/openssl-master/crypto/rsa/ |
A D | rsa_crpt.c | 34 RSA *rsa, int padding) in RSA_public_encrypt() argument 36 return rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding); in RSA_public_encrypt() 40 unsigned char *to, RSA *rsa, int padding) in RSA_private_encrypt() argument 42 return rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding); in RSA_private_encrypt() 46 unsigned char *to, RSA *rsa, int padding) in RSA_private_decrypt() argument 48 return rsa->meth->rsa_priv_dec(flen, from, to, rsa, padding); in RSA_private_decrypt() 52 RSA *rsa, int padding) in RSA_public_decrypt() argument 54 return rsa->meth->rsa_pub_dec(flen, from, to, rsa, padding); in RSA_public_decrypt()
|
A D | rsa_meth.c | 108 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc() 116 int padding)) in RSA_meth_set_pub_enc() argument 124 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec() 132 int padding)) in RSA_meth_set_pub_dec() argument 140 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc() 148 int padding)) in RSA_meth_set_priv_enc() argument 156 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec() 164 int padding)) in RSA_meth_set_priv_dec() argument
|
A D | rsa_ossl.c | 22 unsigned char *to, RSA *rsa, int padding); 24 unsigned char *to, RSA *rsa, int padding); 26 unsigned char *to, RSA *rsa, int padding); 28 unsigned char *to, RSA *rsa, int padding); 75 unsigned char *to, RSA *rsa, int padding) in rsa_ossl_public_encrypt() argument 112 switch (padding) { in rsa_ossl_public_encrypt() 240 unsigned char *to, RSA *rsa, int padding) in rsa_ossl_private_encrypt() argument 267 switch (padding) { in rsa_ossl_private_encrypt() 348 if (padding == RSA_X931_PADDING) { in rsa_ossl_private_encrypt() 478 switch (padding) { in rsa_ossl_private_decrypt() [all …]
|
A D | rsa_local.h | 106 unsigned char *to, RSA *rsa, int padding); 108 unsigned char *to, RSA *rsa, int padding); 110 unsigned char *to, RSA *rsa, int padding); 112 unsigned char *to, RSA *rsa, int padding);
|
A D | rsa_gen.c | 485 int padding = RSA_PKCS1_PADDING; in rsa_keygen_pairwise_test() local 505 padding); in rsa_keygen_pairwise_test() 515 padding); in rsa_keygen_pairwise_test()
|
/openssl-master/doc/man3/ |
A D | RSA_public_encrypt.pod | 16 unsigned char *to, RSA *rsa, int padding); 19 unsigned char *to, RSA *rsa, int padding); 32 B<padding> denotes one of the following modes: 38 PKCS #1 v1.5 padding. This currently is the most widely used mode. 50 cryptographically sound padding modes in the application code. 56 based padding modes, not more than RSA_size(B<rsa>) - 42 for 58 When a padding mode other than RSA_NO_PADDING is in use, then 73 RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 based padding modes and 75 B<padding> is the padding mode that was used to encrypt the data. 91 which can potentially be used to mount a Bleichenbacher padding oracle [all …]
|
A D | SSL_CTX_set_record_padding_callback.pod | 12 SSL_set_block_padding - install callback to specify TLS 1.3 record padding 33 can be used to assign a callback function I<cb> to specify the padding 35 Kernel TLS is not possible if the record padding callback is set, and the callback 46 of the B<block_size>. A B<block_size> of 0 or 1 disables block padding. The limit of 64 The B<cb> returns the number of padding bytes to add to the record. A return of 0 65 indicates no padding will be added. A return value that causes the record to 74 The default behavior is to add no padding to the record. 76 A user-supplied padding callback function will override the behavior set by 78 callback to NULL will restore the configured block padding behavior. 90 The record padding API was added for TLS 1.3 support in OpenSSL 1.1.1.
|
A D | RSA_private_encrypt.pod | 16 unsigned char *to, RSA *rsa, int padding); 19 unsigned char *to, RSA *rsa, int padding); 35 B<padding> denotes one of the following modes: 41 PKCS #1 v1.5 padding. This function does not handle the 49 cryptographically sound padding modes in the application code. 58 11>). B<padding> is the padding mode that was used to sign the data.
|
A D | RSA_padding_add_PKCS1_type_1.pod | 10 padding 65 However, they can also be called directly to implement padding for other 126 padding oracle attack. This is an inherent weakness in the PKCS #1 127 v1.5 padding design. Prefer PKCS1_OAEP padding. If that is not 134 Do not remove the zero-padding from the decrypted raw RSA data 137 used to mount a Bleichenbacher attack against any padding mode
|
A D | EVP_PKEY_CTX_ctrl.pod | 250 EVP_PKEY_CTX_set_rsa_padding() sets the RSA padding mode for I<ctx>. 252 padding, B<RSA_NO_PADDING> for 253 no padding, B<RSA_PKCS1_OAEP_PADDING> for OAEP padding (encrypt and 269 EVP_PKEY_CTX_get_rsa_padding() gets the RSA padding mode for I<ctx>. 314 padding schemes to the digest named I<mdname>. If the RSA algorithm 327 The padding mode must have been set to B<RSA_PKCS1_OAEP_PADDING> or 349 size I<namelen>. The padding mode must have been set to 363 The padding mode must have been set to B<RSA_PKCS1_OAEP_PADDING>. 366 I<label>. The return value is the label length. The padding mode 480 EVP_PKEY_CTX_set_dh_pad() sets the DH padding mode. [all …]
|
A D | RSA_meth_new.pod | 42 unsigned char *to, RSA *rsa, int padding); 46 int padding)); 50 unsigned char *to, RSA *rsa, int padding); 54 int padding)); 58 int padding); 61 unsigned char *to, RSA *rsa, int padding)); 65 int padding); 68 unsigned char *to, RSA *rsa, int padding));
|
A D | EVP_EncodeInit.pod | 104 any illegal base 64 characters are encountered or if the base 64 padding 108 input data characters processed included the base 64 padding character "=" and 109 therefore no more non-padding character data is expected to be processed. For 112 of the data where the padding character "=" has been used). 142 then no more non-padding base 64 characters are expected.
|
A D | DH_generate_key.pod | 42 The padding style is RFC 5246 (8.1.2) that strips leading zero bytes. 47 The padding style is NIST SP 800-56A (C.1) that retains leading zero bytes.
|
A D | RSA_set_method.pod | 95 unsigned char *to, RSA *rsa, int padding); 99 unsigned char *to, RSA *rsa, int padding); 103 unsigned char *to, RSA *rsa, int padding); 107 unsigned char *to, RSA *rsa, int padding);
|
A D | CMS_decrypt.pod | 43 PKCS #1 v1.5 RSA padding) all recipients are tried whether they succeed or 46 to) ultimately return a padding error only. If CMS_decrypt() just returned an
|
/openssl-master/include/openssl/ |
A D | rsa.h | 283 RSA *rsa, int padding); 286 RSA *rsa, int padding); 289 RSA *rsa, int padding); 292 RSA *rsa, int padding); 488 RSA *rsa, int padding); 493 int padding)); 498 RSA *rsa, int padding); 503 int padding)); 508 RSA *rsa, int padding); 513 int padding)); [all …]
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evpencod.txt | 36 # Missing padding 157 # Multiline output without padding 162 # Multiline output with padding
|
/openssl-master/doc/man1/ |
A D | openssl-pkeyutl.pod.in | 213 Depending on the key type, signature type, and mode of padding, the maximum 226 verify and verifyrecover operations. However, some padding modes 234 This sets the RSA padding mode. Acceptable values for I<mode> are B<pkcs1> for 235 PKCS#1 padding, B<none> for no padding, B<oaep> 238 In PKCS#1 padding if the message digest is not set then the supplied data is 262 For PSS and OAEP padding sets the MGF1 digest. If the MGF1 digest is not 275 supports the sign and verify operations with PSS padding. The following 284 restrictions. The padding mode can only be set to B<pss> which is the 399 Decrypt some data using a private key with OAEP padding using SHA256:
|
/openssl-master/doc/man7/ |
A D | RSA-PSS.pod | 11 using PSS padding modes with optional parameter restrictions. 21 padding mode is always PSS. If the key in use has parameter restrictions then
|
A D | provider-keyexch.pod | 175 Sets the padding mode for the associated key exchange ctx. 176 Setting a value of 1 will turn padding on. 177 Setting a value of 0 will turn padding off. 178 If padding is off then the derived shared secret may be smaller than the largest 180 If padding is on then the derived shared secret will have its first bytes filled
|
A D | provider-asym_cipher.pod | 192 The type of padding to be used. The interpretation of this value will depend 193 on the algorithm in use. The default provider understands these RSA padding 201 Gets or sets the name of the OAEP digest algorithm used when OAEP padding is in 219 Gets or sets the name of the MGF1 digest algorithm used when OAEP or PSS padding 228 Gets or sets the OAEP label used when OAEP padding is in use.
|
A D | EVP_MD-MDC2.pod | 30 Sets the padding type to be used.
|
A D | EVP_KEM-RSA.pod | 27 encrypts the secret using the RSA public key (with no padding).
|
/openssl-master/ssl/record/ |
A D | rec_layer_s3.c | 952 size_t padding = 0; in do_ssl3_write() local 955 padding = s->record_padding_cb(s, type, rlen, s->record_padding_arg); in do_ssl3_write() 967 padding = 0; in do_ssl3_write() 969 padding = s->block_padding - remainder; in do_ssl3_write() 971 if (padding > 0) { in do_ssl3_write() 973 if (padding > max_padding) in do_ssl3_write() 974 padding = max_padding; in do_ssl3_write() 975 if (!WPACKET_memset(thispkt, 0, padding)) { in do_ssl3_write() 980 SSL3_RECORD_add_length(thiswr, padding); in do_ssl3_write()
|
/openssl-master/engines/ |
A D | e_capi.txt | 38 CAPI_R_UNSUPPORTED_PADDING:127:unsupported padding
|