| /freebsd/crypto/openssl/doc/man3/ |
| H A D | RSA_public_encrypt.pod | 30 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory. 55 When encrypting B<flen> must not be more than RSA_size(B<rsa>) - 11 for the 56 PKCS #1 v1.5 based padding modes, not more than RSA_size(B<rsa>) - 42 for 57 RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. 63 RSA_size(B<rsa>) bytes. 68 be equal to RSA_size(B<rsa>) but may be smaller, when leading zero 72 data (which is equal to RSA_size(B<rsa>) for RSA_NO_PADDING, 73 RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 based padding modes and 74 RSA_size(B<rsa>) - 42 for RSA_PKCS1_OAEP_PADDING). 81 RSA_size(B<rsa>)). RSA_private_decrypt() returns the size of the [all …]
|
| H A D | RSA_size.pod | 5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits 17 int RSA_size(const RSA *rsa); 31 RSA_size() returns the RSA modulus size in bytes. It can be used to 42 RSA_size() returns the size of modulus in bytes. 52 The RSA_size() and RSA_security_bits() functions were deprecated in OpenSSL 3.0.
|
| H A D | RSA_private_encrypt.pod | 33 B<RSA_size(rsa)> bytes of memory. 57 message digest (which is smaller than B<RSA_size(rsa) - 63 RSA_size(rsa)). RSA_public_decrypt() returns the size of the
|
| H A D | BN_num_bytes.pod | 42 size" of such a key, either use functions like RSA_size(), DH_size() 50 L<RSA_size(3)>
|
| H A D | RSA_sign_ASN1_OCTET_STRING.pod | 31 in B<siglen>. B<sigret> must point to B<RSA_size(rsa)> bytes of
|
| H A D | RSA_sign.pod | 30 B<sigret> must point to RSA_size(B<rsa>) bytes of memory.
|
| H A D | RSA_get0_key.pod | 170 L<RSA_new(3)>, L<RSA_size(3)>
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_saos.c | 37 j = RSA_size(rsa); in RSA_sign_ASN1_OCTET_STRING() 67 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING()
|
| H A D | rsa_pmeth.c | 118 if ((ctx->tbuf = OPENSSL_malloc(RSA_size(EVP_PKEY_get0_RSA(pk->pkey)))) == NULL) in setup_tbuf() 170 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign() 197 ret = RSA_private_encrypt(RSA_size(rsa), rctx->tbuf, in pkey_rsa_sign() 339 int klen = RSA_size(rsa); in pkey_rsa_encrypt() 886 max_saltlen = RSA_size(rsa) - md_size; in pkey_pss_init()
|
| H A D | rsa_sign.c | 318 if (encoded_len + RSA_PKCS1_PADDING_SIZE > (size_t)RSA_size(rsa)) { in RSA_sign() 352 if (siglen != (size_t)RSA_size(rsa)) { in ossl_rsa_verify()
|
| H A D | rsa_pss.c | 83 emLen = RSA_size(rsa); in ossl_rsa_verify_PKCS1_PSS_mgf1() 221 emLen = RSA_size(rsa); in ossl_rsa_padding_add_PKCS1_PSS_mgf1()
|
| H A D | rsa_crpt.c | 28 int RSA_size(const RSA *r) in RSA_size() function
|
| /freebsd/crypto/openssl/test/ |
| H A D | rsa_mp_test.c | 138 return RSA_size(key); in key2048_key() 144 int rv = RSA_size(key); in key2048p3_v1() 196 int rv = RSA_size(key); in key2048p3_v2()
|
| H A D | rsa_test.c | 643 if (!TEST_int_ge((int)sizeof(sig), RSA_size(rsa_priv))) in test_rsa_saos()
|
| /freebsd/crypto/openssl/providers/implementations/signature/ |
| H A D | rsa_sig.c | 215 max_saltlen = RSA_size(prsactx->rsa) - EVP_MD_get_size(prsactx->md); in rsa_check_parameters() 286 if ((rsasize = RSA_size(ctx->rsa)) <= 2 || rsasize - 2 < mdsize) { in rsa_pss_compute_saltlen() 614 if ((ctx->tbuf = OPENSSL_malloc(RSA_size(ctx->rsa))) == NULL) in setup_tbuf() 622 OPENSSL_cleanse(ctx->tbuf, RSA_size(ctx->rsa)); in clean_tbuf() 681 size_t rsasize = RSA_size(prsactx->rsa); in rsa_sign_directly() 726 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign_directly() 729 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign_directly() 799 ret = RSA_private_encrypt(RSA_size(prsactx->rsa), prsactx->tbuf, in rsa_sign_directly() 940 *routlen = RSA_size(prsactx->rsa); in rsa_verify_recover()
|
| /freebsd/crypto/openssl/providers/implementations/kem/ |
| H A D | rsa_kem.c | 285 nlen = RSA_size(prsactx->rsa); in rsasve_generate() 362 nlen = RSA_size(prsactx->rsa); in rsasve_recover()
|
| /freebsd/sbin/dumpon/ |
| H A D | dumpon.c | 280 if (RSA_size(pubkey) * 8 < 2048) in _genkey() 284 RSA_size(pubkey) * 8); in _genkey() 286 kdap->kda_encryptedkeysize = RSA_size(pubkey); in _genkey()
|
| /freebsd/crypto/openssl/providers/implementations/asymciphers/ |
| H A D | rsa_enc.c | 154 size_t len = RSA_size(prsactx->rsa); in rsa_encrypt() 188 int rsasize = RSA_size(prsactx->rsa); in rsa_encrypt() 232 size_t len = RSA_size(prsactx->rsa); in rsa_decrypt()
|
| /freebsd/sbin/decryptcore/ |
| H A D | decryptcore.c | 215 privkeysize = RSA_size(privkey); in decrypt()
|
| /freebsd/crypto/openssl/doc/internal/man7/ |
| H A D | deprecation.pod | 120 RSA_size(), the following should be found very early (before including any
|
| /freebsd/crypto/openssl/crypto/pem/ |
| H A D | pvkfmt.c | 645 nbyte = RSA_size(rsa); in check_bitlen_rsa() 681 nbyte = RSA_size(rsa); in write_rsa()
|
| /freebsd/crypto/heimdal/lib/hx509/ |
| H A D | ks_p11.c | 142 ck_sigsize = RSA_size(rsa); in p11_rsa_private_encrypt() 180 ck_sigsize = RSA_size(rsa); in p11_rsa_private_decrypt()
|
| H A D | crypto.c | 564 tosize = RSA_size(rsa); in rsa_verify_signature() 723 sig->length = RSA_size(signer->private_key.rsa); in rsa_create_signature() 1725 tosize = RSA_size(rsa); in _hx509_public_encrypt() 1777 cleartext->length = RSA_size(p->private_key.rsa); in hx509_private_key_private_decrypt()
|
| /freebsd/crypto/openssl/providers/implementations/keymgmt/ |
| H A D | rsa_kmgmt.c | 339 && (empty || !OSSL_PARAM_set_int(p, RSA_size(rsa)))) in rsa_get_params()
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | rsa.h | 215 OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa);
|