/net-tools-3.4.0/mbedtls-2.4.0/programs/random/ |
D | gen_entropy.c | 52 int i, k, ret; in main() local 70 for( i = 0, k = 768; i < k; i++ ) in main() 82 "%% done\r", (long)(sizeof(buf) * k / 1024), argv[1], (100 * (float) (i + 1)) / k ); in main()
|
D | gen_random_havege.c | 54 int i, k, ret = 0; in main() local 74 for( i = 0, k = 768; i < k; i++ ) in main() 87 "%% done\r", (long)(sizeof(buf) * k / 1024), argv[1], (100 * (float) (i + 1)) / k ); in main()
|
D | gen_random_ctr_drbg.c | 55 int i, k, ret; in main() local 103 for( i = 0, k = 768; i < k; i++ ) in main() 115 "%% done\r", (long)(sizeof(buf) * k / 1024), argv[1], (100 * (float) (i + 1)) / k ); in main()
|
/net-tools-3.4.0/mbedtls-2.4.0/tests/scripts/ |
D | key-exchanges.pl | 32 for my $k (@kexes) { 33 next if $k eq $kex; 34 system( "scripts/config.pl unset $k" ) 35 and abort "Failed to disable $k\n";
|
/net-tools-3.4.0/mbedtls-2.4.0/library/ |
D | xtea.c | 97 GET_UINT32_BE( ctx->k[i], key, i << 2 ); in mbedtls_xtea_setup() 107 uint32_t *k, v0, v1, i; in mbedtls_xtea_crypt_ecb() local 109 k = ctx->k; in mbedtls_xtea_crypt_ecb() 120 v0 += (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb() 122 v1 += (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb() 131 v1 -= (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb() 133 v0 -= (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb()
|
D | arc4.c | 75 unsigned int k; in mbedtls_arc4_setup() local 85 j = k = 0; in mbedtls_arc4_setup() 87 for( i = 0; i < 256; i++, k++ ) in mbedtls_arc4_setup() 89 if( k >= keylen ) k = 0; in mbedtls_arc4_setup() 92 j = ( j + a + key[k] ) & 0xFF; in mbedtls_arc4_setup()
|
D | ecdsa.c | 78 mbedtls_mpi k, e, t; in mbedtls_ecdsa_sign() local 85 mbedtls_mpi_init( &k ); mbedtls_mpi_init( &e ); mbedtls_mpi_init( &t ); in mbedtls_ecdsa_sign() 97 MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair( grp, &k, &R, f_rng, p_rng ) ); in mbedtls_ecdsa_sign() 137 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &k, &k, &t ) ); in mbedtls_ecdsa_sign() 138 MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( s, &k, &grp->N ) ); in mbedtls_ecdsa_sign() 152 mbedtls_mpi_free( &k ); mbedtls_mpi_free( &e ); mbedtls_mpi_free( &t ); in mbedtls_ecdsa_sign()
|
D | debug.c | 219 int j, k, zeros = 1; in mbedtls_debug_print_mpi() local 244 for( k = sizeof( mbedtls_mpi_uint ) - 1; k >= 0; k-- ) in mbedtls_debug_print_mpi() 246 if( zeros && ( ( X->p[i - 1] >> ( k << 3 ) ) & 0xFF ) == 0 ) in mbedtls_debug_print_mpi() 262 ( X->p[i - 1] >> ( k << 3 ) ) & 0xFF ); in mbedtls_debug_print_mpi()
|
D | blowfish.c | 177 unsigned int i, j, k; in mbedtls_blowfish_setkey() local 198 for( k = 0; k < 4; ++k ) in mbedtls_blowfish_setkey()
|
D | sha256.c | 394 int i, j, k, buflen, ret = 0; in mbedtls_sha256_self_test() local 413 k = i < 3; in mbedtls_sha256_self_test() 416 mbedtls_printf( " SHA-%d test #%d: ", 256 - k * 32, j + 1 ); in mbedtls_sha256_self_test() 418 mbedtls_sha256_starts( &ctx, k ); in mbedtls_sha256_self_test() 433 if( memcmp( sha256sum, sha256_test_sum[i], 32 - k * 4 ) != 0 ) in mbedtls_sha256_self_test()
|
D | sha512.c | 450 int i, j, k, buflen, ret = 0; in mbedtls_sha512_self_test() local 469 k = i < 3; in mbedtls_sha512_self_test() 472 mbedtls_printf( " SHA-%d test #%d: ", 512 - k * 128, j + 1 ); in mbedtls_sha512_self_test() 474 mbedtls_sha512_starts( &ctx, k ); in mbedtls_sha512_self_test() 489 if( memcmp( sha512sum, sha512_test_sum[i], 64 - k * 16 ) != 0 ) in mbedtls_sha512_self_test()
|
D | bignum.c | 554 size_t i, j, k; in mbedtls_mpi_write_string() local 556 for( i = X->n, k = 0; i > 0; i-- ) in mbedtls_mpi_write_string() 562 if( c == 0 && k == 0 && ( i + j ) != 2 ) in mbedtls_mpi_write_string() 567 k = 1; in mbedtls_mpi_write_string() 1320 size_t i, n, t, k; in mbedtls_mpi_div_mpi() local 1345 k = mbedtls_mpi_bitlen( &Y ) % biL; in mbedtls_mpi_div_mpi() 1346 if( k < biL - 1 ) in mbedtls_mpi_div_mpi() 1348 k = biL - 1 - k; in mbedtls_mpi_div_mpi() 1349 MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l( &X, k ) ); in mbedtls_mpi_div_mpi() 1350 MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l( &Y, k ) ); in mbedtls_mpi_div_mpi() [all …]
|
D | pem.c | 66 size_t i, j, k; in pem_get_iv() local 77 k = ( ( i & 1 ) != 0 ) ? j : j << 4; in pem_get_iv() 79 iv[i >> 1] = (unsigned char)( iv[i >> 1] | k ); in pem_get_iv()
|
D | ecp.c | 1196 unsigned char i, k; in ecp_precompute_comb() local 1206 k = 0; in ecp_precompute_comb() 1214 TT[k++] = cur; in ecp_precompute_comb() 1217 MBEDTLS_MPI_CHK( ecp_normalize_jac_many( grp, TT, k ) ); in ecp_precompute_comb() 1223 k = 0; in ecp_precompute_comb() 1230 TT[k++] = &T[i + j]; in ecp_precompute_comb() 1234 MBEDTLS_MPI_CHK( ecp_normalize_jac_many( grp, TT, k ) ); in ecp_precompute_comb() 1317 unsigned char k[COMB_MAX_D + 1]; in ecp_mul_comb() local 1398 ecp_comb_fixed( k, d, w, &M ); in ecp_mul_comb() 1399 MBEDTLS_MPI_CHK( ecp_mul_comb_core( grp, R, T, pre_len, k, d, f_rng, p_rng ) ); in ecp_mul_comb()
|
D | camellia.c | 301 static void camellia_feistel( const uint32_t x[2], const uint32_t k[2], in camellia_feistel() 305 I0 = x[0] ^ k[0]; in camellia_feistel() 306 I1 = x[1] ^ k[1]; in camellia_feistel()
|
/net-tools-3.4.0/tinydtls-0.8.2/ecc/ |
D | ecc.c | 163 uint8_t k, n; in fieldMult() local 165 for (k = 0; k < length; k++){ in fieldMult() 167 l = (uint64_t)x[n]*(uint64_t)y[k]; in fieldMult() 168 temp[n+k] = l&0xFFFFFFFF; in fieldMult() 169 temp[n+k+1] = l>>32; in fieldMult() 170 add(&temp[n+k], &result[n+k], &result[n+k], (length * 2) - (n + k)); in fieldMult() 534 int ecc_ecdsa_sign(const uint32_t *d, const uint32_t *e, const uint32_t *k, uint32_t *r, uint32_t *… in ecc_ecdsa_sign() argument 540 if (isZero(k)) in ecc_ecdsa_sign() 544 ecc_ec_mult(ecc_g_point_x, ecc_g_point_y, k, r, tmp1); in ecc_ecdsa_sign() 563 fieldInv(k, ecc_order_m, ecc_order_r, tmp2); in ecc_ecdsa_sign()
|
D | ecc.h | 53 int ecc_ecdsa_sign(const uint32_t *d, const uint32_t *e, const uint32_t *k, uint32_t *r, uint32_t *…
|
/net-tools-3.4.0/libcoap/include/coap/ |
D | resource.h | 358 #define RESOURCES_FIND(r, k, res) { \ argument 362 if (memcmp((k), tmp->key, sizeof(coap_key_t)) == 0) { \ 380 #define RESOURCES_FIND(r, k, res) { \ argument 381 HASH_FIND(hh, (r), (k), sizeof(coap_key_t), (res)); \
|
/net-tools-3.4.0/libcoap/examples/ |
D | etsi_coaptest.sh | 207 for k in $(eval "echo \${$(echo $j)[@]}") ; do 208 run_test $k
|
/net-tools-3.4.0/mbedtls-2.4.0/tests/data_files/ |
D | crl-rsa-pss-sha384.pem | 13 y9o/ghYF/shKU4mewK3DeM9gQiTcH5A4ISXR87hBQ08AKJRAG1CLvTyzqWiUUY+k
|
D | server2-v1.crt | 16 53k/U98FTvFkVisEDFzLXyKX0fAZxfMk4qnEoBflH4fEXfkuuaBUVdoGGIMRLNAW
|
D | pkcs8_pbe_sha1_2des.key | 24 hOW2BEMFJLRflE+372LNIgSRVNI536YhF8r4r7O1jrw9McX3hzbJGAtcsXqyIO/k
|
D | server2-v1-chain.crt | 16 53k/U98FTvFkVisEDFzLXyKX0fAZxfMk4qnEoBflH4fEXfkuuaBUVdoGGIMRLNAW
|
/net-tools-3.4.0/mbedtls-2.4.0/include/mbedtls/ |
D | xtea.h | 53 uint32_t k[4]; /*!< key */ member
|
/net-tools-3.4.0/mbedtls-2.4.0/tests/suites/ |
D | helpers.function | 365 uint32_t i, *k, sum, delta=0x9E3779B9; 371 k = info->key; 381 + info->v1 ) ^ ( sum + k[sum & 3] ); 384 + info->v0 ) ^ ( sum + k[( sum>>11 ) & 3] );
|