Home
last modified time | relevance | path

Searched refs:mask (Results 1 – 16 of 16) sorted by relevance

/mbedtls-latest/library/
Dconstant_time.c177 const uint64_t mask = (uint64_t) condition; in mbedtls_ct_memcpy_if() local
180 const uint32_t mask = (uint32_t) condition; in mbedtls_ct_memcpy_if()
198 uint64_t a = mbedtls_get_unaligned_uint64(src1 + i) & mask; in mbedtls_ct_memcpy_if()
204 uint32_t a = mbedtls_get_unaligned_uint32(src1 + i) & mask; in mbedtls_ct_memcpy_if()
211 dest[i] = (src1[i] & mask) | (src2[i] & not_mask); in mbedtls_ct_memcpy_if()
234 uint32_t mask = (uint32_t) ~condition; in mbedtls_ct_zeroize_if() local
240 mbedtls_get_unaligned_uint32((void *) (p + i)) & mask); in mbedtls_ct_zeroize_if()
244 p[i] = p[i] & mask; in mbedtls_ct_zeroize_if()
Dpoly1305.c177 uint32_t mask; in poly1305_compute_mac() local
203 mask = (uint32_t) 0U - (g4 >> 2U); in poly1305_compute_mac()
204 mask_inv = ~mask; in poly1305_compute_mac()
207 acc0 = (acc0 & mask_inv) | (g0 & mask); in poly1305_compute_mac()
208 acc1 = (acc1 & mask_inv) | (g1 & mask); in poly1305_compute_mac()
209 acc2 = (acc2 & mask_inv) | (g2 & mask); in poly1305_compute_mac()
210 acc3 = (acc3 & mask_inv) | (g3 & mask); in poly1305_compute_mac()
Drsa.c1625 unsigned char mask[MBEDTLS_MD_MAX_SIZE]; in mgf_mask() local
1643 memset(mask, 0, sizeof(mask)); in mgf_mask()
1664 if ((ret = mbedtls_md_finish(&md_ctx, mask)) != 0) { in mgf_mask()
1669 *p++ ^= mask[i]; in mgf_mask()
1678 mbedtls_platform_zeroize(mask, sizeof(mask)); in mgf_mask()
Dbignum_core.c39 mbedtls_mpi_uint mask = (mbedtls_mpi_uint) 1 << (biL - 1); in mbedtls_mpi_core_clz()
42 if (a & mask) { in mbedtls_mpi_core_clz()
46 mask >>= 1; in mbedtls_mpi_core_clz()
Dpsa_crypto_slot_management.c144 size_t mask = (1LU << KEY_ID_SLICE_INDEX_WIDTH) - 1; in slice_index_of_volatile_key_id() local
145 return (key_id >> KEY_ID_SLOT_INDEX_WIDTH) & mask; in slice_index_of_volatile_key_id()
Dssl_msg.c3135 static void ssl_bitmask_set(unsigned char *mask, size_t offset, size_t len) in ssl_bitmask_set() argument
3146 mask[first_byte_idx] |= 1 << (start_bits - len); in ssl_bitmask_set()
3157 mask[first_byte_idx] |= 1 << (start_bits - 1); in ssl_bitmask_set()
3168 mask[last_byte_idx] |= 1 << (8 - end_bits); in ssl_bitmask_set()
3172 memset(mask + offset / 8, 0xFF, len / 8); in ssl_bitmask_set()
3179 static int ssl_bitmask_check(unsigned char *mask, size_t len) in ssl_bitmask_check() argument
3184 if (mask[i] != 0xFF) { in ssl_bitmask_check()
3190 if ((mask[len / 8] & (1 << (7 - i))) == 0) { in ssl_bitmask_check()
Decp_curves.c5315 size_t adjust, size_t shift, mbedtls_mpi_uint mask) in ecp_mod_koblitz() argument
5348 if (mask != 0) { in ecp_mod_koblitz()
5349 N->p[p_limbs - 1] &= mask; in ecp_mod_koblitz()
5374 if (mask != 0) { in ecp_mod_koblitz()
5375 N->p[p_limbs - 1] &= mask; in ecp_mod_koblitz()
Decp_curves_new.c5659 mbedtls_mpi_uint mask = 0; in ecp_mod_koblitz() local
5661 mask = ((mbedtls_mpi_uint) 1 << shift) - 1; in ecp_mod_koblitz()
5678 if (mask != 0) { in ecp_mod_koblitz()
5679 X[P_limbs - 1] &= mask; in ecp_mod_koblitz()
/mbedtls-latest/3rdparty/everest/library/
DHacl_Curve25519.c516 uint64_t mask = (((mask0 & mask1) & mask2) & mask3) & mask4; in Hacl_EC_Format_fcontract_trim() local
517 uint64_t a0_ = a0 - ((uint64_t)0x7ffffffffffedU & mask); in Hacl_EC_Format_fcontract_trim()
518 uint64_t a1_ = a1 - ((uint64_t)0x7ffffffffffffU & mask); in Hacl_EC_Format_fcontract_trim()
519 uint64_t a2_ = a2 - ((uint64_t)0x7ffffffffffffU & mask); in Hacl_EC_Format_fcontract_trim()
520 uint64_t a3_ = a3 - ((uint64_t)0x7ffffffffffffU & mask); in Hacl_EC_Format_fcontract_trim()
521 uint64_t a4_ = a4 - ((uint64_t)0x7ffffffffffffU & mask); in Hacl_EC_Format_fcontract_trim()
/mbedtls-latest/3rdparty/everest/library/legacy/
DHacl_Curve25519.c561 uint64_t mask = (((mask0 & mask1) & mask2) & mask3) & mask4; in Hacl_EC_Format_fcontract_trim() local
562 uint64_t a0_ = a0 - ((uint64_t)0x7ffffffffffedU & mask); in Hacl_EC_Format_fcontract_trim()
563 uint64_t a1_ = a1 - ((uint64_t)0x7ffffffffffffU & mask); in Hacl_EC_Format_fcontract_trim()
564 uint64_t a2_ = a2 - ((uint64_t)0x7ffffffffffffU & mask); in Hacl_EC_Format_fcontract_trim()
565 uint64_t a3_ = a3 - ((uint64_t)0x7ffffffffffffU & mask); in Hacl_EC_Format_fcontract_trim()
566 uint64_t a4_ = a4 - ((uint64_t)0x7ffffffffffffU & mask); in Hacl_EC_Format_fcontract_trim()
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-limitations.md98 - a mask generation function
164 - the mask generation function is MGF1
194 - the mask generation function is MGF1
/mbedtls-latest/tests/suites/
Dtest_suite_bignum_random.function95 /* Shift the most significant bit of x to position 8 and mask it out */
Dtest_suite_psa_crypto_metadata.function80 * Unconditionally mask flag into the ambient variable
Dtest_suite_psa_crypto.function1525 * encoding. The shifted mask is the maximum truncated value. The
/mbedtls-latest/docs/
Dpsa-transition.md351 …ection you want to use the key in. To allow both directions, use the flag mask `PSA_KEY_USAGE_DECR…
539 …E) to verify the MAC of a message. To allow both directions, use the flag mask `PSA_KEY_USAGE_SIGN…
1009 …I. It is used to hash the message, to create the salted hash, and for the mask generation with MGF…
1044 As with the PK API, the mask generation is MGF1, the label is empty, and the same hash algorithm is…
/mbedtls-latest/docs/proposed/
Dpsa-driver-interface.md831 * `flags`: a bit-mask of [entropy collection flags](#entropy-collection-flags).
1359 …st one is used, which allows having a preference order on drivers, but may mask integration errors.