HomeSort by relevance Sort by last modified time
    Searched refs:kinv (Results 1 - 14 of 14) sorted by null

  /external/openssl/crypto/ecdsa/
ecs_sign.c 69 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey)
74 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey);
84 *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r,
89 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
ecdsa.h 124 * \param kinv BIGNUM with a pre-computed inverse k (optional)
131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
173 * \param kinv BIGNUM pointer for the inverse of k
177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
201 * \param kinv BIGNUM with a pre-computed inverse k (optional)
208 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv,
ecs_locl.h 74 BIGNUM **kinv, BIGNUM **r,
ecs_ossl.c 246 BIGNUM *kinv=NULL, *s, *m=NULL,*tmp=NULL,*order=NULL; local
305 if (!ecdsa->meth->ecdsa_sign_setup(eckey, ctx, &kinv, &ret->r, dgst, dgst_len))
310 ckinv = kinv;
339 /* if kinv and r have been supplied by the caller
340 * don't to generate new kinv and r values */
368 if (kinv)
369 BN_clear_free(kinv);
  /external/openssl/crypto/dsa/
dsa_ossl.c 135 BIGNUM *kinv=NULL,*r=NULL,*s=NULL; local
157 if ((dsa->kinv == NULL) || (dsa->r == NULL))
159 if (!dsa->meth->dsa_sign_setup(dsa,ctx,&kinv,&r,dgst,dlen))
164 kinv=dsa->kinv;
165 dsa->kinv=NULL;
185 if (!BN_mod_mul(s,s,kinv,dsa->q,ctx)) goto err;
214 if (kinv != NULL) /* dsa->kinv is NULL now if we used it */
215 BN_clear_free(kinv);
224 BIGNUM k,kq,*K,*kinv=NULL,*r=NULL; local
    [all...]
dsa_lib.c 174 ret->kinv=NULL;
228 if (r->kinv != NULL) BN_clear_free(r->kinv);
dsa.h 175 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
  /external/chromium_org/third_party/boringssl/src/include/openssl/
ecdsa.h 133 * |*kinv| and |*rp| to the precomputed values and uses the |ctx| argument, if
135 OPENSSL_EXPORT int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
142 const BIGNUM *kinv, const BIGNUM *rp,
149 unsigned int *sig_len, const BIGNUM *kinv,
dsa.h 349 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
  /external/openssl/include/openssl/
ecdsa.h 124 * \param kinv BIGNUM with a pre-computed inverse k (optional)
131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
173 * \param kinv BIGNUM pointer for the inverse of k
177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
201 * \param kinv BIGNUM with a pre-computed inverse k (optional)
208 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv,
dsa.h 175 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
  /external/chromium_org/third_party/boringssl/src/crypto/dsa/
dsa_impl.c 79 BIGNUM k, kq, *K, *kinv = NULL, *r = NULL; local
155 kinv = BN_mod_inverse(NULL, &k, dsa->q, ctx);
156 if (kinv == NULL) {
163 *kinvp = kinv;
164 kinv = NULL;
188 BIGNUM *kinv = NULL, *r = NULL, *s = NULL; local
214 if (dsa->kinv == NULL || dsa->r == NULL) {
215 if (!DSA_sign_setup(dsa, ctx, &kinv, &r)) {
219 kinv = dsa->kinv;
    [all...]
dsa.c 138 if (dsa->kinv != NULL)
139 BN_clear_free(dsa->kinv);
  /external/chromium_org/third_party/boringssl/src/crypto/ecdsa/
ecdsa.c 354 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, BIGNUM **rp) {
355 return ecdsa_sign_setup(eckey, ctx, kinv, rp, NULL, 0);
362 BIGNUM *kinv = NULL, *s, *m = NULL, *tmp = NULL, *order = NULL; local
404 if (!ecdsa_sign_setup(eckey, ctx, &kinv, &ret->r, digest, digest_len)) {
408 ckinv = kinv;
430 /* if kinv and r have been supplied by the caller
431 * don't to generate new kinv and r values */
457 if (kinv)
458 BN_clear_free(kinv);
463 uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv,
    [all...]

Completed in 127 milliseconds