/openssl/doc/man3/ |
H A D | RSA_size.pod | 5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits 31 RSA_size() returns the RSA modulus size in bytes. It can be used to 42 RSA_size() returns the size of modulus in bytes.
|
H A D | EVP_PKEY_is_a.pod | 82 BIGNUM *modulus = NULL; 83 if (EVP_PKEY_get_bn_param(pkey, "n", &modulus)) 84 /* do whatever with the modulus */ 85 BN_free(modulus);
|
H A D | BN_mod_mul_montgomery.pod | 33 using the same modulus. 37 BN_MONT_CTX_set() sets up the I<mont> structure from the modulus I<m> 52 Note that I<a> must be nonnegative and smaller than the modulus.
|
H A D | RSA_generate_key.pod | 31 EVP_RSA_gen() generates a new RSA key pair with modulus size I<bits>. 46 The modulus size will be of length I<bits>, the number of primes to form the 47 modulus will be I<primes>, and the public exponent will be I<e>. Key sizes 52 I<primes> depends on modulus bit length:
|
H A D | BN_add.pod | 83 remainder respective to modulus I<m> (C<r=(a*b) mod m>). I<r> may be 85 repeated computations using the same modulus, see 93 C<in^2 = a (mod p)>. The modulus I<p> must be a 120 to use the same B<BIGNUM> object for the modulus as for the output.
|
H A D | BN_security_bits.pod | 23 to be the key size (modulus).
|
H A D | X509_check_private_key.pod | 37 They merely compare the public materials (e.g., exponent and modulus of an RSA
|
H A D | DH_generate_parameters.pod | 87 The modulus is too small. 91 The modulus is too large.
|
H A D | BN_mod_mul_reciprocal.pod | 28 repeatedly with the same modulus. It computes B<r>=(B<a>*B<b>)%B<m>
|
H A D | BN_mod_exp_mont.pod | 43 fixed and equal modulus sizes I<m1> and I<m2> it uses optimizations that allow
|
H A D | RSA_check_key.pod | 29 It does not work on RSA public keys that have only the modulus
|
H A D | BN_BLINDING_new.pod | 85 using the exponent B<e> and the modulus B<m>. B<bn_mod_exp> and
|
H A D | OSSL_PARAM_BLD.pod | 151 BIGNUM *n; /* modulus */
|
/openssl/apps/ |
H A D | dsa.c | 87 int modulus = 0, pubin = 0, pubout = 0, ret = 1; in dsa_main() local 146 modulus = 1; in dsa_main() 207 if (modulus) { in dsa_main()
|
H A D | rsa.c | 133 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; in rsa_main() local 202 modulus = 1; in rsa_main() 277 if (modulus) { in rsa_main()
|
H A D | x509.c | 289 int x509toreq = 0, modulus = 0, print_pubkey = 0, pprint = 0; in x509_main() local 498 modulus = ++num; in x509_main() 890 if ((print_pubkey != 0 || modulus != 0) && pkey == NULL) { in x509_main() 1008 } else if (i == modulus) { in x509_main()
|
H A D | req.c | 273 int modulus = 0, multirdn = 1, verify = 0, noout = 0, text = 0; in req_main() local 385 modulus = 1; in req_main() 952 if (noout && !text && !modulus && !subject && !pubkey) { in req_main() 995 if (modulus) { in req_main()
|
/openssl/test/recipes/30-test_evp_pkey_provided/ |
H A D | RSA.priv.txt | 2 modulus: 3161751493 (0xbc747fc5)
|
/openssl/doc/man1/ |
H A D | openssl-rsa.pod.in | 36 [B<-modulus>] 114 =item B<-modulus> 116 This option prints out the value of the modulus of the key.
|
H A D | openssl-dsa.pod.in | 36 [B<-modulus>] 112 =item B<-modulus>
|
H A D | openssl-x509.pod.in | 50 [B<-modulus>] 336 =item B<-modulus> 338 This option prints out the value of the modulus of the public key
|
/openssl/include/crypto/ |
H A D | bn.h | 139 int ossl_bn_mont_ctx_set(BN_MONT_CTX *ctx, const BIGNUM *modulus, int ri,
|
/openssl/crypto/bn/ |
H A D | bn_mont.c | 469 int ossl_bn_mont_ctx_set(BN_MONT_CTX *ctx, const BIGNUM *modulus, int ri, const unsigned char *rr, in ossl_bn_mont_ctx_set() argument 472 if (BN_copy(&ctx->N, modulus) == NULL) in ossl_bn_mont_ctx_set()
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-RSA.pod | 11 That implementation supports the basic RSA keys, containing the modulus I<n>, 26 The RSA modulus "n" value.
|
/openssl/crypto/err/ |
H A D | openssl.txt | 182 BN_R_CALLED_WITH_EVEN_MODULUS:102:called with even modulus 546 DH_R_MODULUS_TOO_LARGE:103:modulus too large 547 DH_R_MODULUS_TOO_SMALL:126:modulus too small 565 DSA_R_MODULUS_TOO_LARGE:103:modulus too large 1231 RSA_R_DATA_TOO_LARGE_FOR_MODULUS:132:data too large for modulus 1252 RSA_R_INVALID_MODULUS:174:invalid modulus 1270 RSA_R_MODULUS_TOO_LARGE:105:modulus too large
|