Home
last modified time | relevance | path

Searched refs:modulus (Results 1 – 25 of 144) sorted by relevance

123456

/third_party/mesa3d/src/panfrost/util/
Dlcra.c53 l->modulus = calloc(sizeof(l->modulus[0]), node_count); in lcra_alloc_equations()
74 free(l->modulus); in lcra_free()
105 l->modulus[node] = DIV_ROUND_UP(bound - len + 1, 1 << alignment); in lcra_restrict_range()
173 unsigned Q = l->modulus[step]; in lcra_solve()
Dlcra.h54 uint8_t *modulus; member
/third_party/node/test/parallel/
Dtest-https-foafssl.js43 const modulus = fixtures.readKey('rsa_cert_foafssl_b.modulus', 'ascii').replace(/\n/g, ''); constant
57 assert.strictEqual(cert.modulus, modulus);
Dtest-crypto-x509.js280 modulus: 'D456320AFB20D3827093DC2C4284ED04DFBABD56E1DDAE529E28B790CD42' + property
310 assert.strictEqual(legacyObject.modulus, legacyObjectCheck.modulus);
Dtest-tls-peer-certificate.js64 assert.strictEqual(peerCert.modulus.length / 2 * 8, peerCert.bits);
120 assert.strictEqual(peerCert.modulus, undefined);
/third_party/mbedtls/tests/suites/
Dtest_suite_dhm.data73 Diffie-Hellman small modulus
76 Diffie-Hellman zero modulus
106 Diffie-Hellman MPI_MAX_SIZE modulus
109 Diffie-Hellman MPI_MAX_SIZE + 1 modulus
Dtest_suite_bignum_mod.function82 /* Make sure that the modulus doesn't have reference to mp anymore */
262 * limbs as the modulus. For negative testing we can ask it to skip this
363 * limbs as the modulus. For negative testing we can ask it to skip this
412 * limbs as the modulus. For negative testing we can ask it to skip this
468 * limbs as the modulus. For negative testing we can ask it to skip this
608 /* modulus->p == NULL || residue->p == NULL ( m has not been set-up ) */
615 /* Set up modulus and test with residue->p == NULL */
/third_party/pulseaudio/src/modules/raop/
Draop-crypto.c78 uint8_t modulus[256]; in rsa_encrypt() local
95 size = pa_raop_base64_decode(rsa_modulus, modulus); in rsa_encrypt()
97 n_bn = BN_bin2bn(modulus, size, NULL); in rsa_encrypt()
/third_party/openssl/doc/man3/
DRSA_size.pod5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits
31 RSA_size() returns the RSA modulus size in bytes. It can be used to
42 RSA_size() returns the size of modulus in bytes.
DEVP_PKEY_is_a.pod82 BIGNUM *modulus = NULL;
83 if (EVP_PKEY_get_bn_param(pkey, "n", &modulus))
84 /* do whatever with the modulus */
85 BN_free(modulus);
DRSA_generate_key.pod31 EVP_RSA_gen() generates a new RSA key pair with modulus size I<bits>.
46 The modulus size will be of length I<bits>, the number of primes to form the
47 modulus will be I<primes>, and the public exponent will be I<e>. Key sizes
52 I<primes> depends on modulus bit length:
DBN_mod_mul_montgomery.pod33 using the same modulus.
37 BN_MONT_CTX_set() sets up the I<mont> structure from the modulus I<m>
52 Note that I<a> must be nonnegative and smaller than the modulus.
/third_party/openssl/apps/
Ddsa.c87 int modulus = 0, pubin = 0, pubout = 0, ret = 1; in dsa_main() local
145 modulus = 1; in dsa_main()
211 if (modulus) { in dsa_main()
Drsa.c133 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; in rsa_main() local
201 modulus = 1; in rsa_main()
279 if (modulus) { in rsa_main()
/third_party/node/deps/openssl/openssl/apps/
Ddsa.c87 int modulus = 0, pubin = 0, pubout = 0, ret = 1; in dsa_main() local
145 modulus = 1; in dsa_main()
211 if (modulus) { in dsa_main()
Drsa.c133 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; in rsa_main() local
201 modulus = 1; in rsa_main()
279 if (modulus) { in rsa_main()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dcrypto_internal-modexp.c91 const u8 *modulus, size_t modulus_len, in crypto_mod_exp() argument
108 bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0) in crypto_mod_exp()
Dcrypto_wolfssl.c1315 mp_int *a, mp_int *modulus, mp_digit mp);
1552 mp_int *modulus = &e->prime; in crypto_ec_point_add() local
1562 ret = mp_montgomery_calc_normalization(&mu, modulus); in crypto_ec_point_add()
1581 if (mp_mulmod(pa->x, &mu, modulus, ta->x) != MP_OKAY || in crypto_ec_point_add()
1582 mp_mulmod(pa->y, &mu, modulus, ta->y) != MP_OKAY || in crypto_ec_point_add()
1583 mp_mulmod(pa->z, &mu, modulus, ta->z) != MP_OKAY || in crypto_ec_point_add()
1584 mp_mulmod(pb->x, &mu, modulus, tb->x) != MP_OKAY || in crypto_ec_point_add()
1585 mp_mulmod(pb->y, &mu, modulus, tb->y) != MP_OKAY || in crypto_ec_point_add()
1586 mp_mulmod(pb->z, &mu, modulus, tb->z) != MP_OKAY) { in crypto_ec_point_add()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dcrypto_internal-modexp.c91 const u8 *modulus, size_t modulus_len, in crypto_mod_exp() argument
108 bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0) in crypto_mod_exp()
Dcrypto_wolfssl.c1309 mp_int *a, mp_int *modulus, mp_digit mp);
1546 mp_int *modulus = &e->prime; in crypto_ec_point_add() local
1556 ret = mp_montgomery_calc_normalization(&mu, modulus); in crypto_ec_point_add()
1575 if (mp_mulmod(pa->x, &mu, modulus, ta->x) != MP_OKAY || in crypto_ec_point_add()
1576 mp_mulmod(pa->y, &mu, modulus, ta->y) != MP_OKAY || in crypto_ec_point_add()
1577 mp_mulmod(pa->z, &mu, modulus, ta->z) != MP_OKAY || in crypto_ec_point_add()
1578 mp_mulmod(pb->x, &mu, modulus, tb->x) != MP_OKAY || in crypto_ec_point_add()
1579 mp_mulmod(pb->y, &mu, modulus, tb->y) != MP_OKAY || in crypto_ec_point_add()
1580 mp_mulmod(pb->z, &mu, modulus, tb->z) != MP_OKAY) { in crypto_ec_point_add()
/third_party/skia/src/codec/
DSkBmpStandardCodec.cpp333 int modulus; in decodeIcoMask() local
334 SkTDivMod(srcX, 8, &quotient, &modulus); in decodeIcoMask()
335 uint32_t shift = 7 - modulus; in decodeIcoMask()
/third_party/openssl/test/recipes/30-test_evp_pkey_provided/
DRSA.priv.txt2 modulus: 3161751493 (0xbc747fc5)
/third_party/python/Modules/_decimal/libmpdec/
Dnumbertheory.h44 mpd_uint_t modulus; member
/third_party/python/Modules/_decimal/tests/
Dbignum.py12 _PyHASH_MODULUS = sys.hash_info.modulus
/third_party/toybox/tests/
Dbc.test21 run_bc_test modulus

123456