/freebsd-11-stable/crypto/openssh/regress/ |
H A D | ssh2putty.sh | 27 modulus=` 28 openssl rsa -noout -modulus -in $KEYFILE | grep ^Modulus= | 33 echo "rsa2@$PORT:$HOST $public_exponent,$modulus"
|
/freebsd-11-stable/crypto/openssl/engines/vendor_defns/ |
H A D | atalla.h | 6 * only performing a regular mod_exp using the supplied modulus and exponent 21 Item modulus; member in struct:RSAPrivateKeyStr
|
H A D | cswift.h | 188 SW_LARGENUMBER modulus; /* modulus */ member in struct:_SW_EXP
|
/freebsd-11-stable/usr.bin/newkey/ |
H A D | generic.c | 87 MINT *modulus = mp_xtom(HEXMODULUS); local 101 mp_mdiv(sk, modulus, tmp, sk); 103 mp_pow(root, sk, modulus, pk); 112 mp_mfree(modulus);
|
/freebsd-11-stable/contrib/telnet/libtelnet/ |
H A D | pk.c | 124 MINT *modulus = mp_xtom(HEXMODULUS); local 129 mp_pow(public, secret, modulus, common); 136 mp_mfree(modulus); 169 MINT *modulus = mp_xtom(HEXMODULUS); local 183 mp_mdiv(sk, modulus, tmp, sk); 185 mp_pow(root, sk, modulus, pk); 194 mp_mfree(modulus);
|
/freebsd-11-stable/contrib/llvm-project/lld/include/lld/Core/ |
H A D | DefinedAtom.h | 204 Alignment(int v, int m = 0) : value(v), modulus(m) {} 207 uint16_t modulus; member in struct:lld::DefinedAtom::Alignment 210 return (value == rhs.value) && (modulus == rhs.modulus);
|
/freebsd-11-stable/contrib/unbound/sldns/ |
H A D | keyraw.c | 272 BIGNUM *modulus; local 299 modulus = BN_new(); 300 if(!modulus) { 305 (void) BN_bin2bn(key+offset, (int)(len - offset), modulus); 310 BN_free(modulus); 315 rsa->n = modulus; 320 if (!RSA_set0_key(rsa, modulus, exponent, NULL)) { 322 BN_free(modulus);
|
/freebsd-11-stable/crypto/openssl/engines/ |
H A D | e_atalla.c | 467 BIGNUM *modulus; local 474 modulus = exponent = argument = result = NULL; 483 modulus = BN_CTX_get(ctx); 491 if (!bn_wexpand(modulus, m->top) || !bn_wexpand(exponent, m->top) || 500 memset(modulus->d, 0, numbytes); 502 BN_bn2bin(m, (unsigned char *)modulus->d + numbytes - BN_num_bytes(m)); 505 keydata.modulus.data = (unsigned char *)modulus->d; 506 keydata.modulus.len = numbytes; 514 keydata.modulus [all...] |
H A D | e_4758cca.c | 113 unsigned char *modulus); 414 unsigned char modulus[256]; local 415 long modulusFieldLength = sizeof(modulus); 458 modulus)) { 473 rtmp->n = BN_bin2bn(modulus, modulusFieldLength, NULL); 502 unsigned char modulus[512]; local 503 long modulusFieldLength = sizeof(modulus); 534 modulus)) { 548 rtmp->n = BN_bin2bn(modulus, modulusFieldLength, NULL); 845 unsigned char *modulus) 841 getModulusAndExponent(const unsigned char *token, long *exponentLength, unsigned char *exponent, long *modulusLength, long *modulusFieldLength, unsigned char *modulus) argument [all...] |
H A D | e_cswift.c | 496 BIGNUM *modulus; local 506 modulus = exponent = argument = result = NULL; 517 modulus = BN_CTX_get(ctx); 525 if (!bn_wexpand(modulus, m->top) || !bn_wexpand(exponent, p->top) || 531 sw_param.up.exp.modulus.nbytes = BN_bn2bin(m, 532 (unsigned char *)modulus->d); 533 sw_param.up.exp.modulus.value = (unsigned char *)modulus->d;
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_internal-modexp.c | 91 const u8 *modulus, size_t modulus_len, 108 bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0) 89 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
H A D | crypto_wolfssl.c | 1255 mp_int *a, mp_int *modulus, mp_digit mp); 1480 mp_int *modulus = &e->prime; local 1490 ret = mp_montgomery_calc_normalization(&mu, modulus); 1509 if (mp_mulmod(pa->x, &mu, modulus, ta->x) != MP_OKAY || 1510 mp_mulmod(pa->y, &mu, modulus, ta->y) != MP_OKAY || 1511 mp_mulmod(pa->z, &mu, modulus, ta->z) != MP_OKAY || 1512 mp_mulmod(pb->x, &mu, modulus, tb->x) != MP_OKAY || 1513 mp_mulmod(pb->y, &mu, modulus, tb->y) != MP_OKAY || 1514 mp_mulmod(pb->z, &mu, modulus, tb->z) != MP_OKAY) {
|
H A D | crypto_nettle.c | 377 const u8 *modulus, size_t modulus_len, 387 mpz_import(bn_modulus, modulus_len, 1, 1, 1, 0, modulus); 375 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
H A D | crypto_libtomcrypt.c | 504 * k = length of modulus in octets (modlen) 638 * k = length of modulus in octets 740 const u8 *modulus, size_t modulus_len, 750 mp_read_unsigned_bin(m, (u8 *) modulus, modulus_len) != CRYPT_OK) 738 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
H A D | crypto_gnutls.c | 363 const u8 *modulus, size_t modulus_len, 374 gcry_mpi_scan(&bn_modulus, GCRYMPI_FMT_USG, modulus, modulus_len, 361 crypto_mod_exp(const u8 *base, size_t base_len, const u8 *power, size_t power_len, const u8 *modulus, size_t modulus_len, u8 *result, size_t *result_len) argument
|
/freebsd-11-stable/crypto/openssh/ |
H A D | dh.c | 155 logit("WARNING: could not open %s (%s), using fixed modulus", 284 dh_new_group_asc(const char *gen, const char *modulus) argument 290 if (BN_hex2bn(&dh->p, modulus) == 0 || 304 dh_new_group(BIGNUM *gen, BIGNUM *modulus) argument 310 dh->p = modulus;
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | dsa.c | 93 * -modulus - print the DSA public key 112 int modulus = 0; local 177 else if (strcmp(*argv, "-modulus") == 0) 178 modulus = 1; 232 BIO_printf(bio_err, " -modulus print the DSA public value\n"); 306 if (modulus) {
|
H A D | rsa.c | 93 * -modulus - print the RSA key modulus 115 int modulus = 0; local 189 else if (strcmp(*argv, "-modulus") == 0) 190 modulus = 1; 241 BIO_printf(bio_err, " -modulus print the RSA key modulus\n"); 324 if (modulus) {
|
H A D | req.c | 124 * -modulus - print RSA modulus. 187 int modulus = 0; local 307 else if (strcmp(*argv, "-modulus") == 0) 308 modulus = 1; 389 BIO_printf(bio_err, " -modulus RSA modulus\n"); 906 if (noout && !text && !modulus && !subject && !pubkey) { 958 if (modulus) {
|
/freebsd-11-stable/contrib/libstdc++/include/backward/ |
H A D | function.h | 72 using std::modulus;
|
/freebsd-11-stable/contrib/ldns/ |
H A D | dnssec.c | 402 BIGNUM *modulus; local 432 modulus = BN_new(); 433 if(!modulus) { 438 (void) BN_bin2bn(key+offset, (int)(len - offset), modulus); 443 BN_free(modulus); 447 rsa->n = modulus;
|
/freebsd-11-stable/contrib/llvm-project/lld/lib/ReaderWriter/YAML/ |
H A D | ReaderWriterYAML.cpp | 464 if (value.modulus == 0) { 467 out << llvm::format("%d mod %d", value.modulus, value.value); 473 value.modulus = 0; 478 unsigned int modulus; local 479 if (modStr.getAsInteger(0, modulus)) { 480 return "malformed alignment modulus"; 482 value.modulus = modulus; 491 if (value.modulus >= power) { 492 return "malformed alignment, modulus to [all...] |
/freebsd-11-stable/contrib/ntp/util/ |
H A D | ntp-keygen.c | 65 * These cryptographic routines are characterized by the prime modulus 123 #define PLEN 512 /* default prime modulus size (bits) */ 124 #define ILEN 256 /* default identity modulus size (bits) */ 180 u_int modulus = PLEN; /* prime modulus size (bits) */ variable 181 u_int modulus2 = ILEN; /* identity modulus size (bits) */ 420 modulus = OPT_VALUE_MODULUS; 998 fprintf(stderr, "Generating RSA keys (%d bits)...\n", modulus); 999 rsa = genRsaKeyPair(modulus, _UC("RSA")); 1010 * modulus turn [all...] |
/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_secalgo.c | 1062 SECItem modulus = {siBuffer, NULL, 0}; local 1085 modulus.data = key+offset; 1086 modulus.len = (len - offset); 1091 if(SECITEM_CopyItem(pk->arena, &pk->u.rsa.modulus, &modulus)) {
|
/freebsd-11-stable/contrib/gcc/config/ia64/ |
H A D | lib1funcs.asm | 206 // Compute a 64-bit integer modulus. 316 // Compute a 64-bit unsigned integer modulus. 420 // Compute a 32-bit integer modulus. 516 // Compute a 32-bit unsigned integer modulus.
|