/external/boringssl/src/crypto/bn/ |
convert.c | 69 BIGNUM *BN_bin2bn(const uint8_t *in, size_t len, BIGNUM *ret) { 72 BIGNUM *bn = NULL; 114 size_t BN_bn2bin(const BIGNUM *in, uint8_t *out) { 146 static BN_ULONG read_word_padded(const BIGNUM *in, size_t i) { 155 int BN_bn2bin_padded(uint8_t *out, size_t len, const BIGNUM *in) { 194 char *BN_bn2hex(const BIGNUM *bn) { 231 static void decode_hex(BIGNUM *bn, const char *in, int i) { 267 static void decode_dec(BIGNUM *bn, const char *in, int in_len) { 288 typedef void (*decode_func) (BIGNUM *bn, const char *in, int i) [all...] |
random.c | 118 int BN_rand(BIGNUM *rnd, int bits, int top, int bottom) { 180 int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom) { 184 int BN_rand_range(BIGNUM *r, const BIGNUM *range) { 243 int BN_pseudo_rand_range(BIGNUM *r, const BIGNUM *range) { 247 int BN_generate_dsa_nonce(BIGNUM *out, const BIGNUM *range, const BIGNUM *priv,
|
shift.c | 66 int BN_lshift(BIGNUM *r, const BIGNUM *a, int n) { 104 int BN_lshift1(BIGNUM *r, const BIGNUM *a) { 135 int BN_rshift(BIGNUM *r, const BIGNUM *a, int n) { 188 int BN_rshift1(BIGNUM *r, const BIGNUM *a) { 221 int BN_set_bit(BIGNUM *a, int n) { 245 int BN_clear_bit(BIGNUM *a, int n) [all...] |
montgomery.c | 173 int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *mod, BN_CTX *ctx) { 175 BIGNUM *Ri, *R; 176 BIGNUM tmod; 297 const BIGNUM *mod, BN_CTX *bn_ctx) { 328 int BN_to_montgomery(BIGNUM *ret, const BIGNUM *a, const BN_MONT_CTX *mont, 334 static int BN_from_montgomery_word(BIGNUM *ret, BIGNUM *r, 336 const BIGNUM *n; 422 static int BN_from_montgomery_word(BIGNUM *ret, BIGNUM *r, const BN_MONT_CTX *mont [all...] |
exponentiation.c | 128 int BN_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx) { 130 BIGNUM *v, *rr; 190 BIGNUM N; /* the divisor */ 191 BIGNUM Nr; /* the reciprocal */ 213 static int BN_RECP_CTX_set(BN_RECP_CTX *recp, const BIGNUM *d, BN_CTX *ctx) { 228 static int BN_reciprocal(BIGNUM *r, const BIGNUM *m, int len, BN_CTX *ctx) { 230 BIGNUM *t [all...] |
kronecker.c | 62 int BN_kronecker(const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) { 65 BIGNUM *A, *B, *tmp; 67 * For any odd BIGNUM n,
|
ctx.c | 70 /* The bignum values */ 71 BIGNUM vals[BN_CTX_POOL_SIZE]; 86 static BIGNUM *BN_POOL_get(BN_POOL *); 95 /* Array of indexes into the bignum stack */ 112 /* The bignum bundles */ 161 BIGNUM *BN_CTX_get(BN_CTX *ctx) { 162 BIGNUM *ret; 176 /* OK, make sure the returned bignum is "zero" */ 244 BIGNUM *bn = p->head->vals; 258 static BIGNUM *BN_POOL_get(BN_POOL *p) [all...] |
sqrt.c | 65 BIGNUM *BN_mod_sqrt(BIGNUM *in, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx) { 66 BIGNUM *ret = in; 69 BIGNUM *A, *b, *q, *t, *x, *y; 432 int BN_sqrt(BIGNUM *out_sqrt, const BIGNUM *in, BN_CTX *ctx) { 433 BIGNUM *estimate, *tmp, *delta, *last_delta, *tmp2;
|
/external/openssh/ |
kexgex.c | 53 const BIGNUM *prime, 54 const BIGNUM *gen, 55 const BIGNUM *client_dh_pub, 56 const BIGNUM *server_dh_pub, 57 const BIGNUM *shared_secret,
|
monitor_wrap.h | 53 int mm_auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **); 54 int mm_auth_rsa_verify_response(Key *, BIGNUM *, u_char *); 55 BIGNUM *mm_auth_rsa_generate_challenge(Key *); 87 int mm_ssh1_session_key(BIGNUM *);
|
kexdh.c | 51 const BIGNUM *client_dh_pub, 52 const BIGNUM *server_dh_pub, 53 const BIGNUM *shared_secret,
|
rsa.c | 75 rsa_public_encrypt(BIGNUM *out, BIGNUM *in, RSA *key) 121 rsa_private_decrypt(BIGNUM *out, BIGNUM *in, RSA *key) 164 BIGNUM *aux = NULL;
|
auth.h | 121 int auth_rsa(Authctxt *, BIGNUM *); 123 BIGNUM *auth_rsa_generate_challenge(Key *); 124 int auth_rsa_verify_response(Key *, BIGNUM *, u_char[]); 125 int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **); 210 int ssh1_session_key(BIGNUM *);
|
auth-rsa.c | 73 BIGNUM * 76 BIGNUM *challenge; 94 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) 139 BIGNUM *challenge, *encrypted_challenge; 172 const BIGNUM *client_n, Key **rkey) 284 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) 311 auth_rsa(Authctxt *authctxt, BIGNUM *client_n)
|
/external/boringssl/src/crypto/ec/ |
ec_montgomery.c | 179 int ec_GFp_mont_group_set_curve(EC_GROUP *group, const BIGNUM *p, 180 const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) { 183 BIGNUM *one = NULL; 232 int ec_GFp_mont_field_mul(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, 233 const BIGNUM *b, BN_CTX *ctx) { 242 int ec_GFp_mont_field_sqr(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, 252 int ec_GFp_mont_field_encode(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a [all...] |
simple.c | 166 int ec_GFp_simple_group_set_curve(EC_GROUP *group, const BIGNUM *p, 167 const BIGNUM *a, const BIGNUM *b, 171 BIGNUM *tmp_a; 233 int ec_GFp_simple_group_get_curve(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, 234 BIGNUM *b, BN_CTX *ctx) { 279 BIGNUM *a, *b, *order, *tmp_1, *tmp_2; 280 const BIGNUM *p = &group->field; 389 const EC_GROUP *group, EC_POINT *point, const BIGNUM *x, const BIGNUM *y [all...] |
/external/boringssl/src/include/openssl/ |
rsa.h | 100 OPENSSL_EXPORT int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, 443 int (*mod_exp)(BIGNUM *r0, const BIGNUM *I, RSA *rsa, 445 int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, 446 const BIGNUM *m, BN_CTX *ctx, 451 int (*keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); 468 BIGNUM *n; 469 BIGNUM *e [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 34 static BIGNUM * get_group5_prime(void) 382 BIGNUM *bn_base, *bn_exp, *bn_modulus, *bn_result; 616 BIGNUM *pub_key; 936 BIGNUM *bn = BN_bin2bn(buf, len, NULL); 944 BN_clear_free((BIGNUM *) n); 946 BN_free((BIGNUM *) n); 958 num_bytes = BN_num_bytes((const BIGNUM *) a); 967 BN_bn2bin((const BIGNUM *) a, buf + offset); 977 return BN_add((BIGNUM *) c, (const BIGNUM *) a, (const BIGNUM *) b) [all...] |
/external/vboot_reference/host/lib/ |
util_misc.c | 36 BIGNUM *N = NULL; 37 BIGNUM *Big1 = NULL, *Big2 = NULL, *Big32 = NULL, *BigMinus1 = NULL; 38 BIGNUM *B = NULL; 39 BIGNUM *N0inv = NULL, *R = NULL, *RR = NULL; 40 BIGNUM *RRTemp = NULL, *NnumBits = NULL; 41 BIGNUM *n = NULL, *rr = NULL;
|
/external/boringssl/src/crypto/asn1/ |
a_enum.c | 139 ASN1_ENUMERATED *BN_to_ASN1_ENUMERATED(BIGNUM *bn, ASN1_ENUMERATED *ai) 175 BIGNUM *ASN1_ENUMERATED_to_BN(ASN1_ENUMERATED *ai, BIGNUM *bn) 177 BIGNUM *ret;
|
t_pkey.c | 63 int ASN1_bn_print(BIO *bp, const char *number, const BIGNUM *num,
|
/external/boringssl/src/crypto/ecdsa/ |
ecdsa.c | 108 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, 109 const BIGNUM *order) { 142 BIGNUM *order, *u1, *u2, *m, *X; 234 static int ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, 235 BIGNUM **rp, const uint8_t *digest, 238 BIGNUM *k = NULL, *r = NULL, *order = NULL, *X = NULL; 352 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, BIGNUM **rp) { 357 const BIGNUM *in_kinv, const BIGNUM *in_r [all...] |
/external/vboot_reference/utility/ |
dumpRSAPublicKey.c | 8 * /tools/DumpPublicKey.java). Uses the OpenSSL X509 and BIGNUM library. 43 BIGNUM *N = key->n; 44 BIGNUM *Big1 = NULL, *Big2 = NULL, *Big32 = NULL, *BigMinus1 = NULL; 45 BIGNUM *B = NULL; 46 BIGNUM *N0inv= NULL, *R = NULL, *RR = NULL, *RRTemp = NULL, *NnumBits = NULL; 47 BIGNUM *n = NULL, *rr = NULL;
|
/system/extras/verity/ |
generate_verity_key.c | 49 BIGNUM* r32 = BN_new(); 50 BIGNUM* rr = BN_new(); 51 BIGNUM* r = BN_new(); 52 BIGNUM* rem = BN_new(); 53 BIGNUM* n = BN_new(); 54 BIGNUM* n0inv = BN_new(); 179 BIGNUM* exponent = BN_new();
|
/external/boringssl/src/crypto/dh/ |
check.c | 64 int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key, int *ret) { 66 BIGNUM q; 104 BIGNUM *t1 = NULL, *t2 = NULL;
|