| /crypto/ |
| A D | rsa.c | 18 MPI e; member 62 return mpi_powm(c, m, key->e, key->n); in _rsa_enc() 200 mpi_free(key->e); in rsa_free_mpi_key() 208 key->e = NULL; in rsa_free_mpi_key() 241 if (!mpi_test_bit(e, 0)) { in rsa_check_exponent_fips() 246 if (mpi_cmp_ui(e, 65536) <= 0) { in rsa_check_exponent_fips() 260 if (mpi_cmp(e, e_max) >= 0) { in rsa_check_exponent_fips() 283 mpi_key->e = mpi_read_raw_data(raw_key.e, raw_key.e_sz); in rsa_set_pub_key() 284 if (!mpi_key->e) in rsa_set_pub_key() 326 mpi_key->e = mpi_read_raw_data(raw_key.e, raw_key.e_sz); in rsa_set_priv_key() [all …]
|
| A D | ecrdsa.c | 79 u64 e[ECRDSA_MAX_DIGITS]; /* h \mod q */ in ecrdsa_verify() local 80 u64 *v = e; /* e^{-1} \mod q */ in ecrdsa_verify() 83 struct ecc_point cc = ECC_POINT_INIT(s, e, ndigits); /* reuse s, e */ in ecrdsa_verify() 115 vli_from_le64(e, digest, ndigits); in ecrdsa_verify() 116 if (vli_cmp(e, ctx->curve->n, ndigits) >= 0) in ecrdsa_verify() 117 vli_sub(e, e, ctx->curve->n, ndigits); in ecrdsa_verify() 118 if (vli_is_zero(e, ndigits)) in ecrdsa_verify() 119 e[0] = 1; in ecrdsa_verify() 122 vli_mod_inv(v, e, ctx->curve->n, ndigits); in ecrdsa_verify()
|
| A D | testmgr.h | 683 be64_to_cpua(ba, e5, 93, 83, 6e, b6, 3b, 63), 715 be64_to_cpua(5a, 8b, 82, 69, 7e, 8a, 0a, 09), 891 be64_to_cpua(ce, d5, 2e, 8b, de, 5a, 04, 0e), 952 be64_to_cpua(8e, f3, 6f, dc, f8, 69, a6, 2e), 1023 be64_to_cpua(ec, 7c, 7e, d0, 87, d7, d7, 6e), 1036 be64_to_cpua(5f, 63, b1, be, 5e, 4c, 0e, a1), 1097 be64_to_cpua(8e, 3f, 7e, ce, 0a, 9b, aa, 59), 1104 be64_to_cpua(15, 68, c0, 75, 3e, 23, 5e, 36), 1218 be64_to_cpua(0e, 64, cc, c4, e8, 43, d9, 0e), 1327 be64_to_cpua(1f, 12, 3e, b7, 7e, 51, ff, 7f), [all …]
|
| A D | tcrypt.c | 253 const char *e; in test_mb_aead_speed() local 269 e = "encryption"; in test_mb_aead_speed() 271 e = "decryption"; in test_mb_aead_speed() 530 const char *e; in test_aead_speed() local 550 e = "encryption"; in test_aead_speed() 552 e = "decryption"; in test_aead_speed() 1069 const char *e; in test_mb_skcipher_speed() local 1074 e = "encryption"; in test_mb_skcipher_speed() 1076 e = "decryption"; in test_mb_skcipher_speed() 1304 const char *e; in test_skcipher_speed() local [all …]
|
| A D | rsapubkey.asn1 | 10 e INTEGER ({ rsa_get_e })
|
| A D | rsaprivkey.asn1 | 11 e INTEGER ({ rsa_get_e }),
|
| A D | rsa_helper.c | 55 key->e = value; in rsa_get_e()
|
| A D | Kconfig | 713 instructions to accelerate AES and carryless multiplication, e.g. 879 building for a particular system that requires it (e.g., when 1236 A non-physical non-deterministic ("true") RNG (e.g., an entropy source 1238 deterministic RNG (e.g., per NIST SP800-90C). 1253 size fits into a cache (e.g. L1), only the memory access timing 1300 on hardware whose timers deliver limited amount of entropy (e.g.
|
| A D | rmd160.c | 39 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 41 (a) = rol32((a), (s)) + (e); \
|
| A D | testmgr.c | 2726 const char *e; in test_cipher() local 2736 e = "encryption"; in test_cipher() 2738 e = "decryption"; in test_cipher() 2791 "on %s for %s\n", j, e, algo); in test_cipher()
|