/macosx-10.10.1/Heimdal-398.1.2/lib/hcrypto/libtommath/etc/ |
H A D | mont.c | 6 mp_int modulus, R, p, pp; local 11 mp_init_multi(&modulus, &R, &p, &pp, NULL); 17 /* make up the odd modulus */ 18 mp_rand(&modulus, x); 19 modulus.dp[0] |= 1; 22 mp_montgomery_calc_normalization(&R, &modulus); 23 mp_montgomery_setup(&modulus, &mp); 29 mp_montgomery_reduce(&pp, &modulus, mp);
|
/macosx-10.10.1/OpenSSH-189/openssh/regress/ |
H A D | ssh2putty.sh | 27 modulus=` 28 openssl rsa -noout -modulus -in $KEYFILE | grep ^Modulus= | 33 echo "rsa2@$PORT:$HOST $public_exponent,$modulus"
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslBER.h | 41 * modulus and public exponent. 44 * modulus INTEGER, -- n 50 SSLBuffer *modulus, /* data mallocd and RETURNED */ 54 * Given a raw modulus and exponent, cook up a 59 const SSLBuffer *modulus, 65 * modulus and public exponent.
|
H A D | sslBER.c | 58 * modulus and public exponent. 61 * modulus INTEGER, -- n 75 SSLBuffer *modulus, /* data mallocd and RETURNED */ 84 assert(modulus != NULL); 95 srtn = SSLCopyBufferFromData(nssPubKey.modulus.Data, 96 nssPubKey.modulus.Length, modulus); 107 * Given a raw modulus and exponent, cook up a 111 const SSLBuffer *modulus, 120 assert((modulus ! 73 sslDecodeRsaBlob( const SSLBuffer *blob, SSLBuffer *modulus, SSLBuffer *exponent) argument 110 sslEncodeRsaBlob( const SSLBuffer *modulus, const SSLBuffer *exponent, SSLBuffer *blob) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslBER.h | 41 * modulus and public exponent. 44 * modulus INTEGER, -- n 50 SSLBuffer *modulus, /* data mallocd and RETURNED */ 54 * Given a raw modulus and exponent, cook up a 59 const SSLBuffer *modulus, 65 * modulus and public exponent.
|
H A D | sslBER.c | 58 * modulus and public exponent. 61 * modulus INTEGER, -- n 75 SSLBuffer *modulus, /* data mallocd and RETURNED */ 84 assert(modulus != NULL); 95 srtn = SSLCopyBufferFromData(nssPubKey.modulus.Data, 96 nssPubKey.modulus.Length, modulus); 107 * Given a raw modulus and exponent, cook up a 111 const SSLBuffer *modulus, 120 assert((modulus ! 73 sslDecodeRsaBlob( const SSLBuffer *blob, SSLBuffer *modulus, SSLBuffer *exponent) argument 110 sslEncodeRsaBlob( const SSLBuffer *modulus, const SSLBuffer *exponent, SSLBuffer *blob) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslBER.h | 41 * modulus and public exponent. 44 * modulus INTEGER, -- n 50 SSLBuffer *modulus, /* data mallocd and RETURNED */ 54 * Given a raw modulus and exponent, cook up a 59 const SSLBuffer *modulus, 65 * modulus and public exponent.
|
H A D | sslBER.c | 58 * modulus and public exponent. 61 * modulus INTEGER, -- n 75 SSLBuffer *modulus, /* data mallocd and RETURNED */ 84 assert(modulus != NULL); 95 srtn = SSLCopyBufferFromData(nssPubKey.modulus.Data, 96 nssPubKey.modulus.Length, modulus); 107 * Given a raw modulus and exponent, cook up a 111 const SSLBuffer *modulus, 120 assert((modulus ! 73 sslDecodeRsaBlob( const SSLBuffer *blob, SSLBuffer *modulus, SSLBuffer *exponent) argument 110 sslEncodeRsaBlob( const SSLBuffer *modulus, const SSLBuffer *exponent, SSLBuffer *blob) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | bsafePKCS1.cpp | 89 * Convert BigIntegerStr modulus, publicExponent into 93 BS_snaccBigIntToItem(snaccPubKey.modulus, rsaKey.modulus); 107 /* get modulus/exponent info from BSAFE */ 114 BS_ItemToSnaccBigInt(rsaKey->modulus, snaccPubKey.modulus); 118 size_t maxSize = 2 * (rsaKey->modulus.len + rsaKey->exponent.len);
|
/macosx-10.10.1/OpenSSL098-52/src/engines/vendor_defns/ |
H A D | atalla.h | 5 * regular mod_exp using the supplied modulus and exponent - no CRT form is 25 Item modulus; member in struct:RSAPrivateKeyStr
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecRSAKey.h | 40 uint8_t *modulus; /* modulus */ member in struct:SecRSAPublicKeyParams
|
H A D | SecECKey.h | 40 uint8_t *modulus; /* modulus */ member in struct:SecECPublicKeyParams
|
/macosx-10.10.1/CommonCrypto-60061/include/ |
H A D | CommonBigNum.h | 496 @abstract Find the remainder of a BigNum for a given modulus. 500 @param modulus The BigNum used to divide a and produce the mod value. 506 CCBigNumMod(CCBigNumRef result, CCBigNumRef dividend, CCBigNumRef modulus) 513 @abstract Find the remainder of a BigNum for a given modulus (unsigned integer version). 517 @param modulus The BigNum used to divide a and produce the mod value. 523 CCBigNumModI(uint32_t *result, CCBigNumRef dividend, uint32_t modulus) 585 @param modulus The Modulus. 591 CCBigNumMulMod(CCBigNumRef result, const CCBigNumRef a, const CCBigNumRef b, const CCBigNumRef modulus) 602 @param modulus The Modulus. 608 CCBigNumSquareMod(CCBigNumRef result, const CCBigNumRef a, const CCBigNumRef modulus) [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/libDER/libDER/ |
H A D | DER_Keys.h | 65 DERItem modulus; /* n - INTEGER */ member in struct:__anon4844 78 DERItem modulus; /* n */ member in struct:__anon4845 79 DERItem reciprocal; /* reciprocal of modulus */ 106 DERItem n; /* modulus */
|
H A D | DER_Keys.c | 117 { DER_OFFSET(DERRSAPubKeyPKCS1, modulus), 130 { DER_OFFSET(DERRSAPubKeyApple, modulus),
|
/macosx-10.10.1/libtelnet-13/ |
H A D | pk.c | 124 MINT *modulus = xtom(HEXMODULUS); local 129 pow(public, secret, modulus, common); 136 mfree(modulus); 169 MINT *modulus = xtom(HEXMODULUS); local 183 mdiv(sk, modulus, tmp, sk); 185 pow(root, sk, modulus, pk); 194 mfree(modulus);
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_asn1/ |
H A D | keyTemplates.h | 122 SecAsn1Item modulus; member in struct:__anon3586 140 SecAsn1Item modulus; member in struct:__anon3587
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/Security/ |
H A D | keyTemplates.h | 122 SecAsn1Item modulus; member in struct:__anon4021 140 SecAsn1Item modulus; member in struct:__anon4022
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/lib/ |
H A D | keyTemplates.h | 122 SecAsn1Item modulus; member in struct:__anon4143 140 SecAsn1Item modulus; member in struct:__anon4144
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/ |
H A D | keyTemplates.h | 122 SecAsn1Item modulus; member in struct:__anon4265 140 SecAsn1Item modulus; member in struct:__anon4266
|
/macosx-10.10.1/OpenSSL098-52/src/engines/ |
H A D | e_atalla.c | 452 BIGNUM *modulus; local 459 modulus = exponent = argument = result = NULL; 469 modulus = BN_CTX_get(ctx); 478 if(!bn_wexpand(modulus, m->top) || !bn_wexpand(exponent, m->top) || 488 memset(modulus->d, 0, numbytes); 490 BN_bn2bin(m, (unsigned char *)modulus->d + numbytes - BN_num_bytes(m)); 493 keydata.modulus.data = (unsigned char *)modulus->d; 494 keydata.modulus.len = numbytes; 502 keydata.modulus [all...] |
H A D | e_4758cca.c | 106 long *modulusFieldLength, unsigned char *modulus); 415 unsigned char modulus[256]; local 416 long modulusFieldLength = sizeof(modulus); 463 modulus)) 475 rtmp->n = BN_bin2bn(modulus, modulusFieldLength, NULL); 507 unsigned char modulus[512]; local 508 long modulusFieldLength = sizeof(modulus); 543 exponent, &modulusLength, &modulusFieldLength, modulus)) 554 rtmp->n = BN_bin2bn(modulus, modulusFieldLength, NULL); 876 unsigned char *modulus) 874 getModulusAndExponent(const unsigned char*token, long *exponentLength, unsigned char *exponent, long *modulusLength, long *modulusFieldLength, unsigned char *modulus) argument [all...] |
/macosx-10.10.1/ruby-106/ruby/test/openssl/ |
H A D | test_pkey_rsa.rb | 132 modulus = 10664264882656732240315063514678024569492171560814833397008094754351396057398262071307709191731289492697968568138092052265293364132872019762410446076526351 134 seq = OpenSSL::ASN1::Sequence.new([OpenSSL::ASN1::Integer.new(modulus), OpenSSL::ASN1::Integer.new(exponent)]) 138 assert_equal(modulus, key.n) 147 modulus = 10664264882656732240315063514678024569492171560814833397008094754351396057398262071307709191731289492697968568138092052265293364132872019762410446076526351 152 pub_key = OpenSSL::ASN1::Sequence.new([OpenSSL::ASN1::Integer.new(modulus), OpenSSL::ASN1::Integer.new(exponent)]) 157 assert_equal(modulus, key.n) 166 modulus = 9416340886363418692990906464787534854462163316648195510702927337693641649864839352187127240942127674615733815606532506566068276485089353644309497938966061 177 assert_equal(modulus, key.n) 186 modulus = 9416340886363418692990906464787534854462163316648195510702927337693641649864839352187127240942127674615733815606532506566068276485089353644309497938966061 198 assert_equal(modulus, ke [all...] |
/macosx-10.10.1/CommonCrypto-60061/lib/ |
H A D | CommonBigNum.c | 378 CCBigNumMod(CCBigNumRef res, CCBigNumRef dividend, CCBigNumRef modulus) argument 381 ccz_mod((ccz *)res, (ccz *)dividend, (ccz *)modulus); 386 CCBigNumModI(uint32_t *res, CCBigNumRef dividend, uint32_t modulus) argument 394 status = CCBigNumSetI(mod, modulus); 428 CCBigNumMulMod(CCBigNumRef res, const CCBigNumRef a, const CCBigNumRef b, const CCBigNumRef modulus) argument 431 ccz_mulmod((ccz *)res, (ccz *)a, (ccz *)b, (ccz *)modulus); 436 CCBigNumSquareMod(CCBigNumRef res, const CCBigNumRef a, const CCBigNumRef modulus) argument 439 ccz_sqrmod((ccz *)res, (ccz *)a, (ccz *)modulus); 444 CCBigNumInverseMod(CCBigNumRef res, const CCBigNumRef a, const CCBigNumRef modulus) argument 447 ccz_invmod((ccz *)res, (ccz *)a, (ccz *)modulus); 452 CCBigNumModExp(CCBigNumRef res, const CCBigNumRef a, const CCBigNumRef power, const CCBigNumRef modulus) argument [all...] |
/macosx-10.10.1/OpenSSH-189/openssh/ |
H A D | dh.c | 140 logit("WARNING: %s does not exist, using fixed modulus", 272 dh_new_group_asc(const char *gen, const char *modulus) argument 279 if (BN_hex2bn(&dh->p, modulus) == 0) 293 dh_new_group(BIGNUM *gen, BIGNUM *modulus) argument 299 dh->p = modulus;
|