/freebsd-10-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_gen.c | 1 /* crypto/rsa/rsa_gen.c */ 69 #include <openssl/rsa.h> 72 extern int FIPS_rsa_x931_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, 76 static int rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, 86 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument 89 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 90 && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)) { 95 if (rsa->meth->rsa_keygen) 96 return rsa->meth->rsa_keygen(rsa, bit 104 rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument [all...] |
H A D | rsa_null.c | 63 #include <openssl/rsa.h> 75 unsigned char *to, RSA *rsa, int padding); 77 unsigned char *to, RSA *rsa, int padding); 79 unsigned char *to, RSA *rsa, int padding); 81 unsigned char *to, RSA *rsa, int padding); 83 static int RSA_null_mod_exp(const BIGNUM *r0, const BIGNUM *i, RSA *rsa); 85 static int RSA_null_init(RSA *rsa); 86 static int RSA_null_finish(RSA *rsa); 110 unsigned char *to, RSA *rsa, int padding) 117 unsigned char *to, RSA *rsa, in 109 RSA_null_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 116 RSA_null_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 124 RSA_null_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 132 RSA_null_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 147 RSA_null_init(RSA *rsa) argument 152 RSA_null_finish(RSA *rsa) argument [all...] |
H A D | rsa_crpt.c | 1 /* crypto/rsa/rsa_lib.c */ 64 #include <openssl/rsa.h> 76 RSA *rsa, int padding) 79 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 80 && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)) { 85 return (rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding)); 89 unsigned char *to, RSA *rsa, int padding) 92 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 93 && !(rsa 75 RSA_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 88 RSA_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 101 RSA_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 114 RSA_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 132 RSA_blinding_off(RSA *rsa) argument 142 RSA_blinding_on(RSA *rsa, BN_CTX *ctx) argument 188 RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx) argument [all...] |
H A D | rsa_depr.c | 1 /* crypto/rsa/rsa_depr.c */ 65 #include <openssl/rsa.h> 78 RSA *rsa = RSA_new(); local 81 if (!rsa || !e) 96 if (RSA_generate_key_ex(rsa, bits, e, &cb)) { 98 return rsa; 103 if (rsa) 104 RSA_free(rsa);
|
H A D | rsa_eay.c | 1 /* crypto/rsa/rsa_eay.c */ 115 #include <openssl/rsa.h> 121 unsigned char *to, RSA *rsa, int padding); 123 unsigned char *to, RSA *rsa, int padding); 125 unsigned char *to, RSA *rsa, int padding); 127 unsigned char *to, RSA *rsa, int padding); 128 static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, 130 static int RSA_eay_init(RSA *rsa); 131 static int RSA_eay_finish(RSA *rsa); 156 unsigned char *to, RSA *rsa, in 155 RSA_eay_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 256 rsa_get_blinding(RSA *rsa, int *local, BN_CTX *ctx) argument 348 RSA_eay_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 483 RSA_eay_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 617 RSA_eay_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 719 RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument 887 RSA_eay_init(RSA *rsa) argument 893 RSA_eay_finish(RSA *rsa) argument [all...] |
H A D | rsa_locl.h | 4 size_t siglen, RSA *rsa);
|
H A D | rsa_sign.c | 1 /* crypto/rsa/rsa_sign.c */ 62 #include <openssl/rsa.h> 71 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 81 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 82 && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)) { 87 if ((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_sign) { 88 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); 120 j = RSA_size(rsa); 70 RSA_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 168 int_rsa_verify(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *rm, size_t *prm_len, const unsigned char *sigbuf, size_t siglen, RSA *rsa) argument 303 RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument [all...] |
H A D | rsa_saos.c | 1 /* crypto/rsa/rsa_saos.c */ 62 #include <openssl/rsa.h> 69 RSA *rsa) 80 j = RSA_size(rsa); 93 i = RSA_private_encrypt(i, s, sigret, rsa, RSA_PKCS1_PADDING); 107 unsigned int siglen, RSA *rsa) 114 if (siglen != (unsigned int)RSA_size(rsa)) { 125 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa.h | 1 /* crypto/rsa/rsa.h */ 88 unsigned char *to, RSA *rsa, int padding); 90 unsigned char *to, RSA *rsa, int padding); 92 unsigned char *to, RSA *rsa, int padding); 94 unsigned char *to, RSA *rsa, int padding); 96 int (*rsa_mod_exp) (BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx); 101 int (*init) (RSA *rsa); 103 int (*finish) (RSA *rsa); 119 const RSA *rsa); [all...] |
H A D | rsa_asn1.c | 63 #include <openssl/rsa.h> 115 RSA *RSAPublicKey_dup(RSA *rsa) 117 return ASN1_item_dup(ASN1_ITEM_rptr(RSAPublicKey), rsa); 120 RSA *RSAPrivateKey_dup(RSA *rsa) 122 return ASN1_item_dup(ASN1_ITEM_rptr(RSAPrivateKey), rsa);
|
H A D | rsa_pmeth.c | 1 /* crypto/rsa/rsa_pmeth.c */ 64 #include <openssl/rsa.h> 168 RSA *rsa = ctx->pkey->pkey.rsa; local 172 if (rsa->flags & RSA_FLAG_NON_FIPS_ALLOW) 174 if (!(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) && rv) 190 RSA *rsa = ctx->pkey->pkey.rsa; local 208 ret = FIPS_rsa_sign_digest(rsa, tbs, tbslen, rctx->md, 225 tbs, tbslen, sig, &sltmp, rsa); 324 RSA *rsa = ctx->pkey->pkey.rsa; local 607 RSA *rsa = NULL; local [all...] |
/freebsd-10-stable/crypto/openssh/regress/ |
H A D | hostkey-rotate.sh | 7 HOSTKEY_TYPES="ecdsa-sha2-nistp256 ssh-ed25519 ssh-rsa ssh-dss" 62 check_key_present ssh-rsa || fail "didn't learn keys" 74 mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old 75 rm -f $OBJ/hkr.ssh-rsa 76 ${SSHKEYGEN} -qt ssh-rsa -f $OBJ/hkr.ssh-rsa -N '' || fatal "ssh-keygen $k" 80 check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub.old && fail "old key present" 81 check_key_present ssh-rsa || fai [all...] |
H A D | ssh2putty.sh | 22 openssl rsa -noout -text -in $KEYFILE | grep ^publicExponent | 28 openssl rsa -noout -modulus -in $KEYFILE | grep ^Modulus= |
|
/freebsd-10-stable/crypto/openssl/crypto/engine/ |
H A D | eng_rsax.c | 73 # include <openssl/rsa.h> 110 static int e_rsax_rsa_mod_exp(BIGNUM *r, const BIGNUM *I, RSA *rsa, 273 static E_RSAX_MOD_CTX *e_rsax_get_ctx(RSA *rsa, int idx, BIGNUM *m) argument 280 hptr = RSA_get_ex_data(rsa, rsax_ex_data_idx); 286 RSA_set_ex_data(rsa, rsax_ex_data_idx, hptr); 303 static int e_rsax_rsa_finish(RSA *rsa) argument 305 E_RSAX_MOD_CTX *hptr = RSA_get_ex_data(rsa, rsax_ex_data_idx); 308 RSA_set_ex_data(rsa, rsax_ex_data_idx, NULL); 310 if (rsa->_method_mod_n) 311 BN_MONT_CTX_free(rsa 512 e_rsax_rsa_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument [all...] |
/freebsd-10-stable/crypto/openssh/ |
H A D | rsa.h | 1 /* $OpenBSD: rsa.h,v 1.17 2014/06/24 01:13:21 djm Exp $ */ 20 #include <openssl/rsa.h>
|
H A D | rsa.c | 1 /* $OpenBSD: rsa.c,v 1.32 2014/06/24 01:13:21 djm Exp $ */ 70 #include "rsa.h" 162 rsa_generate_additional_parameters(RSA *rsa) argument 175 if ((BN_sub(aux, rsa->q, BN_value_one()) == 0) || 176 (BN_mod(rsa->dmq1, rsa->d, aux, ctx) == 0) || 177 (BN_sub(aux, rsa->p, BN_value_one()) == 0) || 178 (BN_mod(rsa->dmp1, rsa->d, aux, ctx) == 0)) {
|
H A D | sshconnect1.c | 36 #include "rsa.h" 100 packet_put_bignum(idlist->keys[i]->rsa->n); 235 packet_put_bignum(public->rsa->n); 321 respond_to_rsa_challenge(challenge, private->rsa); 357 packet_put_int(BN_num_bits(host_key->rsa->n)); 358 packet_put_bignum(host_key->rsa->e); 359 packet_put_bignum(host_key->rsa->n); 385 respond_to_rsa_challenge(challenge, host_key->rsa); 526 packet_get_bignum(server_key->rsa->e); 527 packet_get_bignum(server_key->rsa [all...] |
H A D | ssh-pkcs11.c | 69 int (*orig_finish)(RSA *rsa); 175 pkcs11_rsa_finish(RSA *rsa) argument 180 if ((k11 = RSA_get_app_data(rsa)) != NULL) { 182 rv = k11->orig_finish(rsa); 221 pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, argument 246 if ((k11 = RSA_get_app_data(rsa)) == NULL) { 247 error("RSA_get_app_data failed for rsa %p", rsa); 251 error("no pkcs11 (valid) provider for rsa %p", rsa); 305 pkcs11_rsa_private_decrypt(int flen, const u_char *from, u_char *to, RSA *rsa, int padding) argument 313 pkcs11_rsa_wrap(struct pkcs11_provider *provider, CK_ULONG slotidx, CK_ATTRIBUTE *keyid_attrib, RSA *rsa) argument 453 RSA *rsa; local [all...] |
/freebsd-10-stable/crypto/openssl/crypto/asn1/ |
H A D | i2d_pu.c | 65 # include <openssl/rsa.h> 79 return (i2d_RSAPublicKey(a->pkey.rsa, pp));
|
/freebsd-10-stable/crypto/openssl/crypto/evp/ |
H A D | p_dec.c | 63 # include <openssl/rsa.h> 83 RSA_private_decrypt(ekl, ek, key, priv->pkey.rsa, RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 63 # include <openssl/rsa.h> 82 RSA_public_encrypt(key_len, key, ek, pubk->pkey.rsa,
|
/freebsd-10-stable/crypto/openssl/apps/ |
H A D | rsa.c | 1 /* apps/rsa.c */ 68 # include <openssl/rsa.h> 105 RSA *rsa = NULL; local 297 rsa = EVP_PKEY_get1_RSA(pkey); 301 if (rsa == NULL) { 322 if (!RSA_print(out, rsa, 0)) { 330 BN_print(out, rsa->n); 335 int r = RSA_check_key(rsa); 367 i = i2d_RSAPublicKey_bio(out, rsa); 369 i = i2d_RSA_PUBKEY_bio(out, rsa); [all...] |
/freebsd-10-stable/crypto/heimdal/lib/hx509/ |
H A D | test_windows.in | 44 if ${hxtool} info | grep 'rsa: hcrypto null RSA' > /dev/null ; then 55 --generate-key=rsa \ 65 --generate-key=rsa \ 77 --generate-key=rsa \
|
/freebsd-10-stable/crypto/openssl/engines/ |
H A D | e_gmp.c | 93 # include <openssl/rsa.h> 112 static int e_gmp_rsa_mod_exp(BIGNUM *r, const BIGNUM *I, RSA *rsa, 332 static E_GMP_RSA_CTX *e_gmp_get_rsa(RSA *rsa) argument 334 E_GMP_RSA_CTX *hptr = RSA_get_ex_data(rsa, hndidx_rsa); 356 if (!bn2gmp(rsa->n, hptr->n) || !bn2gmp(rsa->e, hptr->e)) 358 if (!rsa->p || !rsa->q || !rsa->d || !rsa 387 e_gmp_rsa_finish(RSA *rsa) argument 409 e_gmp_rsa_mod_exp(BIGNUM *r, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument [all...] |
/freebsd-10-stable/crypto/openssl/ssl/ |
H A D | ssl_rsa.c | 144 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) argument 149 if (rsa == NULL) { 162 RSA_up_ref(rsa); 163 if (EVP_PKEY_assign_RSA(pkey, rsa) <= 0) { 164 RSA_free(rsa); 206 (RSA_flags(pkey->pkey.rsa) & RSA_METHOD_FLAG_NO_CHECK)) ; 232 RSA *rsa = NULL; local 246 rsa = d2i_RSAPrivateKey_bio(in, NULL); 249 rsa = PEM_read_bio_RSAPrivateKey(in, NULL, 257 if (rsa 274 RSA *rsa; local 502 SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa) argument 536 RSA *rsa = NULL; local 578 RSA *rsa; local [all...] |