Windows PowerShell command on Get-command BN_from_montgomery
MyWebUniversity

Manual Pages for UNIX Operating System command usage for man BN_from_montgomery

OpenSSL BN_mod_mul_montgomery(3openssl)

NNNNAAAAMMMMEEEE

BN_mod_mul_montgomery, BN_MONT_CTX_new, BN_MONT_CTX_init,

BN_MONT_CTX_free, BN_MONT_CTX_set, BN_MONT_CTX_copy,

BN_from_montgomery, BN_to_montgomery - Montgomery

multiplication SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS

#include

BN_MONT_CTX *BN_MONT_CTX_new(void);

void BN_MONT_CTX_init(BN_MONT_CTX *ctx);

void BN_MONT_CTX_free(BN_MONT_CTX *mont);

int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *m, BN_CTX *ctx);

BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to, BN_MONT_CTX *from);

int BN_mod_mul_montgomery(BIGNUM *r, BIGNUM *a, BIGNUM *b,

BN_MONT_CTX *mont, BN_CTX *ctx);

int BN_from_montgomery(BIGNUM *r, BIGNUM *a, BN_MONT_CTX *mont,

BN_CTX *ctx);

int BN_to_montgomery(BIGNUM *r, BIGNUM *a, BN_MONT_CTX *mont,

BN_CTX *ctx);

DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN These functions implement Montgomery multiplication. They

are used automatically when BN_mod_exp(3) is called with

suitable input, but they may be useful when several operations are to be performed using the same modulus.

BN_MONT_CTX_new() allocates and initializes a BBBBNNNN_MMMMOOOONNNNTTTT_CCCCTTTTXXXX

structure. BN_MONT_CTX_init() initializes an existing

uninitialized BBBBNNNN_MMMMOOOONNNNTTTT_CCCCTTTTXXXX.

BN_MONT_CTX_set() sets up the mont structure from the

modulus m by precomputing its inverse and a value R.

BN_MONT_CTX_copy() copies the BBBBNNNN_MMMMOOOONNNNTTTT_CCCCTTTTXXXX from to to.

BN_MONT_CTX_free() frees the components of the BBBBNNNN_MMMMOOOONNNNTTTT_CCCCTTTTXXXX,

and, if it was created by BN_MONT_CTX_new(), also the

structure itself.

BN_mod_mul_montgomery() computes Mont(a,b):=a*b*R^-1 and

places the result in r.

BN_from_montgomery() performs the Montgomery reduction r =

a*R^-1.

25/Sep/2002 Last change: 0.9.8o 1

OpenSSL BN_mod_mul_montgomery(3openssl)

BN_to_montgomery() computes Mont(a,R^2), i.e. a*R. Note

that a must be non-negative and smaller than the modulus.

For all functions, ctx is a previously allocated BBBBNNNN_CCCCTTTTXXXX used

for temporary variables.

The BBBBNNNN_MMMMOOOONNNNTTTT_CCCCTTTTXXXX structure is defined as follows:

typedef struct bn_mont_ctx_st

{ int ri; /* number of bits in R */ BIGNUM RR; /* R^2 (used to convert to Montgomery form) */ BIGNUM N; /* The modulus */

BIGNUM Ni; /* R*(1/R mod N) - N*Ni = 1

* (Ni is only stored for bignum algorithm) */

BN_ULONG n0; /* least significant word of Ni */

int flags;

} BN_MONT_CTX;

BN_to_montgomery() is a macro.

RRRREEEETTTTUUUURRRRNNNN VVVVAAAALLLLUUUUEEEESSSS

BN_MONT_CTX_new() returns the newly allocated BBBBNNNN_MMMMOOOONNNNTTTT_CCCCTTTTXXXX,

and NULL on error.

BN_MONT_CTX_init() and BN_MONT_CTX_free() have no return

values. For the other functions, 1 is returned for success, 0 on

error. The error codes can be obtained by ERR_get_error(3).

WWWWAAAARRRRNNNNIIIINNNNGGGG The inputs must be reduced modulo mmmm, otherwise the result will be outside the expected range. SSSSEEEEEEEE AAAALLLLSSSSOOOO

bn(3), ERR_get_error(3), BN_add(3), BN_CTX_new(3)

HHHHIIIISSSSTTTTOOOORRRRYYYY

BN_MONT_CTX_new(), BN_MONT_CTX_free(), BN_MONT_CTX_set(),

BN_mod_mul_montgomery(), BN_from_montgomery() and

BN_to_montgomery() are available in all versions of SSLeay

and OpenSSL.

BN_MONT_CTX_init() and BN_MONT_CTX_copy() were added in

SSLeay 0.9.1b.

25/Sep/2002 Last change: 0.9.8o 2

OpenSSL BN_mod_mul_montgomery(3openssl)

25/Sep/2002 Last change: 0.9.8o 3




Contact us      |      About us      |      Term of use      |       Copyright © 2000-2019 MyWebUniversity.com ™