/mbedtls-latest/library/ |
D | sha512.c | 396 uint64x2_t initial_sum, sum, intermed; in mbedtls_internal_sha512_process_many_a64_crypto() local 425 sum = vaddq_u64(vextq_u64(initial_sum, initial_sum, 1), gh); in mbedtls_internal_sha512_process_many_a64_crypto() 426 intermed = vsha512hq_u64(sum, vextq_u64(ef, gh, 1), vextq_u64(cd, ef, 1)); in mbedtls_internal_sha512_process_many_a64_crypto() 432 sum = vaddq_u64(vextq_u64(initial_sum, initial_sum, 1), ef); in mbedtls_internal_sha512_process_many_a64_crypto() 433 intermed = vsha512hq_u64(sum, vextq_u64(cd, ef, 1), vextq_u64(ab, cd, 1)); in mbedtls_internal_sha512_process_many_a64_crypto() 439 sum = vaddq_u64(vextq_u64(initial_sum, initial_sum, 1), cd); in mbedtls_internal_sha512_process_many_a64_crypto() 440 intermed = vsha512hq_u64(sum, vextq_u64(ab, cd, 1), vextq_u64(gh, ab, 1)); in mbedtls_internal_sha512_process_many_a64_crypto() 446 sum = vaddq_u64(vextq_u64(initial_sum, initial_sum, 1), ab); in mbedtls_internal_sha512_process_many_a64_crypto() 447 intermed = vsha512hq_u64(sum, vextq_u64(gh, ab, 1), vextq_u64(ef, gh, 1)); in mbedtls_internal_sha512_process_many_a64_crypto() 453 sum = vaddq_u64(vextq_u64(initial_sum, initial_sum, 1), gh); in mbedtls_internal_sha512_process_many_a64_crypto() [all …]
|
D | md.c | 972 unsigned char sum[MBEDTLS_MD_MAX_SIZE]; in mbedtls_md_hmac_starts() local 986 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) { in mbedtls_md_hmac_starts() 991 key = sum; in mbedtls_md_hmac_starts() 1012 mbedtls_platform_zeroize(sum, sizeof(sum)); in mbedtls_md_hmac_starts()
|
D | lmots.c | 87 unsigned sum = 0; in lmots_checksum_calculate() local 90 sum += DIGIT_MAX_VALUE - digest[idx]; in lmots_checksum_calculate() 93 return sum; in lmots_checksum_calculate()
|
/mbedtls-latest/programs/hash/ |
D | generic_sum.c | 28 static int generic_wrapper(const mbedtls_md_info_t *md_info, char *filename, unsigned char *sum) in generic_wrapper() argument 30 int ret = mbedtls_md_file(md_info, filename, sum); in generic_wrapper() 46 unsigned char sum[MBEDTLS_MD_MAX_SIZE]; in generic_print() local 48 if (generic_wrapper(md_info, filename, sum) != 0) { in generic_print() 53 mbedtls_printf("%02x", sum[i]); in generic_print() 67 unsigned char sum[MBEDTLS_MD_MAX_SIZE]; in generic_check() local 111 if (generic_wrapper(md_info, line + 2 + 2 * mbedtls_md_get_size(md_info), sum) != 0) { in generic_check() 119 sprintf(buf + i * 2, "%02x", sum[i]); in generic_check()
|
/mbedtls-latest/tests/src/ |
D | random.c | 108 uint32_t i, *k, sum, delta = 0x9E3779B9; in mbedtls_test_rnd_pseudo_rand() local 119 sum = 0; in mbedtls_test_rnd_pseudo_rand() 123 + info->v1) ^ (sum + k[sum & 3]); in mbedtls_test_rnd_pseudo_rand() 124 sum += delta; in mbedtls_test_rnd_pseudo_rand() 126 + info->v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_test_rnd_pseudo_rand()
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | p256-m.c | 93 uint64_t sum = (uint64_t) carry + x[i] + y[i]; in u256_add() local 94 z[i] = (uint32_t) sum; in u256_add() 95 carry = (uint32_t) (sum >> 32); in u256_add() 376 uint64_t sum = (uint64_t) z[8] + carry; in u288_muladd() local 377 z[8] = (uint32_t) sum; in u288_muladd() 378 carry = (uint32_t) (sum >> 32); in u288_muladd()
|
D | README.md | 181 The sum of these operations corresponds to a TLS handshake using ECDHE-ECDSA
|
/mbedtls-latest/tests/suites/ |
D | test_suite_ecp.data | 1741 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1758 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1775 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1792 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1809 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1826 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1845 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1862 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1879 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1896 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. [all …]
|
D | test_suite_bignum_core.function | 13 * \param[in] S Little-endian presentation of the expected sum. 89 * \param[in] S Little-endian presentation of the expected sum.
|
D | test_suite_ecp.function | 1808 /* Firstly add A and B to get the sum S, then subtract B,
|