Home
last modified time | relevance | path

Searched refs:MP_OKAY (Results 1 – 6 of 6) sorted by relevance

/external/wpa_supplicant_8/src/tls/
Dlibtommath.c101 #define MP_OKAY 0 /* ok result */ macro
240 if ((res = mp_grow (c, max + 1)) != MP_OKAY) { in s_mp_add()
303 return MP_OKAY; in s_mp_add()
318 if ((res = mp_grow (c, max)) != MP_OKAY) { in s_mp_sub()
370 return MP_OKAY; in s_mp_sub()
396 return MP_OKAY; in mp_init()
545 if ((res = mp_init (&t)) != MP_OKAY) { in mp_mulmod()
549 if ((res = mp_mul (a, b, &t)) != MP_OKAY) { in mp_mulmod()
565 if ((res = mp_init (&t)) != MP_OKAY) { in mp_mod()
569 if ((res = mp_div (a, b, NULL, &t)) != MP_OKAY) { in mp_mod()
[all …]
Dbignum.c35 if (mp_init((mp_int *) n) != MP_OKAY) { in bignum_init()
82 if (mp_to_unsigned_bin((mp_int *) n, buf) != MP_OKAY) { in bignum_get_unsigned_bin()
101 if (mp_read_unsigned_bin((mp_int *) n, (u8 *) buf, len) != MP_OKAY) { in bignum_set_unsigned_bin()
143 if (mp_add((mp_int *) a, (mp_int *) b, (mp_int *) c) != MP_OKAY) { in bignum_add()
161 if (mp_sub((mp_int *) a, (mp_int *) b, (mp_int *) c) != MP_OKAY) { in bignum_sub()
179 if (mp_mul((mp_int *) a, (mp_int *) b, (mp_int *) c) != MP_OKAY) { in bignum_mul()
199 != MP_OKAY) { in bignum_mulmod()
219 != MP_OKAY) { in bignum_exptmod()
/external/wpa_supplicant_8/src/crypto/
Dcrypto_wolfssl.c1016 if (!a || mp_init(a) != MP_OKAY) { in crypto_bignum_init()
1036 if (mp_read_unsigned_bin(a, buf, len) != MP_OKAY) { in crypto_bignum_init_set()
1056 if (mp_set_int(a, val) != MP_OKAY) { in crypto_bignum_init_uint()
1117 mp_read_unsigned_bin((mp_int *) r, buf, len) != MP_OKAY || in crypto_bignum_rand()
1131 (mp_int *) r) == MP_OKAY ? 0 : -1; in crypto_bignum_add()
1140 (mp_int *) r) == MP_OKAY ? 0 : -1; in crypto_bignum_mod()
1153 (mp_int *) r) == MP_OKAY ? 0 : -1; in crypto_bignum_exptmod()
1165 (mp_int *) r) == MP_OKAY ? 0 : -1; in crypto_bignum_inverse()
1177 (mp_int *) r) == MP_OKAY ? 0 : -1; in crypto_bignum_sub()
1189 NULL) == MP_OKAY ? 0 : -1; in crypto_bignum_div()
[all …]
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/wolf/
DTpmToWolfMath.c195 OK = (mp_mul( bnOp1, bnOp2, bnTemp ) == MP_OKAY); in BnModMult()
225 OK = (mp_mul( bnA, bnB, bnTemp ) == MP_OKAY); in BnMult()
268 OK = (mp_div(bnDend , bnSor, bnQ, bnR) == MP_OKAY); in BnDiv()
296 OK = (mp_gcd( bn1, bn2, bnGcd ) == MP_OKAY); in BnGcd()
322 OK = (mp_exptmod( bnN, bnE, bnM, bnResult ) == MP_OKAY); in BnModExp()
347 OK = (mp_invmod(bnN, bnM, bnResult) == MP_OKAY); in BnModInverse()
431 OK = (wc_ecc_mulmod(bnD, pS, pR, NULL, bnPrime, 1 ) == MP_OKAY); in BnEccModMult()
472 OK = (ecc_mul2add(pS, bnD, pQ, bnU, pR, bnA, bnPrime, NULL) == MP_OKAY); in BnEccModMult2()
507 OK = (mp_montgomery_setup(bnMod, &mp) == MP_OKAY); in BnEccAdd()
508 OK = OK && (ecc_projective_add_point(pS, pQ, pR, bnA, bnMod, mp ) == MP_OKAY); in BnEccAdd()
/external/python/cpython3/Modules/
D_tkinter.c989 if (mp_read_radix(&bigValue, hexchars, 16) != MP_OKAY) { in asBignumObj()
1188 &numBytes) != MP_OKAY) { in fromBignumObj()
/external/python/cpython2/Modules/
D_tkinter.c1069 if (mp_read_radix(&bigValue, hexchars, 16) != MP_OKAY) { in asBignumObj()
1274 &numBytes) != MP_OKAY) { in fromBignumObj()