Home
last modified time | relevance | path

Searched refs:modulus (Results 1 – 25 of 30) sorted by relevance

12

/openssl-master/doc/man3/
A DRSA_size.pod5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits
31 RSA_size() returns the RSA modulus size in bytes. It can be used to
42 RSA_size() returns the size of modulus in bytes.
A DEVP_PKEY_is_a.pod82 BIGNUM *modulus = NULL;
83 if (EVP_PKEY_get_bn_param(pkey, "n", &modulus))
84 /* do whatever with the modulus */
85 BN_free(modulus);
A DBN_mod_mul_montgomery.pod33 using the same modulus.
37 BN_MONT_CTX_set() sets up the I<mont> structure from the modulus I<m>
52 Note that I<a> must be nonnegative and smaller than the modulus.
A DRSA_generate_key.pod29 EVP_RSA_gen() generates a new RSA key pair with modulus size I<bits>.
44 The modulus size will be of length I<bits>, the number of primes to form the
45 modulus will be I<primes>, and the public exponent will be I<e>. Key sizes
50 I<primes> depends on modulus bit length:
A DDH_generate_parameters.pod87 The modulus is too small.
91 The modulus is too large.
A DBN_security_bits.pod23 to be the key size (modulus).
A DX509_check_private_key.pod37 and modulus of an RSA key) and/or key parameters (e.g. EC params of an EC key)
A DBN_add.pod81 remainder respective to modulus I<m> (C<r=(a*b) mod m>). I<r> may be
83 repeated computations using the same modulus, see
A DBN_mod_mul_reciprocal.pod28 repeatedly with the same modulus. It computes B<r>=(B<a>*B<b>)%B<m>
A DBN_mod_exp_mont.pod43 fixed and equal modulus sizes I<m1> and I<m2> it uses optimizations that allow
A DRSA_check_key.pod29 It does not work on RSA public keys that have only the modulus
A DBN_BLINDING_new.pod85 using the exponent B<e> and the modulus B<m>. B<bn_mod_exp> and
A DASN1_generate_nconf.pod251 # Actual public key: modulus and exponent
A DRSA_get0_key.pod61 the modulus common to both public and private key, B<e> is the public
/openssl-master/apps/
A Ddsa.c87 int modulus = 0, pubin = 0, pubout = 0, ret = 1; in dsa_main() local
145 modulus = 1; in dsa_main()
211 if (modulus) { in dsa_main()
A Drsa.c133 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; in rsa_main() local
201 modulus = 1; in rsa_main()
279 if (modulus) { in rsa_main()
A Dx509.c280 int x509toreq = 0, modulus = 0, print_pubkey = 0, pprint = 0; in x509_main() local
479 modulus = ++num; in x509_main()
847 if ((print_pubkey != 0 || modulus != 0) && pkey == NULL) { in x509_main()
965 } else if (i == modulus) { in x509_main()
A Dreq.c261 int modulus = 0, multirdn = 1, verify = 0, noout = 0, text = 0; in req_main() local
374 modulus = 1; in req_main()
938 if (noout && !text && !modulus && !subject && !pubkey) { in req_main()
981 if (modulus) { in req_main()
/openssl-master/test/recipes/30-test_evp_pkey_provided/
A DRSA.priv.txt2 modulus: 3161751493 (0xbc747fc5)
/openssl-master/doc/man1/
A Dopenssl-rsa.pod.in36 [B<-modulus>]
114 =item B<-modulus>
116 This option prints out the value of the modulus of the key.
A Dopenssl-dsa.pod.in36 [B<-modulus>]
112 =item B<-modulus>
A Dopenssl-x509.pod.in50 [B<-modulus>]
327 =item B<-modulus>
329 This option prints out the value of the modulus of the public key
A Dopenssl-req.pod.in22 [B<-modulus>]
138 =item B<-modulus>
140 Prints out the value of the modulus of the public key contained in the request.
/openssl-master/crypto/err/
A Dopenssl.txt173 BN_R_CALLED_WITH_EVEN_MODULUS:102:called with even modulus
487 DH_R_MODULUS_TOO_LARGE:103:modulus too large
488 DH_R_MODULUS_TOO_SMALL:126:modulus too small
505 DSA_R_MODULUS_TOO_LARGE:103:modulus too large
1139 RSA_R_DATA_TOO_LARGE_FOR_MODULUS:132:data too large for modulus
1160 RSA_R_INVALID_MODULUS:174:invalid modulus
1178 RSA_R_MODULUS_TOO_LARGE:105:modulus too large
/openssl-master/doc/man7/
A DEVP_PKEY-RSA.pod11 That implementation supports the basic RSA keys, containing the modulus I<n>,

Completed in 31 milliseconds

12