Lines Matching full:padding

32 typedef RK_RES (*test_rsa_one)(uint32_t padding, const char *padding_name,
37 uint32_t padding; member
42 static RK_RES test_rsa_pub_enc(uint32_t padding, const char *padding_name,
44 static RK_RES test_rsa_priv_enc(uint32_t padding, const char *padding_name,
46 static RK_RES test_rsa_sign(uint32_t padding, const char *padding_name,
102 /* crypt padding */ in rk2ssl_padding()
128 /* sign padding */ in rk2ssl_padding()
259 int padding, const EVP_MD *digest_algorithm, in openssl_encrypt() argument
282 if (EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, padding) <= 0) { in openssl_encrypt()
287 if (padding == RSA_PKCS1_OAEP_PADDING) { in openssl_encrypt()
322 int padding, const EVP_MD *digest_algorithm, in openssl_decrypt() argument
347 if (EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, padding) <= 0) { in openssl_decrypt()
352 if (padding == RSA_PKCS1_OAEP_PADDING) { in openssl_decrypt()
387 int padding, const EVP_MD *digest_algorithm, rk_rsa_priv_key_pack *priv) in openssl_sign() argument
414 if (EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, padding) <= 0) { in openssl_sign()
419 if (padding == RSA_PKCS1_PSS_PADDING) { in openssl_sign()
457 int padding, const EVP_MD *digest_algorithm, rk_rsa_priv_key_pack *priv) in openssl_verify() argument
483 if (EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, padding) <= 0) { in openssl_verify()
488 if (padding == RSA_PKCS1_PSS_PADDING) { in openssl_verify()
522 static RK_RES get_hash_algo_from_padding(uint32_t padding, uint32_t *hlen, uint32_t *hash_algo) in get_hash_algo_from_padding() argument
526 switch (padding) { in get_hash_algo_from_padding()
558 D_TRACE("unknown padding %x", padding); in get_hash_algo_from_padding()
569 static RK_RES calc_padding_digest(uint32_t padding, const uint8_t *data, uint32_t data_len, in calc_padding_digest() argument
577 res = get_hash_algo_from_padding(padding, &hash_len, &hash_algo); in calc_padding_digest()
605 static RK_RES test_rsa_pub_enc(uint32_t padding, const char *padding_name, in test_rsa_pub_enc() argument
644 res = rk_rsa_pub_encrypt(&pub_key, padding, data, data_len, enc_buf, &out_len); in test_rsa_pub_enc()
656 if (rk2ssl_padding(padding, &ssl_padding, &digest_md) == RK_CRYPTO_SUCCESS) { in test_rsa_pub_enc()
680 res = rk_rsa_priv_decrypt(&priv_key, padding, enc_buf, out_len, dec_buf, &out_len); in test_rsa_pub_enc()
717 static RK_RES test_rsa_priv_enc(uint32_t padding, const char *padding_name, in test_rsa_priv_enc() argument
756 res = rk_rsa_priv_encrypt(&priv_key, padding, data, data_len, enc_buf, &out_len); in test_rsa_priv_enc()
764 res = rk_rsa_pub_decrypt(&pub_key, padding, enc_buf, out_len, dec_buf, &out_len); in test_rsa_priv_enc()
801 static RK_RES test_rsa_sign_common(uint32_t padding, const char *padding_name, in test_rsa_sign_common() argument
822 res = rk_rsa_sign(&priv_key, padding, in, in_len, hash, sign, &sign_len); in test_rsa_sign_common()
844 if (rk2ssl_padding(padding, &ssl_padding, &digest_md) == RK_CRYPTO_SUCCESS) { in test_rsa_sign_common()
860 res = rk_rsa_verify(&pub_key, padding, in, in_len, hash, sign, sign_len); in test_rsa_sign_common()
868 res = rk_rsa_verify(&pub_key, padding, in, in_len, hash, sign, sign_len); in test_rsa_sign_common()
891 static RK_RES test_rsa_sign(uint32_t padding, const char *padding_name, in test_rsa_sign() argument
908 res = calc_padding_digest(padding, data, in_len, digest); in test_rsa_sign()
925 res = test_rsa_sign_common(padding, padding_name, nbits, data, in_len, in test_rsa_sign()
933 res = test_rsa_sign_common(padding, padding_name, nbits, data, in_len, in test_rsa_sign()
979 res = test_rsa_tbl[j].do_test(test_rsa_tbl[j].padding, in test_rsa()