/external/openssl/crypto/rsa/ |
H A D | rsa_test.c | 28 key->dmq1 = BN_bin2bn(dmq1, sizeof(dmq1)-1, key->dmq1); \ 64 static unsigned char dmq1[] = local 110 static unsigned char dmq1[] = local 173 static unsigned char dmq1[] = local
|
H A D | rsa_eay.c | 428 (rsa->dmq1 != NULL) && 562 (rsa->dmq1 != NULL) && 741 BIGNUM *dmp1,*dmq1,*c,*pr1; local 797 /* compute r1^dmq1 mod q */ 800 dmq1 = &local_dmq1; 801 BN_with_flags(dmq1, rsa->dmq1, BN_FLG_CONSTTIME); 804 dmq1 = rsa->dmq1; 805 if (!rsa->meth->bn_mod_exp(m1,r1,dmq1,rs [all...] |
H A D | rsa.h | 144 BIGNUM *dmq1; member in struct:rsa_st
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | rsa.c | 33 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key 153 key->dmq1 = bignum_init(); 158 key->dmq1 == NULL || key->iqmp == NULL) { 208 pos = crypto_rsa_parse_integer(pos, end, key->dmq1); 279 * dmq1 = (1/e) mod (q-1) 282 * m2 = c^dmq1 mod q 295 /* b = tmp^dmq1 mod q */ 296 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) 357 bignum_deinit(key->dmq1);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | rsa.c | 26 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key 145 key->dmq1 = bignum_init(); 150 key->dmq1 == NULL || key->iqmp == NULL) { 200 pos = crypto_rsa_parse_integer(pos, end, key->dmq1); 270 * dmq1 = (1/e) mod (q-1) 273 * m2 = c^dmq1 mod q 286 /* b = tmp^dmq1 mod q */ 287 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) 348 bignum_deinit(key->dmq1);
|
/external/wpa_supplicant_8/src/tls/ |
H A D | rsa.c | 26 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key 145 key->dmq1 = bignum_init(); 150 key->dmq1 == NULL || key->iqmp == NULL) { 200 pos = crypto_rsa_parse_integer(pos, end, key->dmq1); 270 * dmq1 = (1/e) mod (q-1) 273 * m2 = c^dmq1 mod q 286 /* b = tmp^dmq1 mod q */ 287 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) 348 bignum_deinit(key->dmq1);
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | rsa.c | 26 struct bignum *dmq1; /* d mod (q - 1); CRT exponent */ member in struct:crypto_rsa_key 145 key->dmq1 = bignum_init(); 150 key->dmq1 == NULL || key->iqmp == NULL) { 200 pos = crypto_rsa_parse_integer(pos, end, key->dmq1); 270 * dmq1 = (1/e) mod (q-1) 273 * m2 = c^dmq1 mod q 286 /* b = tmp^dmq1 mod q */ 287 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) 348 bignum_deinit(key->dmq1);
|
/external/dropbear/ |
H A D | keyimport.c | 578 * dmp1, dmq1, iqmp in that order. (The last three are d mod 633 * OpenSSH key order is n, e, d, p, q, dmp1, dmq1, iqmp 710 mp_int dmp1, dmq1, iqmp, tmpval; /* for rsa */ local 776 m_mp_init(&dmq1); 789 /* dmq1 = d mod (q-1) */ 794 if (mp_mod(key->rsakey->d, &tmpval, &dmq1) != MP_OKAY) { 795 fprintf(stderr, "Bignum error for dmq1\n"); 807 buf_putmpint(extrablob, &dmq1); 811 mp_clear(&dmq1); 820 /* dmq1 */ [all...] |
/external/openssl/include/openssl/ |
H A D | rsa.h | 144 BIGNUM *dmq1; member in struct:rsa_st
|