Home
last modified time | relevance | path

Searched refs:KEY_LENGTH_DWORDS_P256 (Results 1 – 9 of 9) sorted by relevance

/system/bt/stack/smp/
Dp_256_ecc_pp.h32 uint32_t x[KEY_LENGTH_DWORDS_P256];
33 uint32_t y[KEY_LENGTH_DWORDS_P256];
34 uint32_t z[KEY_LENGTH_DWORDS_P256];
39 uint32_t a[KEY_LENGTH_DWORDS_P256];
40 uint32_t b[KEY_LENGTH_DWORDS_P256];
46 uint32_t p[KEY_LENGTH_DWORDS_P256];
49 uint32_t omega[KEY_LENGTH_DWORDS_P256];
Dp_256_multprecision.cc31 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) c[i] = 0; in multiprecision_init()
35 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) c[i] = a[i]; in multiprecision_copy()
39 for (int i = KEY_LENGTH_DWORDS_P256 - 1; i >= 0; i--) { in multiprecision_compare()
47 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) in multiprecision_iszero()
63 for (i = KEY_LENGTH_DWORDS_P256 - 1; i >= 0; i--) in multiprecision_most_signdwords()
83 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) { in multiprecision_add()
100 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) { in multiprecision_sub()
132 for (int i = KEY_LENGTH_DWORDS_P256 - 1; i >= 0; i--) { in multiprecision_rshift()
142 uint32_t cc[2 * KEY_LENGTH_DWORDS_P256]; in multiprecision_mersenns_mult_mod()
184 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) { in multiprecision_lshift()
[all …]
Dp_256_ecc_pp.cc42 uint32_t t1[KEY_LENGTH_DWORDS_P256]; in ECC_Double()
43 uint32_t t2[KEY_LENGTH_DWORDS_P256]; in ECC_Double()
44 uint32_t t3[KEY_LENGTH_DWORDS_P256]; in ECC_Double()
91 uint32_t t1[KEY_LENGTH_DWORDS_P256]; in ECC_Add()
92 uint32_t t2[KEY_LENGTH_DWORDS_P256]; in ECC_Add()
249 uint32_t y2_mod[KEY_LENGTH_DWORDS_P256] = {0}; in ECC_ValidatePoint()
253 uint32_t rhs[KEY_LENGTH_DWORDS_P256] = {0}; in ECC_ValidatePoint()
255 uint32_t three[KEY_LENGTH_DWORDS_P256] = {0}; in ECC_ValidatePoint()
Dp_256_curvepara.cc40 memset(ec->omega, 0, KEY_LENGTH_DWORDS_P256); in p_256_init_curve()
41 memset(ec->a, 0, KEY_LENGTH_DWORDS_P256); in p_256_init_curve()
Dp_256_multprecision.h31 #define KEY_LENGTH_DWORDS_P256 8 macro
/system/bt/gd/security/ecc/
Dp_256_ecc_pp.h35 uint32_t x[KEY_LENGTH_DWORDS_P256];
36 uint32_t y[KEY_LENGTH_DWORDS_P256];
37 uint32_t z[KEY_LENGTH_DWORDS_P256];
42 uint32_t a[KEY_LENGTH_DWORDS_P256];
43 uint32_t b[KEY_LENGTH_DWORDS_P256];
46 uint32_t p[KEY_LENGTH_DWORDS_P256];
49 uint32_t omega[KEY_LENGTH_DWORDS_P256];
Dmultprecision.cc37 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) c[i] = 0; in multiprecision_init()
41 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) c[i] = a[i]; in multiprecision_copy()
45 for (int i = KEY_LENGTH_DWORDS_P256 - 1; i >= 0; i--) { in multiprecision_compare()
53 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) in multiprecision_iszero()
69 for (i = KEY_LENGTH_DWORDS_P256 - 1; i >= 0; i--) in multiprecision_most_signdwords()
88 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) { in multiprecision_add()
105 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) { in multiprecision_sub()
134 for (int i = KEY_LENGTH_DWORDS_P256 - 1; i >= 0; i--) { in multiprecision_rshift()
144 uint32_t cc[2 * KEY_LENGTH_DWORDS_P256]; in multiprecision_mersenns_mult_mod()
182 for (uint32_t i = 0; i < KEY_LENGTH_DWORDS_P256; i++) { in multiprecision_lshift()
[all …]
Dp_256_ecc_pp.cc47 uint32_t t1[KEY_LENGTH_DWORDS_P256]; in ECC_Double()
48 uint32_t t2[KEY_LENGTH_DWORDS_P256]; in ECC_Double()
49 uint32_t t3[KEY_LENGTH_DWORDS_P256]; in ECC_Double()
96 uint32_t t1[KEY_LENGTH_DWORDS_P256]; in ECC_Add()
97 uint32_t t2[KEY_LENGTH_DWORDS_P256]; in ECC_Add()
247 uint32_t y2_mod[KEY_LENGTH_DWORDS_P256] = {0}; in ECC_ValidatePoint()
251 uint32_t rhs[KEY_LENGTH_DWORDS_P256] = {0}; in ECC_ValidatePoint()
253 uint32_t three[KEY_LENGTH_DWORDS_P256] = {0}; in ECC_ValidatePoint()
Dmultprecision.h32 #define KEY_LENGTH_DWORDS_P256 8 macro