/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/libtommath/etc/ |
H A D | mont.c | 6 mp_int modulus, R, p, pp; local 11 mp_init_multi(&modulus, &R, &p, &pp, NULL); 17 /* make up the odd modulus */ 18 mp_rand(&modulus, x); 19 modulus.dp[0] |= 1; 22 mp_montgomery_calc_normalization(&R, &modulus); 23 mp_montgomery_setup(&modulus, &mp); 29 mp_montgomery_reduce(&pp, &modulus, mp);
|
/macosx-10.9.5/OpenSSH-186/openssh/regress/ |
H A D | ssh2putty.sh | 27 modulus=` 28 openssl rsa -noout -modulus -in $KEYFILE | grep ^Modulus= | 33 echo "rsa2@$PORT:$HOST $public_exponent,$modulus"
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | sslBER.h | 41 * modulus and public exponent. 44 * modulus INTEGER, -- n 50 SSLBuffer *modulus, /* data mallocd and RETURNED */ 54 * Given a raw modulus and exponent, cook up a 59 const SSLBuffer *modulus, 65 * modulus and public exponent.
|
H A D | sslBER.c | 58 * modulus and public exponent. 61 * modulus INTEGER, -- n 75 SSLBuffer *modulus, /* data mallocd and RETURNED */ 84 assert(modulus != NULL); 95 srtn = SSLCopyBufferFromData(nssPubKey.modulus.Data, 96 nssPubKey.modulus.Length, modulus); 107 * Given a raw modulus and exponent, cook up a 111 const SSLBuffer *modulus, 120 assert((modulus ! 73 sslDecodeRsaBlob( const SSLBuffer *blob, SSLBuffer *modulus, SSLBuffer *exponent) argument 110 sslEncodeRsaBlob( const SSLBuffer *modulus, const SSLBuffer *exponent, SSLBuffer *blob) argument [all...] |
H A D | appleCdsa.h | 146 SSLBuffer *modulus, // data mallocd and RETURNED 155 const SSLBuffer *modulus,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | sslBER.h | 41 * modulus and public exponent. 44 * modulus INTEGER, -- n 50 SSLBuffer *modulus, /* data mallocd and RETURNED */ 54 * Given a raw modulus and exponent, cook up a 59 const SSLBuffer *modulus, 65 * modulus and public exponent.
|
H A D | sslBER.c | 58 * modulus and public exponent. 61 * modulus INTEGER, -- n 75 SSLBuffer *modulus, /* data mallocd and RETURNED */ 84 assert(modulus != NULL); 95 srtn = SSLCopyBufferFromData(nssPubKey.modulus.Data, 96 nssPubKey.modulus.Length, modulus); 107 * Given a raw modulus and exponent, cook up a 111 const SSLBuffer *modulus, 120 assert((modulus ! 73 sslDecodeRsaBlob( const SSLBuffer *blob, SSLBuffer *modulus, SSLBuffer *exponent) argument 110 sslEncodeRsaBlob( const SSLBuffer *modulus, const SSLBuffer *exponent, SSLBuffer *blob) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | sslBER.h | 41 * modulus and public exponent. 44 * modulus INTEGER, -- n 50 SSLBuffer *modulus, /* data mallocd and RETURNED */ 54 * Given a raw modulus and exponent, cook up a 59 const SSLBuffer *modulus, 65 * modulus and public exponent.
|
H A D | sslBER.c | 58 * modulus and public exponent. 61 * modulus INTEGER, -- n 75 SSLBuffer *modulus, /* data mallocd and RETURNED */ 84 assert(modulus != NULL); 95 srtn = SSLCopyBufferFromData(nssPubKey.modulus.Data, 96 nssPubKey.modulus.Length, modulus); 107 * Given a raw modulus and exponent, cook up a 111 const SSLBuffer *modulus, 120 assert((modulus ! 73 sslDecodeRsaBlob( const SSLBuffer *blob, SSLBuffer *modulus, SSLBuffer *exponent) argument 110 sslEncodeRsaBlob( const SSLBuffer *modulus, const SSLBuffer *exponent, SSLBuffer *blob) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/lib/ |
H A D | bsafePKCS1.cpp | 89 * Convert BigIntegerStr modulus, publicExponent into 93 BS_snaccBigIntToItem(snaccPubKey.modulus, rsaKey.modulus); 107 /* get modulus/exponent info from BSAFE */ 114 BS_ItemToSnaccBigInt(rsaKey->modulus, snaccPubKey.modulus); 118 size_t maxSize = 2 * (rsaKey->modulus.len + rsaKey->exponent.len);
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | SecRSAKey.h | 40 uint8_t *modulus; /* modulus */ member in struct:SecRSAPublicKeyParams
|
H A D | SecECKey.h | 40 uint8_t *modulus; /* modulus */ member in struct:SecECPublicKeyParams
|
/macosx-10.9.5/CommonCrypto-60049/include/ |
H A D | CommonBigNum.h | 495 @abstract Find the remainder of a BigNum for a given modulus. 499 @param modulus The BigNum used to divide a and produce the mod value. 505 CCBigNumMod(CCBigNumRef result, CCBigNumRef dividend, CCBigNumRef modulus) 512 @abstract Find the remainder of a BigNum for a given modulus (unsigned integer version). 516 @param modulus The BigNum used to divide a and produce the mod value. 522 CCBigNumModI(uint32_t *result, CCBigNumRef dividend, uint32_t modulus) 584 @param modulus The Modulus. 590 CCBigNumMulMod(CCBigNumRef result, const CCBigNumRef a, const CCBigNumRef b, const CCBigNumRef modulus) 601 @param modulus The Modulus. 607 CCBigNumSquareMod(CCBigNumRef result, const CCBigNumRef a, const CCBigNumRef modulus) [all...] |
H A D | CommonRSACryptor.h | 422 @param modulus The modulus in MSB format. 423 @param modulusLength The modulus data length. (in/out parameter) 426 @param p The raw data bytes of the modulus factor P. 429 @param q The raw data bytes of the modulus factor Q. 436 CCRSAGetKeyComponents(CCRSACryptorRef rsaKey, uint8_t *modulus, size_t *modulusLength, uint8_t *exponent, size_t *exponentLength, 447 @param modulus The modulus in MSB format. 448 @param modulusLength The modulus data length. 451 @param p The raw data bytes of the modulus facto [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/libDER/libDER/ |
H A D | DER_Keys.h | 44 DERItem modulus; /* n - INTEGER */ member in struct:__anon4789 57 DERItem modulus; /* n */ member in struct:__anon4790 58 DERItem reciprocal; /* reciprocal of modulus */ 85 DERItem n; /* modulus */
|
H A D | DER_Keys.c | 96 { DER_OFFSET(DERRSAPubKeyPKCS1, modulus), 109 { DER_OFFSET(DERRSAPubKeyApple, modulus),
|
/macosx-10.9.5/libtelnet-13/ |
H A D | pk.c | 124 MINT *modulus = xtom(HEXMODULUS); local 129 pow(public, secret, modulus, common); 136 mfree(modulus); 169 MINT *modulus = xtom(HEXMODULUS); local 183 mdiv(sk, modulus, tmp, sk); 185 pow(root, sk, modulus, pk); 194 mfree(modulus);
|
/macosx-10.9.5/Security-55471.14.18/include/security_asn1/ |
H A D | keyTemplates.h | 122 SecAsn1Item modulus; member in struct:__anon3531 140 SecAsn1Item modulus; member in struct:__anon3532
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/Security/ |
H A D | keyTemplates.h | 122 SecAsn1Item modulus; member in struct:__anon3966 140 SecAsn1Item modulus; member in struct:__anon3967
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/lib/ |
H A D | keyTemplates.h | 122 SecAsn1Item modulus; member in struct:__anon4088 140 SecAsn1Item modulus; member in struct:__anon4089
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/security_asn1/ |
H A D | keyTemplates.h | 122 SecAsn1Item modulus; member in struct:__anon4210 140 SecAsn1Item modulus; member in struct:__anon4211
|
/macosx-10.9.5/ruby-104/ruby/test/openssl/ |
H A D | test_pkey_rsa.rb | 132 modulus = 10664264882656732240315063514678024569492171560814833397008094754351396057398262071307709191731289492697968568138092052265293364132872019762410446076526351 134 seq = OpenSSL::ASN1::Sequence.new([OpenSSL::ASN1::Integer.new(modulus), OpenSSL::ASN1::Integer.new(exponent)]) 138 assert_equal(modulus, key.n) 147 modulus = 10664264882656732240315063514678024569492171560814833397008094754351396057398262071307709191731289492697968568138092052265293364132872019762410446076526351 152 pub_key = OpenSSL::ASN1::Sequence.new([OpenSSL::ASN1::Integer.new(modulus), OpenSSL::ASN1::Integer.new(exponent)]) 157 assert_equal(modulus, key.n) 166 modulus = 9416340886363418692990906464787534854462163316648195510702927337693641649864839352187127240942127674615733815606532506566068276485089353644309497938966061 177 assert_equal(modulus, key.n) 186 modulus = 9416340886363418692990906464787534854462163316648195510702927337693641649864839352187127240942127674615733815606532506566068276485089353644309497938966061 198 assert_equal(modulus, ke [all...] |
/macosx-10.9.5/CommonCrypto-60049/lib/ |
H A D | CommonBigNum.c | 378 CCBigNumMod(CCBigNumRef res, CCBigNumRef dividend, CCBigNumRef modulus) argument 381 ccz_mod((ccz *)res, (ccz *)dividend, (ccz *)modulus); 386 CCBigNumModI(uint32_t *res, CCBigNumRef dividend, uint32_t modulus) argument 394 status = CCBigNumSetI(mod, modulus); 428 CCBigNumMulMod(CCBigNumRef res, const CCBigNumRef a, const CCBigNumRef b, const CCBigNumRef modulus) argument 431 ccz_mulmod((ccz *)res, (ccz *)a, (ccz *)b, (ccz *)modulus); 436 CCBigNumSquareMod(CCBigNumRef res, const CCBigNumRef a, const CCBigNumRef modulus) argument 439 ccz_sqrmod((ccz *)res, (ccz *)a, (ccz *)modulus); 444 CCBigNumInverseMod(CCBigNumRef res, const CCBigNumRef a, const CCBigNumRef modulus) argument 447 ccz_invmod((ccz *)res, (ccz *)a, (ccz *)modulus); 452 CCBigNumModExp(CCBigNumRef res, const CCBigNumRef a, const CCBigNumRef power, const CCBigNumRef modulus) argument [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | dh.c | 140 logit("WARNING: %s does not exist, using fixed modulus", 272 dh_new_group_asc(const char *gen, const char *modulus) argument 279 if (BN_hex2bn(&dh->p, modulus) == 0) 293 dh_new_group(BIGNUM *gen, BIGNUM *modulus) argument 299 dh->p = modulus;
|
/macosx-10.9.5/CF-855.17/ |
H A D | CFDate.c | 204 CF_INLINE int32_t __CFDoubleModToInt(double d, int32_t modulus) { argument 205 int32_t result = (int32_t)(float)floor(d - floor(d / modulus) * modulus); 206 if (result < 0) result += modulus; 210 CF_INLINE double __CFDoubleMod(double d, int32_t modulus) { argument 211 double result = d - floor(d / modulus) * modulus; 212 if (result < 0.0) result += (double)modulus;
|