/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | rsa-sf.c | 139 size_t tlen = RSA_size(rsa); 151 if (tlen > (size_t)RSA_size(rsa)) 162 size_t tlen = RSA_size(rsa); 175 if (tlen > (size_t)RSA_size(rsa)) 203 size_t tlen = RSA_size(rsa); 215 if (tlen > (size_t)RSA_size(rsa)) 226 size_t tlen = RSA_size(rsa); 240 if (tlen > (size_t)RSA_size(rsa))
|
H A D | rsa.h | 61 #define RSA_size hc_RSA_size macro 167 int RSA_size(const RSA *);
|
H A D | test_rsa.c | 93 res = malloc(RSA_size(rsa)); 97 res2 = malloc(RSA_size(rsa)); 107 if (keylen > RSA_size(rsa)) 108 errx(1, "keylen > RSA_size(rsa)"); 126 if (keylen > RSA_size(rsa)) 127 errx(1, "keylen > RSA_size(rsa)");
|
H A D | rsa-gmp.c | 133 size = RSA_size(rsa); 201 if (flen > RSA_size(rsa)) 235 assert(size <= RSA_size(rsa)); 268 size = RSA_size(rsa); 349 size = RSA_size(rsa);
|
H A D | rsa-ltm.c | 161 size = RSA_size(rsa); 233 if (flen > RSA_size(rsa)) 268 assert(size <= RSA_size(rsa)); 308 size = RSA_size(rsa); 401 size = RSA_size(rsa);
|
H A D | rsa-tfm.c | 113 size = RSA_size(rsa); 181 if (flen > RSA_size(rsa)) 213 assert(size <= RSA_size(rsa)); 248 size = RSA_size(rsa); 330 size = RSA_size(rsa);
|
H A D | rsa.c | 283 buffer = malloc(RSA_size(rsa)); 310 RSA_size(const RSA *rsa) function 421 data = malloc(RSA_size(rsa));
|
/macosx-10.10/OpenSSL098-52/src/crypto/rsa/ |
H A D | rsa_saos.c | 79 j=RSA_size(rsa); 114 if (siglen != (unsigned int)RSA_size(rsa))
|
H A D | rsa_pss.c | 100 emLen = RSA_size(rsa); 195 emLen = RSA_size(rsa);
|
H A D | rsa_sign.c | 123 j=RSA_size(rsa); 165 if (siglen != (unsigned int)RSA_size(rsa))
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/rsa/ |
H A D | rsa_saos.c | 96 j=RSA_size(rsa); 129 if (siglen != (unsigned int)RSA_size(rsa))
|
H A D | rsa_sign.c | 129 j=RSA_size(rsa); 165 if (siglen != (unsigned int)RSA_size(rsa))
|
/macosx-10.10/OpenSSH-189/osslshim/tests/ |
H A D | test_rsa.c | 152 res = malloc(RSA_size(rsa)); 154 fprintf(stderr, "malloc(): failed to allocate %d bytes\n", (int)RSA_size(rsa)); 159 res2 = malloc(RSA_size(rsa)); 161 fprintf(stderr, "malloc(): failed to allocate %d bytes\n", (int)RSA_size(rsa)); 175 if (keylen > RSA_size(rsa)) { 176 fprintf(stderr, "keylen (%d) > RSA_size(rsa) (%d)", (int)keylen, (int)RSA_size(rsa)); 209 if (keylen > RSA_size(rsa)) { 210 fprintf(stderr, "keylen > RSA_size(rsa)");
|
/macosx-10.10/OpenSSL098-52/src/crypto/pem/ |
H A D | pem_seal.c | 86 j=RSA_size(pubk[i]->pkey.rsa); 109 RSA_size(pubk[i]->pkey.rsa)); 157 i=RSA_size(priv->pkey.rsa);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_transform/lib/ |
H A D | EncryptTransform.cpp | 505 CSSM_QUERY_SIZE_DATA RSA_size; local 512 RSA_size.SizeInputBlock = (uint32)(CFDataGetLength(dataValue) + 2*hLen +1); 513 RSA_size.SizeOutputBlock = 0; 514 OSStatus status = CSSM_QuerySize(m_handle, CSSM_TRUE, 1, &RSA_size); 523 (void)transforms_assume(RSA_size.SizeInputBlock <= RSA_size.SizeOutputBlock); 524 desired_message_length = RSA_size.SizeOutputBlock; 540 CSSM_QUERY_SIZE_DATA RSA_size; 559 RSA_size.SizeInputBlock = CFDataGetLength(dataValue) + 2*hLen +1; 560 RSA_size [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/evp/ |
H A D | p_open.c | 89 size=RSA_size(priv->pkey.rsa);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | RSA_DSA_signature.cpp | 108 RSA_size(mRsaKey)); 152 RSA_size(mRsaKey)); 160 (unsigned char *)alloc().malloc(RSA_size(mRsaKey)); 208 return RSA_size(mRsaKey);
|
H A D | RSA_asymmetric.cpp | 91 unsigned cipherBlockSize = RSA_size(mRsaKey);
|
/macosx-10.10/postfix-255/postfix/src/tls/ |
H A D | tls_rsa.c | 106 ok = rsa != 0 && RSA_size(rsa) == 512 / 8;
|
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-rsa.h | 79 #define RSA_size ossl_RSA_size macro 193 int RSA_size(const RSA *);
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | ssh-rsa.c | 69 slen = RSA_size(key->rsa); 151 /* RSA_verify expects a signature of RSA_size */ 152 modlen = RSA_size(key->rsa); 242 rsasize = RSA_size(rsa);
|
/macosx-10.10/OpenSSL098-52/src/fips/rsa/ |
H A D | fips_rsa_sign.c | 249 i = RSA_size(rsa); 250 sbuf = OPENSSL_malloc(RSA_size(rsa)); 277 j=RSA_size(rsa); 310 if (siglen != (unsigned int)RSA_size(sv->key))
|
H A D | fips_rsa_gen.c | 103 ctbuf = OPENSSL_malloc(RSA_size(rsa)); 113 ptbuf = OPENSSL_malloc(RSA_size(rsa));
|
/macosx-10.10/OpenSSL098-52/src/engines/ |
H A D | e_4758cca.c | 582 long outputLength = RSA_size(rsa); 611 long outputLength = RSA_size(rsa); 681 keyLength = RSA_size(rsa); 805 keyLength = RSA_size(rsa);
|
/macosx-10.10/OpenSSL098-52/src/fips/ |
H A D | fips.c | 435 && (RSA_size(pkey->pkey.rsa) > sizeof(sigtmp))) 437 sig = OPENSSL_malloc(RSA_size(pkey->pkey.rsa));
|