Home
last modified time | relevance | path

Searched refs:rT2 (Results 1 – 9 of 9) sorted by relevance

/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/crypto_api/pki/srp/
Dsrp.c31 int8_t rT2 = regTemps[2]; in SrpPwdVerifierCalc() local
49 rc = PkaCalcNpIntoPkaReg(LEN_ID_N_BITS, pCtx->groupParam.modSizeInBits, rN, rNp, rT2, rT3); in SrpPwdVerifierCalc()
58 …PkaCopyDataIntoPkaReg(rT2, LEN_ID_MAX_BITS, &genWord, CALC_32BIT_WORDS_FROM_BYTES(sizeof(genWord))… in SrpPwdVerifierCalc()
60 PKA_MOD_EXP(LEN_ID_N_BITS, rT4, rT2/*g*/, rT3 /*x*/); in SrpPwdVerifierCalc()
82 int8_t rT2 = regTemps[2]; in SrpHostSharedSecretCalc() local
106 …PkaCopyBeByteBuffIntoPkaReg(rT2, LEN_ID_MAX_BITS, pwdVerifier, CALC_FULL_32BIT_WORDS(pCtx->groupPa… in SrpHostSharedSecretCalc()
127 PKA_MOD_EXP(LEN_ID_N_BITS, rT2, rT2/*v*/, rT3 /*u*/); in SrpHostSharedSecretCalc()
129 PKA_MOD_MUL(LEN_ID_N_BITS, rT4, rT4/*A*/, rT2 /*v^u*/); in SrpHostSharedSecretCalc()
144 PKA_ADD_IM(LEN_ID_N_BITS, rT2, rT4, 1); in SrpHostSharedSecretCalc()
145 PKA_COMPARE_IM_STATUS(LEN_ID_N_PKA_REG_BITS, rT2, 0, status); in SrpHostSharedSecretCalc()
[all …]
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/crypto_api/pki/common/
Dpki.c61 int8_t rT2 = regTemps[2]; in PkiCalcNp() local
74 … err = PkaCalcNpIntoPkaReg(LEN_ID_N_BITS, sizeNbits, rN /* regN */, rNp /* regNp */, rT2, rT4); in PkiCalcNp()
120 int8_t rT2 = regTemps[2]; in PkiLongNumDiv() local
135 …PkaCopyDataIntoPkaReg( rT2/*dstReg*/, LEN_ID_MAX_BITS/*LenID*/, pNumA/*src_ptr*/, numASizeInWords); in PkiLongNumDiv()
149 PKA_DIV( LEN_ID_N_PKA_REG_BITS/*LenID*/, rT4/*Res*/, rT2/*OpA*/, rT3/*OpB*/); in PkiLongNumDiv()
158 PkaCopyDataFromPkaReg(pModRes, numBSizeInWords, rT2/*srcReg*/); in PkiLongNumDiv()
188 int8_t rT2 = regTemps[2]; in PkiLongNumMul() local
215 PkaCopyDataIntoPkaReg(rT2/*dstReg*/, LEN_ID_MAX_BITS/*LenID*/, pNumA/*src_ptr*/, in PkiLongNumMul()
224 PKA_MUL_LOW(LEN_ID_N_PKA_REG_BITS/*lenId*/, rT4/*Res*/, rT2/*OpA*/, rT3/*OpB*/); in PkiLongNumMul()
Dpka.c128 int8_t rT2) /*!< [in] Virtual pointer of temp register. */ in PkaDivLongNum() argument
161 PKA_DIV( lenId+1, rT2/*Res*/, rT1 /*OpA*/, OpB /*B*/); in PkaDivLongNum()
176 PKA_ADD( lenId+1, Res /*Res*/, Res /*OpA*/, rT2 /*OpB*/); in PkaDivLongNum()
1075 … int8_t rT2, /*!< [in] The virtual pointers to temp register. */ in PkaExecFullModInv() argument
1128 PKA_MUL_LOW(LEN_ID_N_BITS, rT2/*Result*/, N, Res); in PkaExecFullModInv()
1144 PKA_SUB_IM(LEN_ID_N_PKA_REG_BITS, rT2/*Result*/, rT2/*numerat*/, 1/*OpB*/); in PkaExecFullModInv()
1145 PKA_DIV(LEN_ID_N_PKA_REG_BITS, rT0/*Result*/, rT2/*numerat*/, OpB/*divider*/); in PkaExecFullModInv()
1151 PKA_COMPARE_IM_STATUS(LEN_ID_N_PKA_REG_BITS, rT2/*OpA*/, 0/*OpB*/, status); in PkaExecFullModInv()
Dpka.h270 int8_t rT2,
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/crypto_api/pki/rsa/
Drsa_public.c72 uint8_t rT2 = regTemps[2]; in RsaExecPubKeyExp() local
97 PkaCopyDataIntoPkaReg( rT2/*dstReg*/, LEN_ID_MAX_BITS/*LenID*/, in RsaExecPubKeyExp()
105 PKA_MOD_EXP(LEN_ID_N_BITS/*LenID*/, rT4/*Res*/, rT2/*OpA*/, rT3/*OpB*/); in RsaExecPubKeyExp()
Drsa_genkey.c269 … int8_t rT2, /*!< [in] Virtual pointer to the base vector. */ in PkaRsaKgX931MillerRabinTest() argument
289 PKA_2CLEAR(LEN_ID_MAX_BITS, rT2/*regNum*/); in PkaRsaKgX931MillerRabinTest()
350 PKA_SUB_IM( lenId+1, rT2/*Res*/, PKA_REG_N/*P*/, 1/*OpB*/); in PkaRsaKgX931MillerRabinTest()
353 PKA_COMPARE_STATUS(lenId+1, rT2/*P*/, rT1/*OpB*/, status); in PkaRsaKgX931MillerRabinTest()
365 PKA_COMPARE_STATUS(lenId+1, rT2/*P*/, rT1/*OpB*/, status); in PkaRsaKgX931MillerRabinTest()
562 int8_t rT, rT1, rT2; in PkaRsaKgX931FindPrime1() local
579 rT2 = pRegTemps[3]; in PkaRsaKgX931FindPrime1()
648 rT, rT1, rT2, /*temp registers*/ in PkaRsaKgX931FindPrime1()
701 int8_t rT, rT1, rT2; in PkaRsaKgX931FindPrime2() local
714 rT2 = pRegTemps[3]; in PkaRsaKgX931FindPrime2()
[all …]
Drsa_private.c50 uint8_t rT2= regTemps[2]; /*2*/ in RsaExecPrivKeyExpNonCrt() local
79 … PkaCopyDataIntoPkaReg( rT2/*dstReg*/, LEN_ID_MAX_BITS/*LenID*/, pPrivData->DataIn, modSizeWords); in RsaExecPrivKeyExpNonCrt()
86 PKA_MOD_EXP(LEN_ID_N_BITS/*LenID*/, rT4/*Res*/, rT2/*OpA*/, rT3/*OpB*/); in RsaExecPrivKeyExpNonCrt()
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/crypto_api/pki/ec_edw/
Dpka_ec_edw.c45 …uint32_t rX2, uint32_t rY2, uint32_t rZ2, uint32_t rT2) /*!< [in] - virt. pointers to PKA register… in PkaEcEdwAddExtExtExt() argument
56 PKA_MOD_MUL_NFR(LEN_ID_N_BITS, EDW_REG_T3, rT1, rT2); in PkaEcEdwAddExtExtExt()
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/mbedtls_api/
Drsa_alt.c2857 const uint32_t rT2 = 4; in mbedtls_alt_rsa_deduce_crt() local
2890 ret = PkaCalcNpIntoPkaReg(PLEN_ID, sizeBitsP, rP/*regN*/, regNp, rT1, rT2 ); in mbedtls_alt_rsa_deduce_crt()
2900 PKA_DIV(MOD_LEN_ID, rT2, rT1, rP); // DP = rT1 = rT1 mod P in mbedtls_alt_rsa_deduce_crt()
2903 PKA_COPY(REG_LEN_ID, rT2, rD); // rT2 = D in mbedtls_alt_rsa_deduce_crt()
2905 PKA_DIV(MOD_LEN_ID, rT3, rT2, rQ); // DQ = rT2 = rT2 mod Q in mbedtls_alt_rsa_deduce_crt()
2914 PkaCopyDataFromPkaReg(pTempBuf, P->MBEDTLS_PRIVATE(n), rT2); in mbedtls_alt_rsa_deduce_crt()