Searched refs:rP (Results 1 – 3 of 3) sorted by relevance
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/crypto_api/pki/rsa/ |
D | rsa_genkey.c | 127 … int8_t rP, /*!< [in] Virtual pointer to the prime to be tested (the modulos). */ in PkaRsaKgX931Jacobi() argument 144 PKA_COPY(LEN_ID_MAX_BITS, rP1/*dest*/, rP/*src*/); in PkaRsaKgX931Jacobi() 417 int8_t rP, rD, rK, rU, rV, rUnew, rVnew, rT; in PkaRsaKgX931LucasPrimeTest() local 427 rP = PKA_REG_N; /* already is initialized by P */ in PkaRsaKgX931LucasPrimeTest() 447 PKA_SUB( lenId+1, rD/*Res*/, rP/*P*/, rD/*OpB*/); in PkaRsaKgX931LucasPrimeTest() 450 error = PkaRsaKgX931Jacobi( lenId, rD, rP, &JacobiRes, in PkaRsaKgX931LucasPrimeTest() 466 PKA_ADD_IM( lenId+1, rK/*Res*/, rP/*P*/, 1/*OpB*/); in PkaRsaKgX931LucasPrimeTest() 497 PkaModDivideBy2( lenId, rVnew, rP/*mod*/, rVnew); in PkaRsaKgX931LucasPrimeTest() 510 PkaModDivideBy2( lenId, rUnew, rP/*mod*/, rUnew); in PkaRsaKgX931LucasPrimeTest() 515 PkaModDivideBy2( lenId, rVnew, rP/*mod*/, rVnew); in PkaRsaKgX931LucasPrimeTest() [all …]
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/crypto_api/pki/ec_edw/ |
D | pka_ec_edw.c | 144 uint32_t rS, uint32_t rD, uint32_t rP, /*!< virtual pointers to 3 coordinates in PkaEcEdwConvertAfn2Prc() argument 154 PKA_MOD_MUL_NFR(LEN_ID_N_BITS, rP, EDW_REG_D2, rX); // hwmmul(p, d2, x, n, np); in PkaEcEdwConvertAfn2Prc() 155 PKA_MOD_MUL_NFR(LEN_ID_N_BITS, rP, rP, rY); // hwmmul(p, p, y, n, np); in PkaEcEdwConvertAfn2Prc()
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/mbedtls_api/ |
D | rsa_alt.c | 2853 const uint32_t rP =0; in mbedtls_alt_rsa_deduce_crt() local 2886 PkaCopyDataIntoPkaReg(rP, REG_LEN_ID, P->MBEDTLS_PRIVATE(p), P->MBEDTLS_PRIVATE(n)); in mbedtls_alt_rsa_deduce_crt() 2890 ret = PkaCalcNpIntoPkaReg(PLEN_ID, sizeBitsP, rP/*regN*/, regNp, rT1, rT2 ); in mbedtls_alt_rsa_deduce_crt() 2899 PKA_SUB_IM(MOD_LEN_ID, rP, rP, 1); // P -= 1 (rP) in mbedtls_alt_rsa_deduce_crt() 2900 PKA_DIV(MOD_LEN_ID, rT2, rT1, rP); // DP = rT1 = rT1 mod P in mbedtls_alt_rsa_deduce_crt() 2908 PKA_ADD_IM(MOD_LEN_ID, rP, rP, 1); in mbedtls_alt_rsa_deduce_crt()
|