/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | bn.h | 154 /* BN_new creates a new, allocated BIGNUM and initialises it. */ 155 OPENSSL_EXPORT BIGNUM *BN_new(void); 157 /* BN_init initialises a stack allocated |BIGNUM|. */ 158 OPENSSL_EXPORT void BN_init(BIGNUM *bn); 162 OPENSSL_EXPORT void BN_free(BIGNUM *bn); 166 OPENSSL_EXPORT void BN_clear_free(BIGNUM *bn); 168 /* BN_dup allocates a new BIGNUM and sets it equal to |src|. It returns the 169 * allocated BIGNUM on success or NULL otherwise. */ 170 OPENSSL_EXPORT BIGNUM *BN_dup(const BIGNUM *sr [all...] |
H A D | ecdsa.h | 99 BIGNUM *r; 100 BIGNUM *s; 106 /* ECDSA_SIG_free frees |sig| its member |BIGNUM|s. */ 135 OPENSSL_EXPORT int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, 136 BIGNUM **rp); 142 const BIGNUM *kinv, const BIGNUM *rp, 149 unsigned int *sig_len, const BIGNUM *kinv, 150 const BIGNUM *rp, EC_KEY *eckey);
|
/external/openssl/crypto/srp/ |
H A D | srp.h | 78 BIGNUM *bn; 87 BIGNUM *s; 88 BIGNUM *v; 89 const BIGNUM *g; 90 const BIGNUM *N; 102 BIGNUM *default_g; 103 BIGNUM *default_N; 111 BIGNUM *g; 112 BIGNUM *N; 123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **sal [all...] |
H A D | srp_lib.c | 82 static BIGNUM *srp_Calc_k(BIGNUM *N, BIGNUM *g) 115 BIGNUM *SRP_Calc_u(BIGNUM *A, BIGNUM *B, BIGNUM *N) 119 BIGNUM *u; 153 BIGNUM *SRP_Calc_server_key(BIGNUM * [all...] |
/external/openssl/include/openssl/ |
H A D | srp.h | 78 BIGNUM *bn; 87 BIGNUM *s; 88 BIGNUM *v; 89 const BIGNUM *g; 90 const BIGNUM *N; 102 BIGNUM *default_g; 103 BIGNUM *default_N; 111 BIGNUM *g; 112 BIGNUM *N; 123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **sal [all...] |
H A D | bn.h | 296 /* get a clone of a BIGNUM with changed flags, for *temporary* use only 309 typedef struct bignum_st BIGNUM; 332 BIGNUM RR; /* used to convert to montgomery form */ 333 BIGNUM N; /* The modulus */ 334 BIGNUM Ni; /* R*(1/R mod N) - N*Ni = 1 346 BIGNUM N; /* the divisor */ 347 BIGNUM Nr; /* the reciprocal */ 415 BIGNUM *_tmp_bn = (a); \ 425 const BIGNUM *BN_value_one(void); 433 BIGNUM *BN_CTX_ge [all...] |
H A D | ecdsa.h | 80 BIGNUM *r; 81 BIGNUM *s; 124 * \param kinv BIGNUM with a pre-computed inverse k (optional) 125 * \param rp BIGNUM with a pre-computed rp value (optioanl), 131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); 173 * \param kinv BIGNUM pointer for the inverse of k 174 * \param rp BIGNUM pointer for x coordinate of k * generator 177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, 178 BIGNUM **r [all...] |
/external/openssl/crypto/bn/ |
H A D | bn.h | 296 /* get a clone of a BIGNUM with changed flags, for *temporary* use only 309 typedef struct bignum_st BIGNUM; 332 BIGNUM RR; /* used to convert to montgomery form */ 333 BIGNUM N; /* The modulus */ 334 BIGNUM Ni; /* R*(1/R mod N) - N*Ni = 1 346 BIGNUM N; /* the divisor */ 347 BIGNUM Nr; /* the reciprocal */ 415 BIGNUM *_tmp_bn = (a); \ 425 const BIGNUM *BN_value_one(void); 433 BIGNUM *BN_CTX_ge [all...] |
H A D | bn_mod.c | 119 int BN_mod(BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx) 127 int BN_nnmod(BIGNUM *r, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx) 141 int BN_mod_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM * [all...] |
H A D | bn_depr.c | 68 BIGNUM *BN_generate_prime(BIGNUM *ret, int bits, int safe, 69 const BIGNUM *add, const BIGNUM *rem, 73 BIGNUM *rnd=NULL; 94 int BN_is_prime(const BIGNUM *a, int checks, void (*callback)(int,int,void *), 102 int BN_is_prime_fasttest(const BIGNUM *a, int checks,
|
H A D | bn_prime.c | 129 static int witness(BIGNUM *w, const BIGNUM *a, const BIGNUM *a1, 130 const BIGNUM *a1_odd, int k, BN_CTX *ctx, BN_MONT_CTX *mont); 131 static int probable_prime(BIGNUM *rnd, int bits); 132 static int probable_prime_dh(BIGNUM *rnd, int bits, 133 const BIGNUM *add, const BIGNUM *rem, BN_CTX *ctx); 134 static int probable_prime_dh_safe(BIGNUM *rnd, int bits, 135 const BIGNUM *ad [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/ec/ |
H A D | internal.h | 98 int (*group_set_curve)(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, 99 const BIGNUM *b, BN_CTX *); 100 int (*group_get_curve)(const EC_GROUP *, BIGNUM *p, BIGNUM *a, BIGNUM *b, 124 const BIGNUM *x, const BIGNUM *y, 125 const BIGNUM *z, BN_CTX *); 127 const EC_POINT *, BIGNUM * [all...] |
/external/openssl/crypto/ec/ |
H A D | ec_lcl.h | 105 int (*group_set_curve)(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); 106 int (*group_get_curve)(const EC_GROUP *, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *); 129 const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *); 131 BIGNUM * [all...] |
H A D | ec_cvt.c | 76 EC_GROUP *EC_GROUP_new_curve_GFp(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) 151 EC_GROUP *EC_GROUP_new_curve_GF2m(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx)
|
/external/chromium_org/third_party/boringssl/src/crypto/bn/ |
H A D | bn.c | 66 BIGNUM *BN_new(void) { 67 BIGNUM *bn = OPENSSL_malloc(sizeof(BIGNUM)); 74 memset(bn, 0, sizeof(BIGNUM)); 80 void BN_init(BIGNUM *bn) { 81 memset(bn, 0, sizeof(BIGNUM)); 84 void BN_free(BIGNUM *bn) { 100 void BN_clear_free(BIGNUM *bn) { 115 OPENSSL_cleanse(bn, sizeof(BIGNUM)); 121 BIGNUM *BN_du [all...] |
H A D | div.c | 115 int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor, 118 BIGNUM *tmp, wnum, *snum, *sdiv, *res; 376 int BN_nnmod(BIGNUM *r, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx) { 388 int BN_mod_add(BIGNUM *r, const BIGNUM * [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
H A D | internal.h | 77 BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod); 80 int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx); 81 int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx); 82 int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b, BN_CTX *); 83 int BN_BLINDING_invert_ex(BIGNUM *n, const BIGNUM *r, BN_BLINDING *b, BN_CTX *); 88 BN_BLINDING *b, const BIGNUM * [all...] |
H A D | rsa_asn1.c | 83 ASN1_SIMPLE(RSA, n, BIGNUM), 84 ASN1_SIMPLE(RSA, e, BIGNUM), 85 ASN1_SIMPLE(RSA, d, BIGNUM), 86 ASN1_SIMPLE(RSA, p, BIGNUM), 87 ASN1_SIMPLE(RSA, q, BIGNUM), 88 ASN1_SIMPLE(RSA, dmp1, BIGNUM), 89 ASN1_SIMPLE(RSA, dmq1, BIGNUM), 90 ASN1_SIMPLE(RSA, iqmp, BIGNUM), 94 ASN1_SIMPLE(RSA, n, BIGNUM), 95 ASN1_SIMPLE(RSA, e, BIGNUM), [all...] |
/external/openssl/crypto/rsa/ |
H A D | rsa_asn1.c | 84 ASN1_SIMPLE(RSA, n, BIGNUM), 85 ASN1_SIMPLE(RSA, e, BIGNUM), 86 ASN1_SIMPLE(RSA, d, BIGNUM), 87 ASN1_SIMPLE(RSA, p, BIGNUM), 88 ASN1_SIMPLE(RSA, q, BIGNUM), 89 ASN1_SIMPLE(RSA, dmp1, BIGNUM), 90 ASN1_SIMPLE(RSA, dmq1, BIGNUM), 91 ASN1_SIMPLE(RSA, iqmp, BIGNUM) 96 ASN1_SIMPLE(RSA, n, BIGNUM), 97 ASN1_SIMPLE(RSA, e, BIGNUM), [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/dsa/ |
H A D | dsa_asn1.c | 112 ASN1_SIMPLE(DSA, p, BIGNUM), 113 ASN1_SIMPLE(DSA, q, BIGNUM), 114 ASN1_SIMPLE(DSA, g, BIGNUM), 115 ASN1_SIMPLE(DSA, pub_key, BIGNUM), 116 ASN1_SIMPLE(DSA, priv_key, BIGNUM)} ASN1_SEQUENCE_END_cb(DSA, 122 ASN1_SIMPLE(DSA, p, BIGNUM), ASN1_SIMPLE(DSA, q, BIGNUM), 123 ASN1_SIMPLE(DSA, g, BIGNUM), } ASN1_SEQUENCE_END_cb(DSA, DSAparams); 133 ASN1_SIMPLE(DSA, pub_key, BIGNUM), 134 ASN1_SIMPLE(DSA, p, BIGNUM), [all...] |
/external/openssl/crypto/ecdsa/ |
H A D | ecs_locl.h | 72 const BIGNUM *inv, const BIGNUM *rp, EC_KEY *eckey); 74 BIGNUM **kinv, BIGNUM **r,
|
H A D | ecdsa.h | 80 BIGNUM *r; 81 BIGNUM *s; 124 * \param kinv BIGNUM with a pre-computed inverse k (optional) 125 * \param rp BIGNUM with a pre-computed rp value (optioanl), 131 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); 173 * \param kinv BIGNUM pointer for the inverse of k 174 * \param rp BIGNUM pointer for x coordinate of k * generator 177 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, 178 BIGNUM **r [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/asn1/ |
H A D | x_bignum.c | 63 /* Custom primitive type for BIGNUM handling. This reads in an ASN1_INTEGER as a 64 * BIGNUM directly. Currently it ignores the sign which isn't a problem since all 86 ASN1_ITEM_start(BIGNUM) 87 ASN1_ITYPE_PRIMITIVE, V_ASN1_INTEGER, NULL, 0, &bignum_pf, 0, "BIGNUM" 88 ASN1_ITEM_end(BIGNUM) 91 ASN1_ITYPE_PRIMITIVE, V_ASN1_INTEGER, NULL, 0, &bignum_pf, BN_SENSITIVE, "BIGNUM" 104 if(it->size & BN_SENSITIVE) BN_clear_free((BIGNUM *)*pval); 105 else BN_free((BIGNUM *)*pval); 111 BIGNUM *bn; 114 bn = (BIGNUM *)*pva [all...] |
/external/openssl/crypto/asn1/ |
H A D | x_bignum.c | 64 /* Custom primitive type for BIGNUM handling. This reads in an ASN1_INTEGER as a 65 * BIGNUM directly. Currently it ignores the sign which isn't a problem since all 87 ASN1_ITEM_start(BIGNUM) 88 ASN1_ITYPE_PRIMITIVE, V_ASN1_INTEGER, NULL, 0, &bignum_pf, 0, "BIGNUM" 89 ASN1_ITEM_end(BIGNUM) 92 ASN1_ITYPE_PRIMITIVE, V_ASN1_INTEGER, NULL, 0, &bignum_pf, BN_SENSITIVE, "BIGNUM" 105 if(it->size & BN_SENSITIVE) BN_clear_free((BIGNUM *)*pval); 106 else BN_free((BIGNUM *)*pval); 112 BIGNUM *bn; 115 bn = (BIGNUM *)*pva [all...] |
/external/openssl/crypto/jpake/ |
H A D | jpake.h | 29 BIGNUM *gr; /* g^r (r random) */ 30 BIGNUM *b; /* b = r - x*h, h=hash(g, g^r, g^x, name) */ 35 BIGNUM *gx; /* g^x in step 1, g^(xa + xc + xd) * xb * s in step 2 */ 59 const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, 60 const BIGNUM *secret); 100 const BIGNUM *JPAKE_get_shared_key(JPAKE_CTX *ctx);
|