Home
last modified time | relevance | path

Searched refs:factors (Results 1 – 18 of 18) sorted by relevance

/openssl/crypto/rsa/
H A Drsa_gen.c127 p = sk_BIGNUM_value(factors, 0); in DEFINE_STACK_OF()
128 q = sk_BIGNUM_value(factors, 1); in DEFINE_STACK_OF()
174 factor = sk_BIGNUM_value(factors, i); in DEFINE_STACK_OF()
266 STACK_OF(BIGNUM) *factors = NULL; in rsa_multiprime_keygen()
293 factors = sk_BIGNUM_new_null(); in rsa_multiprime_keygen()
294 if (factors == NULL) in rsa_multiprime_keygen()
445 if (!sk_BIGNUM_insert(factors, tmp, sk_BIGNUM_num(factors))) in rsa_multiprime_keygen()
498 if (factors == NULL) in rsa_multiprime_keygen()
515 if (!sk_BIGNUM_insert(factors, tmp, sk_BIGNUM_num(factors))) in rsa_multiprime_keygen()
524 if (!sk_BIGNUM_insert(factors, sk_BIGNUM_delete(factors, 0), 1)) in rsa_multiprime_keygen()
[all …]
H A Drsa_backend.c139 if (sk_BIGNUM_num(factors) < 2) { in ossl_rsa_fromdata()
148 if (sk_BIGNUM_num(factors) > 2 in ossl_rsa_fromdata()
155 if (sk_BIGNUM_num(factors) == 2) { in ossl_rsa_fromdata()
166 sk_BIGNUM_pop(factors); in ossl_rsa_fromdata()
167 sk_BIGNUM_pop(factors); in ossl_rsa_fromdata()
216 if (sk_BIGNUM_num(factors) != 0 in ossl_rsa_fromdata()
221 if (sk_BIGNUM_num(factors) != 0 in ossl_rsa_fromdata()
240 sk_BIGNUM_free(factors); in ossl_rsa_fromdata()
250 sk_BIGNUM_pop_free(factors, BN_clear_free); in ossl_rsa_fromdata()
272 ossl_rsa_get0_all_params(rsa, factors, exps, coeffs); in DEFINE_SPECIAL_STACK_OF_CONST()
[all …]
H A Drsa_lib.c914 STACK_OF(BIGNUM_const) *factors = sk_BIGNUM_const_new_null(); in ossl_rsa_check_factors()
918 if (factors == NULL || exps == NULL || coeffs == NULL) in ossl_rsa_check_factors()
925 ossl_rsa_get0_all_params(r, factors, exps, coeffs); in ossl_rsa_check_factors()
937 for (i = 0; i < sk_BIGNUM_const_num(factors); i++) { in ossl_rsa_check_factors()
938 bits = safe_BN_num_bits(sk_BIGNUM_const_value(factors, i)); in ossl_rsa_check_factors()
952 sk_BIGNUM_const_free(factors); in ossl_rsa_check_factors()
H A Drsa_local.h155 STACK_OF(BIGNUM) *factors, STACK_OF(BIGNUM) *exps,
/openssl/providers/implementations/encode_decode/
H A Dencode_key2text.c637 STACK_OF(BIGNUM_const) *factors = NULL; in rsa_to_text()
649 factors = sk_BIGNUM_const_new_null(); in rsa_to_text()
653 if (factors == NULL || exps == NULL || coeffs == NULL) { in rsa_to_text()
669 ossl_rsa_get0_all_params((RSA *)rsa, factors, exps, coeffs); in rsa_to_text()
670 primes = sk_BIGNUM_const_num(factors); in rsa_to_text()
692 sk_BIGNUM_const_value(factors, 0))) in rsa_to_text()
695 sk_BIGNUM_const_value(factors, 1))) in rsa_to_text()
706 for (i = 2; i < sk_BIGNUM_const_num(factors); i++) { in rsa_to_text()
710 sk_BIGNUM_const_value(factors, i))) in rsa_to_text()
776 sk_BIGNUM_const_free(factors); in rsa_to_text()
/openssl/util/perl/OpenSSL/
H A Dconfig.pm345 my @factors = (100, 1);
346 while (@numbers && @factors) {
347 $CCVER += shift(@numbers) * shift(@factors)
394 my @factors = (100, 1);
396 while (@numbers && @factors) {
397 $v += shift(@numbers) * shift(@factors)
/openssl/doc/man3/
H A DEVP_PKEY_CTX_set_scrypt_N.pod38 EVP_PKEY_CTX_set_scrypt_p() configure the work factors N, r and p.
42 If RAM is exceeded because the load factors are chosen too high, the
51 The work factors B<N>, B<r> and B<p> as well as B<maxmem_bytes> can be
H A DEVP_KDF.pod251 memory that depends on the load factors provided as input.
255 If this memory usage limit is exceeded because the load factors are chosen
H A DSSL_CTX_set_tlsext_servername_callback.pod70 The behaviour of SSL_get_servername() depends on a number of different factors.
H A DOSSL_PARAM_BLD.pod154 BIGNUM *p, *q; /* first two prime factors */
H A DSSL_CTX_set_split_send_fragment.pod108 value depends on a number of factors but it will be at least
H A DRSA_get0_key.pod63 B<dmq1> and B<iqmp> are the factors for the second representation of a
/openssl/doc/man7/
H A DEVP_PKEY-RSA.pod13 factors, exponents and coefficient for CRT calculations, of which the first
59 RSA prime factors. The factors are known as "p", "q" and "r_i" in RFC8017.
60 Up to eight additional "r_i" prime factors are supported.
169 These 4 fields are normally randomly generated. The prime factors "p1", "p2",
H A DEVP_KDF-SCRYPT.pod19 scrypt provides three work factors that can be customized: N, r and p. N, which
60 These parameters configure the scrypt work factors N, r, maxmem and p.
/openssl/crypto/evp/
H A Dctrl_params_translate.c1899 const BIGNUM *factors[10]; in get_rsa_payload_factor() local
1902 && RSA_get0_multi_prime_factors(r, factors)) in get_rsa_payload_factor()
1903 bn = factors[factornum - 2]; in get_rsa_payload_factor()
/openssl/crypto/bn/
H A DREADME.pod180 factors have the same size: bn_mul_comba8() is used if they are 8
/openssl/doc/designs/quic-design/
H A Dtx-packetiser.md680 Two factors impact the size of packets that can be sent:
/openssl/
H A DCHANGES.md2987 * Revised BN_generate_prime_ex to not avoid factors 2..17863 in p-1
3616 * Revised BN_generate_prime_ex to not avoid factors 3..17863 in p-1
13422 having all other threads use local one-time blinding factors
15411 Previously, it could be negative if one of the factors was negative;
15680 having all other threads use local one-time blinding factors

Completed in 97 milliseconds