Home
last modified time | relevance | path

Searched refs:prime (Results 1 – 25 of 47) sorted by relevance

12

/openssl/doc/man1/
H A Dopenssl-prime.pod.in6 openssl-prime - compute prime numbers
10 B<openssl prime>
22 This command checks if the specified numbers are prime.
42 Generate a prime number.
46 Generate a prime with I<num> bits.
50 When used with B<-generate>, generates a "safe" prime. If the number
51 generated is I<n>, then check that C<(I<n>-1)/2> is also prime.
H A Dopenssl-genrsa.pod.in78 If I<num> is greater than 2, then the generated key is called a 'multi-prime'
110 prime numbers. When generating a private key various symbols will be output to
113 round of the Miller-Rabin primality test, B<*> means the current prime starts
115 has passed all the prime tests (the actual number depends on the key size).
H A Dopenssl-cmds.pod.in39 prime,
120 L<openssl-prime(1)>,
H A Dopenssl-dhparam.pod.in34 a key using a named safe prime group without generating intermediate
66 that (p-1)/2 is also prime) will be used for DH parameter generation.
H A Dopenssl-genpkey.pod.in214 The number of bits in the generated prime. If not specified 2048 is used.
294 The number of bits in the prime parameter I<p>. The default is 2048.
300 The number of bits in the sub prime parameter I<q>. The default is 224.
319 Use a safe prime generator with the option B<safeprime_generator>
424 Generate 4096 bit DH Key using safe prime group ffdhe4096:
436 Output DH parameters for safe prime group ffdhe2048:
/openssl/doc/man3/
H A DBN_generate_prime.pod63 BN_generate_prime_ex2() generates a pseudo-random prime number of
67 The returned number is probably prime with a negligible error.
69 It's 2^-287 for a 512 bit prime, 2^-435 for a 1024 bit prime,
70 2^-648 for a 2048 bit prime, and lower than 2^-882 for primes larger
73 If B<add> is B<NULL> the returned prime number will have exact bit
85 potential prime number.
94 When a prime has been found, B<BN_GENCB_call(cb, 2, i)> is called.
103 The prime may have to fulfill additional requirements for use in
110 If B<safe> is true, it will be a safe prime (i.e. a prime p so
127 and BN_is_prime_fasttest() test if the number B<p> is prime.
[all …]
H A DDH_generate_parameters.pod49 B<prime_len> is the length in bits of the safe prime to be generated.
54 called as described in L<BN_generate_prime(3)> while a random prime
55 number is generated, and when a prime has been found, B<BN_GENCB_call(cb, 3, 0)>
75 The parameter B<p> has been determined to not being an odd prime.
77 prime.
83 suitable, unless B<p> is known to be a strong prime.
103 The parameter B<p> is not prime.
107 The parameter B<p> is not a safe prime and no B<q> value is present.
119 The parameter B<q> is not prime.
H A DRSA_generate_key.pod37 RSA_generate_key_ex() generates a 2-prime RSA key pair and stores it in the
40 RSA_generate_multi_prime_key() generates a multi-prime RSA key pair and stores
71 While a random prime number is generated, it is called as
76 When the n-th randomly generated prime is rejected as not
81 When a random p has been found with p-1 relatively prime to I<e>,
86 The process is then repeated for prime q and other primes (if any)
87 with I<BN_GENCB_call(cb, 3, i)> where I<i> indicates the i-th prime.
H A DRSA_get0_key.pod68 For multi-prime RSA (defined in RFC 8017), there are also one or more
70 and B<t>. B<r> is the additional prime besides B<p> and B<q>. B<d> and
99 For multi-prime RSA, RSA_get0_multi_prime_factors() and RSA_get0_multi_prime_params()
102 sets a collect of multi-prime 'triplet' members (prime, exponent and coefficient)
138 RSA_set0_multi_prime_params() always clears the original multi-prime
158 multi-prime RSA.
160 RSA_get_version() returns B<RSA_ASN1_VERSION_MULTI> for multi-prime RSA and
161 B<RSA_ASN1_VERSION_DEFAULT> for normal two-prime RSA, as defined in RFC 8017.
H A DDH_size.pod5 DH_size, DH_bits, DH_security_bits - get Diffie-Hellman prime size and
32 DH_size() returns the Diffie-Hellman prime size in bytes. It can be used
44 DH_size() returns the prime size of Diffie-Hellman in bytes, or -1 if
H A DDSA_generate_parameters.pod37 B<bits> is the length of the prime p to be generated.
71 (once for each witness that confirms that the candidate may be prime);
76 When a prime q has been found, B<BN_GENCB_call(cb, 2, 0)> and
90 (once for each witness that confirms that the candidate may be prime).
H A DEVP_PKEY_get_field_type.pod20 for prime curves or B<NID_X9_62_characteristic_two_field> for binary curves;
H A DDH_get0_pqg.pod63 optionally I<q> are associated with known safe prime groups. If it is a safe
64 prime group then the value of I<q> will be set to q = (p - 1) / 2 if I<q> is
102 length of the secret exponent (private key) in bits. For safe prime groups the optional length para…
H A DDH_new_by_nid.pod28 any named safe prime group. It returns the NID corresponding to the matching
H A DEC_GROUP_new.pod77 The first form is those defined over the prime field Fp. The elements of Fp are
78 the integers 0 to p-1, where p is a prime number. This gives us a revised
116 over Fp I<p> is the prime for the field. For a curve over F2^m I<p> represents
H A DDH_get_1024_160.pod64 a BIGNUM for the specific NIST prime curve (e.g., P-256).
H A DBN_add.pod94 prime, otherwise an error or an incorrect "result" will be returned.
120 not a prime), or NULL.
/openssl/doc/man7/
H A DEVP_PKEY-DH.pod11 "safe" domain parameters that are associated with approved named safe-prime
14 applications that cannot be upgraded to use the approved safe-prime groups.
75 for the OpenSSL FIPS provider will instead choose a named safe prime group
109 A safe prime generator. See the "safeprime-generator" type above.
116 Sets the size (in bits) of the prime 'p'.
141 named safe prime group instead.
145 prime group OR that the FFC parameters conform to FIPS186-4 as defined in
176 A B<DH> key can be generated with a named safe prime group by calling:
287 =item RFC 7919 (TLS ffdhe named safe prime groups)
289 =item RFC 3526 (IKE modp named safe prime groups)
[all …]
H A DEVP_PKEY-FFC.pod57 A DSA or Diffie-Hellman prime "p" value.
71 A DSA or Diffie-Hellman prime "q" value.
151 Sets the size (in bits) of the prime 'p'.
155 Sets the size (in bits) of the prime 'q'.
H A DEVP_PKEY-RSA.pod12 the public exponent I<e>, the private exponent I<d>, and a collection of prime
56 RSA prime factors. The factors are known as "p", "q" and "r_i" in RFC8017.
57 Up to eight additional "r_i" prime factors are supported.
157 These 4 fields are normally randomly generated. The prime factors "p1", "p2",
H A DEVP_PKEY-EC.pod33 The value should be either "prime-field" or "characteristic-two-field",
34 which correspond to prime field Fp and binary field F2^m.
38 For a curve over Fp I<p> is the prime for the field. For a curve over F2^m I<p>
/openssl/crypto/rsa/
H A Drsa_gen.c78 BIGNUM *r0 = NULL, *r1 = NULL, *r2 = NULL, *tmp, *prime; in rsa_multiprime_keygen() local
180 prime = rsa->p; in rsa_multiprime_keygen()
182 prime = rsa->q; in rsa_multiprime_keygen()
185 prime = pinfo->r; in rsa_multiprime_keygen()
187 BN_set_flags(prime, BN_FLG_CONSTTIME); in rsa_multiprime_keygen()
191 if (!BN_generate_prime_ex2(prime, bitsr[i] + adj, 0, NULL, NULL, in rsa_multiprime_keygen()
212 if (!BN_cmp(prime, prev_prime)) { in rsa_multiprime_keygen()
217 if (!BN_sub(r2, prime, BN_value_one())) in rsa_multiprime_keygen()
246 if (!BN_mul(r1, rsa->n, prime, ctx)) in rsa_multiprime_keygen()
/openssl/doc/internal/man3/
H A Dossl_rsa_get0_all_params.pod40 if the B<RSA> object is a multi-prime RSA key.
45 if the B<RSA> object is a multi-prime RSA key.
50 if the B<RSA> object is a multi-prime RSA key.
/openssl/crypto/ec/
H A Dec_asn1.c55 ASN1_INTEGER *prime; member
131 ADB_ENTRY(NID_X9_62_prime_field, ASN1_SIMPLE(X9_62_FIELDID, p.prime, ASN1_INTEGER)),
218 field->p.prime = BN_to_ASN1_INTEGER(tmp, NULL); in ec_asn1_group2fieldid()
219 if (field->p.prime == NULL) { in ec_asn1_group2fieldid()
655 if (params->fieldID->p.prime == NULL) { in EC_GROUP_new_from_ecparameters()
659 p = ASN1_INTEGER_to_BN(params->fieldID->p.prime, NULL); in EC_GROUP_new_from_ecparameters()
/openssl/crypto/err/
H A Dopenssl.txt187 BN_R_NO_PRIME_CANDIDATE:121:no prime candidate
191 BN_R_P_IS_NOT_PRIME:112:p is not prime
495 DH_R_CHECK_P_NOT_PRIME:117:check p not prime
496 DH_R_CHECK_P_NOT_SAFE_PRIME:118:check p not safe prime
497 DH_R_CHECK_Q_NOT_PRIME:119:check q not prime
527 DSA_R_P_NOT_PRIME:115:p not prime
528 DSA_R_Q_NOT_PRIME:113:q not prime
598 EC_R_NOT_A_NIST_PRIME:135:not a NIST prime
1202 RSA_R_MP_R_NOT_PRIME:170:mp r not prime
1215 RSA_R_P_NOT_PRIME:128:p not prime
[all …]

Completed in 55 milliseconds

12