diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2014-02-13 12:23:27 -0600 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2014-02-13 12:23:27 -0600 |
commit | 8e9c984d5d85db83c5fa45f6f2083d6b5e15326b (patch) | |
tree | 156648b0dfe072002795b290b03669a19cb7abaf /docs | |
parent | b393bdcbc637768ad774e8404f2efcbdd7f1e8c5 (diff) | |
download | cryptography-8e9c984d5d85db83c5fa45f6f2083d6b5e15326b.tar.gz cryptography-8e9c984d5d85db83c5fa45f6f2083d6b5e15326b.tar.bz2 cryptography-8e9c984d5d85db83c5fa45f6f2083d6b5e15326b.zip |
expose dmp1, dmq1, iqmp getters on RSAPrivateKey
Diffstat (limited to 'docs')
-rw-r--r-- | docs/hazmat/primitives/interfaces.rst | 24 |
1 files changed, 23 insertions, 1 deletions
diff --git a/docs/hazmat/primitives/interfaces.rst b/docs/hazmat/primitives/interfaces.rst index cbca5ed6..df17e59d 100644 --- a/docs/hazmat/primitives/interfaces.rst +++ b/docs/hazmat/primitives/interfaces.rst @@ -160,6 +160,27 @@ Asymmetric Interfaces The private exponent. Alias for :attr:`private_exponent`. + .. attribute:: dmp1 + + :type: int + + A `Chinese remainder theorem`_ coefficient used to speed up RSA + operations. Calculated as: d mod (p-1) + + .. attribute:: dmq1 + + :type: int + + A `Chinese remainder theorem`_ coefficient used to speed up RSA + operations. Calculated as: d mod (q-1) + + .. attribute:: iqmp + + :type: int + + A `Chinese remainder theorem`_ coefficient used to speed up RSA + operations. Calculated as: q\ :sup:`-1` mod p + .. attribute:: n :type: int @@ -279,4 +300,5 @@ Key Derivation Functions something like checking whether a user's password attempt matches the stored derived key. -.. _`RSA`: http://en.wikipedia.org/wiki/RSA_(cryptosystem) +.. _`RSA`: https://en.wikipedia.org/wiki/RSA_(cryptosystem) +.. _`Chinese remainder theorem`: https://en.wikipedia.org/wiki/Chinese_remainder_theorem |