Searched refs:kinv (Results 1 - 25 of 27) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ecdsa/
H A Decs_sign.c67 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey)
72 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey);
82 *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r,
86 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
66 ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey) argument
81 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
H A Decdsa.h130 * \param kinv optional pointer to a pre-computed inverse k
137 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
184 * \param kinv pointer to a BIGNUM pointer for the inverse of k
188 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
214 * \param kinv optional pointer to a pre-computed inverse k
221 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv,
H A Decs_locl.h73 int (*ecdsa_sign_setup)(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
H A Decs_ossl.c216 BIGNUM *kinv=NULL, *s, *m=NULL,*tmp=NULL,*order=NULL; local
270 if (!ECDSA_sign_setup(eckey, ctx, &kinv, &ret->r))
275 ckinv = kinv;
304 /* if kinv and r have been supplied by the caller
305 * don't to generate new kinv and r values */
333 if (kinv)
334 BN_clear_free(kinv);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ecdsa/
H A Decs_sign.c68 const BIGNUM *kinv, const BIGNUM *rp,
74 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey);
84 *sig, unsigned int *siglen, const BIGNUM *kinv,
89 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
67 ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey) argument
83 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
H A Decdsa.h124 * \param kinv BIGNUM with a pre-computed inverse k (optional)
131 const BIGNUM *kinv, const BIGNUM *rp,
174 * \param kinv BIGNUM pointer for the inverse of k
178 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, BIGNUM **rp);
200 * \param kinv BIGNUM with a pre-computed inverse k (optional)
208 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
277 BIGNUM **kinv,
H A Decs_locl.h73 int (*ecdsa_sign_setup) (EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
H A Decs_ossl.c240 BIGNUM *kinv = NULL, *s, *m = NULL, *tmp = NULL, *order = NULL; local
291 if (!ECDSA_sign_setup(eckey, ctx, &kinv, &ret->r)) {
295 ckinv = kinv;
318 * if kinv and r have been supplied by the caller don't to
319 * generate new kinv and r values
346 if (kinv)
347 BN_clear_free(kinv);
H A Decs_lib.c315 BIGNUM **kinv,
312 ECDSA_METHOD_set_sign_setup(ECDSA_METHOD *ecdsa_method, int (*ecdsa_sign_setup) (EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, BIGNUM **r)) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ecdsa/
H A Decs_sign.c68 const BIGNUM *kinv, const BIGNUM *rp,
74 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey);
84 *sig, unsigned int *siglen, const BIGNUM *kinv,
89 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
67 ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey) argument
83 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
H A Decdsa.h124 * \param kinv BIGNUM with a pre-computed inverse k (optional)
131 const BIGNUM *kinv, const BIGNUM *rp,
174 * \param kinv BIGNUM pointer for the inverse of k
178 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, BIGNUM **rp);
200 * \param kinv BIGNUM with a pre-computed inverse k (optional)
208 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
277 BIGNUM **kinv,
H A Decs_locl.h73 int (*ecdsa_sign_setup) (EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
H A Decs_ossl.c240 BIGNUM *kinv = NULL, *s, *m = NULL, *tmp = NULL, *order = NULL; local
291 if (!ECDSA_sign_setup(eckey, ctx, &kinv, &ret->r)) {
295 ckinv = kinv;
318 * if kinv and r have been supplied by the caller don't to
319 * generate new kinv and r values
346 if (kinv)
347 BN_clear_free(kinv);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/dsa/
H A Ddsa_ossl.c132 BIGNUM *kinv=NULL,*r=NULL,*s=NULL; local
161 if ((dsa->kinv == NULL) || (dsa->r == NULL))
163 if (!DSA_sign_setup(dsa,ctx,&kinv,&r)) goto err;
167 kinv=dsa->kinv;
168 dsa->kinv=NULL;
180 if (!BN_mod_mul(s,s,kinv,dsa->q,ctx)) goto err;
197 if (kinv != NULL) /* dsa->kinv is NULL now if we used it */
198 BN_clear_free(kinv);
205 BIGNUM k,kq,*K,*kinv=NULL,*r=NULL; local
[all...]
H A Ddsa_lib.c161 ret->kinv=NULL;
215 if (r->kinv != NULL) BN_clear_free(r->kinv);
H A Ddsa.h155 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/dsa/
H A Ddsa_ossl.c135 BIGNUM *kinv = NULL, *r = NULL, *s = NULL; local
158 if ((dsa->kinv == NULL) || (dsa->r == NULL)) {
159 if (!DSA_sign_setup(dsa, ctx, &kinv, &r))
162 kinv = dsa->kinv;
163 dsa->kinv = NULL;
187 if (!BN_mod_mul(s, s, kinv, dsa->q, ctx))
217 if (kinv != NULL) /* dsa->kinv is NULL now if we used it */
218 BN_clear_free(kinv);
226 BIGNUM k, kq, *K, *kinv = NULL, *r = NULL; local
[all...]
H A Ddsa_lib.c169 ret->kinv = NULL;
228 if (r->kinv != NULL)
229 BN_clear_free(r->kinv);
H A Ddsa.h168 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/dsa/
H A Ddsa_ossl.c135 BIGNUM *kinv = NULL, *r = NULL, *s = NULL; local
158 if ((dsa->kinv == NULL) || (dsa->r == NULL)) {
159 if (!DSA_sign_setup(dsa, ctx, &kinv, &r))
162 kinv = dsa->kinv;
163 dsa->kinv = NULL;
187 if (!BN_mod_mul(s, s, kinv, dsa->q, ctx))
217 if (kinv != NULL) /* dsa->kinv is NULL now if we used it */
218 BN_clear_free(kinv);
226 BIGNUM k, kq, *K, *kinv = NULL, *r = NULL; local
[all...]
H A Ddsa_lib.c169 ret->kinv = NULL;
228 if (r->kinv != NULL)
229 BN_clear_free(r->kinv);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Decdsa.h130 * \param kinv optional pointer to a pre-computed inverse k
137 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
184 * \param kinv pointer to a BIGNUM pointer for the inverse of k
188 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
214 * \param kinv optional pointer to a pre-computed inverse k
221 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv,
H A Ddsa.h155 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/
H A Ddsa.c613 gcry_mpi_t kinv;
623 /* kinv = k^(-1) mod q */
624 kinv = mpi_alloc( mpi_get_nlimbs(k) );
625 mpi_invm(kinv, k, skey->q );
627 /* s = (kinv * ( hash + x * r)) mod q */
631 mpi_mulm( s , kinv, tmp, skey->q );
634 mpi_free(kinv);
612 gcry_mpi_t kinv; local
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Ddsa.c613 gcry_mpi_t kinv;
623 /* kinv = k^(-1) mod q */
624 kinv = mpi_alloc( mpi_get_nlimbs(k) );
625 mpi_invm(kinv, k, skey->q );
627 /* s = (kinv * ( hash + x * r)) mod q */
631 mpi_mulm( s , kinv, tmp, skey->q );
634 mpi_free(kinv);
612 gcry_mpi_t kinv; local

Completed in 107 milliseconds

12