/freebsd-current/usr.bin/primes/ |
H A D | pr_tbl.c | 34 * prime - prime table 38 * chongo <for a good prime call: 391581 * 2^216193 - 1> /\oo/\ 48 const ubig prime[] = { variable 539 /* pr_limit - largest prime in the prime table */ 540 const ubig *const pr_limit = &prime[(sizeof(prime)/sizeof(prime[0]))-1];
|
H A D | primes.h | 38 * chongo <for a good prime call: 391581 * 2^216193 - 1> /\oo/\ 51 * prime[i] is the (i-1)th prime. 56 extern const ubig prime[]; 57 extern const ubig *const pr_limit; /* largest prime in the prime array */
|
H A D | primes.c | 38 * chongo <for a good prime call: 391581 * 2^216193 - 1> /\oo/\ 70 * sieve, table[i] == 1 if and only if 2*i-1 is prime. 200 const ubig *p; /* prime table pointer */ 201 ubig fact_lim; /* highest prime for current block */ 234 for (p = &prime[0], factor = prime[0]; 278 factor = 17; /* 17 is first prime to use */ 279 p = &prime[7]; /* 19 is next prime, pi(19)=7 */
|
/freebsd-current/contrib/wpa/src/common/ |
H A D | dragonfly.c | 21 * purposes: FFC groups whose prime is >= 3072 bits and ECC groups 22 * defined over a prime field whose prime is >= 256 bits. Furthermore, 26 * timing information due to the prime not being close to a power of 44 /* FFC groups that have prime that is close to a power of two */ 53 int dragonfly_get_random_qr_qnr(const struct crypto_bignum *prime, argument 64 if (!tmp || crypto_bignum_rand(tmp, prime) < 0) { 69 res = crypto_bignum_legendre(tmp, prime); 88 dragonfly_get_rand_1_to_p_1(const struct crypto_bignum *prime) argument 96 crypto_bignum_sub(prime, on 116 const struct crypto_bignum *prime; local 222 const struct crypto_bignum *prime; local [all...] |
H A D | dragonfly.h | 20 int dragonfly_get_random_qr_qnr(const struct crypto_bignum *prime,
|
H A D | sae.c | 49 tmp->prime = crypto_ec_get_prime(tmp->ec); 67 tmp->prime_buf = crypto_bignum_init_set(tmp->dh->prime, 73 tmp->prime = tmp->prime_buf; 146 const u8 *prime, const u8 *qr, const u8 *qnr, 160 prime, sae->tmp->prime_len, pwd_value, bits) < 0) 167 cmp_prime = const_time_memcmp(pwd_value, prime, sae->tmp->prime_len); 169 * being smaller than prime. */ 208 sae->tmp->dh->prime, sae->tmp->prime_len, pwd_value, 215 res = const_time_memcmp(pwd_value, sae->tmp->dh->prime, 249 crypto_bignum_sub(sae->tmp->prime, 145 sae_test_pwd_seed_ecc(struct sae_data *sae, const u8 *pwd_seed, const u8 *prime, const u8 *qr, const u8 *qnr, u8 *pwd_value) argument 291 u8 prime[SAE_MAX_ECC_PRIME_LEN]; local 628 const struct crypto_bignum *a, *b, *prime; local 871 const struct crypto_bignum *prime; local 969 struct crypto_bignum *prime, *order; local 1211 struct crypto_bignum *pwe = NULL, *order = NULL, *prime = NULL; local 1908 u8 prime[SAE_MAX_ECC_PRIME_LEN]; local [all...] |
H A D | sae.h | 55 const struct crypto_bignum *prime; member in struct:sae_temporary_data
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | crypto_internal-modexp.c | 16 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 23 if (os_memcmp(privkey, prime, prime_len) > 0) { 24 /* Make sure private value is smaller than prime */ 29 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, 42 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 53 os_memcmp(pubkey, prime, prime_len) >= 0)) 70 bignum_set_unsigned_bin(p, prime, prime_len) < 0 || 82 prime, prime_len, secret, len);
|
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
H A D | crypto_nettle.c | 307 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 314 if (os_memcmp(privkey, prime, prime_len) > 0) { 315 /* Make sure private value is smaller than prime */ 320 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, 333 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 344 os_memcmp(pubkey, prime, prime_len) >= 0)) 358 mpz_import(p, prime_len, 1, 1, 1, 0, prime); 368 prime, prime_len, secret, len);
|
H A D | crypto_wolfssl.c | 782 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 803 if (wc_DhSetKey(dh, prime, prime_len, &generator, 1) != 0) 832 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 847 if (wc_DhSetKey(dh, prime, prime_len, &generator, 1) != 0) 1311 mp_int prime; member in struct:crypto_ec 1366 mp_init(&e->prime) != MP_OKAY || 1371 mp_read_radix(&e->prime, e->key.dp->prime, 16) != MP_OKAY || 1373 mp_montgomery_setup(&e->prime, &e->mont_b) != MP_OKAY) 1393 mp_clear(&e->prime); [all...] |
H A D | crypto_gnutls.c | 286 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 293 if (os_memcmp(privkey, prime, prime_len) > 0) { 294 /* Make sure private value is smaller than prime */ 299 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, 312 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 323 os_memcmp(pubkey, prime, prime_len) >= 0)) 338 gcry_mpi_scan(&p, GCRYMPI_FMT_USG, prime, prime_len, 354 prime, prime_len, secret, len);
|
H A D | crypto_libtomcrypt.c | 700 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 707 if (os_memcmp(privkey, prime, prime_len) > 0) { 708 /* Make sure private value is smaller than prime */ 713 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, 726 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 734 prime, prime_len, secret, len);
|
H A D | crypto_openssl.c | 593 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, argument 600 if (os_memcmp(privkey, prime, prime_len) > 0) { 601 /* Make sure private value is smaller than prime */ 606 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, 619 int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, argument 629 p = BN_bin2bn(prime, prime_len, NULL); 654 prime, prime_len, secret, len); 1690 BIGNUM *prime; member in struct:crypto_ec 1749 e->prime = BN_new(); 1753 if (e->group == NULL || e->bnctx == NULL || e->prime 2785 BIGNUM *prime = NULL; local [all...] |
/freebsd-current/contrib/unbound/util/ |
H A D | fptr_wlist.h | 236 uint16_t qflags, int prime, int valrec, struct module_qstate** newq)); 245 struct query_info* qinfo, uint16_t qflags, int prime, int valrec, 263 uint16_t flags, int prime, int valrec));
|
H A D | module.h | 412 * @param prime: if it is a (stub) priming query. 419 struct query_info* qinfo, uint16_t qflags, int prime, 441 * @param prime: if it is a (stub) priming query. 449 struct query_info* qinfo, uint16_t qflags, int prime, 468 * @param prime: if dependency is a priming query or not. 476 struct query_info* qinfo, uint16_t flags, int prime, 520 * expire. The hints are always used to "prime" the cache. Note
|
H A D | fptr_wlist.c | 363 uint16_t qflags, int prime, int valrec, struct module_qstate** newq)) 372 uint16_t qflags, int prime, int valrec, struct module_qstate** newq, 389 uint16_t flags, int prime, int valrec)) 361 fptr_whitelist_modenv_attach_sub(int (*fptr)( struct module_qstate* qstate, struct query_info* qinfo, uint16_t qflags, int prime, int valrec, struct module_qstate** newq)) argument 370 fptr_whitelist_modenv_add_sub(int (*fptr)( struct module_qstate* qstate, struct query_info* qinfo, uint16_t qflags, int prime, int valrec, struct module_qstate** newq, struct mesh_state** sub)) argument 387 fptr_whitelist_modenv_detect_cycle(int (*fptr)( struct module_qstate* qstate, struct query_info* qinfo, uint16_t flags, int prime, int valrec)) argument
|
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | eap_pwd_common.c | 139 const struct crypto_bignum *prime; local 150 prime = crypto_ec_get_prime(grp->group); 153 if (crypto_bignum_to_bin(prime, prime_bin, sizeof(prime_bin), 164 if (dragonfly_get_random_qr_qnr(prime, &qr, &qnr) < 0 || 183 * compute counter-mode password value and stretch to prime 209 * being smaller than prime. */ 245 * prime) handles this in constant time. 275 crypto_bignum_sub(prime, y, y) < 0 || 392 static int eap_pwd_element_coord_ok(const struct crypto_bignum *prime, argument 400 crypto_bignum_cmp(val, prime) > 411 const struct crypto_bignum *prime; local [all...] |
/freebsd-current/crypto/openssh/ |
H A D | kexgex.c | 55 const BIGNUM *prime, 82 (r = sshbuf_put_bignum2(b, prime)) != 0 || 47 kexgex_hash( int hash_alg, const struct sshbuf *client_version, const struct sshbuf *server_version, const struct sshbuf *client_kexinit, const struct sshbuf *server_kexinit, const struct sshbuf *server_host_key_blob, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const u_char *shared_secret, size_t secretlen, u_char *hash, size_t *hashlen) argument
|
H A D | dh.c | 64 char *strsize, *gen, *prime; local 84 /* Ensure this is a safe prime */ 93 /* Ensure prime has been tested and is not composite */ 112 error("moduli:%d: invalid prime length", linenum); 120 prime = strsep(&cp, " "); /* prime */ 121 if (cp != NULL || *prime == '\0') { 136 if (BN_hex2bn(&dhg->p, prime) == 0) { 137 error("moduli:%d: could not parse prime value", linenum); 141 error("moduli:%d: prime ha [all...] |
/freebsd-current/crypto/openssl/crypto/rsa/ |
H A D | rsa_gen.c | 54 /* multi-prime is only supported with the builtin key generation */ 61 * have to honour it in 2-prime case and assume that it wouldn't 62 * know what to do with multi-prime key generated by builtin 78 BIGNUM *r0 = NULL, *r1 = NULL, *r2 = NULL, *tmp, *prime; local 149 /* initialize multi-prime components */ 180 prime = rsa->p; 182 prime = rsa->q; 185 prime = pinfo->r; 187 BN_set_flags(prime, BN_FLG_CONSTTIME); 191 if (!BN_generate_prime_ex2(prime, bits [all...] |
/freebsd-current/contrib/unbound/services/ |
H A D | mesh.h | 390 * @param prime: if it is a (stub) priming query. 397 uint16_t qflags, int prime, int valrec, struct module_qstate** newq); 417 * @param prime: if it is a (stub) priming query. 425 uint16_t qflags, int prime, int valrec, struct module_qstate** newq, 474 * @param prime: if true, it is a priming query, set is_priming on mesh state. 481 uint16_t qflags, int prime, int valrec); 512 * @param prime: if it is a priming query. 518 uint16_t qflags, int prime, int valrec); 606 * @param prime: if dependency is a priming query or not. 614 uint16_t flags, int prime, in [all...] |
/freebsd-current/secure/usr.bin/openssl/ |
H A D | Makefile | 21 SRCS+= pkcs12.c pkcs7.c pkcs8.c pkey.c pkeyparam.c pkeyutl.c prime.c progs.c
|
H A D | Makefile.man | 39 MAN+= openssl-prime.1
|
/freebsd-current/tools/tools/usbtest/ |
H A D | usbtest.c | 65 const uint32_t prime = 0xFFFF1D; local 69 noise_rem += prime;
|