Searched refs:exponent (Results 1 – 19 of 19) sorted by relevance
/openssl/crypto/bn/ |
H A D | rsaz_exp.h | 30 const BN_ULONG exponent[16], 36 const BN_ULONG base_norm[8], const BN_ULONG exponent[8],
|
H A D | rsaz_exp.c | 51 const BN_ULONG exponent[16], 203 p_str = (unsigned char *)exponent; 256 const BN_ULONG base[8], const BN_ULONG exponent[8], 263 unsigned char *p_str = (unsigned char *)exponent;
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-RSA.pod | 12 the public exponent I<e>, the private exponent I<d>, and a collection of prime 30 The RSA public exponent "e" value. 37 The RSA private exponent "d" value.
|
/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 62 exponent and B<d> is the private exponent. B<p>, B<q>, B<dmp1>, 71 B<t> are the exponent and coefficient for CRT calculations. 102 sets a collect of multi-prime 'triplet' members (prime, exponent and coefficient)
|
H A D | RSA_generate_key.pod | 47 modulus will be I<primes>, and the public exponent will be I<e>. Key sizes 48 with I<num> E<lt> 1024 should be considered insecure. The exponent is an odd
|
H A D | X509_check_private_key.pod | 37 They merely compare the public materials (e.g., exponent and modulus of an RSA
|
H A D | OSSL_PARAM_BLD.pod | 152 unsigned int e; /* public exponent */ 153 BIGNUM *d; /* private exponent */
|
H A D | DH_get0_pqg.pod | 102 length of the secret exponent (private key) in bits. For safe prime groups the optional length para… 128 DH_get_length() returns the length of the secret exponent (private key) in bits,
|
H A D | RSA_check_key.pod | 30 and public exponent elements populated.
|
H A D | BN_BLINDING_new.pod | 85 using the exponent B<e> and the modulus B<m>. B<bn_mod_exp> and
|
H A D | ASN1_generate_nconf.pod | 251 # Actual public key: modulus and exponent
|
H A D | EVP_PKEY_CTX_ctrl.pod | 307 EVP_PKEY_CTX_set1_rsa_keygen_pubexp() sets the public exponent value for RSA key
|
/openssl/test/ |
H A D | bntest.c | 3064 BIGNUM *base = NULL, *exponent = NULL, *modulo = NULL; in test_mod_exp() local 3069 || !TEST_true(BN_dec2bn(&exponent, test->exp)) in test_mod_exp() 3073 if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) in test_mod_exp() 3088 BN_free(exponent); in test_mod_exp() 3098 BIGNUM *base = NULL, *exponent = NULL, *modulo = NULL; in test_mod_exp_consttime() local 3103 || !TEST_true(BN_dec2bn(&exponent, test->exp)) in test_mod_exp_consttime() 3108 BN_set_flags(exponent, BN_FLG_CONSTTIME); in test_mod_exp_consttime() 3111 if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) in test_mod_exp_consttime() 3126 BN_free(exponent); in test_mod_exp_consttime()
|
/openssl/doc/man1/ |
H A D | openssl-genrsa.pod.in | 68 The public exponent to use, either 65537 or 3. The default is 65537.
|
H A D | openssl-genpkey.pod.in | 155 The RSA public exponent value. This can be a large decimal or 421 Generate a 2048 bit RSA key using 3 as the public exponent:
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1272 RSA_R_MP_EXPONENT_NOT_CONGRUENT_TO_D:169:mp exponent not congruent to d 1274 RSA_R_NO_PUBLIC_EXPONENT:140:no public exponent 1285 RSA_R_PUB_EXPONENT_OUT_OF_RANGE:178:pub exponent out of range
|
/openssl/doc/designs/quic-design/ |
H A D | tx-packetiser.md | 20 /* ACK delay exponent used when encoding. */
|
/openssl/ |
H A D | CHANGES.md | 7128 DH exponent. This attack requires that the attacker complete multiple 7130 this could be used to discover a TLS server's private DH exponent if it's 7131 reusing the private DH exponent or it's using a static DH ciphersuite. 11826 in the exponent causes BN_mod_exp_mont() to use the alternative 12265 exponent rather than 'unsigned long'. There is a corresponding change to 13189 the exponentiation using a fixed-length exponent. (Otherwise, 13204 BN_FLG_EXP_CONSTTIME is set for the exponent. RSA, DSA, and DH 13488 seeded (in this case, the secret RSA exponent is abused as 15746 seeded (in this case, the secret RSA exponent is abused as 16304 dh->length (recommended exponent length) is much smaller than the [all …]
|
H A D | NEWS.md | 1517 * Allow use of fixed-length exponent on DSA signing
|
Completed in 79 milliseconds