summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/bn/bn_mont.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/bn/bn_mont.c')
-rw-r--r--src/lib/libcrypto/bn/bn_mont.c10
1 files changed, 9 insertions, 1 deletions
diff --git a/src/lib/libcrypto/bn/bn_mont.c b/src/lib/libcrypto/bn/bn_mont.c
index b44246e070..12fea44c5a 100644
--- a/src/lib/libcrypto/bn/bn_mont.c
+++ b/src/lib/libcrypto/bn/bn_mont.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: bn_mont.c,v 1.60 2023/06/17 14:43:50 jsing Exp $ */ 1/* $OpenBSD: bn_mont.c,v 1.61 2023/07/08 12:21:58 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -137,6 +137,7 @@ BN_MONT_CTX_new(void)
137 137
138 return mctx; 138 return mctx;
139} 139}
140LCRYPTO_ALIAS(BN_MONT_CTX_new);
140 141
141void 142void
142BN_MONT_CTX_free(BN_MONT_CTX *mctx) 143BN_MONT_CTX_free(BN_MONT_CTX *mctx)
@@ -150,6 +151,7 @@ BN_MONT_CTX_free(BN_MONT_CTX *mctx)
150 if (mctx->flags & BN_FLG_MALLOCED) 151 if (mctx->flags & BN_FLG_MALLOCED)
151 free(mctx); 152 free(mctx);
152} 153}
154LCRYPTO_ALIAS(BN_MONT_CTX_free);
153 155
154BN_MONT_CTX * 156BN_MONT_CTX *
155BN_MONT_CTX_copy(BN_MONT_CTX *dst, BN_MONT_CTX *src) 157BN_MONT_CTX_copy(BN_MONT_CTX *dst, BN_MONT_CTX *src)
@@ -168,6 +170,7 @@ BN_MONT_CTX_copy(BN_MONT_CTX *dst, BN_MONT_CTX *src)
168 170
169 return dst; 171 return dst;
170} 172}
173LCRYPTO_ALIAS(BN_MONT_CTX_copy);
171 174
172int 175int
173BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *mod, BN_CTX *ctx) 176BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *mod, BN_CTX *ctx)
@@ -257,6 +260,7 @@ BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *mod, BN_CTX *ctx)
257 260
258 return ret; 261 return ret;
259} 262}
263LCRYPTO_ALIAS(BN_MONT_CTX_set);
260 264
261BN_MONT_CTX * 265BN_MONT_CTX *
262BN_MONT_CTX_set_locked(BN_MONT_CTX **pmctx, int lock, const BIGNUM *mod, 266BN_MONT_CTX_set_locked(BN_MONT_CTX **pmctx, int lock, const BIGNUM *mod,
@@ -293,6 +297,7 @@ BN_MONT_CTX_set_locked(BN_MONT_CTX **pmctx, int lock, const BIGNUM *mod,
293 done: 297 done:
294 return mctx; 298 return mctx;
295} 299}
300LCRYPTO_ALIAS(BN_MONT_CTX_set_locked);
296 301
297static int bn_montgomery_reduce(BIGNUM *ret, BIGNUM *r, BN_MONT_CTX *mctx); 302static int bn_montgomery_reduce(BIGNUM *ret, BIGNUM *r, BN_MONT_CTX *mctx);
298 303
@@ -497,6 +502,7 @@ BN_mod_mul_montgomery(BIGNUM *r, const BIGNUM *a, const BIGNUM *b,
497 /* Compute r = aR * bR * R^-1 mod N = abR mod N */ 502 /* Compute r = aR * bR * R^-1 mod N = abR mod N */
498 return bn_mod_mul_montgomery(r, a, b, mctx, ctx); 503 return bn_mod_mul_montgomery(r, a, b, mctx, ctx);
499} 504}
505LCRYPTO_ALIAS(BN_mod_mul_montgomery);
500 506
501int 507int
502BN_to_montgomery(BIGNUM *r, const BIGNUM *a, BN_MONT_CTX *mctx, BN_CTX *ctx) 508BN_to_montgomery(BIGNUM *r, const BIGNUM *a, BN_MONT_CTX *mctx, BN_CTX *ctx)
@@ -504,6 +510,7 @@ BN_to_montgomery(BIGNUM *r, const BIGNUM *a, BN_MONT_CTX *mctx, BN_CTX *ctx)
504 /* Compute r = a * R * R * R^-1 mod N = aR mod N */ 510 /* Compute r = a * R * R * R^-1 mod N = aR mod N */
505 return bn_mod_mul_montgomery(r, a, &mctx->RR, mctx, ctx); 511 return bn_mod_mul_montgomery(r, a, &mctx->RR, mctx, ctx);
506} 512}
513LCRYPTO_ALIAS(BN_to_montgomery);
507 514
508/* 515/*
509 * bn_montgomery_reduce() performs Montgomery reduction, reducing the input 516 * bn_montgomery_reduce() performs Montgomery reduction, reducing the input
@@ -597,3 +604,4 @@ BN_from_montgomery(BIGNUM *r, const BIGNUM *a, BN_MONT_CTX *mctx, BN_CTX *ctx)
597 604
598 return ret; 605 return ret;
599} 606}
607LCRYPTO_ALIAS(BN_from_montgomery);