Home
last modified time | relevance | path

Searched refs:prime (Results 1 – 25 of 85) sorted by relevance

1234

/external/dropbear/libtommath/etc/
Ddrprimes.283 224-bit prime:
6 532-bit prime:
9 784-bit prime:
12 1036-bit prime:
15 1540-bit prime:
18 2072-bit prime:
21 3080-bit prime:
24 4116-bit prime:
Ddrprimes.txt1 300-bit prime:
4 540-bit prime:
7 780-bit prime:
/external/dropbear/libtomcrypt/src/pk/ecc/
Decc_shared_secret.c39 void *prime; in ecc_shared_secret() local
66 if ((err = mp_init(&prime)) != CRYPT_OK) { in ecc_shared_secret()
71 …if ((err = mp_read_radix(prime, (char *)private_key->dp->prime, 16)) != CRYPT_OK) … in ecc_shared_secret()
72 …if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, prime, 1)) != CRYPT_OK) … in ecc_shared_secret()
74 x = (unsigned long)mp_unsigned_bin_size(prime); in ecc_shared_secret()
86 mp_clear(prime); in ecc_shared_secret()
Decc_import.c28 void *prime, *b, *t1, *t2; in is_point() local
31 if ((err = mp_init_multi(&prime, &b, &t1, &t2, NULL)) != CRYPT_OK) { in is_point()
36 …if ((err = mp_read_radix(prime, key->dp->prime, 16)) != CRYPT_OK) { goto … in is_point()
44 …if ((err = mp_mod(t2, prime, t2)) != CRYPT_OK) { goto … in is_point()
54 …if ((err = mp_mod(t1, prime, t1)) != CRYPT_OK) { goto … in is_point()
56 …if ((err = mp_add(t1, prime, t1)) != CRYPT_OK) { goto err… in is_point()
58 while (mp_cmp(t1, prime) != LTC_MP_LT) { in is_point()
59 …if ((err = mp_sub(t1, prime, t1)) != CRYPT_OK) { goto err… in is_point()
70 mp_clear_multi(prime, b, t1, t2, NULL); in is_point()
Decc_make_key.c54 void *prime; in ecc_make_key_ex() local
85 …if ((err = mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, &prime, NULL)) !… in ecc_make_key_ex()
95 …if ((err = mp_read_radix(prime, (char *)key->dp->prime, 16)) != CRYPT_OK) { got… in ecc_make_key_ex()
102 …if ((err = ltc_mp.ecc_ptmul(key->k, base, &key->pubkey, prime, 1)) != CRYPT_OK) { got… in ecc_make_key_ex()
112 mp_clear(prime); in ecc_make_key_ex()
/external/dropbear/
Dgenrsa.c36 static void getrsaprime(mp_int* prime, mp_int *primeminus,
96 static void getrsaprime(mp_int* prime, mp_int *primeminus, in getrsaprime() argument
111 bytes_to_mp(prime, buf, size+1); in getrsaprime()
114 if (mp_prime_next_prime(prime, 8, 0) != MP_OKAY) { in getrsaprime()
120 if (mp_sub_d(prime, 1, primeminus) != MP_OKAY) { in getrsaprime()
/external/openssl/crypto/dh/
Dgenerate20 q should be prime, and ideally should be a "strong prime",
21 which means it's of the form 2n+1 where n is also prime.
30 relatively prime to q-1. Usually a small prime like 2, 3 or 5 will
41 Since your prime is really random, proving it is hard.
47 to be a non-square. If (P-1)/2 is also prime, then
Dexample27 Hi. I've generated a 2047-bit "strong" prime number that I would like to
29 'p' prime, but so is (p-1)/2.
33 However, to increase my confidence that this number really is a strong prime,
44 The generator, g, for this prime is 2.
/external/icu4c/data/translit/
DUzbek_Latin_BGN.txt12 $prime = ʹ ;
98 Ъ → $prime ; # CYRILLIC CAPITAL LETTER HARD SIGN
99 ъ → $prime ; # CYRILLIC SMALL LETTER HARD SIGN
100 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN
101 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
DMongolian_Latin_BGN.txt12 $prime = ʹ ;
89 Ъ → $prime ; # CYRILLIC CAPITAL LETTER HARD SIGN
90 ъ → $prime ; # CYRILLIC SMALL LETTER HARD SIGN
DKirghiz_Latin_BGN.txt12 $prime = ʹ ;
99 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN
100 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
DBelarusian_Latin_BGN.txt12 $prime = ʹ ;
97 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN
98 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
DUkrainian_Latin_BGN.txt12 $prime = ʹ ;
114 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN
115 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
DTurkmen_Latin_BGN.txt11 $prime = ʹ ;
112 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN
113 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
/external/chromium/third_party/icu/source/data/translit/
DUzbek_Latin_BGN.txt12 $prime = ʹ ;
98 Ъ → $prime ; # CYRILLIC CAPITAL LETTER HARD SIGN
99 ъ → $prime ; # CYRILLIC SMALL LETTER HARD SIGN
100 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN
101 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
DMongolian_Latin_BGN.txt12 $prime = ʹ ;
89 Ъ → $prime ; # CYRILLIC CAPITAL LETTER HARD SIGN
90 ъ → $prime ; # CYRILLIC SMALL LETTER HARD SIGN
DKirghiz_Latin_BGN.txt12 $prime = ʹ ;
99 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN
100 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
DBelarusian_Latin_BGN.txt12 $prime = ʹ ;
97 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN
98 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
DRussian_Latin_BGN.txt12 $prime = ʹ ;
112 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN
113 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
DUkrainian_Latin_BGN.txt12 $prime = ʹ ;
114 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN
115 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
/external/dropbear/libtomcrypt/notes/
Dtech0006.txt28 p INTEGER , -- prime modulus
29 q INTEGER , -- order of sub-group (must be prime)
39 p INTEGER , -- prime modulus
40 q INTEGER , -- order of sub-group (must be prime)
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
Ddh_groups.c573 if (os_memcmp(wpabuf_head(*priv), dh->prime, dh->prime_len) > 0) { in dh_init()
585 dh->prime, dh->prime_len, wpabuf_mhead(pv), in dh_init()
621 dh->prime, dh->prime_len, in dh_derive_shared()
/external/oauth/core/src/main/java/net/oauth/
DOAuth.java242 final int prime = 31; in hashCode() local
244 result = prime * result + ((key == null) ? 0 : key.hashCode()); in hashCode()
245 result = prime * result + ((value == null) ? 0 : value.hashCode()); in hashCode()
/external/chromium/third_party/icu/source/test/perf/unisetperf/draft/
Dbitset.cpp35 const int32_t prime=1301; // Less than 2k. member
64 hash=(hash+prime)&0x7ff; in map()
/external/icu4c/test/perf/unisetperf/draft/
Dbitset.cpp35 const int32_t prime=1301; // Less than 2k. member
64 hash=(hash+prime)&0x7ff; in map()

1234