/third_party/openssl/crypto/bn/ |
D | bn_sqrt.c | 150 if (!BN_mod_mul(t, t, y, p, ctx)) in BN_mod_sqrt() 156 if (!BN_mod_mul(x, A, b, p, ctx)) in BN_mod_sqrt() 158 if (!BN_mod_mul(x, x, t, p, ctx)) in BN_mod_sqrt() 280 if (!BN_mod_mul(b, b, A, p, ctx)) in BN_mod_sqrt() 284 if (!BN_mod_mul(x, x, A, p, ctx)) in BN_mod_sqrt() 312 if (!BN_mod_mul(t, t, t, p, ctx)) in BN_mod_sqrt() 331 if (!BN_mod_mul(y, t, t, p, ctx)) in BN_mod_sqrt() 333 if (!BN_mod_mul(x, x, t, p, ctx)) in BN_mod_sqrt() 335 if (!BN_mod_mul(b, b, y, p, ctx)) in BN_mod_sqrt()
|
D | bn_blind.c | 102 if (!BN_mod_mul(b->Ai, b->Ai, b->Ai, b->mod, ctx) in BN_BLINDING_update() 103 || !BN_mod_mul(b->A, b->A, b->A, b->mod, ctx)) in BN_BLINDING_update() 143 ret = BN_mod_mul(n, n, b->A, b->mod, ctx); in BN_BLINDING_convert_ex() 182 ret = BN_mod_mul(n, n, r, b->mod, ctx); in BN_BLINDING_invert_ex()
|
D | bn_exp.c | 1322 if (!BN_mod_mul(d, val[0], val[0], m, ctx)) in BN_mod_exp_simple() 1327 !BN_mod_mul(val[i], val[i - 1], d, m, ctx)) in BN_mod_exp_simple() 1345 if (!BN_mod_mul(r, r, r, m, ctx)) in BN_mod_exp_simple() 1375 if (!BN_mod_mul(r, r, r, m, ctx)) in BN_mod_exp_simple() 1380 if (!BN_mod_mul(r, r, val[wvalue >> 1], m, ctx)) in BN_mod_exp_simple()
|
D | bn_mod.c | 193 int BN_mod_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, in BN_mod_mul() function
|
D | bn_prime.c | 256 if (!BN_mod_mul(w, w, w, a, ctx)) /* w := w^2 mod a */ in witness()
|
/third_party/openssl/crypto/dsa/ |
D | dsa_ossl.c | 133 if (!BN_mod_mul(tmp, blind, dsa->priv_key, dsa->q, ctx)) in dsa_do_sign() 135 if (!BN_mod_mul(tmp, tmp, ret->r, dsa->q, ctx)) in dsa_do_sign() 139 if (!BN_mod_mul(blindm, blind, m, dsa->q, ctx)) in dsa_do_sign() 147 if (!BN_mod_mul(ret->s, ret->s, kinv, dsa->q, ctx)) in dsa_do_sign() 153 if (!BN_mod_mul(ret->s, ret->s, blind, dsa->q, ctx)) in dsa_do_sign() 361 if (!BN_mod_mul(u1, u1, u2, dsa->q, ctx)) in dsa_do_verify() 365 if (!BN_mod_mul(u2, r, u2, dsa->q, ctx)) in dsa_do_verify()
|
/third_party/openssl/crypto/srp/ |
D | srp_lib.c | 74 if (!BN_mod_mul(tmp, A, tmp, N, bn_ctx)) in SRP_Calc_server_key() 107 || !BN_mod_mul(kv, v, k, N, bn_ctx) in SRP_Calc_B() 199 if (!BN_mod_mul(tmp2, tmp, k, N, bn_ctx)) in SRP_Calc_client_key()
|
/third_party/openssl/doc/man3/ |
D | BN_add.pod | 6 BN_mod_sub, BN_mod_mul, BN_mod_sqr, BN_mod_sqrt, BN_exp, BN_mod_exp, BN_gcd - 34 int BN_mod_mul(BIGNUM *r, BIGNUM *a, BIGNUM *b, const BIGNUM *m, 82 BN_mod_mul() multiplies I<a> by I<b> and finds the nonnegative
|
D | BN_mod_mul_reciprocal.pod | 27 L<BN_mod_mul(3)> operation when the operation will be performed
|
/third_party/openssl/crypto/ec/ |
D | ecp_oct.c | 62 if (!BN_mod_mul(tmp1, tmp2, x_, group->field, ctx)) in ec_GFp_simple_set_compressed_coordinates() 78 if (!BN_mod_mul(tmp2, tmp2, x, group->field, ctx)) in ec_GFp_simple_set_compressed_coordinates()
|
D | ecdsa_ossl.c | 390 if (!BN_mod_mul(u1, m, u2, order, ctx)) { in ossl_ecdsa_verify_sig() 395 if (!BN_mod_mul(u2, sig->r, u2, order, ctx)) { in ossl_ecdsa_verify_sig()
|
D | ecp_smpl.c | 290 if (!BN_mod_mul(tmp_2, tmp_1, a, p, ctx)) in ec_GFp_simple_group_check_discriminant() 588 if (!BN_mod_mul(Z_3, Z_2, Z_1, group->field, ctx)) in ec_GFp_simple_point_get_affine_coordinates() 1362 return BN_mod_mul(r, a, b, group->field, ctx); in ec_GFp_simple_field_mul()
|
/third_party/openssl/crypto/sm2/ |
D | sm2_sign.c | 257 || !BN_mod_mul(tmp, dA, r, order, ctx) in sm2_sig_gen() 259 || !BN_mod_mul(s, s, tmp, order, ctx)) { in sm2_sig_gen()
|
/third_party/openssl/crypto/rsa/ |
D | rsa_chk.c | 144 if (!BN_mod_mul(i, key->d, key->e, k, ctx)) { in RSA_check_key_ex()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | crypto_openssl.c | 1507 res = BN_mod_mul((BIGNUM *) d, (const BIGNUM *) a, (const BIGNUM *) b, in crypto_bignum_mulmod() 1925 BN_mod_mul(tmp, tmp, (const BIGNUM *) x, e->prime, e->bnctx) && in crypto_ec_point_compute_y_sqr() 1926 BN_mod_mul(tmp2, e->a, (const BIGNUM *) x, e->prime, e->bnctx) && in crypto_ec_point_compute_y_sqr()
|
/third_party/openssl/include/openssl/ |
D | bn.h | 257 int BN_mod_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | crypto_openssl.c | 1580 res = BN_mod_mul((BIGNUM *) d, (const BIGNUM *) a, (const BIGNUM *) b, in crypto_bignum_mulmod() 1990 BN_mod_mul(tmp, tmp, (const BIGNUM *) x, e->prime, e->bnctx) && in crypto_ec_point_compute_y_sqr()
|
/third_party/openssl/test/ |
D | bntest.c | 1601 if (!TEST_true(BN_mod_mul(ret, a, b, m, ctx)) in file_modmul() 2188 if (!TEST_false(BN_mod_mul(a, BN_value_one(), BN_value_one(), zero, ctx))) in test_badmod()
|
/third_party/grpc/src/boringssl/ |
D | boringssl_prefix_symbols.h | 949 #define BN_mod_mul BORINGSSL_ADD_PREFIX(BORINGSSL_PREFIX, BN_mod_mul) macro
|
/third_party/openssl/util/ |
D | libcrypto.num | 2530 BN_mod_mul 2496 1_1_0 EXIST::FUNCTION:
|
/third_party/openssl/ |
D | CHANGES | 8505 EC_GFp_simple_method() uses the basic BN_mod_mul and BN_mod_sqr 9172 *) Change BN_mod_mul so that the result is always non-negative.
|