Lines Matching refs:m
38 void *p, *m, *a, *b; in ecc_recover_key() local
61 m = key->dp.prime; in ecc_recover_key()
177 …if ((err = mp_mulmod(p, x, m, x)) != CRYPT_OK) … in ecc_recover_key()
181 …if ((err = mp_mulmod(t1, x, m, t1)) != CRYPT_OK) … in ecc_recover_key()
183 …if ((err = mp_mulmod(a, x, m, t2)) != CRYPT_OK) … in ecc_recover_key()
188 …if ((err = mp_sqrtmod_prime(t1, m, t2)) != CRYPT_OK) … in ecc_recover_key()
193 …if ((err = mp_mod(t2, m, mR->y)) != CRYPT_OK) … in ecc_recover_key()
196 …if ((err = mp_submod(m, t2, m, mR->y)) != CRYPT_OK) … in ecc_recover_key()
219 …if ((err = mp_montgomery_setup(m, &mp)) != CRYPT_OK) … in ecc_recover_key()
222 if (mp_cmp(a_plus3, m) != LTC_MP_EQ) { in ecc_recover_key()
224 …if ((err = mp_montgomery_normalization(mu, m)) != CRYPT_OK) … in ecc_recover_key()
225 …if ((err = mp_mulmod(a, mu, m, ma)) != CRYPT_OK) … in ecc_recover_key()
230 …if ((err = ltc_mp.ecc_mul2add(mR, v1, mG, v2, mQ, ma, m)) != CRYPT_OK) … in ecc_recover_key()
233 …if ((err = ltc_mp.ecc_mul2add(mG, u1, mQ, u2, mG, ma, m)) != CRYPT_OK) … in ecc_recover_key()