BCMOD(3) 1 BCMOD(3)bcmod - Get modulus of an arbitrary precision numberSYNOPSIS
string bcmod (string $left_operand, string $modulus)
DESCRIPTION
Get the modulus of the $left_operand using $modulus.
PARAMETERS
o $left_operand
- The left operand, as a string.
o $modulus
- The modulus, as a string.
RETURN VALUES
Returns the modulus as a string, or NULL if $modulus is 0.
EXAMPLES
Example #1
bcmod(3) example
<?php
echo bcmod('4', '2'); // 0
echo bcmod('2', '4'); // 2
?>
SEE ALSO bcdiv(3).
PHP Documentation Group BCMOD(3)
Check Out this Related Man Page
MODULI(5) BSD File Formats Manual MODULI(5)NAME
moduli -- Diffie Hellman moduli
DESCRIPTION
The /etc/ssh/moduli file contains prime numbers and generators for use by sshd(8) in the Diffie-Hellman Group Exchange key exchange method.
New moduli may be generated with ssh-keygen(1) using a two-step process. An initial candidate generation pass, using ssh-keygen -G, calcu-
lates numbers that are likely to be useful. A second primality testing pass, using ssh-keygen -T provides a high degree of assurance that
the numbers are prime and are safe for use in Diffie Hellman operations by sshd(8). This moduli format is used as the output from each pass.
The file consists of newline-separated records, one per modulus, containing seven space separated fields. These fields are as follows:
timestamp The time that the modulus was last processed as YYYYMMDDHHMMSS.
type Decimal number specifying the internal structure of the prime modulus. Supported types are:
0 Unknown, not tested
2 "Safe" prime; (p-1)/2 is also prime.
4 Sophie Germain; (p+1)*2 is also prime.
Moduli candidates initially produced by ssh-keygen(1) are Sophie Germain primes (type 4). Futher primality testing with
ssh-keygen(1) produces safe prime moduli (type 2) that are ready for use in sshd(8). Other types are not used by OpenSSH.
tests Decimal number indicating the type of primality tests that the number has been subjected to represented as a bitmask of
the following values:
0x00 Not tested
0x01 Composite number - not prime.
0x02 Sieve of Eratosthenes
0x04 Probabalistic Miller-Rabin primality tests.
The ssh-keygen(1) moduli candidate generation uses the Sieve of Eratosthenes (flag 0x02). Subsequent ssh-keygen(1) pri-
mality tests are Miller-Rabin tests (flag 0x04).
trials Decimal number indicating of primaility trials that have been performed on the modulus.
size Decimal number indicating the size of the prime in bits.
generator The recommended generator for use with this modulus (hexadecimal).
modulus The modulus itself in hexadecimal.
When performing Diffie Hellman Group Exchange, sshd(8) first estimates the size of the modulus required to produce enough Diffie Hellman out-
put to sufficiently key the selected symmetric cipher. sshd(8) then randomly selects a modulus from /etc/ssh/moduli that best meets the size
requirement.
SEE ALSO ssh-keygen(1), sshd(8),
Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol, RFC 4419, 2006.
BSD June 26, 2008 BSD
Emergency UNIX and Linux Support !! Help Me! Forum (Request Urgent Help)
README FIRST: How to Request Emergency or Urgent Help:
You may post emergency work-related questions in the emergency forum. To post in this forum you will need to use your Bits. All questions answered on a "best... (0 Replies)
Homework Help:
On Posting Questions:
Any and all high school and undergraduate homework assignments or textbook style exercises for which you are seeking assistance are to be posted only in our Homework & Coursework Questions area--not in blogs, visitor messages, PMs, or the main technical... (0 Replies)
How to Use Code Tags in The UNIX and Linux Forums
Developer: This video tutorial was created by scott for forum users. Everyone should use code tags when posting code and command line logic in the forums.
cPF45jjWe7Q
A full list of BB codes is available here. (8 Replies)
RULES OF THE UNIX AND LINUX FORUMS
For the latest version of the community rules (the official community rules page), please visit here.
No flames, shouting (all caps), sarcasm, bullying, profanity or arrogant posts.
No negative comments about others or impolite remarks. Be patient. No... (1 Reply)
Hey,
Just added a new UserCP option so you can change the code tags to look like the code tags in this example (turn this on and off):
Note: I set the default to "SyntaxHighlighting" for debugging purposes. We can change the default back to the original code tags later.
... (36 Replies)
Having spent a lot of time over the past year taking a legacy vBulletin site (this forum) and making the site responsive on mobile; I've happy with the results; but it will soon be time to move on.
Basically, at our core, we are a LAMP (Linux, Apache2, MySQL and PHP) site, and vBulletin was... (6 Replies)
On this special Happy News Year day, 1 January 2019, I am pleased to promote Ravinder Singh to UNIX.COM Moderator, for at least the following reasons:
Ravinder Loves UNIX.COM
Ravinder has 1,372 Thanks, which puts him in the Top Ten in that important single category.
Ravinder is one of... (8 Replies)
Please join me in congratulations to Wolf Machowitsch (bakunin) for his long overdue lifetime achievement award badge from UNIX.COM in computer wizardry:
"The Order of the Wizard's Hat - Lifetime Achievement Award"
This "Order of the Wizard's Hat" is presented to Wolf Machowitsch (bakunin)... (11 Replies)
Dear All,
We were hit with a denial of service (DOS) attack today beginning around June 12th 2019 @ 01:27:51 PM from an IP address registered to "RACKWEB-NET" in Bulgaria.
I was notified about this around June 12th 2019 @ 03:05 PM and did some log file analysis and discovered how the attack... (4 Replies)
Dear All,
I am very pleased to inform everyone that Nicki Paul (zxmaus) is joining the Moderation Team after a number of years away from the site.
Nicki used to be very active here (over 800 posts), and she got busy with travel, work, family and her dogs, and we have missed her. Now she is... (7 Replies)