDTLS_ENCRYPT); in mbedtls_ssl_ticket_rotate()
|
D | camellia.c | 249 static void camellia_feistel(const uint32_t x[2], const uint32_t k[2], in camellia_feistel() 253 I0 = x[0] ^ k[0]; in camellia_feistel() 254 I1 = x[1] ^ k[1]; in camellia_feistel()
|
D | md5.c | 91 #define P(a, b, c, d, k, s, t) \ in mbedtls_internal_md5_process() argument 94 (a) += F((b), (c), (d)) + local.X[(k)] + (t); \ in mbedtls_internal_md5_process()
|
D | ecp.c | 2123 unsigned char k[COMB_MAX_D + 1], in ecp_comb_recode_scalar() 2148 ecp_comb_recode_core(k, d, w, &M); in ecp_comb_recode_scalar() 2177 unsigned char k[COMB_MAX_D + 1]; in ecp_mul_comb_after_precomp() local 2190 MBEDTLS_MPI_CHK(ecp_comb_recode_scalar(grp, m, k, d, w, in ecp_mul_comb_after_precomp() 2192 MBEDTLS_MPI_CHK(ecp_mul_comb_core(grp, RR, T, T_size, k, d, in ecp_mul_comb_after_precomp()
|
D | ripemd160.c | 107 #define P(a, b, c, d, e, r, s, f, k) \ in mbedtls_internal_ripemd160_process() argument 110 (a) += f((b), (c), (d)) + local.X[r] + (k); \ in mbedtls_internal_ripemd160_process()
|
D | psa_crypto.c | 6211 mbedtls_mpi k; local 6218 mbedtls_mpi_init(&k); 6272 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&k, *data, m_bytes)); 6278 MBEDTLS_MPI_CHK(mbedtls_mpi_lt_mpi_ct(&diff_N_2, &k, &key_out_of_range)); 6282 MBEDTLS_MPI_CHK(mbedtls_mpi_add_int(&k, &k, 1)); 6283 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&k, *data, m_bytes)); 6292 mbedtls_mpi_free(&k);
|
D | ssl_tls.c | 6798 size_t i, j, k, md_len; in tls_prf_generic() local 6873 k = (i + md_len > dlen) ? dlen % md_len : md_len; in tls_prf_generic() 6875 for (j = 0; j < k; j++) { in tls_prf_generic()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_pkcs7.function | 68 size_t buflen, i, k, cnt = 0, n_crts = 1; 95 for (k = i; k < strlen(crt_files); k++) { 96 if (crt_files[k] == ' ') { 100 TEST_CALLOC(crt_files_arr[cnt], (k-i)+1); 101 crt_files_arr[cnt][k-i] = '\0'; 102 memcpy(crt_files_arr[cnt++], crt_files + i, k-i); 103 i = k;
|
D | test_suite_psa_crypto.data | 5740 # HKDF-Extract tests: out - output, k - secret provided as key, b - secret provided as bytes 5741 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 32+0 k 5745 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 22+10 k 5749 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 0+32 k 5753 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 1+31 k 5757 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 31+0 k 5761 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 1+30 k 5765 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #2, out 32+0 k 5769 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #3, out 32+0 k 5773 PSA key derivation: HKDF-Extract SHA-1, RFC5869 #4, out 20+0 k [all …]
|
D | test_suite_psa_crypto_metadata.function | 73 * expanding to a number of the form 1 << k) is set if and only if
|
D | test_suite_psa_crypto_slot_management.function | 473 uint8_t material[1] = { 'k' };
|
/mbedtls-latest/programs/random/ |
D | gen_entropy.c | 30 int i, k, ret = 1; in main() local 47 for (i = 0, k = 768; i < k; i++) { in main() 59 (long) (sizeof(buf) * k / 1024), in main() 61 (100 * (float) (i + 1)) / k); in main()
|
D | gen_random_ctr_drbg.c | 33 int i, k, ret = 1; in main() local 79 for (i = 0, k = 768; i < k; i++) { in main() 90 (long) (sizeof(buf) * k / 1024), in main() 92 (100 * (float) (i + 1)) / k); in main()
|
/mbedtls-latest/tests/src/ |
D | random.c | 108 uint32_t i, *k, sum, delta = 0x9E3779B9; in mbedtls_test_rnd_pseudo_rand() local 115 k = info->key; in mbedtls_test_rnd_pseudo_rand() 123 + info->v1) ^ (sum + k[sum & 3]); in mbedtls_test_rnd_pseudo_rand() 126 + info->v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_test_rnd_pseudo_rand()
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | p256-m.c | 1337 uint32_t xr[8], k[8], t3[8], t4[8]; in p256_ecdsa_sign() local 1343 ret = scalar_gen_with_pub(kb, k, xr, t3); /* xr = x_coord(k * G) */ in p256_ecdsa_sign() 1346 m256_prep(k, &p256_n); in p256_ecdsa_sign() 1376 m256_inv(k, k, &p256_n); /* k^-1 */ in p256_ecdsa_sign() 1379 m256_mul(t4, k, t4, &p256_n); /* t4 = s = k^-1 * (e + r * dU) */ in p256_ecdsa_sign() 1380 zeroize(k, sizeof k); in p256_ecdsa_sign()
|
/mbedtls-latest/docs/architecture/ |
D | psa-keystore-design.md | 124 …an $30$), but when creating $k$ volatile keys, at most $\log(k)$ creations will involve calls to `… 125 …umption are likely to involve calls to `free()` which may total $O(k)$ memory where $k$ is the max… 171 We only allocate a slice of size `B * 2^k` if there are already `B * (2^k - 1)` occupied slots. Thu…
|
/mbedtls-latest/include/mbedtls/ |
D | ssl_ticket.h | 169 const unsigned char *k, size_t klength,
|
/mbedtls-latest/docs/architecture/psa-thread-safety/ |
D | psa-thread-safety.md | 190 {mbedtls_svc_key_id_t k : (\exists slot := &global_data.key_slots[i]) [ 192 (slot->attr.id == k)]}
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-interface.md | 979 …2 + \ldots + e_n$ is at least $E$. The core then calculates $F_k(0)$ where $k = s_1 || s_2 || \ldo…
|
/mbedtls-latest/ |
D | ChangeLog | 5376 * Fix bug in MPI/bignum on s390/s390x (reported by Dan Horák) (introduced
|