| /freebsd/crypto/openssh/ |
| H A D | ssh-rsa.c | 73 const BIGNUM *rsa_n, *rsa_e; in ssh_rsa_serialize_public() local 81 RSA_get0_key(rsa, &rsa_n, &rsa_e, NULL); in ssh_rsa_serialize_public() 82 if ((r = sshbuf_put_bignum2(b, rsa_e)) != 0 || in ssh_rsa_serialize_public() 94 const BIGNUM *rsa_n, *rsa_e, *rsa_d, *rsa_iqmp, *rsa_p, *rsa_q; in ssh_rsa_serialize_private() local 99 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in ssh_rsa_serialize_private() 106 (r = sshbuf_put_bignum2(b, rsa_e)) != 0) in ssh_rsa_serialize_private() 157 const BIGNUM *rsa_n, *rsa_e; in ssh_rsa_copy_public() local 167 RSA_get0_key(rsa_from, &rsa_n, &rsa_e, NULL); in ssh_rsa_copy_public() 169 (rsa_e_dup = BN_dup(rsa_e)) == NULL) { in ssh_rsa_copy_public() 197 BIGNUM *rsa_n = NULL, *rsa_e = NULL; in ssh_rsa_deserialize_public() local [all …]
|
| H A D | ssh-pkcs11.c | 997 BIGNUM *rsa_n, *rsa_e; in pkcs11_fetch_rsa_pubkey() local 1046 rsa_e = BN_bin2bn(key_attr[2].pValue, key_attr[2].ulValueLen, NULL); in pkcs11_fetch_rsa_pubkey() 1047 if (rsa_n == NULL || rsa_e == NULL) { in pkcs11_fetch_rsa_pubkey() 1051 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) in pkcs11_fetch_rsa_pubkey() 1053 rsa_n = rsa_e = NULL; /* transferred */ in pkcs11_fetch_rsa_pubkey()
|
| H A D | ssh-keygen.c | 457 BIGNUM *rsa_n = NULL, *rsa_e = NULL, *rsa_d = NULL; in do_convert_private_ssh2() local 512 if ((rsa_e = BN_new()) == NULL) in do_convert_private_ssh2() 514 if (!BN_set_word(rsa_e, e)) { in do_convert_private_ssh2() 515 BN_clear_free(rsa_e); in do_convert_private_ssh2() 538 if (!RSA_set0_key(rsa, rsa_n, rsa_e, rsa_d)) in do_convert_private_ssh2() 540 rsa_n = rsa_e = rsa_d = NULL; /* transferred */ in do_convert_private_ssh2()
|
| /freebsd/crypto/openssh/regress/unittests/sshkey/ |
| H A D | common.h | 19 const BIGNUM *rsa_e(struct sshkey *k);
|
| H A D | common.c | 95 rsa_e(struct sshkey *k) in rsa_e() function
|
| H A D | test_sshkey.c | 325 ASSERT_PTR_NE(rsa_e(kr), NULL); in sshkey_tests() 360 ASSERT_PTR_NE(rsa_e(k1), NULL); in sshkey_tests()
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_backend.c | 264 const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL; in DEFINE_SPECIAL_STACK_OF_CONST() local 272 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in DEFINE_SPECIAL_STACK_OF_CONST() 276 || !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_RSA_E, rsa_e)) in DEFINE_SPECIAL_STACK_OF_CONST()
|
| /freebsd/crypto/openssl/providers/implementations/encode_decode/ |
| H A D | encode_key2text.c | 464 const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL; in rsa_to_text() local 496 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in rsa_to_text() 514 if (!ossl_bio_print_labeled_bignum(out, exponent_label, rsa_e)) in rsa_to_text()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_fromdata.pod | 121 unsigned long rsa_e = 0x10001; 125 OSSL_PARAM_ulong("e", &rsa_e),
|
| /freebsd/contrib/bearssl/test/ |
| H A D | test_crypto.c | 5851 unsigned char rsa_n[128], rsa_e[3], rsa_p[64], rsa_q[64]; in test_RSA_sign() local 5914 rsa_pk.e = rsa_e; in test_RSA_sign() 5915 rsa_pk.elen = hextobin(rsa_e, "010001"); in test_RSA_sign()
|
| /freebsd/crypto/openssl/providers/fips/ |
| H A D | self_test_data.inc | 1160 static const unsigned char rsa_e[] = { 0x01, 0x00, 0x01 }; 1288 ST_KAT_PARAM_BIGNUM(OSSL_PKEY_PARAM_RSA_E, rsa_e), 1300 ST_KAT_PARAM_BIGNUM(OSSL_PKEY_PARAM_RSA_E, rsa_e), 1306 ST_KAT_PARAM_BIGNUM(OSSL_PKEY_PARAM_RSA_E, rsa_e),
|