/freebsd/crypto/openssl/doc/man3/ |
H A D | BN_mod_exp_mont.pod | 28 BN_mod_exp_mont() computes I<a> to the I<p>-th power modulo I<m> (C<rr=a^p % m>) 33 BN_mod_exp_mont_consttime() computes I<a> to the I<p>-th power modulo I<m> 41 the I<p1>-th power modulo I<m1> (C<rr1=a1^p1 % m1>) and I<a2> to the I<p2>-th 42 power modulo I<m2> (C<rr2=a2^p2 % m2>) using Montgomery multiplication. For some
|
H A D | BN_mod_inverse.pod | 5 BN_mod_inverse - compute inverse modulo n 16 BN_mod_inverse() computes the inverse of B<a> modulo B<n>
|
H A D | BN_add.pod | 73 BN_nnmod() reduces I<a> modulo I<m> and places the nonnegative 76 BN_mod_add() adds I<a> to I<b> modulo I<m> and places the nonnegative 79 BN_mod_sub() subtracts I<b> from I<a> modulo I<m> and places the 89 BN_mod_sqr() takes the square of I<a> modulo B<m> and places the 102 BN_mod_exp() computes I<a> to the I<p>-th power modulo I<m> (C<r=a^p %
|
H A D | BN_mod_mul_montgomery.pod | 69 The inputs must be reduced modulo B<m>, otherwise the result will be
|
/freebsd/contrib/unifdef/tests/ |
H A D | if7.c | 65 #error FOOB modulo FOO is not 0
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | compress | 64 # size of the original (uncompressed) input data modulo 2^32 66 >>>-4 ulelong x \b, original size modulo 2^32 %u 96 # size of the original (uncompressed) input data modulo 2^32 97 >>-4 ulelong x \b, original size modulo 2^32 %u 127 # size of the original (uncompressed) input data modulo 2^32 128 #>-4 ulelong x \b, original size modulo 2^32 %u
|
H A D | pgp-binary-keys | 151 # will be identical to v4 data structures modulo the version number.
|
H A D | map | 78 # Checksum, sum of all bytes modulo 256 should be 0
|
H A D | console | 794 # timer modulo; often 0 795 >14 ubyte !0 \b, timer modulo %#x
|
/freebsd/contrib/libder/ |
H A D | README.md | 22 will treat as relatively opaque (modulo some encoding normalization rules that
|
/freebsd/lib/libc/softfloat/bits32/ |
H A D | softfloat-macros | 266 value formed by concatenating `b0' and `b1'. Addition is modulo 2^64, so 287 modulo 2^96, so any carry out is lost. The result is broken into three 325 64-bit value formed by concatenating `a0' and `a1'. Subtraction is modulo 345 is modulo 2^96, so any borrow out (carry out) is lost. The result is broken
|
/freebsd/sys/contrib/zlib/doc/ |
H A D | rfc1950.txt | 327 are done modulo 65521. s1 is initialized to 1, s2 to zero. The 484 The modulo on unsigned long accumulators can be delayed for 5552 485 bytes, so the modulo operation time is negligible. If the bytes 525 % modulo operator: a % b is the remainder of a divided by b.
|
H A D | rfc1952.txt | 429 data modulo 2^32.
|
/freebsd/crypto/openssl/test/ |
H A D | bntest.c | 3064 BIGNUM *base = NULL, *exponent = NULL, *modulo = NULL; in test_mod_exp() local 3070 || !TEST_true(BN_dec2bn(&modulo, test->mod))) in test_mod_exp() 3073 if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) in test_mod_exp() 3089 BN_free(modulo); in test_mod_exp() 3098 BIGNUM *base = NULL, *exponent = NULL, *modulo = NULL; in test_mod_exp_consttime() local 3104 || !TEST_true(BN_dec2bn(&modulo, test->mod))) in test_mod_exp_consttime() 3109 BN_set_flags(modulo, BN_FLG_CONSTTIME); in test_mod_exp_consttime() 3111 if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) in test_mod_exp_consttime() 3127 BN_free(modulo); in test_mod_exp_consttime()
|
/freebsd/contrib/llvm-project/lld/docs/ELF/ |
H A D | linker_script.rst | 94 > The value of sh_addr must be congruent to 0, modulo the value of sh_addralign. 98 sh_addr=0 (modulo sh_addralign).
|
/freebsd/lib/libc/softfloat/bits64/ |
H A D | softfloat-macros | 341 value formed by concatenating `b0' and `b1'. Addition is modulo 2^128, so 362 modulo 2^192, so any carry out is lost. The result is broken into three 400 128-bit value formed by concatenating `a0' and `a1'. Subtraction is modulo 420 Subtraction is modulo 2^192, so any borrow out (carry out) is lost. The
|
/freebsd/crypto/openssl/crypto/ |
H A D | README-sparse_array.md | 15 SA_BLOCK_MASK Specifies a bit mask to perform modulo block size
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_poly1305.txt | 47 # What happens if addition of s overflows modulo 2^128?
|
/freebsd/sys/crypto/openssl/arm/ |
H A D | chacha-armv4.S | 87 ldr r12,[sp,#4*(12)] @ modulo-scheduled load 209 str r8, [sp,#4*(16+8)] @ modulo-scheduled store 853 ldr r12,[sp,#4*(12)] @ modulo-scheduled load 1091 str r8, [sp,#4*(16+8)] @ modulo-scheduled store 1300 ldr r12,[sp,#4*(12)] @ modulo-scheduled load
|
H A D | ghashv8-armx.S | 120 @ as loop is modulo-scheduled
|
/freebsd/contrib/llvm-project/lldb/bindings/python/ |
H A D | python-extensions.swig | 449 def __ipow__(self, other, modulo): 450 result = self.__pow__(self, other, modulo)
|
/freebsd/crypto/libecc/scripts/ |
H A D | expand_libecc.py | 322 def getrandomint(modulo): argument 323 return random.randrange(0, modulo+1)
|
/freebsd/crypto/openssl/crypto/aes/asm/ |
H A D | bsaes-armv8.pl | 1277 // x4 -> initial value of 128-bit counter (stored big-endian) which increments, modulo 2^32, for …
|
/freebsd/usr.sbin/cron/doc/ |
H A D | MAIL | 140 to start on and N with slashes). I took modulo the day of year as a
|
/freebsd/lib/libc++/ |
H A D | Makefile | 899 MAT_HEADERS+= modulo.h
|