/external/dropbear/ |
H A D | genrsa.c | 36 static void getrsaprime(mp_int* prime, mp_int *primeminus, 95 /* return a prime suitable for p or q */ 96 static void getrsaprime(mp_int* prime, mp_int *primeminus, argument 107 the next prime above it */ 111 bytes_to_mp(prime, buf, size+1); 113 /* find the next integer which is prime, 8 round of miller-rabin */ 114 if (mp_prime_next_prime(prime, 8, 0) != MP_OKAY) { 120 if (mp_sub_d(prime, 1, primeminus) != MP_OKAY) {
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_shared_secret.c | 39 void *prime; local 66 if ((err = mp_init(&prime)) != CRYPT_OK) { 71 if ((err = mp_read_radix(prime, (char *)private_key->dp->prime, 16)) != CRYPT_OK) { goto done; } 72 if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, prime, 1)) != CRYPT_OK) { goto done; } 74 x = (unsigned long)mp_unsigned_bin_size(prime); 86 mp_clear(prime);
|
H A D | ecc_import.c | 28 void *prime, *b, *t1, *t2; local 31 if ((err = mp_init_multi(&prime, &b, &t1, &t2, NULL)) != CRYPT_OK) { 35 /* load prime and b */ 36 if ((err = mp_read_radix(prime, key->dp->prime, 16)) != CRYPT_OK) { goto error; } 44 if ((err = mp_mod(t2, prime, t2)) != CRYPT_OK) { goto error; } 54 if ((err = mp_mod(t1, prime, t1)) != CRYPT_OK) { goto error; } 56 if ((err = mp_add(t1, prime, t1)) != CRYPT_OK) { goto error; } 58 while (mp_cmp(t1, prime) != LTC_MP_LT) { 59 if ((err = mp_sub(t1, prime, t [all...] |
H A D | ecc_make_key.c | 54 void *prime; local 85 if ((err = mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, &prime, NULL)) != CRYPT_OK) { 95 if ((err = mp_read_radix(prime, (char *)key->dp->prime, 16)) != CRYPT_OK) { goto errkey; } 102 if ((err = ltc_mp.ecc_ptmul(key->k, base, &key->pubkey, prime, 1)) != CRYPT_OK) { goto errkey; } 112 mp_clear(prime);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
/external/libvorbis/lib/ |
H A D | lpc.c | 133 void vorbis_lpc_predict(float *coeff,float *prime,int m, argument 137 prime[0...m-1] initial values (allocated size of n+m-1) 144 if(!prime) 149 work[i]=prime[i];
|
/external/openssh/ |
H A D | kexgex.c | 48 int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, 78 buffer_put_bignum2(&b, prime); 41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | dh.c | 47 char *strsize, *gen, *prime; local 66 /* Ensure this is a safe prime */ 73 /* Ensure prime has been tested and is not composite */ 94 prime = strsep(&cp, " "); /* prime */ 95 if (cp != NULL || *prime == '\0') 105 if (BN_hex2bn(&dhg->p, prime) == 0) 120 error("Bad prime description in line %d", linenum);
|
/external/icu4c/test/perf/unisetperf/draft/ |
H A D | bitset.cpp | 35 const int32_t prime=1301; // Less than 2k. member in struct:BMPBitHash 64 hash=(hash+prime)&0x7ff;
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | sae.h | 34 const struct crypto_bignum *prime; member in struct:sae_temporary_data
|
H A D | sae.c | 34 tmp->prime = crypto_ec_get_prime(tmp->ec); 49 tmp->prime_buf = crypto_bignum_init_set(tmp->dh->prime, 55 tmp->prime = tmp->prime_buf; 174 u8 pwd_value[SAE_MAX_ECC_PRIME_LEN], prime[SAE_MAX_ECC_PRIME_LEN]; local 179 if (crypto_bignum_to_bin(sae->tmp->prime, prime, sizeof(prime), 188 prime, sae->tmp->prime_len, pwd_value, bits); 194 if (os_memcmp(pwd_value, prime, sae->tmp->prime_len) >= 0) 228 sae->tmp->dh->prime, sa 786 u8 prime[SAE_MAX_ECC_PRIME_LEN]; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.h | 18 * TODO: support one based on a prime field 25 BIGNUM *prime; member in struct:group_definition_
|
/external/wpa_supplicant_8/src/common/ |
H A D | sae.h | 34 const struct crypto_bignum *prime; member in struct:sae_temporary_data
|
H A D | sae.c | 34 tmp->prime = crypto_ec_get_prime(tmp->ec); 49 tmp->prime_buf = crypto_bignum_init_set(tmp->dh->prime, 55 tmp->prime = tmp->prime_buf; 174 u8 pwd_value[SAE_MAX_ECC_PRIME_LEN], prime[SAE_MAX_ECC_PRIME_LEN]; local 179 if (crypto_bignum_to_bin(sae->tmp->prime, prime, sizeof(prime), 188 prime, sae->tmp->prime_len, pwd_value, bits); 194 if (os_memcmp(pwd_value, prime, sae->tmp->prime_len) >= 0) 228 sae->tmp->dh->prime, sa 786 u8 prime[SAE_MAX_ECC_PRIME_LEN]; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.h | 18 * TODO: support one based on a prime field 25 BIGNUM *prime; member in struct:group_definition_
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | sae.h | 34 const struct crypto_bignum *prime; member in struct:sae_temporary_data
|
H A D | sae.c | 34 tmp->prime = crypto_ec_get_prime(tmp->ec); 49 tmp->prime_buf = crypto_bignum_init_set(tmp->dh->prime, 55 tmp->prime = tmp->prime_buf; 174 u8 pwd_value[SAE_MAX_ECC_PRIME_LEN], prime[SAE_MAX_ECC_PRIME_LEN]; local 179 if (crypto_bignum_to_bin(sae->tmp->prime, prime, sizeof(prime), 188 prime, sae->tmp->prime_len, pwd_value, bits); 194 if (os_memcmp(pwd_value, prime, sae->tmp->prime_len) >= 0) 228 sae->tmp->dh->prime, sa 786 u8 prime[SAE_MAX_ECC_PRIME_LEN]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.h | 18 * TODO: support one based on a prime field 25 BIGNUM *prime; member in struct:group_definition_
|
/external/dropbear/libtomcrypt/src/headers/ |
H A D | tomcrypt_pk.h | 163 /** The prime that defines the field the curve is in (encoded in hex) */ 164 char *prime; member in struct:__anon5216 312 /** The prime used to generate the sub-group */ 315 /** The large prime that generats the field the contains the sub-group */
|
/external/ipsec-tools/src/racoon/ |
H A D | oakley.h | 158 vchar_t *prime; member in struct:dhgroup
|
/external/openssl/crypto/ec/ |
H A D | ec_asn1.c | 157 ASN1_INTEGER *prime; member in union:x9_62_fieldid_st::__anon10576 227 ADB_ENTRY(NID_X9_62_prime_field, ASN1_SIMPLE(X9_62_FIELDID, p.prime, ASN1_INTEGER)), 327 /* the parameters are specified by the prime number p */ 333 /* set the prime number */ 334 field->p.prime = BN_to_ASN1_INTEGER(tmp,NULL); 335 if (field->p.prime == NULL) 880 /* we have a curve over a prime field */ 881 /* extract the prime number */ 882 if (!params->fieldID->p.prime) 887 p = ASN1_INTEGER_to_BN(params->fieldID->p.prime, NUL [all...] |
/external/skia/legacy/src/animator/ |
H A D | SkScript2.h | 210 void prime() { fPrimed = kIsPrimed; } function in struct:SkScriptEngine2::Branch
|
/external/skia/src/animator/ |
H A D | SkScript2.h | 210 void prime() { fPrimed = kIsPrimed; } function in struct:SkScriptEngine2::Branch
|