HomeSort by relevance Sort by last modified time
    Searched refs:BIGNUM (Results 1 - 25 of 164) sorted by null

1 2 3 4 5 6 7

  /external/openssh/
rsa.h 22 int rsa_public_encrypt(BIGNUM *, BIGNUM *, RSA *);
23 int rsa_private_decrypt(BIGNUM *, BIGNUM *, RSA *);
dh.h 31 BIGNUM *g;
32 BIGNUM *p;
37 DH *dh_new_group(BIGNUM *, BIGNUM *);
43 int dh_pub_is_valid(DH *, BIGNUM *);
bufbn.c 33 buffer_put_bignum_ret(Buffer *buffer, const BIGNUM *value)
45 buffer_put_bignum(Buffer *buffer, const BIGNUM *value)
52 buffer_get_bignum_ret(Buffer *buffer, BIGNUM *value)
64 buffer_get_bignum(Buffer *buffer, BIGNUM *value)
72 buffer_put_bignum2_ret(Buffer *buffer, const BIGNUM *value)
84 buffer_put_bignum2(Buffer *buffer, const BIGNUM *value)
91 buffer_get_bignum2_ret(Buffer *buffer, BIGNUM *value)
103 buffer_get_bignum2(Buffer *buffer, BIGNUM *value)
kex.h 178 int kex_derive_keys_bn(struct ssh *, u_char *, u_int, const BIGNUM *);
192 const BIGNUM *, const BIGNUM *, const BIGNUM *, u_char *, size_t *);
197 const BIGNUM *, const BIGNUM *, const BIGNUM *,
198 const BIGNUM *, const BIGNUM *,
203 const EC_POINT *, const EC_POINT *, const BIGNUM *, u_char *, size_t *)
    [all...]
buffer.h 52 void buffer_put_bignum(Buffer *, const BIGNUM *);
53 void buffer_put_bignum2(Buffer *, const BIGNUM *);
54 void buffer_get_bignum(Buffer *, BIGNUM *);
55 void buffer_get_bignum2(Buffer *, BIGNUM *);
78 int buffer_put_bignum_ret(Buffer *, const BIGNUM *);
79 int buffer_get_bignum_ret(Buffer *, BIGNUM *);
80 int buffer_put_bignum2_ret(Buffer *, const BIGNUM *);
81 int buffer_get_bignum2_ret(Buffer *, BIGNUM *);
  /external/boringssl/src/include/openssl/
bn.h 169 /* BN_new creates a new, allocated BIGNUM and initialises it. */
170 OPENSSL_EXPORT BIGNUM *BN_new(void);
172 /* BN_init initialises a stack allocated |BIGNUM|. */
173 OPENSSL_EXPORT void BN_init(BIGNUM *bn);
177 OPENSSL_EXPORT void BN_free(BIGNUM *bn);
181 OPENSSL_EXPORT void BN_clear_free(BIGNUM *bn);
183 /* BN_dup allocates a new BIGNUM and sets it equal to |src|. It returns the
184 * allocated BIGNUM on success or NULL otherwise. */
185 OPENSSL_EXPORT BIGNUM *BN_dup(const BIGNUM *src)
    [all...]
dh.h 93 OPENSSL_EXPORT void DH_get0_key(const DH *dh, const BIGNUM **out_pub_key,
94 const BIGNUM **out_priv_key);
98 OPENSSL_EXPORT void DH_get0_pqg(const DH *dh, const BIGNUM **out_p,
99 const BIGNUM **out_q, const BIGNUM **out_g);
114 * 3526 and returns |ret|. If |ret| is NULL then a fresh |BIGNUM| is allocated
116 OPENSSL_EXPORT BIGNUM *BN_get_rfc3526_prime_1536(BIGNUM *ret);
146 OPENSSL_EXPORT int DH_compute_key(uint8_t *out, const BIGNUM *peers_key,
186 OPENSSL_EXPORT int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key
    [all...]
ecdsa.h 99 BIGNUM *r;
100 BIGNUM *s;
106 /* ECDSA_SIG_free frees |sig| its member |BIGNUM|s. */
132 BIGNUM **kinv, BIGNUM **rp);
138 const BIGNUM *kinv, const BIGNUM *rp,
145 unsigned int *sig_len, const BIGNUM *kinv,
146 const BIGNUM *rp, const EC_KEY *eckey);
ec.h 130 /* EC_GROUP_get0_order returns a pointer to the internal |BIGNUM| object in
132 OPENSSL_EXPORT const BIGNUM *EC_GROUP_get0_order(const EC_GROUP *group);
137 BIGNUM *cofactor, BN_CTX *ctx);
144 OPENSSL_EXPORT int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *out_p,
145 BIGNUM *out_a, BIGNUM *out_b,
218 BIGNUM *x, BIGNUM *y,
227 const BIGNUM *x,
228 const BIGNUM *y
    [all...]
  /external/boringssl/src/crypto/ec/
internal.h 86 int (*group_set_curve)(EC_GROUP *, const BIGNUM *p, const BIGNUM *a,
87 const BIGNUM *b, BN_CTX *);
89 BIGNUM *x, BIGNUM *y, BN_CTX *);
96 int (*mul)(const EC_GROUP *group, EC_POINT *r, const BIGNUM *g_scalar,
97 const EC_POINT *p, const BIGNUM *p_scalar, BN_CTX *ctx);
102 int (*field_mul)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a,
103 const BIGNUM *b, BN_CTX *)
    [all...]
ec_montgomery.c 118 int ec_GFp_mont_group_set_curve(EC_GROUP *group, const BIGNUM *p,
119 const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) {
159 int ec_GFp_mont_field_mul(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a,
160 const BIGNUM *b, BN_CTX *ctx) {
169 int ec_GFp_mont_field_sqr(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a,
179 int ec_GFp_mont_field_encode(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a
    [all...]
  /external/tpm2/
CpriMisc_fp.h 10 BIGNUM *BnFrom2B(BIGNUM *out, // OUT: The BIGNUM
14 BIGNUM *inVal, // IN: number to convert
CpriMisc.c 15 // This function is used to convert a BigNum() to a byte array of the specified size. If the number is too large
27 BIGNUM *inVal, // IN: number to convert
69 // This function creates a BIGNUM from a TPM2B and fails if the conversion fails.
71 BIGNUM *
73 BIGNUM *out, // OUT: The BIGNUM
  /external/boringssl/src/crypto/bn/
bn.c 68 BIGNUM *BN_new(void) {
69 BIGNUM *bn = OPENSSL_malloc(sizeof(BIGNUM));
76 OPENSSL_memset(bn, 0, sizeof(BIGNUM));
82 void BN_init(BIGNUM *bn) {
83 OPENSSL_memset(bn, 0, sizeof(BIGNUM));
86 void BN_free(BIGNUM *bn) {
102 void BN_clear_free(BIGNUM *bn) {
117 OPENSSL_cleanse(bn, sizeof(BIGNUM));
123 BIGNUM *BN_dup(const BIGNUM *src)
    [all...]
gcd.c 117 static BIGNUM *euclid(BIGNUM *a, BIGNUM *b) {
118 BIGNUM *t;
186 int BN_gcd(BIGNUM *r, const BIGNUM *in_a, const BIGNUM *in_b, BN_CTX *ctx) {
187 BIGNUM *a, *b, *t;
228 static int bn_mod_inverse_general(BIGNUM *out, int *out_no_inverse,
229 const BIGNUM *a, const BIGNUM *n
    [all...]
cmp.c 64 int BN_ucmp(const BIGNUM *a, const BIGNUM *b) {
86 int BN_cmp(const BIGNUM *a, const BIGNUM *b) {
177 int BN_abs_is_word(const BIGNUM *bn, BN_ULONG w) {
188 int BN_cmp_word(const BIGNUM *a, BN_ULONG b) {
189 BIGNUM b_bn;
199 int BN_is_zero(const BIGNUM *bn) {
203 int BN_is_one(const BIGNUM *bn) {
207 int BN_is_word(const BIGNUM *bn, BN_ULONG w)
    [all...]
div.c 192 int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor,
195 BIGNUM *tmp, wnum, *snum, *sdiv, *res;
389 int BN_nnmod(BIGNUM *r, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx) {
401 int BN_mod_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m
    [all...]
prime.c 332 static int witness(BIGNUM *w, const BIGNUM *a, const BIGNUM *a1,
333 const BIGNUM *a1_odd, int k, BN_CTX *ctx, BN_MONT_CTX *mont);
334 static int probable_prime(BIGNUM *rnd, int bits);
335 static int probable_prime_dh(BIGNUM *rnd, int bits, const BIGNUM *add,
336 const BIGNUM *rem, BN_CTX *ctx);
337 static int probable_prime_dh_safe(BIGNUM *rnd, int bits, const BIGNUM *add
    [all...]
internal.h 143 BIGNUM *bn_expand(BIGNUM *bn, size_t bits);
204 int bn_set_words(BIGNUM *bn, const BN_ULONG *words, size_t num);
230 uint64_t bn_mont_n0(const BIGNUM *n);
231 int bn_mod_exp_base_2_vartime(BIGNUM *r, unsigned p, const BIGNUM *n);
244 int bn_mod_inverse_prime(BIGNUM *out, const BIGNUM *a, const BIGNUM *p,
250 int bn_mod_inverse_secret_prime(BIGNUM *out, const BIGNUM *a, const BIGNUM *p
    [all...]
add.c 67 int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) {
68 const BIGNUM *tmp;
104 int BN_uadd(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) {
107 const BIGNUM *tmp;
162 int BN_add_word(BIGNUM *a, BN_ULONG w) {
204 int BN_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b)
    [all...]
convert.c 72 BIGNUM *BN_bin2bn(const uint8_t *in, size_t len, BIGNUM *ret) {
76 BIGNUM *bn = NULL;
121 BIGNUM *BN_le2bn(const uint8_t *in, size_t len, BIGNUM *ret) {
122 BIGNUM *bn = NULL;
157 size_t BN_bn2bin(const BIGNUM *in, uint8_t *out) {
169 int BN_bn2le_padded(uint8_t *out, size_t len, const BIGNUM *in) {
206 static BN_ULONG read_word_padded(const BIGNUM *in, size_t i) {
215 int BN_bn2bin_padded(uint8_t *out, size_t len, const BIGNUM *in)
    [all...]
montgomery.c 128 static int bn_mod_mul_montgomery_fallback(BIGNUM *r, const BIGNUM *a,
129 const BIGNUM *b,
176 int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *mod, BN_CTX *ctx) {
227 const BIGNUM *mod, BN_CTX *bn_ctx) {
258 int BN_to_montgomery(BIGNUM *ret, const BIGNUM *a, const BN_MONT_CTX *mont,
263 static int BN_from_montgomery_word(BIGNUM *ret, BIGNUM *r,
268 const BIGNUM *n = &mont->N
    [all...]
  /external/boringssl/src/crypto/rsa/
internal.h 83 BIGNUM *e_value, BN_GENCB *cb);
84 int rsa_default_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb);
92 int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, const BIGNUM *e,
94 int BN_BLINDING_invert(BIGNUM *n, const BN_BLINDING *b, BN_MONT_CTX *mont_ctx,
123 BIGNUM *prime;
125 BIGNUM *exp;
127 BIGNUM *coeff;
132 BIGNUM *r;
  /external/wpa_supplicant_8/src/eap_common/
eap_pwd_common.h 24 BIGNUM *order;
25 BIGNUM *prime;
64 int compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k,
65 const BIGNUM *peer_scalar, const BIGNUM *server_scalar,
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
poloutil.cc 24 // Use OpenSSL BigNum functions to perform the conversion.
25 BIGNUM* bn = BN_bin2bn(bytes, length, NULL);
35 // Use OpenSSL BigNum functions to perform the conversion.
36 BIGNUM* bn = NULL;
47 // Use OpenSSL BigNum functions to perform the conversion.
48 BIGNUM* bn = BN_new();
65 // Use OpenSSL BigNum functions to perform the conversion.
66 BIGNUM* bn = BN_bin2bn(bytes, 4, NULL);

Completed in 239 milliseconds

1 2 3 4 5 6 7