/external/boringssl/src/crypto/rsa/ |
D | rsa_impl.c | 711 if (!BN_mul(r1, r0, rsa->iqmp, ctx)) { in mod_exp() 730 if (!BN_mul(r1, r0, rsa->q, ctx)) { in mod_exp() 753 !BN_mul(m1, m1, ap->coeff, ctx) || in mod_exp() 756 !BN_mul(m1, m1, ap->r, ctx) || in mod_exp() 899 !BN_mul(rsa->n, rsa->p, rsa->q, ctx)) { in rsa_default_multi_prime_keygen() 944 if (!BN_mul(r1, rsa->n, ap->prime, ctx)) { in rsa_default_multi_prime_keygen() 967 } else if (!BN_mul(rsa->n, rsa->n, ap->prime, ctx)) { in rsa_default_multi_prime_keygen() 989 if (!BN_mul(r0, r1, r2, ctx)) { in rsa_default_multi_prime_keygen() 996 !BN_mul(r0, r0, r3, ctx)) { in rsa_default_multi_prime_keygen()
|
D | rsa.c | 597 if (!BN_mul(&n, key->p, key->q, ctx) || in RSA_check_key() 601 !BN_mul(&lcm, &pm1, &qm1, ctx) || in RSA_check_key() 615 if (!BN_mul(&n, &n, ap->prime, ctx) || in RSA_check_key() 617 !BN_mul(&lcm, &lcm, &pm1, ctx) || in RSA_check_key() 729 if (!BN_mul(totient, rsa->e, rsa->d, ctx) || in RSA_recover_crt_params() 785 !BN_mul(multiple, rsa->p, rsa->q, ctx)) { in RSA_recover_crt_params()
|
D | rsa_asn1.c | 256 !BN_mul(product_of_primes_so_far, ret->p, ret->q, ctx)) { in RSA_parse_private_key() 272 !BN_mul(product_of_primes_so_far, product_of_primes_so_far, in RSA_parse_private_key()
|
/external/vboot_reference/host/lib/ |
D | util_misc.c | 99 BN_mul(RRTemp, RR, R, bn_ctx); in vb_keyb_from_rsa()
|
/external/boringssl/src/crypto/bn/ |
D | exponentiation.c | 175 if (!BN_mul(rr, rr, v, ctx)) { in BN_exp() 323 if (!BN_mul(b, a, &(recp->Nr), ctx)) { in BN_div_recp() 331 if (!BN_mul(b, &(recp->N), d, ctx)) { in BN_div_recp() 380 if (!BN_mul(a, x, y, ctx)) { in BN_mod_mul_reciprocal()
|
D | bn_test.cc | 268 !BN_mul(ret.get(), a.get(), two.get(), ctx) || in TestLShift1() 346 !BN_mul(ret.get(), a.get(), a.get(), ctx) || in TestSquare() 401 !BN_mul(ret.get(), a.get(), b.get(), ctx) || in TestProduct() 429 !BN_mul(ret.get(), quotient.get(), b.get(), ctx) || in TestQuotient() 1286 if (!BN_mul(c.get(), a.get(), b.get(), ctx)) { in TestNegativeZero()
|
D | montgomery.c | 415 if (!BN_mul(tmp, a, b, ctx)) { in bn_mod_mul_montgomery_fallback()
|
D | gcd.c | 561 if (!BN_mul(tmp, D, X, ctx)) { in bn_mod_inverse_general()
|
D | div.c | 457 if (!BN_mul(t, a, b, ctx)) { in BN_mod_mul()
|
D | mul.c | 564 int BN_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) { in BN_mul() function
|
/external/vboot_reference/utility/ |
D | dumpRSAPublicKey.c | 93 BN_mul(RRTemp, RR, R, bn_ctx); in output()
|
/external/tpm2/ |
D | MathFunctions.c | 246 if (BN_mul(bnP, bnA, bnB, context) != 1) in _math__Mul()
|
D | CpriRSA.c | 187 if(BN_mul(bnN, bnP, bnQ, context) != 1) in _cpri__TestKeyRSA() 1331 BN_mul(bnN, bnP, bnQ, context); in _cpri__GenerateKeyRSA()
|
D | RSAKeySieve.c | 887 if( BN_mul(bnN, bnP, bnQ, context) != 1 in _cpri__GenerateKeyRSA()
|
D | CpriECC.c | 1897 if(!BN_mul(bnTa, bnTa, bnH, context)) in C_2_2_MQV() 2037 if(!BN_mul(bnTa, bnTa, bnH, context)) in SM2KeyExchange()
|
/external/boringssl/src/include/openssl/ |
D | bn.h | 411 OPENSSL_EXPORT int BN_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b,
|
/external/robolectric/v3/runtime/ |
D | android-all-4.1.2_r1-robolectric-0.jar | META-INF/
META-INF/MANIFEST.MF
android/
android/accessibilityservice/
android/ ... |
D | android-all-4.2.2_r1.2-robolectric-0.jar | META-INF/
META-INF/MANIFEST.MF
android/
android/accessibilityservice/
android/ ... |
D | android-all-4.3_r2-robolectric-0.jar | META-INF/
META-INF/MANIFEST.MF
android/
android/accessibilityservice/
android/ ... |
D | android-all-5.1.1_r9-robolectric-1.jar | META-INF/
META-INF/MANIFEST.MF
com/
com/google/
com/ ... |
D | android-all-5.0.0_r2-robolectric-1.jar | META-INF/
META-INF/MANIFEST.MF
com/
com/google/
com/ ... |
D | android-all-4.4_r1-robolectric-1.jar | META-INF/
META-INF/MANIFEST.MF
com/
com/google/
com/ ... |