Searched refs:prime (Results 1 - 25 of 48) sorted by relevance

12

/external/dropbear/libtomcrypt/src/pk/ecc/
H A Decc_shared_secret.c39 void *prime; local
66 if ((err = mp_init(&prime)) != CRYPT_OK) {
71 if ((err = mp_read_radix(prime, (char *)private_key->dp->prime, 16)) != CRYPT_OK) { goto done; }
72 if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, prime, 1)) != CRYPT_OK) { goto done; }
74 x = (unsigned long)mp_unsigned_bin_size(prime);
86 mp_clear(prime);
H A Decc_import.c28 void *prime, *b, *t1, *t2; local
31 if ((err = mp_init_multi(&prime, &b, &t1, &t2, NULL)) != CRYPT_OK) {
35 /* load prime and b */
36 if ((err = mp_read_radix(prime, key->dp->prime, 16)) != CRYPT_OK) { goto error; }
44 if ((err = mp_mod(t2, prime, t2)) != CRYPT_OK) { goto error; }
54 if ((err = mp_mod(t1, prime, t1)) != CRYPT_OK) { goto error; }
56 if ((err = mp_add(t1, prime, t1)) != CRYPT_OK) { goto error; }
58 while (mp_cmp(t1, prime) != LTC_MP_LT) {
59 if ((err = mp_sub(t1, prime, t
[all...]
H A Decc_make_key.c54 void *prime; local
85 if ((err = mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, &prime, NULL)) != CRYPT_OK) {
95 if ((err = mp_read_radix(prime, (char *)key->dp->prime, 16)) != CRYPT_OK) { goto errkey; }
102 if ((err = ltc_mp.ecc_ptmul(key->k, base, &key->pubkey, prime, 1)) != CRYPT_OK) { goto errkey; }
112 mp_clear(prime);
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Ddh_groups.h22 const u8 *prime; member in struct:dh_group
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Ddh_groups.h16 const u8 *prime; member in struct:dh_group
/external/wpa_supplicant_8/src/crypto/
H A Ddh_groups.h16 const u8 *prime; member in struct:dh_group
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Ddh_groups.h16 const u8 *prime; member in struct:dh_group
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_pwd.c149 BN_free(data->grp->prime);
245 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) ==
253 * sufficiently smaller than the prime or order might need pre-pending
257 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2);
262 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x);
264 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(y);
265 BN_bn2bin(y, element + BN_num_bytes(data->grp->prime) + offset);
267 data->outbuf = wpabuf_alloc(2 * BN_num_bytes(data->grp->prime) +
274 2 * BN_num_bytes(data->grp->prime));
304 /* Each component of the cruft will be at most as big as the prime */
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_pwd.c149 BN_free(data->grp->prime);
245 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) ==
253 * sufficiently smaller than the prime or order might need pre-pending
257 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2);
262 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x);
264 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(y);
265 BN_bn2bin(y, element + BN_num_bytes(data->grp->prime) + offset);
267 data->outbuf = wpabuf_alloc(2 * BN_num_bytes(data->grp->prime) +
274 2 * BN_num_bytes(data->grp->prime));
304 /* Each component of the cruft will be at most as big as the prime */
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_pwd.c149 BN_free(data->grp->prime);
245 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) ==
253 * sufficiently smaller than the prime or order might need pre-pending
257 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2);
262 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x);
264 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(y);
265 BN_bn2bin(y, element + BN_num_bytes(data->grp->prime) + offset);
267 data->outbuf = wpabuf_alloc(2 * BN_num_bytes(data->grp->prime) +
274 2 * BN_num_bytes(data->grp->prime));
304 /* Each component of the cruft will be at most as big as the prime */
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_pwd.c155 BN_free(data->grp->prime);
244 BN_num_bits(data->grp->prime));
330 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), x);
331 ptr += BN_num_bytes(data->grp->prime);
332 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), y);
333 ptr += BN_num_bytes(data->grp->prime);
408 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) ==
416 * sufficiently smaller than the prime or order might need pre-pending
420 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2);
425 offset = BN_num_bytes(data->grp->prime)
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_pwd.c155 BN_free(data->grp->prime);
244 BN_num_bits(data->grp->prime));
330 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), x);
331 ptr += BN_num_bytes(data->grp->prime);
332 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), y);
333 ptr += BN_num_bytes(data->grp->prime);
408 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) ==
416 * sufficiently smaller than the prime or order might need pre-pending
420 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2);
425 offset = BN_num_bytes(data->grp->prime)
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_pwd.c155 BN_free(data->grp->prime);
244 BN_num_bits(data->grp->prime));
330 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), x);
331 ptr += BN_num_bytes(data->grp->prime);
332 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), y);
333 ptr += BN_num_bytes(data->grp->prime);
408 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) ==
416 * sufficiently smaller than the prime or order might need pre-pending
420 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2);
425 offset = BN_num_bytes(data->grp->prime)
[all...]
/external/dropbear/
H A Dgenrsa.c36 static void getrsaprime(mp_int* prime, mp_int *primeminus,
95 /* return a prime suitable for p or q */
96 static void getrsaprime(mp_int* prime, mp_int *primeminus, argument
107 the next prime above it */
111 bytes_to_mp(prime, buf, size+1);
113 /* find the next integer which is prime, 8 round of miller-rabin */
114 if (mp_prime_next_prime(prime, 8, 0) != MP_OKAY) {
120 if (mp_sub_d(prime, 1, primeminus) != MP_OKAY) {
/external/jmonkeyengine/engine/src/blender/com/jme3/asset/
H A DBlenderKey.java388 final int prime = 31;
390 result = prime * result + (assetRootPath == null ? 0 : assetRootPath.hashCode());
391 result = prime * result + (defaultMaterial == null ? 0 : defaultMaterial.hashCode());
392 result = prime * result + (faceCullMode == null ? 0 : faceCullMode.hashCode());
393 result = prime * result + featuresToLoad;
394 result = prime * result + (fixUpAxis ? 1231 : 1237);
395 result = prime * result + fps;
396 result = prime * result + generatedTextureDepth;
397 result = prime * result + generatedTextureHeight;
398 result = prime * resul
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.c115 grp->prime = NULL;
126 ((grp->prime = BN_new()) == NULL) ||
132 if (!EC_GROUP_get_curve_GFp(grp->group, grp->prime, NULL, NULL, NULL))
134 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp "
147 primebitlen = BN_num_bits(grp->prime);
148 primebytelen = BN_num_bytes(grp->prime);
166 * compute counter-mode password value and stretch to prime
198 if (BN_ucmp(x_candidate, grp->prime) >= 0)
257 BN_free(grp->prime);
283 if ((cruft = os_malloc(BN_num_bytes(grp->prime)))
[all...]
H A Deap_pwd_common.h20 * TODO: support one based on a prime field
27 BIGNUM *prime; member in struct:group_definition_
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.c115 grp->prime = NULL;
126 ((grp->prime = BN_new()) == NULL) ||
132 if (!EC_GROUP_get_curve_GFp(grp->group, grp->prime, NULL, NULL, NULL))
134 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp "
147 primebitlen = BN_num_bits(grp->prime);
148 primebytelen = BN_num_bytes(grp->prime);
166 * compute counter-mode password value and stretch to prime
198 if (BN_ucmp(x_candidate, grp->prime) >= 0)
257 BN_free(grp->prime);
283 if ((cruft = os_malloc(BN_num_bytes(grp->prime)))
[all...]
H A Deap_pwd_common.h20 * TODO: support one based on a prime field
27 BIGNUM *prime; member in struct:group_definition_
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pwd_common.c115 grp->prime = NULL;
126 ((grp->prime = BN_new()) == NULL) ||
132 if (!EC_GROUP_get_curve_GFp(grp->group, grp->prime, NULL, NULL, NULL))
134 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp "
147 primebitlen = BN_num_bits(grp->prime);
148 primebytelen = BN_num_bytes(grp->prime);
166 * compute counter-mode password value and stretch to prime
198 if (BN_ucmp(x_candidate, grp->prime) >= 0)
257 BN_free(grp->prime);
283 if ((cruft = os_malloc(BN_num_bytes(grp->prime)))
[all...]
H A Deap_pwd_common.h20 * TODO: support one based on a prime field
27 BIGNUM *prime; member in struct:group_definition_
/external/openssh/
H A Dkexgex.c48 int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen,
78 buffer_put_bignum2(&b, prime);
41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Ddh.c47 char *strsize, *gen, *prime; local
66 /* Ensure this is a safe prime */
73 /* Ensure prime has been tested and is not composite */
94 prime = strsep(&cp, " "); /* prime */
95 if (cp != NULL || *prime == '\0')
105 if (BN_hex2bn(&dhg->p, prime) == 0)
120 error("Bad prime description in line %d", linenum);
/external/jmonkeyengine/engine/src/blender/com/jme3/scene/plugins/blender/objects/
H A DProperties.java416 final int prime = 31;
418 result = prime * result + (description == null ? 0 : description.hashCode());
419 result = prime * result + (name == null ? 0 : name.hashCode());
420 result = prime * result + subType;
421 result = prime * result + type;
422 result = prime * result + (value == null ? 0 : value.hashCode());
/external/icu4c/test/perf/unisetperf/draft/
H A Dbitset.cpp35 const int32_t prime=1301; // Less than 2k. member in struct:BMPBitHash
64 hash=(hash+prime)&0x7ff;

Completed in 542 milliseconds

12