Home
last modified time | relevance | path

Searched refs:rsa_size (Results 1 – 25 of 54) sorted by relevance

123

/dports/lang/mono/mono-5.10.1.57/external/boringssl/crypto/rsa/
H A Drsa_impl.c120 if (max_out < rsa_size) { in rsa_default_encrypt()
186 *out_len = rsa_size; in rsa_default_encrypt()
319 if (max_out < rsa_size) { in rsa_default_sign_raw()
350 *out_len = rsa_size; in rsa_default_sign_raw()
369 if (max_out < rsa_size) { in rsa_default_decrypt()
385 if (in_len != rsa_size) { in rsa_default_decrypt()
396 r = RSA_padding_check_PKCS1_type_2(out, rsa_size, buf, rsa_size); in rsa_default_decrypt()
400 r = RSA_padding_check_PKCS1_OAEP_mgf1(out, rsa_size, buf, rsa_size, in rsa_default_decrypt()
404 r = rsa_size; in rsa_default_decrypt()
502 r = RSA_padding_check_PKCS1_type_1(out, rsa_size, buf, rsa_size); in RSA_verify_raw()
[all …]
H A Drsa.c429 const unsigned rsa_size = RSA_size(rsa); in RSA_sign() local
445 if (rsa_size < RSA_PKCS1_PADDING_SIZE || in RSA_sign()
446 signed_msg_len > rsa_size - RSA_PKCS1_PADDING_SIZE) { in RSA_sign()
451 if (RSA_sign_raw(rsa, &size_t_out_len, out, rsa_size, signed_msg, in RSA_sign()
471 const size_t rsa_size = RSA_size(rsa); in RSA_verify() local
483 buf = OPENSSL_malloc(rsa_size); in RSA_verify()
489 if (!RSA_verify_raw(rsa, &len, buf, rsa_size, sig, sig_len, in RSA_verify()
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/crypto/fipsmodule/rsa/
H A Drsa_impl.c266 if (max_out < rsa_size) { in RSA_encrypt()
332 *out_len = rsa_size; in RSA_encrypt()
471 if (max_out < rsa_size) { in rsa_default_sign_raw()
503 *out_len = rsa_size; in rsa_default_sign_raw()
518 if (max_out < rsa_size) { in rsa_default_decrypt()
534 if (in_len != rsa_size) { in rsa_default_decrypt()
546 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt()
554 *out_len = rsa_size; in rsa_default_decrypt()
589 if (max_out < rsa_size) { in RSA_verify_raw()
652 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw()
[all …]
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/crypto/fipsmodule/rsa/
H A Drsa_impl.c271 if (max_out < rsa_size) { in RSA_encrypt()
333 *out_len = rsa_size; in RSA_encrypt()
485 if (max_out < rsa_size) { in rsa_default_sign_raw()
517 *out_len = rsa_size; in rsa_default_sign_raw()
532 if (max_out < rsa_size) { in rsa_default_decrypt()
548 if (in_len != rsa_size) { in rsa_default_decrypt()
560 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt()
568 *out_len = rsa_size; in rsa_default_decrypt()
602 if (max_out < rsa_size) { in RSA_verify_raw()
661 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw()
[all …]
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/crypto/fipsmodule/rsa/
H A Drsa_impl.c271 if (max_out < rsa_size) { in RSA_encrypt()
333 *out_len = rsa_size; in RSA_encrypt()
485 if (max_out < rsa_size) { in rsa_default_sign_raw()
517 *out_len = rsa_size; in rsa_default_sign_raw()
532 if (max_out < rsa_size) { in rsa_default_decrypt()
548 if (in_len != rsa_size) { in rsa_default_decrypt()
560 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt()
568 *out_len = rsa_size; in rsa_default_decrypt()
602 if (max_out < rsa_size) { in RSA_verify_raw()
661 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw()
[all …]
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/crypto/fipsmodule/rsa/
H A Drsa_impl.c271 if (max_out < rsa_size) { in RSA_encrypt()
333 *out_len = rsa_size; in RSA_encrypt()
485 if (max_out < rsa_size) { in rsa_default_sign_raw()
517 *out_len = rsa_size; in rsa_default_sign_raw()
532 if (max_out < rsa_size) { in rsa_default_decrypt()
548 if (in_len != rsa_size) { in rsa_default_decrypt()
560 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt()
568 *out_len = rsa_size; in rsa_default_decrypt()
602 if (max_out < rsa_size) { in RSA_verify_raw()
661 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw()
[all …]
/dports/security/boringssl/boringssl-6a71840/crypto/fipsmodule/rsa/
H A Drsa_impl.c267 if (max_out < rsa_size) { in RSA_encrypt()
333 *out_len = rsa_size; in RSA_encrypt()
485 if (max_out < rsa_size) { in rsa_default_sign_raw()
517 *out_len = rsa_size; in rsa_default_sign_raw()
532 if (max_out < rsa_size) { in rsa_default_decrypt()
548 if (in_len != rsa_size) { in rsa_default_decrypt()
560 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt()
568 *out_len = rsa_size; in rsa_default_decrypt()
603 if (max_out < rsa_size) { in RSA_verify_raw()
666 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw()
[all …]
/dports/devel/pecl-grpc/grpc-1.42.0/third_party/boringssl-with-bazel/src/crypto/fipsmodule/rsa/
H A Drsa_impl.c274 if (max_out < rsa_size) { in RSA_encrypt()
336 *out_len = rsa_size; in RSA_encrypt()
488 if (max_out < rsa_size) { in rsa_default_sign_raw()
520 *out_len = rsa_size; in rsa_default_sign_raw()
535 if (max_out < rsa_size) { in rsa_default_decrypt()
551 if (in_len != rsa_size) { in rsa_default_decrypt()
563 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt()
571 *out_len = rsa_size; in rsa_default_decrypt()
605 if (max_out < rsa_size) { in RSA_verify_raw()
664 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw()
[all …]
/dports/devel/py-grpcio/grpcio-1.43.0/third_party/boringssl-with-bazel/src/crypto/fipsmodule/rsa/
H A Drsa_impl.c274 if (max_out < rsa_size) { in RSA_encrypt()
336 *out_len = rsa_size; in RSA_encrypt()
488 if (max_out < rsa_size) { in rsa_default_sign_raw()
520 *out_len = rsa_size; in rsa_default_sign_raw()
535 if (max_out < rsa_size) { in rsa_default_decrypt()
551 if (in_len != rsa_size) { in rsa_default_decrypt()
563 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt()
571 *out_len = rsa_size; in rsa_default_decrypt()
605 if (max_out < rsa_size) { in RSA_verify_raw()
664 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw()
[all …]
/dports/databases/mariadb105-client/mariadb-10.5.15/libmariadb/plugins/auth/
H A Dsha256_pw.c168 unsigned int rsa_size; in auth_sha256_client() local
233 rsa_size= RSA_size(pubkey); in auth_sha256_client()
259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client()
260 rsa_size /= 8; in auth_sha256_client()
283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client()
285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client()
286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client()
289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
H A Dcaching_sha2_pw.c246 int rsa_size; in auth_caching_sha2_client() local
248 ULONG rsa_size; in auth_caching_sha2_client() local
341 rsa_size= RSA_size(pubkey); in auth_caching_sha2_client()
386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client()
390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
/dports/databases/mariadb104-server/mariadb-10.4.24/libmariadb/plugins/auth/
H A Dsha256_pw.c168 unsigned int rsa_size; in auth_sha256_client() local
233 rsa_size= RSA_size(pubkey); in auth_sha256_client()
259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client()
260 rsa_size /= 8; in auth_sha256_client()
283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client()
285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client()
286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client()
289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
H A Dcaching_sha2_pw.c246 int rsa_size; in auth_caching_sha2_client() local
248 ULONG rsa_size; in auth_caching_sha2_client() local
341 rsa_size= RSA_size(pubkey); in auth_caching_sha2_client()
386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client()
390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
/dports/databases/mariadb104-client/mariadb-10.4.24/libmariadb/plugins/auth/
H A Dsha256_pw.c168 unsigned int rsa_size; in auth_sha256_client() local
233 rsa_size= RSA_size(pubkey); in auth_sha256_client()
259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client()
260 rsa_size /= 8; in auth_sha256_client()
283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client()
285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client()
286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client()
289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
H A Dcaching_sha2_pw.c246 int rsa_size; in auth_caching_sha2_client() local
248 ULONG rsa_size; in auth_caching_sha2_client() local
341 rsa_size= RSA_size(pubkey); in auth_caching_sha2_client()
386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client()
390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
/dports/databases/mariadb103-server/mariadb-10.3.34/libmariadb/plugins/auth/
H A Dsha256_pw.c168 unsigned int rsa_size; in auth_sha256_client() local
233 rsa_size= RSA_size(pubkey); in auth_sha256_client()
259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client()
260 rsa_size /= 8; in auth_sha256_client()
283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client()
285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client()
286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client()
289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
H A Dcaching_sha2_pw.c246 int rsa_size;
248 ULONG rsa_size;
341 rsa_size= RSA_size(pubkey);
386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP)))
390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size))
/dports/databases/mariadb103-client/mariadb-10.3.34/libmariadb/plugins/auth/
H A Dsha256_pw.c168 unsigned int rsa_size; in auth_sha256_client() local
233 rsa_size= RSA_size(pubkey); in auth_sha256_client()
259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client()
260 rsa_size /= 8; in auth_sha256_client()
283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client()
285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client()
286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client()
289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
H A Dcaching_sha2_pw.c246 int rsa_size; in auth_caching_sha2_client() local
248 ULONG rsa_size; in auth_caching_sha2_client() local
341 rsa_size= RSA_size(pubkey); in auth_caching_sha2_client()
386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client()
390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
/dports/databases/mariadb105-server/mariadb-10.5.15/libmariadb/plugins/auth/
H A Dsha256_pw.c168 unsigned int rsa_size; in auth_sha256_client() local
233 rsa_size= RSA_size(pubkey); in auth_sha256_client()
259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client()
260 rsa_size /= 8; in auth_sha256_client()
283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client()
285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client()
286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client()
289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
H A Dcaching_sha2_pw.c246 int rsa_size; in auth_caching_sha2_client() local
248 ULONG rsa_size; in auth_caching_sha2_client() local
341 rsa_size= RSA_size(pubkey); in auth_caching_sha2_client()
386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client()
390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
/dports/databases/mariadb-connector-c/mariadb-connector-c-3.2.4-src/plugins/auth/
H A Dsha256_pw.c167 unsigned int rsa_size; in auth_sha256_client() local
243 rsa_size= EVP_PKEY_size(pubkey); in auth_sha256_client()
270 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client()
271 rsa_size /= 8; in auth_sha256_client()
298 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client()
300 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client()
301 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client()
304 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
H A Dcaching_sha2_pw.c246 size_t rsa_size; in auth_caching_sha2_client() local
249 ULONG rsa_size; in auth_caching_sha2_client() local
351 rsa_size= EVP_PKEY_size(pubkey); in auth_caching_sha2_client()
401 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client()
405 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/credential_provider/gaiacp/
H A Dpassword_recovery_manager.cc223 const size_t rsa_size = RSA_size(rsa); in PrivateKeyDecrypt() local
224 if (ciphertext.size() < rsa_size) { in PrivateKeyDecrypt()
230 std::vector<uint8_t> session_key_with_nonce(rsa_size); in PrivateKeyDecrypt()
234 ciphertext.data(), rsa_size, RSA_PKCS1_OAEP_PADDING)) { in PrivateKeyDecrypt()
247 base::StringPiece(reinterpret_cast<const char*>(&ciphertext[rsa_size]), in PrivateKeyDecrypt()
248 ciphertext.size() - rsa_size), in PrivateKeyDecrypt()
/dports/multimedia/libv4l/linux-5.13-rc2/drivers/gpu/drm/i915/gt/uc/
H A Dintel_huc.c80 GEM_BUG_ON(huc->fw.rsa_size > PAGE_SIZE); in intel_huc_rsa_data_create()
92 GEM_BUG_ON(copied < huc->fw.rsa_size); in intel_huc_rsa_data_create()

123