/external/dropbear/libtomcrypt/src/pk/rsa/ |
D | rsa_exptmod.c | 66 …if ((err = mp_exptmod(tmp, key->dP, key->p, tmpa)) != CRYPT_OK) { go… in rsa_exptmod() 69 …if ((err = mp_exptmod(tmp, key->dQ, key->q, tmpb)) != CRYPT_OK) { go… in rsa_exptmod() 80 …if ((err = mp_exptmod(tmp, key->e, key->N, tmp)) != CRYPT_OK) { got… in rsa_exptmod()
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
D | katja_exptmod.c | 66 …if ((err = mp_exptmod(tmp, key->dP, key->p, tmpa)) != CRYPT_OK) { go… in katja_exptmod() 69 …if ((err = mp_exptmod(tmp, key->dQ, key->q, tmpb)) != CRYPT_OK) { go… in katja_exptmod() 80 …if ((err = mp_exptmod(tmp, key->N, key->N, tmp)) != CRYPT_OK) { go… in katja_exptmod()
|
/external/dropbear/libtommath/ |
D | bn_mp_exptmod.c | 24 int mp_exptmod (mp_int * G, mp_int * X, mp_int * P, mp_int * Y) in mp_exptmod() function 59 err = mp_exptmod(&tmpG, &tmpX, P, Y); in mp_exptmod()
|
D | bn_mp_prime_fermat.c | 45 if ((err = mp_exptmod (b, a, a, &t)) != MP_OKAY) { in mp_prime_fermat()
|
D | bn_mp_prime_miller_rabin.c | 65 if ((err = mp_exptmod (b, &r, a, &y)) != MP_OKAY) { in mp_prime_miller_rabin()
|
D | changes.txt | 31 …-- Paul Schmidt pointed out a linking error in mp_exptmod() when BN_S_MP_EXPTMOD_C is undefined (a… 64 -- Matt Johnston pointed out a missing semi-colon in mp_exptmod 242 -- Fixed bug in mp_exptmod that would cause it to fail for odd moduli when DIGIT_BIT != 28 243 …-- mp_exptmod now also returns errors if the modulus is negative and will handle negative exponents 254 …-- Fixed a lingering typo in mp_exptmod* that would set bitcnt to zero then one. Very silly stuff… 348 v0.06 -- Sped up the s_mp_add, s_mp_sub which inturn sped up mp_invmod, mp_exptmod, etc...
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
D | dsa_verify_key.c | 76 if ((err = mp_exptmod(key->g, key->q, key->p, tmp)) != CRYPT_OK) { goto error; } in dsa_verify_key() 83 if ((err = mp_exptmod(key->y, key->q, key->p, tmp)) != CRYPT_OK) { goto error; } in dsa_verify_key()
|
D | dsa_verify_hash.c | 68 …if ((err = mp_exptmod(key->g, u1, key->p, u1)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw() 69 …if ((err = mp_exptmod(key->y, u2, key->p, u2)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw()
|
D | dsa_make_key.c | 98 … if ((err = mp_exptmod(key->g, tmp2, key->p, tmp)) != CRYPT_OK) { goto error; } in dsa_make_key() 114 …if ((err = mp_exptmod(key->g, key->x, key->p, key->y)) != CRYPT_OK) { goto error; } in dsa_make_key()
|
D | dsa_shared_secret.c | 47 if ((err = mp_exptmod(base, private_key, public_key->p, res)) != CRYPT_OK) { in dsa_shared_secret()
|
D | dsa_encrypt_key.c | 91 if ((err = mp_exptmod(key->g, g_priv, key->p, g_pub)) != CRYPT_OK) { in dsa_encrypt_key()
|
D | dsa_sign_hash.c | 87 …if ((err = mp_exptmod(key->g, k, key->p, r)) != CRYPT_OK) { goto error; } in dsa_sign_hash_raw()
|
/external/dropbear/ |
D | rsa.c | 252 if (mp_exptmod(&rsa_s, key->e, key->n, &rsa_mdash) != MP_OKAY) { in buf_rsa_verify() 304 if (mp_exptmod(&rsa_tmp2, key->e, key->n, &rsa_s) != MP_OKAY) { in buf_put_rsa_sign() 316 if (mp_exptmod(&rsa_tmp2, key->d, key->n, &rsa_tmp1) != MP_OKAY) { in buf_put_rsa_sign() 331 if (mp_exptmod(&rsa_tmp1, key->d, key->n, &rsa_s) != MP_OKAY) { in buf_put_rsa_sign()
|
D | gendss.c | 170 if (mp_exptmod(&h, &div, key->p, key->g) != MP_OKAY) { in getg() 192 if (mp_exptmod(key->g, key->x, key->p, key->y) != MP_OKAY) { in gety()
|
D | dss.c | 230 if (mp_exptmod(key->g, &val3, key->p, &val2) != MP_OKAY) { in buf_dss_verify() 234 if (mp_exptmod(key->y, &val4, key->p, &val3) != MP_OKAY) { in buf_dss_verify() 357 if (mp_exptmod(key->g, &dss_k, key->p, &dss_temp1) != MP_OKAY) { in buf_put_dss_sign()
|
D | common-kex.c | 504 if (mp_exptmod(&dh_g, dh_priv, &dh_p, dh_pub) != MP_OKAY) { in gen_kexdh_vals() 534 if (mp_exptmod(dh_pub_them, dh_priv, &dh_p, ses.dh_K) != MP_OKAY) { in kexdh_comb_key()
|
/external/dropbear/libtommath/etc/ |
D | pprime.c | 268 if ((res = mp_exptmod (&x, &a, &n, &y)) != MP_OKAY) { /* y = x^a mod n */ in pprime() 285 if ((res = mp_exptmod (&x, &b, &n, &y)) != MP_OKAY) { /* y = x^b mod n */ in pprime() 302 if ((res = mp_exptmod (&x, &c, &n, &y)) != MP_OKAY) { /* y = x^ab mod n */ in pprime()
|
/external/dropbear/libtommath/demo/ |
D | timing.c | 258 DO(mp_exptmod(&c, &b, &a, &d)); in main() 265 mp_exptmod(&c, &b, &a, &e); /* c^(p-1-b) mod a */ in main()
|
/external/wpa_supplicant_8/src/tls/ |
D | bignum.c | 218 if (mp_exptmod((mp_int *) a, (mp_int *) b, (mp_int *) c, (mp_int *) d) in bignum_exptmod()
|
D | libtommath.c | 591 static int mp_exptmod (mp_int * G, mp_int * X, mp_int * P, mp_int * Y) in mp_exptmod() function 629 err = mp_exptmod(&tmpG, &tmpX, P, Y); in mp_exptmod() 633 #error mp_exptmod would always fail in mp_exptmod() 672 #error mp_exptmod could fail in mp_exptmod()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_libtomcrypt.c | 21 #define mp_exptmod(a,b,c,d) ltc_mp.exptmod(a,b,c,d) macro 711 if (mp_exptmod(b, p, m, r) != CRYPT_OK) in crypto_mod_exp()
|
/external/dropbear/libtommath/mtest/ |
D | mtest.c | 238 mp_exptmod(&a, &b, &c, &d); in main()
|
D | mpi.h | 153 mp_err mp_exptmod(mp_int *a, mp_int *b, mp_int *m, mp_int *c);
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_math.h | 493 #define mp_exptmod(a,b,c,d) ltc_mp.exptmod(a,b,c,d) macro
|
/external/dropbear/libtomcrypt/src/math/ |
D | ltm_desc.c | 382 return mpi_to_ltc_error(mp_exptmod(a,b,c,d)); in exptmod()
|