/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_ossl.c | 22 unsigned char *to, RSA *rsa, int padding); 24 unsigned char *to, RSA *rsa, int padding); 26 unsigned char *to, RSA *rsa, int padding); 28 unsigned char *to, RSA *rsa, int padding); 29 static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, 31 static int rsa_ossl_init(RSA *rsa); 32 static int rsa_ossl_finish(RSA *rsa); 75 unsigned char *to, RSA *rsa, int padding) in rsa_ossl_public_encrypt() argument 82 if (BN_num_bits(rsa->n) > OPENSSL_RSA_MAX_MODULUS_BITS) { in rsa_ossl_public_encrypt() 87 if (BN_ucmp(rsa->n, rsa->e) <= 0) { in rsa_ossl_public_encrypt() [all …]
|
H A D | rsa_sp800_56b_gen.c | 57 int ossl_rsa_fips186_4_gen_prob_primes(RSA *rsa, RSA_ACVP_TEST *test, in ossl_rsa_fips186_4_gen_prob_primes() argument 115 if (rsa->p == NULL) in ossl_rsa_fips186_4_gen_prob_primes() 116 rsa->p = BN_secure_new(); in ossl_rsa_fips186_4_gen_prob_primes() 117 if (rsa->q == NULL) in ossl_rsa_fips186_4_gen_prob_primes() 118 rsa->q = BN_secure_new(); in ossl_rsa_fips186_4_gen_prob_primes() 119 if (rsa->p == NULL || rsa->q == NULL) in ossl_rsa_fips186_4_gen_prob_primes() 121 BN_set_flags(rsa->p, BN_FLG_CONSTTIME); in ossl_rsa_fips186_4_gen_prob_primes() 122 BN_set_flags(rsa->q, BN_FLG_CONSTTIME); in ossl_rsa_fips186_4_gen_prob_primes() 125 if (!ossl_bn_rsa_fips186_4_gen_prob_primes(rsa->p, Xpo, p1, p2, Xp, Xp1, Xp2, in ossl_rsa_fips186_4_gen_prob_primes() 130 if (!ossl_bn_rsa_fips186_4_gen_prob_primes(rsa->q, Xqo, q1, q2, Xq, Xq1, in ossl_rsa_fips186_4_gen_prob_primes() [all …]
|
H A D | rsa_gen.c | 30 static int rsa_keygen_pairwise_test(RSA *rsa, OSSL_CALLBACK *cb, void *cbarg); 31 static int rsa_keygen(OSSL_LIB_CTX *libctx, RSA *rsa, int bits, int primes, 41 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) in RSA_generate_key_ex() argument 43 if (rsa->meth->rsa_keygen != NULL) in RSA_generate_key_ex() 44 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_key_ex() 46 return RSA_generate_multi_prime_key(rsa, bits, RSA_DEFAULT_PRIME_NUM, in RSA_generate_key_ex() 50 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, in RSA_generate_multi_prime_key() argument 55 if (rsa->meth->rsa_multi_prime_keygen != NULL) { in RSA_generate_multi_prime_key() 56 return rsa->meth->rsa_multi_prime_keygen(rsa, bits, primes, in RSA_generate_multi_prime_key() 58 } else if (rsa->meth->rsa_keygen != NULL) { in RSA_generate_multi_prime_key() [all …]
|
H A D | rsa_x931g.c | 25 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, in RSA_X931_derive_ex() argument 34 if (!rsa) in RSA_X931_derive_ex() 49 if (!rsa->e) { in RSA_X931_derive_ex() 50 rsa->e = BN_dup(e); in RSA_X931_derive_ex() 51 if (!rsa->e) in RSA_X931_derive_ex() 54 e = rsa->e; in RSA_X931_derive_ex() 62 if (Xp && rsa->p == NULL) { in RSA_X931_derive_ex() 63 rsa->p = BN_new(); in RSA_X931_derive_ex() 64 if (rsa->p == NULL) in RSA_X931_derive_ex() 67 if (!BN_X931_derive_prime_ex(rsa->p, p1, p2, in RSA_X931_derive_ex() [all …]
|
H A D | rsa_sp800_56b_check.c | 24 int ossl_rsa_check_crt_components(const RSA *rsa, BN_CTX *ctx) in ossl_rsa_check_crt_components() argument 30 if (rsa->dmp1 == NULL || rsa->dmq1 == NULL || rsa->iqmp == NULL) { in ossl_rsa_check_crt_components() 31 if (rsa->dmp1 != NULL || rsa->dmq1 != NULL || rsa->iqmp != NULL) in ossl_rsa_check_crt_components() 50 && (BN_copy(p1, rsa->p) != NULL) in ossl_rsa_check_crt_components() 53 && (BN_copy(q1, rsa->q) != NULL) in ossl_rsa_check_crt_components() 56 && (BN_cmp(rsa->dmp1, BN_value_one()) > 0) in ossl_rsa_check_crt_components() 57 && (BN_cmp(rsa->dmp1, p1) < 0) in ossl_rsa_check_crt_components() 59 && (BN_cmp(rsa->dmq1, BN_value_one()) > 0) in ossl_rsa_check_crt_components() 60 && (BN_cmp(rsa->dmq1, q1) < 0) in ossl_rsa_check_crt_components() 62 && (BN_cmp(rsa->iqmp, BN_value_one()) > 0) in ossl_rsa_check_crt_components() [all …]
|
H A D | rsa_crpt.c | 34 RSA *rsa, int padding) in RSA_public_encrypt() argument 36 return rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding); in RSA_public_encrypt() 40 unsigned char *to, RSA *rsa, int padding) in RSA_private_encrypt() argument 42 return rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding); in RSA_private_encrypt() 46 unsigned char *to, RSA *rsa, int padding) in RSA_private_decrypt() argument 48 return rsa->meth->rsa_priv_dec(flen, from, to, rsa, padding); in RSA_private_decrypt() 52 RSA *rsa, int padding) in RSA_public_decrypt() argument 54 return rsa->meth->rsa_pub_dec(flen, from, to, rsa, padding); in RSA_public_decrypt() 62 void RSA_blinding_off(RSA *rsa) in RSA_blinding_off() argument 64 BN_BLINDING_free(rsa->blinding); in RSA_blinding_off() [all …]
|
H A D | rsa_backend.c | 64 int ossl_rsa_fromdata(RSA *rsa, const OSSL_PARAM params[], int include_private) in ossl_rsa_fromdata() argument 71 if (rsa == NULL) in ossl_rsa_fromdata() 86 if (!RSA_set0_key(rsa, n, e, d)) in ossl_rsa_fromdata() 101 && !ossl_rsa_set0_all_params(rsa, factors, exps, coeffs)) in ossl_rsa_fromdata() 123 int ossl_rsa_todata(RSA *rsa, OSSL_PARAM_BLD *bld, OSSL_PARAM params[], in DEFINE_SPECIAL_STACK_OF_CONST() 132 if (rsa == NULL || factors == NULL || exps == NULL || coeffs == NULL) in DEFINE_SPECIAL_STACK_OF_CONST() 135 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in DEFINE_SPECIAL_STACK_OF_CONST() 136 ossl_rsa_get0_all_params(rsa, factors, exps, coeffs); in DEFINE_SPECIAL_STACK_OF_CONST() 161 ossl_rsa_acvp_test_get_params(rsa, params); in DEFINE_SPECIAL_STACK_OF_CONST() 319 int ossl_rsa_is_foreign(const RSA *rsa) in ossl_rsa_is_foreign() argument [all …]
|
H A D | rsa_local.h | 106 unsigned char *to, RSA *rsa, int padding); 108 unsigned char *to, RSA *rsa, int padding); 110 unsigned char *to, RSA *rsa, int padding); 112 unsigned char *to, RSA *rsa, int padding); 114 int (*rsa_mod_exp) (BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx); 119 int (*init) (RSA *rsa); 121 int (*finish) (RSA *rsa); 135 const RSA *rsa); 138 unsigned int siglen, const RSA *rsa); 145 int (*rsa_keygen) (RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); [all …]
|
H A D | rsa_ameth.c | 32 const RSA *rsa = pkey->pkey.rsa; in rsa_param_encode() local 36 if (RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK) != RSA_FLAG_TYPE_RSASSAPSS) { in rsa_param_encode() 41 if (rsa->pss == NULL) { in rsa_param_encode() 46 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) in rsa_param_encode() 62 penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc); in rsa_pub_encode() 81 RSA *rsa = NULL; in rsa_pub_decode() local 85 if ((rsa = d2i_RSAPublicKey(NULL, &p, pklen)) == NULL) in rsa_pub_decode() 87 if (!ossl_rsa_param_decode(rsa, alg)) { in rsa_pub_decode() 88 RSA_free(rsa); in rsa_pub_decode() 92 RSA_clear_flags(rsa, RSA_FLAG_TYPE_MASK); in rsa_pub_decode() [all …]
|
H A D | rsa_meth.c | 108 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc() 115 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_enc() argument 124 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec() 131 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_dec() argument 140 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc() 147 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_enc() argument 156 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec() 163 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_dec() argument 172 (BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx) in RSA_meth_get_mod_exp() 178 int (*mod_exp) (BIGNUM *r0, const BIGNUM *i, RSA *rsa, in RSA_meth_set_mod_exp() argument [all …]
|
H A D | rsa_pmeth.c | 144 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_sign() local 156 ret = RSA_sign_ASN1_OCTET_STRING(0, tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 162 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign() 173 sig, rsa, RSA_X931_PADDING); in pkey_rsa_sign() 177 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 184 if (!RSA_padding_add_PKCS1_PSS_mgf1(rsa, in pkey_rsa_sign() 189 ret = RSA_private_encrypt(RSA_size(rsa), rctx->tbuf, in pkey_rsa_sign() 190 sig, rsa, RSA_NO_PADDING); in pkey_rsa_sign() 195 ret = RSA_private_encrypt(tbslen, tbs, sig, rsa, rctx->pad_mode); in pkey_rsa_sign() 214 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_verifyrecover() local [all …]
|
H A D | rsa_sign.c | 274 unsigned char *sigret, unsigned int *siglen, RSA *rsa) in RSA_sign() argument 282 if (rsa->meth->rsa_sign != NULL) in RSA_sign() 283 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa) > 0; in RSA_sign() 305 if (encoded_len + RSA_PKCS1_PADDING_SIZE > (size_t)RSA_size(rsa)) { in RSA_sign() 309 encrypt_len = RSA_private_encrypt((int)encoded_len, encoded, sigret, rsa, in RSA_sign() 333 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in ossl_rsa_verify() argument 339 if (siglen != (size_t)RSA_size(rsa)) { in ossl_rsa_verify() 351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 450 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument 453 if (rsa->meth->rsa_verify != NULL) in RSA_verify() [all …]
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_rsa_legacy.c | 17 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) in SSL_use_RSAPrivateKey() argument 22 if (rsa == NULL) { in SSL_use_RSAPrivateKey() 31 RSA_up_ref(rsa); in SSL_use_RSAPrivateKey() 32 if (EVP_PKEY_assign_RSA(pkey, rsa) <= 0) { in SSL_use_RSAPrivateKey() 33 RSA_free(rsa); in SSL_use_RSAPrivateKey() 47 RSA *rsa = NULL; in SSL_use_RSAPrivateKey_file() local 61 rsa = d2i_RSAPrivateKey_bio(in, NULL); in SSL_use_RSAPrivateKey_file() 64 rsa = PEM_read_bio_RSAPrivateKey(in, NULL, in SSL_use_RSAPrivateKey_file() 71 if (rsa == NULL) { in SSL_use_RSAPrivateKey_file() 75 ret = SSL_use_RSAPrivateKey(ssl, rsa); in SSL_use_RSAPrivateKey_file() [all …]
|
/freebsd/lib/libbearssl/ |
H A D | Makefile | 99 rsa/rsa_default_keygen.c \ 100 rsa/rsa_default_modulus.c \ 101 rsa/rsa_default_pkcs1_sign.c \ 102 rsa/rsa_default_priv.c \ 103 rsa/rsa_default_privexp.c \ 104 rsa/rsa_default_pss_sign.c \ 105 rsa/rsa_default_pss_vrfy.c \ 106 rsa/rsa_default_pub.c \ 107 rsa/rsa_default_pubexp.c \ 108 rsa/rsa_i15_keygen.c \ [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | rsa.h | 203 OSSL_DEPRECATEDIN_3_0 int RSA_bits(const RSA *rsa); 204 OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa); 205 OSSL_DEPRECATEDIN_3_0 int RSA_security_bits(const RSA *rsa); 260 OSSL_DEPRECATEDIN_3_0 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, 263 OSSL_DEPRECATEDIN_3_0 int RSA_generate_multi_prime_key(RSA *rsa, int bits, 268 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, 274 OSSL_DEPRECATEDIN_3_0 int RSA_X931_generate_key_ex(RSA *rsa, int bits, 283 RSA *rsa, int padding); 286 RSA *rsa, int padding); 289 RSA *rsa, int padding); [all …]
|
/freebsd/crypto/openssl/providers/implementations/keymgmt/ |
H A D | rsa_kmgmt.c | 81 RSA *rsa; in rsa_newdata() local 86 rsa = ossl_rsa_new_with_ctx(libctx); in rsa_newdata() 87 if (rsa != NULL) { in rsa_newdata() 88 RSA_clear_flags(rsa, RSA_FLAG_TYPE_MASK); in rsa_newdata() 89 RSA_set_flags(rsa, RSA_FLAG_TYPE_RSA); in rsa_newdata() 91 return rsa; in rsa_newdata() 97 RSA *rsa; in rsapss_newdata() local 102 rsa = ossl_rsa_new_with_ctx(libctx); in rsapss_newdata() 103 if (rsa != NULL) { in rsapss_newdata() 104 RSA_clear_flags(rsa, RSA_FLAG_TYPE_MASK); in rsapss_newdata() [all …]
|
/freebsd/contrib/bearssl/tools/ |
H A D | xmem.c | 86 pk2->key.rsa.n = xblobdup(pk->key.rsa.n, pk->key.rsa.nlen); in xpkeydup() 87 pk2->key.rsa.nlen = pk->key.rsa.nlen; in xpkeydup() 88 pk2->key.rsa.e = xblobdup(pk->key.rsa.e, pk->key.rsa.elen); in xpkeydup() 89 pk2->key.rsa.elen = pk->key.rsa.elen; in xpkeydup() 115 xfree(pk->key.rsa.n); in xfreepkey() 116 xfree(pk->key.rsa.e); in xfreepkey()
|
H A D | keys.c | 64 sk->key.rsa.n_bitlen = rk->n_bitlen; in decode_key() 65 sk->key.rsa.p = xblobdup(rk->p, rk->plen); in decode_key() 66 sk->key.rsa.plen = rk->plen; in decode_key() 67 sk->key.rsa.q = xblobdup(rk->q, rk->qlen); in decode_key() 68 sk->key.rsa.qlen = rk->qlen; in decode_key() 69 sk->key.rsa.dp = xblobdup(rk->dp, rk->dplen); in decode_key() 70 sk->key.rsa.dplen = rk->dplen; in decode_key() 71 sk->key.rsa.dq = xblobdup(rk->dq, rk->dqlen); in decode_key() 72 sk->key.rsa.dqlen = rk->dqlen; in decode_key() 73 sk->key.rsa.iq = xblobdup(rk->iq, rk->iqlen); in decode_key() [all …]
|
H A D | certs.c | 66 ta->pkey.key.rsa.n = xblobdup(pk->key.rsa.n, pk->key.rsa.nlen); in certificate_to_trust_anchor_inner() 67 ta->pkey.key.rsa.nlen = pk->key.rsa.nlen; in certificate_to_trust_anchor_inner() 68 ta->pkey.key.rsa.e = xblobdup(pk->key.rsa.e, pk->key.rsa.elen); in certificate_to_trust_anchor_inner() 69 ta->pkey.key.rsa.elen = pk->key.rsa.elen; in certificate_to_trust_anchor_inner() 105 xfree(ta->pkey.key.rsa.n); in free_ta_contents() 106 xfree(ta->pkey.key.rsa.e); in free_ta_contents()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-RSA.pod | 39 =item "rsa-factor1" (B<OSSL_PKEY_PARAM_RSA_FACTOR1>) <unsigned integer> 41 =item "rsa-factor2" (B<OSSL_PKEY_PARAM_RSA_FACTOR2>) <unsigned integer> 43 =item "rsa-factor3" (B<OSSL_PKEY_PARAM_RSA_FACTOR3>) <unsigned integer> 45 =item "rsa-factor4" (B<OSSL_PKEY_PARAM_RSA_FACTOR4>) <unsigned integer> 47 =item "rsa-factor5" (B<OSSL_PKEY_PARAM_RSA_FACTOR5>) <unsigned integer> 49 =item "rsa-factor6" (B<OSSL_PKEY_PARAM_RSA_FACTOR6>) <unsigned integer> 51 =item "rsa-factor7" (B<OSSL_PKEY_PARAM_RSA_FACTOR7>) <unsigned integer> 53 =item "rsa-factor8" (B<OSSL_PKEY_PARAM_RSA_FACTOR8>) <unsigned integer> 55 =item "rsa-factor9" (B<OSSL_PKEY_PARAM_RSA_FACTOR9>) <unsigned integer> 57 =item "rsa-factor10" (B<OSSL_PKEY_PARAM_RSA_FACTOR10>) <unsigned integer> [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | RSA_meth_new.pod | 21 #include <openssl/rsa.h> 42 unsigned char *to, RSA *rsa, int padding); 43 int RSA_meth_set_pub_enc(RSA_METHOD *rsa, 45 unsigned char *to, RSA *rsa, 50 unsigned char *to, RSA *rsa, int padding); 51 int RSA_meth_set_pub_dec(RSA_METHOD *rsa, 53 unsigned char *to, RSA *rsa, 57 unsigned char *to, RSA *rsa, 59 int RSA_meth_set_priv_enc(RSA_METHOD *rsa, 61 unsigned char *to, RSA *rsa, int padding)); [all …]
|
H A D | RSA_public_encrypt.pod | 9 #include <openssl/rsa.h> 16 unsigned char *to, RSA *rsa, int padding); 19 unsigned char *to, RSA *rsa, int padding); 29 session key) using the public key B<rsa> and stores the ciphertext in 30 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory. 55 B<flen> must not be more than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 56 based padding modes, not more than RSA_size(B<rsa>) - 42 for 57 RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. 63 RSA_size(B<rsa>) bytes. 67 private key B<rsa> and stores the plaintext in B<to>. B<flen> should [all …]
|
/freebsd/crypto/openssh/ |
H A D | ssh-rsa.c | 76 const RSA *rsa; in ssh_rsa_serialize_public() local 80 if ((rsa = EVP_PKEY_get0_RSA(key->pkey)) == NULL) in ssh_rsa_serialize_public() 83 RSA_get0_key(rsa, &rsa_n, &rsa_e, NULL); in ssh_rsa_serialize_public() 97 const RSA *rsa; in ssh_rsa_serialize_private() local 99 if ((rsa = EVP_PKEY_get0_RSA(key->pkey)) == NULL) in ssh_rsa_serialize_private() 101 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in ssh_rsa_serialize_private() 102 RSA_get0_factors(rsa, &rsa_p, &rsa_q); in ssh_rsa_serialize_private() 103 RSA_get0_crt_params(rsa, NULL, NULL, &rsa_iqmp); in ssh_rsa_serialize_private() 200 RSA *rsa = NULL; in ssh_rsa_deserialize_public() local 202 if ((rsa = RSA_new()) == NULL) in ssh_rsa_deserialize_public() [all …]
|
/freebsd/contrib/libfido2/src/ |
H A D | rs256.c | 158 RSA *rsa = NULL; in rs256_pk_to_EVP_PKEY() local 173 if ((rsa = RSA_new()) == NULL || RSA_set0_key(rsa, n, e, NULL) == 0) { in rs256_pk_to_EVP_PKEY() 182 if (RSA_bits(rsa) != 2048) { in rs256_pk_to_EVP_PKEY() 188 EVP_PKEY_assign_RSA(pkey, rsa) == 0) { in rs256_pk_to_EVP_PKEY() 193 rsa = NULL; /* at this point, rsa belongs to evp */ in rs256_pk_to_EVP_PKEY() 201 if (rsa != NULL) in rs256_pk_to_EVP_PKEY() 202 RSA_free(rsa); in rs256_pk_to_EVP_PKEY() 212 rs256_pk_from_RSA(rs256_pk_t *pk, const RSA *rsa) in rs256_pk_from_RSA() argument 219 if (RSA_bits(rsa) != 2048) { in rs256_pk_from_RSA() 224 RSA_get0_key(rsa, &n, &e, &d); in rs256_pk_from_RSA() [all …]
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | ks_keychain.c | 86 RSA *rsa, in kc_rsa_public_encrypt() argument 96 RSA *rsa, in kc_rsa_public_decrypt() argument 107 RSA *rsa, in kc_rsa_private_encrypt() argument 110 struct kc_rsa *kc = RSA_get_app_data(rsa); in kc_rsa_private_encrypt() 160 RSA * rsa, int padding) in kc_rsa_private_decrypt() argument 162 struct kc_rsa *kc = RSA_get_app_data(rsa); in kc_rsa_private_decrypt() 221 kc_rsa_init(RSA *rsa) in kc_rsa_init() argument 227 kc_rsa_finish(RSA *rsa) in kc_rsa_finish() argument 229 struct kc_rsa *kc_rsa = RSA_get_app_data(rsa); in kc_rsa_finish() 259 RSA *rsa; in set_private_key() local [all …]
|