/titanic_44/usr/src/cmd/ssh/libssh/common/ |
H A D | key.c | 55 RSA *rsa; in key_new() local 61 k->rsa = NULL; in key_new() 65 if ((rsa = RSA_new()) == NULL) in key_new() 67 if ((rsa->n = BN_new()) == NULL) in key_new() 69 if ((rsa->e = BN_new()) == NULL) in key_new() 71 k->rsa = rsa; in key_new() 102 if ((k->rsa->d = BN_new()) == NULL) in key_new_private() 104 if ((k->rsa->iqmp = BN_new()) == NULL) in key_new_private() 106 if ((k->rsa->q = BN_new()) == NULL) in key_new_private() 108 if ((k->rsa->p = BN_new()) == NULL) in key_new_private() [all …]
|
H A D | rsa.c | 127 rsa_generate_additional_parameters(RSA *rsa) in rsa_generate_additional_parameters() argument 137 BN_sub(aux, rsa->q, BN_value_one()); in rsa_generate_additional_parameters() 138 BN_mod(rsa->dmq1, rsa->d, aux, ctx); in rsa_generate_additional_parameters() 140 BN_sub(aux, rsa->p, BN_value_one()); in rsa_generate_additional_parameters() 141 BN_mod(rsa->dmp1, rsa->d, aux, ctx); in rsa_generate_additional_parameters()
|
H A D | ssh-rsa.c | 56 if (key == NULL || key->type != KEY_RSA || key->rsa == NULL) { in ssh_rsa_sign() 69 slen = RSA_size(key->rsa); in ssh_rsa_sign() 72 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); in ssh_rsa_sign() 122 if (key == NULL || key->type != KEY_RSA || key->rsa == NULL) { in ssh_rsa_verify() 126 if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { in ssh_rsa_verify() 128 BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE); in ssh_rsa_verify() 150 modlen = RSA_size(key->rsa); in ssh_rsa_verify() 174 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa); in ssh_rsa_verify() 214 u_char *sigbuf, u_int siglen, RSA *rsa) in openssh_RSA_verify() argument 241 rsasize = RSA_size(rsa); in openssh_RSA_verify() [all …]
|
H A D | authfile.c | 104 buffer_put_bignum(&buffer, key->rsa->d); in key_save_private_rsa1() 105 buffer_put_bignum(&buffer, key->rsa->iqmp); in key_save_private_rsa1() 106 buffer_put_bignum(&buffer, key->rsa->q); /* reverse from SSL p */ in key_save_private_rsa1() 107 buffer_put_bignum(&buffer, key->rsa->p); /* reverse from SSL q */ in key_save_private_rsa1() 126 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); in key_save_private_rsa1() 127 buffer_put_bignum(&encrypted, key->rsa->n); in key_save_private_rsa1() 128 buffer_put_bignum(&encrypted, key->rsa->e); in key_save_private_rsa1() 197 success = PEM_write_RSAPrivateKey(fp, key->rsa, in key_save_private_pem() 277 buffer_get_bignum(&buffer, pub->rsa->n); in key_load_public_rsa1() 278 buffer_get_bignum(&buffer, pub->rsa->e); in key_load_public_rsa1() [all …]
|
H A D | authfd.c | 331 buffer_get_bignum(&auth->identities, key->rsa->e); in ssh_get_next_identity() 332 buffer_get_bignum(&auth->identities, key->rsa->n); in ssh_get_next_identity() 334 if (bits != BN_num_bits(key->rsa->n)) in ssh_get_next_identity() 336 BN_num_bits(key->rsa->n), bits); in ssh_get_next_identity() 381 buffer_put_int(&buffer, BN_num_bits(key->rsa->n)); in ssh_decrypt_challenge() 382 buffer_put_bignum(&buffer, key->rsa->e); in ssh_decrypt_challenge() 383 buffer_put_bignum(&buffer, key->rsa->n); in ssh_decrypt_challenge() 476 buffer_put_bignum2(b, key->rsa->n); in ssh_encode_identity_ssh2() 477 buffer_put_bignum2(b, key->rsa->e); in ssh_encode_identity_ssh2() 478 buffer_put_bignum2(b, key->rsa->d); in ssh_encode_identity_ssh2() [all …]
|
H A D | hostfile.c | 178 if (key == NULL || key->type != KEY_RSA1 || key->rsa == NULL) in hostfile_check_key() 180 if (bits != BN_num_bits(key->rsa->n)) { in hostfile_check_key() 183 filename, linenum, host, BN_num_bits(key->rsa->n), bits); in hostfile_check_key() 185 bits, BN_num_bits(key->rsa->n), filename, linenum); in hostfile_check_key()
|
/titanic_44/usr/src/cmd/fs.d/nfs/lib/ |
H A D | thrpool.c | 176 struct rdma_svc_args *rsa; in svcrdma() local 178 rsa = (struct rdma_svc_args *)malloc(sizeof (struct rdma_svc_args)); in svcrdma() 179 rsa->poolid = (uint32_t)id; in svcrdma() 180 rsa->netid = NULL; in svcrdma() 181 rsa->nfs_versmin = versmin; in svcrdma() 182 rsa->nfs_versmax = versmax; in svcrdma() 183 rsa->delegation = delegation; in svcrdma() 188 if (thr_create(NULL, THR_MIN_STACK * 2, svc_rdma_creator, (void *)rsa, in svcrdma()
|
/titanic_44/usr/src/cmd/ssh/ssh/ |
H A D | sshconnect1.c | 98 packet_put_bignum(key->rsa->n); in try_agent_authentication() 228 packet_put_bignum(public->rsa->n); in try_rsa_authentication() 307 respond_to_rsa_challenge(challenge, private->rsa); in try_rsa_authentication() 343 packet_put_int(BN_num_bits(host_key->rsa->n)); in try_rhosts_rsa_authentication() 344 packet_put_bignum(host_key->rsa->e); in try_rhosts_rsa_authentication() 345 packet_put_bignum(host_key->rsa->n); in try_rhosts_rsa_authentication() 371 respond_to_rsa_challenge(challenge, host_key->rsa); in try_rhosts_rsa_authentication() 984 packet_get_bignum(server_key->rsa->e); in ssh_kex() 985 packet_get_bignum(server_key->rsa->n); in ssh_kex() 987 rbits = BN_num_bits(server_key->rsa->n); in ssh_kex() [all …]
|
/titanic_44/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | kssladm_create.c | 88 kmf_to_kssl(int nxkey, KMF_RAW_KEY_DATA *rsa, int ncerts, in kmf_to_kssl() argument 138 priv_key_bignums[0] = rsa->rawdata.rsa.mod; in kmf_to_kssl() 139 priv_key_bignums[1] = rsa->rawdata.rsa.pubexp; in kmf_to_kssl() 140 priv_key_bignums[2] = rsa->rawdata.rsa.priexp; in kmf_to_kssl() 141 priv_key_bignums[3] = rsa->rawdata.rsa.prime1; in kmf_to_kssl() 142 priv_key_bignums[4] = rsa->rawdata.rsa.prime2; in kmf_to_kssl() 143 priv_key_bignums[5] = rsa->rawdata.rsa.exp1; in kmf_to_kssl() 144 priv_key_bignums[6] = rsa->rawdata.rsa.exp2; in kmf_to_kssl() 145 priv_key_bignums[7] = rsa->rawdata.rsa.coef; in kmf_to_kssl() 147 if (rsa->rawdata.rsa.mod.val == NULL || in kmf_to_kssl() [all …]
|
H A D | ksslutil.c | 44 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) in PKCS12_get_rsa_key_certs() argument 91 *rsa = keys; in PKCS12_get_rsa_key_certs() 104 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) in PEM_get_rsa_key_certs() argument 152 if (rsa != NULL) in PEM_get_rsa_key_certs() 153 *rsa = keys; in PEM_get_rsa_key_certs()
|
/titanic_44/usr/src/cmd/ssh/sshd/ |
H A D | auth-rsa.c | 70 BN_mod(challenge, challenge, key->rsa->n, ctx); in auth_rsa_generate_challenge() 84 if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { in auth_rsa_verify_response() 86 BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE); in auth_rsa_verify_response() 129 rsa_public_encrypt(encrypted_challenge, challenge, key->rsa); in auth_rsa_challenge_dialog() 245 if (BN_cmp(key->rsa->n, client_n) != 0) in auth_rsa_key_allowed() 249 if (bits != BN_num_bits(key->rsa->n)) in auth_rsa_key_allowed() 252 file, linenum, BN_num_bits(key->rsa->n), bits); in auth_rsa_key_allowed()
|
H A D | sshd.c | 1101 BN_num_bits(sensitive_data.ssh1_host_key->rsa->n) - in main() 1103 BN_num_bits(sensitive_data.ssh1_host_key->rsa->n) + in main() 1106 BN_num_bits(sensitive_data.ssh1_host_key->rsa->n) + in main() 1701 if (BN_cmp(sensitive_data.server_key->rsa->n, sensitive_data.ssh1_host_key->rsa->n) > 0) { in ssh1_session_key() 1703 if (BN_num_bits(sensitive_data.server_key->rsa->n) < in ssh1_session_key() 1704 BN_num_bits(sensitive_data.ssh1_host_key->rsa->n) + SSH_KEY_BITS_RESERVED) { in ssh1_session_key() 1707 BN_num_bits(sensitive_data.server_key->rsa->n), in ssh1_session_key() 1708 BN_num_bits(sensitive_data.ssh1_host_key->rsa->n), in ssh1_session_key() 1712 sensitive_data.server_key->rsa) <= 0) in ssh1_session_key() 1715 sensitive_data.ssh1_host_key->rsa) <= 0) in ssh1_session_key() [all …]
|
H A D | auth1.c | 230 packet_get_bignum(client_host_key->rsa->e); in do_authloop() 231 packet_get_bignum(client_host_key->rsa->n); in do_authloop() 233 if (bits != BN_num_bits(client_host_key->rsa->n)) in do_authloop() 236 BN_num_bits(client_host_key->rsa->n), bits); in do_authloop()
|
H A D | Makefile | 51 auth-rsa.o \ 52 auth-rh-rsa.o \
|
H A D | auth-rh-rsa.c | 63 client_host_key->rsa == NULL) in auth_rhosts_rsa()
|
/titanic_44/usr/src/uts/common/fs/nfs/ |
H A D | nfs_sys.c | 164 struct rdma_svc_args rsa; in nfssys() local 176 rsa.poolid = STRUCT_FGET(ursa, poolid); in nfssys() 177 rsa.nfs_versmin = STRUCT_FGET(ursa, nfs_versmin); in nfssys() 178 rsa.nfs_versmax = STRUCT_FGET(ursa, nfs_versmax); in nfssys() 179 rsa.delegation = STRUCT_FGET(ursa, delegation); in nfssys() 181 if (copyin(arg, &rsa, sizeof (rsa))) in nfssys() 184 rsa.netid = netstore; in nfssys() 186 error = rdma_start(&rsa); in nfssys()
|
H A D | nfs_server.c | 568 rdma_start(struct rdma_svc_args *rsa) in rdma_start() argument 576 if ((rsa->nfs_versmin > rsa->nfs_versmax) || in rdma_start() 577 (rsa->nfs_versmin < NFS_VERSMIN) || in rdma_start() 578 (rsa->nfs_versmax > NFS_VERSMAX)) { in rdma_start() 579 rsa->nfs_versmin = NFS_VERSMIN_DEFAULT; in rdma_start() 580 rsa->nfs_versmax = NFS_VERSMAX_DEFAULT; in rdma_start() 582 nfs_versmin = rsa->nfs_versmin; in rdma_start() 583 nfs_versmax = rsa->nfs_versmax; in rdma_start() 586 __nfs_sc_rdma[0].sc_versmin = rsa->nfs_versmin; in rdma_start() 587 __nfs_sc_rdma[0].sc_versmax = rsa->nfs_versmax; in rdma_start() [all …]
|
/titanic_44/usr/src/cmd/ssh/ssh-agent/ |
H A D | ssh-agent.c | 204 buffer_put_int(&msg, BN_num_bits(id->key->rsa->n)); in process_request_identities() 205 buffer_put_bignum(&msg, id->key->rsa->e); in process_request_identities() 206 buffer_put_bignum(&msg, id->key->rsa->n); in process_request_identities() 240 buffer_get_bignum(&e->request, key->rsa->e); in process_authentication_challenge1() 241 buffer_get_bignum(&e->request, key->rsa->n); in process_authentication_challenge1() 256 if (rsa_private_decrypt(challenge, challenge, private->rsa) <= 0) in process_authentication_challenge1() 350 buffer_get_bignum(&e->request, key->rsa->e); in process_remove_identity() 351 buffer_get_bignum(&e->request, key->rsa->n); in process_remove_identity() 455 buffer_get_bignum(&e->request, k->rsa->n); in process_add_identity() 456 buffer_get_bignum(&e->request, k->rsa->e); in process_add_identity() [all …]
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 802 KMF_RAW_RSA_KEY rsa; in readAltFormatPrivateKey() local 881 (void) memset(&rsa, 0, sizeof (rsa)); in readAltFormatPrivateKey() 883 if ((ret = sslBN2KMFBN(Exp1, &rsa.exp1)) != KMF_OK) in readAltFormatPrivateKey() 885 if ((ret = sslBN2KMFBN(Exp2, &rsa.exp2)) != KMF_OK) in readAltFormatPrivateKey() 887 if ((ret = sslBN2KMFBN(COEF, &rsa.coef)) != KMF_OK) in readAltFormatPrivateKey() 890 rsa.mod.val = (uchar_t *)Mod->bv_val; in readAltFormatPrivateKey() 891 rsa.mod.len = Mod->bv_len; in readAltFormatPrivateKey() 893 rsa.pubexp.val = (uchar_t *)PubExp->bv_val; in readAltFormatPrivateKey() 894 rsa.pubexp.len = PubExp->bv_len; in readAltFormatPrivateKey() 896 rsa.priexp.val = (uchar_t *)PriExp->bv_val; in readAltFormatPrivateKey() [all …]
|
/titanic_44/usr/src/cmd/ssh/ssh-keyscan/ |
H A D | ssh-keyscan.c | 298 static Key *rsa; in keygrab_ssh1() local 301 if (rsa == NULL) { in keygrab_ssh1() 303 rsa = key_new(KEY_RSA1); in keygrab_ssh1() 316 buffer_get_bignum(&msg, rsa->rsa->e); in keygrab_ssh1() 317 buffer_get_bignum(&msg, rsa->rsa->n); in keygrab_ssh1() 321 buffer_get_bignum(&msg, rsa->rsa->e); in keygrab_ssh1() 322 buffer_get_bignum(&msg, rsa->rsa->n); in keygrab_ssh1() 326 return (rsa); in keygrab_ssh1()
|
/titanic_44/usr/src/cmd/ssh/etc/ |
H A D | sshd | 81 create_key $SSHDIR/ssh_host_rsa_key rsa 103 create_key $SSHDIR/ssh_host_rsa_key rsa
|
/titanic_44/usr/src/cmd/ssh/libssh/ |
H A D | Makefile.com | 73 rsa.o \ 77 ssh-rsa.o \
|
/titanic_44/usr/src/cmd/ssh/ssh-keygen/ |
H A D | ssh-keygen.c | 273 if (!BN_set_word(key->rsa->e, e)) { in do_convert_private_ssh2_from_blob() 278 buffer_get_bignum_bits(&b, key->rsa->d); in do_convert_private_ssh2_from_blob() 279 buffer_get_bignum_bits(&b, key->rsa->n); in do_convert_private_ssh2_from_blob() 280 buffer_get_bignum_bits(&b, key->rsa->iqmp); in do_convert_private_ssh2_from_blob() 281 buffer_get_bignum_bits(&b, key->rsa->q); in do_convert_private_ssh2_from_blob() 282 buffer_get_bignum_bits(&b, key->rsa->p); in do_convert_private_ssh2_from_blob() 283 rsa_generate_additional_parameters(key->rsa); in do_convert_private_ssh2_from_blob() 395 PEM_write_RSAPrivateKey(stdout, k->rsa, NULL, NULL, 0, NULL, NULL)) : in do_convert_from_ssh2()
|
/titanic_44/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 2262 DerEncodeRSAPrivateKey(KMF_DATA *encodedkey, KMF_RAW_RSA_KEY *rsa) in DerEncodeRSAPrivateKey() argument 2275 rsa->mod.val, rsa->mod.len, in DerEncodeRSAPrivateKey() 2276 rsa->pubexp.val, rsa->pubexp.len, in DerEncodeRSAPrivateKey() 2277 rsa->priexp.val, rsa->priexp.len, in DerEncodeRSAPrivateKey() 2278 rsa->prime1.val, rsa->prime1.len, in DerEncodeRSAPrivateKey() 2279 rsa->prime2.val, rsa->prime2.len, in DerEncodeRSAPrivateKey() 2280 rsa->exp1.val, rsa->exp1.len, in DerEncodeRSAPrivateKey() 2281 rsa->exp2.val, rsa->exp2.len, in DerEncodeRSAPrivateKey() 2282 rsa->coef.val, rsa->coef.len) == -1) in DerEncodeRSAPrivateKey()
|
/titanic_44/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | tpm_specific.c | 2761 RSA *rsa = NULL; in token_specific_rsa_verify_recover() local 2784 rsa = RSA_new(); in token_specific_rsa_verify_recover() 2785 if (rsa == NULL) { in token_specific_rsa_verify_recover() 2790 rsa->n = BN_bin2bn(modulus, modLen, rsa->n); in token_specific_rsa_verify_recover() 2791 rsa->e = BN_bin2bn(exp, sizeof (exp), rsa->e); in token_specific_rsa_verify_recover() 2792 if (rsa->n == NULL || rsa->e == NULL) { in token_specific_rsa_verify_recover() 2797 rsa->flags |= RSA_FLAG_SIGN_VER; in token_specific_rsa_verify_recover() 2801 rsa, RSA_NO_PADDING); in token_specific_rsa_verify_recover() 2812 num = BN_num_bytes(rsa->n); in token_specific_rsa_verify_recover() 2834 if (rsa) in token_specific_rsa_verify_recover() [all …]
|