/external/dropbear/libtomcrypt/src/pk/rsa/ |
D | rsa_make_key.c | 59 … if ((err = mp_sub_d( p, 1, tmp1)) != CRYPT_OK) { goto errkey; } /* tmp1 = p-1 */ in rsa_make_key() 66 … if ((err = mp_sub_d( q, 1, tmp1)) != CRYPT_OK) { goto errkey; } /* tmp1 = q-1 */ in rsa_make_key() 71 …if ((err = mp_sub_d( p, 1, tmp2)) != CRYPT_OK) { goto errkey; } /* tmp2 = p-1 */ in rsa_make_key() 86 …if ((err = mp_sub_d( p, 1, tmp1)) != CRYPT_OK) { goto errkey; } /* tmp1 = q-1… in rsa_make_key() 87 …if ((err = mp_sub_d( q, 1, tmp2)) != CRYPT_OK) { goto errkey; } /* tmp2 = p-1… in rsa_make_key()
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
D | katja_make_key.c | 53 if ((err = mp_sub_d(q, 1, tmp1)) != CRYPT_OK) { goto done; } in katja_make_key() 72 …if ((err = mp_sub_d( p, 1, tmp1)) != CRYPT_OK) { goto error2; } /* tmp1 = q-1… in katja_make_key() 73 …if ((err = mp_sub_d( q, 1, tmp2)) != CRYPT_OK) { goto error2; } /* tmp2 = p-1… in katja_make_key()
|
/external/dropbear/libtommath/etc/ |
D | 2kprime.c | 27 mp_sub_d(&q, 4, &q); in main() 48 mp_sub_d(&q, 1, &p); in main()
|
D | mersenne.c | 28 if ((res = mp_sub_d (&n, 1, &n)) != MP_OKAY) { in is_mersenne() 41 if ((res = mp_sub_d (&u, 2, &u)) != MP_OKAY) { in is_mersenne()
|
D | drprime.c | 37 mp_sub_d(&a, 1, &b); in main()
|
D | pprime.c | 342 mp_sub_d (&n, 1, q); in pprime()
|
/external/dropbear/libtommath/ |
D | bn_mp_prime_next_prime.c | 84 if ((err = mp_sub_d(a, (a->dp[0] & 3) + 1, a)) != MP_OKAY) { return err; }; in mp_prime_next_prime() 89 if ((err = mp_sub_d(a, 1, a)) != MP_OKAY) { in mp_prime_next_prime()
|
D | bn_mp_add_d.c | 38 res = mp_sub_d(a, b, c); in mp_add_d()
|
D | bn_mp_prime_miller_rabin.c | 42 if ((err = mp_sub_d (&n1, 1, &n1)) != MP_OKAY) { in mp_prime_miller_rabin()
|
D | bn_mp_sub_d.c | 20 mp_sub_d (mp_int * a, mp_digit b, mp_int * c) in mp_sub_d() function
|
D | bn_mp_prime_random_ex.c | 100 if ((err = mp_sub_d(a, 1, a)) != MP_OKAY) { goto error; } in mp_prime_random_ex()
|
D | bn_mp_n_root.c | 104 if ((res = mp_sub_d (&t1, 1, &t1)) != MP_OKAY) { in mp_n_root()
|
D | tommath.h | 337 int mp_sub_d(mp_int *a, mp_digit b, mp_int *c);
|
/external/dropbear/libtommath/demo/ |
D | timing.c | 251 mp_sub_d(&a, 1, &c); in main() 263 mp_sub_d(&a, 1, &e); in main()
|
D | demo.c | 211 mp_sub_d(&a, 1, &a); in main() 258 mp_sub_d(&a, 2, &a); /* a = 2**cnt - 2 */ in main() 724 mp_sub_d(&a, ix, &c); in main()
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
D | dsa_verify_key.c | 57 if ((err = mp_sub_d(key->p, 1, tmp)) != CRYPT_OK) { goto error; } in dsa_verify_key()
|
/external/dropbear/ |
D | genrsa.c | 120 if (mp_sub_d(prime, 1, primeminus) != MP_OKAY) { in getrsaprime()
|
D | gendss.c | 157 if (mp_sub_d(key->p, 1, &val) != MP_OKAY) { in getg()
|
D | common-kex.c | 493 if (mp_sub_d(&dh_p, 1, dh_priv) != MP_OKAY) { in gen_kexdh_vals()
|
D | keyimport.c | 780 if (mp_sub_d(key->rsakey->p, 1, &tmpval) != MP_OKAY) { in openssh_write() 790 if (mp_sub_d(key->rsakey->q, 1, &tmpval) != MP_OKAY) { in openssh_write()
|
/external/dropbear/libtommath/mtest/ |
D | mtest.c | 294 mp_sub_d(&a, tmp, &b); in main()
|
D | mpi.h | 108 mp_err mp_sub_d(mp_int *a, mp_digit d, mp_int *b);
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_math.h | 473 #define mp_sub_d(a, b, c) ltc_mp.subi(a, b, c) macro
|
/external/dropbear/libtomcrypt/src/math/ |
D | ltm_desc.c | 235 return mpi_to_ltc_error(mp_sub_d(a, b, c)); in subi()
|
/external/dropbear/libtommath/pre_gen/ |
D | mpi.c | 905 res = mp_sub_d(a, b, c); in mp_add_d() 5391 if ((res = mp_sub_d (&t1, 1, &t1)) != MP_OKAY) { in mp_n_root() 5770 if ((err = mp_sub_d (&n1, 1, &n1)) != MP_OKAY) { in mp_prime_miller_rabin() 5919 if ((err = mp_sub_d(a, (a->dp[0] & 3) + 1, a)) != MP_OKAY) { return err; }; in mp_prime_next_prime() 5924 if ((err = mp_sub_d(a, 1, a)) != MP_OKAY) { in mp_prime_next_prime() 6165 if ((err = mp_sub_d(a, 1, a)) != MP_OKAY) { goto error; } in mp_prime_random_ex() 7538 mp_sub_d (mp_int * a, mp_digit b, mp_int * c) in mp_sub_d() function
|