/openssl/crypto/srp/ |
H A D | srp_lib.c | 90 if (!BN_mod_exp(tmp, v, u, N, bn_ctx)) in SRP_Calc_server_key() 96 if (S != NULL && !BN_mod_exp(S, tmp, b, N, bn_ctx)) { in SRP_Calc_server_key() 123 if (!BN_mod_exp(gb, g, b, N, bn_ctx) in SRP_Calc_B_ex() 204 if ((A = BN_new()) != NULL && !BN_mod_exp(A, g, a, N, bn_ctx)) { in SRP_Calc_A() 232 if (!BN_mod_exp(tmp, g, xtmp, N, bn_ctx)) in SRP_Calc_client_key_ex() 245 if (K != NULL && !BN_mod_exp(K, tmp, tmp2, N, bn_ctx)) { in SRP_Calc_client_key_ex()
|
H A D | srp_vfy.c | 756 if (!BN_mod_exp(verif, g, x, N, bn_ctx)) { in SRP_create_verifier_BN_ex()
|
/openssl/crypto/bn/ |
H A D | bn_sqrt.c | 101 if (!BN_mod_exp(ret, A, q, p, ctx)) in BN_mod_sqrt() 144 if (!BN_mod_exp(b, t, q, p, ctx)) in BN_mod_sqrt() 227 if (!BN_mod_exp(y, y, q, p, ctx)) in BN_mod_sqrt() 269 if (!BN_mod_exp(x, A, t, p, ctx)) in BN_mod_sqrt()
|
H A D | bn_blind.c | 293 if (!BN_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx)) in BN_BLINDING_create_param()
|
H A D | bn_exp.c | 97 int BN_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, in BN_mod_exp() function
|
/openssl/doc/man3/ |
H A D | BN_add.pod | 6 BN_mod_sub, BN_mod_mul, BN_mod_sqr, BN_mod_sqrt, BN_exp, BN_mod_exp, BN_gcd - 43 int BN_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, 102 BN_mod_exp() computes I<a> to the I<p>-th power modulo I<m> (C<r=a^p % 119 For modular operations such as BN_nnmod() or BN_mod_exp() it is an error
|
H A D | BN_mod_mul_montgomery.pod | 31 automatically when L<BN_mod_exp(3)> is called with suitable input,
|
/openssl/fuzz/ |
H A D | bignum.c | 78 OPENSSL_assert(BN_mod_exp(b4, b1, b2, b3, ctx)); in FuzzerTestOneInput()
|
/openssl/crypto/ffc/ |
H A D | ffc_key_validate.c | 81 || !BN_mod_exp(tmp, pub_key, params->q, params->p, ctx)) in ossl_ffc_validate_public_key()
|
/openssl/crypto/rsa/ |
H A D | rsa_sp800_56b_gen.c | 450 && BN_mod_exp(tmp, k, rsa->e, rsa->n, ctx) in ossl_rsa_sp800_56b_pairwise_test() 451 && BN_mod_exp(tmp, tmp, rsa->d, rsa->n, ctx) in ossl_rsa_sp800_56b_pairwise_test()
|
/openssl/crypto/dsa/ |
H A D | dsa_backend.c | 172 if (!BN_mod_exp(dsa_pubkey, dsa_g, dsa_privkey, dsa_p, ctx)) { in ossl_dsa_key_from_pkcs8()
|
H A D | dsa_key.c | 53 if (!BN_mod_exp(pub_key, dsa->params.g, prk, dsa->params.p, ctx)) in ossl_dsa_generate_public_key()
|
/openssl/apps/lib/ |
H A D | tlssrp_depr.c | 40 BN_mod_exp(r, g, p, N, bn_ctx) && in srp_Verify_N_and_g()
|
/openssl/crypto/dh/ |
H A D | dh_check.c | 188 if (!BN_mod_exp(t1, dh->params.g, dh->params.q, dh->params.p, ctx)) in DH_check()
|
/openssl/test/ |
H A D | exptest.c | 68 if (!TEST_true(BN_mod_exp(r, a, p, m, ctx))) in test_mod_exp_zero()
|
H A D | bntest.c | 1678 if (!TEST_true(BN_mod_exp(ret, a, e, m, ctx)) in file_modexp() 1701 if (!TEST_true(BN_mod_exp(d, a, b, c, ctx)) in file_modexp() 2494 if (!TEST_false(BN_mod_exp(a, BN_value_one(), BN_value_one(), zero, ctx))) in test_badmod() 2550 if (!TEST_true(BN_mod_exp(r, a, zero, BN_value_one(), NULL)) in test_expmodzero() 2592 if (!TEST_true(BN_mod_exp(r, a, p, m, NULL)) in test_expmodone() 3073 if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) in test_mod_exp() 3111 if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) in test_mod_exp_consttime()
|
/openssl/include/openssl/ |
H A D | bn.h | 311 int BN_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
|
/openssl/crypto/pem/ |
H A D | pvkfmt.c | 414 if (!BN_mod_exp(pub_key, gbn, priv_key, pbn, ctx)) in ossl_b2i_DSA_after_header()
|
/openssl/ |
H A D | NEWS.md | 739 * BN_mod_exp may produce incorrect results on x86_64 ([CVE-2017-3732]) 862 * BN_mod_exp may produce incorrect results on x86_64 ([CVE-2017-3732]) 916 * BN_mod_exp may produce incorrect results on x86_64 ([CVE-2015-3193])
|
H A D | CHANGES.md | 2733 Also applications directly using the low-level API BN_mod_exp may be 3527 implementation called BN_mod_exp without setting BN_FLG_CONSTTIME. This 4850 * BN_mod_exp may produce incorrect results on x86_64 6568 * BN_mod_exp may produce incorrect results on x86_64 7097 * BN_mod_exp may produce incorrect results on x86_64 16707 The previous value, 12, was not always sufficient for BN_mod_exp().
|
/openssl/util/ |
H A D | libcrypto.num | 3423 BN_mod_exp 3497 3_0_0 EXIST::FUNCTION:
|