/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_gen.c | 1 /* crypto/rsa/rsa_gen.c */ 69 #include <openssl/rsa.h> 71 static int rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb); 78 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument 80 if(rsa->meth->rsa_keygen) 81 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); 82 return rsa_builtin_keygen(rsa, bits, e_value, cb); 85 static int rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument 106 if(!rsa [all...] |
H A D | rsa_null.c | 62 #include <openssl/rsa.h> 73 unsigned char *to, RSA *rsa,int padding); 75 unsigned char *to, RSA *rsa,int padding); 77 unsigned char *to, RSA *rsa,int padding); 79 unsigned char *to, RSA *rsa,int padding); 81 static int RSA_null_mod_exp(const BIGNUM *r0, const BIGNUM *i, RSA *rsa); 83 static int RSA_null_init(RSA *rsa); 84 static int RSA_null_finish(RSA *rsa); 108 unsigned char *to, RSA *rsa, int padding) 115 unsigned char *to, RSA *rsa, in 107 RSA_null_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 114 RSA_null_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 121 RSA_null_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 128 RSA_null_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 143 RSA_null_init(RSA *rsa) argument 148 RSA_null_finish(RSA *rsa) argument [all...] |
H A D | rsa_depr.c | 1 /* crypto/rsa/rsa_depr.c */ 63 #include <openssl/rsa.h> 76 RSA *rsa = RSA_new(); local 79 if(!rsa || !e) goto err; 92 if(RSA_generate_key_ex(rsa, bits, e, &cb)) { 94 return rsa; 98 if(rsa) RSA_free(rsa);
|
H A D | rsa_eay.c | 1 /* crypto/rsa/rsa_eay.c */ 115 #include <openssl/rsa.h> 121 unsigned char *to, RSA *rsa,int padding); 123 unsigned char *to, RSA *rsa,int padding); 125 unsigned char *to, RSA *rsa,int padding); 127 unsigned char *to, RSA *rsa,int padding); 128 static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx); 129 static int RSA_eay_init(RSA *rsa); 130 static int RSA_eay_finish(RSA *rsa); 154 unsigned char *to, RSA *rsa, in 153 RSA_eay_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 255 rsa_get_blinding(RSA *rsa, int *local, BN_CTX *ctx) argument 348 RSA_eay_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 480 RSA_eay_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 611 RSA_eay_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 715 RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument 876 RSA_eay_init(RSA *rsa) argument 882 RSA_eay_finish(RSA *rsa) argument [all...] |
H A D | rsa_locl.h | 4 RSA *rsa);
|
H A D | rsa_lib.c | 1 /* crypto/rsa/rsa_lib.c */ 64 #include <openssl/rsa.h> 104 const RSA_METHOD *RSA_get_method(const RSA *rsa) argument 106 return rsa->meth; 109 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth) argument 114 mtmp = rsa->meth; 115 if (mtmp->finish) mtmp->finish(rsa); 117 if (rsa->engine) 119 ENGINE_finish(rsa->engine); 120 rsa 288 RSA_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 294 RSA_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 300 RSA_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 306 RSA_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 317 RSA_blinding_off(RSA *rsa) argument 328 RSA_blinding_on(RSA *rsa, BN_CTX *ctx) argument 371 RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx) argument [all...] |
H A D | rsa.h | 1 /* crypto/rsa/rsa.h */ 90 RSA *rsa,int padding); 93 RSA *rsa,int padding); 96 RSA *rsa,int padding); 99 RSA *rsa,int padding); 100 int (*rsa_mod_exp)(BIGNUM *r0,const BIGNUM *I,RSA *rsa,BN_CTX *ctx); /* Can be null */ 104 int (*init)(RSA *rsa); /* called at new */ 105 int (*finish)(RSA *rsa); /* called at free */ 117 unsigned char *sigret, unsigned int *siglen, const RSA *rsa); [all...] |
H A D | rsa_saos.c | 1 /* crypto/rsa/rsa_saos.c */ 62 #include <openssl/rsa.h> 68 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 79 j=RSA_size(rsa); 93 i=RSA_private_encrypt(i,s,sigret,rsa,RSA_PKCS1_PADDING); 107 RSA *rsa) 114 if (siglen != (unsigned int)RSA_size(rsa)) 126 i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_asn1.c | 62 #include <openssl/rsa.h> 103 RSA *RSAPublicKey_dup(RSA *rsa) 105 return ASN1_item_dup(ASN1_ITEM_rptr(RSAPublicKey), rsa); 108 RSA *RSAPrivateKey_dup(RSA *rsa) 110 return ASN1_item_dup(ASN1_ITEM_rptr(RSAPrivateKey), rsa);
|
H A D | rsa_ameth.c | 1 /* crypto/rsa/rsa_ameth.c */ 63 #include <openssl/rsa.h> 74 penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc); 89 RSA *rsa = NULL; local 92 if (!(rsa = d2i_RSAPublicKey(NULL, &p, pklen))) 97 EVP_PKEY_assign_RSA (pkey, rsa); 103 if (BN_cmp(b->pkey.rsa->n,a->pkey.rsa->n) != 0 104 || BN_cmp(b->pkey.rsa->e,a->pkey.rsa 112 RSA *rsa; local [all...] |
H A D | rsa_sign.c | 1 /* crypto/rsa/rsa_sign.c */ 62 #include <openssl/rsa.h> 71 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 80 if((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_sign) 82 return rsa->meth->rsa_sign(type, m, m_len, 83 sigret, siglen, rsa); 116 j=RSA_size(rsa); 133 i=RSA_private_encrypt(i,s,sigret,rsa,RSA_PKCS1_PADDING); 150 RSA *rsa) 70 RSA_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 146 int_rsa_verify(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *rm, size_t *prm_len, const unsigned char *sigbuf, size_t siglen, RSA *rsa) argument 273 RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument [all...] |
H A D | rsa_pmeth.c | 1 /* crypto/rsa/rsa_pmeth.c */ 63 #include <openssl/rsa.h> 156 RSA *rsa = ctx->pkey->pkey.rsa; local 174 sig, rsa, RSA_X931_PADDING); 180 tbs, tbslen, sig, &sltmp, rsa); 189 if (!RSA_padding_add_PKCS1_PSS(rsa, rctx->tbuf, tbs, 192 ret = RSA_private_encrypt(RSA_size(rsa), rctx->tbuf, 193 sig, rsa, RSA_NO_PADDING); 199 ret = RSA_private_encrypt(tbslen, tbs, sig, ctx->pkey->pkey.rsa, 270 RSA *rsa = ctx->pkey->pkey.rsa; local 522 RSA *rsa = NULL; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/demos/eay/ |
H A D | loadrsa.c | 2 #include <openssl/rsa.h> 24 RSA *rsa,*pub_rsa,*priv_rsa; local 28 rsa=RSA_generate_key(512,RSA_F4,callback,(char *)stdout); 35 len=i2d_RSAPublicKey(rsa,&p); 36 len+=i2d_RSAPrivateKey(rsa,&p); 41 RSA_free(rsa);
|
/barrelfish-master/include/openssl/ |
H A D | rsa.h | 1 /* crypto/rsa/rsa.h */ 90 RSA *rsa,int padding); 93 RSA *rsa,int padding); 96 RSA *rsa,int padding); 99 RSA *rsa,int padding); 100 int (*rsa_mod_exp)(BIGNUM *r0,const BIGNUM *I,RSA *rsa,BN_CTX *ctx); /* Can be null */ 104 int (*init)(RSA *rsa); /* called at new */ 105 int (*finish)(RSA *rsa); /* called at free */ 117 unsigned char *sigret, unsigned int *siglen, const RSA *rsa); [all...] |
/barrelfish-master/lib/openssl-1.0.0d/demos/engines/cluster_labs/ |
H A D | cluster_labs.h | 7 typedef int cl_rsa_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa); 9 unsigned char *to, RSA *rsa, int padding); 11 unsigned char *to, RSA *rsa, int padding); 13 unsigned char *to, RSA *rsa, int padding); 15 unsigned char *to, RSA *rsa, int padding);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | p_dec.c | 63 #include <openssl/rsa.h> 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 63 #include <openssl/rsa.h> 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
/barrelfish-master/lib/openssl-1.0.0d/demos/ |
H A D | spkigen.c | 26 #define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\ 27 (char *)(rsa)) 33 RSA *rsa=NULL; local 47 if ((rsa=RSA_generate_key(512,RSA_F4,NULL)) == NULL) goto err; 53 if ((rsa=PEM_read_RSAPrivateKey(fp,NULL,NULL)) == NULL) 58 if (!EVP_PKEY_assign_RSA(pkey,rsa)) goto err; 59 rsa=NULL; 78 PEM_write_RSAPrivateKey(stdout,pkey->pkey.rsa,NULL,NULL,0,NULL); 102 RSA_free(pkey->pkey.rsa);
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | rsa.c | 1 /* apps/rsa.c */ 68 #include <openssl/rsa.h> 104 RSA *rsa=NULL; local 296 rsa = EVP_PKEY_get1_RSA(pkey); 300 if (rsa == NULL) 326 if (!RSA_print(out,rsa,0)) 336 BN_print(out,rsa->n); 342 int r = RSA_check_key(rsa); 377 i=i2d_RSAPublicKey_bio(out,rsa); 379 i=i2d_RSA_PUBKEY_bio(out,rsa); [all...] |
H A D | genrsa.c | 75 #include <openssl/rsa.h> 108 RSA *rsa = NULL; local 269 rsa = RSA_new(); 271 rsa = RSA_new_method(e); 273 if (!rsa) 276 if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb)) 284 for (i=0; i<rsa->e->top; i++) 290 l+=rsa->e->d[i]; 297 if (!PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0, 305 if (rsa) RSA_fre [all...] |
/barrelfish-master/lib/openssl-1.0.0d/engines/ |
H A D | e_gmp.c | 89 #include <openssl/rsa.h> 108 static int e_gmp_rsa_mod_exp(BIGNUM *r, const BIGNUM *I, RSA *rsa, BN_CTX *ctx); 330 static E_GMP_RSA_CTX *e_gmp_get_rsa(RSA *rsa) argument 332 E_GMP_RSA_CTX *hptr = RSA_get_ex_data(rsa, hndidx_rsa); 350 if(!bn2gmp(rsa->n, hptr->n) || !bn2gmp(rsa->e, hptr->e)) 352 if(!rsa->p || !rsa->q || !rsa->d || !rsa 381 e_gmp_rsa_finish(RSA *rsa) argument 402 e_gmp_rsa_mod_exp(BIGNUM *r, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | i2d_pu.c | 65 #include <openssl/rsa.h> 80 return(i2d_RSAPublicKey(a->pkey.rsa,pp));
|
/barrelfish-master/lib/openssl-1.0.0d/demos/maurice/ |
H A D | example2.c | 13 #include <openssl/rsa.h> 58 len = RSA_public_encrypt(strlen(ct)+1, ct, buf, pubKey->pkey.rsa,RSA_PKCS1_PADDING); 66 RSA_private_decrypt(len, buf, buf2, privKey->pkey.rsa,RSA_PKCS1_PADDING);
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | ssl_rsa.c | 152 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) argument 157 if (rsa == NULL) 173 RSA_up_ref(rsa); 174 EVP_PKEY_assign_RSA(pkey,rsa); 205 (RSA_flags(pkey->pkey.rsa) & RSA_METHOD_FLAG_NO_CHECK)) 233 RSA *rsa=NULL; local 250 rsa=d2i_RSAPrivateKey_bio(in,NULL); 255 rsa=PEM_read_bio_RSAPrivateKey(in,NULL, 263 if (rsa == NULL) 268 ret=SSL_use_RSAPrivateKey(ssl,rsa); 280 RSA *rsa; local 521 SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa) argument 555 RSA *rsa=NULL; local 602 RSA *rsa; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/demos/x509/ |
H A D | mkreq.c | 30 RSA_print_fp(stdout,pkey->pkey.rsa,0); 63 RSA *rsa; local 73 rsa=RSA_generate_key(bits,RSA_F4,callback,NULL); 74 if (!EVP_PKEY_assign_RSA(pk,rsa)) 77 rsa=NULL;
|