/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_saos.c | 37 j = RSA_size(rsa); in RSA_sign_ASN1_OCTET_STRING() 69 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING()
|
H A D | rsa_pmeth.c | 115 OPENSSL_malloc(RSA_size(EVP_PKEY_get0_RSA(pk->pkey)))) == NULL) { in setup_tbuf() 162 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign() 189 ret = RSA_private_encrypt(RSA_size(rsa), rctx->tbuf, in pkey_rsa_sign() 326 int klen = RSA_size(rsa); in pkey_rsa_encrypt() 851 max_saltlen = RSA_size(rsa) - EVP_MD_get_size(md); in pkey_pss_init()
|
H A D | rsa_pss.c | 74 emLen = RSA_size(rsa); in RSA_verify_PKCS1_PSS_mgf1() 187 emLen = RSA_size(rsa); in RSA_padding_add_PKCS1_PSS_mgf1()
|
H A D | rsa_sign.c | 305 if (encoded_len + RSA_PKCS1_PADDING_SIZE > (size_t)RSA_size(rsa)) { in RSA_sign() 339 if (siglen != (size_t)RSA_size(rsa)) { in ossl_rsa_verify()
|
H A D | rsa_crpt.c | 28 int RSA_size(const RSA *r) in RSA_size() function
|
H A D | rsa_gen.c | 496 ciphertxt_len = RSA_size(rsa); in rsa_keygen_pairwise_test() 499 * parameter to be a maximum of RSA_size() - allocate space for both. in rsa_keygen_pairwise_test()
|
/third_party/openssl/crypto/rsa/ |
H A D | rsa_saos.c | 37 j = RSA_size(rsa); in RSA_sign_ASN1_OCTET_STRING() 69 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING()
|
H A D | rsa_pmeth.c | 115 OPENSSL_malloc(RSA_size(EVP_PKEY_get0_RSA(pk->pkey)))) == NULL) { in setup_tbuf() 162 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign() 189 ret = RSA_private_encrypt(RSA_size(rsa), rctx->tbuf, in pkey_rsa_sign() 326 int klen = RSA_size(rsa); in pkey_rsa_encrypt() 847 max_saltlen = RSA_size(rsa) - EVP_MD_get_size(md); in pkey_pss_init()
|
H A D | rsa_pss.c | 74 emLen = RSA_size(rsa); in RSA_verify_PKCS1_PSS_mgf1() 187 emLen = RSA_size(rsa); in RSA_padding_add_PKCS1_PSS_mgf1()
|
H A D | rsa_sign.c | 305 if (encoded_len + RSA_PKCS1_PADDING_SIZE > (size_t)RSA_size(rsa)) { in RSA_sign() 339 if (siglen != (size_t)RSA_size(rsa)) { in ossl_rsa_verify()
|
H A D | rsa_crpt.c | 28 int RSA_size(const RSA *r) in RSA_size() function
|
H A D | rsa_gen.c | 496 ciphertxt_len = RSA_size(rsa); in rsa_keygen_pairwise_test() 499 * parameter to be a maximum of RSA_size() - allocate space for both. in rsa_keygen_pairwise_test()
|
/third_party/openssl/test/ |
H A D | rsa_mp_test.c | 147 return RSA_size(key); in key2048_key() 153 int rv = RSA_size(key); in key2048p3_v1() 204 int rv = RSA_size(key); in key2048p3_v2()
|
/third_party/node/deps/openssl/openssl/providers/implementations/signature/ |
H A D | rsa_sig.c | 161 max_saltlen = RSA_size(prsactx->rsa) - EVP_MD_get_size(prsactx->md); in rsa_check_parameters() 205 saltlen = RSA_size(ctx->rsa) - EVP_MD_get_size(ctx->md) - 2; in rsa_pss_compute_saltlen() 487 if ((ctx->tbuf = OPENSSL_malloc(RSA_size(ctx->rsa))) == NULL) { in setup_tbuf() 497 OPENSSL_cleanse(ctx->tbuf, RSA_size(ctx->rsa)); in clean_tbuf() 519 size_t rsasize = RSA_size(prsactx->rsa); in rsa_sign() 564 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign() 567 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign() 633 ret = RSA_private_encrypt(RSA_size(prsactx->rsa), prsactx->tbuf, in rsa_sign() 683 *routlen = RSA_size(prsactx->rsa); in rsa_verify_recover()
|
/third_party/openssl/providers/implementations/signature/ |
H A D | rsa_sig.c | 161 max_saltlen = RSA_size(prsactx->rsa) - EVP_MD_get_size(prsactx->md); in rsa_check_parameters() 205 saltlen = RSA_size(ctx->rsa) - EVP_MD_get_size(ctx->md) - 2; in rsa_pss_compute_saltlen() 487 if ((ctx->tbuf = OPENSSL_malloc(RSA_size(ctx->rsa))) == NULL) { in setup_tbuf() 497 OPENSSL_cleanse(ctx->tbuf, RSA_size(ctx->rsa)); in clean_tbuf() 519 size_t rsasize = RSA_size(prsactx->rsa); in rsa_sign() 564 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign() 567 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign() 633 ret = RSA_private_encrypt(RSA_size(prsactx->rsa), prsactx->tbuf, in rsa_sign() 683 *routlen = RSA_size(prsactx->rsa); in rsa_verify_recover()
|
/third_party/node/deps/openssl/openssl/providers/implementations/asymciphers/ |
H A D | rsa_enc.c | 145 size_t len = RSA_size(prsactx->rsa); in rsa_encrypt() 156 int rsasize = RSA_size(prsactx->rsa); in rsa_encrypt() 202 size_t len = RSA_size(prsactx->rsa); in rsa_decrypt()
|
/third_party/openssl/providers/implementations/asymciphers/ |
H A D | rsa_enc.c | 145 size_t len = RSA_size(prsactx->rsa); in rsa_encrypt() 156 int rsasize = RSA_size(prsactx->rsa); in rsa_encrypt() 202 size_t len = RSA_size(prsactx->rsa); in rsa_decrypt()
|
/third_party/node/deps/openssl/openssl/providers/implementations/kem/ |
H A D | rsa_kem.c | 252 nlen = RSA_size(prsactx->rsa); in rsasve_generate() 299 nlen = RSA_size(prsactx->rsa); in rsasve_recover()
|
/third_party/openssl/providers/implementations/kem/ |
H A D | rsa_kem.c | 252 nlen = RSA_size(prsactx->rsa); in rsasve_generate() 299 nlen = RSA_size(prsactx->rsa); in rsasve_recover()
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | rsa.rs | 18 pub fn RSA_size(k: *const RSA) -> c_int; in RSA_size() functions
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | rsa.rs | 287 #[corresponds(RSA_size)] 289 unsafe { ffi::RSA_size(self.as_ptr()) as u32 } in size()
|
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | openssl-x509.c | 587 if ((size_t)RSA_size(rsapub) * 8 < (size_t)rsa_min_bits) { in lws_x509_public_to_jwk() 589 __func__, RSA_size(rsapub) * 8, rsa_min_bits); in lws_x509_public_to_jwk()
|
/third_party/node/deps/openssl/openssl/crypto/pem/ |
H A D | pvkfmt.c | 633 nbyte = RSA_size(rsa); in check_bitlen_rsa() 669 nbyte = RSA_size(rsa); in write_rsa()
|
/third_party/openssl/crypto/pem/ |
H A D | pvkfmt.c | 633 nbyte = RSA_size(rsa); in check_bitlen_rsa() 669 nbyte = RSA_size(rsa); in write_rsa()
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | rsa.h | 204 OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa);
|