/freebsd-13-stable/usr.bin/primes/ |
H A D | pr_tbl.c | 42 * prime - prime table 46 * chongo <for a good prime call: 391581 * 2^216193 - 1> /\oo/\ 56 const ubig prime[] = { variable 547 /* pr_limit - largest prime in the prime table */ 548 const ubig *const pr_limit = &prime[(sizeof(prime)/sizeof(prime[0]))-1];
|
H A D | primes.h | 41 * chongo <for a good prime call: 391581 * 2^216193 - 1> /\oo/\ 54 * prime[i] is the (i-1)th prime. 59 extern const ubig prime[]; 60 extern const ubig *const pr_limit; /* largest prime in the prime array */
|
H A D | primes.c | 52 * chongo <for a good prime call: 391581 * 2^216193 - 1> /\oo/\ 84 * sieve, table[i] == 1 if and only if 2*i-1 is prime. 214 const ubig *p; /* prime table pointer */ 215 ubig fact_lim; /* highest prime for current block */ 248 for (p = &prime[0], factor = prime[0]; 292 factor = 17; /* 17 is first prime to use */ 293 p = &prime[7]; /* 19 is next prime, pi(19)=7 */
|
/freebsd-13-stable/contrib/bmake/unit-tests/ |
H A D | cond1.exp | 3 2 is prime 13 1 is not prime 14 2 is prime 15 3 is prime 16 4 is not prime 17 5 is prime
|
H A D | cond1.mk | 109 @echo "$n is $X prime" 112 @echo "${NUMBERS:@n@$n is ${("${PRIMES:M$n}" == ""):?not:} prime${.newline}@}"
|
/freebsd-13-stable/contrib/wpa/src/common/ |
H A D | dragonfly.c | 21 * purposes: FFC groups whose prime is >= 3072 bits and ECC groups 22 * defined over a prime field whose prime is >= 256 bits. Furthermore, 26 * timing information due to the prime not being close to a power of 44 /* FFC groups that have prime that is close to a power of two */ 53 int dragonfly_get_random_qr_qnr(const struct crypto_bignum *prime, argument 64 if (!tmp || crypto_bignum_rand(tmp, prime) < 0) { 69 res = crypto_bignum_legendre(tmp, prime); 88 dragonfly_get_rand_1_to_p_1(const struct crypto_bignum *prime) argument 96 crypto_bignum_sub(prime, on 116 const struct crypto_bignum *prime; local [all...] |
H A D | dragonfly.h | 20 int dragonfly_get_random_qr_qnr(const struct crypto_bignum *prime,
|
H A D | sae.c | 47 tmp->prime = crypto_ec_get_prime(tmp->ec); 65 tmp->prime_buf = crypto_bignum_init_set(tmp->dh->prime, 71 tmp->prime = tmp->prime_buf; 141 const u8 *prime, const u8 *qr, const u8 *qnr, 155 prime, sae->tmp->prime_len, pwd_value, bits) < 0) 162 cmp_prime = const_time_memcmp(pwd_value, prime, sae->tmp->prime_len); 164 * being smaller than prime. */ 203 sae->tmp->dh->prime, sae->tmp->prime_len, pwd_value, 210 res = const_time_memcmp(pwd_value, sae->tmp->dh->prime, 244 crypto_bignum_sub(sae->tmp->prime, 140 sae_test_pwd_seed_ecc(struct sae_data *sae, const u8 *pwd_seed, const u8 *prime, const u8 *qr, const u8 *qnr, u8 *pwd_value) argument 287 u8 prime[SAE_MAX_ECC_PRIME_LEN]; local 960 u8 prime[SAE_MAX_ECC_PRIME_LEN]; local [all...] |
H A D | sae.h | 38 const struct crypto_bignum *prime; member in struct:sae_temporary_data
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | crypto_internal-modexp.c | 16 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 23 if (os_memcmp(privkey, prime, prime_len) > 0) { 24 /* Make sure private value is smaller than prime */ 29 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, 42 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 53 os_memcmp(pubkey, prime, prime_len) >= 0)) 70 bignum_set_unsigned_bin(p, prime, prime_len) < 0 || 82 prime, prime_len, secret, len);
|
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
H A D | crypto_nettle.c | 307 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 314 if (os_memcmp(privkey, prime, prime_len) > 0) { 315 /* Make sure private value is smaller than prime */ 320 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, 333 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 344 os_memcmp(pubkey, prime, prime_len) >= 0)) 358 mpz_import(p, prime_len, 1, 1, 1, 0, prime); 368 prime, prime_len, secret, len);
|
H A D | crypto_wolfssl.c | 778 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 799 if (wc_DhSetKey(dh, prime, prime_len, &generator, 1) != 0) 828 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 843 if (wc_DhSetKey(dh, prime, prime_len, &generator, 1) != 0) 1260 mp_int prime; member in struct:crypto_ec 1315 mp_init(&e->prime) != MP_OKAY || 1320 mp_read_radix(&e->prime, e->key.dp->prime, 16) != MP_OKAY || 1322 mp_montgomery_setup(&e->prime, &e->mont_b) != MP_OKAY) 1342 mp_clear(&e->prime); [all...] |
H A D | crypto_gnutls.c | 286 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 293 if (os_memcmp(privkey, prime, prime_len) > 0) { 294 /* Make sure private value is smaller than prime */ 299 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, 312 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 323 os_memcmp(pubkey, prime, prime_len) >= 0)) 338 gcry_mpi_scan(&p, GCRYMPI_FMT_USG, prime, prime_len, 354 prime, prime_len, secret, len);
|
H A D | crypto_openssl.c | 520 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 527 if (os_memcmp(privkey, prime, prime_len) > 0) { 528 /* Make sure private value is smaller than prime */ 533 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, 546 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 556 p = BN_bin2bn(prime, prime_len, NULL); 581 prime, prime_len, secret, len); 1556 BIGNUM *prime; member in struct:crypto_ec 1615 e->prime = BN_new(); 1619 if (e->group == NULL || e->bnctx == NULL || e->prime [all...] |
H A D | crypto_libtomcrypt.c | 700 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 707 if (os_memcmp(privkey, prime, prime_len) > 0) { 708 /* Make sure private value is smaller than prime */ 713 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, 726 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 734 prime, prime_len, secret, len);
|
/freebsd-13-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_gen.c | 44 /* multi-prime is only supported with the builtin key generation */ 51 * have to honour it in 2-prime case and assume that it wouldn't 52 * know what to do with multi-prime key generated by builtin 67 BIGNUM *r0 = NULL, *r1 = NULL, *r2 = NULL, *tmp, *prime; local 123 /* initialize multi-prime components */ 153 prime = rsa->p; 155 prime = rsa->q; 158 prime = pinfo->r; 160 BN_set_flags(prime, BN_FLG_CONSTTIME); 164 if (!BN_generate_prime_ex(prime, bits [all...] |
/freebsd-13-stable/contrib/unbound/util/ |
H A D | fptr_wlist.h | 235 uint16_t qflags, int prime, int valrec, struct module_qstate** newq)); 244 struct query_info* qinfo, uint16_t qflags, int prime, int valrec, 262 uint16_t flags, int prime, int valrec));
|
H A D | module.h | 397 * @param prime: if it is a (stub) priming query. 404 struct query_info* qinfo, uint16_t qflags, int prime, 426 * @param prime: if it is a (stub) priming query. 434 struct query_info* qinfo, uint16_t qflags, int prime, 453 * @param prime: if dependency is a priming query or not. 461 struct query_info* qinfo, uint16_t flags, int prime, 505 * expire. The hints are always used to "prime" the cache. Note
|
/freebsd-13-stable/crypto/openssh/ |
H A D | kexgex.c | 55 const BIGNUM *prime, 82 (r = sshbuf_put_bignum2(b, prime)) != 0 || 47 kexgex_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | dh.c | 52 char *strsize, *gen, *prime; local 72 /* Ensure this is a safe prime */ 81 /* Ensure prime has been tested and is not composite */ 100 error("moduli:%d: invalid prime length", linenum); 108 prime = strsep(&cp, " "); /* prime */ 109 if (cp != NULL || *prime == '\0') { 124 if (BN_hex2bn(&dhg->p, prime) == 0) { 125 error("moduli:%d: could not parse prime value", linenum); 129 error("moduli:%d: prime ha [all...] |
/freebsd-13-stable/contrib/wpa/src/eap_common/ |
H A D | eap_pwd_common.c | 138 const struct crypto_bignum *prime; local 148 prime = crypto_ec_get_prime(grp->group); 151 if (crypto_bignum_to_bin(prime, prime_bin, sizeof(prime_bin), 167 if (dragonfly_get_random_qr_qnr(prime, &qr, &qnr) < 0 || 186 * compute counter-mode password value and stretch to prime 212 * being smaller than prime. */ 248 * prime) handles this in constant time. 366 static int eap_pwd_element_coord_ok(const struct crypto_bignum *prime, argument 374 crypto_bignum_cmp(val, prime) >= 0) 385 const struct crypto_bignum *prime; local [all...] |
/freebsd-13-stable/contrib/unbound/services/ |
H A D | mesh.h | 377 * @param prime: if it is a (stub) priming query. 384 uint16_t qflags, int prime, int valrec, struct module_qstate** newq); 404 * @param prime: if it is a (stub) priming query. 412 uint16_t qflags, int prime, int valrec, struct module_qstate** newq, 461 * @param prime: if true, it is a priming query, set is_priming on mesh state. 468 uint16_t qflags, int prime, int valrec); 507 * @param prime: if it is a priming query. 513 uint16_t qflags, int prime, int valrec); 601 * @param prime: if dependency is a priming query or not. 609 uint16_t flags, int prime, in [all...] |
/freebsd-13-stable/secure/usr.bin/openssl/ |
H A D | Makefile.man | 32 MAN+= prime.1 80 MLINKS+= prime.1 openssl-prime.1
|
H A D | Makefile | 21 SRCS+= pkeyutl.c prime.c rand.c rehash.c req.c rsa.c rsautl.c s_cb.c
|