Home
last modified time | relevance | path

Searched refs:RSA_size (Results 1 – 25 of 39) sorted by relevance

12

/freebsd/crypto/openssl/doc/man3/
H A DRSA_public_encrypt.pod30 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory.
55 B<flen> must not be more than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
56 based padding modes, not more than RSA_size(B<rsa>) - 42 for
57 RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING.
63 RSA_size(B<rsa>) bytes.
68 be equal to RSA_size(B<rsa>) but may be smaller, when leading zero
72 data (which is equal to RSA_size(B<rsa>) for RSA_NO_PADDING,
73 RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 based padding modes and
74 RSA_size(B<rsa>) - 42 for RSA_PKCS1_OAEP_PADDING).
81 RSA_size(B<rsa>)). RSA_private_decrypt() returns the size of the
[all …]
H A DRSA_size.pod5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits
17 int RSA_size(const RSA *rsa);
31 RSA_size() returns the RSA modulus size in bytes. It can be used to
42 RSA_size() returns the size of modulus in bytes.
52 The RSA_size() and RSA_security_bits() functions were deprecated in OpenSSL 3.0.
H A DRSA_private_encrypt.pod33 B<RSA_size(rsa)> bytes of memory.
57 message digest (which is smaller than B<RSA_size(rsa) -
63 RSA_size(rsa)). RSA_public_decrypt() returns the size of the
H A DBN_num_bytes.pod42 size" of such a key, either use functions like RSA_size(), DH_size()
50 L<RSA_size(3)>
H A DRSA_sign_ASN1_OCTET_STRING.pod31 in B<siglen>. B<sigret> must point to B<RSA_size(rsa)> bytes of
H A DRSA_sign.pod30 B<sigret> must point to RSA_size(B<rsa>) bytes of memory.
/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_saos.c37 j = RSA_size(rsa); in RSA_sign_ASN1_OCTET_STRING()
69 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING()
H A Drsa_pmeth.c115 OPENSSL_malloc(RSA_size(EVP_PKEY_get0_RSA(pk->pkey)))) == NULL) { in setup_tbuf()
162 if ((size_t)RSA_size(rsa) < tbslen + 1) { in pkey_rsa_sign()
189 ret = RSA_private_encrypt(RSA_size(rsa), rctx->tbuf, in pkey_rsa_sign()
326 int klen = RSA_size(rsa); in pkey_rsa_encrypt()
851 max_saltlen = RSA_size(rsa) - EVP_MD_get_size(md); in pkey_pss_init()
H A Drsa_pss.c74 emLen = RSA_size(rsa); in RSA_verify_PKCS1_PSS_mgf1()
187 emLen = RSA_size(rsa); in RSA_padding_add_PKCS1_PSS_mgf1()
H A Drsa_sign.c305 if (encoded_len + RSA_PKCS1_PADDING_SIZE > (size_t)RSA_size(rsa)) { in RSA_sign()
339 if (siglen != (size_t)RSA_size(rsa)) { in ossl_rsa_verify()
H A Drsa_crpt.c28 int RSA_size(const RSA *r) in RSA_size() function
H A Drsa_gen.c496 ciphertxt_len = RSA_size(rsa); in rsa_keygen_pairwise_test()
/freebsd/crypto/openssl/test/
H A Drsa_mp_test.c147 return RSA_size(key); in key2048_key()
153 int rv = RSA_size(key); in key2048p3_v1()
204 int rv = RSA_size(key); in key2048p3_v2()
/freebsd/crypto/openssl/providers/implementations/signature/
H A Drsa_sig.c161 max_saltlen = RSA_size(prsactx->rsa) - EVP_MD_get_size(prsactx->md); in rsa_check_parameters()
205 saltlen = RSA_size(ctx->rsa) - EVP_MD_get_size(ctx->md) - 2; in rsa_pss_compute_saltlen()
487 if ((ctx->tbuf = OPENSSL_malloc(RSA_size(ctx->rsa))) == NULL) { in setup_tbuf()
497 OPENSSL_cleanse(ctx->tbuf, RSA_size(ctx->rsa)); in clean_tbuf()
519 size_t rsasize = RSA_size(prsactx->rsa); in rsa_sign()
564 if ((size_t)RSA_size(prsactx->rsa) < tbslen + 1) { in rsa_sign()
567 RSA_size(prsactx->rsa), tbslen + 1); in rsa_sign()
633 ret = RSA_private_encrypt(RSA_size(prsactx->rsa), prsactx->tbuf, in rsa_sign()
683 *routlen = RSA_size(prsactx->rsa); in rsa_verify_recover()
/freebsd/crypto/openssl/providers/implementations/kem/
H A Drsa_kem.c252 nlen = RSA_size(prsactx->rsa); in rsasve_generate()
299 nlen = RSA_size(prsactx->rsa); in rsasve_recover()
/freebsd/crypto/openssl/providers/implementations/asymciphers/
H A Drsa_enc.c145 size_t len = RSA_size(prsactx->rsa); in rsa_encrypt()
156 int rsasize = RSA_size(prsactx->rsa); in rsa_encrypt()
202 size_t len = RSA_size(prsactx->rsa); in rsa_decrypt()
/freebsd/sbin/dumpon/
H A Ddumpon.c280 if (RSA_size(pubkey) * 8 < 2048) in _genkey()
284 RSA_size(pubkey) * 8); in _genkey()
286 kdap->kda_encryptedkeysize = RSA_size(pubkey); in _genkey()
/freebsd/crypto/openssh/
H A Dssh-rsa.c418 slen = RSA_size(key->rsa); in ssh_rsa_sign()
527 modlen = RSA_size(key->rsa); in ssh_rsa_verify()
649 rsasize = RSA_size(rsa); in openssh_RSA_verify()
H A Dssh-pkcs11-helper.c207 slen = RSA_size(key->rsa); in process_sign()
/freebsd/sbin/decryptcore/
H A Ddecryptcore.c213 privkeysize = RSA_size(privkey); in decrypt()
/freebsd/crypto/openssl/doc/internal/man7/
H A Ddeprecation.pod117 RSA_size(), the following should be found very early (before including any
/freebsd/crypto/openssl/crypto/pem/
H A Dpvkfmt.c633 nbyte = RSA_size(rsa); in check_bitlen_rsa()
669 nbyte = RSA_size(rsa); in write_rsa()
/freebsd/crypto/heimdal/lib/hx509/
H A Dks_p11.c142 ck_sigsize = RSA_size(rsa); in p11_rsa_private_encrypt()
180 ck_sigsize = RSA_size(rsa); in p11_rsa_private_decrypt()
H A Dcrypto.c564 tosize = RSA_size(rsa); in rsa_verify_signature()
723 sig->length = RSA_size(signer->private_key.rsa); in rsa_create_signature()
1725 tosize = RSA_size(rsa); in _hx509_public_encrypt()
1777 cleartext->length = RSA_size(p->private_key.rsa); in hx509_private_key_private_decrypt()
/freebsd/crypto/openssl/providers/implementations/keymgmt/
H A Drsa_kmgmt.c345 && (empty || !OSSL_PARAM_set_int(p, RSA_size(rsa)))) in rsa_get_params()

12