HomeSort by relevance Sort by last modified time
    Searched refs:kinv (Results 1 - 10 of 10) sorted by null

  /external/openssl/crypto/ecdsa/
ecs_sign.c 68 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey)
73 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey);
83 *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r,
88 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
ecdsa.h 124 * \param kinv BIGNUM with a pre-computed inverse k (optional)
131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
173 * \param kinv BIGNUM pointer for the inverse of k
177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
201 * \param kinv BIGNUM with a pre-computed inverse k (optional)
208 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv,
ecs_locl.h 73 int (*ecdsa_sign_setup)(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
ecs_ossl.c 226 BIGNUM *kinv=NULL, *s, *m=NULL,*tmp=NULL,*order=NULL; local
285 if (!ECDSA_sign_setup(eckey, ctx, &kinv, &ret->r))
290 ckinv = kinv;
319 /* if kinv and r have been supplied by the caller
320 * don't to generate new kinv and r values */
348 if (kinv)
349 BN_clear_free(kinv);
  /external/openssl/crypto/dsa/
dsa_ossl.c 133 BIGNUM *kinv=NULL,*r=NULL,*s=NULL; local
155 if ((dsa->kinv == NULL) || (dsa->r == NULL))
157 if (!DSA_sign_setup(dsa,ctx,&kinv,&r)) goto err;
161 kinv=dsa->kinv;
162 dsa->kinv=NULL;
182 if (!BN_mod_mul(s,s,kinv,dsa->q,ctx)) goto err;
211 if (kinv != NULL) /* dsa->kinv is NULL now if we used it */
212 BN_clear_free(kinv);
219 BIGNUM k,kq,*K,*kinv=NULL,*r=NULL; local
    [all...]
dsa_lib.c 174 ret->kinv=NULL;
228 if (r->kinv != NULL) BN_clear_free(r->kinv);
dsa.h 170 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
  /external/openssl/include/openssl/
ecdsa.h 124 * \param kinv BIGNUM with a pre-computed inverse k (optional)
131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
173 * \param kinv BIGNUM pointer for the inverse of k
177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
201 * \param kinv BIGNUM with a pre-computed inverse k (optional)
208 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv,
dsa.h 170 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
  /external/dropbear/libtomcrypt/src/pk/dsa/
dsa_sign_hash.c 35 void *k, *kinv, *tmp; local
62 if ((err = mp_init_multi(&k, &kinv, &tmp, NULL)) != CRYPT_OK) { goto ERRBUF; }
84 if ((err = mp_invmod(k, key->q, kinv)) != CRYPT_OK) { goto error; }
96 if ((err = mp_mulmod(s, kinv, key->q, s)) != CRYPT_OK) { goto error; }
102 mp_clear_multi(k, kinv, tmp, NULL);

Completed in 73 milliseconds