Lines Matching refs:exponent
7128 DH exponent. This attack requires that the attacker complete multiple
7129 handshakes in which the peer uses the same private DH exponent. For example
7130 this could be used to discover a TLS server's private DH exponent if it's
7131 reusing the private DH exponent or it's using a static DH ciphersuite.
7135 reuses the same private DH exponent for the life of the server process and
11826 in the exponent causes BN_mod_exp_mont() to use the alternative
12265 exponent rather than 'unsigned long'. There is a corresponding change to
13189 the exponentiation using a fixed-length exponent. (Otherwise,
13204 BN_FLG_EXP_CONSTTIME is set for the exponent. RSA, DSA, and DH
13488 seeded (in this case, the secret RSA exponent is abused as
15746 seeded (in this case, the secret RSA exponent is abused as
16304 dh->length (recommended exponent length) is much smaller than the
17697 * Include 'length' (recommended exponent length) in C code generated