/freebsd-9.3-release/crypto/openssh/ |
H A D | auth-rsa.c | 1 /* $OpenBSD: auth-rsa.c,v 1.86 2014/01/27 19:18:54 markus Exp $ */ 22 #include <openssl/rsa.h> 30 #include "rsa.h" 84 if (BN_mod(challenge, challenge, key->rsa->n, ctx) == 0) 99 if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { 102 BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE); 147 rsa_public_encrypt(encrypted_challenge, challenge, key->rsa); 228 if (BN_cmp(key->rsa->n, client_n) != 0) 232 keybits = BN_num_bits(key->rsa->n); 236 file, linenum, BN_num_bits(key->rsa [all...] |
H A D | ssh-pkcs11-client.c | 104 pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, argument 116 key.rsa = rsa; 130 if (slen <= (u_int)RSA_size(rsa)) { 142 wrap_key(RSA *rsa) argument 149 RSA_set_method(rsa, &helper_rsa); 210 wrap_key(k->rsa);
|
H A D | auth-rh-rsa.c | 1 /* $OpenBSD: auth-rh-rsa.c,v 1.43 2010/03/04 10:36:03 djm Exp $ */ 75 client_host_key->rsa == NULL)
|
/freebsd-9.3-release/crypto/openssh/contrib/caldera/ |
H A D | ssh-host-keygen | 27 $keygen -t rsa -f $keydir/ssh_host_rsa_key -C '' -N ''
|
/freebsd-9.3-release/crypto/openssh/regress/ |
H A D | agent-timeout.sh | 15 for t in rsa rsa1; do
|
H A D | conch-ciphers.sh | 19 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
|
H A D | keygen-change.sh | 9 for t in rsa dsa rsa1; do
|
/freebsd-9.3-release/etc/rc.d/ |
H A D | sshd | 43 rsa|dsa|ecdsa|ed25519) 68 sshd_keygen_alg rsa
|
/freebsd-9.3-release/usr.sbin/pc-sysinstall/backend-query/ |
H A D | setup-ssh-keys.sh | 51 ssh-keygen -q -t rsa -N '' -f .ssh/id_rsa
|
/freebsd-9.3-release/crypto/openssl/crypto/evp/ |
H A D | p_open.c | 67 # include <openssl/rsa.h> 90 size = RSA_size(priv->pkey.rsa);
|
H A D | m_ripemd.c | 69 # include <openssl/rsa.h>
|
H A D | m_sha.c | 69 # include <openssl/rsa.h>
|
H A D | m_md2.c | 70 # include <openssl/rsa.h>
|
H A D | m_md5.c | 70 # include <openssl/rsa.h>
|
H A D | m_mdc2.c | 69 # include <openssl/rsa.h>
|
/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | d2i_pu.c | 66 # include <openssl/rsa.h> 94 if ((ret->pkey.rsa = d2i_RSAPublicKey(NULL,
|
/freebsd-9.3-release/crypto/openssl/engines/ |
H A D | e_chil.c | 70 # include <openssl/rsa.h> 116 static int hwcrhk_rsa_mod_exp(BIGNUM *r, const BIGNUM *I, RSA *rsa, 122 static int hwcrhk_rsa_finish(RSA *rsa); 875 RSA *rsa = NULL; local 878 rsa = res->pkey.rsa; 879 res->pkey.rsa = RSA_new(); 880 res->pkey.rsa->n = rsa->n; 881 res->pkey.rsa 958 hwcrhk_rsa_mod_exp(BIGNUM *r, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument 1080 hwcrhk_rsa_finish(RSA *rsa) argument [all...] |
H A D | e_4758cca.c | 65 # include <openssl/rsa.h> 86 /* rsa functions */ 90 unsigned char *to, RSA *rsa, int padding); 92 unsigned char *to, RSA *rsa, int padding); 95 const RSA *rsa); 98 unsigned int siglen, const RSA *rsa); 561 unsigned char *to, RSA *rsa, int padding) 572 long outputLength = RSA_size(rsa); 574 unsigned char *keyToken = (unsigned char *)RSA_get_ex_data(rsa, hndidx); 590 unsigned char *to, RSA *rsa, in 560 cca_rsa_pub_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 589 cca_rsa_priv_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 618 cca_rsa_verify(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, const RSA *rsa) argument 730 cca_rsa_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, const RSA *rsa) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 94 RSA *rsa; member in union:hx509_private_key::__anon4600 204 RSA *rsa; local 212 rsa = RSA_new(); 213 if (rsa == NULL) { 225 rsa->n = heim_int2BN(&pk.modulus); 226 rsa->e = heim_int2BN(&pk.publicExponent); 230 if (rsa->n == NULL || rsa->e == NULL) { 236 tosize = RSA_size(rsa); 245 to, rsa, RSA_PKCS1_PADDIN 1166 RSA *rsa; local 2476 RSA *rsa; local [all...] |
/freebsd-9.3-release/crypto/openssl/demos/x509/ |
H A D | mkcert.c | 30 RSA_print_fp(stdout, pkey->pkey.rsa, 0); 68 RSA *rsa; local 85 rsa = RSA_generate_key(bits, RSA_F4, callback, NULL); 86 if (!EVP_PKEY_assign_RSA(pk, rsa)) { 90 rsa = NULL;
|
/freebsd-9.3-release/crypto/openssl/demos/ |
H A D | selfsign.c | 25 RSA_print_fp(stdout, pkey->pkey.rsa, 0); 80 RSA *rsa; local 99 rsa = RSA_generate_key(bits, RSA_F4, callback, NULL); 100 if (!EVP_PKEY_assign_RSA(pk, rsa)) { 104 rsa = NULL;
|
/freebsd-9.3-release/crypto/openssl/crypto/pem/ |
H A D | pem_all.c | 121 # include <openssl/rsa.h> 131 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 156 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) argument 165 if (rsa) { 166 RSA_free(*rsa); 167 *rsa = rtmp; 172 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, argument 177 return pkey_get_rsa(pktmp, rsa); 182 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) argument 186 return pkey_get_rsa(pktmp, rsa); [all...] |
H A D | pem_seal.c | 68 # include <openssl/rsa.h> 84 j = RSA_size(pubk[i]->pkey.rsa); 107 RSA_size(pubk[i]->pkey.rsa)); 155 i = RSA_size(priv->pkey.rsa);
|
/freebsd-9.3-release/contrib/wpa/src/tls/ |
H A D | Makefile | 21 rsa.o \
|
/freebsd-9.3-release/crypto/openssl/util/ |
H A D | speed.sh | 23 apps/ssleay speed rc4 rsa md2 >speed.2l 32 apps/ssleay speed rsa rc4 idea des >speed.4l
|