Home
last modified time | relevance | path

Searched refs:rsa (Results 1 – 25 of 49) sorted by relevance

12

/titanic_50/usr/src/cmd/ssh/libssh/common/
H A Dkey.c55 RSA *rsa; in key_new() local
61 k->rsa = NULL; in key_new()
65 if ((rsa = RSA_new()) == NULL) in key_new()
67 if ((rsa->n = BN_new()) == NULL) in key_new()
69 if ((rsa->e = BN_new()) == NULL) in key_new()
71 k->rsa = rsa; in key_new()
102 if ((k->rsa->d = BN_new()) == NULL) in key_new_private()
104 if ((k->rsa->iqmp = BN_new()) == NULL) in key_new_private()
106 if ((k->rsa->q = BN_new()) == NULL) in key_new_private()
108 if ((k->rsa->p = BN_new()) == NULL) in key_new_private()
[all …]
H A Drsa.c127 rsa_generate_additional_parameters(RSA *rsa) in rsa_generate_additional_parameters() argument
137 BN_sub(aux, rsa->q, BN_value_one()); in rsa_generate_additional_parameters()
138 BN_mod(rsa->dmq1, rsa->d, aux, ctx); in rsa_generate_additional_parameters()
140 BN_sub(aux, rsa->p, BN_value_one()); in rsa_generate_additional_parameters()
141 BN_mod(rsa->dmp1, rsa->d, aux, ctx); in rsa_generate_additional_parameters()
H A Dssh-rsa.c56 if (key == NULL || key->type != KEY_RSA || key->rsa == NULL) { in ssh_rsa_sign()
69 slen = RSA_size(key->rsa); in ssh_rsa_sign()
72 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); in ssh_rsa_sign()
122 if (key == NULL || key->type != KEY_RSA || key->rsa == NULL) { in ssh_rsa_verify()
126 if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { in ssh_rsa_verify()
128 BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE); in ssh_rsa_verify()
150 modlen = RSA_size(key->rsa); in ssh_rsa_verify()
174 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa); in ssh_rsa_verify()
214 u_char *sigbuf, u_int siglen, RSA *rsa) in openssh_RSA_verify() argument
241 rsasize = RSA_size(rsa); in openssh_RSA_verify()
[all …]
H A Dauthfile.c104 buffer_put_bignum(&buffer, key->rsa->d); in key_save_private_rsa1()
105 buffer_put_bignum(&buffer, key->rsa->iqmp); in key_save_private_rsa1()
106 buffer_put_bignum(&buffer, key->rsa->q); /* reverse from SSL p */ in key_save_private_rsa1()
107 buffer_put_bignum(&buffer, key->rsa->p); /* reverse from SSL q */ in key_save_private_rsa1()
126 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); in key_save_private_rsa1()
127 buffer_put_bignum(&encrypted, key->rsa->n); in key_save_private_rsa1()
128 buffer_put_bignum(&encrypted, key->rsa->e); in key_save_private_rsa1()
197 success = PEM_write_RSAPrivateKey(fp, key->rsa, in key_save_private_pem()
277 buffer_get_bignum(&buffer, pub->rsa->n); in key_load_public_rsa1()
278 buffer_get_bignum(&buffer, pub->rsa->e); in key_load_public_rsa1()
[all …]
H A Dauthfd.c331 buffer_get_bignum(&auth->identities, key->rsa->e); in ssh_get_next_identity()
332 buffer_get_bignum(&auth->identities, key->rsa->n); in ssh_get_next_identity()
334 if (bits != BN_num_bits(key->rsa->n)) in ssh_get_next_identity()
336 BN_num_bits(key->rsa->n), bits); in ssh_get_next_identity()
381 buffer_put_int(&buffer, BN_num_bits(key->rsa->n)); in ssh_decrypt_challenge()
382 buffer_put_bignum(&buffer, key->rsa->e); in ssh_decrypt_challenge()
383 buffer_put_bignum(&buffer, key->rsa->n); in ssh_decrypt_challenge()
476 buffer_put_bignum2(b, key->rsa->n); in ssh_encode_identity_ssh2()
477 buffer_put_bignum2(b, key->rsa->e); in ssh_encode_identity_ssh2()
478 buffer_put_bignum2(b, key->rsa->d); in ssh_encode_identity_ssh2()
[all …]
H A Dhostfile.c178 if (key == NULL || key->type != KEY_RSA1 || key->rsa == NULL) in hostfile_check_key()
180 if (bits != BN_num_bits(key->rsa->n)) { in hostfile_check_key()
183 filename, linenum, host, BN_num_bits(key->rsa->n), bits); in hostfile_check_key()
185 bits, BN_num_bits(key->rsa->n), filename, linenum); in hostfile_check_key()
/titanic_50/usr/src/cmd/fs.d/nfs/lib/
H A Dthrpool.c176 struct rdma_svc_args *rsa; in svcrdma() local
178 rsa = (struct rdma_svc_args *)malloc(sizeof (struct rdma_svc_args)); in svcrdma()
179 rsa->poolid = (uint32_t)id; in svcrdma()
180 rsa->netid = NULL; in svcrdma()
181 rsa->nfs_versmin = versmin; in svcrdma()
182 rsa->nfs_versmax = versmax; in svcrdma()
183 rsa->delegation = delegation; in svcrdma()
188 if (thr_create(NULL, THR_MIN_STACK * 2, svc_rdma_creator, (void *)rsa, in svcrdma()
/titanic_50/usr/src/cmd/ssh/ssh/
H A Dsshconnect1.c98 packet_put_bignum(key->rsa->n); in try_agent_authentication()
228 packet_put_bignum(public->rsa->n); in try_rsa_authentication()
307 respond_to_rsa_challenge(challenge, private->rsa); in try_rsa_authentication()
343 packet_put_int(BN_num_bits(host_key->rsa->n)); in try_rhosts_rsa_authentication()
344 packet_put_bignum(host_key->rsa->e); in try_rhosts_rsa_authentication()
345 packet_put_bignum(host_key->rsa->n); in try_rhosts_rsa_authentication()
371 respond_to_rsa_challenge(challenge, host_key->rsa); in try_rhosts_rsa_authentication()
984 packet_get_bignum(server_key->rsa->e); in ssh_kex()
985 packet_get_bignum(server_key->rsa->n); in ssh_kex()
987 rbits = BN_num_bits(server_key->rsa->n); in ssh_kex()
[all …]
/titanic_50/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dkssladm_create.c88 kmf_to_kssl(int nxkey, KMF_RAW_KEY_DATA *rsa, int ncerts, in kmf_to_kssl() argument
138 priv_key_bignums[0] = rsa->rawdata.rsa.mod; in kmf_to_kssl()
139 priv_key_bignums[1] = rsa->rawdata.rsa.pubexp; in kmf_to_kssl()
140 priv_key_bignums[2] = rsa->rawdata.rsa.priexp; in kmf_to_kssl()
141 priv_key_bignums[3] = rsa->rawdata.rsa.prime1; in kmf_to_kssl()
142 priv_key_bignums[4] = rsa->rawdata.rsa.prime2; in kmf_to_kssl()
143 priv_key_bignums[5] = rsa->rawdata.rsa.exp1; in kmf_to_kssl()
144 priv_key_bignums[6] = rsa->rawdata.rsa.exp2; in kmf_to_kssl()
145 priv_key_bignums[7] = rsa->rawdata.rsa.coef; in kmf_to_kssl()
147 if (rsa->rawdata.rsa.mod.val == NULL || in kmf_to_kssl()
[all …]
H A Dksslutil.c44 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) in PKCS12_get_rsa_key_certs() argument
91 *rsa = keys; in PKCS12_get_rsa_key_certs()
104 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) in PEM_get_rsa_key_certs() argument
152 if (rsa != NULL) in PEM_get_rsa_key_certs()
153 *rsa = keys; in PEM_get_rsa_key_certs()
/titanic_50/usr/src/cmd/ssh/sshd/
H A Dauth-rsa.c70 BN_mod(challenge, challenge, key->rsa->n, ctx); in auth_rsa_generate_challenge()
84 if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { in auth_rsa_verify_response()
86 BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE); in auth_rsa_verify_response()
129 rsa_public_encrypt(encrypted_challenge, challenge, key->rsa); in auth_rsa_challenge_dialog()
245 if (BN_cmp(key->rsa->n, client_n) != 0) in auth_rsa_key_allowed()
249 if (bits != BN_num_bits(key->rsa->n)) in auth_rsa_key_allowed()
252 file, linenum, BN_num_bits(key->rsa->n), bits); in auth_rsa_key_allowed()
H A Dsshd.c1101 BN_num_bits(sensitive_data.ssh1_host_key->rsa->n) - in main()
1103 BN_num_bits(sensitive_data.ssh1_host_key->rsa->n) + in main()
1106 BN_num_bits(sensitive_data.ssh1_host_key->rsa->n) + in main()
1701 if (BN_cmp(sensitive_data.server_key->rsa->n, sensitive_data.ssh1_host_key->rsa->n) > 0) { in ssh1_session_key()
1703 if (BN_num_bits(sensitive_data.server_key->rsa->n) < in ssh1_session_key()
1704 BN_num_bits(sensitive_data.ssh1_host_key->rsa->n) + SSH_KEY_BITS_RESERVED) { in ssh1_session_key()
1707 BN_num_bits(sensitive_data.server_key->rsa->n), in ssh1_session_key()
1708 BN_num_bits(sensitive_data.ssh1_host_key->rsa->n), in ssh1_session_key()
1712 sensitive_data.server_key->rsa) <= 0) in ssh1_session_key()
1715 sensitive_data.ssh1_host_key->rsa) <= 0) in ssh1_session_key()
[all …]
H A Dauth1.c230 packet_get_bignum(client_host_key->rsa->e); in do_authloop()
231 packet_get_bignum(client_host_key->rsa->n); in do_authloop()
233 if (bits != BN_num_bits(client_host_key->rsa->n)) in do_authloop()
236 BN_num_bits(client_host_key->rsa->n), bits); in do_authloop()
H A DMakefile51 auth-rsa.o \
52 auth-rh-rsa.o \
H A Dauth-rh-rsa.c63 client_host_key->rsa == NULL) in auth_rhosts_rsa()
/titanic_50/usr/src/uts/common/fs/nfs/
H A Dnfs_sys.c164 struct rdma_svc_args rsa; in nfssys() local
176 rsa.poolid = STRUCT_FGET(ursa, poolid); in nfssys()
177 rsa.nfs_versmin = STRUCT_FGET(ursa, nfs_versmin); in nfssys()
178 rsa.nfs_versmax = STRUCT_FGET(ursa, nfs_versmax); in nfssys()
179 rsa.delegation = STRUCT_FGET(ursa, delegation); in nfssys()
181 if (copyin(arg, &rsa, sizeof (rsa))) in nfssys()
184 rsa.netid = netstore; in nfssys()
186 error = rdma_start(&rsa); in nfssys()
H A Dnfs_server.c568 rdma_start(struct rdma_svc_args *rsa) in rdma_start() argument
576 if ((rsa->nfs_versmin > rsa->nfs_versmax) || in rdma_start()
577 (rsa->nfs_versmin < NFS_VERSMIN) || in rdma_start()
578 (rsa->nfs_versmax > NFS_VERSMAX)) { in rdma_start()
579 rsa->nfs_versmin = NFS_VERSMIN_DEFAULT; in rdma_start()
580 rsa->nfs_versmax = NFS_VERSMAX_DEFAULT; in rdma_start()
582 nfs_versmin = rsa->nfs_versmin; in rdma_start()
583 nfs_versmax = rsa->nfs_versmax; in rdma_start()
586 __nfs_sc_rdma[0].sc_versmin = rsa->nfs_versmin; in rdma_start()
587 __nfs_sc_rdma[0].sc_versmax = rsa->nfs_versmax; in rdma_start()
[all …]
/titanic_50/usr/src/cmd/ssh/ssh-agent/
H A Dssh-agent.c204 buffer_put_int(&msg, BN_num_bits(id->key->rsa->n)); in process_request_identities()
205 buffer_put_bignum(&msg, id->key->rsa->e); in process_request_identities()
206 buffer_put_bignum(&msg, id->key->rsa->n); in process_request_identities()
240 buffer_get_bignum(&e->request, key->rsa->e); in process_authentication_challenge1()
241 buffer_get_bignum(&e->request, key->rsa->n); in process_authentication_challenge1()
256 if (rsa_private_decrypt(challenge, challenge, private->rsa) <= 0) in process_authentication_challenge1()
350 buffer_get_bignum(&e->request, key->rsa->e); in process_remove_identity()
351 buffer_get_bignum(&e->request, key->rsa->n); in process_remove_identity()
455 buffer_get_bignum(&e->request, k->rsa->n); in process_add_identity()
456 buffer_get_bignum(&e->request, k->rsa->e); in process_add_identity()
[all …]
/titanic_50/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c802 KMF_RAW_RSA_KEY rsa; in readAltFormatPrivateKey() local
881 (void) memset(&rsa, 0, sizeof (rsa)); in readAltFormatPrivateKey()
883 if ((ret = sslBN2KMFBN(Exp1, &rsa.exp1)) != KMF_OK) in readAltFormatPrivateKey()
885 if ((ret = sslBN2KMFBN(Exp2, &rsa.exp2)) != KMF_OK) in readAltFormatPrivateKey()
887 if ((ret = sslBN2KMFBN(COEF, &rsa.coef)) != KMF_OK) in readAltFormatPrivateKey()
890 rsa.mod.val = (uchar_t *)Mod->bv_val; in readAltFormatPrivateKey()
891 rsa.mod.len = Mod->bv_len; in readAltFormatPrivateKey()
893 rsa.pubexp.val = (uchar_t *)PubExp->bv_val; in readAltFormatPrivateKey()
894 rsa.pubexp.len = PubExp->bv_len; in readAltFormatPrivateKey()
896 rsa.priexp.val = (uchar_t *)PriExp->bv_val; in readAltFormatPrivateKey()
[all …]
/titanic_50/usr/src/cmd/ssh/ssh-keyscan/
H A Dssh-keyscan.c298 static Key *rsa; in keygrab_ssh1() local
301 if (rsa == NULL) { in keygrab_ssh1()
303 rsa = key_new(KEY_RSA1); in keygrab_ssh1()
316 buffer_get_bignum(&msg, rsa->rsa->e); in keygrab_ssh1()
317 buffer_get_bignum(&msg, rsa->rsa->n); in keygrab_ssh1()
321 buffer_get_bignum(&msg, rsa->rsa->e); in keygrab_ssh1()
322 buffer_get_bignum(&msg, rsa->rsa->n); in keygrab_ssh1()
326 return (rsa); in keygrab_ssh1()
/titanic_50/usr/src/cmd/ssh/etc/
H A Dsshd83 create_key $SSHDIR/ssh_host_rsa_key rsa
108 create_key $SSHDIR/ssh_host_rsa_key rsa
/titanic_50/usr/src/cmd/ssh/libssh/
H A DMakefile.com73 rsa.o \
77 ssh-rsa.o \
/titanic_50/usr/src/cmd/ssh/ssh-keygen/
H A Dssh-keygen.c273 if (!BN_set_word(key->rsa->e, e)) { in do_convert_private_ssh2_from_blob()
278 buffer_get_bignum_bits(&b, key->rsa->d); in do_convert_private_ssh2_from_blob()
279 buffer_get_bignum_bits(&b, key->rsa->n); in do_convert_private_ssh2_from_blob()
280 buffer_get_bignum_bits(&b, key->rsa->iqmp); in do_convert_private_ssh2_from_blob()
281 buffer_get_bignum_bits(&b, key->rsa->q); in do_convert_private_ssh2_from_blob()
282 buffer_get_bignum_bits(&b, key->rsa->p); in do_convert_private_ssh2_from_blob()
283 rsa_generate_additional_parameters(key->rsa); in do_convert_private_ssh2_from_blob()
395 PEM_write_RSAPrivateKey(stdout, k->rsa, NULL, NULL, 0, NULL, NULL)) : in do_convert_from_ssh2()
/titanic_50/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c2262 DerEncodeRSAPrivateKey(KMF_DATA *encodedkey, KMF_RAW_RSA_KEY *rsa) in DerEncodeRSAPrivateKey() argument
2275 rsa->mod.val, rsa->mod.len, in DerEncodeRSAPrivateKey()
2276 rsa->pubexp.val, rsa->pubexp.len, in DerEncodeRSAPrivateKey()
2277 rsa->priexp.val, rsa->priexp.len, in DerEncodeRSAPrivateKey()
2278 rsa->prime1.val, rsa->prime1.len, in DerEncodeRSAPrivateKey()
2279 rsa->prime2.val, rsa->prime2.len, in DerEncodeRSAPrivateKey()
2280 rsa->exp1.val, rsa->exp1.len, in DerEncodeRSAPrivateKey()
2281 rsa->exp2.val, rsa->exp2.len, in DerEncodeRSAPrivateKey()
2282 rsa->coef.val, rsa->coef.len) == -1) in DerEncodeRSAPrivateKey()
/titanic_50/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dtpm_specific.c2761 RSA *rsa = NULL; in token_specific_rsa_verify_recover() local
2784 rsa = RSA_new(); in token_specific_rsa_verify_recover()
2785 if (rsa == NULL) { in token_specific_rsa_verify_recover()
2790 rsa->n = BN_bin2bn(modulus, modLen, rsa->n); in token_specific_rsa_verify_recover()
2791 rsa->e = BN_bin2bn(exp, sizeof (exp), rsa->e); in token_specific_rsa_verify_recover()
2792 if (rsa->n == NULL || rsa->e == NULL) { in token_specific_rsa_verify_recover()
2797 rsa->flags |= RSA_FLAG_SIGN_VER; in token_specific_rsa_verify_recover()
2801 rsa, RSA_NO_PADDING); in token_specific_rsa_verify_recover()
2812 num = BN_num_bytes(rsa->n); in token_specific_rsa_verify_recover()
2834 if (rsa) in token_specific_rsa_verify_recover()
[all …]

12