Lines Matching +full:1 +full:eb

2  * PKCS #1 (RSA Encryption)
26 * PKCS #1 v1.5, 8.1: in pkcs1_generate_encryption_block()
28 * EB = 00 || BT || PS || 00 || D in pkcs1_generate_encryption_block()
31 * (BT=0: PS=0x00, BT=1: PS=0xff, BT=2: PS=pseudorandom non-zero) in pkcs1_generate_encryption_block()
36 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer " in pkcs1_generate_encryption_block()
41 return -1; in pkcs1_generate_encryption_block()
53 case 1: in pkcs1_generate_encryption_block()
59 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get " in pkcs1_generate_encryption_block()
61 return -1; in pkcs1_generate_encryption_block()
70 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type " in pkcs1_generate_encryption_block()
72 return -1; in pkcs1_generate_encryption_block()
91 return -1; in pkcs1_encrypt()
104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); in pkcs1_v15_private_key_decrypt()
108 if (*outlen < 2 || out[0] != 0 || out[1] != 2) in pkcs1_v15_private_key_decrypt()
109 return -1; in pkcs1_v15_private_key_decrypt()
117 return -1; in pkcs1_v15_private_key_decrypt()
119 /* PKCS #1 v1.5, 8.1: At least eight octets long PS */ in pkcs1_v15_private_key_decrypt()
121 return -1; in pkcs1_v15_private_key_decrypt()
127 /* Strip PKCS #1 header */ in pkcs1_v15_private_key_decrypt()
143 return -1; in pkcs1_decrypt_public_key()
146 * PKCS #1 v1.5, 8.1: in pkcs1_decrypt_public_key()
148 * EB = 00 || BT || PS || 00 || D in pkcs1_decrypt_public_key()
157 plain[0] != 0x00 || plain[1] != 0x01) { in pkcs1_decrypt_public_key()
158 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key()
160 wpa_hexdump_key(MSG_DEBUG, "Signature EB", plain, len); in pkcs1_decrypt_public_key()
161 return -1; in pkcs1_decrypt_public_key()
169 wpa_hexdump_key(MSG_DEBUG, "Signature EB", plain, len); in pkcs1_decrypt_public_key()
170 return -1; in pkcs1_decrypt_public_key()
176 /* PKCS #1 v1.5, 8.1: At least eight octets long PS */ in pkcs1_decrypt_public_key()
179 wpa_hexdump_key(MSG_DEBUG, "Signature EB", plain, len); in pkcs1_decrypt_public_key()
180 return -1; in pkcs1_decrypt_public_key()
184 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key()
186 wpa_hexdump_key(MSG_DEBUG, "Signature EB", plain, len); in pkcs1_decrypt_public_key()
187 return -1; in pkcs1_decrypt_public_key()
192 /* Strip PKCS #1 header */ in pkcs1_decrypt_public_key()
214 return -1; in pkcs1_v15_sig_ver()
219 wpa_printf(MSG_INFO, "PKCS #1: RSA decrypt failed"); in pkcs1_v15_sig_ver()
221 return -1; in pkcs1_v15_sig_ver()
226 * PKCS #1 v1.5, 10.1.2: in pkcs1_v15_sig_ver()
241 "PKCS #1: Expected SEQUENCE (DigestInfo)"); in pkcs1_v15_sig_ver()
243 return -1; in pkcs1_v15_sig_ver()
245 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: DigestInfo", in pkcs1_v15_sig_ver()
262 "PKCS #1: Expected SEQUENCE (AlgorithmIdentifier)"); in pkcs1_v15_sig_ver()
264 return -1; in pkcs1_v15_sig_ver()
266 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: DigestAlgorithmIdentifier", in pkcs1_v15_sig_ver()
272 "PKCS #1: Failed to parse digestAlgorithm"); in pkcs1_v15_sig_ver()
274 return -1; in pkcs1_v15_sig_ver()
276 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: Digest algorithm parameters", in pkcs1_v15_sig_ver()
289 "PKCS #1: Unexpected digest algorithm parameters"); in pkcs1_v15_sig_ver()
291 return -1; in pkcs1_v15_sig_ver()
299 "PKCS #1: Hash alg OID mismatch: was %s, expected %s", in pkcs1_v15_sig_ver()
302 return -1; in pkcs1_v15_sig_ver()
311 "PKCS #1: Expected OCTETSTRING (Digest)"); in pkcs1_v15_sig_ver()
313 return -1; in pkcs1_v15_sig_ver()
315 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: Decrypted Digest", in pkcs1_v15_sig_ver()
320 wpa_printf(MSG_INFO, "PKCS #1: Digest value does not match calculated hash"); in pkcs1_v15_sig_ver()
322 return -1; in pkcs1_v15_sig_ver()
327 "PKCS #1: Extra data after signature - reject"); in pkcs1_v15_sig_ver()
329 wpa_hexdump(MSG_DEBUG, "PKCS #1: Extra data", in pkcs1_v15_sig_ver()
335 return -1; in pkcs1_v15_sig_ver()