/openssl/crypto/rsa/ |
H A D | rsa_gen.c | 127 p = sk_BIGNUM_value(factors, 0); in DEFINE_STACK_OF() 128 q = sk_BIGNUM_value(factors, 1); in DEFINE_STACK_OF() 174 factor = sk_BIGNUM_value(factors, i); in DEFINE_STACK_OF() 266 STACK_OF(BIGNUM) *factors = NULL; in rsa_multiprime_keygen() 293 factors = sk_BIGNUM_new_null(); in rsa_multiprime_keygen() 294 if (factors == NULL) in rsa_multiprime_keygen() 445 if (!sk_BIGNUM_insert(factors, tmp, sk_BIGNUM_num(factors))) in rsa_multiprime_keygen() 498 if (factors == NULL) in rsa_multiprime_keygen() 515 if (!sk_BIGNUM_insert(factors, tmp, sk_BIGNUM_num(factors))) in rsa_multiprime_keygen() 524 if (!sk_BIGNUM_insert(factors, sk_BIGNUM_delete(factors, 0), 1)) in rsa_multiprime_keygen() [all …]
|
H A D | rsa_backend.c | 139 if (sk_BIGNUM_num(factors) < 2) { in ossl_rsa_fromdata() 148 if (sk_BIGNUM_num(factors) > 2 in ossl_rsa_fromdata() 155 if (sk_BIGNUM_num(factors) == 2) { in ossl_rsa_fromdata() 166 sk_BIGNUM_pop(factors); in ossl_rsa_fromdata() 167 sk_BIGNUM_pop(factors); in ossl_rsa_fromdata() 216 if (sk_BIGNUM_num(factors) != 0 in ossl_rsa_fromdata() 221 if (sk_BIGNUM_num(factors) != 0 in ossl_rsa_fromdata() 240 sk_BIGNUM_free(factors); in ossl_rsa_fromdata() 250 sk_BIGNUM_pop_free(factors, BN_clear_free); in ossl_rsa_fromdata() 272 ossl_rsa_get0_all_params(rsa, factors, exps, coeffs); in DEFINE_SPECIAL_STACK_OF_CONST() [all …]
|
H A D | rsa_lib.c | 914 STACK_OF(BIGNUM_const) *factors = sk_BIGNUM_const_new_null(); in ossl_rsa_check_factors() 918 if (factors == NULL || exps == NULL || coeffs == NULL) in ossl_rsa_check_factors() 925 ossl_rsa_get0_all_params(r, factors, exps, coeffs); in ossl_rsa_check_factors() 937 for (i = 0; i < sk_BIGNUM_const_num(factors); i++) { in ossl_rsa_check_factors() 938 bits = safe_BN_num_bits(sk_BIGNUM_const_value(factors, i)); in ossl_rsa_check_factors() 952 sk_BIGNUM_const_free(factors); in ossl_rsa_check_factors()
|
H A D | rsa_local.h | 155 STACK_OF(BIGNUM) *factors, STACK_OF(BIGNUM) *exps,
|
/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2text.c | 638 STACK_OF(BIGNUM_const) *factors = NULL; in rsa_to_text() 650 factors = sk_BIGNUM_const_new_null(); in rsa_to_text() 654 if (factors == NULL || exps == NULL || coeffs == NULL) { in rsa_to_text() 670 ossl_rsa_get0_all_params((RSA *)rsa, factors, exps, coeffs); in rsa_to_text() 671 primes = sk_BIGNUM_const_num(factors); in rsa_to_text() 693 sk_BIGNUM_const_value(factors, 0))) in rsa_to_text() 696 sk_BIGNUM_const_value(factors, 1))) in rsa_to_text() 707 for (i = 2; i < sk_BIGNUM_const_num(factors); i++) { in rsa_to_text() 711 sk_BIGNUM_const_value(factors, i))) in rsa_to_text() 777 sk_BIGNUM_const_free(factors); in rsa_to_text()
|
/openssl/util/perl/OpenSSL/ |
H A D | config.pm | 345 my @factors = (100, 1); 346 while (@numbers && @factors) { 347 $CCVER += shift(@numbers) * shift(@factors) 394 my @factors = (100, 1); 396 while (@numbers && @factors) { 397 $v += shift(@numbers) * shift(@factors)
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_set_scrypt_N.pod | 38 EVP_PKEY_CTX_set_scrypt_p() configure the work factors N, r and p. 42 If RAM is exceeded because the load factors are chosen too high, the 51 The work factors B<N>, B<r> and B<p> as well as B<maxmem_bytes> can be
|
H A D | EVP_KDF.pod | 251 memory that depends on the load factors provided as input. 255 If this memory usage limit is exceeded because the load factors are chosen
|
H A D | SSL_CTX_set_tlsext_servername_callback.pod | 70 The behaviour of SSL_get_servername() depends on a number of different factors.
|
H A D | OSSL_PARAM_BLD.pod | 154 BIGNUM *p, *q; /* first two prime factors */
|
H A D | SSL_CTX_set_split_send_fragment.pod | 108 value depends on a number of factors but it will be at least
|
H A D | RSA_get0_key.pod | 63 B<dmq1> and B<iqmp> are the factors for the second representation of a
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-RSA.pod | 13 factors, exponents and coefficient for CRT calculations, of which the first 59 RSA prime factors. The factors are known as "p", "q" and "r_i" in RFC8017. 60 Up to eight additional "r_i" prime factors are supported. 169 These 4 fields are normally randomly generated. The prime factors "p1", "p2",
|
H A D | EVP_KDF-SCRYPT.pod | 19 scrypt provides three work factors that can be customized: N, r and p. N, which 60 These parameters configure the scrypt work factors N, r, maxmem and p.
|
/openssl/crypto/evp/ |
H A D | ctrl_params_translate.c | 1903 const BIGNUM *factors[10]; in get_rsa_payload_factor() local 1906 && RSA_get0_multi_prime_factors(r, factors)) in get_rsa_payload_factor() 1907 bn = factors[factornum - 2]; in get_rsa_payload_factor()
|
/openssl/crypto/bn/ |
H A D | README.pod | 180 factors have the same size: bn_mul_comba8() is used if they are 8
|
/openssl/doc/designs/quic-design/ |
H A D | tx-packetiser.md | 680 Two factors impact the size of packets that can be sent:
|
/openssl/ |
H A D | CHANGES.md | 3051 * Revised BN_generate_prime_ex to not avoid factors 2..17863 in p-1 3680 * Revised BN_generate_prime_ex to not avoid factors 3..17863 in p-1 13486 having all other threads use local one-time blinding factors 15475 Previously, it could be negative if one of the factors was negative; 15744 having all other threads use local one-time blinding factors
|