/freebsd/contrib/telnet/libtelnet/ |
H A D | pk.c | 120 MINT *modulus = mp_xtom(HEXMODULUS); in common_key() local 125 mp_pow(public, secret, modulus, common); in common_key() 132 mp_mfree(modulus); in common_key() 160 MINT *modulus = mp_xtom(HEXMODULUS); in genkeys() local 174 mp_mdiv(sk, modulus, tmp, sk); in genkeys() 176 mp_pow(root, sk, modulus, pk); in genkeys() 185 mp_mfree(modulus); in genkeys()
|
/freebsd/crypto/openssh/regress/ |
H A D | ssh2putty.sh | 29 modulus=` 30 $OPENSSL_BIN rsa -noout -modulus -in $KEYFILE | grep ^Modulus= | 35 echo "rsa2@$PORT:$HOST $public_exponent,$modulus"
|
/freebsd/usr.bin/newkey/ |
H A D | generic.c | 79 MINT *modulus = mp_xtom(HEXMODULUS); in genkeys() local 93 mp_mdiv(sk, modulus, tmp, sk); in genkeys() 95 mp_pow(root, sk, modulus, pk); in genkeys() 104 mp_mfree(modulus); in genkeys()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | RSA_size.pod | 5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits 31 RSA_size() returns the RSA modulus size in bytes. It can be used to 42 RSA_size() returns the size of modulus in bytes.
|
H A D | EVP_PKEY_is_a.pod | 82 BIGNUM *modulus = NULL; 83 if (EVP_PKEY_get_bn_param(pkey, "n", &modulus)) 84 /* do whatever with the modulus */ 85 BN_free(modulus);
|
H A D | RSA_generate_key.pod | 31 EVP_RSA_gen() generates a new RSA key pair with modulus size I<bits>. 46 The modulus size will be of length I<bits>, the number of primes to form the 47 modulus will be I<primes>, and the public exponent will be I<e>. Key sizes 52 I<primes> depends on modulus bit length:
|
H A D | BN_mod_mul_montgomery.pod | 33 using the same modulus. 37 BN_MONT_CTX_set() sets up the I<mont> structure from the modulus I<m> 52 Note that I<a> must be nonnegative and smaller than the modulus.
|
H A D | BN_add.pod | 83 remainder respective to modulus I<m> (C<r=(a*b) mod m>). I<r> may be 85 repeated computations using the same modulus, see 93 C<in^2 = a (mod p)>. The modulus I<p> must be a 120 to use the same B<BIGNUM> object for the modulus as for the output.
|
H A D | BN_security_bits.pod | 23 to be the key size (modulus).
|
H A D | X509_check_private_key.pod | 37 and modulus of an RSA key) and/or key parameters (e.g. EC params of an EC key)
|
/freebsd/crypto/openssh/ |
H A D | dh.c | 313 dh_new_group_asc(const char *gen, const char *modulus) in dh_new_group_asc() argument 320 if (BN_hex2bn(&dh_p, modulus) == 0 || in dh_new_group_asc() 338 dh_new_group(BIGNUM *gen, BIGNUM *modulus) in dh_new_group() argument 344 if (!DH_set0_pqg(dh, modulus, NULL, gen)) { in dh_new_group()
|
/freebsd/contrib/unbound/sldns/ |
H A D | keyraw.c | 421 BIGNUM* modulus = NULL; in sldns_key_buf2rsa_raw() local 424 if(!sldns_key_rsa_buf_bignum(key, len, &modulus, &exponent)) in sldns_key_buf2rsa_raw() 429 BN_free(modulus); in sldns_key_buf2rsa_raw() 435 rsa->n = modulus; in sldns_key_buf2rsa_raw() 440 if (!RSA_set0_key(rsa, modulus, exponent, NULL)) { in sldns_key_buf2rsa_raw() 442 BN_free(modulus); in sldns_key_buf2rsa_raw()
|
/freebsd/crypto/openssl/apps/ |
H A D | dsa.c | 87 int modulus = 0, pubin = 0, pubout = 0, ret = 1; in dsa_main() local 145 modulus = 1; in dsa_main() 211 if (modulus) { in dsa_main()
|
H A D | rsa.c | 133 int noout = 0, modulus = 0, pubin = 0, pubout = 0, ret = 1; in rsa_main() local 201 modulus = 1; in rsa_main() 279 if (modulus) { in rsa_main()
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | crypto_internal-modexp.c | 91 const u8 *modulus, size_t modulus_len, in crypto_mod_exp() argument 108 bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0) in crypto_mod_exp()
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_pkey_provided/ |
H A D | RSA.priv.txt | 2 modulus: 3161751493 (0xbc747fc5)
|
/freebsd/contrib/bc/tests/dc/ |
H A D | all.txt | 9 modulus
|
/freebsd/contrib/bc/tests/bc/ |
H A D | all.txt | 13 modulus
|
/freebsd/sys/dev/qat/qat_api/include/lac/ |
H A D | cpa_cy_ln.h | 116 CpaFlatBuffer modulus; member
|
/freebsd/contrib/bc/vs/tests/ |
H A D | tests_dc.bat | 24 modulus
|
H A D | tests_bc.bat | 40 modulus
|
/freebsd/contrib/ldns/ |
H A D | dnssec.c | 427 BIGNUM *modulus; in ldns_key_buf2rsa_raw() local 457 modulus = BN_new(); in ldns_key_buf2rsa_raw() 458 if(!modulus) { in ldns_key_buf2rsa_raw() 463 (void) BN_bin2bn(key+offset, (int)(len - offset), modulus); in ldns_key_buf2rsa_raw() 468 BN_free(modulus); in ldns_key_buf2rsa_raw() 473 rsa->n = modulus; in ldns_key_buf2rsa_raw() 477 if (!RSA_set0_key(rsa, modulus, exponent, NULL)) { in ldns_key_buf2rsa_raw() 479 BN_free(modulus); in ldns_key_buf2rsa_raw()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-rsa.pod.in | 36 [B<-modulus>] 114 =item B<-modulus> 116 This option prints out the value of the modulus of the key.
|
/freebsd/contrib/ntp/util/ |
H A D | invoke-ntp-keygen.texi | 619 @item @code{-b} @code{--imbits}= @kbd{modulus} 621 @kbd{modulus} 724 @item @code{-m} @code{--modulus}= @kbd{bits} 1026 * ntp-keygen modulus:: modulus option (-m) 1062 -b Num imbits identity modulus bits 1077 -m Num modulus prime modulus 1114 This is the ``identity modulus bits'' option. 1263 @node ntp-keygen modulus 1264 @subsection modulus option (-m) 1265 @cindex ntp-keygen-modulus [all …]
|
H A D | ntp-keygen.c | 180 u_int modulus = PLEN; /* prime modulus size (bits) */ variable 424 modulus = OPT_VALUE_MODULUS; in main() 1017 fprintf(stderr, "Generating RSA keys (%d bits)...\n", modulus); in gen_rsa() 1018 rsa = genRsaKeyPair(modulus, _UC("RSA")); in gen_rsa() 1074 "Generating DSA parameters (%d bits)...\n", modulus); in gen_dsa() 1075 dsa = genDsaParams(modulus, _UC("DSA")); in gen_dsa() 1086 fprintf(stderr, "Generating DSA keys (%d bits)...\n", modulus); in gen_dsa()
|