Searched refs:modulus (Results 1 – 25 of 30) sorted by relevance
12
/openssl-master/doc/man3/ |
A D | RSA_size.pod | 5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits 31 RSA_size() returns the RSA modulus size in bytes. It can be used to 42 RSA_size() returns the size of modulus in bytes.
|
A D | EVP_PKEY_is_a.pod | 82 BIGNUM *modulus = NULL; 83 if (EVP_PKEY_get_bn_param(pkey, "n", &modulus)) 84 /* do whatever with the modulus */ 85 BN_free(modulus);
|
A D | BN_mod_mul_montgomery.pod | 33 using the same modulus. 37 BN_MONT_CTX_set() sets up the I<mont> structure from the modulus I<m> 52 Note that I<a> must be nonnegative and smaller than the modulus.
|
A D | RSA_generate_key.pod | 29 EVP_RSA_gen() generates a new RSA key pair with modulus size I<bits>. 44 The modulus size will be of length I<bits>, the number of primes to form the 45 modulus will be I<primes>, and the public exponent will be I<e>. Key sizes 50 I<primes> depends on modulus bit length:
|
A D | DH_generate_parameters.pod | 87 The modulus is too small. 91 The modulus is too large.
|
A D | BN_security_bits.pod | 23 to be the key size (modulus).
|
A D | X509_check_private_key.pod | 37 and modulus of an RSA key) and/or key parameters (e.g. EC params of an EC key)
|
A D | BN_add.pod | 81 remainder respective to modulus I<m> (C<r=(a*b) mod m>). I<r> may be 83 repeated computations using the same modulus, see
|
A D | BN_mod_mul_reciprocal.pod | 28 repeatedly with the same modulus. It computes B<r>=(B<a>*B<b>)%B<m>
|
A D | BN_mod_exp_mont.pod | 43 fixed and equal modulus sizes I<m1> and I<m2> it uses optimizations that allow
|
A D | RSA_check_key.pod | 29 It does not work on RSA public keys that have only the modulus
|
A D | BN_BLINDING_new.pod | 85 using the exponent B<e> and the modulus B<m>. B<bn_mod_exp> and
|
A D | ASN1_generate_nconf.pod | 251 # Actual public key: modulus and exponent
|
A D | RSA_get0_key.pod | 61 the modulus common to both public and private key, B<e> is the public
|
/openssl-master/apps/ |
A D | dsa.c | 87 int modulus = 0, pubin = 0, pubout = 0, ret = 1; in dsa_main() local 145 modulus = 1; in dsa_main() 211 if (modulus) { in dsa_main()
|
A D | rsa.c | 133 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; in rsa_main() local 201 modulus = 1; in rsa_main() 279 if (modulus) { in rsa_main()
|
A D | x509.c | 280 int x509toreq = 0, modulus = 0, print_pubkey = 0, pprint = 0; in x509_main() local 479 modulus = ++num; in x509_main() 847 if ((print_pubkey != 0 || modulus != 0) && pkey == NULL) { in x509_main() 965 } else if (i == modulus) { in x509_main()
|
A D | req.c | 261 int modulus = 0, multirdn = 1, verify = 0, noout = 0, text = 0; in req_main() local 374 modulus = 1; in req_main() 938 if (noout && !text && !modulus && !subject && !pubkey) { in req_main() 981 if (modulus) { in req_main()
|
/openssl-master/test/recipes/30-test_evp_pkey_provided/ |
A D | RSA.priv.txt | 2 modulus: 3161751493 (0xbc747fc5)
|
/openssl-master/doc/man1/ |
A D | openssl-rsa.pod.in | 36 [B<-modulus>] 114 =item B<-modulus> 116 This option prints out the value of the modulus of the key.
|
A D | openssl-dsa.pod.in | 36 [B<-modulus>] 112 =item B<-modulus>
|
A D | openssl-x509.pod.in | 50 [B<-modulus>] 327 =item B<-modulus> 329 This option prints out the value of the modulus of the public key
|
A D | openssl-req.pod.in | 22 [B<-modulus>] 138 =item B<-modulus> 140 Prints out the value of the modulus of the public key contained in the request.
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 173 BN_R_CALLED_WITH_EVEN_MODULUS:102:called with even modulus 487 DH_R_MODULUS_TOO_LARGE:103:modulus too large 488 DH_R_MODULUS_TOO_SMALL:126:modulus too small 505 DSA_R_MODULUS_TOO_LARGE:103:modulus too large 1139 RSA_R_DATA_TOO_LARGE_FOR_MODULUS:132:data too large for modulus 1160 RSA_R_INVALID_MODULUS:174:invalid modulus 1178 RSA_R_MODULUS_TOO_LARGE:105:modulus too large
|
/openssl-master/doc/man7/ |
A D | EVP_PKEY-RSA.pod | 11 That implementation supports the basic RSA keys, containing the modulus I<n>,
|
Completed in 31 milliseconds
12