Home
last modified time | relevance | path

Searched refs:RSA_size (Results 1 – 25 of 25) sorted by relevance

/third_party/openssl/doc/man3/
DRSA_public_encrypt.pod21 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory.
51 B<flen> must not be more than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
52 based padding modes, not more than RSA_size(B<rsa>) - 42 for
53 RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING.
59 RSA_size(B<rsa>) bytes.
64 be equal to RSA_size(B<rsa>) but may be smaller, when leading zero
68 data (which is equal to RSA_size(B<rsa>) for RSA_NO_PADDING,
69 RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 based padding modes and
70 RSA_size(B<rsa>) - 42 for RSA_PKCS1_OAEP_PADDING).
77 RSA_size(B<rsa>)). RSA_private_decrypt() returns the size of the
[all …]
DRSA_size.pod5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits
11 int RSA_size(const RSA *rsa);
19 RSA_size() returns the RSA modulus size in bytes. It can be used to
32 RSA_size() returns the size of modulus in bytes.
DRSA_private_encrypt.pod24 B<RSA_size(rsa)> bytes of memory.
48 message digest (which is smaller than B<RSA_size(rsa) -
54 RSA_size(rsa)). RSA_public_decrypt() returns the size of the
DBN_num_bytes.pod42 size" of such a key, either use functions like RSA_size(), DH_size()
50 L<RSA_size(3)>
DRSA_sign_ASN1_OCTET_STRING.pod24 in B<siglen>. B<sigret> must point to B<RSA_size(rsa)> bytes of
DRSA_sign.pod22 B<sigret> must point to RSA_size(B<rsa>) bytes of memory.
DRSA_get0_key.pod159 L<RSA_new(3)>, L<RSA_size(3)>
DRSA_meth_new.pod243 L<RSA_set_method(3)>, L<RSA_size(3)>, L<RSA_get0_key(3)>,
/third_party/openssl/crypto/rsa/
Drsa_saos.c31 j = RSA_size(rsa); in RSA_sign_ASN1_OCTET_STRING()
64 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING()
Drsa_sign.c99 if (encoded_len > RSA_size(rsa) - RSA_PKCS1_PADDING_SIZE) { in RSA_sign()
131 if (siglen != (size_t)RSA_size(rsa)) { in int_rsa_verify()
Drsa_pss.c68 emLen = RSA_size(rsa); in RSA_verify_PKCS1_PSS_mgf1()
179 emLen = RSA_size(rsa); in RSA_padding_add_PKCS1_PSS_mgf1()
Drsa_pmeth.c176 ret = RSA_private_encrypt(RSA_size(rsa), rctx->tbuf, in pkey_rsa_sign()
301 int klen = RSA_size(ctx->pkey->pkey.rsa); in pkey_rsa_encrypt()
817 max_saltlen = RSA_size(rsa) - EVP_MD_size(md); in pkey_pss_init()
Drsa_crpt.c22 int RSA_size(const RSA *r) in RSA_size() function
Drsa_ameth.c205 return RSA_size(pkey->pkey.rsa); in int_rsa_size()
/third_party/openssl/apps/
Drsautl.c212 keysize = RSA_size(rsa); in rsautl_main()
/third_party/libwebsockets/lib/tls/openssl/
Dopenssl-x509.c587 if ((size_t)RSA_size(rsapub) * 8 < (size_t)rsa_min_bits) { in lws_x509_public_to_jwk()
589 __func__, RSA_size(rsapub) * 8, rsa_min_bits); in lws_x509_public_to_jwk()
/third_party/openssl/crypto/pem/
Dpvkfmt.c527 nbyte = RSA_size(rsa); in check_bitlen_rsa()
563 nbyte = RSA_size(rsa); in write_rsa()
/third_party/openssl/include/openssl/
Drsa.h201 int RSA_size(const RSA *rsa);
/third_party/openssl/ssl/statem/
Dstatem_srvr.c3034 if (RSA_size(rsa) < SSL_MAX_MASTER_KEY_LENGTH) { in tls_process_cke_rsa()
3040 rsa_decrypt = OPENSSL_malloc(RSA_size(rsa)); in tls_process_cke_rsa()
/third_party/openssl/engines/
De_capi.c888 slen = RSA_size(rsa); in capi_rsa_sign()
/third_party/openssl/ssl/
Dt1_lib.c847 if (RSA_size(rsa) < RSA_PSS_MINIMUM_KEY_SIZE(md)) in rsa_pss_check_min_key_size()
/third_party/grpc/src/boringssl/
Dboringssl_prefix_symbols.h2081 #define RSA_size BORINGSSL_ADD_PREFIX(BORINGSSL_PREFIX, RSA_size) macro
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dtls_openssl.c454 len = RSA_size(rsa); in cryptoapi_rsa_priv_enc()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dtls_openssl.c458 len = RSA_size(rsa); in cryptoapi_rsa_priv_enc()
/third_party/openssl/util/
Dlibcrypto.num2949 RSA_size 2904 1_1_0 EXIST::FUNCTION:RSA