/openssl/crypto/ |
H A D | defaults.c | 67 DWORD keysize; in get_windows_regdirs() local 81 &keysize); in get_windows_regdirs() 86 if (keysize > MAX_PATH) in get_windows_regdirs() 89 keysize++; in get_windows_regdirs() 90 tempstr = OPENSSL_zalloc(keysize * sizeof(TCHAR)); in get_windows_regdirs() 96 NULL, &ktype, tempstr, &keysize) != ERROR_SUCCESS) in get_windows_regdirs() 99 if (!WideCharToMultiByte(CP_UTF8, 0, tempstr, -1, dst, keysize, in get_windows_regdirs()
|
/openssl/apps/ |
H A D | rsautl.c | 84 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() local 216 keysize = EVP_PKEY_get_size(pkey); in rsautl_main() 218 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main() 219 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main() 220 rsa_outlen = keysize; in rsautl_main() 223 rv = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
|
H A D | pkeyutl.c | 140 int keysize = -1, pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY; in pkeyutl_main() local 350 ctx = init_ctx(kdfalg, &keysize, pkey_op, e, engine_impl, rawin, pkey, in pkeyutl_main() 469 siglen = bio_to_mem(&sig, keysize * 10, sigbio); in pkeyutl_main()
|
/openssl/crypto/hashtable/ |
H A D | hashtable.c | 534 if (a->keybuf != NULL && b->keybuf != NULL && a->keysize == b->keysize) in match_key() 535 return !memcmp(a->keybuf, b->keybuf, a->keysize); in match_key() 613 nvsize += key->keysize; in alloc_new_value() 626 tmp->value.key.keysize = key->keysize; in alloc_new_value() 627 memcpy(tmp->value.key.keybuf, key->keybuf, key->keysize); in alloc_new_value() 657 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_insert() 686 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_get() 735 hash = h->config.ht_hash_fn(key->keybuf, key->keysize); in ossl_ht_delete()
|
/openssl/test/ |
H A D | igetest.c | 86 const size_t keysize; member 202 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 205 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors()
|
/openssl/include/internal/ |
H A D | hashtable.h | 26 size_t keysize; member 109 (key)->key_header.keysize = (sizeof(*(key)) - sizeof(HT_KEY)); \ 116 #define HT_KEY_RESET(key) memset((key)->key_header.keybuf, 0, (key)->key_header.keysize)
|
/openssl/include/crypto/ |
H A D | evp.h | 566 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len,fl) \ argument 567 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 568 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 569 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
|
/openssl/crypto/cms/ |
H A D | cms_sd.c | 1132 int algnid, int keysize) in CMS_add_simple_smimecap() argument 1137 if (keysize > 0) { in CMS_add_simple_smimecap() 1139 if (key == NULL || !ASN1_INTEGER_set(key, keysize)) { in CMS_add_simple_smimecap()
|
/openssl/doc/designs/ |
H A D | fips_indicator.md | 27 …not allowed in the approved mode of operation’. An example is RSA with a keysize of < 2048 bits (w… 181 in existing behaviour. For example the keysize checks are done in the init since
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-RSA.pod | 201 performs similar tests but relaxes the keysize restrictions for backwards
|
/openssl/include/openssl/ |
H A D | cms.h.in | 308 int algnid, int keysize);
|
/openssl/ssl/ |
H A D | ssl_local.h | 2055 DH *(*dh_tmp_cb) (SSL *ssl, int is_export, int keysize);
|
/openssl/ |
H A D | CHANGES.md | 5903 * Increased the minimal RSA keysize from 256 to 512 bits [Rich Salz], 7106 if no keysize is specified with default_bits. This fixes an 8308 if no keysize is specified with default_bits. This fixes an
|