/external/dropbear/libtommath/ |
bn_fast_mp_montgomery_reduce.c | 26 int fast_mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho)
|
bn_fast_s_mp_sqr.c | 28 int fast_s_mp_sqr (mp_int * a, mp_int * b)
|
bn_mp_prime_next_prime.c | 23 int mp_prime_next_prime(mp_int *a, int t, int bbs_style) 27 mp_int b;
|
bn_mp_toom_mul.c | 25 int mp_toom_mul(mp_int *a, mp_int *b, mp_int *c) 27 mp_int w0, w1, w2, w3, w4, tmp1, tmp2, a0, a1, a2, b0, b1, b2;
|
bn_mp_prime_random_ex.c | 34 int mp_prime_random_ex(mp_int *a, int t, int size, int flags, ltm_prime_callback cb, void *dat)
|
bn_mp_toom_sqr.c | 20 mp_toom_sqr(mp_int *a, mp_int *b) 22 mp_int w0, w1, w2, w3, w4, tmp1, a0, a1, a2;
|
/external/dropbear/ |
rsa.c | 43 mp_int * rsa_em); 54 key->e = m_malloc(sizeof(mp_int)); 55 key->n = m_malloc(sizeof(mp_int)); 102 key->d = m_malloc(sizeof(mp_int)); 112 key->p = m_malloc(sizeof(mp_int)); 113 key->q = m_malloc(sizeof(mp_int)); 175 * mp_int e 176 * mp_int n 377 * rsa_em must be a pointer to an initialised mp_int. 381 mp_int * rsa_em) [all...] |
dss.c | 50 key->p = m_malloc(sizeof(mp_int)); 51 key->q = m_malloc(sizeof(mp_int)); 52 key->g = m_malloc(sizeof(mp_int)); 53 key->y = m_malloc(sizeof(mp_int)); 90 key->x = m_malloc(sizeof(mp_int)); 265 static unsigned char* mptobytes(mp_int *mp, int *len) {
|
session.h | 135 mp_int * dh_K; /* SSH_MSG_KEXDH_REPLY and sending SSH_MSH_NEWKEYS */ 210 mp_int *dh_e, *dh_x; /* Used during KEX */
|
cli-kex.c | 46 cli_ses.dh_e = (mp_int*)m_malloc(sizeof(mp_int)); 47 cli_ses.dh_x = (mp_int*)m_malloc(sizeof(mp_int));
|
dbutil.h | 69 #define DEF_MP_INT(X) mp_int X = {0, 0, 0, NULL}
|
common-kex.c | 474 void gen_kexdh_vals(mp_int *dh_pub, mp_int *dh_priv) { 514 void kexdh_comb_key(mp_int *dh_pub_us, mp_int *dh_priv, mp_int *dh_pub_them, 517 mp_int dh_p; 518 mp_int *dh_e = NULL, *dh_f = NULL; 532 ses.dh_K = (mp_int*)m_malloc(sizeof(mp_int));
|
random.c | 208 /* Generates a random mp_int. 209 * max is a *mp_int specifying an upper bound. 210 * rand must be an initialised *mp_int for the result. 213 void gen_random_mpint(mp_int *max, mp_int *rand) {
|
buffer.c | 268 void buf_putmpint(buffer* buf, mp_int * mp) { 310 /* Retrieve an mp_int from the buffer. 313 int buf_getmpint(buffer* buf, mp_int* mp) {
|
keyimport.c | 710 mp_int dmp1, dmq1, iqmp, tmpval; /* for rsa */ [all...] |
/external/dropbear/libtommath/etc/ |
tune.c | 60 mp_int a, b, c; 90 mp_int a, b;
|
2kprime.c | 11 mp_int q, p;
|
drprime.c | 10 mp_int a, b;
|
mersenne.c | 11 mp_int n, u;
|
pprime.c | 175 pprime (int k, int li, mp_int * p, mp_int * q) 177 mp_int a, b, c, n, x, y, z, v; 364 mp_int p, q;
|
/external/dropbear/libtommath/demo/ |
timing.c | 14 void ndraw(mp_int * a, char *name) 23 static void draw(mp_int * a) 85 mp_int a, b, c, d, e, f;
|
demo.c | 12 void ndraw(mp_int * a, char *name) 21 static void draw(mp_int * a) 54 mp_int a, b, c, d, e, f;
|
/external/dropbear/libtommath/mtest/ |
mtest.c | 44 void rand_num(mp_int *a) 56 void rand_num2(mp_int *a) 73 mp_int a, b, c, d, e;
|
/external/dropbear/libtomcrypt/src/math/ |
ltm_desc.c | 50 *a = XCALLOC(1, sizeof(mp_int)); 105 mp_int *A; 113 mp_int *A;
|
/external/dropbear/libtomcrypt/testprof/ |
x86_prof.c | 680 mp_int a, b; [all...] |