/external/openssl/crypto/rsa/ |
rsa_test.c | 27 key->dmp1 = BN_bin2bn(dmp1, sizeof(dmp1)-1, key->dmp1); \ 60 static unsigned char dmp1[] = local 106 static unsigned char dmp1[] = local 167 static unsigned char dmp1[] = local
|
rsa_asn1.c | 88 ASN1_SIMPLE(RSA, dmp1, BIGNUM),
|
rsa_chk.c | 131 if (key->dmp1 != NULL && key->dmq1 != NULL && key->iqmp != NULL) 133 /* dmp1 = d mod (p-1)? */ 140 if (BN_cmp(j, key->dmp1) != 0)
|
rsa_gen.c | 111 if(!rsa->dmp1 && ((rsa->dmp1=BN_new()) == NULL)) goto err; 189 if (!BN_mod(rsa->dmp1,d,r1,ctx)) goto err;
|
rsa_lib.c | 174 ret->dmp1=NULL; 241 if (r->dmp1 != NULL) BN_clear_free(r->dmp1); 451 t[3]= &r->dmp1;
|
rsa_eay.c | 415 (rsa->dmp1 != NULL) && 539 (rsa->dmp1 != NULL) && 719 BIGNUM *dmp1,*dmq1,*c,*pr1; local 798 /* compute r1^dmp1 mod p */ 801 dmp1 = &local_dmp1; 802 BN_with_flags(dmp1, rsa->dmp1, BN_FLG_CONSTTIME); 805 dmp1 = rsa->dmp1; 806 if (!rsa->meth->bn_mod_exp(r0,r1,dmp1,rsa->p,ctx [all...] |
rsa_ameth.c | 199 update_buflen(x->dmp1, &buf_len); 242 if (!ASN1_bn_print(bp,"exponent1:",x->dmp1,m,off))
|
rsa.h | 143 BIGNUM *dmp1; member in struct:rsa_st
|
/external/wpa_supplicant/ |
rsa.c | 32 struct bignum *dmp1; /* d mod (p - 1); CRT exponent */ member in struct:crypto_rsa_key 151 key->dmp1 = bignum_init(); 156 key->p == NULL || key->q == NULL || key->dmp1 == NULL || 206 pos = crypto_rsa_parse_integer(pos, end, key->dmp1); 276 * dmp1 = (1/e) mod (p-1) 279 * m1 = c^dmp1 mod p 289 /* a = tmp^dmp1 mod p */ 290 if (bignum_exptmod(tmp, key->dmp1, key->p, a) < 0) 354 bignum_deinit(key->dmp1);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
rsa.c | 32 struct bignum *dmp1; /* d mod (p - 1); CRT exponent */ member in struct:crypto_rsa_key 152 key->dmp1 = bignum_init(); 157 key->p == NULL || key->q == NULL || key->dmp1 == NULL || 207 pos = crypto_rsa_parse_integer(pos, end, key->dmp1); 278 * dmp1 = (1/e) mod (p-1) 281 * m1 = c^dmp1 mod p 291 /* a = tmp^dmp1 mod p */ 292 if (bignum_exptmod(tmp, key->dmp1, key->p, a) < 0) 356 bignum_deinit(key->dmp1);
|
/external/wpa_supplicant_8/src/tls/ |
rsa.c | 31 struct bignum *dmp1; /* d mod (p - 1); CRT exponent */ member in struct:crypto_rsa_key 150 key->dmp1 = bignum_init(); 155 key->p == NULL || key->q == NULL || key->dmp1 == NULL || 205 pos = crypto_rsa_parse_integer(pos, end, key->dmp1); 275 * dmp1 = (1/e) mod (p-1) 278 * m1 = c^dmp1 mod p 288 /* a = tmp^dmp1 mod p */ 289 if (bignum_exptmod(tmp, key->dmp1, key->p, a) < 0) 353 bignum_deinit(key->dmp1);
|
/external/ipsec-tools/src/racoon/ |
prsa_par.y | 189 if (!rsa_cur->p || !rsa_cur->q || !rsa_cur->dmp1 193 if (rsa_cur->dmp1) BN_clear_free(rsa_cur->dmp1); 199 rsa_cur->dmp1 = NULL; 314 { if (!rsa_cur->dmp1) rsa_cur->dmp1 = $3; else { prsaerror ("Exponent1 already defined\n"); YYABORT; } }
|
plainrsa-gen.c | 141 fprintf(fp, "\tExponent1: 0x%s\n", lowercase(BN_bn2hex(key->dmp1)));
|
/external/dropbear/ |
keyimport.c | 578 * dmp1, dmq1, iqmp in that order. (The last three are d mod 633 * OpenSSH key order is n, e, d, p, q, dmp1, dmq1, iqmp 710 mp_int dmp1, dmq1, iqmp, tmpval; /* for rsa */ local 775 m_mp_init(&dmp1); 779 /* dmp1 = d mod (p-1) */ 784 if (mp_mod(key->rsakey->d, &tmpval, &dmp1) != MP_OKAY) { 785 fprintf(stderr, "Bignum error for dmp1\n"); 806 buf_putmpint(extrablob, &dmp1); 810 mp_clear(&dmp1); 815 /* dmp1 */ [all...] |
/external/openssl/include/openssl/ |
rsa.h | 143 BIGNUM *dmp1; member in struct:rsa_st
|
/external/openssl/crypto/pem/ |
pvkfmt.c | 396 if (!read_lebn(&p, hnbyte, &rsa->dmp1)) 600 || (BN_num_bytes(rsa->dmp1) > hnbyte) 622 write_lebn(out, rsa->dmp1, hnbyte);
|
/external/v8/benchmarks/ |
crypto.js | [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/v8-v4/ |
v8-crypto.js | [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/v8-v5/ |
v8-crypto.js | [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/v8-v6/ |
v8-crypto.js | [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 1053 if (!rsa->p || !rsa->q || !rsa->dmp1 || !rsa->dmq1 || !rsa->iqmp) { 1060 /* inputs: rsa->p rsa->q I rsa->dmp1 rsa->dmq1 rsa->iqmp */ 1067 if (bn2crparam(rsa->dmp1, &kop.crk_param[3])) [all...] |