/dports/security/tinc-devel/tinc-1.1pre18/src/openssl/ |
H A D | rsa.c | 35 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d) { in RSA_set0_key() function 62 RSA_set0_key(rsa, bn_n, bn_e, NULL); in rsa_set_hex_public_key() 85 RSA_set0_key(rsa, bn_n, bn_e, bn_d); in rsa_set_hex_private_key()
|
/dports/security/trousers/trousers-0.3.14_3/src/trspi/crypto/openssl/ |
H A D | rsa.c | 43 RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d) in RSA_set0_key() function 101 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) { in Trspi_RSA_Encrypt() 188 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) { in Trspi_Verify() 288 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) { in Trspi_RSA_Public_Encrypt()
|
/dports/net-im/telegram-purple/telegram-purple-1.4.3/tgl/crypto/ |
H A D | rsa_pem_openssl.c | 36 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d) in RSA_set0_key() function 84 RSA_set0_key(ret, unwrap_bn (TGLC_bn_bin2bn (n, n_bytes, NULL)), unwrap_bn(e_tglcbn), NULL); in TGLC_WRAPPER_ASSOC()
|
/dports/net-im/telegram-cli/tg-20200106/tgl/crypto/ |
H A D | rsa_pem_openssl.c | 36 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d) in RSA_set0_key() function 84 RSA_set0_key(ret, unwrap_bn (TGLC_bn_bin2bn (n, n_bytes, NULL)), unwrap_bn(e_tglcbn), NULL); in TGLC_WRAPPER_ASSOC()
|
/dports/devel/folly/folly-2021.12.27.00/folly/portability/test/ |
H A D | OpenSSLPortabilityTest.cpp | 37 RSA_set0_key(r.get(), n, e, d); in TEST() 53 RSA_set0_key(public_key.get(), n_public, e_public, nullptr); in TEST()
|
/dports/net-mgmt/seafile-gui/seafile-client-7.0.9/src/utils/ |
H A D | rsa.cpp | 18 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d) in RSA_set0_key() function 156 RSA_set0_key (pub, BN_dup(n), BN_dup(e), NULL); in private_key_to_pub()
|
/dports/security/pam_p11/pam_p11-0.3.1/src/ |
H A D | match_openssh.c | 32 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d) in RSA_set0_key() function 142 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) in ssh1_line_to_key() 235 if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL)) { in ssh2_line_to_key()
|
/dports/devel/cargo-c/cargo-c-0.9.6+cargo-0.58/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/emulators/qemu42/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 72 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 118 in the call and may therefore I<not> be passed to RSA_set0_key(). If 132 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/emulators/qemu/qemu-6.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/openssl-src-111.9.0+1.1.1g/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/emulators/qemu5/qemu-5.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/sysutils/uefi-edk2-qemu/edk2-edk2-stable201911/CryptoPkg/Library/OpensslLib/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 72 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 118 in the call and may therefore I<not> be passed to RSA_set0_key(). If 132 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/sysutils/uefi-edk2-bhyve/edk2-edk2-stable202102/CryptoPkg/Library/OpensslLib/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.14.0+1.1.1j/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.15.0+1.1.1k/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/emulators/qemu-utils/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 72 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 118 in the call and may therefore I<not> be passed to RSA_set0_key(). If 132 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/emulators/qemu-guest-agent/qemu-5.0.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 72 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 118 in the call and may therefore I<not> be passed to RSA_set0_key(). If 132 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/www/websocat/websocat-1.9.0/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/lang/rust/rustc-1.58.1-src/vendor/openssl-src/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/security/openssl/openssl-1.1.1n/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/security/openssl-static/openssl-1.1.1l/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/sysutils/edk2/edk2-edk2-stable202102/CryptoPkg/Library/OpensslLib/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|
/dports/sysutils/exa/exa-0.10.1/cargo-crates/openssl-src-111.15.0+1.1.1k/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 5 RSA_set0_key, RSA_set0_factors, RSA_set0_crt_params, RSA_get0_key, 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 73 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 121 in the call and may therefore I<not> be passed to RSA_set0_key(). If 135 RSA_set0_key(), RSA_set0_factors(), RSA_set0_crt_params() and
|