Searched refs:BIGNUM (Results 1 - 25 of 232) sorted by relevance

12345678910

/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dbn.h154 /* BN_new creates a new, allocated BIGNUM and initialises it. */
155 OPENSSL_EXPORT BIGNUM *BN_new(void);
157 /* BN_init initialises a stack allocated |BIGNUM|. */
158 OPENSSL_EXPORT void BN_init(BIGNUM *bn);
162 OPENSSL_EXPORT void BN_free(BIGNUM *bn);
166 OPENSSL_EXPORT void BN_clear_free(BIGNUM *bn);
168 /* BN_dup allocates a new BIGNUM and sets it equal to |src|. It returns the
169 * allocated BIGNUM on success or NULL otherwise. */
170 OPENSSL_EXPORT BIGNUM *BN_dup(const BIGNUM *sr
[all...]
H A Decdsa.h99 BIGNUM *r;
100 BIGNUM *s;
106 /* ECDSA_SIG_free frees |sig| its member |BIGNUM|s. */
135 OPENSSL_EXPORT int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
136 BIGNUM **rp);
142 const BIGNUM *kinv, const BIGNUM *rp,
149 unsigned int *sig_len, const BIGNUM *kinv,
150 const BIGNUM *rp, EC_KEY *eckey);
/external/openssl/crypto/srp/
H A Dsrp.h78 BIGNUM *bn;
87 BIGNUM *s;
88 BIGNUM *v;
89 const BIGNUM *g;
90 const BIGNUM *N;
102 BIGNUM *default_g;
103 BIGNUM *default_N;
111 BIGNUM *g;
112 BIGNUM *N;
123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **sal
[all...]
H A Dsrp_lib.c82 static BIGNUM *srp_Calc_k(BIGNUM *N, BIGNUM *g)
115 BIGNUM *SRP_Calc_u(BIGNUM *A, BIGNUM *B, BIGNUM *N)
119 BIGNUM *u;
153 BIGNUM *SRP_Calc_server_key(BIGNUM *
[all...]
/external/openssl/include/openssl/
H A Dsrp.h78 BIGNUM *bn;
87 BIGNUM *s;
88 BIGNUM *v;
89 const BIGNUM *g;
90 const BIGNUM *N;
102 BIGNUM *default_g;
103 BIGNUM *default_N;
111 BIGNUM *g;
112 BIGNUM *N;
123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **sal
[all...]
H A Dbn.h296 /* get a clone of a BIGNUM with changed flags, for *temporary* use only
309 typedef struct bignum_st BIGNUM;
332 BIGNUM RR; /* used to convert to montgomery form */
333 BIGNUM N; /* The modulus */
334 BIGNUM Ni; /* R*(1/R mod N) - N*Ni = 1
346 BIGNUM N; /* the divisor */
347 BIGNUM Nr; /* the reciprocal */
415 BIGNUM *_tmp_bn = (a); \
425 const BIGNUM *BN_value_one(void);
433 BIGNUM *BN_CTX_ge
[all...]
H A Decdsa.h80 BIGNUM *r;
81 BIGNUM *s;
124 * \param kinv BIGNUM with a pre-computed inverse k (optional)
125 * \param rp BIGNUM with a pre-computed rp value (optioanl),
131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
173 * \param kinv BIGNUM pointer for the inverse of k
174 * \param rp BIGNUM pointer for x coordinate of k * generator
177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
178 BIGNUM **r
[all...]
/external/openssl/crypto/bn/
H A Dbn.h296 /* get a clone of a BIGNUM with changed flags, for *temporary* use only
309 typedef struct bignum_st BIGNUM;
332 BIGNUM RR; /* used to convert to montgomery form */
333 BIGNUM N; /* The modulus */
334 BIGNUM Ni; /* R*(1/R mod N) - N*Ni = 1
346 BIGNUM N; /* the divisor */
347 BIGNUM Nr; /* the reciprocal */
415 BIGNUM *_tmp_bn = (a); \
425 const BIGNUM *BN_value_one(void);
433 BIGNUM *BN_CTX_ge
[all...]
H A Dbn_mod.c119 int BN_mod(BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx)
127 int BN_nnmod(BIGNUM *r, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx)
141 int BN_mod_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *
[all...]
H A Dbn_depr.c68 BIGNUM *BN_generate_prime(BIGNUM *ret, int bits, int safe,
69 const BIGNUM *add, const BIGNUM *rem,
73 BIGNUM *rnd=NULL;
94 int BN_is_prime(const BIGNUM *a, int checks, void (*callback)(int,int,void *),
102 int BN_is_prime_fasttest(const BIGNUM *a, int checks,
H A Dbn_prime.c129 static int witness(BIGNUM *w, const BIGNUM *a, const BIGNUM *a1,
130 const BIGNUM *a1_odd, int k, BN_CTX *ctx, BN_MONT_CTX *mont);
131 static int probable_prime(BIGNUM *rnd, int bits);
132 static int probable_prime_dh(BIGNUM *rnd, int bits,
133 const BIGNUM *add, const BIGNUM *rem, BN_CTX *ctx);
134 static int probable_prime_dh_safe(BIGNUM *rnd, int bits,
135 const BIGNUM *ad
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/ec/
H A Dinternal.h98 int (*group_set_curve)(EC_GROUP *, const BIGNUM *p, const BIGNUM *a,
99 const BIGNUM *b, BN_CTX *);
100 int (*group_get_curve)(const EC_GROUP *, BIGNUM *p, BIGNUM *a, BIGNUM *b,
124 const BIGNUM *x, const BIGNUM *y,
125 const BIGNUM *z, BN_CTX *);
127 const EC_POINT *, BIGNUM *
[all...]
/external/openssl/crypto/ec/
H A Dec_lcl.h105 int (*group_set_curve)(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *);
106 int (*group_get_curve)(const EC_GROUP *, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *);
129 const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *);
131 BIGNUM *
[all...]
H A Dec_cvt.c76 EC_GROUP *EC_GROUP_new_curve_GFp(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx)
151 EC_GROUP *EC_GROUP_new_curve_GF2m(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx)
/external/chromium_org/third_party/boringssl/src/crypto/bn/
H A Dbn.c66 BIGNUM *BN_new(void) {
67 BIGNUM *bn = OPENSSL_malloc(sizeof(BIGNUM));
74 memset(bn, 0, sizeof(BIGNUM));
80 void BN_init(BIGNUM *bn) {
81 memset(bn, 0, sizeof(BIGNUM));
84 void BN_free(BIGNUM *bn) {
100 void BN_clear_free(BIGNUM *bn) {
115 OPENSSL_cleanse(bn, sizeof(BIGNUM));
121 BIGNUM *BN_du
[all...]
H A Ddiv.c115 int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor,
118 BIGNUM *tmp, wnum, *snum, *sdiv, *res;
376 int BN_nnmod(BIGNUM *r, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx) {
388 int BN_mod_add(BIGNUM *r, const BIGNUM *
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/rsa/
H A Dinternal.h77 BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod);
80 int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx);
81 int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx);
82 int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b, BN_CTX *);
83 int BN_BLINDING_invert_ex(BIGNUM *n, const BIGNUM *r, BN_BLINDING *b, BN_CTX *);
88 BN_BLINDING *b, const BIGNUM *
[all...]
H A Drsa_asn1.c83 ASN1_SIMPLE(RSA, n, BIGNUM),
84 ASN1_SIMPLE(RSA, e, BIGNUM),
85 ASN1_SIMPLE(RSA, d, BIGNUM),
86 ASN1_SIMPLE(RSA, p, BIGNUM),
87 ASN1_SIMPLE(RSA, q, BIGNUM),
88 ASN1_SIMPLE(RSA, dmp1, BIGNUM),
89 ASN1_SIMPLE(RSA, dmq1, BIGNUM),
90 ASN1_SIMPLE(RSA, iqmp, BIGNUM),
94 ASN1_SIMPLE(RSA, n, BIGNUM),
95 ASN1_SIMPLE(RSA, e, BIGNUM),
[all...]
/external/openssl/crypto/rsa/
H A Drsa_asn1.c84 ASN1_SIMPLE(RSA, n, BIGNUM),
85 ASN1_SIMPLE(RSA, e, BIGNUM),
86 ASN1_SIMPLE(RSA, d, BIGNUM),
87 ASN1_SIMPLE(RSA, p, BIGNUM),
88 ASN1_SIMPLE(RSA, q, BIGNUM),
89 ASN1_SIMPLE(RSA, dmp1, BIGNUM),
90 ASN1_SIMPLE(RSA, dmq1, BIGNUM),
91 ASN1_SIMPLE(RSA, iqmp, BIGNUM)
96 ASN1_SIMPLE(RSA, n, BIGNUM),
97 ASN1_SIMPLE(RSA, e, BIGNUM),
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/dsa/
H A Ddsa_asn1.c112 ASN1_SIMPLE(DSA, p, BIGNUM),
113 ASN1_SIMPLE(DSA, q, BIGNUM),
114 ASN1_SIMPLE(DSA, g, BIGNUM),
115 ASN1_SIMPLE(DSA, pub_key, BIGNUM),
116 ASN1_SIMPLE(DSA, priv_key, BIGNUM)} ASN1_SEQUENCE_END_cb(DSA,
122 ASN1_SIMPLE(DSA, p, BIGNUM), ASN1_SIMPLE(DSA, q, BIGNUM),
123 ASN1_SIMPLE(DSA, g, BIGNUM), } ASN1_SEQUENCE_END_cb(DSA, DSAparams);
133 ASN1_SIMPLE(DSA, pub_key, BIGNUM),
134 ASN1_SIMPLE(DSA, p, BIGNUM),
[all...]
/external/openssl/crypto/ecdsa/
H A Decs_locl.h72 const BIGNUM *inv, const BIGNUM *rp, EC_KEY *eckey);
74 BIGNUM **kinv, BIGNUM **r,
H A Decdsa.h80 BIGNUM *r;
81 BIGNUM *s;
124 * \param kinv BIGNUM with a pre-computed inverse k (optional)
125 * \param rp BIGNUM with a pre-computed rp value (optioanl),
131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
173 * \param kinv BIGNUM pointer for the inverse of k
174 * \param rp BIGNUM pointer for x coordinate of k * generator
177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
178 BIGNUM **r
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/asn1/
H A Dx_bignum.c63 /* Custom primitive type for BIGNUM handling. This reads in an ASN1_INTEGER as a
64 * BIGNUM directly. Currently it ignores the sign which isn't a problem since all
86 ASN1_ITEM_start(BIGNUM)
87 ASN1_ITYPE_PRIMITIVE, V_ASN1_INTEGER, NULL, 0, &bignum_pf, 0, "BIGNUM"
88 ASN1_ITEM_end(BIGNUM)
91 ASN1_ITYPE_PRIMITIVE, V_ASN1_INTEGER, NULL, 0, &bignum_pf, BN_SENSITIVE, "BIGNUM"
104 if(it->size & BN_SENSITIVE) BN_clear_free((BIGNUM *)*pval);
105 else BN_free((BIGNUM *)*pval);
111 BIGNUM *bn;
114 bn = (BIGNUM *)*pva
[all...]
/external/openssl/crypto/asn1/
H A Dx_bignum.c64 /* Custom primitive type for BIGNUM handling. This reads in an ASN1_INTEGER as a
65 * BIGNUM directly. Currently it ignores the sign which isn't a problem since all
87 ASN1_ITEM_start(BIGNUM)
88 ASN1_ITYPE_PRIMITIVE, V_ASN1_INTEGER, NULL, 0, &bignum_pf, 0, "BIGNUM"
89 ASN1_ITEM_end(BIGNUM)
92 ASN1_ITYPE_PRIMITIVE, V_ASN1_INTEGER, NULL, 0, &bignum_pf, BN_SENSITIVE, "BIGNUM"
105 if(it->size & BN_SENSITIVE) BN_clear_free((BIGNUM *)*pval);
106 else BN_free((BIGNUM *)*pval);
112 BIGNUM *bn;
115 bn = (BIGNUM *)*pva
[all...]
/external/openssl/crypto/jpake/
H A Djpake.h29 BIGNUM *gr; /* g^r (r random) */
30 BIGNUM *b; /* b = r - x*h, h=hash(g, g^r, g^x, name) */
35 BIGNUM *gx; /* g^x in step 1, g^(xa + xc + xd) * xb * s in step 2 */
59 const BIGNUM *p, const BIGNUM *g, const BIGNUM *q,
60 const BIGNUM *secret);
100 const BIGNUM *JPAKE_get_shared_key(JPAKE_CTX *ctx);

Completed in 3815 milliseconds

12345678910