Home
last modified time | relevance | path

Searched refs:modulus (Results 1 – 25 of 36) sorted by relevance

12

/openssl/doc/man3/
H A DRSA_size.pod5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits
31 RSA_size() returns the RSA modulus size in bytes. It can be used to
42 RSA_size() returns the size of modulus in bytes.
H A DEVP_PKEY_is_a.pod82 BIGNUM *modulus = NULL;
83 if (EVP_PKEY_get_bn_param(pkey, "n", &modulus))
84 /* do whatever with the modulus */
85 BN_free(modulus);
H A DBN_mod_mul_montgomery.pod33 using the same modulus.
37 BN_MONT_CTX_set() sets up the I<mont> structure from the modulus I<m>
52 Note that I<a> must be nonnegative and smaller than the modulus.
H A DRSA_generate_key.pod31 EVP_RSA_gen() generates a new RSA key pair with modulus size I<bits>.
46 The modulus size will be of length I<bits>, the number of primes to form the
47 modulus will be I<primes>, and the public exponent will be I<e>. Key sizes
52 I<primes> depends on modulus bit length:
H A DBN_add.pod83 remainder respective to modulus I<m> (C<r=(a*b) mod m>). I<r> may be
85 repeated computations using the same modulus, see
93 C<in^2 = a (mod p)>. The modulus I<p> must be a
120 to use the same B<BIGNUM> object for the modulus as for the output.
H A DBN_security_bits.pod23 to be the key size (modulus).
H A DX509_check_private_key.pod37 They merely compare the public materials (e.g., exponent and modulus of an RSA
H A DDH_generate_parameters.pod87 The modulus is too small.
91 The modulus is too large.
H A DBN_mod_mul_reciprocal.pod28 repeatedly with the same modulus. It computes B<r>=(B<a>*B<b>)%B<m>
H A DBN_mod_exp_mont.pod43 fixed and equal modulus sizes I<m1> and I<m2> it uses optimizations that allow
H A DRSA_check_key.pod29 It does not work on RSA public keys that have only the modulus
H A DBN_BLINDING_new.pod85 using the exponent B<e> and the modulus B<m>. B<bn_mod_exp> and
H A DOSSL_PARAM_BLD.pod151 BIGNUM *n; /* modulus */
/openssl/apps/
H A Ddsa.c87 int modulus = 0, pubin = 0, pubout = 0, ret = 1; in dsa_main() local
146 modulus = 1; in dsa_main()
207 if (modulus) { in dsa_main()
H A Drsa.c133 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; in rsa_main() local
202 modulus = 1; in rsa_main()
277 if (modulus) { in rsa_main()
H A Dx509.c289 int x509toreq = 0, modulus = 0, print_pubkey = 0, pprint = 0; in x509_main() local
498 modulus = ++num; in x509_main()
890 if ((print_pubkey != 0 || modulus != 0) && pkey == NULL) { in x509_main()
1008 } else if (i == modulus) { in x509_main()
H A Dreq.c271 int modulus = 0, multirdn = 1, verify = 0, noout = 0, text = 0; in req_main() local
385 modulus = 1; in req_main()
945 if (noout && !text && !modulus && !subject && !pubkey) { in req_main()
988 if (modulus) { in req_main()
/openssl/test/recipes/30-test_evp_pkey_provided/
H A DRSA.priv.txt2 modulus: 3161751493 (0xbc747fc5)
/openssl/doc/man1/
H A Dopenssl-rsa.pod.in36 [B<-modulus>]
114 =item B<-modulus>
116 This option prints out the value of the modulus of the key.
H A Dopenssl-dsa.pod.in36 [B<-modulus>]
112 =item B<-modulus>
/openssl/include/crypto/
H A Dbn.h139 int ossl_bn_mont_ctx_set(BN_MONT_CTX *ctx, const BIGNUM *modulus, int ri,
/openssl/crypto/bn/
H A Dbn_mont.c469 int ossl_bn_mont_ctx_set(BN_MONT_CTX *ctx, const BIGNUM *modulus, int ri, const unsigned char *rr, in ossl_bn_mont_ctx_set() argument
472 if (BN_copy(&ctx->N, modulus) == NULL) in ossl_bn_mont_ctx_set()
/openssl/doc/man7/
H A DEVP_PKEY-RSA.pod11 That implementation supports the basic RSA keys, containing the modulus I<n>,
26 The RSA modulus "n" value.
/openssl/crypto/
H A Ds390xcap.c234 const unsigned char modulus[16] = { in probe_cex() local
247 me.n_modulus = (unsigned char *)modulus; in probe_cex()
/openssl/crypto/err/
H A Dopenssl.txt182 BN_R_CALLED_WITH_EVEN_MODULUS:102:called with even modulus
546 DH_R_MODULUS_TOO_LARGE:103:modulus too large
547 DH_R_MODULUS_TOO_SMALL:126:modulus too small
565 DSA_R_MODULUS_TOO_LARGE:103:modulus too large
1231 RSA_R_DATA_TOO_LARGE_FOR_MODULUS:132:data too large for modulus
1252 RSA_R_INVALID_MODULUS:174:invalid modulus
1270 RSA_R_MODULUS_TOO_LARGE:105:modulus too large

Completed in 50 milliseconds

12