/dports/lang/mono/mono-5.10.1.57/external/boringssl/crypto/rsa/ |
H A D | rsa_impl.c | 120 if (max_out < rsa_size) { in rsa_default_encrypt() 186 *out_len = rsa_size; in rsa_default_encrypt() 319 if (max_out < rsa_size) { in rsa_default_sign_raw() 350 *out_len = rsa_size; in rsa_default_sign_raw() 369 if (max_out < rsa_size) { in rsa_default_decrypt() 385 if (in_len != rsa_size) { in rsa_default_decrypt() 396 r = RSA_padding_check_PKCS1_type_2(out, rsa_size, buf, rsa_size); in rsa_default_decrypt() 400 r = RSA_padding_check_PKCS1_OAEP_mgf1(out, rsa_size, buf, rsa_size, in rsa_default_decrypt() 404 r = rsa_size; in rsa_default_decrypt() 502 r = RSA_padding_check_PKCS1_type_1(out, rsa_size, buf, rsa_size); in RSA_verify_raw() [all …]
|
H A D | rsa.c | 429 const unsigned rsa_size = RSA_size(rsa); in RSA_sign() local 445 if (rsa_size < RSA_PKCS1_PADDING_SIZE || in RSA_sign() 446 signed_msg_len > rsa_size - RSA_PKCS1_PADDING_SIZE) { in RSA_sign() 451 if (RSA_sign_raw(rsa, &size_t_out_len, out, rsa_size, signed_msg, in RSA_sign() 471 const size_t rsa_size = RSA_size(rsa); in RSA_verify() local 483 buf = OPENSSL_malloc(rsa_size); in RSA_verify() 489 if (!RSA_verify_raw(rsa, &len, buf, rsa_size, sig, sig_len, in RSA_verify()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | rsa_impl.c | 266 if (max_out < rsa_size) { in RSA_encrypt() 332 *out_len = rsa_size; in RSA_encrypt() 471 if (max_out < rsa_size) { in rsa_default_sign_raw() 503 *out_len = rsa_size; in rsa_default_sign_raw() 518 if (max_out < rsa_size) { in rsa_default_decrypt() 534 if (in_len != rsa_size) { in rsa_default_decrypt() 546 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt() 554 *out_len = rsa_size; in rsa_default_decrypt() 589 if (max_out < rsa_size) { in RSA_verify_raw() 652 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw() [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | rsa_impl.c | 271 if (max_out < rsa_size) { in RSA_encrypt() 333 *out_len = rsa_size; in RSA_encrypt() 485 if (max_out < rsa_size) { in rsa_default_sign_raw() 517 *out_len = rsa_size; in rsa_default_sign_raw() 532 if (max_out < rsa_size) { in rsa_default_decrypt() 548 if (in_len != rsa_size) { in rsa_default_decrypt() 560 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt() 568 *out_len = rsa_size; in rsa_default_decrypt() 602 if (max_out < rsa_size) { in RSA_verify_raw() 661 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw() [all …]
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | rsa_impl.c | 271 if (max_out < rsa_size) { in RSA_encrypt() 333 *out_len = rsa_size; in RSA_encrypt() 485 if (max_out < rsa_size) { in rsa_default_sign_raw() 517 *out_len = rsa_size; in rsa_default_sign_raw() 532 if (max_out < rsa_size) { in rsa_default_decrypt() 548 if (in_len != rsa_size) { in rsa_default_decrypt() 560 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt() 568 *out_len = rsa_size; in rsa_default_decrypt() 602 if (max_out < rsa_size) { in RSA_verify_raw() 661 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw() [all …]
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | rsa_impl.c | 271 if (max_out < rsa_size) { in RSA_encrypt() 333 *out_len = rsa_size; in RSA_encrypt() 485 if (max_out < rsa_size) { in rsa_default_sign_raw() 517 *out_len = rsa_size; in rsa_default_sign_raw() 532 if (max_out < rsa_size) { in rsa_default_decrypt() 548 if (in_len != rsa_size) { in rsa_default_decrypt() 560 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt() 568 *out_len = rsa_size; in rsa_default_decrypt() 602 if (max_out < rsa_size) { in RSA_verify_raw() 661 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw() [all …]
|
/dports/security/boringssl/boringssl-6a71840/crypto/fipsmodule/rsa/ |
H A D | rsa_impl.c | 267 if (max_out < rsa_size) { in RSA_encrypt() 333 *out_len = rsa_size; in RSA_encrypt() 485 if (max_out < rsa_size) { in rsa_default_sign_raw() 517 *out_len = rsa_size; in rsa_default_sign_raw() 532 if (max_out < rsa_size) { in rsa_default_decrypt() 548 if (in_len != rsa_size) { in rsa_default_decrypt() 560 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt() 568 *out_len = rsa_size; in rsa_default_decrypt() 603 if (max_out < rsa_size) { in RSA_verify_raw() 666 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw() [all …]
|
/dports/devel/pecl-grpc/grpc-1.42.0/third_party/boringssl-with-bazel/src/crypto/fipsmodule/rsa/ |
H A D | rsa_impl.c | 274 if (max_out < rsa_size) { in RSA_encrypt() 336 *out_len = rsa_size; in RSA_encrypt() 488 if (max_out < rsa_size) { in rsa_default_sign_raw() 520 *out_len = rsa_size; in rsa_default_sign_raw() 535 if (max_out < rsa_size) { in rsa_default_decrypt() 551 if (in_len != rsa_size) { in rsa_default_decrypt() 563 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt() 571 *out_len = rsa_size; in rsa_default_decrypt() 605 if (max_out < rsa_size) { in RSA_verify_raw() 664 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw() [all …]
|
/dports/devel/py-grpcio/grpcio-1.43.0/third_party/boringssl-with-bazel/src/crypto/fipsmodule/rsa/ |
H A D | rsa_impl.c | 274 if (max_out < rsa_size) { in RSA_encrypt() 336 *out_len = rsa_size; in RSA_encrypt() 488 if (max_out < rsa_size) { in rsa_default_sign_raw() 520 *out_len = rsa_size; in rsa_default_sign_raw() 535 if (max_out < rsa_size) { in rsa_default_decrypt() 551 if (in_len != rsa_size) { in rsa_default_decrypt() 563 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); in rsa_default_decrypt() 571 *out_len = rsa_size; in rsa_default_decrypt() 605 if (max_out < rsa_size) { in RSA_verify_raw() 664 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size); in RSA_verify_raw() [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/libmariadb/plugins/auth/ |
H A D | sha256_pw.c | 168 unsigned int rsa_size; in auth_sha256_client() local 233 rsa_size= RSA_size(pubkey); in auth_sha256_client() 259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client() 260 rsa_size /= 8; in auth_sha256_client() 283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client() 285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client() 286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client() 289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
|
H A D | caching_sha2_pw.c | 246 int rsa_size; in auth_caching_sha2_client() local 248 ULONG rsa_size; in auth_caching_sha2_client() local 341 rsa_size= RSA_size(pubkey); in auth_caching_sha2_client() 386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client() 390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
|
/dports/databases/mariadb104-server/mariadb-10.4.24/libmariadb/plugins/auth/ |
H A D | sha256_pw.c | 168 unsigned int rsa_size; in auth_sha256_client() local 233 rsa_size= RSA_size(pubkey); in auth_sha256_client() 259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client() 260 rsa_size /= 8; in auth_sha256_client() 283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client() 285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client() 286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client() 289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
|
H A D | caching_sha2_pw.c | 246 int rsa_size; in auth_caching_sha2_client() local 248 ULONG rsa_size; in auth_caching_sha2_client() local 341 rsa_size= RSA_size(pubkey); in auth_caching_sha2_client() 386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client() 390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
|
/dports/databases/mariadb104-client/mariadb-10.4.24/libmariadb/plugins/auth/ |
H A D | sha256_pw.c | 168 unsigned int rsa_size; in auth_sha256_client() local 233 rsa_size= RSA_size(pubkey); in auth_sha256_client() 259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client() 260 rsa_size /= 8; in auth_sha256_client() 283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client() 285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client() 286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client() 289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
|
H A D | caching_sha2_pw.c | 246 int rsa_size; in auth_caching_sha2_client() local 248 ULONG rsa_size; in auth_caching_sha2_client() local 341 rsa_size= RSA_size(pubkey); in auth_caching_sha2_client() 386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client() 390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
|
/dports/databases/mariadb103-server/mariadb-10.3.34/libmariadb/plugins/auth/ |
H A D | sha256_pw.c | 168 unsigned int rsa_size; in auth_sha256_client() local 233 rsa_size= RSA_size(pubkey); in auth_sha256_client() 259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client() 260 rsa_size /= 8; in auth_sha256_client() 283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client() 285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client() 286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client() 289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
|
H A D | caching_sha2_pw.c | 246 int rsa_size; 248 ULONG rsa_size; 341 rsa_size= RSA_size(pubkey); 386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) 390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size))
|
/dports/databases/mariadb103-client/mariadb-10.3.34/libmariadb/plugins/auth/ |
H A D | sha256_pw.c | 168 unsigned int rsa_size; in auth_sha256_client() local 233 rsa_size= RSA_size(pubkey); in auth_sha256_client() 259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client() 260 rsa_size /= 8; in auth_sha256_client() 283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client() 285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client() 286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client() 289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
|
H A D | caching_sha2_pw.c | 246 int rsa_size; in auth_caching_sha2_client() local 248 ULONG rsa_size; in auth_caching_sha2_client() local 341 rsa_size= RSA_size(pubkey); in auth_caching_sha2_client() 386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client() 390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
|
/dports/databases/mariadb105-server/mariadb-10.5.15/libmariadb/plugins/auth/ |
H A D | sha256_pw.c | 168 unsigned int rsa_size; in auth_sha256_client() local 233 rsa_size= RSA_size(pubkey); in auth_sha256_client() 259 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client() 260 rsa_size /= 8; in auth_sha256_client() 283 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client() 285 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client() 286 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client() 289 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
|
H A D | caching_sha2_pw.c | 246 int rsa_size; in auth_caching_sha2_client() local 248 ULONG rsa_size; in auth_caching_sha2_client() local 341 rsa_size= RSA_size(pubkey); in auth_caching_sha2_client() 386 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client() 390 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
|
/dports/databases/mariadb-connector-c/mariadb-connector-c-3.2.4-src/plugins/auth/ |
H A D | sha256_pw.c | 167 unsigned int rsa_size; in auth_sha256_client() local 243 rsa_size= EVP_PKEY_size(pubkey); in auth_sha256_client() 270 CryptGetKeyParam(pubkey, KP_KEYLEN, (BYTE *)&rsa_size, &ParamSize, 0); in auth_sha256_client() 271 rsa_size /= 8; in auth_sha256_client() 298 for (i= 0; i < rsa_size / 2; i++) in auth_sha256_client() 300 rsa_enc_pw[i]= passwd[rsa_size - 1 - i]; in auth_sha256_client() 301 rsa_enc_pw[rsa_size - 1 - i]= passwd[i]; in auth_sha256_client() 304 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_sha256_client()
|
H A D | caching_sha2_pw.c | 246 size_t rsa_size; in auth_caching_sha2_client() local 249 ULONG rsa_size; in auth_caching_sha2_client() local 351 rsa_size= EVP_PKEY_size(pubkey); in auth_caching_sha2_client() 401 MAX_PW_LEN, &rsa_size, BCRYPT_PAD_OAEP))) in auth_caching_sha2_client() 405 if (vio->write_packet(vio, rsa_enc_pw, rsa_size)) in auth_caching_sha2_client()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/credential_provider/gaiacp/ |
H A D | password_recovery_manager.cc | 223 const size_t rsa_size = RSA_size(rsa); in PrivateKeyDecrypt() local 224 if (ciphertext.size() < rsa_size) { in PrivateKeyDecrypt() 230 std::vector<uint8_t> session_key_with_nonce(rsa_size); in PrivateKeyDecrypt() 234 ciphertext.data(), rsa_size, RSA_PKCS1_OAEP_PADDING)) { in PrivateKeyDecrypt() 247 base::StringPiece(reinterpret_cast<const char*>(&ciphertext[rsa_size]), in PrivateKeyDecrypt() 248 ciphertext.size() - rsa_size), in PrivateKeyDecrypt()
|
/dports/multimedia/libv4l/linux-5.13-rc2/drivers/gpu/drm/i915/gt/uc/ |
H A D | intel_huc.c | 80 GEM_BUG_ON(huc->fw.rsa_size > PAGE_SIZE); in intel_huc_rsa_data_create() 92 GEM_BUG_ON(copied < huc->fw.rsa_size); in intel_huc_rsa_data_create()
|