/freebsd/crypto/openssh/ |
H A D | ssh-rsa.c | 75 const BIGNUM *rsa_n, *rsa_e; in ssh_rsa_serialize_public() local 83 RSA_get0_key(rsa, &rsa_n, &rsa_e, NULL); in ssh_rsa_serialize_public() 85 (r = sshbuf_put_bignum2(b, rsa_n)) != 0) in ssh_rsa_serialize_public() 96 const BIGNUM *rsa_n, *rsa_e, *rsa_d, *rsa_iqmp, *rsa_p, *rsa_q; in ssh_rsa_serialize_private() local 101 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in ssh_rsa_serialize_private() 107 if ((r = sshbuf_put_bignum2(b, rsa_n)) != 0 || in ssh_rsa_serialize_private() 159 const BIGNUM *rsa_n, *rsa_e; in ssh_rsa_copy_public() local 169 RSA_get0_key(rsa_from, &rsa_n, &rsa_e, NULL); in ssh_rsa_copy_public() 170 if ((rsa_n_dup = BN_dup(rsa_n)) == NULL || in ssh_rsa_copy_public() 199 BIGNUM *rsa_n = NULL, *rsa_e = NULL; in ssh_rsa_deserialize_public() local [all …]
|
H A D | ssh-pkcs11.c | 842 BIGNUM *rsa_n, *rsa_e; in pkcs11_fetch_rsa_pubkey() local 890 rsa_n = BN_bin2bn(key_attr[1].pValue, key_attr[1].ulValueLen, NULL); in pkcs11_fetch_rsa_pubkey() 892 if (rsa_n == NULL || rsa_e == NULL) { in pkcs11_fetch_rsa_pubkey() 896 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) in pkcs11_fetch_rsa_pubkey() 898 rsa_n = rsa_e = NULL; /* transferred */ in pkcs11_fetch_rsa_pubkey() 1095 const BIGNUM *rsa_n, *rsa_e; 1097 RSA_get0_key(rsa, &rsa_n, &rsa_e, NULL); 1098 return rsa_n != NULL && rsa_e != NULL;
|
H A D | ssh-keygen.c | 498 BIGNUM *rsa_n = NULL, *rsa_e = NULL, *rsa_d = NULL; in do_convert_private_ssh2() local 585 if ((rsa_n = BN_new()) == NULL || in do_convert_private_ssh2() 592 buffer_get_bignum_bits(b, rsa_n); in do_convert_private_ssh2() 603 if (!RSA_set0_key(rsa, rsa_n, rsa_e, rsa_d)) in do_convert_private_ssh2() 605 rsa_n = rsa_e = rsa_d = NULL; /* transferred */ in do_convert_private_ssh2()
|
/freebsd/crypto/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2text.c | 635 const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL; in rsa_to_text() local 667 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in rsa_to_text() 673 type_label, BN_num_bits(rsa_n), primes) <= 0) in rsa_to_text() 677 type_label, BN_num_bits(rsa_n)) <= 0) in rsa_to_text() 681 if (!print_labeled_bignum(out, modulus_label, rsa_n)) in rsa_to_text()
|
/freebsd/crypto/openssh/regress/unittests/sshkey/ |
H A D | common.h | 18 const BIGNUM *rsa_n(struct sshkey *k);
|
H A D | mktestdata.sh | 84 rm -f rsa_n dsa_n ecdsa_n # new-format keys 108 cp rsa_1 rsa_n 112 ssh-keygen -pf rsa_n -N ""
|
H A D | test_sshkey.c | 275 ASSERT_PTR_NE(rsa_n(kr), NULL); in sshkey_tests() 278 ASSERT_INT_EQ(BN_num_bits(rsa_n(kr)), 1024); in sshkey_tests() 319 ASSERT_PTR_NE(rsa_n(k1), NULL); in sshkey_tests()
|
H A D | common.c | 87 rsa_n(struct sshkey *k) in rsa_n() function
|
H A D | test_file.c | 67 ASSERT_BIGNUM_EQ(rsa_n(k1), a); in sshkey_file_tests()
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_backend.c | 127 const BIGNUM *rsa_d = NULL, *rsa_n = NULL, *rsa_e = NULL; in DEFINE_SPECIAL_STACK_OF_CONST() local 135 RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d); in DEFINE_SPECIAL_STACK_OF_CONST() 138 if (!ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_RSA_N, rsa_n) in DEFINE_SPECIAL_STACK_OF_CONST()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_fromdata.pod | 116 unsigned long rsa_n = 0xbc747fc5; 120 OSSL_PARAM_ulong("n", &rsa_n),
|
/freebsd/crypto/openssl/providers/fips/ |
H A D | self_test_data.inc | 1109 static const unsigned char rsa_n[] = { 1270 ST_KAT_PARAM_BIGNUM(OSSL_PKEY_PARAM_RSA_N, rsa_n), 1282 ST_KAT_PARAM_BIGNUM(OSSL_PKEY_PARAM_RSA_N, rsa_n), 1288 ST_KAT_PARAM_BIGNUM(OSSL_PKEY_PARAM_RSA_N, rsa_n),
|
/freebsd/contrib/bearssl/test/ |
H A D | test_crypto.c | 5851 unsigned char rsa_n[128], rsa_e[3], rsa_p[64], rsa_q[64]; in test_RSA_sign() local 5912 rsa_pk.n = rsa_n; in test_RSA_sign() 5913 …rsa_pk.nlen = hextobin(rsa_n, "E65DAEF196D22C300B3DAE1CE5157EDF821BB6038E419D8D363A8B2DA84A1321042… in test_RSA_sign()
|