/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/rsa/ |
H A D | rsa_gen.c | 19 /* crypto/rsa/rsa_gen.c */ 81 #include <openssl/rsa.h> 86 RSA *rsa=NULL; local 105 rsa=RSA_new(); 106 if (rsa == NULL) goto err; 109 rsa->e=BN_new(); 110 if (rsa->e == NULL) goto err; 118 BN_set_bit(rsa->e,i); 121 if (!BN_set_word(rsa->e,e_value)) goto err; 127 rsa [all...] |
H A D | rsa_null.c | 80 #include <openssl/rsa.h> 91 unsigned char *to, RSA *rsa,int padding); 93 unsigned char *to, RSA *rsa,int padding); 95 unsigned char *to, RSA *rsa,int padding); 97 unsigned char *to, RSA *rsa,int padding); 99 static int RSA_null_mod_exp(BIGNUM *r0, BIGNUM *i, RSA *rsa); 101 static int RSA_null_init(RSA *rsa); 102 static int RSA_null_finish(RSA *rsa); 122 unsigned char *to, RSA *rsa, int padding) 129 unsigned char *to, RSA *rsa, in 121 RSA_null_public_encrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 128 RSA_null_private_encrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 135 RSA_null_private_decrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 142 RSA_null_public_decrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 157 RSA_null_init(RSA *rsa) argument 162 RSA_null_finish(RSA *rsa) argument [all...] |
H A D | rsa_eay.c | 19 /* crypto/rsa/rsa_eay.c */ 80 #include <openssl/rsa.h> 87 unsigned char *to, RSA *rsa,int padding); 89 unsigned char *to, RSA *rsa,int padding); 91 unsigned char *to, RSA *rsa,int padding); 93 unsigned char *to, RSA *rsa,int padding); 94 static int RSA_eay_mod_exp(BIGNUM *r0, BIGNUM *i, RSA *rsa); 95 static int RSA_eay_init(RSA *rsa); 96 static int RSA_eay_finish(RSA *rsa); 117 unsigned char *to, RSA *rsa, in 116 RSA_eay_public_encrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 190 RSA_eay_private_encrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 266 RSA_eay_private_decrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 361 RSA_eay_public_decrypt(int flen, unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 433 RSA_eay_mod_exp(BIGNUM *r0, BIGNUM *I, RSA *rsa) argument 497 RSA_eay_init(RSA *rsa) argument 503 RSA_eay_finish(RSA *rsa) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/fips/rsa/ |
H A D | fips_rsa_gen.c | 1 /* crypto/rsa/rsa_gen.c */ 70 #include <openssl/rsa.h> 85 int fips_check_rsa(RSA *rsa) argument 92 pk.pkey.rsa = rsa; 103 ctbuf = OPENSSL_malloc(RSA_size(rsa)); 107 len = RSA_public_encrypt(sizeof(tbs) - 1, tbs, ctbuf, rsa, RSA_PKCS1_PADDING); 113 ptbuf = OPENSSL_malloc(RSA_size(rsa)); 117 len = RSA_private_decrypt(len, ctbuf, ptbuf, rsa, RSA_PKCS1_PADDING); 143 static int rsa_builtin_keygen(RSA *rsa, in 150 RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument 157 rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument [all...] |
H A D | fips_rsa_x931g.c | 1 /* crypto/rsa/rsa_gen.c */ 64 #include <openssl/rsa.h> 69 extern int fips_check_rsa(RSA *rsa); 74 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, BIGNUM *q2, argument 82 if (!rsa) 97 if (!rsa->e) 99 rsa->e = BN_dup(e); 100 if (!rsa->e) 104 e = rsa->e; 110 if (Xp && !rsa 204 RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e, BN_GENCB *cb) argument [all...] |
H A D | fips_rsa_eay.c | 1 /* crypto/rsa/rsa_eay.c */ 114 #include <openssl/rsa.h> 122 unsigned char *to, RSA *rsa,int padding); 124 unsigned char *to, RSA *rsa,int padding); 126 unsigned char *to, RSA *rsa,int padding); 128 unsigned char *to, RSA *rsa,int padding); 129 static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx); 130 static int RSA_eay_init(RSA *rsa); 131 static int RSA_eay_finish(RSA *rsa); 155 * MONT_HELPER(rsa, bn_ct 164 RSA_eay_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 276 rsa_get_blinding(RSA *rsa, int *local, BN_CTX *ctx) argument 367 RSA_eay_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 509 RSA_eay_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 650 RSA_eay_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 764 RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument 916 RSA_eay_init(RSA *rsa) argument 923 RSA_eay_finish(RSA *rsa) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/rsa/ |
H A D | rsa_null.c | 62 #include <openssl/rsa.h> 73 unsigned char *to, RSA *rsa,int padding); 75 unsigned char *to, RSA *rsa,int padding); 77 unsigned char *to, RSA *rsa,int padding); 79 unsigned char *to, RSA *rsa,int padding); 81 static int RSA_null_mod_exp(const BIGNUM *r0, const BIGNUM *i, RSA *rsa); 83 static int RSA_null_init(RSA *rsa); 84 static int RSA_null_finish(RSA *rsa); 108 unsigned char *to, RSA *rsa, int padding) 115 unsigned char *to, RSA *rsa, in 107 RSA_null_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 114 RSA_null_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 121 RSA_null_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 128 RSA_null_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 143 RSA_null_init(RSA *rsa) argument 148 RSA_null_finish(RSA *rsa) argument [all...] |
H A D | rsa_gen.c | 1 /* crypto/rsa/rsa_gen.c */ 69 #include <openssl/rsa.h> 73 static int rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb); 80 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument 82 if(rsa->meth->rsa_keygen) 83 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); 84 return rsa_builtin_keygen(rsa, bits, e_value, cb); 87 static int rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument 108 if(!rsa [all...] |
H A D | rsa_x931g.c | 1 /* crypto/rsa/rsa_gen.c */ 64 #include <openssl/rsa.h> 70 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, BIGNUM *q2, argument 78 if (!rsa) 93 if (!rsa->e) 95 rsa->e = BN_dup(e); 96 if (!rsa->e) 100 e = rsa->e; 106 if (Xp && !rsa->p) 108 rsa 200 RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e, BN_GENCB *cb) argument [all...] |
H A D | rsa_lib.c | 1 /* crypto/rsa/rsa_lib.c */ 64 #include <openssl/rsa.h> 71 RSA *rsa, int padding) 73 return(rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding)); 77 RSA *rsa, int padding) 80 if(FIPS_mode() && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)) 86 return(rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding)); 90 RSA *rsa, in 70 RSA_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 76 RSA_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 89 RSA_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 95 RSA_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 113 RSA_blinding_off(RSA *rsa) argument 124 RSA_blinding_on(RSA *rsa, BN_CTX *ctx) argument 167 RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx) argument [all...] |
H A D | rsa_depr.c | 1 /* crypto/rsa/rsa_depr.c */ 63 #include <openssl/rsa.h> 76 RSA *rsa = RSA_new(); local 79 if(!rsa || !e) goto err; 92 if(RSA_generate_key_ex(rsa, bits, e, &cb)) { 94 return rsa; 98 if(rsa) RSA_free(rsa);
|
H A D | rsa_eay.c | 1 /* crypto/rsa/rsa_eay.c */ 115 #include <openssl/rsa.h> 121 unsigned char *to, RSA *rsa,int padding); 123 unsigned char *to, RSA *rsa,int padding); 125 unsigned char *to, RSA *rsa,int padding); 127 unsigned char *to, RSA *rsa,int padding); 128 static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx); 129 static int RSA_eay_init(RSA *rsa); 130 static int RSA_eay_finish(RSA *rsa); 154 unsigned char *to, RSA *rsa, in 153 RSA_eay_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 255 rsa_get_blinding(RSA *rsa, int *local, BN_CTX *ctx) argument 348 RSA_eay_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 490 RSA_eay_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 631 RSA_eay_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 735 RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument 896 RSA_eay_init(RSA *rsa) argument 902 RSA_eay_finish(RSA *rsa) argument [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/ |
H A D | CreateCerts.sh | 37 ${OPENSSL} req -x509 -nodes -days 365 -subj '/CN=SecurityTest CA Cert (RSA)' -newkey rsa:1024 -keyout CAKey.rsa.pem -out CACert.rsa.pem 45 ${OPENSSL} req -new -nodes -days 365 -subj '/CN=SecurityTests Server Cert (RSA)' -newkey rsa:1024 -keyout ServerKey.rsa.pem -out ServerReq.rsa.pem 53 ${OPENSSL} req -new -nodes -days 365 -subj '/CN=SecurityTests Client Cert (RSA)' -newkey rsa:1024 -keyout ClientKey.rsa.pem -out ClientReq.rsa.pem 58 ${OPENSSL} x509 -req -in ServerReq.rsa [all...] |
H A D | StartTLSServers.sh | 28 ${OPENSSL_DIR}/bin/openssl s_server -accept 4001 -state -key test-certs/ServerKey.rsa.pem -cert test-certs/ServerCert.rsa.rsa.pem -www -cipher ALL:eNULL > /tmp/s_server.rsa.rsa.log 2>&1 & 31 ${OPENSSL_DIR}/bin/openssl s_server -accept 4002 -state -key test-certs/ServerKey.rsa.pem -cert test-certs/ServerCert.rsa.ecc.pem -www -cipher ALL:eNULL > /tmp/s_server.rsa.ecc.log 2>&1 & 34 ${OPENSSL_DIR}/bin/openssl s_server -accept 4003 -state -key test-certs/ServerKey.ecc.pem -cert test-certs/ServerCert.ecc.rsa.pem -www -cipher ALL:eNULL > /tmp/s_server.ecc.rsa [all...] |
H A D | PreSecurityTests.sh | 30 ${OPENSSL_DIR}/bin/openssl s_server -accept 4445 -state -key test-certs/ServerKey.rsa.pem -cert test-certs/ServerCert.rsa.rsa.pem -www -cipher ALL:eNULL > /tmp/s_server.rsa.rsa.log 2>&1 & 33 ${OPENSSL_DIR}/bin/openssl s_server -accept 4446 -state -key test-certs/ServerKey.rsa.pem -cert test-certs/ServerCert.rsa.ecc.pem -www -cipher ALL:eNULL > /tmp/s_server.rsa.ecc.log 2>&1 & 36 ${OPENSSL_DIR}/bin/openssl s_server -accept 4447 -state -key test-certs/ServerKey.ecc.pem -cert test-certs/ServerCert.ecc.rsa.pem -www -cipher ALL:eNULL > /tmp/s_server.ecc.rsa [all...] |
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-rsa-eay.c | 88 #include "ossl-rsa.h" 94 unsigned char *to, RSA *rsa, int padding); 96 unsigned char *to, RSA *rsa, int padding); 98 unsigned char *to, RSA *rsa, int padding); 100 unsigned char *to, RSA *rsa, int padding); 101 static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx); 102 static int RSA_eay_init(RSA *rsa); 103 static int RSA_eay_finish(RSA *rsa); 282 unsigned char *to, RSA *rsa, int padding) 289 if (BN_num_bits(rsa 281 RSA_eay_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 485 RSA_eay_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 638 RSA_eay_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 786 RSA_eay_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 903 RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument 1098 RSA_eay_init(RSA *rsa) argument 1105 RSA_eay_finish(RSA *rsa) argument 1123 eay_rsa_generate_key(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument [all...] |
H A D | ossl-rsa-cc.c | 34 #include "ossl-rsa.h" 44 unsigned char *to, RSA *rsa, int padding); 46 unsigned char *to, RSA *rsa, int padding); 48 static int cc_rsa_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx); 50 static int cc_rsa_init(RSA *rsa); 51 static int cc_rsa_finish(RSA *rsa); 58 static int cc_rsa_generate_key(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb); 61 cc_rsa_init(RSA *rsa __unused) 69 cc_rsa_finish(RSA *rsa __unused) 393 unsigned char *sig, unsigned int *len, const RSA *rsa) 392 cc_rsa_sign(int nid, const unsigned char *digest, unsigned int dlen, unsigned char *sig, unsigned int *len, const RSA *rsa) argument 415 cc_rsa_verify(int nid, const unsigned char *digest, unsigned int dlen, unsigned char *sigblob, unsigned int len, const RSA *rsa) argument 739 cc_rsa_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 894 cc_rsa_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 1012 cc_rsa_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx) argument 1458 cc_rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, void *cb) argument 1628 cc_rsa_generate_key(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | rsa.c | 43 #include <rsa.h> 59 * same rsa keys (1024 and 2048) 103 RSA *rsa; local 105 rsa = calloc(1, sizeof(*rsa)); 106 if (rsa == NULL) 109 rsa->references = 1; 113 rsa->engine = engine; 115 rsa->engine = ENGINE_get_default_RSA(); 118 if (rsa 143 RSA_free(RSA *rsa) argument 184 RSA_up_ref(RSA *rsa) argument 200 RSA_get_method(const RSA *rsa) argument 217 RSA_set_method(RSA *rsa, const RSA_METHOD *method) argument 243 RSA_set_app_data(RSA *rsa, void *arg) argument 260 RSA_get_app_data(const RSA *rsa) argument 269 RSA *rsa = rk_UNCONST(key); local 310 RSA_size(const RSA *rsa) argument 351 RSA_sign(int type, const unsigned char *from, unsigned int flen, unsigned char *to, unsigned int *tlen, RSA *rsa) argument 408 RSA_verify(int type, const unsigned char *from, unsigned int flen, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument 499 null_rsa_init(RSA *rsa) argument 505 null_rsa_finish(RSA *rsa) argument 565 d2i_RSAPrivateKey(RSA *rsa, const unsigned char **pp, size_t len) argument 607 i2d_RSAPrivateKey(RSA *rsa, unsigned char **pp) argument 657 i2d_RSAPublicKey(RSA *rsa, unsigned char **pp) argument 696 d2i_RSAPublicKey(RSA *rsa, const unsigned char **pp, size_t len) argument [all...] |
H A D | rsa-sf.c | 43 #include <rsa.h> 59 CreateKeyFromRSA(RSA *rsa, int use_public) argument 73 ret = _hc_BN_to_integer(rsa->n, &k.modulus); 75 ret = _hc_BN_to_integer(rsa->e, &k.publicExponent); 96 ret = _hc_BN_to_integer(rsa->n, &k.modulus); 98 ret = _hc_BN_to_integer(rsa->e, &k.publicExponent); 100 ret = _hc_BN_to_integer(rsa->d, &k.privateExponent); 102 ret = _hc_BN_to_integer(rsa->p, &k.prime1); 104 ret = _hc_BN_to_integer(rsa->q, &k.prime2); 106 ret = _hc_BN_to_integer(rsa 134 sf_rsa_public_encrypt(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, int padding) argument 157 sf_rsa_public_decrypt(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, int padding) argument 198 sf_rsa_private_encrypt(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, int padding) argument 221 sf_rsa_private_decrypt(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, int padding) argument 264 sf_rsa_generate_key(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) argument 270 sf_rsa_init(RSA *rsa) argument 276 sf_rsa_finish(RSA *rsa) argument [all...] |
H A D | test_rsa.c | 69 "time rsa generation", NULL }, 71 "rsa key file", NULL }, 75 "rsa key file", NULL }, 87 check_rsa(const unsigned char *in, size_t len, RSA *rsa, int padding) argument 93 res = malloc(RSA_size(rsa)); 97 res2 = malloc(RSA_size(rsa)); 103 keylen = RSA_private_encrypt((int)len, in, res, rsa, padding); 107 if (keylen > RSA_size(rsa)) 108 errx(1, "keylen > RSA_size(rsa)"); 110 keylen = RSA_public_decrypt(keylen, res, res2, rsa, paddin 163 RSA *rsa; local 210 RSA *rsa; local [all...] |
/macosx-10.10/OpenSSL098-52/src/demos/eay/ |
H A D | loadrsa.c | 2 #include <openssl/rsa.h> 24 RSA *rsa,*pub_rsa,*priv_rsa; local 28 rsa=RSA_generate_key(512,RSA_F4,callback,(char *)stdout); 35 len=i2d_RSAPublicKey(rsa,&p); 36 len+=i2d_RSAPrivateKey(rsa,&p); 41 RSA_free(rsa);
|
/macosx-10.10/ruby-106/ruby/ext/openssl/ |
H A D | ossl_pkey_rsa.c | 22 #define RSA_HAS_PRIVATE(rsa) ((rsa)->p && (rsa)->q) 23 #define RSA_PRIVATE(obj,rsa) (RSA_HAS_PRIVATE(rsa)||OSSL_PKEY_IS_PRIVATE(obj)) 35 rsa_instance(VALUE klass, RSA *rsa) argument 40 if (!rsa) { 46 if (!EVP_PKEY_assign_RSA(pkey, rsa)) { 81 RSA *rsa; member in struct:rsa_blocking_gen_arg 92 gen->result = RSA_generate_key_ex(gen->rsa, ge 105 RSA *rsa = RSA_new(); local 165 RSA *rsa; local 206 RSA *rsa; local 571 RSA *rsa; local [all...] |
/macosx-10.10/bind9-45.101/bind9/lib/dns/ |
H A D | opensslrsa_link.c | 50 #include <openssl/rsa.h> 80 #define SET_FLAGS(rsa) \ 82 (rsa)->flags &= ~(RSA_FLAG_CACHE_PUBLIC | RSA_FLAG_CACHE_PRIVATE); \ 83 (rsa)->flags |= RSA_FLAG_BLINDING; \ 86 #define SET_FLAGS(rsa) \ 88 (rsa)->flags |= RSA_FLAG_BLINDING; \ 94 #define SET_FLAGS(rsa) \ 96 (rsa)->flags &= ~(RSA_FLAG_CACHE_PUBLIC | RSA_FLAG_CACHE_PRIVATE); \ 97 (rsa)->flags &= ~RSA_FLAG_BLINDING; \ 100 #define SET_FLAGS(rsa) \ 371 RSA *rsa = key->keydata.rsa; local 518 RSA *rsa = key->keydata.rsa; local 735 RSA *rsa = RSA_new(); local 835 RSA *rsa = EVP_PKEY_get1_RSA(key->keydata.pkey); local 867 RSA *rsa; local 925 RSA *rsa; local 995 RSA *rsa; local 1112 rsa_check(RSA *rsa, RSA *pub) argument 1142 RSA *rsa = NULL, *pubrsa = NULL; local 1320 RSA *rsa = NULL, *pubrsa = NULL; local [all...] |
/macosx-10.10/Heimdal-398.1.2/tests/can/ |
H A D | check-can.in | 50 rsa=yes 52 if ${hxtool} info | grep 'rsa: hx509 null RSA' > /dev/null ; then 53 rsa=no 56 rsa=no 62 if test "$pkinit" = yes -a "$rsa" = yes ; then
|
/macosx-10.10/OpenSSH-189/osslshim/tests/ |
H A D | test_rsa.c | 99 "time rsa generation", NULL }, 101 "rsa key file", NULL }, 105 "rsa key file", NULL }, 146 check_rsa(const unsigned char *in, size_t len, RSA *rsa, int padding) argument 152 res = malloc(RSA_size(rsa)); 154 fprintf(stderr, "malloc(): failed to allocate %d bytes\n", (int)RSA_size(rsa)); 159 res2 = malloc(RSA_size(rsa)); 161 fprintf(stderr, "malloc(): failed to allocate %d bytes\n", (int)RSA_size(rsa)); 168 keylen = RSA_private_encrypt(len, in, res, rsa, padding); 175 if (keylen > RSA_size(rsa)) { 265 RSA *rsa; local 321 RSA *rsa; local [all...] |