Searched refs:modulo (Results 1 – 9 of 9) sorted by relevance
/openssl/doc/man3/ |
H A D | BN_mod_exp_mont.pod | 28 BN_mod_exp_mont() computes I<a> to the I<p>-th power modulo I<m> (C<rr=a^p % m>) 33 BN_mod_exp_mont_consttime() computes I<a> to the I<p>-th power modulo I<m> 41 the I<p1>-th power modulo I<m1> (C<rr1=a1^p1 % m1>) and I<a2> to the I<p2>-th 42 power modulo I<m2> (C<rr2=a2^p2 % m2>) using Montgomery multiplication. For some
|
H A D | BN_mod_inverse.pod | 5 BN_mod_inverse - compute inverse modulo n 16 BN_mod_inverse() computes the inverse of B<a> modulo B<n>
|
H A D | BN_add.pod | 73 BN_nnmod() reduces I<a> modulo I<m> and places the nonnegative 76 BN_mod_add() adds I<a> to I<b> modulo I<m> and places the nonnegative 79 BN_mod_sub() subtracts I<b> from I<a> modulo I<m> and places the 89 BN_mod_sqr() takes the square of I<a> modulo B<m> and places the 102 BN_mod_exp() computes I<a> to the I<p>-th power modulo I<m> (C<r=a^p %
|
H A D | BN_mod_mul_montgomery.pod | 69 The inputs must be reduced modulo B<m>, otherwise the result will be
|
/openssl/test/ |
H A D | bntest.c | 3064 BIGNUM *base = NULL, *exponent = NULL, *modulo = NULL; in test_mod_exp() local 3070 || !TEST_true(BN_dec2bn(&modulo, test->mod))) in test_mod_exp() 3073 if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) in test_mod_exp() 3089 BN_free(modulo); in test_mod_exp() 3098 BIGNUM *base = NULL, *exponent = NULL, *modulo = NULL; in test_mod_exp_consttime() local 3104 || !TEST_true(BN_dec2bn(&modulo, test->mod))) in test_mod_exp_consttime() 3109 BN_set_flags(modulo, BN_FLG_CONSTTIME); in test_mod_exp_consttime() 3111 if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) in test_mod_exp_consttime() 3127 BN_free(modulo); in test_mod_exp_consttime()
|
/openssl/crypto/ |
H A D | README-sparse_array.md | 15 SA_BLOCK_MASK Specifies a bit mask to perform modulo block size
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_poly1305.txt | 47 # What happens if addition of s overflows modulo 2^128?
|
/openssl/crypto/aes/asm/ |
H A D | bsaes-armv8.pl | 1269 // x4 -> initial value of 128-bit counter (stored big-endian) which increments, modulo 2^32, for …
|
/openssl/ |
H A D | CHANGES.md | 15432 * New function BN_mod_sqrt for computing square roots modulo a prime 15509 be reduced modulo `m`.
|
Completed in 62 milliseconds