Home
last modified time | relevance | path

Searched refs:exponent (Results 1 – 19 of 19) sorted by relevance

/openssl/crypto/bn/
H A Drsaz_exp.h30 const BN_ULONG exponent[16],
36 const BN_ULONG base_norm[8], const BN_ULONG exponent[8],
H A Drsaz_exp.c51 const BN_ULONG exponent[16],
203 p_str = (unsigned char *)exponent;
256 const BN_ULONG base[8], const BN_ULONG exponent[8],
263 unsigned char *p_str = (unsigned char *)exponent;
/openssl/doc/man7/
H A DEVP_PKEY-RSA.pod12 the public exponent I<e>, the private exponent I<d>, and a collection of prime
30 The RSA public exponent "e" value.
37 The RSA private exponent "d" value.
/openssl/doc/man3/
H A DRSA_get0_key.pod62 exponent and B<d> is the private exponent. B<p>, B<q>, B<dmp1>,
71 B<t> are the exponent and coefficient for CRT calculations.
102 sets a collect of multi-prime 'triplet' members (prime, exponent and coefficient)
H A DRSA_generate_key.pod47 modulus will be I<primes>, and the public exponent will be I<e>. Key sizes
48 with I<num> E<lt> 1024 should be considered insecure. The exponent is an odd
H A DX509_check_private_key.pod37 They merely compare the public materials (e.g., exponent and modulus of an RSA
H A DOSSL_PARAM_BLD.pod152 unsigned int e; /* public exponent */
153 BIGNUM *d; /* private exponent */
H A DDH_get0_pqg.pod102 length of the secret exponent (private key) in bits. For safe prime groups the optional length para…
128 DH_get_length() returns the length of the secret exponent (private key) in bits,
H A DRSA_check_key.pod30 and public exponent elements populated.
H A DBN_BLINDING_new.pod85 using the exponent B<e> and the modulus B<m>. B<bn_mod_exp> and
H A DASN1_generate_nconf.pod251 # Actual public key: modulus and exponent
H A DEVP_PKEY_CTX_ctrl.pod307 EVP_PKEY_CTX_set1_rsa_keygen_pubexp() sets the public exponent value for RSA key
/openssl/test/
H A Dbntest.c3064 BIGNUM *base = NULL, *exponent = NULL, *modulo = NULL; in test_mod_exp() local
3069 || !TEST_true(BN_dec2bn(&exponent, test->exp)) in test_mod_exp()
3073 if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) in test_mod_exp()
3088 BN_free(exponent); in test_mod_exp()
3098 BIGNUM *base = NULL, *exponent = NULL, *modulo = NULL; in test_mod_exp_consttime() local
3103 || !TEST_true(BN_dec2bn(&exponent, test->exp)) in test_mod_exp_consttime()
3108 BN_set_flags(exponent, BN_FLG_CONSTTIME); in test_mod_exp_consttime()
3111 if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) in test_mod_exp_consttime()
3126 BN_free(exponent); in test_mod_exp_consttime()
/openssl/doc/man1/
H A Dopenssl-genrsa.pod.in68 The public exponent to use, either 65537 or 3. The default is 65537.
H A Dopenssl-genpkey.pod.in155 The RSA public exponent value. This can be a large decimal or
421 Generate a 2048 bit RSA key using 3 as the public exponent:
/openssl/crypto/err/
H A Dopenssl.txt1272 RSA_R_MP_EXPONENT_NOT_CONGRUENT_TO_D:169:mp exponent not congruent to d
1274 RSA_R_NO_PUBLIC_EXPONENT:140:no public exponent
1285 RSA_R_PUB_EXPONENT_OUT_OF_RANGE:178:pub exponent out of range
/openssl/doc/designs/quic-design/
H A Dtx-packetiser.md20 /* ACK delay exponent used when encoding. */
/openssl/
H A DCHANGES.md7128 DH exponent. This attack requires that the attacker complete multiple
7130 this could be used to discover a TLS server's private DH exponent if it's
7131 reusing the private DH exponent or it's using a static DH ciphersuite.
11826 in the exponent causes BN_mod_exp_mont() to use the alternative
12265 exponent rather than 'unsigned long'. There is a corresponding change to
13189 the exponentiation using a fixed-length exponent. (Otherwise,
13204 BN_FLG_EXP_CONSTTIME is set for the exponent. RSA, DSA, and DH
13488 seeded (in this case, the secret RSA exponent is abused as
15746 seeded (in this case, the secret RSA exponent is abused as
16304 dh->length (recommended exponent length) is much smaller than the
[all …]
H A DNEWS.md1517 * Allow use of fixed-length exponent on DSA signing

Completed in 79 milliseconds