Searched refs:u1 (Results 1 – 3 of 3) sorted by relevance
/openssl/crypto/dsa/ |
H A D | dsa_ossl.c | 359 BIGNUM *u1, *u2, *t1; in dsa_do_verify() local 382 u1 = BN_new(); in dsa_do_verify() 386 if (u1 == NULL || u2 == NULL || t1 == NULL || ctx == NULL) in dsa_do_verify() 416 if (BN_bin2bn(dgst, dgst_len, u1) == NULL) in dsa_do_verify() 420 if (!BN_mod_mul(u1, u1, u2, dsa->params.q, ctx)) in dsa_do_verify() 435 if (!dsa->meth->dsa_mod_exp(dsa, t1, dsa->params.g, u1, dsa->pub_key, u2, in dsa_do_verify() 439 if (!BN_mod_exp2_mont(t1, dsa->params.g, u1, dsa->pub_key, u2, in dsa_do_verify() 445 if (!BN_mod(u1, t1, dsa->params.q, ctx)) in dsa_do_verify() 451 ret = (BN_ucmp(u1, r) == 0); in dsa_do_verify() 457 BN_free(u1); in dsa_do_verify()
|
/openssl/crypto/ec/ |
H A D | ecdsa_ossl.c | 450 BIGNUM *u1, *u2, *m, *X; in ossl_ecdsa_simple_verify_sig() local 473 u1 = BN_CTX_get(ctx); in ossl_ecdsa_simple_verify_sig() 517 if (!BN_mod_mul(u1, m, u2, order, ctx)) { in ossl_ecdsa_simple_verify_sig() 531 if (!EC_POINT_mul(group, point, u1, pub_key, u2, ctx)) { in ossl_ecdsa_simple_verify_sig() 541 if (!BN_nnmod(u1, X, order, ctx)) { in ossl_ecdsa_simple_verify_sig() 546 ret = (BN_ucmp(u1, sig->r) == 0); in ossl_ecdsa_simple_verify_sig()
|
/openssl/crypto/bn/ |
H A D | bn_gf2m.c | 651 BN_ULONG u0, u1, b0, b1, mask; in BN_GF2m_mod_inv_vartime() local 658 u1 = udp[i + 1]; in BN_GF2m_mod_inv_vartime() 659 udp[i] = ((u0 >> 1) | (u1 << (BN_BITS2 - 1))) & BN_MASK2; in BN_GF2m_mod_inv_vartime() 660 u0 = u1; in BN_GF2m_mod_inv_vartime()
|
Completed in 13 milliseconds