/titanic_50/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softRSA.c | 49 uchar_t modulus[MAX_KEY_ATTR_BUFLEN]; in soft_rsa_encrypt() local 51 uint32_t modulus_len = sizeof (modulus); in soft_rsa_encrypt() 68 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len); in soft_rsa_encrypt() 73 k.modulus = modulus; in soft_rsa_encrypt() 94 uchar_t modulus[MAX_KEY_ATTR_BUFLEN]; in soft_rsa_decrypt() local 100 uint32_t modulus_len = sizeof (modulus); in soft_rsa_decrypt() 108 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len); in soft_rsa_decrypt() 163 k.modulus = modulus; in soft_rsa_decrypt() 247 uchar_t modulus[MAX_KEY_ATTR_BUFLEN]; in soft_rsa_encrypt_common() local 248 uint32_t modulus_len = sizeof (modulus); in soft_rsa_encrypt_common() [all …]
|
H A D | softObject.h | 70 biginteger_t modulus; member 134 biginteger_t modulus; member 396 &((o)->object_class_u.public_key->key_type_u.rsa_pub_key.modulus) 398 &((k)->key_type_u.rsa_pub_key.modulus) 489 &((o)->object_class_u.private_key->key_type_u.rsa_pri_key.modulus) 491 &((k)->key_type_u.rsa_pri_key.modulus)
|
H A D | softAttributeUtil.c | 1306 biginteger_t modulus; local 1325 (void) memset(&modulus, 0x0, sizeof (biginteger_t)); 1428 rv = get_bigint_attr_from_template(&modulus, 1437 if ((modulus.big_value_len < 1439 (modulus.big_value_len > 1584 modulus.big_value_len)) != BIG_OK) { 1587 modulus.big_value_len)) != BIG_OK) { 1593 bytestring2bignum(&n, modulus.big_value, 1594 modulus.big_value_len); 1606 copy_bigint_attr(&modulus, [all …]
|
H A D | softKeystore.c | 1332 biginteger_t modulus; in soft_unpack_object() local 1350 (void) memset(&modulus, 0x0, sizeof (biginteger_t)); in soft_unpack_object() 1383 if ((rv = soft_unpack_obj_attribute(buf, &modulus, in soft_unpack_object() 1387 copy_bigint_attr(&modulus, KEY_PUB_RSA_MOD(pbk)); in soft_unpack_object() 1528 if ((rv = soft_unpack_obj_attribute(buf, &modulus, in soft_unpack_object() 1532 copy_bigint_attr(&modulus, KEY_PRI_RSA_MOD(pvk)); in soft_unpack_object() 1814 bigint_attr_cleanup(&modulus); in soft_unpack_object() 1828 bigint_attr_cleanup(&modulus); in soft_unpack_object()
|
/titanic_50/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 116 MINT *modulus = mp_xtom(xmodulus); in __generic_gen_dhkeys() local 153 mp_mdiv(sk, modulus, tmp, sk); in __generic_gen_dhkeys() 157 mp_pow(root, sk, modulus, pk); in __generic_gen_dhkeys() 176 mp_mfree(modulus); in __generic_gen_dhkeys() 250 MINT *modulus = mp_xtom(xmodulus); in __generic_common_dhkeys() local 255 mp_pow(pk, sk, modulus, ck); in __generic_common_dhkeys() 263 mp_mfree(modulus); in __generic_common_dhkeys()
|
/titanic_50/usr/src/cmd/dispadmin/ |
H A D | subr.c | 112 ulong_t modulus; in _hrtnewres() local 171 modulus = numerator - result * htp->hrt_res; in _hrtnewres() 172 if ((twomodulus = 2 * modulus) / 2 == modulus) { in _hrtnewres()
|
/titanic_50/usr/src/uts/common/crypto/io/ |
H A D | rsa.c | 372 uchar_t *modulus; in check_mech_and_key() local 386 if ((rv = crypto_get_key_attr(key, SUN_CKA_MODULUS, &modulus, in check_mech_and_key() 595 uchar_t *modulus; in rsa_encrypt_common() local 601 if ((rv = crypto_get_key_attr(key, SUN_CKA_MODULUS, &modulus, in rsa_encrypt_common() 657 uchar_t *expo, *modulus; in core_rsa_encrypt() local 677 if ((rv = crypto_get_key_attr(key, SUN_CKA_MODULUS, &modulus, in core_rsa_encrypt() 682 k.modulus = modulus; in core_rsa_encrypt() 741 uchar_t *modulus; in rsa_decrypt_common() local 746 if ((rv = crypto_get_key_attr(key, SUN_CKA_MODULUS, &modulus, in rsa_decrypt_common() 794 uchar_t *modulus, *prime1, *prime2, *expo1, *expo2, *coef; in core_rsa_decrypt() local [all …]
|
H A D | dprov.c | 657 static uchar_t modulus[128] = { variable 7350 dprov_attribute_size = sizeof (modulus); in nostore_copy_attribute() 7351 dprov_attribute_value = modulus; in nostore_copy_attribute() 7711 attribute.oa_value = (char *)modulus; in dprov_key_task() 7712 attribute.oa_value_len = sizeof (modulus); in dprov_key_task() 7760 attribute.oa_value = (char *)modulus; in dprov_key_task() 7761 attribute.oa_value_len = sizeof (modulus); in dprov_key_task()
|
/titanic_50/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 127 MINT *modulus = mp_xtom(HEXMODULUS); local 146 mp_mdiv(sk, modulus, tmp, sk); 148 mp_pow(root, sk, modulus, pk); 157 mp_mfree(modulus);
|
/titanic_50/usr/src/cmd/ssh/libssh/common/ |
H A D | dh.c | 225 dh_new_group_asc(const char *gen, const char *modulus) in dh_new_group_asc() argument 232 if (BN_hex2bn(&dh->p, modulus) == 0) in dh_new_group_asc() 246 dh_new_group(BIGNUM *gen, BIGNUM *modulus) in dh_new_group() argument 252 dh->p = modulus; in dh_new_group()
|
/titanic_50/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelObject.h | 81 biginteger_t modulus; member 131 biginteger_t modulus; member 271 &((o)->object_class_u.public_key->key_type_u.rsa_pub_key.modulus) 273 &((k)->key_type_u.rsa_pub_key.modulus) 343 &((o)->object_class_u.private_key->key_type_u.rsa_pri_key.modulus) 345 &((k)->key_type_u.rsa_pri_key.modulus)
|
H A D | kernelAttributeUtil.c | 1022 biginteger_t modulus; in kernel_build_public_key_object() local 1035 (void) memset(&modulus, 0x0, sizeof (biginteger_t)); in kernel_build_public_key_object() 1130 rv = get_bigint_attr_from_template(&modulus, in kernel_build_public_key_object() 1247 copy_bigint_attr(&modulus, in kernel_build_public_key_object() 1330 bigint_attr_cleanup(&modulus); in kernel_build_public_key_object() 1396 biginteger_t modulus; in kernel_build_private_key_object() local 1415 (void) memset(&modulus, 0x0, sizeof (biginteger_t)); in kernel_build_private_key_object() 1532 rv = get_bigint_attr_from_template(&modulus, in kernel_build_private_key_object() 1689 copy_bigint_attr(&modulus, KEY_PRI_RSA_MOD(pvk)); in kernel_build_private_key_object() 1799 bigint_attr_cleanup(&modulus); in kernel_build_private_key_object()
|
/titanic_50/usr/src/cmd/priocntl/ |
H A D | subr.c | 587 ulong_t modulus; local 645 modulus = numerator - result * htp->hrt_res; 646 if ((twomodulus = 2 * modulus) / 2 == modulus) {
|
/titanic_50/usr/src/common/crypto/rsa/ |
H A D | rsa_impl.c | 451 bignum2bytestring(bkey->modulus, &(rsakey.n), modulus_bytes); in rsa_genkey_pair() 501 if (bkey->modulus_bits == 0 || bkey->modulus == NULL || in rsa_encrypt() 527 bytestring2bignum(&(rsakey.n), bkey->modulus, modulus_bytes); in rsa_encrypt() 568 if (bkey->modulus_bits == 0 || bkey->modulus == NULL || in rsa_decrypt() 594 bytestring2bignum(&(rsakey.n), bkey->modulus, modulus_bytes); in rsa_decrypt()
|
H A D | rsa_impl.h | 102 uchar_t *modulus; /* n */ member
|
/titanic_50/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | asn1.c | 886 CK_ATTRIBUTE * modulus, in ber_encode_RSAPrivateKey() argument 908 modulus->ulValueLen); in ber_encode_RSAPrivateKey() 964 (CK_BYTE *)modulus + sizeof (CK_ATTRIBUTE), modulus->ulValueLen); in ber_encode_RSAPrivateKey() 1055 CK_ATTRIBUTE ** modulus, in ber_decode_RSAPrivateKey() argument 1247 *modulus = n_attr; in ber_decode_RSAPrivateKey()
|
H A D | key.c | 1435 CK_ATTRIBUTE *modulus = NULL; in rsa_priv_wrap_get_data() local 1442 if (template_attribute_find(tmpl, CKA_MODULUS, &modulus) == FALSE) { in rsa_priv_wrap_get_data() 1474 modulus, publ_exp, priv_exp, prime1, prime2, in rsa_priv_wrap_get_data() 1485 CK_ATTRIBUTE *modulus = NULL; in rsa_priv_unwrap() local 1496 &modulus, &publ_exp, &priv_exp, &prime1, &prime2, in rsa_priv_unwrap() 1502 (void) remove_leading_zeros(modulus); in rsa_priv_unwrap() 1511 (void) template_update_attribute(tmpl, modulus); in rsa_priv_unwrap()
|
H A D | tpm_specific.c | 2412 BYTE *buf = NULL, *modulus = NULL; in tpm_decrypt_data() local 2428 TSS_TSPATTRIB_KEYINFO_RSA_MODULUS, &modLen, &modulus))) { in tpm_decrypt_data() 2434 Tspi_Context_FreeMemory(hContext, modulus); in tpm_decrypt_data() 2616 BYTE *dataBlob, *modulus; in tpm_encrypt_data() local 2633 TSS_TSPATTRIB_KEYINFO_RSA_MODULUS, &modLen, &modulus))) { in tpm_encrypt_data() 2639 Tspi_Context_FreeMemory(hContext, modulus); in tpm_encrypt_data() 2759 BYTE *modulus; in token_specific_rsa_verify_recover() local 2773 TSS_TSPATTRIB_KEYINFO_RSA_MODULUS, &modLen, &modulus))) { in token_specific_rsa_verify_recover() 2790 rsa->n = BN_bin2bn(modulus, modLen, rsa->n); in token_specific_rsa_verify_recover() 2833 Tspi_Context_FreeMemory(hContext, modulus); in token_specific_rsa_verify_recover()
|
/titanic_50/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_auth.c | 604 const uchar_t modulus = 'z' - ' ' + 1; in smb_gen_random_passwd() local 618 t = (t % modulus) + start; in smb_gen_random_passwd()
|
/titanic_50/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 1707 CK_BYTE *modulus = NULL; in KMFPK11_CreateKeypair() local 1749 modulus = malloc(modulusLength); in KMFPK11_CreateKeypair() 1750 if (modulus == NULL) in KMFPK11_CreateKeypair() 1753 modattr[0].pValue = modulus; in KMFPK11_CreateKeypair() 1758 free(modulus); in KMFPK11_CreateKeypair() 1762 IDInput.Data = modulus; in KMFPK11_CreateKeypair()
|
/titanic_50/usr/src/cmd/ssh/doc/ |
H A D | ChangeLog | 2341 modulus length. markus and me. 2490 - [sshconnect.c] warn if announced size of modulus 'n' != real size
|
/titanic_50/usr/src/cmd/look/ |
H A D | words | 14990 modulus
|
/titanic_50/usr/src/cmd/spell/ |
H A D | list | 14988 modulus
|