/openssl/doc/man1/ |
H A D | openssl-prime.pod.in | 6 openssl-prime - compute prime numbers 10 B<openssl prime> 22 This command checks if the specified numbers are prime. 42 Generate a prime number. 46 Generate a prime with I<num> bits. 50 When used with B<-generate>, generates a "safe" prime. If the number 51 generated is I<n>, then check that C<(I<n>-1)/2> is also prime.
|
H A D | openssl-genrsa.pod.in | 75 If I<num> is greater than 2, then the generated key is called a 'multi-prime' 107 prime numbers. When generating a private key various symbols will be output to 110 round of the Miller-Rabin primality test, B<*> means the current prime starts 112 has passed all the prime tests (the actual number depends on the key size).
|
H A D | openssl-cmds.pod.in | 39 prime, 120 L<openssl-prime(1)>,
|
H A D | openssl-dhparam.pod.in | 34 a key using a named safe prime group without generating intermediate 68 that (p-1)/2 is also prime) will be used for DH parameter generation.
|
H A D | openssl-genpkey.pod.in | 227 The number of bits in the generated prime. If not specified 2048 is used. 307 The number of bits in the prime parameter I<p>. The default is 2048. 313 The number of bits in the sub prime parameter I<q>. The default is 224. 332 Use a safe prime generator with the option B<safeprime_generator> 437 Generate 4096 bit DH Key using safe prime group ffdhe4096: 449 Output DH parameters for safe prime group ffdhe2048:
|
H A D | build.info | 39 DEPEND[openssl-prime.pod]=../perlvars.pm
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-DH.pod | 12 approved named safe-prime groups, and a class of "FIPS186-type" domain 15 approved safe-prime groups. 110 A safe prime generator. See the "safeprime-generator" type above. 117 Sets the size (in bits) of the prime 'p'. 142 B<DH> parameters with named safe prime group instead. 152 test the I<p> value for being a prime (and a safe prime if I<q> is missing) 154 the prime tests. 161 prime group, otherwise it is the same as L<EVP_PKEY_public_check(3)>. 289 =item RFC 7919 (TLS ffdhe named safe prime groups) 291 =item RFC 3526 (IKE modp named safe prime groups) [all …]
|
H A D | EVP_PKEY-FFC.pod | 57 A DSA or Diffie-Hellman prime "p" value. 71 A DSA or Diffie-Hellman prime "q" value. 151 Sets the size (in bits) of the prime 'p'. 155 Sets the size (in bits) of the prime 'q'.
|
H A D | EVP_PKEY-RSA.pod | 12 the public exponent I<e>, the private exponent I<d>, and a collection of prime 59 RSA prime factors. The factors are known as "p", "q" and "r_i" in RFC8017. 60 Up to eight additional "r_i" prime factors are supported. 169 These 4 fields are normally randomly generated. The prime factors "p1", "p2",
|
H A D | EVP_PKEY-EC.pod | 33 The value should be either "prime-field" or "characteristic-two-field", 34 which correspond to prime field Fp and binary field F2^m. 38 For a curve over Fp I<p> is the prime for the field. For a curve over F2^m I<p>
|
/openssl/doc/man3/ |
H A D | BN_generate_prime.pod | 63 BN_generate_prime_ex2() generates a pseudo-random prime number of 67 The returned number is probably prime with a negligible error. 69 It's 2^-287 for a 512 bit prime, 2^-435 for a 1024 bit prime, 70 2^-648 for a 2048 bit prime, and lower than 2^-882 for primes larger 73 If B<add> is B<NULL> the returned prime number will have exact bit 85 potential prime number. 94 When a prime has been found, B<BN_GENCB_call(cb, 2, i)> is called. 103 The prime may have to fulfill additional requirements for use in 110 If B<safe> is true, it will be a safe prime (i.e. a prime p so 127 and BN_is_prime_fasttest() test if the number B<p> is prime. [all …]
|
H A D | DH_generate_parameters.pod | 49 B<prime_len> is the length in bits of the safe prime to be generated. 54 called as described in L<BN_generate_prime(3)> while a random prime 55 number is generated, and when a prime has been found, B<BN_GENCB_call(cb, 3, 0)> 75 The parameter B<p> has been determined to not being an odd prime. 77 prime. 83 suitable, unless B<p> is known to be a strong prime. 103 The parameter B<p> is not prime. 107 The parameter B<p> is not a safe prime and no B<q> value is present. 119 The parameter B<q> is not prime.
|
H A D | RSA_generate_key.pod | 37 RSA_generate_key_ex() generates a 2-prime RSA key pair and stores it in the 40 RSA_generate_multi_prime_key() generates a multi-prime RSA key pair and stores 71 While a random prime number is generated, it is called as 76 When the n-th randomly generated prime is rejected as not 81 When a random p has been found with p-1 relatively prime to I<e>, 86 The process is then repeated for prime q and other primes (if any) 87 with I<BN_GENCB_call(cb, 3, i)> where I<i> indicates the i-th prime.
|
H A D | RSA_get0_key.pod | 68 For multi-prime RSA (defined in RFC 8017), there are also one or more 70 and B<t>. B<r> is the additional prime besides B<p> and B<q>. B<d> and 99 For multi-prime RSA, RSA_get0_multi_prime_factors() and RSA_get0_multi_prime_params() 102 sets a collect of multi-prime 'triplet' members (prime, exponent and coefficient) 138 RSA_set0_multi_prime_params() always clears the original multi-prime 158 multi-prime RSA. 160 RSA_get_version() returns B<RSA_ASN1_VERSION_MULTI> for multi-prime RSA and 161 B<RSA_ASN1_VERSION_DEFAULT> for normal two-prime RSA, as defined in RFC 8017.
|
H A D | DH_size.pod | 5 DH_size, DH_bits, DH_security_bits - get Diffie-Hellman prime size and 32 DH_size() returns the Diffie-Hellman prime size in bytes. It can be used 44 DH_size() returns the prime size of Diffie-Hellman in bytes, or -1 if
|
H A D | DSA_generate_parameters.pod | 37 B<bits> is the length of the prime p to be generated. 71 (once for each witness that confirms that the candidate may be prime); 76 When a prime q has been found, B<BN_GENCB_call(cb, 2, 0)> and 90 (once for each witness that confirms that the candidate may be prime).
|
H A D | DH_get0_pqg.pod | 63 optionally I<q> are associated with known safe prime groups. If it is a safe 64 prime group then the value of I<q> will be set to q = (p - 1) / 2 if I<q> is 102 length of the secret exponent (private key) in bits. For safe prime groups the optional length para…
|
H A D | EVP_PKEY_get_field_type.pod | 20 for prime curves or B<NID_X9_62_characteristic_two_field> for binary curves;
|
H A D | DH_new_by_nid.pod | 28 any named safe prime group. It returns the NID corresponding to the matching
|
H A D | DH_get_1024_160.pod | 64 a BIGNUM for the specific NIST prime curve (e.g., P-256).
|
H A D | EC_GROUP_new.pod | 80 The first form is those defined over the prime field Fp. The elements of Fp are 81 the integers 0 to p-1, where p is a prime number. This gives us a revised 129 over Fp I<p> is the prime for the field. For a curve over F2^m I<p> represents
|
H A D | BN_add.pod | 94 prime, otherwise an error or an incorrect "result" will be returned. 125 not a prime), or NULL.
|
/openssl/crypto/rsa/ |
H A D | rsa_gen.c | 261 BIGNUM *r0 = NULL, *r1 = NULL, *r2 = NULL, *tmp, *tmp2, *prime; in rsa_multiprime_keygen() local 370 prime = rsa->p; in rsa_multiprime_keygen() 372 prime = rsa->q; in rsa_multiprime_keygen() 375 prime = pinfo->r; in rsa_multiprime_keygen() 377 BN_set_flags(prime, BN_FLG_CONSTTIME); in rsa_multiprime_keygen() 381 if (!BN_generate_prime_ex2(prime, bitsr[i] + adj, 0, NULL, NULL, in rsa_multiprime_keygen() 402 if (!BN_cmp(prime, prev_prime)) { in rsa_multiprime_keygen() 407 if (!BN_sub(r2, prime, BN_value_one())) in rsa_multiprime_keygen() 436 if (!BN_mul(r1, rsa->n, prime, ctx)) in rsa_multiprime_keygen() 442 tmp = BN_dup(prime); in rsa_multiprime_keygen() [all …]
|
/openssl/doc/internal/man3/ |
H A D | ossl_rsa_get0_all_params.pod | 40 if the B<RSA> object is a multi-prime RSA key. 45 if the B<RSA> object is a multi-prime RSA key. 50 if the B<RSA> object is a multi-prime RSA key.
|
/openssl/crypto/ec/ |
H A D | ec_asn1.c | 55 ASN1_INTEGER *prime; member 131 ADB_ENTRY(NID_X9_62_prime_field, ASN1_SIMPLE(X9_62_FIELDID, p.prime, ASN1_INTEGER)), 218 field->p.prime = BN_to_ASN1_INTEGER(tmp, NULL); in ec_asn1_group2fieldid() 219 if (field->p.prime == NULL) { in ec_asn1_group2fieldid() 653 if (params->fieldID->p.prime == NULL) { in EC_GROUP_new_from_ecparameters() 657 p = ASN1_INTEGER_to_BN(params->fieldID->p.prime, NULL); in EC_GROUP_new_from_ecparameters()
|