Home
last modified time | relevance | path

Searched refs:padding (Results 1 – 25 of 60) sorted by relevance

123

/openssl-master/crypto/rsa/
A Drsa_crpt.c34 RSA *rsa, int padding) in RSA_public_encrypt() argument
36 return rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding); in RSA_public_encrypt()
40 unsigned char *to, RSA *rsa, int padding) in RSA_private_encrypt() argument
42 return rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding); in RSA_private_encrypt()
46 unsigned char *to, RSA *rsa, int padding) in RSA_private_decrypt() argument
48 return rsa->meth->rsa_priv_dec(flen, from, to, rsa, padding); in RSA_private_decrypt()
52 RSA *rsa, int padding) in RSA_public_decrypt() argument
54 return rsa->meth->rsa_pub_dec(flen, from, to, rsa, padding); in RSA_public_decrypt()
A Drsa_meth.c108 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc()
116 int padding)) in RSA_meth_set_pub_enc() argument
124 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec()
132 int padding)) in RSA_meth_set_pub_dec() argument
140 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc()
148 int padding)) in RSA_meth_set_priv_enc() argument
156 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec()
164 int padding)) in RSA_meth_set_priv_dec() argument
A Drsa_ossl.c22 unsigned char *to, RSA *rsa, int padding);
24 unsigned char *to, RSA *rsa, int padding);
26 unsigned char *to, RSA *rsa, int padding);
28 unsigned char *to, RSA *rsa, int padding);
75 unsigned char *to, RSA *rsa, int padding) in rsa_ossl_public_encrypt() argument
112 switch (padding) { in rsa_ossl_public_encrypt()
240 unsigned char *to, RSA *rsa, int padding) in rsa_ossl_private_encrypt() argument
267 switch (padding) { in rsa_ossl_private_encrypt()
348 if (padding == RSA_X931_PADDING) { in rsa_ossl_private_encrypt()
478 switch (padding) { in rsa_ossl_private_decrypt()
[all …]
A Drsa_local.h106 unsigned char *to, RSA *rsa, int padding);
108 unsigned char *to, RSA *rsa, int padding);
110 unsigned char *to, RSA *rsa, int padding);
112 unsigned char *to, RSA *rsa, int padding);
A Drsa_gen.c485 int padding = RSA_PKCS1_PADDING; in rsa_keygen_pairwise_test() local
505 padding); in rsa_keygen_pairwise_test()
515 padding); in rsa_keygen_pairwise_test()
/openssl-master/doc/man3/
A DRSA_public_encrypt.pod16 unsigned char *to, RSA *rsa, int padding);
19 unsigned char *to, RSA *rsa, int padding);
32 B<padding> denotes one of the following modes:
38 PKCS #1 v1.5 padding. This currently is the most widely used mode.
50 cryptographically sound padding modes in the application code.
56 based padding modes, not more than RSA_size(B<rsa>) - 42 for
58 When a padding mode other than RSA_NO_PADDING is in use, then
73 RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 based padding modes and
75 B<padding> is the padding mode that was used to encrypt the data.
91 which can potentially be used to mount a Bleichenbacher padding oracle
[all …]
A DSSL_CTX_set_record_padding_callback.pod12 SSL_set_block_padding - install callback to specify TLS 1.3 record padding
33 can be used to assign a callback function I<cb> to specify the padding
35 Kernel TLS is not possible if the record padding callback is set, and the callback
46 of the B<block_size>. A B<block_size> of 0 or 1 disables block padding. The limit of
64 The B<cb> returns the number of padding bytes to add to the record. A return of 0
65 indicates no padding will be added. A return value that causes the record to
74 The default behavior is to add no padding to the record.
76 A user-supplied padding callback function will override the behavior set by
78 callback to NULL will restore the configured block padding behavior.
90 The record padding API was added for TLS 1.3 support in OpenSSL 1.1.1.
A DRSA_private_encrypt.pod16 unsigned char *to, RSA *rsa, int padding);
19 unsigned char *to, RSA *rsa, int padding);
35 B<padding> denotes one of the following modes:
41 PKCS #1 v1.5 padding. This function does not handle the
49 cryptographically sound padding modes in the application code.
58 11>). B<padding> is the padding mode that was used to sign the data.
A DRSA_padding_add_PKCS1_type_1.pod10 padding
65 However, they can also be called directly to implement padding for other
126 padding oracle attack. This is an inherent weakness in the PKCS #1
127 v1.5 padding design. Prefer PKCS1_OAEP padding. If that is not
134 Do not remove the zero-padding from the decrypted raw RSA data
137 used to mount a Bleichenbacher attack against any padding mode
A DEVP_PKEY_CTX_ctrl.pod250 EVP_PKEY_CTX_set_rsa_padding() sets the RSA padding mode for I<ctx>.
252 padding, B<RSA_NO_PADDING> for
253 no padding, B<RSA_PKCS1_OAEP_PADDING> for OAEP padding (encrypt and
269 EVP_PKEY_CTX_get_rsa_padding() gets the RSA padding mode for I<ctx>.
314 padding schemes to the digest named I<mdname>. If the RSA algorithm
327 The padding mode must have been set to B<RSA_PKCS1_OAEP_PADDING> or
349 size I<namelen>. The padding mode must have been set to
363 The padding mode must have been set to B<RSA_PKCS1_OAEP_PADDING>.
366 I<label>. The return value is the label length. The padding mode
480 EVP_PKEY_CTX_set_dh_pad() sets the DH padding mode.
[all …]
A DRSA_meth_new.pod42 unsigned char *to, RSA *rsa, int padding);
46 int padding));
50 unsigned char *to, RSA *rsa, int padding);
54 int padding));
58 int padding);
61 unsigned char *to, RSA *rsa, int padding));
65 int padding);
68 unsigned char *to, RSA *rsa, int padding));
A DEVP_EncodeInit.pod104 any illegal base 64 characters are encountered or if the base 64 padding
108 input data characters processed included the base 64 padding character "=" and
109 therefore no more non-padding character data is expected to be processed. For
112 of the data where the padding character "=" has been used).
142 then no more non-padding base 64 characters are expected.
A DDH_generate_key.pod42 The padding style is RFC 5246 (8.1.2) that strips leading zero bytes.
47 The padding style is NIST SP 800-56A (C.1) that retains leading zero bytes.
A DRSA_set_method.pod95 unsigned char *to, RSA *rsa, int padding);
99 unsigned char *to, RSA *rsa, int padding);
103 unsigned char *to, RSA *rsa, int padding);
107 unsigned char *to, RSA *rsa, int padding);
A DCMS_decrypt.pod43 PKCS #1 v1.5 RSA padding) all recipients are tried whether they succeed or
46 to) ultimately return a padding error only. If CMS_decrypt() just returned an
/openssl-master/include/openssl/
A Drsa.h283 RSA *rsa, int padding);
286 RSA *rsa, int padding);
289 RSA *rsa, int padding);
292 RSA *rsa, int padding);
488 RSA *rsa, int padding);
493 int padding));
498 RSA *rsa, int padding);
503 int padding));
508 RSA *rsa, int padding);
513 int padding));
[all …]
/openssl-master/test/recipes/30-test_evp_data/
A Devpencod.txt36 # Missing padding
157 # Multiline output without padding
162 # Multiline output with padding
/openssl-master/doc/man1/
A Dopenssl-pkeyutl.pod.in213 Depending on the key type, signature type, and mode of padding, the maximum
226 verify and verifyrecover operations. However, some padding modes
234 This sets the RSA padding mode. Acceptable values for I<mode> are B<pkcs1> for
235 PKCS#1 padding, B<none> for no padding, B<oaep>
238 In PKCS#1 padding if the message digest is not set then the supplied data is
262 For PSS and OAEP padding sets the MGF1 digest. If the MGF1 digest is not
275 supports the sign and verify operations with PSS padding. The following
284 restrictions. The padding mode can only be set to B<pss> which is the
399 Decrypt some data using a private key with OAEP padding using SHA256:
/openssl-master/doc/man7/
A DRSA-PSS.pod11 using PSS padding modes with optional parameter restrictions.
21 padding mode is always PSS. If the key in use has parameter restrictions then
A Dprovider-keyexch.pod175 Sets the padding mode for the associated key exchange ctx.
176 Setting a value of 1 will turn padding on.
177 Setting a value of 0 will turn padding off.
178 If padding is off then the derived shared secret may be smaller than the largest
180 If padding is on then the derived shared secret will have its first bytes filled
A Dprovider-asym_cipher.pod192 The type of padding to be used. The interpretation of this value will depend
193 on the algorithm in use. The default provider understands these RSA padding
201 Gets or sets the name of the OAEP digest algorithm used when OAEP padding is in
219 Gets or sets the name of the MGF1 digest algorithm used when OAEP or PSS padding
228 Gets or sets the OAEP label used when OAEP padding is in use.
A DEVP_MD-MDC2.pod30 Sets the padding type to be used.
A DEVP_KEM-RSA.pod27 encrypts the secret using the RSA public key (with no padding).
/openssl-master/ssl/record/
A Drec_layer_s3.c952 size_t padding = 0; in do_ssl3_write() local
955 padding = s->record_padding_cb(s, type, rlen, s->record_padding_arg); in do_ssl3_write()
967 padding = 0; in do_ssl3_write()
969 padding = s->block_padding - remainder; in do_ssl3_write()
971 if (padding > 0) { in do_ssl3_write()
973 if (padding > max_padding) in do_ssl3_write()
974 padding = max_padding; in do_ssl3_write()
975 if (!WPACKET_memset(thispkt, 0, padding)) { in do_ssl3_write()
980 SSL3_RECORD_add_length(thiswr, padding); in do_ssl3_write()
/openssl-master/engines/
A De_capi.txt38 CAPI_R_UNSUPPORTED_PADDING:127:unsupported padding

Completed in 39 milliseconds

123