Searched refs:RSA_size (Results 1 – 25 of 25) sorted by relevance
/third_party/openssl/doc/man3/ |
D | RSA_public_encrypt.pod | 21 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory. 51 B<flen> must not be more than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 52 based padding modes, not more than RSA_size(B<rsa>) - 42 for 53 RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. 59 RSA_size(B<rsa>) bytes. 64 be equal to RSA_size(B<rsa>) but may be smaller, when leading zero 68 data (which is equal to RSA_size(B<rsa>) for RSA_NO_PADDING, 69 RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 based padding modes and 70 RSA_size(B<rsa>) - 42 for RSA_PKCS1_OAEP_PADDING). 77 RSA_size(B<rsa>)). RSA_private_decrypt() returns the size of the [all …]
|
D | RSA_size.pod | 5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits 11 int RSA_size(const RSA *rsa); 19 RSA_size() returns the RSA modulus size in bytes. It can be used to 32 RSA_size() returns the size of modulus in bytes.
|
D | RSA_private_encrypt.pod | 24 B<RSA_size(rsa)> bytes of memory. 48 message digest (which is smaller than B<RSA_size(rsa) - 54 RSA_size(rsa)). RSA_public_decrypt() returns the size of the
|
D | BN_num_bytes.pod | 42 size" of such a key, either use functions like RSA_size(), DH_size() 50 L<RSA_size(3)>
|
D | RSA_sign_ASN1_OCTET_STRING.pod | 24 in B<siglen>. B<sigret> must point to B<RSA_size(rsa)> bytes of
|
D | RSA_sign.pod | 22 B<sigret> must point to RSA_size(B<rsa>) bytes of memory.
|
D | RSA_get0_key.pod | 159 L<RSA_new(3)>, L<RSA_size(3)>
|
D | RSA_meth_new.pod | 243 L<RSA_set_method(3)>, L<RSA_size(3)>, L<RSA_get0_key(3)>,
|
/third_party/openssl/crypto/rsa/ |
D | rsa_saos.c | 31 j = RSA_size(rsa); in RSA_sign_ASN1_OCTET_STRING() 64 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING()
|
D | rsa_sign.c | 99 if (encoded_len > RSA_size(rsa) - RSA_PKCS1_PADDING_SIZE) { in RSA_sign() 131 if (siglen != (size_t)RSA_size(rsa)) { in int_rsa_verify()
|
D | rsa_pss.c | 68 emLen = RSA_size(rsa); in RSA_verify_PKCS1_PSS_mgf1() 179 emLen = RSA_size(rsa); in RSA_padding_add_PKCS1_PSS_mgf1()
|
D | rsa_pmeth.c | 176 ret = RSA_private_encrypt(RSA_size(rsa), rctx->tbuf, in pkey_rsa_sign() 301 int klen = RSA_size(ctx->pkey->pkey.rsa); in pkey_rsa_encrypt() 817 max_saltlen = RSA_size(rsa) - EVP_MD_size(md); in pkey_pss_init()
|
D | rsa_crpt.c | 22 int RSA_size(const RSA *r) in RSA_size() function
|
D | rsa_ameth.c | 205 return RSA_size(pkey->pkey.rsa); in int_rsa_size()
|
/third_party/openssl/apps/ |
D | rsautl.c | 212 keysize = RSA_size(rsa); in rsautl_main()
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | openssl-x509.c | 587 if ((size_t)RSA_size(rsapub) * 8 < (size_t)rsa_min_bits) { in lws_x509_public_to_jwk() 589 __func__, RSA_size(rsapub) * 8, rsa_min_bits); in lws_x509_public_to_jwk()
|
/third_party/openssl/crypto/pem/ |
D | pvkfmt.c | 527 nbyte = RSA_size(rsa); in check_bitlen_rsa() 563 nbyte = RSA_size(rsa); in write_rsa()
|
/third_party/openssl/include/openssl/ |
D | rsa.h | 201 int RSA_size(const RSA *rsa);
|
/third_party/openssl/ssl/statem/ |
D | statem_srvr.c | 3034 if (RSA_size(rsa) < SSL_MAX_MASTER_KEY_LENGTH) { in tls_process_cke_rsa() 3040 rsa_decrypt = OPENSSL_malloc(RSA_size(rsa)); in tls_process_cke_rsa()
|
/third_party/openssl/engines/ |
D | e_capi.c | 888 slen = RSA_size(rsa); in capi_rsa_sign()
|
/third_party/openssl/ssl/ |
D | t1_lib.c | 847 if (RSA_size(rsa) < RSA_PSS_MINIMUM_KEY_SIZE(md)) in rsa_pss_check_min_key_size()
|
/third_party/grpc/src/boringssl/ |
D | boringssl_prefix_symbols.h | 2081 #define RSA_size BORINGSSL_ADD_PREFIX(BORINGSSL_PREFIX, RSA_size) macro
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | tls_openssl.c | 454 len = RSA_size(rsa); in cryptoapi_rsa_priv_enc()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | tls_openssl.c | 458 len = RSA_size(rsa); in cryptoapi_rsa_priv_enc()
|
/third_party/openssl/util/ |
D | libcrypto.num | 2949 RSA_size 2904 1_1_0 EXIST::FUNCTION:RSA
|