Sortix main manual
This manual documents Sortix main. You can instead view this document in the latest official manual.
NAME
BN_nist_mod_192, BN_nist_mod_224, BN_nist_mod_256, BN_nist_mod_384, BN_nist_mod_521 — reduction modulo NIST-recommended primesSYNOPSIS
#include <openssl/bn.h>BN_nist_mod_192(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx);
BN_nist_mod_224(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx);
BN_nist_mod_256(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx);
BN_nist_mod_384(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx);
BN_nist_mod_521(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx);
DESCRIPTION
These functions are optimized versions of BN_nnmod(3) using precomputed tables. They ignore their m argument and use the following moduli instead:- BN_nist_mod_192()
- BN_get0_nist_prime_192(3)
- BN_nist_mod_224()
- BN_get0_nist_prime_224(3)
- BN_nist_mod_256()
- BN_get0_nist_prime_256(3)
- BN_nist_mod_384()
- BN_get0_nist_prime_384(3)
- BN_nist_mod_521()
- BN_get0_nist_prime_521(3)