/freebsd-13-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_pss.c | 13 #include <openssl/rsa.h> 25 int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash, argument 29 return RSA_verify_PKCS1_PSS_mgf1(rsa, mHash, Hash, NULL, EM, sLen); 32 int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, argument 67 MSBits = (BN_num_bits(rsa->n) - 1) & 0x7; 68 emLen = RSA_size(rsa); 138 int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM, argument 142 return RSA_padding_add_PKCS1_PSS_mgf1(rsa, EM, mHash, Hash, NULL, sLen); 145 int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM, argument 178 MSBits = (BN_num_bits(rsa [all...] |
H A D | rsa_ameth.c | 33 const RSA *rsa = pkey->pkey.rsa; local 42 if (rsa->pss == NULL) { 47 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) 54 static int rsa_param_decode(RSA *rsa, const X509_ALGOR *alg) argument 69 rsa->pss = rsa_pss_decode(alg); 70 if (rsa->pss == NULL) 84 penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc); 100 RSA *rsa = NULL; local 104 if ((rsa 139 RSA *rsa; local 184 RSA *rsa; local [all...] |
H A D | rsa_asn1.c | 113 RSA *RSAPublicKey_dup(RSA *rsa) 115 return ASN1_item_dup(ASN1_ITEM_rptr(RSAPublicKey), rsa); 118 RSA *RSAPrivateKey_dup(RSA *rsa) 120 return ASN1_item_dup(ASN1_ITEM_rptr(RSAPrivateKey), rsa);
|
H A D | rsa_none.c | 12 #include <openssl/rsa.h>
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_keychain.c | 86 RSA *rsa, 96 RSA *rsa, 107 RSA *rsa, 110 struct kc_rsa *kc = RSA_get_app_data(rsa); 160 RSA * rsa, int padding) 162 struct kc_rsa *kc = RSA_get_app_data(rsa); 221 kc_rsa_init(RSA *rsa) argument 227 kc_rsa_finish(RSA *rsa) argument 229 struct kc_rsa *kc_rsa = RSA_get_app_data(rsa); 259 RSA *rsa; local 83 kc_rsa_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 93 kc_rsa_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 104 kc_rsa_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 159 kc_rsa_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA * rsa, int padding) argument [all...] |
/freebsd-13-stable/crypto/openssh/ |
H A D | ssh-pkcs11.c | 70 int (*orig_finish)(RSA *rsa); 176 pkcs11_rsa_finish(RSA *rsa) argument 181 if ((k11 = RSA_get_app_data(rsa)) != NULL) { 183 rv = k11->orig_finish(rsa); 223 pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, argument 248 if ((k11 = RSA_get_app_data(rsa)) == NULL) { 249 error("RSA_get_app_data failed for rsa %p", rsa); 253 error("no pkcs11 (valid) provider for rsa %p", rsa); 307 pkcs11_rsa_private_decrypt(int flen, const u_char *from, u_char *to, RSA *rsa, int padding) argument 315 pkcs11_rsa_wrap(struct pkcs11_provider *provider, CK_ULONG slotidx, CK_ATTRIBUTE *keyid_attrib, RSA *rsa) argument 455 have_rsa_key(const RSA *rsa) argument 469 RSA *rsa; local [all...] |
H A D | ssh-rsa.c | 1 /* $OpenBSD: ssh-rsa.c,v 1.67 2018/07/03 11:39:54 djm Exp $ */ 47 return "ssh-rsa"; 49 return "rsa-sha2-256"; 51 return "rsa-sha2-512"; 63 if (strcmp(ident, "ssh-rsa") == 0) 65 if (strcmp(ident, "rsa-sha2-256") == 0) 67 if (strcmp(ident, "rsa-sha2-512") == 0) 84 if (strcmp(alg, "ssh-rsa-cert-v01@openssh.com") == 0) 86 if (strcmp(alg, "rsa-sha2-256-cert-v01@openssh.com") == 0) 88 if (strcmp(alg, "rsa 403 openssh_RSA_verify(int hash_alg, u_char *hash, size_t hashlen, u_char *sigbuf, size_t siglen, RSA *rsa) argument [all...] |
H A D | ssh-pkcs11-client.c | 33 #include <openssl/rsa.h> 116 pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, argument 128 key.rsa = rsa; 147 if (slen <= (size_t)RSA_size(rsa)) { 159 wrap_key(RSA *rsa) argument 168 RSA_set_method(rsa, helper_rsa); 237 wrap_key(k->rsa);
|
/freebsd-13-stable/crypto/openssl/crypto/pem/ |
H A D | pem_all.c | 17 #include <openssl/rsa.h> 22 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 47 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) argument 56 if (rsa) { 57 RSA_free(*rsa); 58 *rsa = rtmp; 63 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, argument 68 return pkey_get_rsa(pktmp, rsa); 73 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) argument 77 return pkey_get_rsa(pktmp, rsa); [all...] |
/freebsd-13-stable/lib/libsecureboot/openpgp/ |
H A D | opgp_key.c | 78 RSA *rsa = NULL; local 126 rsa = RSA_new(); 127 if (!rsa) 129 rsa->n = mpi2bn(&ptr); 130 rsa->e = mpi2bn(&ptr); 132 if (!key->key || !rsa->n || !rsa->e) { 135 if (!EVP_PKEY_set1_RSA(key->key, rsa)) 146 if (rsa) 147 RSA_free(rsa); [all...] |
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | rsautl.c | 16 #include <openssl/rsa.h> 70 RSA *rsa = NULL; local 196 rsa = EVP_PKEY_get1_RSA(pkey); 199 if (rsa == NULL) { 212 keysize = RSA_size(rsa); 214 rsa_in = app_malloc(keysize * 2, "hold rsa key"); 215 rsa_out = app_malloc(keysize, "output rsa key"); 235 rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad); 240 RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad); 244 rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pa [all...] |
/freebsd-13-stable/crypto/openssl/crypto/x509/ |
H A D | x_all.c | 18 #include <openssl/rsa.h> 200 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) argument 202 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 205 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) argument 207 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 210 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) argument 212 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); 215 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) argument 219 (void **)rsa); 222 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) argument 227 i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) argument 233 d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) argument 238 i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) argument 243 d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) argument 248 d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) argument 253 i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) argument 258 i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa) argument [all...] |
/freebsd-13-stable/lib/libsecureboot/ |
H A D | brf.c | 370 ta->pkey.key.rsa.n = xblobdup(pk->key.rsa.n, pk->key.rsa.nlen); 371 ta->pkey.key.rsa.nlen = pk->key.rsa.nlen; 372 ta->pkey.key.rsa.e = xblobdup(pk->key.rsa.e, pk->key.rsa.elen); 373 ta->pkey.key.rsa.elen = pk->key.rsa [all...] |
/freebsd-13-stable/crypto/openssl/crypto/asn1/ |
H A D | i2d_pu.c | 15 #include <openssl/rsa.h>
|
H A D | d2i_pu.c | 16 #include <openssl/rsa.h> 43 if ((ret->pkey.rsa = d2i_RSAPublicKey(NULL, pp, length)) == NULL) {
|
/freebsd-13-stable/crypto/openssl/engines/ |
H A D | e_dasync.c | 20 #include <openssl/rsa.h> 98 unsigned char *to, RSA *rsa, int padding); 100 unsigned char *to, RSA *rsa, int padding); 102 unsigned char *to, RSA *rsa, int padding); 104 unsigned char *to, RSA *rsa, int padding); 105 static int dasync_rsa_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, 108 static int dasync_rsa_init(RSA *rsa); 109 static int dasync_rsa_finish(RSA *rsa); 510 unsigned char *to, RSA *rsa, int padding) { 514 (flen, from, to, rsa, paddin 509 dasync_pub_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 517 dasync_pub_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 525 dasync_rsa_priv_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 534 dasync_rsa_priv_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 543 dasync_rsa_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument 550 dasync_rsa_init(RSA *rsa) argument 554 dasync_rsa_finish(RSA *rsa) argument [all...] |
/freebsd-13-stable/crypto/heimdal/include/hcrypto/ |
H A D | Makefile.am | 26 rsa.h \
|
/freebsd-13-stable/libexec/rc/rc.d/ |
H A D | sshd | 40 rsa|dsa|ecdsa|ed25519) 65 sshd_keygen_alg rsa
|
/freebsd-13-stable/contrib/netbsd-tests/crypto/libcrypto/ |
H A D | t_pubkey.sh | 48 atf_test_case rsa 105 atf_add_test_case rsa
|
/freebsd-13-stable/crypto/openssh/regress/ |
H A D | conch-ciphers.sh | 19 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
|
H A D | keytype.sh | 10 ktypes="dsa-1024 rsa-2048 rsa-3072 ed25519-512" 40 rsa-*) t=rsa-sha2-512,rsa-sha2-256,ssh-rsa;;
|
/freebsd-13-stable/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | sig_fuzz.cc | 28 static struct sshkey *rsa = generate_or_die(KEY_RSA, 2048); local 40 sshkey_verify(rsa, sig, slen, (const u_char *)data, dlen, NULL, 0);
|
/freebsd-13-stable/crypto/openssh/regress/unittests/hostkeys/ |
H A D | mktestdata.sh | 8 rm -f rsa* dsa* ecdsa* ed25519* 16 ssh-keygen -qt rsa -b 1024 -C "RSA #$_n" -N "" -f rsa_$_n 83 echo "prometheus.example.com ssh-rsa AAAATgAAAAdzc2gtWFhYAAAAP0ZVQ0tPRkZGVUNLT0ZGRlVDS09GRkZVQ0tPRkZGVUNLT0ZGRlVDS09GRkZVQ0tPRkZGVUNLT0ZGRlVDS09GRg=="
|
/freebsd-13-stable/crypto/openssh/openbsd-compat/ |
H A D | openssl-compat.h | 25 #include <openssl/rsa.h> 206 int (*RSA_meth_get_finish(const RSA_METHOD *meth))(RSA *rsa); 211 const unsigned char *from, unsigned char *to, RSA *rsa, int padding)); 216 const unsigned char *from, unsigned char *to, RSA *rsa, int padding)); 220 int RSA_meth_set_finish(RSA_METHOD *meth, int (*finish)(RSA *rsa));
|
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_rsa.c | 101 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) argument 106 if (rsa == NULL) { 115 RSA_up_ref(rsa); 116 if (EVP_PKEY_assign_RSA(pkey, rsa) <= 0) { 117 RSA_free(rsa); 170 RSA *rsa = NULL; local 184 rsa = d2i_RSAPrivateKey_bio(in, NULL); 187 rsa = PEM_read_bio_RSAPrivateKey(in, NULL, 194 if (rsa == NULL) { 198 ret = SSL_use_RSAPrivateKey(ssl, rsa); 209 RSA *rsa; local 415 SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa) argument 445 RSA *rsa = NULL; local 485 RSA *rsa; local [all...] |