/external/openssl/crypto/rsa/ |
rsa_test.c | 28 key->dmq1 = BN_bin2bn(dmq1, sizeof(dmq1)-1, key->dmq1); \ 64 static unsigned char dmq1[] = local 110 static unsigned char dmq1[] = local 173 static unsigned char dmq1[] = local
|
rsa_eay.c | 414 (rsa->dmq1 != NULL) && 538 (rsa->dmq1 != NULL) && 717 BIGNUM *dmp1,*dmq1,*c,*pr1; local 773 /* compute r1^dmq1 mod q */ 776 dmq1 = &local_dmq1; 777 BN_with_flags(dmq1, rsa->dmq1, BN_FLG_CONSTTIME); 780 dmq1 = rsa->dmq1; 781 if (!rsa->meth->bn_mod_exp(m1,r1,dmq1,rsa->q,ctx [all...] |
rsa.h | 162 BIGNUM *dmq1; member in struct:rsa_st
|
/external/wpa_supplicant/ |
rsa.c | 33 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key 152 key->dmq1 = bignum_init(); 157 key->dmq1 == NULL || key->iqmp == NULL) { 207 pos = crypto_rsa_parse_integer(pos, end, key->dmq1); 277 * dmq1 = (1/e) mod (q-1) 280 * m2 = c^dmq1 mod q 293 /* b = tmp^dmq1 mod q */ 294 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) 355 bignum_deinit(key->dmq1);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
rsa.c | 33 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key 153 key->dmq1 = bignum_init(); 158 key->dmq1 == NULL || key->iqmp == NULL) { 208 pos = crypto_rsa_parse_integer(pos, end, key->dmq1); 279 * dmq1 = (1/e) mod (q-1) 282 * m2 = c^dmq1 mod q 295 /* b = tmp^dmq1 mod q */ 296 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) 357 bignum_deinit(key->dmq1);
|
/external/dropbear/ |
keyimport.c | 578 * dmp1, dmq1, iqmp in that order. (The last three are d mod 633 * OpenSSH key order is n, e, d, p, q, dmp1, dmq1, iqmp 710 mp_int dmp1, dmq1, iqmp, tmpval; /* for rsa */ local 776 m_mp_init(&dmq1); 789 /* dmq1 = d mod (q-1) */ 794 if (mp_mod(key->rsakey->d, &tmpval, &dmq1) != MP_OKAY) { 795 fprintf(stderr, "Bignum error for dmq1\n"); 807 buf_putmpint(extrablob, &dmq1); 811 mp_clear(&dmq1); 820 /* dmq1 */ [all...] |
/external/openssl/include/openssl/ |
rsa.h | 162 BIGNUM *dmq1; member in struct:rsa_st
|