/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_shared_secret.c | 39 void *prime; local 66 if ((err = mp_init(&prime)) != CRYPT_OK) { 71 if ((err = mp_read_radix(prime, (char *)private_key->dp->prime, 16)) != CRYPT_OK) { goto done; } 72 if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, prime, 1)) != CRYPT_OK) { goto done; } 74 x = (unsigned long)mp_unsigned_bin_size(prime); 86 mp_clear(prime);
|
H A D | ecc_import.c | 28 void *prime, *b, *t1, *t2; local 31 if ((err = mp_init_multi(&prime, &b, &t1, &t2, NULL)) != CRYPT_OK) { 35 /* load prime and b */ 36 if ((err = mp_read_radix(prime, key->dp->prime, 16)) != CRYPT_OK) { goto error; } 44 if ((err = mp_mod(t2, prime, t2)) != CRYPT_OK) { goto error; } 54 if ((err = mp_mod(t1, prime, t1)) != CRYPT_OK) { goto error; } 56 if ((err = mp_add(t1, prime, t1)) != CRYPT_OK) { goto error; } 58 while (mp_cmp(t1, prime) != LTC_MP_LT) { 59 if ((err = mp_sub(t1, prime, t [all...] |
H A D | ecc_make_key.c | 54 void *prime; local 85 if ((err = mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, &prime, NULL)) != CRYPT_OK) { 95 if ((err = mp_read_radix(prime, (char *)key->dp->prime, 16)) != CRYPT_OK) { goto errkey; } 102 if ((err = ltc_mp.ecc_ptmul(key->k, base, &key->pubkey, prime, 1)) != CRYPT_OK) { goto errkey; } 112 mp_clear(prime);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | dh_groups.h | 22 const u8 *prime; member in struct:dh_group
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pwd.c | 149 BN_free(data->grp->prime); 245 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 253 * sufficiently smaller than the prime or order might need pre-pending 257 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 262 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x); 264 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(y); 265 BN_bn2bin(y, element + BN_num_bytes(data->grp->prime) + offset); 267 data->outbuf = wpabuf_alloc(2 * BN_num_bytes(data->grp->prime) + 274 2 * BN_num_bytes(data->grp->prime)); 304 /* Each component of the cruft will be at most as big as the prime */ [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pwd.c | 149 BN_free(data->grp->prime); 245 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 253 * sufficiently smaller than the prime or order might need pre-pending 257 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 262 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x); 264 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(y); 265 BN_bn2bin(y, element + BN_num_bytes(data->grp->prime) + offset); 267 data->outbuf = wpabuf_alloc(2 * BN_num_bytes(data->grp->prime) + 274 2 * BN_num_bytes(data->grp->prime)); 304 /* Each component of the cruft will be at most as big as the prime */ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pwd.c | 149 BN_free(data->grp->prime); 245 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 253 * sufficiently smaller than the prime or order might need pre-pending 257 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 262 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x); 264 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(y); 265 BN_bn2bin(y, element + BN_num_bytes(data->grp->prime) + offset); 267 data->outbuf = wpabuf_alloc(2 * BN_num_bytes(data->grp->prime) + 274 2 * BN_num_bytes(data->grp->prime)); 304 /* Each component of the cruft will be at most as big as the prime */ [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_pwd.c | 155 BN_free(data->grp->prime); 244 BN_num_bits(data->grp->prime)); 330 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), x); 331 ptr += BN_num_bytes(data->grp->prime); 332 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), y); 333 ptr += BN_num_bytes(data->grp->prime); 408 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 416 * sufficiently smaller than the prime or order might need pre-pending 420 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 425 offset = BN_num_bytes(data->grp->prime) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_pwd.c | 155 BN_free(data->grp->prime); 244 BN_num_bits(data->grp->prime)); 330 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), x); 331 ptr += BN_num_bytes(data->grp->prime); 332 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), y); 333 ptr += BN_num_bytes(data->grp->prime); 408 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 416 * sufficiently smaller than the prime or order might need pre-pending 420 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 425 offset = BN_num_bytes(data->grp->prime) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_pwd.c | 155 BN_free(data->grp->prime); 244 BN_num_bits(data->grp->prime)); 330 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), x); 331 ptr += BN_num_bytes(data->grp->prime); 332 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), y); 333 ptr += BN_num_bytes(data->grp->prime); 408 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 416 * sufficiently smaller than the prime or order might need pre-pending 420 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 425 offset = BN_num_bytes(data->grp->prime) [all...] |
/external/dropbear/ |
H A D | genrsa.c | 36 static void getrsaprime(mp_int* prime, mp_int *primeminus, 95 /* return a prime suitable for p or q */ 96 static void getrsaprime(mp_int* prime, mp_int *primeminus, argument 107 the next prime above it */ 111 bytes_to_mp(prime, buf, size+1); 113 /* find the next integer which is prime, 8 round of miller-rabin */ 114 if (mp_prime_next_prime(prime, 8, 0) != MP_OKAY) { 120 if (mp_sub_d(prime, 1, primeminus) != MP_OKAY) {
|
/external/jmonkeyengine/engine/src/blender/com/jme3/asset/ |
H A D | BlenderKey.java | 388 final int prime = 31;
390 result = prime * result + (assetRootPath == null ? 0 : assetRootPath.hashCode());
391 result = prime * result + (defaultMaterial == null ? 0 : defaultMaterial.hashCode());
392 result = prime * result + (faceCullMode == null ? 0 : faceCullMode.hashCode());
393 result = prime * result + featuresToLoad;
394 result = prime * result + (fixUpAxis ? 1231 : 1237);
395 result = prime * result + fps;
396 result = prime * result + generatedTextureDepth;
397 result = prime * result + generatedTextureHeight;
398 result = prime * resul [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.c | 115 grp->prime = NULL; 126 ((grp->prime = BN_new()) == NULL) || 132 if (!EC_GROUP_get_curve_GFp(grp->group, grp->prime, NULL, NULL, NULL)) 134 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " 147 primebitlen = BN_num_bits(grp->prime); 148 primebytelen = BN_num_bytes(grp->prime); 166 * compute counter-mode password value and stretch to prime 198 if (BN_ucmp(x_candidate, grp->prime) >= 0) 257 BN_free(grp->prime); 283 if ((cruft = os_malloc(BN_num_bytes(grp->prime))) [all...] |
H A D | eap_pwd_common.h | 20 * TODO: support one based on a prime field 27 BIGNUM *prime; member in struct:group_definition_
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.c | 115 grp->prime = NULL; 126 ((grp->prime = BN_new()) == NULL) || 132 if (!EC_GROUP_get_curve_GFp(grp->group, grp->prime, NULL, NULL, NULL)) 134 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " 147 primebitlen = BN_num_bits(grp->prime); 148 primebytelen = BN_num_bytes(grp->prime); 166 * compute counter-mode password value and stretch to prime 198 if (BN_ucmp(x_candidate, grp->prime) >= 0) 257 BN_free(grp->prime); 283 if ((cruft = os_malloc(BN_num_bytes(grp->prime))) [all...] |
H A D | eap_pwd_common.h | 20 * TODO: support one based on a prime field 27 BIGNUM *prime; member in struct:group_definition_
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.c | 115 grp->prime = NULL; 126 ((grp->prime = BN_new()) == NULL) || 132 if (!EC_GROUP_get_curve_GFp(grp->group, grp->prime, NULL, NULL, NULL)) 134 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " 147 primebitlen = BN_num_bits(grp->prime); 148 primebytelen = BN_num_bytes(grp->prime); 166 * compute counter-mode password value and stretch to prime 198 if (BN_ucmp(x_candidate, grp->prime) >= 0) 257 BN_free(grp->prime); 283 if ((cruft = os_malloc(BN_num_bytes(grp->prime))) [all...] |
H A D | eap_pwd_common.h | 20 * TODO: support one based on a prime field 27 BIGNUM *prime; member in struct:group_definition_
|
/external/openssh/ |
H A D | kexgex.c | 48 int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, 78 buffer_put_bignum2(&b, prime); 41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | dh.c | 47 char *strsize, *gen, *prime; local 66 /* Ensure this is a safe prime */ 73 /* Ensure prime has been tested and is not composite */ 94 prime = strsep(&cp, " "); /* prime */ 95 if (cp != NULL || *prime == '\0') 105 if (BN_hex2bn(&dhg->p, prime) == 0) 120 error("Bad prime description in line %d", linenum);
|
/external/jmonkeyengine/engine/src/blender/com/jme3/scene/plugins/blender/objects/ |
H A D | Properties.java | 416 final int prime = 31; 418 result = prime * result + (description == null ? 0 : description.hashCode()); 419 result = prime * result + (name == null ? 0 : name.hashCode()); 420 result = prime * result + subType; 421 result = prime * result + type; 422 result = prime * result + (value == null ? 0 : value.hashCode());
|
/external/icu4c/test/perf/unisetperf/draft/ |
H A D | bitset.cpp | 35 const int32_t prime=1301; // Less than 2k. member in struct:BMPBitHash 64 hash=(hash+prime)&0x7ff;
|