Home
last modified time | relevance | path

Searched refs:rP (Results 1 – 3 of 3) sorted by relevance

/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/crypto_api/pki/rsa/
Drsa_genkey.c127 … int8_t rP, /*!< [in] Virtual pointer to the prime to be tested (the modulos). */ in PkaRsaKgX931Jacobi() argument
144 PKA_COPY(LEN_ID_MAX_BITS, rP1/*dest*/, rP/*src*/); in PkaRsaKgX931Jacobi()
417 int8_t rP, rD, rK, rU, rV, rUnew, rVnew, rT; in PkaRsaKgX931LucasPrimeTest() local
427 rP = PKA_REG_N; /* already is initialized by P */ in PkaRsaKgX931LucasPrimeTest()
447 PKA_SUB( lenId+1, rD/*Res*/, rP/*P*/, rD/*OpB*/); in PkaRsaKgX931LucasPrimeTest()
450 error = PkaRsaKgX931Jacobi( lenId, rD, rP, &JacobiRes, in PkaRsaKgX931LucasPrimeTest()
466 PKA_ADD_IM( lenId+1, rK/*Res*/, rP/*P*/, 1/*OpB*/); in PkaRsaKgX931LucasPrimeTest()
497 PkaModDivideBy2( lenId, rVnew, rP/*mod*/, rVnew); in PkaRsaKgX931LucasPrimeTest()
510 PkaModDivideBy2( lenId, rUnew, rP/*mod*/, rUnew); in PkaRsaKgX931LucasPrimeTest()
515 PkaModDivideBy2( lenId, rVnew, rP/*mod*/, rVnew); in PkaRsaKgX931LucasPrimeTest()
[all …]
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/crypto_api/pki/ec_edw/
Dpka_ec_edw.c144 uint32_t rS, uint32_t rD, uint32_t rP, /*!< virtual pointers to 3 coordinates in PkaEcEdwConvertAfn2Prc() argument
154 PKA_MOD_MUL_NFR(LEN_ID_N_BITS, rP, EDW_REG_D2, rX); // hwmmul(p, d2, x, n, np); in PkaEcEdwConvertAfn2Prc()
155 PKA_MOD_MUL_NFR(LEN_ID_N_BITS, rP, rP, rY); // hwmmul(p, p, y, n, np); in PkaEcEdwConvertAfn2Prc()
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/mbedtls_api/
Drsa_alt.c2853 const uint32_t rP =0; in mbedtls_alt_rsa_deduce_crt() local
2886 PkaCopyDataIntoPkaReg(rP, REG_LEN_ID, P->MBEDTLS_PRIVATE(p), P->MBEDTLS_PRIVATE(n)); in mbedtls_alt_rsa_deduce_crt()
2890 ret = PkaCalcNpIntoPkaReg(PLEN_ID, sizeBitsP, rP/*regN*/, regNp, rT1, rT2 ); in mbedtls_alt_rsa_deduce_crt()
2899 PKA_SUB_IM(MOD_LEN_ID, rP, rP, 1); // P -= 1 (rP) in mbedtls_alt_rsa_deduce_crt()
2900 PKA_DIV(MOD_LEN_ID, rT2, rT1, rP); // DP = rT1 = rT1 mod P in mbedtls_alt_rsa_deduce_crt()
2908 PKA_ADD_IM(MOD_LEN_ID, rP, rP, 1); in mbedtls_alt_rsa_deduce_crt()