/freebsd-10.0-release/crypto/openssh/regress/ |
H A D | ssh2putty.sh | 27 modulus=` 28 openssl rsa -noout -modulus -in $KEYFILE | grep ^Modulus= | 33 echo "rsa2@$PORT:$HOST $public_exponent,$modulus"
|
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | crypto_internal-modexp.c | 18 const u8 *modulus, size_t modulus_len, 35 bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0) 16 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
H A D | crypto.h | 414 * @modulus: Modulus integer (big endian byte array) 415 * @modulus_len: Length of modulus integer in bytes 420 * This function calculates result = base ^ power mod modulus. modules_len is 421 * used as the maximum size of modulus buffer. It is set to the used size on 430 const u8 *modulus, size_t modulus_len,
|
H A D | crypto_nss.c | 172 const u8 *modulus, size_t modulus_len, 170 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
H A D | crypto_gnutls.c | 156 const u8 *modulus, size_t modulus_len, 167 gcry_mpi_scan(&bn_modulus, GCRYMPI_FMT_USG, modulus, modulus_len, 154 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
H A D | crypto_libtomcrypt.c | 500 * k = length of modulus in octets (modlen) 634 * k = length of modulus in octets 698 const u8 *modulus, size_t modulus_len, 708 mp_read_unsigned_bin(m, (u8 *) modulus, modulus_len) != CRYPT_OK) 696 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
/freebsd-10.0-release/crypto/openssl/engines/vendor_defns/ |
H A D | atalla.h | 5 * regular mod_exp using the supplied modulus and exponent - no CRT form is 25 Item modulus; member in struct:RSAPrivateKeyStr
|
H A D | cswift.h | 189 SW_LARGENUMBER modulus; /* modulus */ member in struct:_SW_EXP
|
/freebsd-10.0-release/usr.bin/newkey/ |
H A D | generic.c | 87 MINT *modulus = mp_xtom(HEXMODULUS); local 101 mp_mdiv(sk, modulus, tmp, sk); 103 mp_pow(root, sk, modulus, pk); 112 mp_mfree(modulus);
|
/freebsd-10.0-release/contrib/telnet/libtelnet/ |
H A D | pk.c | 124 MINT *modulus = mp_xtom(HEXMODULUS); local 129 mp_pow(public, secret, modulus, common); 136 mp_mfree(modulus); 169 MINT *modulus = mp_xtom(HEXMODULUS); local 183 mp_mdiv(sk, modulus, tmp, sk); 185 mp_pow(root, sk, modulus, pk); 194 mp_mfree(modulus);
|
/freebsd-10.0-release/crypto/openssl/engines/ |
H A D | e_atalla.c | 452 BIGNUM *modulus; local 459 modulus = exponent = argument = result = NULL; 469 modulus = BN_CTX_get(ctx); 478 if(!bn_wexpand(modulus, m->top) || !bn_wexpand(exponent, m->top) || 488 memset(modulus->d, 0, numbytes); 490 BN_bn2bin(m, (unsigned char *)modulus->d + numbytes - BN_num_bytes(m)); 493 keydata.modulus.data = (unsigned char *)modulus->d; 494 keydata.modulus.len = numbytes; 502 keydata.modulus [all...] |
H A D | e_4758cca.c | 106 long *modulusFieldLength, unsigned char *modulus); 415 unsigned char modulus[256]; local 416 long modulusFieldLength = sizeof(modulus); 463 modulus)) 475 rtmp->n = BN_bin2bn(modulus, modulusFieldLength, NULL); 503 unsigned char modulus[512]; local 504 long modulusFieldLength = sizeof(modulus); 539 exponent, &modulusLength, &modulusFieldLength, modulus)) 550 rtmp->n = BN_bin2bn(modulus, modulusFieldLength, NULL); 869 unsigned char *modulus) 867 getModulusAndExponent(const unsigned char*token, long *exponentLength, unsigned char *exponent, long *modulusLength, long *modulusFieldLength, unsigned char *modulus) argument [all...] |
H A D | e_cswift.c | 494 BIGNUM *modulus; local 504 modulus = exponent = argument = result = NULL; 516 modulus = BN_CTX_get(ctx); 525 if(!bn_wexpand(modulus, m->top) || !bn_wexpand(exponent, p->top) || 532 sw_param.up.exp.modulus.nbytes = BN_bn2bin(m, 533 (unsigned char *)modulus->d); 534 sw_param.up.exp.modulus.value = (unsigned char *)modulus->d;
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | dh.c | 155 logit("WARNING: %s does not exist, using fixed modulus", 287 dh_new_group_asc(const char *gen, const char *modulus) argument 294 if (BN_hex2bn(&dh->p, modulus) == 0) 308 dh_new_group(BIGNUM *gen, BIGNUM *modulus) argument 314 dh->p = modulus;
|
/freebsd-10.0-release/contrib/ntp/util/ |
H A D | ntp-keygen.c | 70 * These cryptographic routines are characterized by the prime modulus 129 #define PLEN 512 /* default prime modulus size (bits) */ 166 u_int modulus = PLEN; /* prime modulus size (bits) */ variable 326 modulus = OPT_VALUE_MODULUS; 677 fprintf(stderr, "Generating RSA keys (%d bits)...\n", modulus); 678 rsa = RSA_generate_key(modulus, 65537, cb, "RSA"); 690 * modulus turns out to be non-prime. Just for grins, we check 735 "Generating DSA parameters (%d bits)...\n", modulus); 737 dsa = DSA_generate_parameters(modulus, see [all...] |
H A D | ntp-keygen-opts.def | 102 name = modulus; 105 arg-name = modulus; 108 descrip = "modulus";
|
/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | dsa.c | 92 * -modulus - print the DSA public key 113 int modulus=0; local 186 else if (strcmp(*argv,"-modulus") == 0) 187 modulus=1; 234 BIO_printf(bio_err," -modulus print the DSA public value\n"); 320 if (modulus)
|
H A D | rsa.c | 92 * -modulus - print the RSA key modulus 116 int modulus=0; local 196 else if (strcmp(*argv,"-modulus") == 0) 197 modulus=1; 240 BIO_printf(bio_err," -modulus print the RSA key modulus\n"); 333 if (modulus)
|
H A D | req.c | 121 * -modulus - print RSA modulus. 183 int modulus=0; local 326 else if (strcmp(*argv,"-modulus") == 0) 327 modulus=1; 415 BIO_printf(bio_err," -modulus RSA modulus\n"); 963 if (noout && !text && !modulus && !subject && !pubkey) 1022 if (modulus)
|
H A D | x509.c | 117 " -modulus - print the RSA key modulus\n", 197 int x509req=0,days=DEF_DAYS,modulus=0,pubkey=0; local 409 else if (strcmp(*argv,"-modulus") == 0) 410 modulus= ++num; 816 if (modulus == i)
|
/freebsd-10.0-release/contrib/libstdc++/include/backward/ |
H A D | function.h | 72 using std::modulus;
|
/freebsd-10.0-release/contrib/unbound/validator/ |
H A D | val_secalgo.c | 788 SECItem modulus = {siBuffer, NULL, 0}; local 811 modulus.data = key+offset; 812 modulus.len = (len - offset); 817 if(SECITEM_CopyItem(pk->arena, &pk->u.rsa.modulus, &modulus)) {
|
/freebsd-10.0-release/contrib/ldns/ |
H A D | dnssec.c | 402 BIGNUM *modulus; local 432 modulus = BN_new(); 433 if(!modulus) { 438 (void) BN_bin2bn(key+offset, (int)(len - offset), modulus); 443 BN_free(modulus); 447 rsa->n = modulus;
|
/freebsd-10.0-release/contrib/libstdc++/include/ext/ |
H A D | bitmap_allocator.h | 736 modulus = _BSize % _AlignSize, enumerator in enum:bitmap_allocator::aligned_size::__anon1728 737 value = _BSize + (modulus ? _AlignSize - (modulus) : 0)
|
/freebsd-10.0-release/crypto/heimdal/lib/hx509/ |
H A D | softp11.c | 367 CK_BYTE *modulus = NULL; local 380 "rsa-modulus"); 386 modulus = malloc(modulus_len); 387 BN_bn2bin(num, modulus); 390 add_object_attribute(o, 0, CKA_MODULUS, modulus, modulus_len); 394 free(modulus);
|