Searched refs:EVP_PKEY_decrypt (Results 1 – 24 of 24) sorted by relevance
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_decrypt.pod | 5 EVP_PKEY_decrypt_init, EVP_PKEY_decrypt - decrypt using a public key algorithm 12 int EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, 21 The EVP_PKEY_decrypt() function performs a public key decryption operation 35 The function EVP_PKEY_decrypt() can be called more than once on the same 40 EVP_PKEY_decrypt_init() and EVP_PKEY_decrypt() return 1 for success and 0 70 if (EVP_PKEY_decrypt(ctx, NULL, &outlen, in, inlen) <= 0) 78 if (EVP_PKEY_decrypt(ctx, out, &outlen, in, inlen) <= 0)
|
D | EVP_PKEY_size.pod | 23 L<EVP_PKEY_encrypt(3)>, L<EVP_PKEY_decrypt(3)>, L<EVP_PKEY_derive(3)>. 68 L<EVP_PKEY_decrypt(3)>,
|
D | EVP_PKEY_verify.pod | 85 L<EVP_PKEY_decrypt(3)>,
|
D | EVP_PKEY_derive.pod | 85 L<EVP_PKEY_decrypt(3)>,
|
D | EVP_PKEY_encrypt.pod | 91 L<EVP_PKEY_decrypt(3)>,
|
D | EVP_PKEY_verify_recover.pod | 96 L<EVP_PKEY_decrypt(3)>,
|
D | EVP_PKEY_sign.pod | 97 L<EVP_PKEY_decrypt(3)>,
|
D | EVP_PKEY_keygen.pod | 184 L<EVP_PKEY_decrypt(3)>,
|
D | EVP_PKEY_meth_new.pod | 339 They are called by L<EVP_PKEY_decrypt_init(3)> and L<EVP_PKEY_decrypt(3)>.
|
D | EVP_PKEY_CTX_ctrl.pod | 447 L<EVP_PKEY_decrypt(3)>,
|
/third_party/openssl/doc/man7/ |
D | evp.pod | 51 and L<EVP_PKEY_decrypt(3)> respectively. However, note that 96 L<EVP_PKEY_decrypt(3)>,
|
/third_party/openssl/crypto/evp/ |
D | pmeth_fn.c | 187 int EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, in EVP_PKEY_decrypt() function
|
/third_party/openssl/crypto/cms/ |
D | cms_env.c | 404 if (EVP_PKEY_decrypt(ktri->pctx, NULL, &eklen, in cms_RecipientInfo_ktri_decrypt() 416 if (EVP_PKEY_decrypt(ktri->pctx, ek, &eklen, in cms_RecipientInfo_ktri_decrypt()
|
/third_party/openssl/apps/ |
D | pkeyutl.c | 515 rv = EVP_PKEY_decrypt(ctx, out, poutlen, in, inlen); in do_keyop()
|
/third_party/openssl/crypto/pkcs7/ |
D | pk7_doit.c | 162 if (EVP_PKEY_decrypt(pctx, NULL, &eklen, in pkcs7_decrypt_rinfo() 173 if (EVP_PKEY_decrypt(pctx, ek, &eklen, in pkcs7_decrypt_rinfo()
|
/third_party/openssl/test/ |
D | evp_extra_test.c | 1369 if (!TEST_true(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext, ctext_len))) in test_EVP_SM2()
|
D | evp_test.c | 1247 EVP_PKEY_decrypt); in decrypt_test_init()
|
/third_party/openssl/include/openssl/ |
D | evp.h | 1400 int EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx,
|
/third_party/openssl/ssl/statem/ |
D | statem_srvr.c | 3428 if (EVP_PKEY_decrypt(pkey_ctx, premaster_secret, &outlen, start, in tls_process_cke_gost()
|
/third_party/grpc/src/boringssl/ |
D | boringssl_prefix_symbols.h | 1576 #define EVP_PKEY_decrypt BORINGSSL_ADD_PREFIX(BORINGSSL_PREFIX, EVP_PKEY_decrypt) macro
|
/third_party/openssl/crypto/err/ |
D | openssl.txt | 768 EVP_F_EVP_PKEY_DECRYPT:104:EVP_PKEY_decrypt
|
/third_party/node/src/ |
D | node_crypto.cc | 7071 EVP_PKEY_decrypt>); in Initialize()
|
/third_party/openssl/ |
D | CHANGES | 194 API function EVP_PKEY_decrypt(). Typically an application will call this 198 sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL 203 first call to EVP_PKEY_decrypt() can be smaller than the actual size required by 204 the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is
|
/third_party/openssl/util/ |
D | libcrypto.num | 2807 EVP_PKEY_decrypt 2768 1_1_0 EXIST::FUNCTION:
|