Home
last modified time | relevance | path

Searched refs:sum (Results 1 – 10 of 10) sorted by relevance

/mbedtls-latest/library/
Dsha512.c396 uint64x2_t initial_sum, sum, intermed; in mbedtls_internal_sha512_process_many_a64_crypto() local
425 sum = vaddq_u64(vextq_u64(initial_sum, initial_sum, 1), gh); in mbedtls_internal_sha512_process_many_a64_crypto()
426 intermed = vsha512hq_u64(sum, vextq_u64(ef, gh, 1), vextq_u64(cd, ef, 1)); in mbedtls_internal_sha512_process_many_a64_crypto()
432 sum = vaddq_u64(vextq_u64(initial_sum, initial_sum, 1), ef); in mbedtls_internal_sha512_process_many_a64_crypto()
433 intermed = vsha512hq_u64(sum, vextq_u64(cd, ef, 1), vextq_u64(ab, cd, 1)); in mbedtls_internal_sha512_process_many_a64_crypto()
439 sum = vaddq_u64(vextq_u64(initial_sum, initial_sum, 1), cd); in mbedtls_internal_sha512_process_many_a64_crypto()
440 intermed = vsha512hq_u64(sum, vextq_u64(ab, cd, 1), vextq_u64(gh, ab, 1)); in mbedtls_internal_sha512_process_many_a64_crypto()
446 sum = vaddq_u64(vextq_u64(initial_sum, initial_sum, 1), ab); in mbedtls_internal_sha512_process_many_a64_crypto()
447 intermed = vsha512hq_u64(sum, vextq_u64(gh, ab, 1), vextq_u64(ef, gh, 1)); in mbedtls_internal_sha512_process_many_a64_crypto()
453 sum = vaddq_u64(vextq_u64(initial_sum, initial_sum, 1), gh); in mbedtls_internal_sha512_process_many_a64_crypto()
[all …]
Dmd.c972 unsigned char sum[MBEDTLS_MD_MAX_SIZE]; in mbedtls_md_hmac_starts() local
986 if ((ret = mbedtls_md_finish(ctx, sum)) != 0) { in mbedtls_md_hmac_starts()
991 key = sum; in mbedtls_md_hmac_starts()
1012 mbedtls_platform_zeroize(sum, sizeof(sum)); in mbedtls_md_hmac_starts()
Dlmots.c87 unsigned sum = 0; in lmots_checksum_calculate() local
90 sum += DIGIT_MAX_VALUE - digest[idx]; in lmots_checksum_calculate()
93 return sum; in lmots_checksum_calculate()
/mbedtls-latest/programs/hash/
Dgeneric_sum.c28 static int generic_wrapper(const mbedtls_md_info_t *md_info, char *filename, unsigned char *sum) in generic_wrapper() argument
30 int ret = mbedtls_md_file(md_info, filename, sum); in generic_wrapper()
46 unsigned char sum[MBEDTLS_MD_MAX_SIZE]; in generic_print() local
48 if (generic_wrapper(md_info, filename, sum) != 0) { in generic_print()
53 mbedtls_printf("%02x", sum[i]); in generic_print()
67 unsigned char sum[MBEDTLS_MD_MAX_SIZE]; in generic_check() local
111 if (generic_wrapper(md_info, line + 2 + 2 * mbedtls_md_get_size(md_info), sum) != 0) { in generic_check()
119 sprintf(buf + i * 2, "%02x", sum[i]); in generic_check()
/mbedtls-latest/tests/src/
Drandom.c108 uint32_t i, *k, sum, delta = 0x9E3779B9; in mbedtls_test_rnd_pseudo_rand() local
119 sum = 0; in mbedtls_test_rnd_pseudo_rand()
123 + info->v1) ^ (sum + k[sum & 3]); in mbedtls_test_rnd_pseudo_rand()
124 sum += delta; in mbedtls_test_rnd_pseudo_rand()
126 + info->v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_test_rnd_pseudo_rand()
/mbedtls-latest/3rdparty/p256-m/p256-m/
Dp256-m.c93 uint64_t sum = (uint64_t) carry + x[i] + y[i]; in u256_add() local
94 z[i] = (uint32_t) sum; in u256_add()
95 carry = (uint32_t) (sum >> 32); in u256_add()
376 uint64_t sum = (uint64_t) z[8] + carry; in u288_muladd() local
377 z[8] = (uint32_t) sum; in u288_muladd()
378 carry = (uint32_t) (sum >> 32); in u288_muladd()
DREADME.md181 The sum of these operations corresponds to a TLS handshake using ECDHE-ECDSA
/mbedtls-latest/tests/suites/
Dtest_suite_ecp.data1741 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1758 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1775 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1792 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1809 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1826 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1845 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1862 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1879 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1896 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
[all …]
Dtest_suite_bignum_core.function13 * \param[in] S Little-endian presentation of the expected sum.
89 * \param[in] S Little-endian presentation of the expected sum.
Dtest_suite_ecp.function1808 /* Firstly add A and B to get the sum S, then subtract B,