Searched refs:factor (Results 1 – 12 of 12) sorted by relevance
/openssl/crypto/rsa/ |
H A D | rsa_ossl.c | 834 BIGNUM *factor = BN_new(); in rsa_ossl_mod_exp() local 836 if (factor == NULL) in rsa_ossl_mod_exp() 843 if (!(BN_with_flags(factor, rsa->p, BN_FLG_CONSTTIME), in rsa_ossl_mod_exp() 845 factor, ctx)) in rsa_ossl_mod_exp() 846 || !(BN_with_flags(factor, rsa->q, BN_FLG_CONSTTIME), in rsa_ossl_mod_exp() 848 factor, ctx))) { in rsa_ossl_mod_exp() 849 BN_free(factor); in rsa_ossl_mod_exp() 855 BN_with_flags(factor, pinfo->r, BN_FLG_CONSTTIME); in rsa_ossl_mod_exp() 856 if (!BN_MONT_CTX_set_locked(&pinfo->m, rsa->lock, factor, ctx)) { in rsa_ossl_mod_exp() 857 BN_free(factor); in rsa_ossl_mod_exp() [all …]
|
H A D | rsa_gen.c | 89 BIGNUM *factor = NULL, *newpp = NULL, *newpd = NULL; in DEFINE_STACK_OF() local 152 factor = sk_BIGNUM_value(factors, i); in DEFINE_STACK_OF() 154 if (!BN_mul(r1, r1, factor, ctx)) in DEFINE_STACK_OF() 174 factor = sk_BIGNUM_value(factors, i); in DEFINE_STACK_OF() 179 if (!BN_sub(dval, factor, BN_value_one())) in DEFINE_STACK_OF()
|
/openssl/doc/man3/ |
H A D | RSA_blinding_on.pod | 28 random blinding factor. B<ctx> is B<NULL> or a preallocated and 32 the blinding factor.
|
H A D | BN_BLINDING_new.pod | 53 BN_BLINDING_convert_ex() multiplies B<n> with the blinding factor B<A>. 54 If B<r> is not NULL a copy the inverse blinding factor B<Ai> will be 57 inverse blinding factor B<Ai>. If B<r> is not NULL it will be used as
|
H A D | OPENSSL_LH_COMPFUNC.pod | 226 factor used to determine when the hash table is contracted. The factor is the 227 load factor at or below which hash table contraction will occur, multiplied by 228 B<LH_LOAD_MULT>, where the load factor is the number of items divided by the
|
H A D | RSA_get0_key.pod | 65 the first and second factor of B<n> and B<dmp1>, B<dmq1> and B<iqmp>
|
H A D | OSSL_trace_enabled.pod | 246 Because most often the limiting factor for the application's speed is the time
|
/openssl/doc/man7/ |
H A D | provider-kdf.pod | 228 Sets the scrypt work factor parameter N in the associated KDF ctx. 232 Sets the scrypt work factor parameter r in the associated KDF ctx. 236 Sets the scrypt work factor parameter p in the associated KDF ctx. 240 Sets the scrypt work factor parameter maxmem in the associated KDF ctx.
|
H A D | EVP_KDF-SCRYPT.pod | 20 has to be a positive power of two, is the general work factor and scales CPU 22 used hash function and p is the parallelization factor. Both r and p need to be
|
/openssl/ssl/quic/ |
H A D | quic_ackm.c | 868 uint64_t factor in ackm_get_pto_time_and_space() local 874 factor)); in ackm_get_pto_time_and_space()
|
/openssl/doc/designs/quic-design/ |
H A D | quic-fc.md | 69 Retirement is an important factor in our RX flow control design, as we want
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_kas.txt | 23 Title = ECDH KATs (from NIST SP800-56A co-factor ECDH KATs
|
Completed in 50 milliseconds