Lines Matching refs:mod
481 /* BN_mod_word returns |a| mod |w|. */
494 /* BN_mod_add sets |r| = |a| + |b| mod |m|. It returns one on success and zero
504 /* BN_mod_sub sets |r| = |a| - |b| mod |m|. It returns one on success and zero
514 /* BN_mod_mul sets |r| = |a|*|b| mod |m|. It returns one on success and zero
519 /* BN_mod_mul sets |r| = |a|^2 mod |m|. It returns one on success and zero
524 /* BN_mod_lshift sets |r| = (|a| << n) mod |m|, where |r| and |a| may be the
534 /* BN_mod_lshift1 sets |r| = (|a| << 1) mod |m|, where |r| and |a| may be the
544 /* BN_mod_sqrt returns a |BIGNUM|, r, such that r^2 == a (mod p). */
690 /* BN_mod_inverse sets |out| equal to |a|^-1, mod |n|. If either of |a| or |n|
722 /* BN_MONT_CTX_set sets up a Montgomery context given the modulus, |mod|. It
724 OPENSSL_EXPORT int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *mod,
728 * so, it creates a new |BN_MONT_CTX| and sets the modulus for it to |mod|. It
733 const BIGNUM *mod, BN_CTX *bn_ctx);
761 /* BN_mod_exp sets |r| equal to |a|^{|p|} mod |m|. It does so with the best
799 BIGNUM Ni; /* R*(1/R mod N) - N*Ni = 1