/external/ms-tpm-20-ref/TPMCmd/tpm/src/support/ |
D | MathOnByteBuffers.c | 148 BN_MAX(bnN); in ModExpB() 155 BnFromBytes(bnN, n, (NUMBYTES)nSize); in ModExpB() 162 if(BnUnsignedCmp(bnM, bnN) >= 0) in ModExpB() 164 BnModExp(bnC, bnM, bnE, bnN); in ModExpB() 186 BN_MAX_INITIALIZED(bnN, n); in DivideB() 192 BnDiv(bnQ, bnR, bnN, bnD); in DivideB()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ |
D | CryptEccKeyExchange.c | 61 bigNum bnN // IN: the order of the curve in avf1() argument 65 int f = (BnSizeInBits(bnN) + 1) / 2; in avf1() 103 ECC_NUM(bnN); in C_2_2_MQV() 129 avf1(bnTa, bnN); in C_2_2_MQV() 131 BnModMult(bnTa, bnDsA, bnTa, bnN); in C_2_2_MQV() 134 BnMod(bnTa, bnN); in C_2_2_MQV() 147 avf1(bnXeB, bnN); in C_2_2_MQV()
|
D | CryptPrimeSieve.c | 251 bigNum bnN, // IN/OUT: number to sieve in PrimeSieve() argument 270 pAssert(field != NULL && bnN != NULL); in PrimeSieve() 275 adjust = (UINT32)BnModWord(bnN, 105); in PrimeSieve() 281 BnSubWord(bnN, bnN, adjust); in PrimeSieve() 312 composite = (UINT32)BnModWord(bnN, composite); in PrimeSieve()
|
D | CryptEccSignature.c | 88 bigConst bnN // IN: the order of the curve in BnSchnorrSign() argument 96 BnDiv(NULL, bnT1, bnR, bnN); in BnSchnorrSign() 105 BnDiv(NULL, bnS, bnT1, bnN); in BnSchnorrSign() 411 ECC_NUM(bnN); in BnSignEcSm2() 450 if(BnUnsignedCmp(bnT, bnN) == 0) in BnSignEcSm2()
|
D | CryptRsa.c | 1007 BN_RSA_INITIALIZED(bnN, &publicArea->unique.rsa); in CryptRsaLoadPrivateExponent() 1025 VERIFY(BnDiv(Z->Q, bnQr, bnN, Z->P)); in CryptRsaLoadPrivateExponent() 1354 BN_RSA(bnN); in CryptRsaGenerateKey() 1435 BnMult(bnN, Z->P, Z->Q); in CryptRsaGenerateKey() 1436 BnTo2B(bnN, &publicArea->unique.rsa.b, in CryptRsaGenerateKey() 1469 BnGenerateRandomInRange(temp1, bnN, rand); in CryptRsaGenerateKey() 1472 BnModExp(temp2, temp1, bnPubExp, bnN); in CryptRsaGenerateKey()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ossl/ |
D | TpmToOsslMath.c | 361 BIG_INITIALIZED(bnN, number); in BnModExp() 365 VERIFY(BN_mod_exp(bnResult, bnN, bnE, bnM, CTX)); in BnModExp() 390 BIG_INITIALIZED(bnN, number); in BnModInverse() 393 VERIFY(BN_mod_inverse(bnResult, bnN, bnM, CTX) != NULL); in BnModInverse() 493 BIG_INITIALIZED(bnN, C->order); in BnCurveInitialize() 513 VERIFY(EC_GROUP_set_generator(E->G, P, bnN, bnH)); in BnCurveInitialize()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/wolf/ |
D | TpmToWolfMath.c | 319 MP_INITIALIZED(bnN, number); in BnModExp() 322 OK = (mp_exptmod( bnN, bnE, bnM, bnResult ) == MP_OKAY); in BnModExp() 344 MP_INITIALIZED(bnN, number); in BnModInverse() 347 OK = (mp_invmod(bnN, bnM, bnResult) == MP_OKAY); in BnModInverse()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/include/prototypes/ |
D | CryptPrimeSieve_fp.h | 96 bigNum bnN, // IN/OUT: number to sieve
|