/external/openssh/ |
rsa.h | 22 int rsa_public_encrypt(BIGNUM *, BIGNUM *, RSA *); 23 int rsa_private_decrypt(BIGNUM *, BIGNUM *, RSA *);
|
dh.h | 31 BIGNUM *g; 32 BIGNUM *p; 37 DH *dh_new_group(BIGNUM *, BIGNUM *); 45 int dh_pub_is_valid(DH *, BIGNUM *);
|
bufbn.c | 33 buffer_put_bignum_ret(Buffer *buffer, const BIGNUM *value) 45 buffer_put_bignum(Buffer *buffer, const BIGNUM *value) 52 buffer_get_bignum_ret(Buffer *buffer, BIGNUM *value) 64 buffer_get_bignum(Buffer *buffer, BIGNUM *value) 72 buffer_put_bignum2_ret(Buffer *buffer, const BIGNUM *value) 84 buffer_put_bignum2(Buffer *buffer, const BIGNUM *value) 91 buffer_get_bignum2_ret(Buffer *buffer, BIGNUM *value) 103 buffer_get_bignum2(Buffer *buffer, BIGNUM *value)
|
kex.h | 187 int kex_derive_keys_bn(struct ssh *, u_char *, u_int, const BIGNUM *); 202 const BIGNUM *, const BIGNUM *, const BIGNUM *, u_char *, size_t *); 207 const BIGNUM *, const BIGNUM *, const BIGNUM *, 208 const BIGNUM *, const BIGNUM *, 213 const EC_POINT *, const EC_POINT *, const BIGNUM *, u_char *, size_t *) [all...] |
buffer.h | 52 void buffer_put_bignum(Buffer *, const BIGNUM *); 53 void buffer_put_bignum2(Buffer *, const BIGNUM *); 54 void buffer_get_bignum(Buffer *, BIGNUM *); 55 void buffer_get_bignum2(Buffer *, BIGNUM *); 78 int buffer_put_bignum_ret(Buffer *, const BIGNUM *); 79 int buffer_get_bignum_ret(Buffer *, BIGNUM *); 80 int buffer_put_bignum2_ret(Buffer *, const BIGNUM *); 81 int buffer_get_bignum2_ret(Buffer *, BIGNUM *);
|
kexgex.c | 53 const BIGNUM *prime, 54 const BIGNUM *gen, 55 const BIGNUM *client_dh_pub, 56 const BIGNUM *server_dh_pub, 57 const BIGNUM *shared_secret,
|
/external/boringssl/src/include/openssl/ |
bn.h | 171 // BN_new creates a new, allocated BIGNUM and initialises it. 172 OPENSSL_EXPORT BIGNUM *BN_new(void); 174 // BN_init initialises a stack allocated |BIGNUM|. 175 OPENSSL_EXPORT void BN_init(BIGNUM *bn); 179 OPENSSL_EXPORT void BN_free(BIGNUM *bn); 183 OPENSSL_EXPORT void BN_clear_free(BIGNUM *bn); 185 // BN_dup allocates a new BIGNUM and sets it equal to |src|. It returns the 186 // allocated BIGNUM on success or NULL otherwise. 187 OPENSSL_EXPORT BIGNUM *BN_dup(const BIGNUM *src) [all...] |
dh.h | 92 OPENSSL_EXPORT void DH_get0_key(const DH *dh, const BIGNUM **out_pub_key, 93 const BIGNUM **out_priv_key); 98 OPENSSL_EXPORT int DH_set0_key(DH *dh, BIGNUM *pub_key, BIGNUM *priv_key); 102 OPENSSL_EXPORT void DH_get0_pqg(const DH *dh, const BIGNUM **out_p, 103 const BIGNUM **out_q, const BIGNUM **out_g); 109 OPENSSL_EXPORT int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g) [all...] |
ecdsa.h | 99 BIGNUM *r; 100 BIGNUM *s; 106 // ECDSA_SIG_free frees |sig| its member |BIGNUM|s. 111 OPENSSL_EXPORT void ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **out_r, 112 const BIGNUM **out_s); 117 OPENSSL_EXPORT int ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s);
|
ec.h | 132 // EC_GROUP_get0_order returns a pointer to the internal |BIGNUM| object in 134 OPENSSL_EXPORT const BIGNUM *EC_GROUP_get0_order(const EC_GROUP *group); 142 BIGNUM *cofactor, BN_CTX *ctx); 149 OPENSSL_EXPORT int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *out_p, 150 BIGNUM *out_a, BIGNUM *out_b, 221 BIGNUM *x, BIGNUM *y, 230 const BIGNUM *x, 231 const BIGNUM *y [all...] |
dsa.h | 100 OPENSSL_EXPORT void DSA_get0_key(const DSA *dsa, const BIGNUM **out_pub_key, 101 const BIGNUM **out_priv_key); 105 OPENSSL_EXPORT void DSA_get0_pqg(const DSA *dsa, const BIGNUM **out_p, 106 const BIGNUM **out_q, const BIGNUM **out_g); 114 OPENSSL_EXPORT int DSA_set0_key(DSA *dsa, BIGNUM *pub_key, BIGNUM *priv_key); 121 OPENSSL_EXPORT int DSA_set0_pqg(DSA *dsa, BIGNUM *p, BIGNUM *q, BIGNUM *g) [all...] |
/external/openssh/regress/unittests/sshkey/ |
common.h | 14 /* Load a bignum from a file */ 15 BIGNUM *load_bignum(const char *name);
|
/external/boringssl/src/crypto/fipsmodule/bn/ |
internal.h | 216 int bn_minimal_width(const BIGNUM *bn); 220 void bn_set_minimal_width(BIGNUM *bn); 225 int bn_wexpand(BIGNUM *bn, size_t words); 229 int bn_expand(BIGNUM *bn, size_t bits); 233 OPENSSL_EXPORT int bn_resize_words(BIGNUM *bn, size_t words); 242 int bn_set_words(BIGNUM *bn, const BN_ULONG *words, size_t num); 246 int bn_fits_in_words(const BIGNUM *bn, size_t num); 250 int bn_copy_words(BN_ULONG *out, size_t num, const BIGNUM *bn); 336 int bn_rand_secret_range(BIGNUM *r, int *out_is_uniform, BN_ULONG min_inclusive, 337 const BIGNUM *max_exclusive) [all...] |
bn.c | 69 BIGNUM *BN_new(void) { 70 BIGNUM *bn = OPENSSL_malloc(sizeof(BIGNUM)); 77 OPENSSL_memset(bn, 0, sizeof(BIGNUM)); 83 void BN_init(BIGNUM *bn) { 84 OPENSSL_memset(bn, 0, sizeof(BIGNUM)); 87 void BN_free(BIGNUM *bn) { 103 void BN_clear_free(BIGNUM *bn) { 122 OPENSSL_cleanse(bn, sizeof(BIGNUM)); 126 BIGNUM *BN_dup(const BIGNUM *src) [all...] |
add.c | 67 int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) { 68 const BIGNUM *tmp; 103 int bn_uadd_consttime(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) { 106 const BIGNUM *tmp = a; 130 int BN_uadd(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) [all...] |
gcd.c | 116 int BN_mod_inverse_odd(BIGNUM *out, int *out_no_inverse, const BIGNUM *a, 117 const BIGNUM *n, BN_CTX *ctx) { 130 BIGNUM *A, *B, *X, *Y; 143 BIGNUM *R = out; 283 BIGNUM *BN_mod_inverse(BIGNUM *out, const BIGNUM *a, const BIGNUM *n, 285 BIGNUM *new_out = NULL [all...] |
cmp.c | 98 int BN_ucmp(const BIGNUM *a, const BIGNUM *b) { 102 int BN_cmp(const BIGNUM *a, const BIGNUM *b) { 114 // |BIGNUM|s should never occur in crypto, only calculators. 130 int BN_abs_is_word(const BIGNUM *bn, BN_ULONG w) { 141 int BN_cmp_word(const BIGNUM *a, BN_ULONG b) { 142 BIGNUM b_bn; 152 int BN_is_zero(const BIGNUM *bn) { 156 int BN_is_one(const BIGNUM *bn) [all...] |
div.c | 195 int BN_div(BIGNUM *quotient, BIGNUM *rem, const BIGNUM *numerator, 196 const BIGNUM *divisor, BN_CTX *ctx) { 198 BIGNUM wnum; 203 // This function relies on the historical minimal-width |BIGNUM| invariant. 223 BIGNUM *tmp = BN_CTX_get(ctx); 224 BIGNUM *snum = BN_CTX_get(ctx); 225 BIGNUM *sdiv = BN_CTX_get(ctx); 226 BIGNUM *res = NULL [all...] |
jacobi.c | 63 int bn_jacobi(const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) { 65 // For any odd BIGNUM n, 85 BIGNUM *A = BN_CTX_get(ctx); 86 BIGNUM *B = BN_CTX_get(ctx); 137 BIGNUM *tmp = A;
|
bytes.c | 65 BIGNUM *BN_bin2bn(const uint8_t *in, size_t len, BIGNUM *ret) { 69 BIGNUM *bn = NULL; 111 BIGNUM *BN_le2bn(const uint8_t *in, size_t len, BIGNUM *ret) { 112 BIGNUM *bn = NULL; 145 size_t BN_bn2bin(const BIGNUM *in, uint8_t *out) { 165 int BN_bn2le_padded(uint8_t *out, size_t len, const BIGNUM *in) { 183 int BN_bn2bin_padded(uint8_t *out, size_t len, const BIGNUM *in) { 203 BN_ULONG BN_get_word(const BIGNUM *bn) [all...] |
prime.c | 393 static size_t num_trial_division_primes(const BIGNUM *n) { 461 static int probable_prime(BIGNUM *rnd, int bits); 462 static int probable_prime_dh(BIGNUM *rnd, int bits, const BIGNUM *add, 463 const BIGNUM *rem, BN_CTX *ctx); 464 static int probable_prime_dh_safe(BIGNUM *rnd, int bits, const BIGNUM *add, 465 const BIGNUM *rem, BN_CTX *ctx); 482 int BN_generate_prime_ex(BIGNUM *ret, int bits, int safe, const BIGNUM *add [all...] |
gcd_extra.c | 49 static int bn_gcd_consttime(BIGNUM *r, unsigned *out_shift, const BIGNUM *x, 50 const BIGNUM *y, BN_CTX *ctx) { 61 BIGNUM *u = BN_CTX_get(ctx); 62 BIGNUM *v = BN_CTX_get(ctx); 63 BIGNUM *tmp = BN_CTX_get(ctx); 122 int BN_gcd(BIGNUM *r, const BIGNUM *x, const BIGNUM *y, BN_CTX *ctx) { 128 int bn_is_relatively_prime(int *out_relatively_prime, const BIGNUM *x [all...] |
/external/boringssl/src/crypto/fipsmodule/ec/ |
internal.h | 125 int (*group_set_curve)(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, 126 const BIGNUM *b, BN_CTX *); 173 const BIGNUM *in); 174 int (*felem_to_bignum)(const EC_GROUP *group, BIGNUM *out, 203 BIGNUM order; 212 BIGNUM field; // For curves over GF(p), this is the modulus. 253 int ec_bignum_to_felem(const EC_GROUP *group, EC_FELEM *out, const BIGNUM *in); 255 // ec_felem_to_bignum converts |in| to a |BIGNUM|. It returns one on success and 257 int ec_felem_to_bignum(const EC_GROUP *group, BIGNUM *out, const EC_FELEM *in) 447 BIGNUM bignum; member in struct:__anon15456 [all...] |
/external/boringssl/src/crypto/fipsmodule/rsa/ |
blinding.c | 124 BIGNUM *A; // The base blinding factor, Montgomery-encoded. 125 BIGNUM *Ai; // The inverse of the blinding factor, Montgomery-encoded. 129 static int bn_blinding_create_param(BN_BLINDING *b, const BIGNUM *e, 170 static int bn_blinding_update(BN_BLINDING *b, const BIGNUM *e, 197 int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, const BIGNUM *e, 209 int BN_BLINDING_invert(BIGNUM *n, const BN_BLINDING *b, BN_MONT_CTX *mont, 216 static int bn_blinding_create_param(BN_BLINDING *b, const BIGNUM *e,
|
/external/boringssl/src/crypto/dh/ |
params.c | 60 BIGNUM *BN_get_rfc3526_prime_1536(BIGNUM *ret) { 76 static const BIGNUM kPrime1536BN = STATIC_BIGNUM(kPrime1536Data); 78 BIGNUM *alloc = NULL;
|