Home
last modified time | relevance | path

Searched refs:padding (Results 1 – 25 of 80) sorted by relevance

1234

/openssl/crypto/rsa/
H A Drsa_crpt.c34 RSA *rsa, int padding) in RSA_public_encrypt() argument
36 return rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding); in RSA_public_encrypt()
40 unsigned char *to, RSA *rsa, int padding) in RSA_private_encrypt() argument
42 return rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding); in RSA_private_encrypt()
46 unsigned char *to, RSA *rsa, int padding) in RSA_private_decrypt() argument
48 return rsa->meth->rsa_priv_dec(flen, from, to, rsa, padding); in RSA_private_decrypt()
52 RSA *rsa, int padding) in RSA_public_decrypt() argument
54 return rsa->meth->rsa_pub_dec(flen, from, to, rsa, padding); in RSA_public_decrypt()
H A Drsa_meth.c104 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc()
112 int padding)) in RSA_meth_set_pub_enc() argument
120 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec()
128 int padding)) in RSA_meth_set_pub_dec() argument
136 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc()
144 int padding)) in RSA_meth_set_priv_enc() argument
152 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec()
160 int padding)) in RSA_meth_set_priv_dec() argument
H A Drsa_ossl.c25 unsigned char *to, RSA *rsa, int padding);
29 unsigned char *to, RSA *rsa, int padding);
135 switch (padding) { in rsa_ossl_public_encrypt()
164 if (padding == RSA_NO_PADDING) { in rsa_ossl_public_encrypt()
330 switch (padding) { in rsa_ossl_private_encrypt()
411 if (padding == RSA_X931_PADDING) { in rsa_ossl_private_encrypt()
540 padding = RSA_PKCS1_NO_IMPLICIT_REJECT_PADDING; in rsa_ossl_private_decrypt()
580 if (padding == RSA_NO_PADDING) { in rsa_ossl_private_decrypt()
662 if (padding == RSA_PKCS1_PADDING) { in rsa_ossl_private_decrypt()
671 switch (padding) { in rsa_ossl_private_decrypt()
[all …]
H A Drsa_local.h106 unsigned char *to, RSA *rsa, int padding);
108 unsigned char *to, RSA *rsa, int padding);
110 unsigned char *to, RSA *rsa, int padding);
112 unsigned char *to, RSA *rsa, int padding);
/openssl/doc/man3/
H A DSSL_CTX_set_record_padding_callback.pod14 SSL_set_block_padding_ex - install callback to specify TLS 1.3 record padding
37 can be used to assign a callback function I<cb> to specify the padding
39 Kernel TLS is not possible if the record padding callback is set, and the callback
50 of the B<block_size>. A B<block_size> of 0 or 1 disables block padding. The limit of
54 allow the caller to separately specify the padding block size to be applied to
76 The B<cb> returns the number of padding bytes to add to the record. A return of 0
77 indicates no padding will be added. A return value that causes the record to
86 The default behavior is to add no padding to the record.
88 A user-supplied padding callback function will override the behavior set by
90 callback to NULL will restore the configured block padding behavior.
[all …]
H A DRSA_public_encrypt.pod16 unsigned char *to, RSA *rsa, int padding);
19 unsigned char *to, RSA *rsa, int padding);
32 B<padding> denotes one of the following modes:
38 PKCS #1 v1.5 padding. This currently is the most widely used mode.
50 cryptographically sound padding modes in the application code.
58 When a padding mode other than RSA_NO_PADDING is in use, then
73 RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 based padding modes and
75 B<padding> is the padding mode that was used to encrypt the data.
91 which can potentially be used to mount a Bleichenbacher padding oracle
92 attack. This is an inherent weakness in the PKCS #1 v1.5 padding
[all …]
H A DRSA_private_encrypt.pod16 unsigned char *to, RSA *rsa, int padding);
19 unsigned char *to, RSA *rsa, int padding);
35 B<padding> denotes one of the following modes:
41 PKCS #1 v1.5 padding. This function does not handle the
49 cryptographically sound padding modes in the application code.
58 11>). B<padding> is the padding mode that was used to sign the data.
H A DRSA_padding_add_PKCS1_type_1.pod10 padding
65 However, they can also be called directly to implement padding for other
126 padding oracle attack. This is an inherent weakness in the PKCS #1
127 v1.5 padding design. Prefer PKCS1_OAEP padding. If that is not
134 Do not remove the zero-padding from the decrypted raw RSA data
137 used to mount a Bleichenbacher attack against any padding mode
H A DEVP_PKEY_CTX_ctrl.pod250 EVP_PKEY_CTX_set_rsa_padding() sets the RSA padding mode for I<ctx>.
252 padding, B<RSA_NO_PADDING> for
253 no padding, B<RSA_PKCS1_OAEP_PADDING> for OAEP padding (encrypt and
321 padding schemes to the digest named I<mdname>. If the RSA algorithm
334 The padding mode must have been set to B<RSA_PKCS1_OAEP_PADDING> or
356 size I<namelen>. The padding mode must have been set to
370 The padding mode must have been set to B<RSA_PKCS1_OAEP_PADDING>.
373 I<label>. The return value is the label length. The padding mode
398 instead of padding errors in case padding checks fail. Applications that
497 EVP_PKEY_CTX_set_dh_pad() sets the DH padding mode.
[all …]
H A DRSA_meth_new.pod42 unsigned char *to, RSA *rsa, int padding);
46 int padding));
50 unsigned char *to, RSA *rsa, int padding);
54 int padding));
58 int padding);
61 unsigned char *to, RSA *rsa, int padding));
65 int padding);
68 unsigned char *to, RSA *rsa, int padding));
H A DEVP_EncodeInit.pod107 if its length is not a multiple of 4 (including any padding), to be processed
122 If any invalid base64 characters are encountered or if the base64 padding
127 ended with base64 padding (B<=>), or that the next 4 byte group starts with the
133 end of data terminated with one or two padding characters).
147 characters or padding (only at the tail of the input) and its length MUST be
151 is responsible for taking trailing padding into account, by ignoring as many
169 then no more non-padding base64 characters are expected.
H A DEVP_PKEY_sign.pod47 implementation or padding is not normally supported.
74 signed after appropriate padding.
77 algorithm, and the result is signed after appropriate padding.
111 with, as well as the padding mode (see L<EVP_PKEY_CTX_set_signature_md(3)> and
149 =head2 RSA with PKCS#1 padding for SHA256
151 Sign data using RSA with PKCS#1 padding and a SHA256 digest as input:
195 for which the padding is pre-determined to be B<RSA_PKCS1_PADDING>, and the
239 C<sha256WithRSAEncryption>, for which the padding is pre-determined to be
H A DEVP_PKEY_decrypt.pod56 In OpenSSL versions before 3.2.0, when used in PKCS#1 v1.5 padding,
62 v1.5 padding as implemented in the B<default> provider implements
65 That means it doesn't return an error when it detects an error in padding,
H A DRSA_set_method.pod95 unsigned char *to, RSA *rsa, int padding);
99 unsigned char *to, RSA *rsa, int padding);
103 unsigned char *to, RSA *rsa, int padding);
107 unsigned char *to, RSA *rsa, int padding);
/openssl/providers/implementations/ciphers/
H A Dcipher_aes_gcm_siv_hw.c154 uint8_t padding[BLOCK_SIZE]; in aes_gcm_siv_encrypt() local
186 memset(padding, 0, sizeof(padding)); in aes_gcm_siv_encrypt()
187 memcpy(padding, &in[DOWN16(len)], REMAINDER16(len)); in aes_gcm_siv_encrypt()
188 ossl_polyval_ghash_hash(ctx->Htable, S_s, padding, sizeof(padding)); in aes_gcm_siv_encrypt()
216 uint64_t padding[2]; in aes_gcm_siv_decrypt() local
251 padding[0] = padding[1] = 0; in aes_gcm_siv_decrypt()
252 memcpy(padding, &out[DOWN16(len)], REMAINDER16(len)); in aes_gcm_siv_decrypt()
253 ossl_polyval_ghash_hash(ctx->Htable, S_s, (uint8_t *)padding, sizeof(padding)); in aes_gcm_siv_decrypt()
/openssl/ssl/record/methods/
H A Dtls13_meth.c343 size_t padding = 0; in tls13_add_record_padding() local
362 if (rl->padding != NULL) { in tls13_add_record_padding()
363 padding = rl->padding(rl->cbarg, thistempl->type, rlen); in tls13_add_record_padding()
387 padding = 0; in tls13_add_record_padding()
389 padding = bp - remainder; in tls13_add_record_padding()
392 if (padding > 0) { in tls13_add_record_padding()
394 if (padding > max_padding) in tls13_add_record_padding()
395 padding = max_padding; in tls13_add_record_padding()
396 if (!WPACKET_memset(thispkt, 0, padding)) { in tls13_add_record_padding()
401 TLS_RL_RECORD_add_length(thiswr, padding); in tls13_add_record_padding()
/openssl/doc/man7/
H A DEVP_KEYEXCH-DH.pod23 Sets the padding mode for the associated key exchange ctx.
24 Setting a value of 1 will turn padding on.
25 Setting a value of 0 will turn padding off.
26 If padding is off then the derived shared secret may be smaller than the
28 If padding is on then the derived shared secret will have its first bytes
31 The padding mode parameter is ignored (and padding implicitly enabled) when
96 /* Optionally set the padding */
H A DEVP_ASYM_CIPHER-RSA.pod18 The default provider understands these RSA padding modes in string form:
28 This padding mode is no longer supported by the FIPS provider for key
38 The default provider understands these RSA padding modes in integer form:
44 This padding mode is no longer supported by the FIPS provider for key
92 The default value of 1 causes an error during encryption if the RSA padding
H A DRSA-PSS.pod11 using PSS padding modes with optional parameter restrictions.
21 padding mode is always PSS. If the key in use has parameter restrictions then
H A Dprovider-asym_cipher.pod191 The type of padding to be used. The interpretation of this value will depend
196 Gets or sets the name of the OAEP digest algorithm used when OAEP padding is in
214 Gets or sets the name of the MGF1 digest algorithm used when OAEP or PSS padding
223 Gets the OAEP label used when OAEP padding is in use.
227 Sets the OAEP label used when OAEP padding is in use.
241 a deterministically random value if the PKCS#1 v1.5 padding check fails.
/openssl/include/openssl/
H A Drsa.h294 RSA *rsa, int padding);
297 RSA *rsa, int padding);
300 RSA *rsa, int padding);
303 RSA *rsa, int padding);
499 RSA *rsa, int padding);
504 int padding));
509 RSA *rsa, int padding);
514 int padding));
519 RSA *rsa, int padding);
524 int padding));
[all …]
H A Dcore_names.h.in83 /* RSA padding modes */
90 /* RSA pss padding salt length */
/openssl/doc/man1/
H A Dopenssl-pkeyutl.pod.in155 in some cases (e.g., RSA with the default PKCS#1 padding mode).
285 Depending on the key type, signature type, and mode of padding, the maximum
298 verify and verifyrecover operations. However, some padding modes
307 PKCS#1 padding, B<none> for no padding, B<oaep>
316 the decryption will not fail in case of padding check failures. Use B<none>
318 value has correct PKCS#1 v1.5 padding.
339 For PSS and OAEP padding sets the MGF1 digest. If the MGF1 digest is not
353 of padding check failure.
362 supports the sign and verify operations with PSS padding. The following
371 restrictions. The padding mode can only be set to B<pss> which is the
[all …]
H A Dopenssl-rsautl.pod.in106 The padding to use: PKCS#1 v1.5 (the default), PKCS#1 OAEP,
107 ANSI X9.31, or no padding, respectively.
111 using PKCS#1 v1.5 mode will not return errors in case padding check failed.
113 padding is correct.
165 and random padding data visible instead of the 0xff bytes.
/openssl/test/recipes/30-test_evp_data/
H A Devpencod.txt36 # Missing padding
157 # Multiline output without padding
162 # Multiline output with padding

Completed in 72 milliseconds

1234