/external/dropbear/libtomcrypt/src/misc/crypt/ |
crypt_ltc_mp_descriptor.c | 13 ltc_math_descriptor ltc_mp; variable
|
crypt_fsa.c | 19 /* format is ltc_mp, cipher_desc, [cipher_desc], NULL, hash_desc, [hash_desc], NULL, prng_desc, [prng_desc], NULL */ 28 XMEMCPY(<c_mp, mp, sizeof(ltc_mp));
|
/external/dropbear/libtomcrypt/demos/ |
timing.c | 10 ltc_mp = ltm_desc; 12 ltc_mp = tfm_desc; 14 ltc_mp = gmp_desc; 17 ltc_mp = EXT_MATH_LIB;
|
test.c | 9 ltc_mp = ltm_desc; 11 ltc_mp = tfm_desc; 13 ltc_mp = gmp_desc; 16 ltc_mp = EXT_MATH_LIB;
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_math.h | 422 extern ltc_math_descriptor ltc_mp; 441 #define MP_DIGIT_BIT ltc_mp.bits_per_digit 444 #define mp_init(a) ltc_mp.init(a) 446 #define mp_clear(a) ltc_mp.deinit(a) 448 #define mp_init_copy(a, b) ltc_mp.init_copy(a, b) 450 #define mp_neg(a, b) ltc_mp.neg(a, b) 451 #define mp_copy(a, b) ltc_mp.copy(a, b) 453 #define mp_set(a, b) ltc_mp.set_int(a, b) 454 #define mp_set_int(a, b) ltc_mp.set_int(a, b) 455 #define mp_get_int(a) ltc_mp.get_int(a [all...] |
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ltc_ecc_mulmod.c | 98 if ((err = ltc_mp.ecc_ptdbl(tG, M[0], modulus, mp)) != CRYPT_OK) { goto done; } 99 if ((err = ltc_mp.ecc_ptdbl(M[0], M[0], modulus, mp)) != CRYPT_OK) { goto done; } 100 if ((err = ltc_mp.ecc_ptdbl(M[0], M[0], modulus, mp)) != CRYPT_OK) { goto done; } 104 if ((err = ltc_mp.ecc_ptadd(M[j-9], tG, M[j-8], modulus, mp)) != CRYPT_OK) { goto done; } 123 bitcnt = (int) ltc_mp.bits_per_digit; 128 i = (buf >> (ltc_mp.bits_per_digit - 1)) & 1; 138 if ((err = ltc_mp.ecc_ptdbl(R, R, modulus, mp)) != CRYPT_OK) { goto done; } 159 if ((err = ltc_mp.ecc_ptdbl(R, R, modulus, mp)) != CRYPT_OK) { goto done; } 163 if ((err = ltc_mp.ecc_ptadd(R, M[bitbuf-8], R, modulus, mp)) != CRYPT_OK) { goto done; } 177 if ((err = ltc_mp.ecc_ptdbl(R, R, modulus, mp)) != CRYPT_OK) { goto done; [all...] |
ltc_ecc_mulmod_timing.c | 94 if ((err = ltc_mp.ecc_ptdbl(tG, M[1], modulus, mp)) != CRYPT_OK) { goto done; } 122 if ((err = ltc_mp.ecc_ptadd(M[0], M[1], M[2], modulus, mp)) != CRYPT_OK) { goto done; } 123 if ((err = ltc_mp.ecc_ptdbl(M[1], M[2], modulus, mp)) != CRYPT_OK) { goto done; } 130 if ((err = ltc_mp.ecc_ptadd(M[0], M[1], M[2], modulus, mp)) != CRYPT_OK) { goto done; } 131 if ((err = ltc_mp.ecc_ptdbl(M[1], M[2], modulus, mp)) != CRYPT_OK) { goto done; } 135 if ((err = ltc_mp.ecc_ptadd(M[0], M[1], M[i^1], modulus, mp)) != CRYPT_OK) { goto done; } 136 if ((err = ltc_mp.ecc_ptdbl(M[i], M[i], modulus, mp)) != CRYPT_OK) { goto done; }
|
ecc_verify_hash.c | 124 if (ltc_mp.ecc_mul2add == NULL) { 125 if ((err = ltc_mp.ecc_ptmul(u1, mG, mG, m, 0)) != CRYPT_OK) { goto error; } 126 if ((err = ltc_mp.ecc_ptmul(u2, mQ, mQ, m, 0)) != CRYPT_OK) { goto error; } 132 if ((err = ltc_mp.ecc_ptadd(mQ, mG, mG, m, mp)) != CRYPT_OK) { goto error; } 135 if ((err = ltc_mp.ecc_map(mG, m, mp)) != CRYPT_OK) { goto error; } 138 if ((err = ltc_mp.ecc_mul2add(mG, u1, mQ, u2, mG, m)) != CRYPT_OK) { goto error; }
|
ltc_ecc_mul2add.c | 117 if ((err = ltc_mp.ecc_ptdbl(precomp[1], precomp[2], modulus, mp)) != CRYPT_OK) { goto ERR_MU; } 118 if ((err = ltc_mp.ecc_ptadd(precomp[1], precomp[2], precomp[3], modulus, mp)) != CRYPT_OK) { goto ERR_MU; } 121 if ((err = ltc_mp.ecc_ptdbl(precomp[1<<2], precomp[2<<2], modulus, mp)) != CRYPT_OK) { goto ERR_MU; } 122 if ((err = ltc_mp.ecc_ptadd(precomp[1<<2], precomp[2<<2], precomp[3<<2], modulus, mp)) != CRYPT_OK) { goto ERR_MU; } 127 if ((err = ltc_mp.ecc_ptadd(precomp[x], precomp[(y<<2)], precomp[x+(y<<2)], modulus, mp)) != CRYPT_OK) { goto ERR_MU; } 160 if ((err = ltc_mp.ecc_ptdbl(C, C, modulus, mp)) != CRYPT_OK) { goto ERR_MU; } 161 if ((err = ltc_mp.ecc_ptdbl(C, C, modulus, mp)) != CRYPT_OK) { goto ERR_MU; } 174 if ((err = ltc_mp.ecc_ptadd(C, precomp[nA + (nB<<2)], C, modulus, mp)) != CRYPT_OK) { goto ERR_MU; }
|
ecc_make_key.c | 59 LTC_ARGCHK(ltc_mp.name != NULL); 102 if ((err = ltc_mp.ecc_ptmul(key->k, base, &key->pubkey, prime, 1)) != CRYPT_OK) { goto errkey; }
|
ecc_shared_secret.c | 72 if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, prime, 1)) != CRYPT_OK) { goto done; }
|
ecc_test.c | 76 if ((err = ltc_mp.ecc_ptmul(order, G, GG, modulus, 1)) != CRYPT_OK) { goto done; }
|
ecc_import.c | 102 LTC_ARGCHK(ltc_mp.name != NULL);
|
/external/dropbear/libtomcrypt/testprof/ |
ecc_test.c | 70 DO(ltc_mp.ecc_ptmul(rA, G, A, modulus, 1)); 73 DO(ltc_mp.ecc_ptmul(rB, G, B, modulus, 1)); 82 DO(ltc_mp.ecc_ptmul(kA, A, C1, modulus, 0)); 83 DO(ltc_mp.ecc_ptmul(kB, B, C2, modulus, 0)); 84 DO(ltc_mp.ecc_ptadd(C1, C2, C1, modulus, mp)); 85 DO(ltc_mp.ecc_map(C1, modulus, mp)); 88 DO(ltc_mp.ecc_mul2add(A, kA, B, kB, C2, modulus));
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_decrypt_key.c | 83 if ((err = ltc_mp.rsa_me(in, inlen, tmp, &x, PK_PRIVATE, key)) != CRYPT_OK) {
|
rsa_encrypt_key.c | 95 return ltc_mp.rsa_me(out, x, out, outlen, PK_PUBLIC, key);
|
rsa_sign_hash.c | 127 return ltc_mp.rsa_me(out, x, out, outlen, PK_PRIVATE, key);
|
rsa_verify_hash.c | 82 if ((err = ltc_mp.rsa_me(sig, siglen, tmpbuf, &x, PK_PUBLIC, key)) != CRYPT_OK) {
|
rsa_import.c | 38 LTC_ARGCHK(ltc_mp.name != NULL);
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_import.c | 34 LTC_ARGCHK(ltc_mp.name != NULL);
|
dsa_make_key.c | 36 LTC_ARGCHK(ltc_mp.name != NULL);
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
katja_import.c | 34 LTC_ARGCHK(ltc_mp.name != NULL);
|
katja_make_key.c | 34 LTC_ARGCHK(ltc_mp.name != NULL);
|
/external/dropbear/libtomcrypt/src/math/fp/ |
ltc_ecc_fp_mulmod.c | [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 18 #define mp_unsigned_bin_size(a) ltc_mp.unsigned_size(a) 19 #define mp_to_unsigned_bin(a, b) ltc_mp.unsigned_write(a, b) 20 #define mp_read_unsigned_bin(a, b, c) ltc_mp.unsigned_read(a, b, c) 21 #define mp_exptmod(a,b,c,d) ltc_mp.exptmod(a,b,c,d) 672 ltc_mp = tfm_desc;
|