/external/dropbear/libtomcrypt/src/pk/ecc/ |
D | ltc_ecc_projective_add_point.c | 70 if ((err = mp_mul(t1, x, x)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 73 if ((err = mp_mul(Q->z, t1, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 76 if ((err = mp_mul(t1, y, y)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 84 if ((err = mp_mul(Q->x, t1, t2)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 87 if ((err = mp_mul(z, t1, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 90 if ((err = mp_mul(Q->y, t1, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 127 if ((err = mp_mul(z, Q->z, z)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 132 if ((err = mp_mul(z, x, z)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 136 if ((err = mp_mul(t1, x, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 142 if ((err = mp_mul(t2, x, t2)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() [all …]
|
D | ltc_ecc_map.c | 55 if ((err = mp_mul(t1, t2, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_map() 59 if ((err = mp_mul(P->x, t2, P->x)) != CRYPT_OK) { goto done; } in ltc_ecc_map() 61 if ((err = mp_mul(P->y, t1, P->y)) != CRYPT_OK) { goto done; } in ltc_ecc_map()
|
D | ltc_ecc_projective_dbl_point.c | 58 if ((err = mp_mul(R->z, R->y, R->z)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 77 if ((err = mp_mul(t1, t2, t2)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 107 if ((err = mp_mul(R->y, R->x, R->y)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 130 if ((err = mp_mul(R->y, t1, R->y)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point()
|
/external/dropbear/libtommath/ |
D | bn_mp_toom_mul.c | 73 if ((res = mp_mul(&a0, &b0, &w0)) != MP_OKAY) { in mp_toom_mul() 78 if ((res = mp_mul(&a2, &b2, &w4)) != MP_OKAY) { in mp_toom_mul() 109 if ((res = mp_mul(&tmp1, &tmp2, &w1)) != MP_OKAY) { in mp_toom_mul() 140 if ((res = mp_mul(&tmp1, &tmp2, &w3)) != MP_OKAY) { in mp_toom_mul() 158 if ((res = mp_mul(&tmp1, &tmp2, &w2)) != MP_OKAY) { in mp_toom_mul()
|
D | bn_mp_exteuclid.c | 44 if ((err = mp_mul(&v1, &q, &tmp)) != MP_OKAY) { goto _ERR; } in mp_exteuclid() 46 if ((err = mp_mul(&v2, &q, &tmp)) != MP_OKAY) { goto _ERR; } in mp_exteuclid() 48 if ((err = mp_mul(&v3, &q, &tmp)) != MP_OKAY) { goto _ERR; } in mp_exteuclid()
|
D | bn_mp_karatsuba_mul.c | 120 if (mp_mul (&x0, &y0, &x0y0) != MP_OKAY) in mp_karatsuba_mul() 122 if (mp_mul (&x1, &y1, &x1y1) != MP_OKAY) in mp_karatsuba_mul() 130 if (mp_mul (&t1, &x0, &t1) != MP_OKAY) in mp_karatsuba_mul()
|
D | bn_mp_lcm.c | 40 res = mp_mul(b, &t2, c); in mp_lcm() 46 res = mp_mul(a, &t2, c); in mp_lcm()
|
D | bn_s_mp_exptmod.c | 124 if ((err = mp_mul (&M[x - 1], &M[1], &M[x])) != MP_OKAY) { in s_mp_exptmod() 199 if ((err = mp_mul (&res, &M[bitbuf], &res)) != MP_OKAY) { in s_mp_exptmod() 227 if ((err = mp_mul (&res, &M[1], &res)) != MP_OKAY) { in s_mp_exptmod()
|
D | bn_mp_exptmod_fast.c | 185 if ((err = mp_mul (&M[x - 1], &M[1], &M[x])) != MP_OKAY) { in mp_exptmod_fast() 254 if ((err = mp_mul (&res, &M[bitbuf], &res)) != MP_OKAY) { in mp_exptmod_fast() 283 if ((err = mp_mul (&res, &M[1], &res)) != MP_OKAY) { in mp_exptmod_fast()
|
D | bn_mp_mulmod.c | 28 if ((res = mp_mul (a, b, &t)) != MP_OKAY) { in mp_mulmod()
|
D | bn_mp_expt_d.c | 40 if ((res = mp_mul (c, &g, c)) != MP_OKAY) { in mp_expt_d()
|
D | bn_mp_reduce_2k_l.c | 39 if ((res = mp_mul(&q, d, &q)) != MP_OKAY) { in mp_reduce_2k_l()
|
D | bn_mp_mul.c | 19 int mp_mul (mp_int * a, mp_int * b, mp_int * c) in mp_mul() function
|
D | bn_mp_reduce.c | 37 if ((res = mp_mul (&q, mu, &q)) != MP_OKAY) { in mp_reduce()
|
D | bn_mp_n_root.c | 72 if ((res = mp_mul (&t3, &t1, &t2)) != MP_OKAY) { in mp_n_root()
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
D | katja_make_key.c | 70 …if ((err = mp_mul(key->p, key->q, key->pq)) != CRYPT_OK) { goto error2; } /* tmp1 = pq … in katja_make_key() 71 …if ((err = mp_mul(key->pq, key->p, key->N)) != CRYPT_OK) { goto error2; } /* N = p^2q … in katja_make_key()
|
D | katja_exptmod.c | 76 …if ((err = mp_mul(tmp, key->q, tmp)) != CRYPT_OK) { go… in katja_exptmod()
|
/external/dropbear/libtommath/etc/ |
D | mont.c | 28 mp_mul(&p, &R, &pp); /* pp = R * p */ in main()
|
D | tune.c | 78 mp_mul(&a,&b,&c); in time_mult()
|
/external/dropbear/libtommath/pre_gen/ |
D | mpi.c | 2480 if ((res = mp_mul (c, &g, c)) != MP_OKAY) { in mp_expt_d() 2802 if ((err = mp_mul (&M[x - 1], &M[1], &M[x])) != MP_OKAY) { in mp_exptmod_fast() 2871 if ((err = mp_mul (&res, &M[bitbuf], &res)) != MP_OKAY) { in mp_exptmod_fast() 2900 if ((err = mp_mul (&res, &M[1], &res)) != MP_OKAY) { in mp_exptmod_fast() 2986 if ((err = mp_mul(&v1, &q, &tmp)) != MP_OKAY) { goto _ERR; } in mp_exteuclid() 2988 if ((err = mp_mul(&v2, &q, &tmp)) != MP_OKAY) { goto _ERR; } in mp_exteuclid() 2990 if ((err = mp_mul(&v3, &q, &tmp)) != MP_OKAY) { goto _ERR; } in mp_exteuclid() 4214 if (mp_mul (&x0, &y0, &x0y0) != MP_OKAY) in mp_karatsuba_mul() 4216 if (mp_mul (&x1, &y1, &x1y1) != MP_OKAY) in mp_karatsuba_mul() 4224 if (mp_mul (&t1, &x0, &t1) != MP_OKAY) in mp_karatsuba_mul() [all …]
|
/external/dropbear/libtommath/mtest/ |
D | mpi.h | 126 mp_err mp_mul(mp_int *a, mp_int *b, mp_int *c); 131 #define mp_sqr(a, b) mp_mul(a, a, b)
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
D | rsa_exptmod.c | 76 …if ((err = mp_mul(tmp, key->q, tmp)) != CRYPT_OK) { go… in rsa_exptmod()
|
/external/wpa_supplicant/ |
D | libtommath.c | 440 static int mp_mul (mp_int * a, mp_int * b, mp_int * c) in mp_mul() function 476 #error mp_mul could fail in mp_mul() 496 if ((res = mp_mul (a, b, &t)) != MP_OKAY) { in mp_mulmod() 1711 if ((err = mp_mul (&M[x - 1], &M[1], &M[x])) != MP_OKAY) { in s_mp_exptmod() 1786 if ((err = mp_mul (&res, &M[bitbuf], &res)) != MP_OKAY) { in s_mp_exptmod() 1814 if ((err = mp_mul (&res, &M[1], &res)) != MP_OKAY) { in s_mp_exptmod() 1896 if ((res = mp_mul(&q, d, &q)) != MP_OKAY) { in mp_reduce_2k_l() 2000 if ((res = mp_mul (&q, mu, &q)) != MP_OKAY) { in mp_reduce()
|
D | bignum.c | 185 if (mp_mul((mp_int *) a, (mp_int *) b, (mp_int *) c) != MP_OKAY) { in bignum_mul()
|
/external/dropbear/ |
D | genrsa.c | 71 if (mp_mul(key->p, key->q, key->n) != MP_OKAY) { in gen_rsa_priv_key()
|