/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 80 static BIGNUM * get_group5_prime(void) 475 BIGNUM *bn_base, *bn_exp, *bn_modulus, *bn_result; 678 BIGNUM *p = NULL, *g; 679 const BIGNUM *priv_key = NULL, *pub_key = NULL; 763 BIGNUM *p = NULL, *g, *priv_key = NULL, *pub_key = NULL; 803 BIGNUM *pub_key; 1123 BIGNUM *bn; 1136 BN_clear_free((BIGNUM *) n); 1138 BN_free((BIGNUM *) n); 1153 num_bytes = BN_num_bytes((const BIGNUM *) a) [all...] |
crypto.h | 489 * struct crypto_bignum - bignum 491 * Internal data structure for bignum implementation. The contents is specific 497 * crypto_bignum_init - Allocate memory for bignum 498 * Returns: Pointer to allocated bignum or %NULL on failure 503 * crypto_bignum_init_set - Allocate memory for bignum and set the value 506 * Returns: Pointer to allocated bignum or %NULL on failure 511 * crypto_bignum_deinit - Free bignum 512 * @n: Bignum from crypto_bignum_init() or crypto_bignum_init_set() 518 * crypto_bignum_to_bin - Set binary buffer to unsigned bignum 519 * @a: Bignum [all...] |
crypto_internal-modexp.c | 12 #include "tls/bignum.h" 21 struct bignum *bn_base, *bn_exp, *bn_modulus, *bn_result;
|
/external/boringssl/src/crypto/bn/ |
gcd.c | 117 static BIGNUM *euclid(BIGNUM *a, BIGNUM *b) { 118 BIGNUM *t; 186 int BN_gcd(BIGNUM *r, const BIGNUM *in_a, const BIGNUM *in_b, BN_CTX *ctx) { 187 BIGNUM *a, *b, *t; 228 static int bn_mod_inverse_general(BIGNUM *out, int *out_no_inverse, 229 const BIGNUM *a, const BIGNUM *n [all...] |
add.c | 67 int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) { 68 const BIGNUM *tmp; 104 int BN_uadd(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) { 107 const BIGNUM *tmp; 162 int BN_add_word(BIGNUM *a, BN_ULONG w) { 204 int BN_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b) [all...] |
exponentiation.c | 139 int BN_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx) { 141 BIGNUM *v, *rr; 195 BIGNUM N; /* the divisor */ 196 BIGNUM Nr; /* the reciprocal */ 219 static int BN_RECP_CTX_set(BN_RECP_CTX *recp, const BIGNUM *d, BN_CTX *ctx) { 234 static int BN_reciprocal(BIGNUM *r, const BIGNUM *m, int len, BN_CTX *ctx) { 236 BIGNUM *t [all...] |
montgomery.c | 128 static int bn_mod_mul_montgomery_fallback(BIGNUM *r, const BIGNUM *a, 129 const BIGNUM *b, 176 int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *mod, BN_CTX *ctx) { 227 const BIGNUM *mod, BN_CTX *bn_ctx) { 258 int BN_to_montgomery(BIGNUM *ret, const BIGNUM *a, const BN_MONT_CTX *mont, 263 static int BN_from_montgomery_word(BIGNUM *ret, BIGNUM *r, 268 const BIGNUM *n = &mont->N [all...] |
convert.c | 72 BIGNUM *BN_bin2bn(const uint8_t *in, size_t len, BIGNUM *ret) { 76 BIGNUM *bn = NULL; 121 BIGNUM *BN_le2bn(const uint8_t *in, size_t len, BIGNUM *ret) { 122 BIGNUM *bn = NULL; 157 size_t BN_bn2bin(const BIGNUM *in, uint8_t *out) { 169 int BN_bn2le_padded(uint8_t *out, size_t len, const BIGNUM *in) { 206 static BN_ULONG read_word_padded(const BIGNUM *in, size_t i) { 215 int BN_bn2bin_padded(uint8_t *out, size_t len, const BIGNUM *in) [all...] |
bn_asn1.c | 21 int BN_parse_asn1_unsigned(CBS *cbs, BIGNUM *ret) { 45 int BN_parse_asn1_unsigned_buggy(CBS *cbs, BIGNUM *ret) { 61 int BN_marshal_asn1(CBB *cbb, const BIGNUM *bn) {
|
ctx.c | 72 /* The bignum values */ 73 BIGNUM vals[BN_CTX_POOL_SIZE]; 88 static BIGNUM *BN_POOL_get(BN_POOL *); 97 /* Array of indexes into the bignum stack */ 114 /* The bignum bundles */ 163 BIGNUM *BN_CTX_get(BN_CTX *ctx) { 164 BIGNUM *ret; 178 /* OK, make sure the returned bignum is "zero" */ 246 BIGNUM *bn = p->head->vals; 260 static BIGNUM *BN_POOL_get(BN_POOL *p) [all...] |
shift.c | 66 int BN_lshift(BIGNUM *r, const BIGNUM *a, int n) { 104 int BN_lshift1(BIGNUM *r, const BIGNUM *a) { 135 int BN_rshift(BIGNUM *r, const BIGNUM *a, int n) { 192 int BN_rshift1(BIGNUM *r, const BIGNUM *a) { 229 int BN_set_bit(BIGNUM *a, int n) { 253 int BN_clear_bit(BIGNUM *a, int n) [all...] |
prime.c | 332 static int witness(BIGNUM *w, const BIGNUM *a, const BIGNUM *a1, 333 const BIGNUM *a1_odd, int k, BN_CTX *ctx, BN_MONT_CTX *mont); 334 static int probable_prime(BIGNUM *rnd, int bits); 335 static int probable_prime_dh(BIGNUM *rnd, int bits, const BIGNUM *add, 336 const BIGNUM *rem, BN_CTX *ctx); 337 static int probable_prime_dh_safe(BIGNUM *rnd, int bits, const BIGNUM *add [all...] |
/external/boringssl/src/crypto/ec/ |
simple.c | 119 int ec_GFp_simple_group_set_curve(EC_GROUP *group, const BIGNUM *p, 120 const BIGNUM *a, const BIGNUM *b, 124 BIGNUM *tmp_a; 194 int ec_GFp_simple_group_get_curve(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, 195 BIGNUM *b, BN_CTX *ctx) { 274 static int set_Jprojective_coordinate_GFp(const EC_GROUP *group, BIGNUM *out, 275 const BIGNUM *in, BN_CTX *ctx) { 291 const EC_GROUP *group, EC_POINT *point, const BIGNUM *x, const BIGNUM *y [all...] |
ec_montgomery.c | 118 int ec_GFp_mont_group_set_curve(EC_GROUP *group, const BIGNUM *p, 119 const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) { 159 int ec_GFp_mont_field_mul(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, 160 const BIGNUM *b, BN_CTX *ctx) { 169 int ec_GFp_mont_field_sqr(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, 179 int ec_GFp_mont_field_encode(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a [all...] |
/external/boringssl/src/include/openssl/ |
dh.h | 93 OPENSSL_EXPORT void DH_get0_key(const DH *dh, const BIGNUM **out_pub_key, 94 const BIGNUM **out_priv_key); 98 OPENSSL_EXPORT void DH_get0_pqg(const DH *dh, const BIGNUM **out_p, 99 const BIGNUM **out_q, const BIGNUM **out_g); 114 * 3526 and returns |ret|. If |ret| is NULL then a fresh |BIGNUM| is allocated 116 OPENSSL_EXPORT BIGNUM *BN_get_rfc3526_prime_1536(BIGNUM *ret); 146 OPENSSL_EXPORT int DH_compute_key(uint8_t *out, const BIGNUM *peers_key, 186 OPENSSL_EXPORT int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key [all...] |
ec.h | 130 /* EC_GROUP_get0_order returns a pointer to the internal |BIGNUM| object in 132 OPENSSL_EXPORT const BIGNUM *EC_GROUP_get0_order(const EC_GROUP *group); 137 BIGNUM *cofactor, BN_CTX *ctx); 144 OPENSSL_EXPORT int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *out_p, 145 BIGNUM *out_a, BIGNUM *out_b, 218 BIGNUM *x, BIGNUM *y, 227 const BIGNUM *x, 228 const BIGNUM *y [all...] |
/external/boringssl/src/crypto/ecdsa/ |
ecdsa_verify_test.cc | 53 static bssl::UniquePtr<BIGNUM> GetBIGNUM(FileTest *t, const char *key) { 59 return bssl::UniquePtr<BIGNUM>(BN_bin2bn(bytes.data(), bytes.size(), nullptr)); 64 bssl::UniquePtr<BIGNUM> x = GetBIGNUM(t, "X"); 65 bssl::UniquePtr<BIGNUM> y = GetBIGNUM(t, "Y"); 66 bssl::UniquePtr<BIGNUM> r = GetBIGNUM(t, "R"); 67 bssl::UniquePtr<BIGNUM> s = GetBIGNUM(t, "S");
|
ecdsa.c | 111 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, 112 const BIGNUM *order) { 145 BIGNUM *u1, *u2, *m, *X; 173 const BIGNUM *order = EC_GROUP_get0_order(group); 228 static int ecdsa_sign_setup(const EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, 229 BIGNUM **rp, const uint8_t *digest, 232 BIGNUM *k = NULL, *r = NULL, *tmp = NULL; 264 const BIGNUM *order = EC_GROUP_get0_order(group); 342 int ECDSA_sign_setup(const EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, 343 BIGNUM **rp) [all...] |
/external/vboot_reference/host/lib/ |
util_misc.c | 36 BIGNUM *N = NULL; 37 BIGNUM *Big1 = NULL, *Big2 = NULL, *Big32 = NULL, *BigMinus1 = NULL; 38 BIGNUM *B = NULL; 39 BIGNUM *N0inv = NULL, *R = NULL, *RR = NULL; 40 BIGNUM *RRTemp = NULL, *NnumBits = NULL; 41 BIGNUM *n = NULL, *rr = NULL;
|
/external/boringssl/src/crypto/rsa/ |
internal.h | 83 BIGNUM *e_value, BN_GENCB *cb); 84 int rsa_default_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb); 92 int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, const BIGNUM *e, 94 int BN_BLINDING_invert(BIGNUM *n, const BN_BLINDING *b, BN_MONT_CTX *mont_ctx, 123 BIGNUM *prime; 125 BIGNUM *exp; 127 BIGNUM *coeff; 132 BIGNUM *r;
|
/toolchain/binutils/binutils-2.25/gas/ |
bignum.h | 0 /* bignum.h-arbitrary precision integers 28 * integer is called a 'bignum'. *
|
/external/openssh/ |
kexgex.c | 53 const BIGNUM *prime, 54 const BIGNUM *gen, 55 const BIGNUM *client_dh_pub, 56 const BIGNUM *server_dh_pub, 57 const BIGNUM *shared_secret,
|
monitor_wrap.h | 53 int mm_auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **); 54 int mm_auth_rsa_verify_response(Key *, BIGNUM *, u_char *); 55 BIGNUM *mm_auth_rsa_generate_challenge(Key *); 87 int mm_ssh1_session_key(BIGNUM *);
|
opacket.h | 9 void ssh_packet_put_bignum(struct ssh *, BIGNUM * value); 10 void ssh_packet_put_bignum2(struct ssh *, BIGNUM * value); 20 void ssh_packet_get_bignum(struct ssh *, BIGNUM * value); 21 void ssh_packet_get_bignum2(struct ssh *, BIGNUM * value);
|
/external/wpa_supplicant_8/src/tls/ |
rsa.c | 13 #include "bignum.h" 19 struct bignum *n; /* modulus (p * q) */ 20 struct bignum *e; /* public exponent */ 22 struct bignum *d; /* private exponent */ 23 struct bignum *p; /* prime p (factor of n) */ 24 struct bignum *q; /* prime q (factor of n) */ 25 struct bignum *dmp1; /* d mod (p - 1); CRT exponent */ 26 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ 27 struct bignum *iqmp; /* 1 / q mod p; CRT coefficient */ 32 struct bignum *num [all...] |