/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hcrypto/libtommath/ |
H A D | bn_mp_montgomery_setup.c | 22 mp_montgomery_setup (mp_int * n, mp_digit * rho) argument 52 /* rho = -1/m mod b */ 53 *rho = (unsigned long)(((mp_word)1 << ((mp_word) DIGIT_BIT)) - x) & MP_MASK;
|
H A D | bn_mp_montgomery_reduce.c | 22 mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho) argument 37 return fast_mp_montgomery_reduce (x, n, rho); 49 /* mu = ai * rho mod b 51 * The value of rho must be precalculated via 57 mu = (mp_digit) (((mp_word)x->dp[ix]) * ((mp_word)rho) & MP_MASK);
|
H A D | bn_fast_mp_montgomery_reduce.c | 28 int fast_mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho) argument 78 mu = (mp_digit) (((W[ix] & MP_MASK) * rho) & MP_MASK);
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
H A D | keypair_generator.c | 118 bi_ptr rho = NULL; local 240 rho = bi_new_ptr(); 244 bi_generate_prime(rho, DAA_PARAM_SIZE_RHO); 245 if (bi_length(rho) != DAA_PARAM_SIZE_RHO) { 246 LogError("rho bit length=%ld", bi_length(rho)); 255 } while(bi_length(r) != length || bi_equals_si(bi_mod(bi_tmp, r, rho), 0)); 257 // rho is not a dividor of r 258 bi_mul( capital_gamma, rho, r); 273 bi_mod(bi_tmp1, bi_mul(bi_tmp2, rho, [all...] |
H A D | key_correctness_proof.c | 210 if( !bi_is_probable_prime( public_key->rho)) { 211 LogError( "pk->rho not prime\nrho=\n%s", 212 bi_2_hex_char( public_key->rho)); 216 // (capitalGamma - 1) % rho should be equal to 0 218 public_key->rho), 220 LogError( "(capitalGamma - 1) %% rho != 0\nActual value:\n%s", 224 // (gamma ^ rho) % capitalGamma should be equals to 1 226 public_key->rho, 229 LogError( "(gamma ^ rho) %% capitalGamma != 1\nActual value:\n%s", 234 // (gamma ^ rho) [all...] |
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | tsp_daa.c | 56 Trspi_LoadBlob(offset, pk->rhoLength, blob, pk->rho); 148 if ((pk->rho = malloc(pk->rhoLength)) == NULL) 151 Trspi_UnloadBlob(offset, pk->rhoLength, blob, pk->rho); 153 pk->rho = NULL; 195 free(pk->rho);
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_anonymityrevocation/ |
H A D | csencryption_result.c | 156 // exp = exp % daa_key->rho 157 bi_mod( exp, exp, daa_key->rho); 196 if( bi_cmp( randomness, daa_key->rho) >=0 || bi_cmp_si( randomness, 0) < 0) { 197 LogError("randomness >= rho || randomness < 0 \n\trandomness:%s\n\trho:%s\n", 198 bi_2_dec_char( randomness), bi_2_dec_char( daa_key->rho));
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/include/daa/ |
H A D | daa_structs.h | 137 bi_ptr rho; member in struct:tdTSS_DAA_PK_internal 156 const bi_ptr rho,
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_verifier/ |
H A D | verifier_transaction.c | 101 bi_ptr rho = issuer_pk->rho; local 105 rho == NULL || 109 // exponent = exponent / rho 110 bi_div( exponent, exponent, rho); 112 LogDebug("project_into_group_gamma: rho [%ld]:%s", 113 bi_nbin_size( rho), bi_2_hex_char( rho)); 372 // ( ( capital_nv ^ issuer_pk->rho ) % issuer_pk->capitalGamma ) == 1 375 issuer_pk->rho, [all...] |
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/ |
H A D | daa_structs.c | 449 const bi_ptr rho, 466 pk_internal->rho = rho; 498 BI_SAVE( pk_internal->rho, file); 534 pk_internal->rho = bi_new_ptr(); 535 BI_LOAD( pk_internal->rho, file); 563 DUMP_BI( pk_internal->rho); 627 // rho 632 bi_2_byte_array( &result[index], length, pk->rho); 679 STORE_DAA_PK_BI( rho, daa_allo 442 create_DAA_PK(const bi_ptr modulus, const bi_ptr capitalS, const bi_ptr capitalZ, const bi_ptr capitalR0, const bi_ptr capitalR1, const bi_ptr gamma, const bi_ptr capitalGamma, const bi_ptr rho, const bi_array_ptr capitalRReceiver, const bi_array_ptr capitalRIssuer, const int issuerBaseNameLength, BYTE * const issuerBaseName) argument [all...] |
H A D | daa_debug.c | 45 BI_SAVE( pk_internal->rho, file); 81 pk_internal->rho = bi_new_ptr(); 82 BI_LOAD( pk_internal->rho, file);
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/bn/ |
H A D | bn_gf2m.c | 987 BIGNUM *a, *z, *rho, *w, *w2, *tmp; local 1028 rho = BN_CTX_get(ctx); 1034 if (!BN_priv_rand(rho, p[0], BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY)) 1036 if (!BN_GF2m_mod_arr(rho, rho, p)) 1039 if (!BN_copy(w, rho)) 1050 if (!BN_GF2m_add(w, w2, rho))
|
/netbsd-current/external/gpl2/groff/dist/src/preproc/pic/ |
H A D | common.cpp | 105 double rho = sqrt(temp / a_4 / b_4 * temp / a_4 / b_4 * temp); local 112 position M0 = position(rho * cos(phi0), rho * sin(phi0)) + M; 113 position M1 = position(rho * cos(phi1), rho * sin(phi1)) + M; 117 solid_arc(M + cent, rho, phi0, phi1, lt);
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/bn/ |
H A D | bn_gf2m.c | 1012 BIGNUM *a, *z, *rho, *w, *w2, *tmp; local 1053 rho = BN_CTX_get(ctx); 1059 if (!BN_priv_rand_ex(rho, p[0], BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY, 1062 if (!BN_GF2m_mod_arr(rho, rho, p)) 1065 if (!BN_copy(w, rho)) 1076 if (!BN_GF2m_add(w, w2, rho))
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | sntrup761.c | 1237 const unsigned char *rho = pk + PublicKeys_bytes; local 1238 const unsigned char *cache = rho + Inputs_bytes; 1248 for (i = 0;i < Inputs_bytes;++i) r_enc[i] ^= mask&(r_enc[i]^rho[i]);
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/include/tss/ |
H A D | tss_structs.h | 181 BYTE* rho;
member in struct:tdTSS_DAA_PK
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/libbn/ |
H A D | bignum.c | 3584 mp_montgomery_setup (mp_int * n, mp_digit * rho) argument 3610 /* rho = -1/m mod b */ 3611 *rho = (unsigned long)(((mp_word)1 << ((mp_word) DIGIT_BIT)) - x) & MP_MASK; 3629 fast_mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho) argument 3680 mu = (mp_digit) (((W[ix] & MP_MASK) * rho) & MP_MASK); 3779 mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho) argument 3794 return fast_mp_montgomery_reduce (x, n, rho); 3806 /* mu = ai * rho mod b 3808 * The value of rho must be precalculated via 3814 mu = (mp_digit) (((mp_word)x->dp[ix]) * ((mp_word)rho) [all...] |
/netbsd-current/external/bsd/wpa/dist/src/tls/ |
H A D | libtommath.c | 2654 mp_montgomery_setup (mp_int * n, mp_digit * rho) argument 2684 /* rho = -1/m mod b */ 2685 *rho = (unsigned long)(((mp_word)1 << ((mp_word) DIGIT_BIT)) - x) & MP_MASK; 2701 static int fast_mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho) argument 2751 mu = (mp_digit) (((W[ix] & MP_MASK) * rho) & MP_MASK);
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
H A D | bignum.c | 3567 mp_montgomery_setup(mp_int * n, mp_digit * rho) argument 3593 /* rho = -1/m mod b */ 3594 *rho = (unsigned long)(((mp_word)1 << ((mp_word) DIGIT_BIT)) - x) & MP_MASK; 3612 fast_mp_montgomery_reduce(mp_int * x, mp_int * n, mp_digit rho) argument 3663 mu = (mp_digit) (((W[ix] & MP_MASK) * rho) & MP_MASK); 3762 mp_montgomery_reduce(mp_int * x, mp_int * n, mp_digit rho) argument 3775 return fast_mp_montgomery_reduce(x, n, rho); 3787 /* mu = ai * rho mod b 3789 * The value of rho must be precalculated via 3795 mu = (mp_digit) (((mp_word)x->dp[ix]) * ((mp_word)rho) [all...] |
/netbsd-current/sbin/nvmectl/ |
H A D | bignum.c | 3544 mp_montgomery_setup(mp_int * n, mp_digit * rho) argument 3570 /* rho = -1/m mod b */ 3571 *rho = (unsigned long)(((mp_word)1 << ((mp_word) DIGIT_BIT)) - x) & MP_MASK; 3589 fast_mp_montgomery_reduce(mp_int * x, mp_int * n, mp_digit rho) argument 3640 mu = (mp_digit) (((W[ix] & MP_MASK) * rho) & MP_MASK); 3739 mp_montgomery_reduce(mp_int * x, mp_int * n, mp_digit rho) argument 3752 return fast_mp_montgomery_reduce(x, n, rho); 3764 /* mu = ai * rho mod b 3766 * The value of rho must be precalculated via 3772 mu = (mp_digit) (((mp_word)x->dp[ix]) * ((mp_word)rho) [all...] |
/netbsd-current/crypto/external/cpl/trousers/dist/src/trspi/ |
H A D | trousers.c | 1717 result |= Trspi_HashUpdate(c, pk->rhoLength, pk->rho);
|