Provided by: libssl-doc_1.1.1-1ubuntu2.1~18.04.23_all bug

NAME

       BN_BLINDING_new, BN_BLINDING_free, BN_BLINDING_update, BN_BLINDING_convert, BN_BLINDING_invert,
       BN_BLINDING_convert_ex, BN_BLINDING_invert_ex, BN_BLINDING_is_current_thread,
       BN_BLINDING_set_current_thread, BN_BLINDING_lock, BN_BLINDING_unlock, BN_BLINDING_get_flags,
       BN_BLINDING_set_flags, BN_BLINDING_create_param - blinding related BIGNUM functions

SYNOPSIS

        #include <openssl/bn.h>

        BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai,
                                     BIGNUM *mod);
        void BN_BLINDING_free(BN_BLINDING *b);
        int BN_BLINDING_update(BN_BLINDING *b, BN_CTX *ctx);
        int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx);
        int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx);
        int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b,
                                   BN_CTX *ctx);
        int BN_BLINDING_invert_ex(BIGNUM *n, const BIGNUM *r, BN_BLINDING *b,
                                  BN_CTX *ctx);
        int BN_BLINDING_is_current_thread(BN_BLINDING *b);
        void BN_BLINDING_set_current_thread(BN_BLINDING *b);
        int BN_BLINDING_lock(BN_BLINDING *b);
        int BN_BLINDING_unlock(BN_BLINDING *b);
        unsigned long BN_BLINDING_get_flags(const BN_BLINDING *);
        void BN_BLINDING_set_flags(BN_BLINDING *, unsigned long);
        BN_BLINDING *BN_BLINDING_create_param(BN_BLINDING *b,
                                              const BIGNUM *e, BIGNUM *m, BN_CTX *ctx,
                                              int (*bn_mod_exp)(BIGNUM *r,
                                                                const BIGNUM *a,
                                                                const BIGNUM *p,
                                                                const BIGNUM *m,
                                                                BN_CTX *ctx,
                                                                BN_MONT_CTX *m_ctx),
                                              BN_MONT_CTX *m_ctx);

DESCRIPTION

       BN_BLINDING_new() allocates a new BN_BLINDING structure and copies the A and Ai values into the newly
       created BN_BLINDING object.

       BN_BLINDING_free() frees the BN_BLINDING structure.  If b is NULL, nothing is done.

       BN_BLINDING_update() updates the BN_BLINDING parameters by squaring the A and Ai or, after specific
       number of uses and if the necessary parameters are set, by re-creating the blinding parameters.

       BN_BLINDING_convert_ex() multiplies n with the blinding factor A.  If r is not NULL a copy the inverse
       blinding factor Ai will be returned in r (this is useful if a RSA object is shared among several
       threads). BN_BLINDING_invert_ex() multiplies n with the inverse blinding factor Ai. If r is not NULL it
       will be used as the inverse blinding.

       BN_BLINDING_convert() and BN_BLINDING_invert() are wrapper functions for BN_BLINDING_convert_ex() and
       BN_BLINDING_invert_ex() with r set to NULL.

       BN_BLINDING_is_current_thread() returns whether the BN_BLINDING structure is owned by the current thread.
       This is to help users provide proper locking if needed for multi-threaded use.

       BN_BLINDING_set_current_thread() sets the current thread as the owner of the BN_BLINDING structure.

       BN_BLINDING_lock() locks the BN_BLINDING structure.

       BN_BLINDING_unlock() unlocks the BN_BLINDING structure.

       BN_BLINDING_get_flags() returns the BN_BLINDING flags. Currently there are two supported flags:
       BN_BLINDING_NO_UPDATE and BN_BLINDING_NO_RECREATE. BN_BLINDING_NO_UPDATE inhibits the automatic update of
       the BN_BLINDING parameters after each use and BN_BLINDING_NO_RECREATE inhibits the automatic re-creation
       of the BN_BLINDING parameters after a fixed number of uses (currently 32). In newly allocated BN_BLINDING
       objects no flags are set.  BN_BLINDING_set_flags() sets the BN_BLINDING parameters flags.

       BN_BLINDING_create_param() creates new BN_BLINDING parameters using the exponent e and the modulus m.
       bn_mod_exp and m_ctx can be used to pass special functions for exponentiation (normally BN_mod_exp_mont()
       and BN_MONT_CTX).

RETURN VALUES

       BN_BLINDING_new() returns the newly allocated BN_BLINDING structure or NULL in case of an error.

       BN_BLINDING_update(), BN_BLINDING_convert(), BN_BLINDING_invert(), BN_BLINDING_convert_ex() and
       BN_BLINDING_invert_ex() return 1 on success and 0 if an error occurred.

       BN_BLINDING_is_current_thread() returns 1 if the current thread owns the BN_BLINDING object, 0 otherwise.

       BN_BLINDING_set_current_thread() doesn't return anything.

       BN_BLINDING_lock(), BN_BLINDING_unlock() return 1 if the operation succeeded or 0 on error.

       BN_BLINDING_get_flags() returns the currently set BN_BLINDING flags (a unsigned long value).

       BN_BLINDING_create_param() returns the newly created BN_BLINDING parameters or NULL on error.

HISTORY

       BN_BLINDING_thread_id() was first introduced in OpenSSL 1.0.0, and it deprecates
       BN_BLINDING_set_thread_id() and BN_BLINDING_get_thread_id().

COPYRIGHT

       Copyright 2005-2017 The OpenSSL Project Authors. All Rights Reserved.

       Licensed under the OpenSSL license (the "License").  You may not use this file except in compliance with
       the License.  You can obtain a copy in the file LICENSE in the source distribution or at
       <https://www.openssl.org/source/license.html>.