/freebsd/crypto/openssh/ |
H A D | ssh-rsa.c | 75 const BIGNUM *rsa_n, *rsa_e; in ssh_rsa_serialize_public() local 83 RSA_get0_key(rsa, &rsa_n, &rsa_e, NULL); in ssh_rsa_serialize_public() 84 if ((r = sshbuf_put_bignum2(b, rsa_e)) != 0 || in ssh_rsa_serialize_public() 96 const BIGNUM *rsa_n, *rsa_e, *rsa_d, *rsa_iqmp, *rsa_p, *rsa_q; in ssh_rsa_serialize_private() local 101 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in ssh_rsa_serialize_private() 108 (r = sshbuf_put_bignum2(b, rsa_e)) != 0) in ssh_rsa_serialize_private() 159 const BIGNUM *rsa_n, *rsa_e; in ssh_rsa_copy_public() local 169 RSA_get0_key(rsa_from, &rsa_n, &rsa_e, NULL); in ssh_rsa_copy_public() 171 (rsa_e_dup = BN_dup(rsa_e)) == NULL) { in ssh_rsa_copy_public() 199 BIGNUM *rsa_n = NULL, *rsa_e = NULL; in ssh_rsa_deserialize_public() local [all …]
|
H A D | ssh-pkcs11.c | 842 BIGNUM *rsa_n, *rsa_e; in pkcs11_fetch_rsa_pubkey() local 891 rsa_e = BN_bin2bn(key_attr[2].pValue, key_attr[2].ulValueLen, NULL); in pkcs11_fetch_rsa_pubkey() 892 if (rsa_n == NULL || rsa_e == NULL) { in pkcs11_fetch_rsa_pubkey() 896 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) in pkcs11_fetch_rsa_pubkey() 898 rsa_n = rsa_e = NULL; /* transferred */ in pkcs11_fetch_rsa_pubkey() 1095 const BIGNUM *rsa_n, *rsa_e; 1097 RSA_get0_key(rsa, &rsa_n, &rsa_e, NULL); 1098 return rsa_n != NULL && rsa_e != NULL;
|
H A D | ssh-keygen.c | 498 BIGNUM *rsa_n = NULL, *rsa_e = NULL, *rsa_d = NULL; in do_convert_private_ssh2() local 578 if ((rsa_e = BN_new()) == NULL) in do_convert_private_ssh2() 580 if (!BN_set_word(rsa_e, e)) { in do_convert_private_ssh2() 581 BN_clear_free(rsa_e); in do_convert_private_ssh2() 603 if (!RSA_set0_key(rsa, rsa_n, rsa_e, rsa_d)) in do_convert_private_ssh2() 605 rsa_n = rsa_e = rsa_d = NULL; /* transferred */ in do_convert_private_ssh2()
|
/freebsd/crypto/openssh/regress/unittests/sshkey/ |
H A D | common.h | 19 const BIGNUM *rsa_e(struct sshkey *k);
|
H A D | common.c | 98 rsa_e(struct sshkey *k) in rsa_e() function
|
H A D | test_sshkey.c | 276 ASSERT_PTR_NE(rsa_e(kr), NULL); in sshkey_tests() 320 ASSERT_PTR_NE(rsa_e(k1), NULL); in sshkey_tests()
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_backend.c | 127 const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL; in DEFINE_SPECIAL_STACK_OF_CONST() local 135 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in DEFINE_SPECIAL_STACK_OF_CONST() 139 || !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_RSA_E, rsa_e)) in DEFINE_SPECIAL_STACK_OF_CONST()
|
/freebsd/crypto/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2text.c | 635 const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL; in rsa_to_text() local 667 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in rsa_to_text() 683 if (!print_labeled_bignum(out, exponent_label, rsa_e)) in rsa_to_text()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_fromdata.pod | 117 unsigned long rsa_e = 0x10001; 121 OSSL_PARAM_ulong("e", &rsa_e),
|
/freebsd/crypto/openssl/providers/fips/ |
H A D | self_test_data.inc | 1143 static const unsigned char rsa_e[] = { 0x01, 0x00, 0x01 }; 1271 ST_KAT_PARAM_BIGNUM(OSSL_PKEY_PARAM_RSA_E, rsa_e), 1283 ST_KAT_PARAM_BIGNUM(OSSL_PKEY_PARAM_RSA_E, rsa_e), 1289 ST_KAT_PARAM_BIGNUM(OSSL_PKEY_PARAM_RSA_E, rsa_e),
|
/freebsd/contrib/bearssl/test/ |
H A D | test_crypto.c | 5851 unsigned char rsa_n[128], rsa_e[3], rsa_p[64], rsa_q[64]; in test_RSA_sign() local 5914 rsa_pk.e = rsa_e; in test_RSA_sign() 5915 rsa_pk.elen = hextobin(rsa_e, "010001"); in test_RSA_sign()
|