/openssl-master/crypto/cms/ |
A D | cms_rsa.c | 117 int pad_mode = RSA_PKCS1_PADDING, rv = 0, labellen; in rsa_cms_encrypt() 126 if (pad_mode == RSA_PKCS1_PADDING) { in rsa_cms_encrypt() 191 int pad_mode = RSA_PKCS1_PADDING; in rsa_cms_sign() 201 if (pad_mode == RSA_PKCS1_PADDING) { in rsa_cms_sign()
|
/openssl-master/crypto/rsa/ |
A D | rsa_saos.c | 49 i = RSA_private_encrypt(i, s, sigret, rsa, RSA_PKCS1_PADDING); in RSA_sign_ASN1_OCTET_STRING() 79 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); in RSA_verify_ASN1_OCTET_STRING()
|
A D | rsa_pmeth.c | 71 rctx->pad_mode = RSA_PKCS1_PADDING; in pkey_rsa_init() 154 if (rctx->pad_mode != RSA_PKCS1_PADDING) in pkey_rsa_sign() 174 } else if (rctx->pad_mode == RSA_PKCS1_PADDING) { in pkey_rsa_sign() 235 } else if (rctx->pad_mode == RSA_PKCS1_PADDING) { in pkey_rsa_verifyrecover() 269 if (rctx->pad_mode == RSA_PKCS1_PADDING) in pkey_rsa_verify() 434 if ((p1 >= RSA_PKCS1_PADDING) && (p1 <= RSA_PKCS1_PSS_PADDING)) { in pkey_rsa_ctrl() 627 pm = RSA_PKCS1_PADDING; in pkey_rsa_ctrl_str()
|
A D | rsa_sign.c | 310 RSA_PKCS1_PADDING); in RSA_sign() 352 RSA_PKCS1_PADDING); in ossl_rsa_verify()
|
A D | rsa_ossl.c | 113 case RSA_PKCS1_PADDING: in rsa_ossl_public_encrypt() 268 case RSA_PKCS1_PADDING: in rsa_ossl_private_encrypt() 479 case RSA_PKCS1_PADDING: in rsa_ossl_private_decrypt() 583 case RSA_PKCS1_PADDING: in rsa_ossl_public_decrypt()
|
A D | rsa_gen.c | 485 int padding = RSA_PKCS1_PADDING; in rsa_keygen_pairwise_test()
|
A D | rsa_ameth.c | 636 if (pad_mode == RSA_PKCS1_PADDING) in rsa_item_sign()
|
/openssl-master/crypto/evp/ |
A D | p_dec.c | 33 RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
|
A D | p_enc.c | 33 RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
|
A D | ctrl_params_translate.c | 1220 { RSA_PKCS1_PADDING, "pkcs1" }, in fix_rsa_padding_mode()
|
/openssl-master/test/ |
A D | rsa_test.c | 277 return test_rsa_simple(idx, RSA_PKCS1_PADDING, RSA_PKCS1_PADDING, 1, NULL, in test_rsa_pkcs1()
|
A D | rsa_mp_test.c | 278 RSA_PKCS1_PADDING); in test_rsa_mp() 282 num = RSA_private_decrypt(num, ctext, ptext, key, RSA_PKCS1_PADDING); in test_rsa_mp()
|
/openssl-master/providers/implementations/signature/ |
A D | rsa_sig.c | 63 { RSA_PKCS1_PADDING, OSSL_PKEY_RSA_PAD_MODE_PKCSV15 }, 236 case RSA_PKCS1_PADDING: in rsa_generate_signature_aid() 418 prsactx->pad_mode = RSA_PKCS1_PADDING; in rsa_signverify_init() 543 if (prsactx->pad_mode != RSA_PKCS1_PADDING) { in rsa_sign() 578 case RSA_PKCS1_PADDING: in rsa_sign() 719 case RSA_PKCS1_PADDING: in rsa_verify_recover() 768 case RSA_PKCS1_PADDING: in rsa_verify() 1223 case RSA_PKCS1_PADDING: in rsa_set_ctx_params()
|
/openssl-master/apps/ |
A D | rsautl.c | 82 unsigned char *rsa_in = NULL, *rsa_out = NULL, pad = RSA_PKCS1_PADDING; in rsautl_main() 126 pad = RSA_PKCS1_PADDING; in rsautl_main()
|
/openssl-master/doc/man3/ |
A D | RSA_public_encrypt.pod | 36 =item RSA_PKCS1_PADDING 90 Decryption failures in the RSA_PKCS1_PADDING mode leak information
|
A D | RSA_private_encrypt.pod | 39 =item RSA_PKCS1_PADDING
|
A D | EVP_PKEY_verify.pod | 76 if (EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_PADDING) <= 0)
|
A D | EVP_PKEY_sign.pod | 80 if (EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_PADDING) <= 0)
|
A D | EVP_PKEY_verify_recover.pod | 84 if (EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_PADDING) <= 0)
|
A D | EVP_PKEY_CTX_ctrl.pod | 251 The I<pad> parameter can take the value B<RSA_PKCS1_PADDING> for PKCS#1 372 RSA_PKCS1_PADDING except that it additionally verifies that the result is the
|
/openssl-master/providers/implementations/asymciphers/ |
A D | rsa_enc.c | 49 { RSA_PKCS1_PADDING, OSSL_PKEY_RSA_PAD_MODE_PKCSV15 }, 113 prsactx->pad_mode = RSA_PKCS1_PADDING; in rsa_init()
|
/openssl-master/include/openssl/ |
A D | rsa.h | 186 # define RSA_PKCS1_PADDING 1 macro
|
/openssl-master/doc/man7/ |
A D | provider-asym_cipher.pod | 194 modes: 1 (RSA_PKCS1_PADDING), 3 (RSA_NO_PADDING),
|
/openssl-master/engines/ |
A D | e_capi.c | 950 case RSA_PKCS1_PADDING: in capi_rsa_priv_dec()
|