Home | History | Annotate | Download | only in libtomcrypt

Lines Matching full:pkcs

121 public key cryptography (via PKCS \#1 RSA, DH or ECCDH), and a plethora of support routines.  
2062 * [aside from pkcs...] */
3057 RSA wrote the PKCS \#1 specifications which detail RSA Public Key Cryptography. In the specifications are
3061 \mysection{PKCS \#1 Padding}
3062 PKCS \#1 v1.5 padding is so simple that both signature and encryption padding are performed by the same function. Note: the
3066 \subsection{PKCS \#1 v1.5 Encoding}
3067 The following function performs PKCS \#1 v1.5 padding:
3068 \index{pkcs\_1\_v1\_5\_encode()}
3088 \subsection{PKCS \#1 v1.5 Decoding}
3089 The following function performs PKCS \#1 v1.5 de--padding:
3090 \index{pkcs\_1\_v1\_5\_decode()}
3102 This will remove the PKCS padding data pointed to by \textit{msg} of length \textit{msglen}. The decoded data is stored in \textit{out} of length
3106 \mysection{PKCS \#1 v2.1 Encryption}
3107 PKCS \#1 RSA Encryption amounts to OAEP padding of the input message followed by the modular exponentiation. As far as this portion of
3112 The following function performs PKCS \#1 v2.1 encryption padding:
3114 \index{pkcs\_1\_oaep\_encode()}
3134 \textit{modulus\_bitlen}. \textit{hash\_idx} is the index into the hash descriptor table of the hash desired. PKCS \#1 allows any hash to be
3147 \index{pkcs\_1\_oaep\_decode()}
3162 output of pkcs\_1\_oaep\_encode() of length \textit{msglen}. \textit{lparam} is the same system variable passed to the OAEP encoder. If it does not
3171 \mysection{PKCS \#1 Digital Signatures}
3174 PSS encoding is the second half of the PKCS \#1 standard which is padding to be applied to messages that are signed.
3176 \index{pkcs\_1\_pss\_encode()}
3204 \index{pkcs\_1\_pss\_decode()}
3278 PK\_PRIVATE type.} in the form of a RSAPrivateKey (PKCS \#1 compliant). The second type, is a public RSA key which only includes the modulus and public exponent.
3279 It takes the form of a RSAPublicKey (PKCS \#1 compliant).
3292 This will load the bignum from \textit{in} as a big endian integer in the format PKCS \#1 specifies, raises it to either \textit{e} or \textit{d} and stores the result
3296 Note: the output of this function is zero--padded as per PKCS \#1 specification. This allows this routine to work with PKCS \#1 padding functions properly.
3318 to \index{pkcs\_1\_oaep\_encode()} pkcs\_1\_oaep\_encode().
3321 As of v1.15, the library supports both v1.5 and v2.1 PKCS \#1 style paddings in these higher level functions. The following is the extended
3362 to pkcs\_1\_oaep\_decode().
3367 As of v1.15, the library supports both v1.5 and v2.1 PKCS \#1 style paddings in these higher level functions. The following is the extended
3385 Similar to the extended encryption, the new parameter \textit{padding} indicates which version of the PKCS \#1 standard to use.
3435 This will PKCS encode the message digest pointed to by \textit{in} of length \textit{inlen} octets. Next, the PKCS encoded hash will be RSA
3480 This will RSA \textit{verify} the signature pointed to by \textit{sig} of length \textit{siglen} octets. Next, the RSA decoded data is PKCS decoded
3483 If the RSA decoded data is not a valid PSS message, or if the PKCS decoded hash does not match the \textit{msghash}
3566 The RSA key format adopted for exporting and importing keys is the PKCS \#1 format defined by the ASN.1 constructs known as
3579 This will export the RSA key in either a RSAPublicKey or RSAPrivateKey (PKCS \#1 types) depending on the value of \textit{type}. When it is
4764 \subsection{PKCS \#5}
4765 \index{PKCS \#5}
4766 In order to securely handle user passwords for the purposes of creating session keys and chaining IVs the PKCS \#5 was drafted. PKCS \#5
4775 \index{pkcs\_5\_alg1()}
4798 \index{pkcs\_5\_alg2()}
6452 /** RSA PKCS style key */
6479 Since the function is given the entire RSA key (for private keys only) CRT is possible as prescribed in the PKCS \#1 v2.1 specification.