/freebsd/crypto/openssl/test/ |
H A D | rsa_test.c | 33 RSA_set0_key(key, \ 385 if (TEST_true(RSA_set0_key(key, BN_bin2bn(num, bytes, NULL), in test_rsa_security_bit() 499 && TEST_true(RSA_set0_key(rsa, n, e, d)) in test_EVP_rsa_legacy_key() 568 || !RSA_set0_key(rsa, pn, pe, pd))) { in load_key()
|
H A D | rsa_sp800_56b_test.c | 248 && TEST_true(RSA_set0_key(key, n, e, d)); in test_check_private_exponent() 434 && TEST_true(RSA_set0_key(key, n, e, d)); in test_invalid_keypair() 516 && TEST_true(RSA_set0_key(key, n, e, d)); in test_check_private_key() 548 && TEST_true(RSA_set0_key(key, n, e, NULL)); in test_check_public_key()
|
H A D | asn1_internal_test.c | 134 || !TEST_true(RSA_set0_key(rsa, n, e, NULL))) in test_empty_nonoptional_content()
|
H A D | rsa_mp_test.c | 141 if (!TEST_int_eq(RSA_set0_key(key, in key2048_key()
|
H A D | keymgmt_internal_test.c | 186 || !TEST_true(RSA_set0_key(rsa, bn1, bn2, bn3))) in test_pass_rsa()
|
H A D | enginetest.c | 242 if (!RSA_set0_key(rsa, BN_bin2bn(n, sizeof(n)-1, NULL), in get_test_pkey()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 23 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 81 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 129 in the call and may therefore I<not> be passed to RSA_set0_key(). If 143 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/freebsd/crypto/openssh/ |
H A D | ssh-rsa.c | 175 if (!RSA_set0_key(rsa_to, rsa_n_dup, rsa_e_dup, NULL)) { in ssh_rsa_copy_public() 210 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) { in ssh_rsa_deserialize_public() 258 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) { in ssh_rsa_deserialize_private() 272 if (!RSA_set0_key(rsa, NULL, NULL, rsa_d)) { in ssh_rsa_deserialize_private()
|
H A D | ssh-pkcs11.c | 896 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) in pkcs11_fetch_rsa_pubkey()
|
/freebsd/contrib/libfido2/fuzz/ |
H A D | wrapped.sym | 77 RSA_set0_key
|
H A D | wrap.c | 235 RSA_set0_key,
|
/freebsd/contrib/ntp/include/ |
H A D | libssl_compat.h | 94 #define RSA_set0_key sslshim_RSA_set0_key macro
|
/freebsd/contrib/libfido2/src/ |
H A D | rs256.c | 173 if ((rsa = RSA_new()) == NULL || RSA_set0_key(rsa, n, e, NULL) == 0) { in rs256_pk_to_EVP_PKEY()
|
/freebsd/contrib/unbound/sldns/ |
H A D | keyraw.c | 442 if (!RSA_set0_key(rsa, modulus, exponent, NULL)) { in sldns_key_buf2rsa_raw()
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_backend.c | 120 if (!RSA_set0_key(rsa, n, e, d)) in ossl_rsa_fromdata()
|
H A D | rsa_lib.c | 401 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d) in RSA_set0_key() function
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | rsa.h | 218 OSSL_DEPRECATEDIN_3_0 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d);
|
/freebsd/crypto/openssl/doc/internal/man7/ |
H A D | EVP_PKEY.pod | 68 modified at will with functions like L<RSA_set0_key(3)>. Note that if the
|
/freebsd/crypto/openssl/crypto/pem/ |
H A D | pvkfmt.c | 488 if (!RSA_set0_key(rsa, n, e, d)) in ossl_b2i_RSA_after_header()
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | ks_p11.c | 659 if (RSA_set0_key(rsa, n, e, NULL) != 1) { in collect_private_key()
|
H A D | crypto.c | 3040 ret = RSA_set0_key(rsa, new_d, n, e); in match_keys_rsa()
|
/freebsd/contrib/ldns/ |
H A D | dnssec.c | 477 if (!RSA_set0_key(rsa, modulus, exponent, NULL)) { in ldns_key_buf2rsa_raw()
|
H A D | keys.c | 876 if(!RSA_set0_key(rsa, n, e, d)) in ldns_key_new_frm_fp_rsa_l()
|
/freebsd/contrib/ntp/util/ |
H A D | ntp-keygen.c | 1466 RSA_set0_key(rsa, NULL, b, BN_dup(BN_value_one()));
|
/freebsd/crypto/openssl/engines/ |
H A D | e_capi.c | 703 RSA_set0_key(rkey, n, e, NULL); in capi_get_pkey()
|