Searched refs:rsa (Results 26 - 50 of 173) sorted by relevance

1234567

/freebsd-13-stable/crypto/openssl/crypto/rsa/
H A Drsa_pss.c13 #include <openssl/rsa.h>
25 int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash, argument
29 return RSA_verify_PKCS1_PSS_mgf1(rsa, mHash, Hash, NULL, EM, sLen);
32 int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, argument
67 MSBits = (BN_num_bits(rsa->n) - 1) & 0x7;
68 emLen = RSA_size(rsa);
138 int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM, argument
142 return RSA_padding_add_PKCS1_PSS_mgf1(rsa, EM, mHash, Hash, NULL, sLen);
145 int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM, argument
178 MSBits = (BN_num_bits(rsa
[all...]
H A Drsa_ameth.c33 const RSA *rsa = pkey->pkey.rsa; local
42 if (rsa->pss == NULL) {
47 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL)
54 static int rsa_param_decode(RSA *rsa, const X509_ALGOR *alg) argument
69 rsa->pss = rsa_pss_decode(alg);
70 if (rsa->pss == NULL)
84 penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc);
100 RSA *rsa = NULL; local
104 if ((rsa
139 RSA *rsa; local
184 RSA *rsa; local
[all...]
H A Drsa_asn1.c113 RSA *RSAPublicKey_dup(RSA *rsa)
115 return ASN1_item_dup(ASN1_ITEM_rptr(RSAPublicKey), rsa);
118 RSA *RSAPrivateKey_dup(RSA *rsa)
120 return ASN1_item_dup(ASN1_ITEM_rptr(RSAPrivateKey), rsa);
H A Drsa_none.c12 #include <openssl/rsa.h>
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dks_keychain.c86 RSA *rsa,
96 RSA *rsa,
107 RSA *rsa,
110 struct kc_rsa *kc = RSA_get_app_data(rsa);
160 RSA * rsa, int padding)
162 struct kc_rsa *kc = RSA_get_app_data(rsa);
221 kc_rsa_init(RSA *rsa) argument
227 kc_rsa_finish(RSA *rsa) argument
229 struct kc_rsa *kc_rsa = RSA_get_app_data(rsa);
259 RSA *rsa; local
83 kc_rsa_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
93 kc_rsa_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
104 kc_rsa_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
159 kc_rsa_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA * rsa, int padding) argument
[all...]
/freebsd-13-stable/crypto/openssh/
H A Dssh-pkcs11.c70 int (*orig_finish)(RSA *rsa);
176 pkcs11_rsa_finish(RSA *rsa) argument
181 if ((k11 = RSA_get_app_data(rsa)) != NULL) {
183 rv = k11->orig_finish(rsa);
223 pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, argument
248 if ((k11 = RSA_get_app_data(rsa)) == NULL) {
249 error("RSA_get_app_data failed for rsa %p", rsa);
253 error("no pkcs11 (valid) provider for rsa %p", rsa);
307 pkcs11_rsa_private_decrypt(int flen, const u_char *from, u_char *to, RSA *rsa, int padding) argument
315 pkcs11_rsa_wrap(struct pkcs11_provider *provider, CK_ULONG slotidx, CK_ATTRIBUTE *keyid_attrib, RSA *rsa) argument
455 have_rsa_key(const RSA *rsa) argument
469 RSA *rsa; local
[all...]
H A Dssh-rsa.c1 /* $OpenBSD: ssh-rsa.c,v 1.67 2018/07/03 11:39:54 djm Exp $ */
47 return "ssh-rsa";
49 return "rsa-sha2-256";
51 return "rsa-sha2-512";
63 if (strcmp(ident, "ssh-rsa") == 0)
65 if (strcmp(ident, "rsa-sha2-256") == 0)
67 if (strcmp(ident, "rsa-sha2-512") == 0)
84 if (strcmp(alg, "ssh-rsa-cert-v01@openssh.com") == 0)
86 if (strcmp(alg, "rsa-sha2-256-cert-v01@openssh.com") == 0)
88 if (strcmp(alg, "rsa
403 openssh_RSA_verify(int hash_alg, u_char *hash, size_t hashlen, u_char *sigbuf, size_t siglen, RSA *rsa) argument
[all...]
H A Dssh-pkcs11-client.c33 #include <openssl/rsa.h>
116 pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, argument
128 key.rsa = rsa;
147 if (slen <= (size_t)RSA_size(rsa)) {
159 wrap_key(RSA *rsa) argument
168 RSA_set_method(rsa, helper_rsa);
237 wrap_key(k->rsa);
/freebsd-13-stable/crypto/openssl/crypto/pem/
H A Dpem_all.c17 #include <openssl/rsa.h>
22 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
47 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) argument
56 if (rsa) {
57 RSA_free(*rsa);
58 *rsa = rtmp;
63 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, argument
68 return pkey_get_rsa(pktmp, rsa);
73 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) argument
77 return pkey_get_rsa(pktmp, rsa);
[all...]
/freebsd-13-stable/lib/libsecureboot/openpgp/
H A Dopgp_key.c78 RSA *rsa = NULL; local
126 rsa = RSA_new();
127 if (!rsa)
129 rsa->n = mpi2bn(&ptr);
130 rsa->e = mpi2bn(&ptr);
132 if (!key->key || !rsa->n || !rsa->e) {
135 if (!EVP_PKEY_set1_RSA(key->key, rsa))
146 if (rsa)
147 RSA_free(rsa);
[all...]
/freebsd-13-stable/crypto/openssl/apps/
H A Drsautl.c16 #include <openssl/rsa.h>
70 RSA *rsa = NULL; local
196 rsa = EVP_PKEY_get1_RSA(pkey);
199 if (rsa == NULL) {
212 keysize = RSA_size(rsa);
214 rsa_in = app_malloc(keysize * 2, "hold rsa key");
215 rsa_out = app_malloc(keysize, "output rsa key");
235 rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
240 RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
244 rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pa
[all...]
/freebsd-13-stable/crypto/openssl/crypto/x509/
H A Dx_all.c18 #include <openssl/rsa.h>
200 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) argument
202 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa);
205 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) argument
207 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa);
210 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) argument
212 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa);
215 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) argument
219 (void **)rsa);
222 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) argument
227 i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) argument
233 d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) argument
238 i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) argument
243 d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) argument
248 d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) argument
253 i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) argument
258 i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa) argument
[all...]
/freebsd-13-stable/lib/libsecureboot/
H A Dbrf.c370 ta->pkey.key.rsa.n = xblobdup(pk->key.rsa.n, pk->key.rsa.nlen);
371 ta->pkey.key.rsa.nlen = pk->key.rsa.nlen;
372 ta->pkey.key.rsa.e = xblobdup(pk->key.rsa.e, pk->key.rsa.elen);
373 ta->pkey.key.rsa.elen = pk->key.rsa
[all...]
/freebsd-13-stable/crypto/openssl/crypto/asn1/
H A Di2d_pu.c15 #include <openssl/rsa.h>
H A Dd2i_pu.c16 #include <openssl/rsa.h>
43 if ((ret->pkey.rsa = d2i_RSAPublicKey(NULL, pp, length)) == NULL) {
/freebsd-13-stable/crypto/openssl/engines/
H A De_dasync.c20 #include <openssl/rsa.h>
98 unsigned char *to, RSA *rsa, int padding);
100 unsigned char *to, RSA *rsa, int padding);
102 unsigned char *to, RSA *rsa, int padding);
104 unsigned char *to, RSA *rsa, int padding);
105 static int dasync_rsa_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa,
108 static int dasync_rsa_init(RSA *rsa);
109 static int dasync_rsa_finish(RSA *rsa);
510 unsigned char *to, RSA *rsa, int padding) {
514 (flen, from, to, rsa, paddin
509 dasync_pub_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
517 dasync_pub_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
525 dasync_rsa_priv_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
534 dasync_rsa_priv_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
543 dasync_rsa_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument
550 dasync_rsa_init(RSA *rsa) argument
554 dasync_rsa_finish(RSA *rsa) argument
[all...]
/freebsd-13-stable/crypto/heimdal/include/hcrypto/
H A DMakefile.am26 rsa.h \
/freebsd-13-stable/libexec/rc/rc.d/
H A Dsshd40 rsa|dsa|ecdsa|ed25519)
65 sshd_keygen_alg rsa
/freebsd-13-stable/contrib/netbsd-tests/crypto/libcrypto/
H A Dt_pubkey.sh48 atf_test_case rsa
105 atf_add_test_case rsa
/freebsd-13-stable/crypto/openssh/regress/
H A Dconch-ciphers.sh19 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
H A Dkeytype.sh10 ktypes="dsa-1024 rsa-2048 rsa-3072 ed25519-512"
40 rsa-*) t=rsa-sha2-512,rsa-sha2-256,ssh-rsa;;
/freebsd-13-stable/crypto/openssh/regress/misc/fuzz-harness/
H A Dsig_fuzz.cc28 static struct sshkey *rsa = generate_or_die(KEY_RSA, 2048); local
40 sshkey_verify(rsa, sig, slen, (const u_char *)data, dlen, NULL, 0);
/freebsd-13-stable/crypto/openssh/regress/unittests/hostkeys/
H A Dmktestdata.sh8 rm -f rsa* dsa* ecdsa* ed25519*
16 ssh-keygen -qt rsa -b 1024 -C "RSA #$_n" -N "" -f rsa_$_n
83 echo "prometheus.example.com ssh-rsa AAAATgAAAAdzc2gtWFhYAAAAP0ZVQ0tPRkZGVUNLT0ZGRlVDS09GRkZVQ0tPRkZGVUNLT0ZGRlVDS09GRkZVQ0tPRkZGVUNLT0ZGRlVDS09GRg=="
/freebsd-13-stable/crypto/openssh/openbsd-compat/
H A Dopenssl-compat.h25 #include <openssl/rsa.h>
206 int (*RSA_meth_get_finish(const RSA_METHOD *meth))(RSA *rsa);
211 const unsigned char *from, unsigned char *to, RSA *rsa, int padding));
216 const unsigned char *from, unsigned char *to, RSA *rsa, int padding));
220 int RSA_meth_set_finish(RSA_METHOD *meth, int (*finish)(RSA *rsa));
/freebsd-13-stable/crypto/openssl/ssl/
H A Dssl_rsa.c101 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) argument
106 if (rsa == NULL) {
115 RSA_up_ref(rsa);
116 if (EVP_PKEY_assign_RSA(pkey, rsa) <= 0) {
117 RSA_free(rsa);
170 RSA *rsa = NULL; local
184 rsa = d2i_RSAPrivateKey_bio(in, NULL);
187 rsa = PEM_read_bio_RSAPrivateKey(in, NULL,
194 if (rsa == NULL) {
198 ret = SSL_use_RSAPrivateKey(ssl, rsa);
209 RSA *rsa; local
415 SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa) argument
445 RSA *rsa = NULL; local
485 RSA *rsa; local
[all...]

Completed in 317 milliseconds

1234567