HomeSort by relevance Sort by last modified time
    Searched full:ltc_ecc_sets (Results 1 - 11 of 11) sorted by null

  /external/dropbear/libtomcrypt/src/pk/ecc/
ecc_sizes.c 34 for (i = 0; ltc_ecc_sets[i].size != 0; i++) {
35 if (ltc_ecc_sets[i].size < *low) {
36 *low = ltc_ecc_sets[i].size;
38 if (ltc_ecc_sets[i].size > *high) {
39 *high = ltc_ecc_sets[i].size;
ecc_test.c 49 for (i = 0; ltc_ecc_sets[i].size; i++) {
51 printf("Testing %d\n", ltc_ecc_sets[i].size);
53 if ((err = mp_read_radix(modulus, (char *)ltc_ecc_sets[i].prime, 16)) != CRYPT_OK) { goto done; }
54 if ((err = mp_read_radix(order, (char *)ltc_ecc_sets[i].order, 16)) != CRYPT_OK) { goto done; }
70 if ((err = mp_read_radix(G->x, (char *)ltc_ecc_sets[i].Gx, 16)) != CRYPT_OK) { goto done; }
71 if ((err = mp_read_radix(G->y, (char *)ltc_ecc_sets[i].Gy, 16)) != CRYPT_OK) { goto done; }
ecc_make_key.c 39 for (x = 0; (keysize > ltc_ecc_sets[x].size) && (ltc_ecc_sets[x].size != 0); x++);
40 keysize = ltc_ecc_sets[x].size;
42 if (keysize > ECC_MAXSIZE || ltc_ecc_sets[x].size == 0) {
45 err = ecc_make_key_ex(prng, wprng, key, &ltc_ecc_sets[x]);
ecc_ansi_x963_import.c 71 for (x = 0; ltc_ecc_sets[x].size != 0; x++) {
72 if ((unsigned)ltc_ecc_sets[x].size >= ((inlen-1)>>1)) {
76 if (ltc_ecc_sets[x].size == 0) {
82 key->dp = &ltc_ecc_sets[x];
ecc_import.c 144 for (key->idx = 0; ltc_ecc_sets[key->idx].size && (unsigned long)ltc_ecc_sets[key->idx].size != key_size; ++key->idx);
145 if (ltc_ecc_sets[key->idx].size == 0) {
149 key->dp = &ltc_ecc_sets[key->idx];
ltc_ecc_is_valid_idx.c 34 for (x = 0; ltc_ecc_sets[x].size != 0; x++);
ecc.c 27 const ltc_ecc_set_type ltc_ecc_sets[] = { variable
  /external/dropbear/libtomcrypt/testprof/
ecc_test.c 49 for (z = 0; ltc_ecc_sets[z].name; z++) {
50 if (sizes[z] < ltc_ecc_sets[z].size) break;
52 LTC_ARGCHK(ltc_ecc_sets[z].name != NULL);
55 DO(mp_read_radix(G->x, ltc_ecc_sets[z].Gx, 16));
56 DO(mp_read_radix(G->y, ltc_ecc_sets[z].Gy, 16));
58 DO(mp_read_radix(modulus, ltc_ecc_sets[z].prime, 16));
  /external/dropbear/libtomcrypt/demos/
tv_gen.c 676 for (x = 0; ltc_ecc_sets[x].size != 0; x++) {
677 fprintf(out, "ECC-%d\n", ltc_ecc_sets[x].size*8);
680 mp_read_radix(order, (char *)ltc_ecc_sets[x].order, 16);
681 mp_read_radix(modulus, (char *)ltc_ecc_sets[x].prime, 16);
682 mp_read_radix(G->x, (char *)ltc_ecc_sets[x].Gx, 16);
683 mp_read_radix(G->y, (char *)ltc_ecc_sets[x].Gy, 16);
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_pk.h 196 /** Index into the ltc_ecc_sets[] for the parameters of this curve; if -1, then this key is using user supplied curve in dp */
210 extern const ltc_ecc_set_type ltc_ecc_sets[];
  /external/dropbear/libtomcrypt/src/math/fp/
ltc_ecc_fp_mulmod.c     [all...]

Completed in 568 milliseconds