/external/vboot_reference/host/lib/ |
D | util_misc.c | 100 BN_mod(RR, RRTemp, N, bn_ctx); in vb_keyb_from_rsa() 107 BN_mod(n, N, B, bn_ctx); /* n = N mod B */ in vb_keyb_from_rsa() 118 BN_mod(rr, RR, B, bn_ctx); /* rr = RR mod B */ in vb_keyb_from_rsa()
|
/external/vboot_reference/utility/ |
D | dumpRSAPublicKey.c | 94 BN_mod(RR, RRTemp, N, bn_ctx); in output() 101 BN_mod(n, N, B, bn_ctx); /* n = N mod B */ in output() 113 BN_mod(rr, RR, B, bn_ctx); /* rr = RR mod B */ in output()
|
/external/boringssl/src/crypto/rsa/ |
D | rsa_impl.c | 667 if (!BN_mod(r1, c, rsa->q, ctx)) { in mod_exp() 681 if (!BN_mod(r1, c, rsa->p, ctx)) { in mod_exp() 711 if (!BN_mod(r0, pr1, rsa->p, ctx)) { in mod_exp() 744 if (!BN_mod(r1, c, prime, ctx)) { in mod_exp() 761 !BN_mod(m1, m1, prime, ctx) || in mod_exp() 780 if (!BN_mod(vrfy, vrfy, rsa->n, ctx)) { in mod_exp() 1054 if (!BN_mod(rsa->dmp1, d, r1, ctx)) { in rsa_default_multi_prime_keygen() 1059 if (!BN_mod(rsa->dmq1, d, r2, ctx)) { in rsa_default_multi_prime_keygen() 1075 !BN_mod(ap->exp, rsa->d, ap->exp, ctx) || in rsa_default_multi_prime_keygen()
|
D | rsa.c | 630 !BN_mod(&dmp1, key->d, &pm1, ctx) || in RSA_check_key() 632 !BN_mod(&dmq1, key->d, &qm1, ctx) || in RSA_check_key() 774 !BN_mod(rsa->dmp1, rsa->d, rem, ctx) || in RSA_recover_crt_params() 776 !BN_mod(rsa->dmq1, rsa->d, rem, ctx) || in RSA_recover_crt_params()
|
/external/boringssl/src/crypto/bn/ |
D | prime.c | 736 if (!BN_mod(t1, rnd, add, ctx)) { in probable_prime_dh() 794 if (!BN_mod(t1, q, qadd, ctx)) { in probable_prime_dh_safe()
|
D | div.c | 384 if (!(BN_mod(r, m, d, ctx))) { in BN_nnmod() 473 return BN_mod(r, r, m, ctx); in BN_mod_sqr()
|
D | exponentiation.c | 995 if (!BN_mod(&am, a, m, ctx) || in BN_mod_exp_mont_consttime() 1217 (BN_mod(t, r, m, ctx) && (swap_tmp = r, r = t, t = swap_tmp, 1)))) in BN_mod_exp_mont_word() 1407 if (!BN_mod(val1[0], a1, m, ctx)) { in BN_mod_exp2_mont() 1442 if (!BN_mod(val2[0], a2, m, ctx)) { in BN_mod_exp2_mont()
|
D | montgomery.c | 281 if (!BN_mod(&(mont->RR), &(mont->RR), &(mont->N), ctx)) { in BN_MONT_CTX_set()
|
D | bn_test.cc | 976 if (!BN_mod(c.get(), a.get(), b.get(), ctx)) { in test_mod()
|
/external/boringssl/src/crypto/dsa/ |
D | dsa.c | 301 !BN_mod(c, X, r0, ctx) || in DSA_generate_parameters_ex() 667 if (!BN_mod(&u1, &t1, dsa->q, ctx)) { in DSA_do_check_signature() 829 if (!BN_mod(r, r, dsa->q, ctx)) { in DSA_sign_setup()
|
/external/tpm2/ |
D | CpriECC.c | 727 || BN_mod(bnD, bnD, bnNm1, context) != 1) in _cpri__GenerateKeyEcc() 862 BN_mod(bnR, bnR, bnN, context); in SignEcdsa() 993 OK = OK && BN_mod(bnT, bnT, bnN, context); in EcDaa() 1136 BN_mod(bnR, bnR, bnN, context); in SchnorrEcc() 1512 || !BN_mod(bnV, bnV, bnN, context)) in ValidateSignatureEcdsa()
|
D | part4.txt | 33915 633 || BN_mod(bnD, bnD, bnNm1, context) != 1) 34079 767 BN_mod(bnR, bnR, bnN, context); 34241 903 OK = OK && BN_mod(bnT, bnT, bnN, context); 34381 1014 BN_mod(bnR, bnR, bnN, context); 34831 1397 || !BN_mod(bnV, bnV, bnN, context))
|
/external/boringssl/src/include/openssl/ |
D | bn.h | 504 #define BN_mod(rem, numerator, divisor, ctx) \ macro
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_pwd.c | 225 BN_mod(data->my_scalar, data->my_scalar, data->grp->order, in eap_pwd_build_commit_req()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_pwd.c | 401 BN_mod(data->my_scalar, data->my_scalar, data->grp->order, in eap_pwd_perform_commit_exchange()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_openssl.c | 1073 res = BN_mod((BIGNUM *) c, (const BIGNUM *) a, (const BIGNUM *) b, in crypto_bignum_mod()
|