• Home
  • History
  • Annotate
  • Raw
  • Download

Lines Matching refs:bnD

25860 202        BIGNUM              *bnD;
25877 214 bnD = BN_CTX_get(context);
25884 221 || BN_bin2bn(d->buffer, d->size, bnD) == NULL)
25888 225 if(BN_num_bits(bnD) == 0)
25892 229 if (BN_div(bnQ, bnR, bnN, bnD, context) != 1)
28864 10 BIGNUM *bnD;
28887 28 bnD = BN_CTX_get(context);
28933 74 if(BN_mod_inverse(bnD, bnE, bnPhi, context) == NULL)
28947 88 fill = key->publicKey->size - BN_num_bytes(bnD);
28948 89 BN_bn2bin(bnD, &key->privateKey->buffer[fill]);
28993 114 BIGNUM *bnD;
29023 139 bnD = BN_CTX_get(context); // private exponent (d)
29086 202 if(BN_mod_inverse(bnD, bnE, bnPhi, context) == NULL)
29105 216 fill = d->size - BN_num_bytes(bnD);
29106 217 BN_bn2bin(bnD, &d->buffer[fill]);
33468 273 BIGNUM *bnD;
33488 293 bnD = BN_CTX_get(context);
33495 300 if( bnD == NULL
33519 319 BnFrom2B(bnD, &dIn->b);
33522 322 bnD = NULL;
33536 336 bnU = bnD;
33537 337 bnD = NULL;
33544 344 if((retVal = PointMul(group, R, bnD, Q, bnU, context)) == CRYPT_SUCCESS)
33611 381 BIGNUM *bnX, *bnY, *bnR, *bnD;
33628 398 bnD = BN_CTX_get(context);
33651 421 BnFrom2B(bnD, &d->b);
33670 435 if((retVal = PointMul(group, pK, NULL, pB, bnD, context)) != CRYPT_SUCCESS)
33854 577 BIGNUM *bnD; // the private scalar
33879 597 bnD = BN_CTX_get(context);
33885 603 if( bnD == NULL
33914 632 if ( BN_bin2bn(withExtra, keySizeInBytes+8, bnD) == NULL
33915 633 || BN_mod(bnD, bnD, bnNm1, context) != 1)
33919 637 BN_add_word(bnD, 1);
33920 638 if(BnTo2B(&dOut->b, bnD, keySizeInBytes) != 1)
34008 701 BIGNUM *bnD;
34025 718 bnD = BN_CTX_get(context);
34120 808 || BN_bin2bn(dIn->t.buffer, dIn->t.size, bnD) == NULL)
34127 815 // now have inverse of K (bnIk), z (bnZ), r (bnR), d (bnD) and n (bnN)
34130 818 if( !BN_mod_mul(bnD, bnR, bnD, bnN, context)
34133 821 || !BN_add(bnD, bnZ, bnD)
34136 824 || !BN_mod_mul(bnD, bnIk, bnD, bnN, context)
34139 827 || !BnTo2B(&sOut->b, bnD, curveData->n->size)
34152 835 if(!BN_is_zero(bnD))
34190 858 BIGNUM *bnN, *bnK, *bnT, *bnD;
34227 889 bnD = BN_CTX_get(context);
34230 892 if(bnD == NULL)
34236 898 || BN_bin2bn(dIn->t.buffer, dIn->t.size, bnD) == NULL
34245 907 OK = OK && BN_mod_mul(bnD, bnT, bnD, bnN, context) == 1;
34247 909 OK = OK && BN_mod_add(bnD, bnK, bnD, bnN, context) == 1;
34249 911 OK = OK && BnTo2B(&sOut->b, bnD, n->size);
34299 937 BIGNUM *bnR, *bnN, *bnK, *bnT, *bnD;
34339 977 bnD = BN_CTX_get(context);
34340 978 if( bnD == NULL
34508 1116 BIGNUM *bnD;
34526 1134 bnD = BN_CTX_get(context);
34534 1142 BnFrom2B(bnD, &dIn->b);
34538 1146 BN_hex2bn(&bnD, "128B2FA8BD433C6C068C8D803DFF79792A519A55171B1B650C23661D15897263");
34591 1194 BN_copy(bnT, bnD);
34602 1205 if( !BN_mod_mul(bnS, bnD, bnR, bnN, context) // (r * dA) mod n
35519 1942 BIGNUM *bnD;
35527 1950 if((bnD = BN_CTX_get(context)) == NULL)
35541 1959 BnFrom2B(bnD, &dsA->b);
35547 1965 if(PointMul(group, pQ, NULL, pQ, bnD, context) != CRYPT_NO_RESULT)
35552 1970 BnFrom2B(bnD, &deA->b);
35558 1976 if(PointMul(group, pQ, NULL, pQ, bnD, context) != CRYPT_NO_RESULT)