/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ecdsa/ |
H A D | ecs_sign.c | 67 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey) 72 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); 82 *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, 86 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey); 66 ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey) argument 81 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
|
H A D | ecdsa.h | 130 * \param kinv optional pointer to a pre-computed inverse k 137 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); 184 * \param kinv pointer to a BIGNUM pointer for the inverse of k 188 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, 214 * \param kinv optional pointer to a pre-computed inverse k 221 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv,
|
H A D | ecs_locl.h | 73 int (*ecdsa_sign_setup)(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
|
H A D | ecs_ossl.c | 216 BIGNUM *kinv=NULL, *s, *m=NULL,*tmp=NULL,*order=NULL; local 270 if (!ECDSA_sign_setup(eckey, ctx, &kinv, &ret->r)) 275 ckinv = kinv; 304 /* if kinv and r have been supplied by the caller 305 * don't to generate new kinv and r values */ 333 if (kinv) 334 BN_clear_free(kinv);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ecdsa/ |
H A D | ecs_sign.c | 68 const BIGNUM *kinv, const BIGNUM *rp, 74 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); 84 *sig, unsigned int *siglen, const BIGNUM *kinv, 89 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey); 67 ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey) argument 83 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
|
H A D | ecdsa.h | 124 * \param kinv BIGNUM with a pre-computed inverse k (optional) 131 const BIGNUM *kinv, const BIGNUM *rp, 174 * \param kinv BIGNUM pointer for the inverse of k 178 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, BIGNUM **rp); 200 * \param kinv BIGNUM with a pre-computed inverse k (optional) 208 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); 277 BIGNUM **kinv,
|
H A D | ecs_locl.h | 73 int (*ecdsa_sign_setup) (EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
|
H A D | ecs_ossl.c | 240 BIGNUM *kinv = NULL, *s, *m = NULL, *tmp = NULL, *order = NULL; local 291 if (!ECDSA_sign_setup(eckey, ctx, &kinv, &ret->r)) { 295 ckinv = kinv; 318 * if kinv and r have been supplied by the caller don't to 319 * generate new kinv and r values 346 if (kinv) 347 BN_clear_free(kinv);
|
H A D | ecs_lib.c | 315 BIGNUM **kinv, 312 ECDSA_METHOD_set_sign_setup(ECDSA_METHOD *ecdsa_method, int (*ecdsa_sign_setup) (EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, BIGNUM **r)) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ecdsa/ |
H A D | ecs_sign.c | 68 const BIGNUM *kinv, const BIGNUM *rp, 74 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); 84 *sig, unsigned int *siglen, const BIGNUM *kinv, 89 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey); 67 ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey) argument 83 ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
|
H A D | ecdsa.h | 124 * \param kinv BIGNUM with a pre-computed inverse k (optional) 131 const BIGNUM *kinv, const BIGNUM *rp, 174 * \param kinv BIGNUM pointer for the inverse of k 178 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, BIGNUM **rp); 200 * \param kinv BIGNUM with a pre-computed inverse k (optional) 208 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); 277 BIGNUM **kinv,
|
H A D | ecs_locl.h | 73 int (*ecdsa_sign_setup) (EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv,
|
H A D | ecs_ossl.c | 240 BIGNUM *kinv = NULL, *s, *m = NULL, *tmp = NULL, *order = NULL; local 291 if (!ECDSA_sign_setup(eckey, ctx, &kinv, &ret->r)) { 295 ckinv = kinv; 318 * if kinv and r have been supplied by the caller don't to 319 * generate new kinv and r values 346 if (kinv) 347 BN_clear_free(kinv);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/dsa/ |
H A D | dsa_ossl.c | 132 BIGNUM *kinv=NULL,*r=NULL,*s=NULL; local 161 if ((dsa->kinv == NULL) || (dsa->r == NULL)) 163 if (!DSA_sign_setup(dsa,ctx,&kinv,&r)) goto err; 167 kinv=dsa->kinv; 168 dsa->kinv=NULL; 180 if (!BN_mod_mul(s,s,kinv,dsa->q,ctx)) goto err; 197 if (kinv != NULL) /* dsa->kinv is NULL now if we used it */ 198 BN_clear_free(kinv); 205 BIGNUM k,kq,*K,*kinv=NULL,*r=NULL; local [all...] |
H A D | dsa_lib.c | 161 ret->kinv=NULL; 215 if (r->kinv != NULL) BN_clear_free(r->kinv);
|
H A D | dsa.h | 155 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/dsa/ |
H A D | dsa_ossl.c | 135 BIGNUM *kinv = NULL, *r = NULL, *s = NULL; local 158 if ((dsa->kinv == NULL) || (dsa->r == NULL)) { 159 if (!DSA_sign_setup(dsa, ctx, &kinv, &r)) 162 kinv = dsa->kinv; 163 dsa->kinv = NULL; 187 if (!BN_mod_mul(s, s, kinv, dsa->q, ctx)) 217 if (kinv != NULL) /* dsa->kinv is NULL now if we used it */ 218 BN_clear_free(kinv); 226 BIGNUM k, kq, *K, *kinv = NULL, *r = NULL; local [all...] |
H A D | dsa_lib.c | 169 ret->kinv = NULL; 228 if (r->kinv != NULL) 229 BN_clear_free(r->kinv);
|
H A D | dsa.h | 168 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/dsa/ |
H A D | dsa_ossl.c | 135 BIGNUM *kinv = NULL, *r = NULL, *s = NULL; local 158 if ((dsa->kinv == NULL) || (dsa->r == NULL)) { 159 if (!DSA_sign_setup(dsa, ctx, &kinv, &r)) 162 kinv = dsa->kinv; 163 dsa->kinv = NULL; 187 if (!BN_mod_mul(s, s, kinv, dsa->q, ctx)) 217 if (kinv != NULL) /* dsa->kinv is NULL now if we used it */ 218 BN_clear_free(kinv); 226 BIGNUM k, kq, *K, *kinv = NULL, *r = NULL; local [all...] |
H A D | dsa_lib.c | 169 ret->kinv = NULL; 228 if (r->kinv != NULL) 229 BN_clear_free(r->kinv);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ecdsa.h | 130 * \param kinv optional pointer to a pre-computed inverse k 137 const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); 184 * \param kinv pointer to a BIGNUM pointer for the inverse of k 188 int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, 214 * \param kinv optional pointer to a pre-computed inverse k 221 unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv,
|
H A D | dsa.h | 155 BIGNUM *kinv; /* Signing pre-calc */ member in struct:dsa_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | dsa.c | 613 gcry_mpi_t kinv; 623 /* kinv = k^(-1) mod q */ 624 kinv = mpi_alloc( mpi_get_nlimbs(k) ); 625 mpi_invm(kinv, k, skey->q ); 627 /* s = (kinv * ( hash + x * r)) mod q */ 631 mpi_mulm( s , kinv, tmp, skey->q ); 634 mpi_free(kinv); 612 gcry_mpi_t kinv; local
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | dsa.c | 613 gcry_mpi_t kinv; 623 /* kinv = k^(-1) mod q */ 624 kinv = mpi_alloc( mpi_get_nlimbs(k) ); 625 mpi_invm(kinv, k, skey->q ); 627 /* s = (kinv * ( hash + x * r)) mod q */ 631 mpi_mulm( s , kinv, tmp, skey->q ); 634 mpi_free(kinv); 612 gcry_mpi_t kinv; local
|