/freebsd-11.0-release/crypto/openssh/regress/ |
H A D | ssh2putty.sh | 27 modulus=` 28 openssl rsa -noout -modulus -in $KEYFILE | grep ^Modulus= | 33 echo "rsa2@$PORT:$HOST $public_exponent,$modulus"
|
/freebsd-11.0-release/contrib/wpa/src/crypto/ |
H A D | crypto_internal-modexp.c | 18 const u8 *modulus, size_t modulus_len, 35 bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0) 16 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
H A D | crypto_gnutls.c | 156 const u8 *modulus, size_t modulus_len, 167 gcry_mpi_scan(&bn_modulus, GCRYMPI_FMT_USG, modulus, modulus_len, 154 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
H A D | crypto.h | 418 * @modulus: Modulus integer (big endian byte array) 419 * @modulus_len: Length of modulus integer in bytes 424 * This function calculates result = base ^ power mod modulus. modules_len is 425 * used as the maximum size of modulus buffer. It is set to the used size on 434 const u8 *modulus, size_t modulus_len, 531 * @c: Bignum; modulus
|
H A D | crypto_libtomcrypt.c | 500 * k = length of modulus in octets (modlen) 634 * k = length of modulus in octets 698 const u8 *modulus, size_t modulus_len, 708 mp_read_unsigned_bin(m, (u8 *) modulus, modulus_len) != CRYPT_OK) 696 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
/freebsd-11.0-release/crypto/openssl/engines/vendor_defns/ |
H A D | atalla.h | 6 * only performing a regular mod_exp using the supplied modulus and exponent 21 Item modulus; member in struct:RSAPrivateKeyStr
|
H A D | cswift.h | 188 SW_LARGENUMBER modulus; /* modulus */ member in struct:_SW_EXP
|
/freebsd-11.0-release/usr.bin/newkey/ |
H A D | generic.c | 87 MINT *modulus = mp_xtom(HEXMODULUS); local 101 mp_mdiv(sk, modulus, tmp, sk); 103 mp_pow(root, sk, modulus, pk); 112 mp_mfree(modulus);
|
/freebsd-11.0-release/contrib/telnet/libtelnet/ |
H A D | pk.c | 124 MINT *modulus = mp_xtom(HEXMODULUS); local 129 mp_pow(public, secret, modulus, common); 136 mp_mfree(modulus); 169 MINT *modulus = mp_xtom(HEXMODULUS); local 183 mp_mdiv(sk, modulus, tmp, sk); 185 mp_pow(root, sk, modulus, pk); 194 mp_mfree(modulus);
|
/freebsd-11.0-release/contrib/unbound/sldns/ |
H A D | keyraw.c | 236 BIGNUM *modulus; local 263 modulus = BN_new(); 264 if(!modulus) { 269 (void) BN_bin2bn(key+offset, (int)(len - offset), modulus); 274 BN_free(modulus); 278 rsa->n = modulus;
|
/freebsd-11.0-release/crypto/openssl/engines/ |
H A D | e_atalla.c | 467 BIGNUM *modulus; local 474 modulus = exponent = argument = result = NULL; 483 modulus = BN_CTX_get(ctx); 491 if (!bn_wexpand(modulus, m->top) || !bn_wexpand(exponent, m->top) || 500 memset(modulus->d, 0, numbytes); 502 BN_bn2bin(m, (unsigned char *)modulus->d + numbytes - BN_num_bytes(m)); 505 keydata.modulus.data = (unsigned char *)modulus->d; 506 keydata.modulus.len = numbytes; 514 keydata.modulus [all...] |
H A D | e_4758cca.c | 113 unsigned char *modulus); 414 unsigned char modulus[256]; local 415 long modulusFieldLength = sizeof(modulus); 458 modulus)) { 473 rtmp->n = BN_bin2bn(modulus, modulusFieldLength, NULL); 502 unsigned char modulus[512]; local 503 long modulusFieldLength = sizeof(modulus); 534 modulus)) { 548 rtmp->n = BN_bin2bn(modulus, modulusFieldLength, NULL); 845 unsigned char *modulus) 841 getModulusAndExponent(const unsigned char *token, long *exponentLength, unsigned char *exponent, long *modulusLength, long *modulusFieldLength, unsigned char *modulus) argument [all...] |
H A D | e_cswift.c | 496 BIGNUM *modulus; local 506 modulus = exponent = argument = result = NULL; 517 modulus = BN_CTX_get(ctx); 525 if (!bn_wexpand(modulus, m->top) || !bn_wexpand(exponent, p->top) || 531 sw_param.up.exp.modulus.nbytes = BN_bn2bin(m, 532 (unsigned char *)modulus->d); 533 sw_param.up.exp.modulus.value = (unsigned char *)modulus->d;
|
/freebsd-11.0-release/crypto/openssh/ |
H A D | dh.c | 156 logit("WARNING: %s does not exist, using fixed modulus", 276 dh_new_group_asc(const char *gen, const char *modulus) argument 282 if (BN_hex2bn(&dh->p, modulus) == 0 || 296 dh_new_group(BIGNUM *gen, BIGNUM *modulus) argument 302 dh->p = modulus;
|
/freebsd-11.0-release/crypto/openssl/apps/ |
H A D | dsa.c | 93 * -modulus - print the DSA public key 112 int modulus = 0; local 177 else if (strcmp(*argv, "-modulus") == 0) 178 modulus = 1; 232 BIO_printf(bio_err, " -modulus print the DSA public value\n"); 306 if (modulus) {
|
H A D | rsa.c | 93 * -modulus - print the RSA key modulus 115 int modulus = 0; local 189 else if (strcmp(*argv, "-modulus") == 0) 190 modulus = 1; 241 BIO_printf(bio_err, " -modulus print the RSA key modulus\n"); 324 if (modulus) {
|
H A D | req.c | 124 * -modulus - print RSA modulus. 187 int modulus = 0; local 307 else if (strcmp(*argv, "-modulus") == 0) 308 modulus = 1; 390 BIO_printf(bio_err, " -modulus RSA modulus\n"); 905 if (noout && !text && !modulus && !subject && !pubkey) { 957 if (modulus) {
|
H A D | x509.c | 117 " -modulus - print the RSA key modulus\n", 205 int x509req = 0, days = DEF_DAYS, modulus = 0, pubkey = 0; local 406 else if (strcmp(*argv, "-modulus") == 0) 407 modulus = ++num; 781 } else if (modulus == i) {
|
/freebsd-11.0-release/contrib/libstdc++/include/backward/ |
H A D | function.h | 72 using std::modulus;
|
/freebsd-11.0-release/contrib/unbound/validator/ |
H A D | val_secalgo.c | 846 SECItem modulus = {siBuffer, NULL, 0}; local 869 modulus.data = key+offset; 870 modulus.len = (len - offset); 875 if(SECITEM_CopyItem(pk->arena, &pk->u.rsa.modulus, &modulus)) {
|
/freebsd-11.0-release/contrib/ldns/ |
H A D | dnssec.c | 402 BIGNUM *modulus; local 432 modulus = BN_new(); 433 if(!modulus) { 438 (void) BN_bin2bn(key+offset, (int)(len - offset), modulus); 443 BN_free(modulus); 447 rsa->n = modulus;
|
/freebsd-11.0-release/contrib/ntp/util/ |
H A D | ntp-keygen.c | 65 * These cryptographic routines are characterized by the prime modulus 123 #define PLEN 512 /* default prime modulus size (bits) */ 124 #define ILEN 256 /* default identity modulus size (bits) */ 180 u_int modulus = PLEN; /* prime modulus size (bits) */ variable 181 u_int modulus2 = ILEN; /* identity modulus size (bits) */ 420 modulus = OPT_VALUE_MODULUS; 998 fprintf(stderr, "Generating RSA keys (%d bits)...\n", modulus); 999 rsa = genRsaKeyPair(modulus, _UC("RSA")); 1010 * modulus turn [all...] |
/freebsd-11.0-release/contrib/gcc/config/ia64/ |
H A D | lib1funcs.asm | 206 // Compute a 64-bit integer modulus. 316 // Compute a 64-bit unsigned integer modulus. 420 // Compute a 32-bit integer modulus. 516 // Compute a 32-bit unsigned integer modulus.
|
/freebsd-11.0-release/contrib/libstdc++/include/ext/ |
H A D | bitmap_allocator.h | 736 modulus = _BSize % _AlignSize, enumerator in enum:bitmap_allocator::aligned_size::__anon2041 737 value = _BSize + (modulus ? _AlignSize - (modulus) : 0)
|
/freebsd-11.0-release/crypto/heimdal/lib/hx509/ |
H A D | softp11.c | 367 CK_BYTE *modulus = NULL; local 380 "rsa-modulus"); 386 modulus = malloc(modulus_len); 387 BN_bn2bin(num, modulus); 390 add_object_attribute(o, 0, CKA_MODULUS, modulus, modulus_len); 394 free(modulus);
|