/external/wpa_supplicant/ |
rsa.c | 33 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key 152 key->dmq1 = bignum_init(); 157 key->dmq1 == NULL || key->iqmp == NULL) { 207 pos = crypto_rsa_parse_integer(pos, end, key->dmq1); 277 * dmq1 = (1/e) mod (q-1) 280 * m2 = c^dmq1 mod q 293 /* b = tmp^dmq1 mod q */ 294 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) 355 bignum_deinit(key->dmq1);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
rsa.c | 33 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key 153 key->dmq1 = bignum_init(); 158 key->dmq1 == NULL || key->iqmp == NULL) { 208 pos = crypto_rsa_parse_integer(pos, end, key->dmq1); 279 * dmq1 = (1/e) mod (q-1) 282 * m2 = c^dmq1 mod q 295 /* b = tmp^dmq1 mod q */ 296 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) 357 bignum_deinit(key->dmq1);
|
/external/ipsec-tools/src/racoon/ |
prsa_par.y | 190 || !rsa_cur->dmq1 || !rsa_cur->iqmp) { 194 if (rsa_cur->dmq1) BN_clear_free(rsa_cur->dmq1); 200 rsa_cur->dmq1 = NULL; 303 { if (!rsa_cur->dmq1) rsa_cur->dmq1 = $3; else { prsaerror ("Exponent2 already defined\n"); YYABORT; } }
|
plainrsa-gen.c | 146 fprintf(fp, "\tExponent2: 0x%s\n", lowercase(BN_bn2hex(key->dmq1)));
|
/external/openssl/crypto/rsa/ |
rsa_chk.c | 131 if (key->dmp1 != NULL && key->dmq1 != NULL && key->iqmp != NULL) 147 /* dmq1 = d mod (q-1)? */ 154 if (BN_cmp(j, key->dmq1) != 0)
|
rsa_test.c | 28 key->dmq1 = BN_bin2bn(dmq1, sizeof(dmq1)-1, key->dmq1); \ 64 static unsigned char dmq1[] = local 110 static unsigned char dmq1[] = local 173 static unsigned char dmq1[] = local
|
rsa_eay.c | 414 (rsa->dmq1 != NULL) && 538 (rsa->dmq1 != NULL) && 717 BIGNUM *dmp1,*dmq1,*c,*pr1; local 773 /* compute r1^dmq1 mod q */ 776 dmq1 = &local_dmq1; 777 BN_with_flags(dmq1, rsa->dmq1, BN_FLG_CONSTTIME); 780 dmq1 = rsa->dmq1; 781 if (!rsa->meth->bn_mod_exp(m1,r1,dmq1,rsa->q,ctx [all...] |
rsa_gen.c | 114 if(!rsa->dmq1 && ((rsa->dmq1=BN_new()) == NULL)) goto err; 194 if (!BN_mod(rsa->dmq1,d,r2,ctx)) goto err;
|
rsa_x931g.c | 175 rsa->dmq1=BN_new(); 176 if (rsa->dmq1 == NULL) 178 if (!BN_mod(rsa->dmq1,rsa->d,r2,ctx))
|
rsa_eng.c | 201 ret->dmq1=NULL; 268 if (r->dmq1 != NULL) BN_clear_free(r->dmq1); 326 t[4]= &r->dmq1;
|
rsa_asn1.c | 99 ASN1_SIMPLE(RSA, dmq1, BIGNUM),
|
rsa_err.c | 136 {ERR_REASON(RSA_R_DMQ1_NOT_CONGRUENT_TO_D),"dmq1 not congruent to d"},
|
rsa.h | 162 BIGNUM *dmq1; member in struct:rsa_st
|
/external/openssl/crypto/asn1/ |
t_pkey.c | 132 if (x->dmq1) 133 if (buf_len < (i = (size_t)BN_num_bytes(x->dmq1))) 173 if ((x->dmq1 != NULL) && !print(bp,"exponent2:",x->dmq1,m,off))
|
/external/dropbear/ |
keyimport.c | 578 * dmp1, dmq1, iqmp in that order. (The last three are d mod 633 * OpenSSH key order is n, e, d, p, q, dmp1, dmq1, iqmp 710 mp_int dmp1, dmq1, iqmp, tmpval; /* for rsa */ local 776 m_mp_init(&dmq1); 789 /* dmq1 = d mod (q-1) */ 794 if (mp_mod(key->rsakey->d, &tmpval, &dmq1) != MP_OKAY) { 795 fprintf(stderr, "Bignum error for dmq1\n"); 807 buf_putmpint(extrablob, &dmq1); 811 mp_clear(&dmq1); 820 /* dmq1 */ [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 782 if (!rsa->p || !rsa->q || !rsa->dmp1 || !rsa->dmq1 || !rsa->iqmp) { 789 /* inputs: rsa->p rsa->q I rsa->dmp1 rsa->dmq1 rsa->iqmp */ 798 if (bn2crparam(rsa->dmq1, &kop.crk_param[4]))
|
/external/openssl/include/openssl/ |
rsa.h | 162 BIGNUM *dmq1; member in struct:rsa_st
|
/external/v8/benchmarks/ |
crypto.js | [all...] |
/external/webkit/SunSpider/tests/v8-v4/ |
v8-crypto.js | [all...] |