/third_party/mesa3d/src/panfrost/util/ |
D | lcra.c | 53 l->modulus = calloc(sizeof(l->modulus[0]), node_count); in lcra_alloc_equations() 74 free(l->modulus); in lcra_free() 105 l->modulus[node] = DIV_ROUND_UP(bound - len + 1, 1 << alignment); in lcra_restrict_range() 173 unsigned Q = l->modulus[step]; in lcra_solve()
|
D | lcra.h | 54 uint8_t *modulus; member
|
/third_party/node/test/parallel/ |
D | test-https-foafssl.js | 43 const modulus = fixtures.readKey('rsa_cert_foafssl_b.modulus', 'ascii').replace(/\n/g, ''); constant 57 assert.strictEqual(cert.modulus, modulus);
|
D | test-crypto-x509.js | 280 modulus: 'D456320AFB20D3827093DC2C4284ED04DFBABD56E1DDAE529E28B790CD42' + property 310 assert.strictEqual(legacyObject.modulus, legacyObjectCheck.modulus);
|
D | test-tls-peer-certificate.js | 64 assert.strictEqual(peerCert.modulus.length / 2 * 8, peerCert.bits); 120 assert.strictEqual(peerCert.modulus, undefined);
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_dhm.data | 73 Diffie-Hellman small modulus 76 Diffie-Hellman zero modulus 106 Diffie-Hellman MPI_MAX_SIZE modulus 109 Diffie-Hellman MPI_MAX_SIZE + 1 modulus
|
D | test_suite_bignum_mod.function | 82 /* Make sure that the modulus doesn't have reference to mp anymore */ 262 * limbs as the modulus. For negative testing we can ask it to skip this 363 * limbs as the modulus. For negative testing we can ask it to skip this 412 * limbs as the modulus. For negative testing we can ask it to skip this 468 * limbs as the modulus. For negative testing we can ask it to skip this 608 /* modulus->p == NULL || residue->p == NULL ( m has not been set-up ) */ 615 /* Set up modulus and test with residue->p == NULL */
|
/third_party/pulseaudio/src/modules/raop/ |
D | raop-crypto.c | 78 uint8_t modulus[256]; in rsa_encrypt() local 95 size = pa_raop_base64_decode(rsa_modulus, modulus); in rsa_encrypt() 97 n_bn = BN_bin2bn(modulus, size, NULL); in rsa_encrypt()
|
/third_party/openssl/doc/man3/ |
D | RSA_size.pod | 5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits 31 RSA_size() returns the RSA modulus size in bytes. It can be used to 42 RSA_size() returns the size of modulus in bytes.
|
D | EVP_PKEY_is_a.pod | 82 BIGNUM *modulus = NULL; 83 if (EVP_PKEY_get_bn_param(pkey, "n", &modulus)) 84 /* do whatever with the modulus */ 85 BN_free(modulus);
|
D | RSA_generate_key.pod | 31 EVP_RSA_gen() generates a new RSA key pair with modulus size I<bits>. 46 The modulus size will be of length I<bits>, the number of primes to form the 47 modulus will be I<primes>, and the public exponent will be I<e>. Key sizes 52 I<primes> depends on modulus bit length:
|
D | BN_mod_mul_montgomery.pod | 33 using the same modulus. 37 BN_MONT_CTX_set() sets up the I<mont> structure from the modulus I<m> 52 Note that I<a> must be nonnegative and smaller than the modulus.
|
/third_party/openssl/apps/ |
D | dsa.c | 87 int modulus = 0, pubin = 0, pubout = 0, ret = 1; in dsa_main() local 145 modulus = 1; in dsa_main() 211 if (modulus) { in dsa_main()
|
D | rsa.c | 133 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; in rsa_main() local 201 modulus = 1; in rsa_main() 279 if (modulus) { in rsa_main()
|
/third_party/node/deps/openssl/openssl/apps/ |
D | dsa.c | 87 int modulus = 0, pubin = 0, pubout = 0, ret = 1; in dsa_main() local 145 modulus = 1; in dsa_main() 211 if (modulus) { in dsa_main()
|
D | rsa.c | 133 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; in rsa_main() local 201 modulus = 1; in rsa_main() 279 if (modulus) { in rsa_main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | crypto_internal-modexp.c | 91 const u8 *modulus, size_t modulus_len, in crypto_mod_exp() argument 108 bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0) in crypto_mod_exp()
|
D | crypto_wolfssl.c | 1315 mp_int *a, mp_int *modulus, mp_digit mp); 1552 mp_int *modulus = &e->prime; in crypto_ec_point_add() local 1562 ret = mp_montgomery_calc_normalization(&mu, modulus); in crypto_ec_point_add() 1581 if (mp_mulmod(pa->x, &mu, modulus, ta->x) != MP_OKAY || in crypto_ec_point_add() 1582 mp_mulmod(pa->y, &mu, modulus, ta->y) != MP_OKAY || in crypto_ec_point_add() 1583 mp_mulmod(pa->z, &mu, modulus, ta->z) != MP_OKAY || in crypto_ec_point_add() 1584 mp_mulmod(pb->x, &mu, modulus, tb->x) != MP_OKAY || in crypto_ec_point_add() 1585 mp_mulmod(pb->y, &mu, modulus, tb->y) != MP_OKAY || in crypto_ec_point_add() 1586 mp_mulmod(pb->z, &mu, modulus, tb->z) != MP_OKAY) { in crypto_ec_point_add()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | crypto_internal-modexp.c | 91 const u8 *modulus, size_t modulus_len, in crypto_mod_exp() argument 108 bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0) in crypto_mod_exp()
|
D | crypto_wolfssl.c | 1309 mp_int *a, mp_int *modulus, mp_digit mp); 1546 mp_int *modulus = &e->prime; in crypto_ec_point_add() local 1556 ret = mp_montgomery_calc_normalization(&mu, modulus); in crypto_ec_point_add() 1575 if (mp_mulmod(pa->x, &mu, modulus, ta->x) != MP_OKAY || in crypto_ec_point_add() 1576 mp_mulmod(pa->y, &mu, modulus, ta->y) != MP_OKAY || in crypto_ec_point_add() 1577 mp_mulmod(pa->z, &mu, modulus, ta->z) != MP_OKAY || in crypto_ec_point_add() 1578 mp_mulmod(pb->x, &mu, modulus, tb->x) != MP_OKAY || in crypto_ec_point_add() 1579 mp_mulmod(pb->y, &mu, modulus, tb->y) != MP_OKAY || in crypto_ec_point_add() 1580 mp_mulmod(pb->z, &mu, modulus, tb->z) != MP_OKAY) { in crypto_ec_point_add()
|
/third_party/skia/src/codec/ |
D | SkBmpStandardCodec.cpp | 333 int modulus; in decodeIcoMask() local 334 SkTDivMod(srcX, 8, "ient, &modulus); in decodeIcoMask() 335 uint32_t shift = 7 - modulus; in decodeIcoMask()
|
/third_party/openssl/test/recipes/30-test_evp_pkey_provided/ |
D | RSA.priv.txt | 2 modulus: 3161751493 (0xbc747fc5)
|
/third_party/python/Modules/_decimal/libmpdec/ |
D | numbertheory.h | 44 mpd_uint_t modulus; member
|
/third_party/python/Modules/_decimal/tests/ |
D | bignum.py | 12 _PyHASH_MODULUS = sys.hash_info.modulus
|
/third_party/toybox/tests/ |
D | bc.test | 21 run_bc_test modulus
|