Searched refs:rsa (Results 1 - 25 of 310) sorted by relevance

1234567891011>>

/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/rsa/
H A Drsa_gen.c19 /* crypto/rsa/rsa_gen.c */
81 #include <openssl/rsa.h>
86 RSA *rsa=NULL; local
105 rsa=RSA_new();
106 if (rsa == NULL) goto err;
109 rsa->e=BN_new();
110 if (rsa->e == NULL) goto err;
118 BN_set_bit(rsa->e,i);
121 if (!BN_set_word(rsa->e,e_value)) goto err;
127 rsa
[all...]
H A Drsa_null.c80 #include <openssl/rsa.h>
91 unsigned char *to, RSA *rsa,int padding);
93 unsigned char *to, RSA *rsa,int padding);
95 unsigned char *to, RSA *rsa,int padding);
97 unsigned char *to, RSA *rsa,int padding);
99 static int RSA_null_mod_exp(BIGNUM *r0, BIGNUM *i, RSA *rsa);
101 static int RSA_null_init(RSA *rsa);
102 static int RSA_null_finish(RSA *rsa);
122 unsigned char *to, RSA *rsa, int padding)
129 unsigned char *to, RSA *rsa, in
121 RSA_null_public_encrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
128 RSA_null_private_encrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
135 RSA_null_private_decrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
142 RSA_null_public_decrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
157 RSA_null_init(RSA *rsa) argument
162 RSA_null_finish(RSA *rsa) argument
[all...]
H A Drsa_eay.c19 /* crypto/rsa/rsa_eay.c */
80 #include <openssl/rsa.h>
87 unsigned char *to, RSA *rsa,int padding);
89 unsigned char *to, RSA *rsa,int padding);
91 unsigned char *to, RSA *rsa,int padding);
93 unsigned char *to, RSA *rsa,int padding);
94 static int RSA_eay_mod_exp(BIGNUM *r0, BIGNUM *i, RSA *rsa);
95 static int RSA_eay_init(RSA *rsa);
96 static int RSA_eay_finish(RSA *rsa);
117 unsigned char *to, RSA *rsa, in
116 RSA_eay_public_encrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
190 RSA_eay_private_encrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
266 RSA_eay_private_decrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
361 RSA_eay_public_decrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
433 RSA_eay_mod_exp(BIGNUM *r0, BIGNUM *I, RSA *rsa) argument
497 RSA_eay_init(RSA *rsa) argument
503 RSA_eay_finish(RSA *rsa) argument
[all...]
/macosx-10.10/OpenSSL098-52/src/fips/rsa/
H A Dfips_rsa_gen.c1 /* crypto/rsa/rsa_gen.c */
70 #include <openssl/rsa.h>
85 int fips_check_rsa(RSA *rsa) argument
92 pk.pkey.rsa = rsa;
103 ctbuf = OPENSSL_malloc(RSA_size(rsa));
107 len = RSA_public_encrypt(sizeof(tbs) - 1, tbs, ctbuf, rsa, RSA_PKCS1_PADDING);
113 ptbuf = OPENSSL_malloc(RSA_size(rsa));
117 len = RSA_private_decrypt(len, ctbuf, ptbuf, rsa, RSA_PKCS1_PADDING);
143 static int rsa_builtin_keygen(RSA *rsa, in
150 RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument
157 rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument
[all...]
H A Dfips_rsa_x931g.c1 /* crypto/rsa/rsa_gen.c */
64 #include <openssl/rsa.h>
69 extern int fips_check_rsa(RSA *rsa);
74 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, BIGNUM *q2, argument
82 if (!rsa)
97 if (!rsa->e)
99 rsa->e = BN_dup(e);
100 if (!rsa->e)
104 e = rsa->e;
110 if (Xp && !rsa
204 RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e, BN_GENCB *cb) argument
[all...]
H A Dfips_rsa_eay.c1 /* crypto/rsa/rsa_eay.c */
114 #include <openssl/rsa.h>
122 unsigned char *to, RSA *rsa,int padding);
124 unsigned char *to, RSA *rsa,int padding);
126 unsigned char *to, RSA *rsa,int padding);
128 unsigned char *to, RSA *rsa,int padding);
129 static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx);
130 static int RSA_eay_init(RSA *rsa);
131 static int RSA_eay_finish(RSA *rsa);
155 * MONT_HELPER(rsa, bn_ct
164 RSA_eay_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
276 rsa_get_blinding(RSA *rsa, int *local, BN_CTX *ctx) argument
367 RSA_eay_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
509 RSA_eay_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
650 RSA_eay_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
764 RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument
916 RSA_eay_init(RSA *rsa) argument
923 RSA_eay_finish(RSA *rsa) argument
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/rsa/
H A Drsa_null.c62 #include <openssl/rsa.h>
73 unsigned char *to, RSA *rsa,int padding);
75 unsigned char *to, RSA *rsa,int padding);
77 unsigned char *to, RSA *rsa,int padding);
79 unsigned char *to, RSA *rsa,int padding);
81 static int RSA_null_mod_exp(const BIGNUM *r0, const BIGNUM *i, RSA *rsa);
83 static int RSA_null_init(RSA *rsa);
84 static int RSA_null_finish(RSA *rsa);
108 unsigned char *to, RSA *rsa, int padding)
115 unsigned char *to, RSA *rsa, in
107 RSA_null_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
114 RSA_null_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
121 RSA_null_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
128 RSA_null_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
143 RSA_null_init(RSA *rsa) argument
148 RSA_null_finish(RSA *rsa) argument
[all...]
H A Drsa_gen.c1 /* crypto/rsa/rsa_gen.c */
69 #include <openssl/rsa.h>
73 static int rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb);
80 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument
82 if(rsa->meth->rsa_keygen)
83 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb);
84 return rsa_builtin_keygen(rsa, bits, e_value, cb);
87 static int rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument
108 if(!rsa
[all...]
H A Drsa_x931g.c1 /* crypto/rsa/rsa_gen.c */
64 #include <openssl/rsa.h>
70 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, BIGNUM *q2, argument
78 if (!rsa)
93 if (!rsa->e)
95 rsa->e = BN_dup(e);
96 if (!rsa->e)
100 e = rsa->e;
106 if (Xp && !rsa->p)
108 rsa
200 RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e, BN_GENCB *cb) argument
[all...]
H A Drsa_lib.c1 /* crypto/rsa/rsa_lib.c */
64 #include <openssl/rsa.h>
71 RSA *rsa, int padding)
73 return(rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding));
77 RSA *rsa, int padding)
80 if(FIPS_mode() && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW))
86 return(rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding));
90 RSA *rsa, in
70 RSA_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
76 RSA_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
89 RSA_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
95 RSA_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
113 RSA_blinding_off(RSA *rsa) argument
124 RSA_blinding_on(RSA *rsa, BN_CTX *ctx) argument
167 RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx) argument
[all...]
H A Drsa_depr.c1 /* crypto/rsa/rsa_depr.c */
63 #include <openssl/rsa.h>
76 RSA *rsa = RSA_new(); local
79 if(!rsa || !e) goto err;
92 if(RSA_generate_key_ex(rsa, bits, e, &cb)) {
94 return rsa;
98 if(rsa) RSA_free(rsa);
H A Drsa_eay.c1 /* crypto/rsa/rsa_eay.c */
115 #include <openssl/rsa.h>
121 unsigned char *to, RSA *rsa,int padding);
123 unsigned char *to, RSA *rsa,int padding);
125 unsigned char *to, RSA *rsa,int padding);
127 unsigned char *to, RSA *rsa,int padding);
128 static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx);
129 static int RSA_eay_init(RSA *rsa);
130 static int RSA_eay_finish(RSA *rsa);
154 unsigned char *to, RSA *rsa, in
153 RSA_eay_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
255 rsa_get_blinding(RSA *rsa, int *local, BN_CTX *ctx) argument
348 RSA_eay_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
490 RSA_eay_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
631 RSA_eay_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
735 RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument
896 RSA_eay_init(RSA *rsa) argument
902 RSA_eay_finish(RSA *rsa) argument
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/
H A DCreateCerts.sh37 ${OPENSSL} req -x509 -nodes -days 365 -subj '/CN=SecurityTest CA Cert (RSA)' -newkey rsa:1024 -keyout CAKey.rsa.pem -out CACert.rsa.pem
45 ${OPENSSL} req -new -nodes -days 365 -subj '/CN=SecurityTests Server Cert (RSA)' -newkey rsa:1024 -keyout ServerKey.rsa.pem -out ServerReq.rsa.pem
53 ${OPENSSL} req -new -nodes -days 365 -subj '/CN=SecurityTests Client Cert (RSA)' -newkey rsa:1024 -keyout ClientKey.rsa.pem -out ClientReq.rsa.pem
58 ${OPENSSL} x509 -req -in ServerReq.rsa
[all...]
H A DStartTLSServers.sh28 ${OPENSSL_DIR}/bin/openssl s_server -accept 4001 -state -key test-certs/ServerKey.rsa.pem -cert test-certs/ServerCert.rsa.rsa.pem -www -cipher ALL:eNULL > /tmp/s_server.rsa.rsa.log 2>&1 &
31 ${OPENSSL_DIR}/bin/openssl s_server -accept 4002 -state -key test-certs/ServerKey.rsa.pem -cert test-certs/ServerCert.rsa.ecc.pem -www -cipher ALL:eNULL > /tmp/s_server.rsa.ecc.log 2>&1 &
34 ${OPENSSL_DIR}/bin/openssl s_server -accept 4003 -state -key test-certs/ServerKey.ecc.pem -cert test-certs/ServerCert.ecc.rsa.pem -www -cipher ALL:eNULL > /tmp/s_server.ecc.rsa
[all...]
H A DPreSecurityTests.sh30 ${OPENSSL_DIR}/bin/openssl s_server -accept 4445 -state -key test-certs/ServerKey.rsa.pem -cert test-certs/ServerCert.rsa.rsa.pem -www -cipher ALL:eNULL > /tmp/s_server.rsa.rsa.log 2>&1 &
33 ${OPENSSL_DIR}/bin/openssl s_server -accept 4446 -state -key test-certs/ServerKey.rsa.pem -cert test-certs/ServerCert.rsa.ecc.pem -www -cipher ALL:eNULL > /tmp/s_server.rsa.ecc.log 2>&1 &
36 ${OPENSSL_DIR}/bin/openssl s_server -accept 4447 -state -key test-certs/ServerKey.ecc.pem -cert test-certs/ServerCert.ecc.rsa.pem -www -cipher ALL:eNULL > /tmp/s_server.ecc.rsa
[all...]
/macosx-10.10/OpenSSH-189/osslshim/ossl/
H A Dossl-rsa-eay.c88 #include "ossl-rsa.h"
94 unsigned char *to, RSA *rsa, int padding);
96 unsigned char *to, RSA *rsa, int padding);
98 unsigned char *to, RSA *rsa, int padding);
100 unsigned char *to, RSA *rsa, int padding);
101 static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx);
102 static int RSA_eay_init(RSA *rsa);
103 static int RSA_eay_finish(RSA *rsa);
282 unsigned char *to, RSA *rsa, int padding)
289 if (BN_num_bits(rsa
281 RSA_eay_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
485 RSA_eay_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
638 RSA_eay_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
786 RSA_eay_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
903 RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument
1098 RSA_eay_init(RSA *rsa) argument
1105 RSA_eay_finish(RSA *rsa) argument
1123 eay_rsa_generate_key(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument
[all...]
H A Dossl-rsa-cc.c34 #include "ossl-rsa.h"
44 unsigned char *to, RSA *rsa, int padding);
46 unsigned char *to, RSA *rsa, int padding);
48 static int cc_rsa_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx);
50 static int cc_rsa_init(RSA *rsa);
51 static int cc_rsa_finish(RSA *rsa);
58 static int cc_rsa_generate_key(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb);
61 cc_rsa_init(RSA *rsa __unused)
69 cc_rsa_finish(RSA *rsa __unused)
393 unsigned char *sig, unsigned int *len, const RSA *rsa)
392 cc_rsa_sign(int nid, const unsigned char *digest, unsigned int dlen, unsigned char *sig, unsigned int *len, const RSA *rsa) argument
415 cc_rsa_verify(int nid, const unsigned char *digest, unsigned int dlen, unsigned char *sigblob, unsigned int len, const RSA *rsa) argument
739 cc_rsa_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
894 cc_rsa_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument
1012 cc_rsa_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument
1458 cc_rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, void *cb) argument
1628 cc_rsa_generate_key(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/
H A Drsa.c43 #include <rsa.h>
59 * same rsa keys (1024 and 2048)
103 RSA *rsa; local
105 rsa = calloc(1, sizeof(*rsa));
106 if (rsa == NULL)
109 rsa->references = 1;
113 rsa->engine = engine;
115 rsa->engine = ENGINE_get_default_RSA();
118 if (rsa
143 RSA_free(RSA *rsa) argument
184 RSA_up_ref(RSA *rsa) argument
200 RSA_get_method(const RSA *rsa) argument
217 RSA_set_method(RSA *rsa, const RSA_METHOD *method) argument
243 RSA_set_app_data(RSA *rsa, void *arg) argument
260 RSA_get_app_data(const RSA *rsa) argument
269 RSA *rsa = rk_UNCONST(key); local
310 RSA_size(const RSA *rsa) argument
351 RSA_sign(int type, const unsigned char *from, unsigned int flen, unsigned char *to, unsigned int *tlen, RSA *rsa) argument
408 RSA_verify(int type, const unsigned char *from, unsigned int flen, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
499 null_rsa_init(RSA *rsa) argument
505 null_rsa_finish(RSA *rsa) argument
565 d2i_RSAPrivateKey(RSA *rsa, const unsigned char **pp, size_t len) argument
607 i2d_RSAPrivateKey(RSA *rsa, unsigned char **pp) argument
657 i2d_RSAPublicKey(RSA *rsa, unsigned char **pp) argument
696 d2i_RSAPublicKey(RSA *rsa, const unsigned char **pp, size_t len) argument
[all...]
H A Drsa-sf.c43 #include <rsa.h>
59 CreateKeyFromRSA(RSA *rsa, int use_public) argument
73 ret = _hc_BN_to_integer(rsa->n, &k.modulus);
75 ret = _hc_BN_to_integer(rsa->e, &k.publicExponent);
96 ret = _hc_BN_to_integer(rsa->n, &k.modulus);
98 ret = _hc_BN_to_integer(rsa->e, &k.publicExponent);
100 ret = _hc_BN_to_integer(rsa->d, &k.privateExponent);
102 ret = _hc_BN_to_integer(rsa->p, &k.prime1);
104 ret = _hc_BN_to_integer(rsa->q, &k.prime2);
106 ret = _hc_BN_to_integer(rsa
134 sf_rsa_public_encrypt(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, int padding) argument
157 sf_rsa_public_decrypt(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, int padding) argument
198 sf_rsa_private_encrypt(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, int padding) argument
221 sf_rsa_private_decrypt(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, int padding) argument
264 sf_rsa_generate_key(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) argument
270 sf_rsa_init(RSA *rsa) argument
276 sf_rsa_finish(RSA *rsa) argument
[all...]
H A Dtest_rsa.c69 "time rsa generation", NULL },
71 "rsa key file", NULL },
75 "rsa key file", NULL },
87 check_rsa(const unsigned char *in, size_t len, RSA *rsa, int padding) argument
93 res = malloc(RSA_size(rsa));
97 res2 = malloc(RSA_size(rsa));
103 keylen = RSA_private_encrypt((int)len, in, res, rsa, padding);
107 if (keylen > RSA_size(rsa))
108 errx(1, "keylen > RSA_size(rsa)");
110 keylen = RSA_public_decrypt(keylen, res, res2, rsa, paddin
163 RSA *rsa; local
210 RSA *rsa; local
[all...]
/macosx-10.10/OpenSSL098-52/src/demos/eay/
H A Dloadrsa.c2 #include <openssl/rsa.h>
24 RSA *rsa,*pub_rsa,*priv_rsa; local
28 rsa=RSA_generate_key(512,RSA_F4,callback,(char *)stdout);
35 len=i2d_RSAPublicKey(rsa,&p);
36 len+=i2d_RSAPrivateKey(rsa,&p);
41 RSA_free(rsa);
/macosx-10.10/ruby-106/ruby/ext/openssl/
H A Dossl_pkey_rsa.c22 #define RSA_HAS_PRIVATE(rsa) ((rsa)->p && (rsa)->q)
23 #define RSA_PRIVATE(obj,rsa) (RSA_HAS_PRIVATE(rsa)||OSSL_PKEY_IS_PRIVATE(obj))
35 rsa_instance(VALUE klass, RSA *rsa) argument
40 if (!rsa) {
46 if (!EVP_PKEY_assign_RSA(pkey, rsa)) {
81 RSA *rsa; member in struct:rsa_blocking_gen_arg
92 gen->result = RSA_generate_key_ex(gen->rsa, ge
105 RSA *rsa = RSA_new(); local
165 RSA *rsa; local
206 RSA *rsa; local
571 RSA *rsa; local
[all...]
/macosx-10.10/bind9-45.101/bind9/lib/dns/
H A Dopensslrsa_link.c50 #include <openssl/rsa.h>
80 #define SET_FLAGS(rsa) \
82 (rsa)->flags &= ~(RSA_FLAG_CACHE_PUBLIC | RSA_FLAG_CACHE_PRIVATE); \
83 (rsa)->flags |= RSA_FLAG_BLINDING; \
86 #define SET_FLAGS(rsa) \
88 (rsa)->flags |= RSA_FLAG_BLINDING; \
94 #define SET_FLAGS(rsa) \
96 (rsa)->flags &= ~(RSA_FLAG_CACHE_PUBLIC | RSA_FLAG_CACHE_PRIVATE); \
97 (rsa)->flags &= ~RSA_FLAG_BLINDING; \
100 #define SET_FLAGS(rsa) \
371 RSA *rsa = key->keydata.rsa; local
518 RSA *rsa = key->keydata.rsa; local
735 RSA *rsa = RSA_new(); local
835 RSA *rsa = EVP_PKEY_get1_RSA(key->keydata.pkey); local
867 RSA *rsa; local
925 RSA *rsa; local
995 RSA *rsa; local
1112 rsa_check(RSA *rsa, RSA *pub) argument
1142 RSA *rsa = NULL, *pubrsa = NULL; local
1320 RSA *rsa = NULL, *pubrsa = NULL; local
[all...]
/macosx-10.10/Heimdal-398.1.2/tests/can/
H A Dcheck-can.in50 rsa=yes
52 if ${hxtool} info | grep 'rsa: hx509 null RSA' > /dev/null ; then
53 rsa=no
56 rsa=no
62 if test "$pkinit" = yes -a "$rsa" = yes ; then
/macosx-10.10/OpenSSH-189/osslshim/tests/
H A Dtest_rsa.c99 "time rsa generation", NULL },
101 "rsa key file", NULL },
105 "rsa key file", NULL },
146 check_rsa(const unsigned char *in, size_t len, RSA *rsa, int padding) argument
152 res = malloc(RSA_size(rsa));
154 fprintf(stderr, "malloc(): failed to allocate %d bytes\n", (int)RSA_size(rsa));
159 res2 = malloc(RSA_size(rsa));
161 fprintf(stderr, "malloc(): failed to allocate %d bytes\n", (int)RSA_size(rsa));
168 keylen = RSA_private_encrypt(len, in, res, rsa, padding);
175 if (keylen > RSA_size(rsa)) {
265 RSA *rsa; local
321 RSA *rsa; local
[all...]

Completed in 158 milliseconds

1234567891011>>