Lines Matching refs:v1
1053 * It is now possible to perform RSA PKCS v1.5 signatures with RIPEMD-160 digest.
1288 * Fix timing variations and memory access variations in RSA PKCS#1 v1.5
1299 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
2018 * Don't print X.509 version tag for v1 CRT's, and omit extensions for
2067 * Tighten the RSA PKCS#1 v1.5 signature verification code and remove the
2169 * Tighten parsing of RSA PKCS#1 v1.5 signatures, to avoid a
2569 * Add countermeasure against Lenstra's RSA-CRT attack for PKCS#1 v1.5
3093 * Restore ability to use a v1 cert as a CA if trusted locally. (This had
3234 * Fixed bug in RSA PKCS#1 v1.5 "reversed" operations
3410 * Support faulty X509 v1 certificates with extensions
3551 * Fix bug in RSA PKCS#1 v1.5 "reversed" operations
3664 rsa_pkcs1_sign() and rsa_pkcs1_verify() to separate PKCS#1 v1.5 and
3677 rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5
3841 rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5
4092 * Added support for TLS v1.1
4207 one way hash functions with the PKCS#1 v1.5 signing and
4279 Daniel Bleichenbacher attack on PKCS#1 v1.5 padding, as well