HomeSort by relevance Sort by last modified time
    Searched refs:dmq1 (Results 1 - 18 of 18) sorted by null

  /external/openssl/crypto/rsa/
rsa_test.c 28 key->dmq1 = BN_bin2bn(dmq1, sizeof(dmq1)-1, key->dmq1); \
64 static unsigned char dmq1[] = local
110 static unsigned char dmq1[] = local
173 static unsigned char dmq1[] = local
rsa_asn1.c 99 ASN1_SIMPLE(RSA, dmq1, BIGNUM),
rsa_chk.c 131 if (key->dmp1 != NULL && key->dmq1 != NULL && key->iqmp != NULL)
147 /* dmq1 = d mod (q-1)? */
154 if (BN_cmp(j, key->dmq1) != 0)
rsa_eng.c 201 ret->dmq1=NULL;
268 if (r->dmq1 != NULL) BN_clear_free(r->dmq1);
326 t[4]= &r->dmq1;
rsa_gen.c 114 if(!rsa->dmq1 && ((rsa->dmq1=BN_new()) == NULL)) goto err;
194 if (!BN_mod(rsa->dmq1,d,r2,ctx)) goto err;
rsa_x931g.c 175 rsa->dmq1=BN_new();
176 if (rsa->dmq1 == NULL)
178 if (!BN_mod(rsa->dmq1,rsa->d,r2,ctx))
rsa_eay.c 414 (rsa->dmq1 != NULL) &&
538 (rsa->dmq1 != NULL) &&
717 BIGNUM *dmp1,*dmq1,*c,*pr1; local
773 /* compute r1^dmq1 mod q */
776 dmq1 = &local_dmq1;
777 BN_with_flags(dmq1, rsa->dmq1, BN_FLG_CONSTTIME);
780 dmq1 = rsa->dmq1;
781 if (!rsa->meth->bn_mod_exp(m1,r1,dmq1,rsa->q,ctx
    [all...]
rsa.h 162 BIGNUM *dmq1; member in struct:rsa_st
  /external/ipsec-tools/src/racoon/
prsa_par.y 190 || !rsa_cur->dmq1 || !rsa_cur->iqmp) {
194 if (rsa_cur->dmq1) BN_clear_free(rsa_cur->dmq1);
200 rsa_cur->dmq1 = NULL;
303 { if (!rsa_cur->dmq1) rsa_cur->dmq1 = $3; else { prsaerror ("Exponent2 already defined\n"); YYABORT; } }
plainrsa-gen.c 146 fprintf(fp, "\tExponent2: 0x%s\n", lowercase(BN_bn2hex(key->dmq1)));
  /external/wpa_supplicant/
rsa.c 33 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key
152 key->dmq1 = bignum_init();
157 key->dmq1 == NULL || key->iqmp == NULL) {
207 pos = crypto_rsa_parse_integer(pos, end, key->dmq1);
277 * dmq1 = (1/e) mod (q-1)
280 * m2 = c^dmq1 mod q
293 /* b = tmp^dmq1 mod q */
294 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0)
355 bignum_deinit(key->dmq1);
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
rsa.c 33 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key
153 key->dmq1 = bignum_init();
158 key->dmq1 == NULL || key->iqmp == NULL) {
208 pos = crypto_rsa_parse_integer(pos, end, key->dmq1);
279 * dmq1 = (1/e) mod (q-1)
282 * m2 = c^dmq1 mod q
295 /* b = tmp^dmq1 mod q */
296 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0)
357 bignum_deinit(key->dmq1);
  /external/openssl/crypto/asn1/
t_pkey.c 132 if (x->dmq1)
133 if (buf_len < (i = (size_t)BN_num_bytes(x->dmq1)))
173 if ((x->dmq1 != NULL) && !print(bp,"exponent2:",x->dmq1,m,off))
  /external/dropbear/
keyimport.c 578 * dmp1, dmq1, iqmp in that order. (The last three are d mod
633 * OpenSSH key order is n, e, d, p, q, dmp1, dmq1, iqmp
710 mp_int dmp1, dmq1, iqmp, tmpval; /* for rsa */ local
776 m_mp_init(&dmq1);
789 /* dmq1 = d mod (q-1) */
794 if (mp_mod(key->rsakey->d, &tmpval, &dmq1) != MP_OKAY) {
795 fprintf(stderr, "Bignum error for dmq1\n");
807 buf_putmpint(extrablob, &dmq1);
811 mp_clear(&dmq1);
820 /* dmq1 */
    [all...]
  /external/openssl/include/openssl/
rsa.h 162 BIGNUM *dmq1; member in struct:rsa_st
  /external/openssl/crypto/engine/
eng_cryptodev.c 782 if (!rsa->p || !rsa->q || !rsa->dmp1 || !rsa->dmq1 || !rsa->iqmp) {
789 /* inputs: rsa->p rsa->q I rsa->dmp1 rsa->dmq1 rsa->iqmp */
798 if (bn2crparam(rsa->dmq1, &kop.crk_param[4]))
  /external/v8/benchmarks/
crypto.js     [all...]
  /external/webkit/SunSpider/tests/v8-v4/
v8-crypto.js     [all...]

Completed in 743 milliseconds