/external/openssl/crypto/bn/ |
bn_recp.c | 94 int BN_RECP_CTX_set(BN_RECP_CTX *recp, const BIGNUM *d, BN_CTX *ctx) 103 int BN_mod_mul_reciprocal(BIGNUM *r, const BIGNUM *x, const BIGNUM *y, 107 BIGNUM *a; 108 const BIGNUM *ca; 130 int BN_div_recp(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, 134 BIGNUM *a,*b,*d,*r [all...] |
bn_gf2m.c | 229 int BN_GF2m_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) 232 const BIGNUM *at, *bt; 267 int BN_GF2m_mod_arr(BIGNUM *r, const BIGNUM *a, const int p[]) 365 int BN_GF2m_mod(BIGNUM *r, const BIGNUM *a, const BIGNUM *p) 386 int BN_GF2m_mod_mul_arr(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const int p[], BN_CTX *ctx [all...] |
bn_blind.c | 120 BIGNUM *A; 121 BIGNUM *Ai; 122 BIGNUM *e; 123 BIGNUM *mod; /* just a reference */ 132 int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, 133 const BIGNUM *m, BN_CTX *ctx, 137 BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod [all...] |
bn_gcd.c | 115 static BIGNUM *euclid(BIGNUM *a, BIGNUM *b); 117 int BN_gcd(BIGNUM *r, const BIGNUM *in_a, const BIGNUM *in_b, BN_CTX *ctx) 119 BIGNUM *a,*b,*t; 147 static BIGNUM *euclid(BIGNUM *a, BIGNUM *b [all...] |
bn_add.c | 64 int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) 66 const BIGNUM *tmp; 105 int BN_uadd(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) 109 const BIGNUM *tmp; 166 int BN_usub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto.h | 462 * struct crypto_bignum - bignum 464 * Internal data structure for bignum implementation. The contents is specific 470 * crypto_bignum_init - Allocate memory for bignum 471 * Returns: Pointer to allocated bignum or %NULL on failure 476 * crypto_bignum_init_set - Allocate memory for bignum and set the value 479 * Returns: Pointer to allocated bignum or %NULL on failure 484 * crypto_bignum_deinit - Free bignum 485 * @n: Bignum from crypto_bignum_init() or crypto_bignum_init_set() 491 * crypto_bignum_to_bin - Set binary buffer to unsigned bignum 492 * @a: Bignum [all...] |
crypto_internal-modexp.c | 12 #include "tls/bignum.h" 21 struct bignum *bn_base, *bn_exp, *bn_modulus, *bn_result;
|
/external/chromium_org/third_party/openssl/openssl/crypto/bn/ |
bn_gf2m.c | 229 int BN_GF2m_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) 232 const BIGNUM *at, *bt; 267 int BN_GF2m_mod_arr(BIGNUM *r, const BIGNUM *a, const int p[]) 365 int BN_GF2m_mod(BIGNUM *r, const BIGNUM *a, const BIGNUM *p) 386 int BN_GF2m_mod_mul_arr(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const int p[], BN_CTX *ctx [all...] |
bn_blind.c | 120 BIGNUM *A; 121 BIGNUM *Ai; 122 BIGNUM *e; 123 BIGNUM *mod; /* just a reference */ 132 int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, 133 const BIGNUM *m, BN_CTX *ctx, 137 BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod [all...] |
bn_gcd.c | 115 static BIGNUM *euclid(BIGNUM *a, BIGNUM *b); 117 int BN_gcd(BIGNUM *r, const BIGNUM *in_a, const BIGNUM *in_b, BN_CTX *ctx) 119 BIGNUM *a,*b,*t; 147 static BIGNUM *euclid(BIGNUM *a, BIGNUM *b [all...] |
bn_add.c | 64 int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) 66 const BIGNUM *tmp; 105 int BN_uadd(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) 109 const BIGNUM *tmp; 166 int BN_usub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/ec/ |
ec_lib.c | 284 int EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator, const BIGNUM *order, const BIGNUM *cofactor) 319 int EC_GROUP_get_order(const EC_GROUP *group, BIGNUM *order, BN_CTX *ctx) 328 int EC_GROUP_get_cofactor(const EC_GROUP *group, BIGNUM *cofactor, BN_CTX *ctx) 407 int EC_GROUP_set_curve_GFp(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) 418 int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx [all...] |
ec2_mult.c | 84 static int gf2m_Mdouble(const EC_GROUP *group, BIGNUM *x, BIGNUM *z, BN_CTX *ctx) 86 BIGNUM *t1; 115 static int gf2m_Madd(const EC_GROUP *group, const BIGNUM *x, BIGNUM *x1, BIGNUM *z1, 116 const BIGNUM *x2, const BIGNUM *z2, BN_CTX *ctx) 118 BIGNUM *t1, *t2; 152 static int gf2m_Mxy(const EC_GROUP *group, const BIGNUM *x, const BIGNUM *y, BIGNUM *x1, [all...] |
ecp_smpl.c | 176 const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) 180 BIGNUM *tmp_a; 230 int ec_GFp_simple_group_get_curve(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx) 290 BIGNUM *a,*b,*order,*tmp_1,*tmp_2; 291 const BIGNUM *p = &group->field; 402 const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *ctx [all...] |
/external/openssl/crypto/ec/ |
ec_lib.c | 284 int EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator, const BIGNUM *order, const BIGNUM *cofactor) 319 int EC_GROUP_get_order(const EC_GROUP *group, BIGNUM *order, BN_CTX *ctx) 328 int EC_GROUP_get_cofactor(const EC_GROUP *group, BIGNUM *cofactor, BN_CTX *ctx) 407 int EC_GROUP_set_curve_GFp(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) 418 int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx [all...] |
ec2_mult.c | 84 static int gf2m_Mdouble(const EC_GROUP *group, BIGNUM *x, BIGNUM *z, BN_CTX *ctx) 86 BIGNUM *t1; 115 static int gf2m_Madd(const EC_GROUP *group, const BIGNUM *x, BIGNUM *x1, BIGNUM *z1, 116 const BIGNUM *x2, const BIGNUM *z2, BN_CTX *ctx) 118 BIGNUM *t1, *t2; 152 static int gf2m_Mxy(const EC_GROUP *group, const BIGNUM *x, const BIGNUM *y, BIGNUM *x1, [all...] |
ecp_smpl.c | 176 const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) 180 BIGNUM *tmp_a; 230 int ec_GFp_simple_group_get_curve(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx) 290 BIGNUM *a,*b,*order,*tmp_1,*tmp_2; 291 const BIGNUM *p = &group->field; 402 const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *ctx [all...] |
/external/openssh/ |
jpake.c | 195 BIGNUM **priv1, BIGNUM **priv2, BIGNUM **g_priv1, BIGNUM **g_priv2, 246 jpake_step2(struct modp_group *grp, BIGNUM *s, 247 BIGNUM *mypub1, BIGNUM *theirpub1, BIGNUM *theirpub2, BIGNUM *mypriv2, 252 BIGNUM **newpub [all...] |
/external/chromium_org/v8/test/mjsunit/ |
toint32.js | 117 // bignum is (2^53 - 1) * 2^31 - highest number with bit 31 set. 118 var bignum = Math.pow(2, 84) - Math.pow(2, 31); variable 119 assertEquals(-Math.pow(2,31), toInt32(bignum)); 120 assertEquals(-Math.pow(2,31), toInt32(-bignum)); 121 assertEquals(0, toInt32(2 * bignum)); 122 assertEquals(0, toInt32(-(2 * bignum))); 123 assertEquals(0, toInt32(bignum - Math.pow(2,31))); 124 assertEquals(0, toInt32(-(bignum - Math.pow(2,31))));
|
/external/v8/test/mjsunit/ |
toint32.js | 117 // bignum is (2^53 - 1) * 2^31 - highest number with bit 31 set. 118 var bignum = Math.pow(2, 84) - Math.pow(2, 31); variable 119 assertEquals(-Math.pow(2,31), toInt32(bignum)); 120 assertEquals(-Math.pow(2,31), toInt32(-bignum)); 121 assertEquals(0, toInt32(2 * bignum)); 122 assertEquals(0, toInt32(-(2 * bignum))); 123 assertEquals(0, toInt32(bignum - Math.pow(2,31))); 124 assertEquals(0, toInt32(-(bignum - Math.pow(2,31))));
|
/external/chromium_org/third_party/openssl/openssl/crypto/ecdsa/ |
ecdsa.h | 80 BIGNUM *r; 81 BIGNUM *s; 124 * \param kinv BIGNUM with a pre-computed inverse k (optional) 125 * \param rp BIGNUM with a pre-computed rp value (optioanl), 131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); 173 * \param kinv BIGNUM pointer for the inverse of k 174 * \param rp BIGNUM pointer for x coordinate of k * generator 177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, 178 BIGNUM **rp) [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ecdsa.h | 80 BIGNUM *r; 81 BIGNUM *s; 124 * \param kinv BIGNUM with a pre-computed inverse k (optional) 125 * \param rp BIGNUM with a pre-computed rp value (optioanl), 131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); 173 * \param kinv BIGNUM pointer for the inverse of k 174 * \param rp BIGNUM pointer for x coordinate of k * generator 177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, 178 BIGNUM **rp) [all...] |
/external/openssl/crypto/ecdsa/ |
ecdsa.h | 80 BIGNUM *r; 81 BIGNUM *s; 124 * \param kinv BIGNUM with a pre-computed inverse k (optional) 125 * \param rp BIGNUM with a pre-computed rp value (optioanl), 131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); 173 * \param kinv BIGNUM pointer for the inverse of k 174 * \param rp BIGNUM pointer for x coordinate of k * generator 177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, 178 BIGNUM **rp) [all...] |
/external/openssl/include/openssl/ |
ecdsa.h | 80 BIGNUM *r; 81 BIGNUM *s; 124 * \param kinv BIGNUM with a pre-computed inverse k (optional) 125 * \param rp BIGNUM with a pre-computed rp value (optioanl), 131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); 173 * \param kinv BIGNUM pointer for the inverse of k 174 * \param rp BIGNUM pointer for x coordinate of k * generator 177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, 178 BIGNUM **rp) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/jpake/ |
jpaketest.c | 18 static void showbn(const char *name, const BIGNUM *bn) 117 BIGNUM *p = NULL; 118 BIGNUM *g = NULL; 119 BIGNUM *q = NULL; 120 BIGNUM *secret = BN_new();
|