/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_rsa.c | 122 int pad_mode = RSA_PKCS1_PADDING, rv = 0, labellen; in rsa_cms_encrypt() 131 if (pad_mode == RSA_PKCS1_PADDING) in rsa_cms_encrypt() 198 int pad_mode = RSA_PKCS1_PADDING; in rsa_cms_sign() 211 if (pad_mode == RSA_PKCS1_PADDING) { in rsa_cms_sign()
|
/third_party/openssl/crypto/cms/ |
H A D | cms_rsa.c | 118 int pad_mode = RSA_PKCS1_PADDING, rv = 0, labellen; in rsa_cms_encrypt() 127 if (pad_mode == RSA_PKCS1_PADDING) { in rsa_cms_encrypt() 192 int pad_mode = RSA_PKCS1_PADDING; in rsa_cms_sign() 205 if (pad_mode == RSA_PKCS1_PADDING) { in rsa_cms_sign()
|
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 71 rctx->pad_mode = RSA_PKCS1_PADDING; in pkey_rsa_init() 154 if (rctx->pad_mode != RSA_PKCS1_PADDING) in pkey_rsa_sign() 174 } else if (rctx->pad_mode == RSA_PKCS1_PADDING) { in pkey_rsa_sign() 235 } else if (rctx->pad_mode == RSA_PKCS1_PADDING) { in pkey_rsa_verifyrecover() 269 if (rctx->pad_mode == RSA_PKCS1_PADDING) in pkey_rsa_verify() 434 if ((p1 >= RSA_PKCS1_PADDING) && (p1 <= RSA_PKCS1_PSS_PADDING)) { in pkey_rsa_ctrl() 631 pm = RSA_PKCS1_PADDING; in pkey_rsa_ctrl_str()
|
H A D | rsa_saos.c | 49 i = RSA_private_encrypt(i, s, sigret, rsa, RSA_PKCS1_PADDING); in RSA_sign_ASN1_OCTET_STRING() 79 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); in RSA_verify_ASN1_OCTET_STRING()
|
H A D | rsa_sign.c | 310 RSA_PKCS1_PADDING); in RSA_sign() 352 RSA_PKCS1_PADDING); in ossl_rsa_verify()
|
H A D | rsa_ossl.c | 113 case RSA_PKCS1_PADDING: in rsa_ossl_public_encrypt() 271 case RSA_PKCS1_PADDING: in rsa_ossl_private_encrypt() 480 case RSA_PKCS1_PADDING: in rsa_ossl_private_decrypt() 584 case RSA_PKCS1_PADDING: in rsa_ossl_public_decrypt()
|
/third_party/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 71 rctx->pad_mode = RSA_PKCS1_PADDING; in pkey_rsa_init() 154 if (rctx->pad_mode != RSA_PKCS1_PADDING) in pkey_rsa_sign() 174 } else if (rctx->pad_mode == RSA_PKCS1_PADDING) { in pkey_rsa_sign() 235 } else if (rctx->pad_mode == RSA_PKCS1_PADDING) { in pkey_rsa_verifyrecover() 269 if (rctx->pad_mode == RSA_PKCS1_PADDING) in pkey_rsa_verify() 434 if ((p1 >= RSA_PKCS1_PADDING) && (p1 <= RSA_PKCS1_PSS_PADDING)) { in pkey_rsa_ctrl() 627 pm = RSA_PKCS1_PADDING; in pkey_rsa_ctrl_str()
|
H A D | rsa_saos.c | 49 i = RSA_private_encrypt(i, s, sigret, rsa, RSA_PKCS1_PADDING); in RSA_sign_ASN1_OCTET_STRING() 79 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); in RSA_verify_ASN1_OCTET_STRING()
|
H A D | rsa_sign.c | 310 RSA_PKCS1_PADDING); in RSA_sign() 352 RSA_PKCS1_PADDING); in ossl_rsa_verify()
|
H A D | rsa_ossl.c | 113 case RSA_PKCS1_PADDING: in rsa_ossl_public_encrypt() 271 case RSA_PKCS1_PADDING: in rsa_ossl_private_encrypt() 480 case RSA_PKCS1_PADDING: in rsa_ossl_private_decrypt() 584 case RSA_PKCS1_PADDING: in rsa_ossl_public_decrypt()
|
/third_party/node/lib/internal/crypto/ |
H A D | cipher.js | 21 RSA_PKCS1_PADDING, 87 const publicDecrypt = rsaFunctionFor(_publicDecrypt, RSA_PKCS1_PADDING, 89 const privateEncrypt = rsaFunctionFor(_privateEncrypt, RSA_PKCS1_PADDING,
|
/third_party/node/deps/openssl/openssl/providers/implementations/signature/ |
H A D | rsa_sig.c | 62 { RSA_PKCS1_PADDING, OSSL_PKEY_RSA_PAD_MODE_PKCSV15 }, 238 case RSA_PKCS1_PADDING: in rsa_generate_signature_aid() 417 prsactx->pad_mode = RSA_PKCS1_PADDING; in rsa_signverify_init() 546 if (prsactx->pad_mode != RSA_PKCS1_PADDING) { in rsa_sign() 581 case RSA_PKCS1_PADDING: in rsa_sign() 722 case RSA_PKCS1_PADDING: in rsa_verify_recover() 771 case RSA_PKCS1_PADDING: in rsa_verify() 1230 case RSA_PKCS1_PADDING: in rsa_set_ctx_params()
|
/third_party/openssl/providers/implementations/signature/ |
H A D | rsa_sig.c | 62 { RSA_PKCS1_PADDING, OSSL_PKEY_RSA_PAD_MODE_PKCSV15 }, 238 case RSA_PKCS1_PADDING: in rsa_generate_signature_aid() 417 prsactx->pad_mode = RSA_PKCS1_PADDING; in rsa_signverify_init() 546 if (prsactx->pad_mode != RSA_PKCS1_PADDING) { in rsa_sign() 581 case RSA_PKCS1_PADDING: in rsa_sign() 722 case RSA_PKCS1_PADDING: in rsa_verify_recover() 771 case RSA_PKCS1_PADDING: in rsa_verify() 1229 case RSA_PKCS1_PADDING: in rsa_set_ctx_params()
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | p_enc.c | 37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
|
H A D | p_dec.c | 37 RSA_private_decrypt(ekl, ek, key, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
|
/third_party/openssl/crypto/evp/ |
H A D | p_enc.c | 37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
|
H A D | p_dec.c | 37 RSA_private_decrypt(ekl, ek, key, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | rsautl.c | 82 unsigned char *rsa_in = NULL, *rsa_out = NULL, pad = RSA_PKCS1_PADDING; in rsautl_main() 126 pad = RSA_PKCS1_PADDING; in rsautl_main()
|
/third_party/openssl/test/ |
H A D | rsa_test.c | 277 return test_rsa_simple(idx, RSA_PKCS1_PADDING, RSA_PKCS1_PADDING, 1, NULL, in test_rsa_pkcs1()
|
H A D | rsa_mp_test.c | 278 RSA_PKCS1_PADDING); in test_rsa_mp() 282 num = RSA_private_decrypt(num, ctext, ptext, key, RSA_PKCS1_PADDING); in test_rsa_mp()
|
/third_party/openssl/apps/ |
H A D | rsautl.c | 82 unsigned char *rsa_in = NULL, *rsa_out = NULL, pad = RSA_PKCS1_PADDING; in rsautl_main() 126 pad = RSA_PKCS1_PADDING; in rsautl_main()
|
/third_party/node/test/parallel/ |
H A D | test-crypto-rsa-dsa.js | 125 // Now with explicit RSA_PKCS1_PADDING. 127 padding: crypto.constants.RSA_PKCS1_PADDING, 133 padding: crypto.constants.RSA_PKCS1_PADDING, 139 // Omitting padding should be okay because RSA_PKCS1_PADDING is the default. 225 if (padding === constants.RSA_PKCS1_PADDING) { 258 test_rsa('RSA_PKCS1_PADDING');
|
H A D | test-crypto-async-sign-verify.js | 70 { padding: crypto.constants.RSA_PKCS1_PADDING });
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/ |
H A D | rsa.rs | 95 pub const RSA_PKCS1_PADDING: c_int = 1; consts
|
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | lws-genrsa.c | 41 static int mode_map_crypt[] = { RSA_PKCS1_PADDING, RSA_PKCS1_OAEP_PADDING }, 42 mode_map_sig[] = { RSA_PKCS1_PADDING, RSA_PKCS1_PSS_PADDING };
|