/external/openssh/regress/unittests/sshkey/ |
D | test_sshkey.c | 207 k1 = sshkey_new(KEY_RSA); in sshkey_tests() 244 k1 = sshkey_new_private(KEY_RSA); in sshkey_tests() 265 ASSERT_INT_EQ(sshkey_generate(KEY_RSA, 128, &k1), in sshkey_tests() 271 ASSERT_INT_EQ(sshkey_generate(KEY_RSA, 1 << 20, &k1), in sshkey_tests() 293 ASSERT_INT_EQ(sshkey_generate(KEY_RSA, 767, &kr), in sshkey_tests() 295 ASSERT_INT_EQ(sshkey_generate(KEY_RSA, 1024, &kr), 0); in sshkey_tests() 334 ASSERT_INT_EQ(k1->type, KEY_RSA); in sshkey_tests() 404 ASSERT_INT_EQ(sshkey_generate(KEY_RSA, 1024, &k1), 0); in sshkey_tests()
|
/external/openssh/regress/unittests/hostkeys/ |
D | test_iterate.c | 242 KEY_RSA, 333 KEY_RSA, 424 KEY_RSA, 515 KEY_RSA, 702 KEY_RSA, 715 KEY_RSA, 728 KEY_RSA, 953 { NULL, HKF_STATUS_OK, KEY_RSA, HKF_MATCH_HOST, 0, 0, 0, -1, {
|
/external/openssh/ |
D | sshkey.c | 95 { "ssh-rsa", "RSA", KEY_RSA, 0, 0, 0 }, 96 { "rsa-sha2-256", "RSA", KEY_RSA, 0, 0, 1 }, 97 { "rsa-sha2-512", "RSA", KEY_RSA, 0, 0, 1 }, 276 case KEY_RSA: in sshkey_size() 297 case KEY_RSA: in sshkey_type_is_valid_ca() 321 return KEY_RSA; in sshkey_type_plain() 479 case KEY_RSA: in sshkey_new() 537 case KEY_RSA: in sshkey_add_private() 593 case KEY_RSA: in sshkey_free() 672 case KEY_RSA: in sshkey_equal_public() [all …]
|
D | ssh-rsa.c | 102 sshkey_type_plain(key->type) != KEY_RSA || in ssh_rsa_sign() 174 sshkey_type_plain(key->type) != KEY_RSA || in ssh_rsa_verify()
|
D | ssh-keygen.c | 254 case KEY_RSA: in ask_filename() 338 case KEY_RSA: in do_convert_to_pkcs8() 363 case KEY_RSA: in do_convert_to_pem() 474 ktype = KEY_RSA; in do_convert_private_ssh2_from_blob() 492 case KEY_RSA: in do_convert_private_ssh2_from_blob() 630 (*k)->type = KEY_RSA; in do_convert_from_pkcs8() 670 (*k)->type = KEY_RSA; in do_convert_from_pem() 733 case KEY_RSA: in do_convert_from() 1632 if (public->type != KEY_RSA && public->type != KEY_DSA && in do_ca_sign()
|
D | ssh-pkcs11-client.c | 117 key.type = KEY_RSA; in pkcs11_rsa_private_encrypt()
|
D | dns.c | 88 case KEY_RSA: in dns_read_key()
|
D | auth2-hostbased.c | 105 if (key_type_plain(key->type) == KEY_RSA && in userauth_hostbased()
|
D | sshkey.h | 57 KEY_RSA, enumerator
|
D | authfd.c | 433 if (alg != NULL && key->type == KEY_RSA) { in agent_encode_alg() 575 case KEY_RSA: in ssh_add_identity_constrained()
|
D | sshd.c | 723 case KEY_RSA: 733 if (key->type == KEY_RSA) { 1767 case KEY_RSA:
|
D | authfile.c | 464 case KEY_RSA: in sshkey_load_private_cert()
|
D | ssh-pkcs11.c | 542 key->type = KEY_RSA; in pkcs11_fetch_keys_filter()
|
D | ssh.c | 1314 sensitive_data.keys[3] = key_load_private_cert(KEY_RSA, in main() 1324 sensitive_data.keys[7] = key_load_private_type(KEY_RSA, in main()
|
D | ssh-keyscan.c | 770 case KEY_RSA: in main()
|
D | sshconnect2.c | 1003 if (key->type == KEY_RSA) { in key_sign_encode() 1468 if (key_type_plain(id->key->type) == KEY_RSA && in try_identity()
|
D | auth2-pubkey.c | 123 if (key_type_plain(key->type) == KEY_RSA && in userauth_pubkey()
|
D | sshconnect.c | 1419 KEY_RSA, in show_other_keys()
|
D | ssh-agent.c | 377 if (key->type == KEY_RSA) { in agent_decode_alg()
|
D | monitor.c | 1148 if (key_type_plain(key->type) == KEY_RSA && in mm_answer_keyallowed()
|
D | clientloop.c | 2406 if (key->type == KEY_RSA && in key_accepted_by_hostkeyalgs()
|
/external/openssh/regress/unittests/kex/ |
D | test_kex.c | 181 do_kex_with_key(kex, KEY_RSA, 2048); in do_kex()
|