Searched defs:prime (Results 1 - 21 of 21) sorted by relevance

/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Ddh_groups.h22 const u8 *prime; member in struct:dh_group
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Ddh_groups.h16 const u8 *prime; member in struct:dh_group
/external/wpa_supplicant_8/src/crypto/
H A Ddh_groups.h16 const u8 *prime; member in struct:dh_group
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Ddh_groups.h16 const u8 *prime; member in struct:dh_group
/external/dropbear/
H A Dgenrsa.c36 static void getrsaprime(mp_int* prime, mp_int *primeminus,
95 /* return a prime suitable for p or q */
96 static void getrsaprime(mp_int* prime, mp_int *primeminus, argument
107 the next prime above it */
111 bytes_to_mp(prime, buf, size+1);
113 /* find the next integer which is prime, 8 round of miller-rabin */
114 if (mp_prime_next_prime(prime, 8, 0) != MP_OKAY) {
120 if (mp_sub_d(prime, 1, primeminus) != MP_OKAY) {
/external/dropbear/libtomcrypt/src/pk/ecc/
H A Decc_shared_secret.c39 void *prime; local
66 if ((err = mp_init(&prime)) != CRYPT_OK) {
71 if ((err = mp_read_radix(prime, (char *)private_key->dp->prime, 16)) != CRYPT_OK) { goto done; }
72 if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, prime, 1)) != CRYPT_OK) { goto done; }
74 x = (unsigned long)mp_unsigned_bin_size(prime);
86 mp_clear(prime);
H A Decc_import.c28 void *prime, *b, *t1, *t2; local
31 if ((err = mp_init_multi(&prime, &b, &t1, &t2, NULL)) != CRYPT_OK) {
35 /* load prime and b */
36 if ((err = mp_read_radix(prime, key->dp->prime, 16)) != CRYPT_OK) { goto error; }
44 if ((err = mp_mod(t2, prime, t2)) != CRYPT_OK) { goto error; }
54 if ((err = mp_mod(t1, prime, t1)) != CRYPT_OK) { goto error; }
56 if ((err = mp_add(t1, prime, t1)) != CRYPT_OK) { goto error; }
58 while (mp_cmp(t1, prime) != LTC_MP_LT) {
59 if ((err = mp_sub(t1, prime, t
[all...]
H A Decc_make_key.c54 void *prime; local
85 if ((err = mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, &prime, NULL)) != CRYPT_OK) {
95 if ((err = mp_read_radix(prime, (char *)key->dp->prime, 16)) != CRYPT_OK) { goto errkey; }
102 if ((err = ltc_mp.ecc_ptmul(key->k, base, &key->pubkey, prime, 1)) != CRYPT_OK) { goto errkey; }
112 mp_clear(prime);
/external/libvorbis/lib/
H A Dlpc.c133 void vorbis_lpc_predict(float *coeff,float *prime,int m, argument
137 prime[0...m-1] initial values (allocated size of n+m-1)
144 if(!prime)
149 work[i]=prime[i];
/external/openssh/
H A Dkexgex.c48 int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen,
78 buffer_put_bignum2(&b, prime);
41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Ddh.c47 char *strsize, *gen, *prime; local
66 /* Ensure this is a safe prime */
73 /* Ensure prime has been tested and is not composite */
94 prime = strsep(&cp, " "); /* prime */
95 if (cp != NULL || *prime == '\0')
105 if (BN_hex2bn(&dhg->p, prime) == 0)
120 error("Bad prime description in line %d", linenum);
/external/icu4c/test/perf/unisetperf/draft/
H A Dbitset.cpp35 const int32_t prime=1301; // Less than 2k. member in struct:BMPBitHash
64 hash=(hash+prime)&0x7ff;
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.h18 * TODO: support one based on a prime field
25 BIGNUM *prime; member in struct:group_definition_
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.h18 * TODO: support one based on a prime field
25 BIGNUM *prime; member in struct:group_definition_
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pwd_common.h18 * TODO: support one based on a prime field
25 BIGNUM *prime; member in struct:group_definition_
/external/dropbear/libtomcrypt/src/headers/
H A Dtomcrypt_pk.h163 /** The prime that defines the field the curve is in (encoded in hex) */
164 char *prime; member in struct:__anon5106
312 /** The prime used to generate the sub-group */
315 /** The large prime that generats the field the contains the sub-group */
/external/ipsec-tools/src/racoon/
H A Doakley.h158 vchar_t *prime; member in struct:dhgroup
/external/openssl/crypto/ec/
H A Dec_asn1.c157 ASN1_INTEGER *prime; member in union:x9_62_fieldid_st::__anon10333
227 ADB_ENTRY(NID_X9_62_prime_field, ASN1_SIMPLE(X9_62_FIELDID, p.prime, ASN1_INTEGER)),
327 /* the parameters are specified by the prime number p */
333 /* set the prime number */
334 field->p.prime = BN_to_ASN1_INTEGER(tmp,NULL);
335 if (field->p.prime == NULL)
880 /* we have a curve over a prime field */
881 /* extract the prime number */
882 if (!params->fieldID->p.prime)
887 p = ASN1_INTEGER_to_BN(params->fieldID->p.prime, NUL
[all...]
/external/skia/src/animator/
H A DSkScript2.h210 void prime() { fPrimed = kIsPrimed; } function in struct:SkScriptEngine2::Branch
/external/antlr/antlr-3.4/lib/
H A Dantlr-3.4-complete.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/antlr/ org/antlr/analysis/ org/antlr/codegen/ org/ ...
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.jdt.core_3.6.2.v_A76_R36x.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...

Completed in 942 milliseconds