/external/openssl/crypto/rsa/ |
H A D | rsa_test.c | 28 key->dmq1 = BN_bin2bn(dmq1, sizeof(dmq1)-1, key->dmq1); \ 64 static unsigned char dmq1[] = local 110 static unsigned char dmq1[] = local 173 static unsigned char dmq1[] = local
|
H A D | rsa_asn1.c | 89 ASN1_SIMPLE(RSA, dmq1, BIGNUM),
|
H A D | rsa_chk.c | 131 if (key->dmp1 != NULL && key->dmq1 != NULL && key->iqmp != NULL) 147 /* dmq1 = d mod (q-1)? */ 154 if (BN_cmp(j, key->dmq1) != 0)
|
H A D | rsa_gen.c | 112 if(!rsa->dmq1 && ((rsa->dmq1=BN_new()) == NULL)) goto err; 192 if (!BN_mod(rsa->dmq1,d,r2,ctx)) goto err;
|
H A D | rsa_eay.c | 416 (rsa->dmq1 != NULL) && 540 (rsa->dmq1 != NULL) && 719 BIGNUM *dmp1,*dmq1,*c,*pr1; local 775 /* compute r1^dmq1 mod q */ 778 dmq1 = &local_dmq1; 779 BN_with_flags(dmq1, rsa->dmq1, BN_FLG_CONSTTIME); 782 dmq1 = rsa->dmq1; 783 if (!rsa->meth->bn_mod_exp(m1,r1,dmq1,rs [all...] |
H A D | rsa_lib.c | 175 ret->dmq1=NULL; 242 if (r->dmq1 != NULL) BN_clear_free(r->dmq1); 452 t[4]= &r->dmq1;
|
H A D | rsa_ameth.c | 200 update_buflen(x->dmq1, &buf_len); 244 if (!ASN1_bn_print(bp,"exponent2:",x->dmq1,m,off))
|
H A D | rsa.h | 144 BIGNUM *dmq1; member in struct:rsa_st
|
/external/ipsec-tools/src/racoon/ |
H A D | prsa_par.y | 190 || !rsa_cur->dmq1 || !rsa_cur->iqmp) { 194 if (rsa_cur->dmq1) BN_clear_free(rsa_cur->dmq1); 200 rsa_cur->dmq1 = NULL; 303 { if (!rsa_cur->dmq1) rsa_cur->dmq1 = $3; else { prsaerror ("Exponent2 already defined\n"); YYABORT; } }
|
H A D | plainrsa-gen.c | 146 fprintf(fp, "\tExponent2: 0x%s\n", lowercase(BN_bn2hex(key->dmq1)));
|
/external/wpa_supplicant/ |
H A D | rsa.c | 33 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key 152 key->dmq1 = bignum_init(); 157 key->dmq1 == NULL || key->iqmp == NULL) { 207 pos = crypto_rsa_parse_integer(pos, end, key->dmq1); 277 * dmq1 = (1/e) mod (q-1) 280 * m2 = c^dmq1 mod q 293 /* b = tmp^dmq1 mod q */ 294 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) 355 bignum_deinit(key->dmq1);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | rsa.c | 33 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key 153 key->dmq1 = bignum_init(); 158 key->dmq1 == NULL || key->iqmp == NULL) { 208 pos = crypto_rsa_parse_integer(pos, end, key->dmq1); 279 * dmq1 = (1/e) mod (q-1) 282 * m2 = c^dmq1 mod q 295 /* b = tmp^dmq1 mod q */ 296 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) 357 bignum_deinit(key->dmq1);
|
/external/dropbear/ |
H A D | keyimport.c | 578 * dmp1, dmq1, iqmp in that order. (The last three are d mod 633 * OpenSSH key order is n, e, d, p, q, dmp1, dmq1, iqmp 710 mp_int dmp1, dmq1, iqmp, tmpval; /* for rsa */ local 776 m_mp_init(&dmq1); 789 /* dmq1 = d mod (q-1) */ 794 if (mp_mod(key->rsakey->d, &tmpval, &dmq1) != MP_OKAY) { 795 fprintf(stderr, "Bignum error for dmq1\n"); 807 buf_putmpint(extrablob, &dmq1); 811 mp_clear(&dmq1); 820 /* dmq1 */ [all...] |
/external/openssl/include/openssl/ |
H A D | rsa.h | 144 BIGNUM *dmq1; member in struct:rsa_st
|
/external/openssl/crypto/pem/ |
H A D | pvkfmt.c | 398 if (!read_lebn(&p, hnbyte, &rsa->dmq1)) 601 || (BN_num_bytes(rsa->dmq1) > hnbyte)) 623 write_lebn(out, rsa->dmq1, hnbyte);
|
/external/v8/benchmarks/ |
H A D | crypto.js | 1506 this.dmq1 = null; 1586 this.dmq1 = parseBigInt(DQ,16); 1620 this.dmq1 = this.d.mod(q1); 1634 var xq = x.mod(this.q).modPow(this.dmq1, this.q);
|
/external/webkit/SunSpider/tests/v8-v4/ |
H A D | v8-crypto.js | 1498 this.dmq1 = null; 1578 this.dmq1 = parseBigInt(DQ,16); 1612 this.dmq1 = this.d.mod(q1); 1626 var xq = x.mod(this.q).modPow(this.dmq1, this.q);
|
/external/openssl/crypto/engine/ |
H A D | eng_cryptodev.c | 1053 if (!rsa->p || !rsa->q || !rsa->dmp1 || !rsa->dmq1 || !rsa->iqmp) { 1060 /* inputs: rsa->p rsa->q I rsa->dmp1 rsa->dmq1 rsa->iqmp */ 1069 if (bn2crparam(rsa->dmq1, &kop.crk_param[4]))
|