Home
last modified time | relevance | path

Searched refs:bnN (Results 1 – 8 of 8) sorted by relevance

/external/ms-tpm-20-ref/TPMCmd/tpm/src/support/
DMathOnByteBuffers.c148 BN_MAX(bnN); in ModExpB()
155 BnFromBytes(bnN, n, (NUMBYTES)nSize); in ModExpB()
162 if(BnUnsignedCmp(bnM, bnN) >= 0) in ModExpB()
164 BnModExp(bnC, bnM, bnE, bnN); in ModExpB()
186 BN_MAX_INITIALIZED(bnN, n); in DivideB()
192 BnDiv(bnQ, bnR, bnN, bnD); in DivideB()
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/
DCryptEccKeyExchange.c61 bigNum bnN // IN: the order of the curve in avf1() argument
65 int f = (BnSizeInBits(bnN) + 1) / 2; in avf1()
103 ECC_NUM(bnN); in C_2_2_MQV()
129 avf1(bnTa, bnN); in C_2_2_MQV()
131 BnModMult(bnTa, bnDsA, bnTa, bnN); in C_2_2_MQV()
134 BnMod(bnTa, bnN); in C_2_2_MQV()
147 avf1(bnXeB, bnN); in C_2_2_MQV()
DCryptPrimeSieve.c251 bigNum bnN, // IN/OUT: number to sieve in PrimeSieve() argument
270 pAssert(field != NULL && bnN != NULL); in PrimeSieve()
275 adjust = (UINT32)BnModWord(bnN, 105); in PrimeSieve()
281 BnSubWord(bnN, bnN, adjust); in PrimeSieve()
312 composite = (UINT32)BnModWord(bnN, composite); in PrimeSieve()
DCryptEccSignature.c88 bigConst bnN // IN: the order of the curve in BnSchnorrSign() argument
96 BnDiv(NULL, bnT1, bnR, bnN); in BnSchnorrSign()
105 BnDiv(NULL, bnS, bnT1, bnN); in BnSchnorrSign()
411 ECC_NUM(bnN); in BnSignEcSm2()
450 if(BnUnsignedCmp(bnT, bnN) == 0) in BnSignEcSm2()
DCryptRsa.c1007 BN_RSA_INITIALIZED(bnN, &publicArea->unique.rsa); in CryptRsaLoadPrivateExponent()
1025 VERIFY(BnDiv(Z->Q, bnQr, bnN, Z->P)); in CryptRsaLoadPrivateExponent()
1354 BN_RSA(bnN); in CryptRsaGenerateKey()
1435 BnMult(bnN, Z->P, Z->Q); in CryptRsaGenerateKey()
1436 BnTo2B(bnN, &publicArea->unique.rsa.b, in CryptRsaGenerateKey()
1469 BnGenerateRandomInRange(temp1, bnN, rand); in CryptRsaGenerateKey()
1472 BnModExp(temp2, temp1, bnPubExp, bnN); in CryptRsaGenerateKey()
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ossl/
DTpmToOsslMath.c361 BIG_INITIALIZED(bnN, number); in BnModExp()
365 VERIFY(BN_mod_exp(bnResult, bnN, bnE, bnM, CTX)); in BnModExp()
390 BIG_INITIALIZED(bnN, number); in BnModInverse()
393 VERIFY(BN_mod_inverse(bnResult, bnN, bnM, CTX) != NULL); in BnModInverse()
493 BIG_INITIALIZED(bnN, C->order); in BnCurveInitialize()
513 VERIFY(EC_GROUP_set_generator(E->G, P, bnN, bnH)); in BnCurveInitialize()
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/wolf/
DTpmToWolfMath.c319 MP_INITIALIZED(bnN, number); in BnModExp()
322 OK = (mp_exptmod( bnN, bnE, bnM, bnResult ) == MP_OKAY); in BnModExp()
344 MP_INITIALIZED(bnN, number); in BnModInverse()
347 OK = (mp_invmod(bnN, bnM, bnResult) == MP_OKAY); in BnModInverse()
/external/ms-tpm-20-ref/TPMCmd/tpm/include/prototypes/
DCryptPrimeSieve_fp.h96 bigNum bnN, // IN/OUT: number to sieve