/titanic_50/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softRSA.c | 96 uchar_t prime2[MAX_KEY_ATTR_BUFLEN]; in soft_rsa_decrypt() local 102 uint32_t prime2_len = sizeof (prime2); in soft_rsa_decrypt() 123 rv = soft_get_private_value(key, CKA_PRIME_2, prime2, &prime2_len); in soft_rsa_decrypt() 167 k.prime2 = prime2; in soft_rsa_decrypt() 834 uchar_t prime2[MAX_KEY_ATTR_BUFLEN]; in soft_rsa_genkey_pair() local 835 uint32_t prime2_len = sizeof (prime2); in soft_rsa_genkey_pair() 890 k.prime2 = prime2; in soft_rsa_genkey_pair() 935 prime2, k.prime2_bytes, B_FALSE)) != CKR_OK) { in soft_rsa_genkey_pair()
|
H A D | softKeystore.c | 1341 biginteger_t prime2; in soft_unpack_object() local 1359 (void) memset(&prime2, 0x0, sizeof (biginteger_t)); in soft_unpack_object() 1564 if ((rv = soft_unpack_obj_attribute(buf, &prime2, in soft_unpack_object() 1568 copy_bigint_attr(&prime2, KEY_PRI_RSA_PRIME2(pvk)); in soft_unpack_object() 1836 bigint_attr_cleanup(&prime2); in soft_unpack_object()
|
H A D | softAttributeUtil.c | 1888 biginteger_t prime2; local 1908 (void) memset(&prime2, 0x0, sizeof (biginteger_t)); 2072 rv = get_bigint_attr_from_template(&prime2, 2273 copy_bigint_attr(&prime2, KEY_PRI_RSA_PRIME2(pvk)); 2481 bigint_attr_cleanup(&prime2);
|
/titanic_50/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | asn1.c | 890 CK_ATTRIBUTE * prime2, in ber_encode_RSAPrivateKey() argument 920 prime2->ulValueLen); in ber_encode_RSAPrivateKey() 1001 (CK_BYTE *)prime2 + sizeof (CK_ATTRIBUTE), prime2->ulValueLen); in ber_encode_RSAPrivateKey() 1059 CK_ATTRIBUTE ** prime2, in ber_decode_RSAPrivateKey() argument 1251 *prime2 = q_attr; in ber_decode_RSAPrivateKey()
|
H A D | key.c | 1437 CK_ATTRIBUTE *prime1 = NULL, *prime2 = NULL; in rsa_priv_wrap_get_data() local 1458 &prime2) == FALSE) { in rsa_priv_wrap_get_data() 1474 modulus, publ_exp, priv_exp, prime1, prime2, in rsa_priv_wrap_get_data() 1489 CK_ATTRIBUTE *prime2 = NULL; in rsa_priv_unwrap() local 1496 &modulus, &publ_exp, &priv_exp, &prime1, &prime2, in rsa_priv_unwrap() 1506 (void) remove_leading_zeros(prime2); in rsa_priv_unwrap() 1515 (void) template_update_attribute(tmpl, prime2); in rsa_priv_unwrap()
|
/titanic_50/usr/src/common/crypto/rsa/ |
H A D | rsa_impl.h | 110 uchar_t *prime2; /* q */ member
|
H A D | rsa_impl.c | 463 bignum2bytestring(bkey->prime2, &(rsakey.p), bkey->prime2_bytes); in rsa_genkey_pair() 570 bkey->prime2_bytes == 0 || bkey->prime2 == NULL || in rsa_decrypt() 603 bytestring2bignum(&(rsakey.p), bkey->prime2, bkey->prime2_bytes); in rsa_decrypt()
|
/titanic_50/usr/src/uts/common/crypto/io/ |
H A D | rsa.c | 794 uchar_t *modulus, *prime1, *prime2, *expo1, *expo2, *coef; in core_rsa_decrypt() local 814 (crypto_get_key_attr(key, SUN_CKA_PRIME_2, &prime2, &prime2_len) in core_rsa_decrypt() 829 k.prime2 = prime2; in core_rsa_decrypt()
|
/titanic_50/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelAttributeUtil.c | 1405 biginteger_t prime2; in kernel_build_private_key_object() local 1423 (void) memset(&prime2, 0x0, sizeof (biginteger_t)); in kernel_build_private_key_object() 1564 rv = get_bigint_attr_from_template(&prime2, in kernel_build_private_key_object() 1708 copy_bigint_attr(&prime2, KEY_PRI_RSA_PRIME2(pvk)); in kernel_build_private_key_object() 1807 bigint_attr_cleanup(&prime2); in kernel_build_private_key_object()
|
/titanic_50/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2508 rv = get_bigint_attr(sess, obj, CKA_PRIME_2, &rawrsa->prime2); in get_raw_rsa() 2531 if (rawrsa->prime2.val) in get_raw_rsa() 2532 free(rawrsa->prime2.val); in get_raw_rsa() 3372 if (rawkey->rawdata.rsa.prime2.val != NULL) { in store_raw_key() 3374 rawkey->rawdata.rsa.prime2.val, in store_raw_key() 3375 rawkey->rawdata.rsa.prime2.len); in store_raw_key()
|
/titanic_50/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 186 KMF_BIGINT prime2; member
|
/titanic_50/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 902 rsa.prime2.val = (uchar_t *)Prime2->bv_val; in readAltFormatPrivateKey() 903 rsa.prime2.len = Prime2->bv_len; in readAltFormatPrivateKey() 3153 if (key->prime2.val != NULL) in ImportRawRSAKey() 3154 if ((rsa->q = BN_bin2bn(key->prime2.val, key->prime2.len, in ImportRawRSAKey() 4096 if ((rv = sslBN2KMFBN(rsa->q, &kmfkey->prime2)) != KMF_OK) in exportRawRSAKey()
|
/titanic_50/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | kssladm_create.c | 142 priv_key_bignums[4] = rsa->rawdata.rsa.prime2; in kmf_to_kssl()
|
/titanic_50/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 2279 rsa->prime2.val, rsa->prime2.len, in DerEncodeRSAPrivateKey()
|
/titanic_50/usr/src/lib/libkmf/libkmf/common/ |
H A D | generalop.c | 1342 kmf_free_bigint(&key->prime2); in free_raw_rsa()
|