| OLD | NEW |
| 1 /* crypto/rsa/rsa.h */ | 1 /* crypto/rsa/rsa.h */ |
| 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 * All rights reserved. | 3 * All rights reserved. |
| 4 * | 4 * |
| 5 * This package is an SSL implementation written | 5 * This package is an SSL implementation written |
| 6 * by Eric Young (eay@cryptsoft.com). | 6 * by Eric Young (eay@cryptsoft.com). |
| 7 * The implementation was written so as to conform with Netscapes SSL. | 7 * The implementation was written so as to conform with Netscapes SSL. |
| 8 * | 8 * |
| 9 * This library is free for commercial and non-commercial use as long as | 9 * This library is free for commercial and non-commercial use as long as |
| 10 * the following conditions are aheared to. The following conditions | 10 * the following conditions are aheared to. The following conditions |
| (...skipping 56 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 67 #include <openssl/crypto.h> | 67 #include <openssl/crypto.h> |
| 68 #include <openssl/ossl_typ.h> | 68 #include <openssl/ossl_typ.h> |
| 69 #ifndef OPENSSL_NO_DEPRECATED | 69 #ifndef OPENSSL_NO_DEPRECATED |
| 70 #include <openssl/bn.h> | 70 #include <openssl/bn.h> |
| 71 #endif | 71 #endif |
| 72 | 72 |
| 73 #ifdef OPENSSL_NO_RSA | 73 #ifdef OPENSSL_NO_RSA |
| 74 #error RSA is disabled. | 74 #error RSA is disabled. |
| 75 #endif | 75 #endif |
| 76 | 76 |
| 77 /* If this flag is set the RSA method is FIPS compliant and can be used | |
| 78 * in FIPS mode. This is set in the validated module method. If an | |
| 79 * application sets this flag in its own methods it is its reposibility | |
| 80 * to ensure the result is compliant. | |
| 81 */ | |
| 82 | |
| 83 #define RSA_FLAG_FIPS_METHOD 0x0400 | |
| 84 | |
| 85 /* If this flag is set the operations normally disabled in FIPS mode are | |
| 86 * permitted it is then the applications responsibility to ensure that the | |
| 87 * usage is compliant. | |
| 88 */ | |
| 89 | |
| 90 #define RSA_FLAG_NON_FIPS_ALLOW 0x0400 | |
| 91 | |
| 92 #ifdef OPENSSL_FIPS | |
| 93 #define FIPS_RSA_SIZE_T int | |
| 94 #endif | |
| 95 | |
| 96 #ifdef __cplusplus | 77 #ifdef __cplusplus |
| 97 extern "C" { | 78 extern "C" { |
| 98 #endif | 79 #endif |
| 99 | 80 |
| 100 /* Declared already in ossl_typ.h */ | 81 /* Declared already in ossl_typ.h */ |
| 101 /* typedef struct rsa_st RSA; */ | 82 /* typedef struct rsa_st RSA; */ |
| 102 /* typedef struct rsa_meth_st RSA_METHOD; */ | 83 /* typedef struct rsa_meth_st RSA_METHOD; */ |
| 103 | 84 |
| 104 struct rsa_meth_st | 85 struct rsa_meth_st |
| 105 { | 86 { |
| (...skipping 23 matching lines...) Expand all Loading... |
| 129 * the RSA_public_decrypt() and RSA_private_encrypt() should *NOT* be used | 110 * the RSA_public_decrypt() and RSA_private_encrypt() should *NOT* be used |
| 130 * RSA_sign(), RSA_verify() should be used instead. Note: for backwards | 111 * RSA_sign(), RSA_verify() should be used instead. Note: for backwards |
| 131 * compatibility this functionality is only enabled if the RSA_FLAG_SIGN_VER | 112 * compatibility this functionality is only enabled if the RSA_FLAG_SIGN_VER |
| 132 * option is set in 'flags'. | 113 * option is set in 'flags'. |
| 133 */ | 114 */ |
| 134 int (*rsa_sign)(int type, | 115 int (*rsa_sign)(int type, |
| 135 const unsigned char *m, unsigned int m_length, | 116 const unsigned char *m, unsigned int m_length, |
| 136 unsigned char *sigret, unsigned int *siglen, const RSA *rsa); | 117 unsigned char *sigret, unsigned int *siglen, const RSA *rsa); |
| 137 int (*rsa_verify)(int dtype, | 118 int (*rsa_verify)(int dtype, |
| 138 const unsigned char *m, unsigned int m_length, | 119 const unsigned char *m, unsigned int m_length, |
| 139 » » unsigned char *sigbuf, unsigned int siglen, const RSA *rsa); | 120 » » const unsigned char *sigbuf, unsigned int siglen, |
| 121 » » » » » » » » const RSA *rsa); |
| 140 /* If this callback is NULL, the builtin software RSA key-gen will be used. This | 122 /* If this callback is NULL, the builtin software RSA key-gen will be used. This |
| 141 * is for behavioural compatibility whilst the code gets rewired, but one day | 123 * is for behavioural compatibility whilst the code gets rewired, but one day |
| 142 * it would be nice to assume there are no such things as "builtin software" | 124 * it would be nice to assume there are no such things as "builtin software" |
| 143 * implementations. */ | 125 * implementations. */ |
| 144 int (*rsa_keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); | 126 int (*rsa_keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); |
| 145 }; | 127 }; |
| 146 | 128 |
| 147 struct rsa_st | 129 struct rsa_st |
| 148 { | 130 { |
| 149 /* The first parameter is used to pickup errors where | 131 /* The first parameter is used to pickup errors where |
| (...skipping 25 matching lines...) Expand all Loading... |
| 175 * NULL */ | 157 * NULL */ |
| 176 char *bignum_data; | 158 char *bignum_data; |
| 177 BN_BLINDING *blinding; | 159 BN_BLINDING *blinding; |
| 178 BN_BLINDING *mt_blinding; | 160 BN_BLINDING *mt_blinding; |
| 179 }; | 161 }; |
| 180 | 162 |
| 181 #ifndef OPENSSL_RSA_MAX_MODULUS_BITS | 163 #ifndef OPENSSL_RSA_MAX_MODULUS_BITS |
| 182 # define OPENSSL_RSA_MAX_MODULUS_BITS 16384 | 164 # define OPENSSL_RSA_MAX_MODULUS_BITS 16384 |
| 183 #endif | 165 #endif |
| 184 | 166 |
| 185 #define OPENSSL_RSA_FIPS_MIN_MODULUS_BITS 1024 | |
| 186 | |
| 187 #ifndef OPENSSL_RSA_SMALL_MODULUS_BITS | 167 #ifndef OPENSSL_RSA_SMALL_MODULUS_BITS |
| 188 # define OPENSSL_RSA_SMALL_MODULUS_BITS 3072 | 168 # define OPENSSL_RSA_SMALL_MODULUS_BITS 3072 |
| 189 #endif | 169 #endif |
| 190 #ifndef OPENSSL_RSA_MAX_PUBEXP_BITS | 170 #ifndef OPENSSL_RSA_MAX_PUBEXP_BITS |
| 191 # define OPENSSL_RSA_MAX_PUBEXP_BITS 64 /* exponent limit enforced for "large
" modulus only */ | 171 # define OPENSSL_RSA_MAX_PUBEXP_BITS 64 /* exponent limit enforced for "large
" modulus only */ |
| 192 #endif | 172 #endif |
| 193 | 173 |
| 194 #define RSA_3 0x3L | 174 #define RSA_3 0x3L |
| 195 #define RSA_F4 0x10001L | 175 #define RSA_F4 0x10001L |
| 196 | 176 |
| (...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 231 /* new with 0.9.7h; the built-in
RSA | 211 /* new with 0.9.7h; the built-in
RSA |
| 232 * implementation now uses consta
nt time | 212 * implementation now uses consta
nt time |
| 233 * modular exponentiation for sec
ret exponents | 213 * modular exponentiation for sec
ret exponents |
| 234 * by default. This flag causes t
he | 214 * by default. This flag causes t
he |
| 235 * faster variable sliding window
method to | 215 * faster variable sliding window
method to |
| 236 * be used for all exponents. | 216 * be used for all exponents. |
| 237 */ | 217 */ |
| 238 #endif | 218 #endif |
| 239 | 219 |
| 240 | 220 |
| 221 #define EVP_PKEY_CTX_set_rsa_padding(ctx, pad) \ |
| 222 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, -1, EVP_PKEY_CTRL_RSA_PADDING, \ |
| 223 pad, NULL) |
| 224 |
| 225 #define EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx, len) \ |
| 226 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, \ |
| 227 (EVP_PKEY_OP_SIGN|EVP_PKEY_OP_VERIFY), \ |
| 228 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, \ |
| 229 len, NULL) |
| 230 |
| 231 #define EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, bits) \ |
| 232 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_KEYGEN, \ |
| 233 EVP_PKEY_CTRL_RSA_KEYGEN_BITS, bits, NULL) |
| 234 |
| 235 #define EVP_PKEY_CTX_set_rsa_keygen_pubexp(ctx, pubexp) \ |
| 236 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_KEYGEN, \ |
| 237 EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP, 0, pubexp) |
| 238 |
| 239 #define EVP_PKEY_CTRL_RSA_PADDING (EVP_PKEY_ALG_CTRL + 1) |
| 240 #define EVP_PKEY_CTRL_RSA_PSS_SALTLEN (EVP_PKEY_ALG_CTRL + 2) |
| 241 |
| 242 #define EVP_PKEY_CTRL_RSA_KEYGEN_BITS (EVP_PKEY_ALG_CTRL + 3) |
| 243 #define EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP (EVP_PKEY_ALG_CTRL + 4) |
| 244 |
| 241 #define RSA_PKCS1_PADDING 1 | 245 #define RSA_PKCS1_PADDING 1 |
| 242 #define RSA_SSLV23_PADDING 2 | 246 #define RSA_SSLV23_PADDING 2 |
| 243 #define RSA_NO_PADDING 3 | 247 #define RSA_NO_PADDING 3 |
| 244 #define RSA_PKCS1_OAEP_PADDING 4 | 248 #define RSA_PKCS1_OAEP_PADDING 4 |
| 245 #define RSA_X931_PADDING 5 | 249 #define RSA_X931_PADDING 5 |
| 250 /* EVP_PKEY_ only */ |
| 251 #define RSA_PKCS1_PSS_PADDING 6 |
| 246 | 252 |
| 247 #define RSA_PKCS1_PADDING_SIZE 11 | 253 #define RSA_PKCS1_PADDING_SIZE 11 |
| 248 | 254 |
| 249 #define RSA_set_app_data(s,arg) RSA_set_ex_data(s,0,arg) | 255 #define RSA_set_app_data(s,arg) RSA_set_ex_data(s,0,arg) |
| 250 #define RSA_get_app_data(s) RSA_get_ex_data(s,0) | 256 #define RSA_get_app_data(s) RSA_get_ex_data(s,0) |
| 251 | 257 |
| 252 RSA * RSA_new(void); | 258 RSA * RSA_new(void); |
| 253 RSA * RSA_new_method(ENGINE *engine); | 259 RSA * RSA_new_method(ENGINE *engine); |
| 254 int RSA_size(const RSA *); | 260 int RSA_size(const RSA *); |
| 255 | 261 |
| 256 /* Deprecated version */ | 262 /* Deprecated version */ |
| 257 #ifndef OPENSSL_NO_DEPRECATED | 263 #ifndef OPENSSL_NO_DEPRECATED |
| 258 RSA * RSA_generate_key(int bits, unsigned long e,void | 264 RSA * RSA_generate_key(int bits, unsigned long e,void |
| 259 (*callback)(int,int,void *),void *cb_arg); | 265 (*callback)(int,int,void *),void *cb_arg); |
| 260 #endif /* !defined(OPENSSL_NO_DEPRECATED) */ | 266 #endif /* !defined(OPENSSL_NO_DEPRECATED) */ |
| 261 | 267 |
| 262 /* New version */ | 268 /* New version */ |
| 263 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); | 269 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); |
| 264 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, BIGNUM *q2, | |
| 265 const BIGNUM *Xp1, const BIGNUM *Xp2, const BIGNUM *Xp, | |
| 266 const BIGNUM *Xq1, const BIGNUM *Xq2, const BIGNUM *Xq, | |
| 267 const BIGNUM *e, BN_GENCB *cb); | |
| 268 int RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e, BN_GENCB *cb); | |
| 269 | 270 |
| 270 int RSA_check_key(const RSA *); | 271 int RSA_check_key(const RSA *); |
| 271 /* next 4 return -1 on error */ | 272 /* next 4 return -1 on error */ |
| 272 int RSA_public_encrypt(int flen, const unsigned char *from, | 273 int RSA_public_encrypt(int flen, const unsigned char *from, |
| 273 unsigned char *to, RSA *rsa,int padding); | 274 unsigned char *to, RSA *rsa,int padding); |
| 274 int RSA_private_encrypt(int flen, const unsigned char *from, | 275 int RSA_private_encrypt(int flen, const unsigned char *from, |
| 275 unsigned char *to, RSA *rsa,int padding); | 276 unsigned char *to, RSA *rsa,int padding); |
| 276 int RSA_public_decrypt(int flen, const unsigned char *from, | 277 int RSA_public_decrypt(int flen, const unsigned char *from, |
| 277 unsigned char *to, RSA *rsa,int padding); | 278 unsigned char *to, RSA *rsa,int padding); |
| 278 int RSA_private_decrypt(int flen, const unsigned char *from, | 279 int RSA_private_decrypt(int flen, const unsigned char *from, |
| 279 unsigned char *to, RSA *rsa,int padding); | 280 unsigned char *to, RSA *rsa,int padding); |
| 280 void RSA_free (RSA *r); | 281 void RSA_free (RSA *r); |
| 281 /* "up" the RSA object's reference count */ | 282 /* "up" the RSA object's reference count */ |
| 282 int RSA_up_ref(RSA *r); | 283 int RSA_up_ref(RSA *r); |
| 283 | 284 |
| 284 int RSA_flags(const RSA *r); | 285 int RSA_flags(const RSA *r); |
| 285 | 286 |
| 286 #ifdef OPENSSL_FIPS | |
| 287 RSA *FIPS_rsa_new(void); | |
| 288 void FIPS_rsa_free(RSA *r); | |
| 289 #endif | |
| 290 | |
| 291 void RSA_set_default_method(const RSA_METHOD *meth); | 287 void RSA_set_default_method(const RSA_METHOD *meth); |
| 292 const RSA_METHOD *RSA_get_default_method(void); | 288 const RSA_METHOD *RSA_get_default_method(void); |
| 293 const RSA_METHOD *RSA_get_method(const RSA *rsa); | 289 const RSA_METHOD *RSA_get_method(const RSA *rsa); |
| 294 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); | 290 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); |
| 295 | 291 |
| 296 /* This function needs the memory locking malloc callbacks to be installed */ | 292 /* This function needs the memory locking malloc callbacks to be installed */ |
| 297 int RSA_memory_lock(RSA *r); | 293 int RSA_memory_lock(RSA *r); |
| 298 | 294 |
| 299 /* these are the actual SSLeay RSA functions */ | 295 /* these are the actual SSLeay RSA functions */ |
| 300 const RSA_METHOD *RSA_PKCS1_SSLeay(void); | 296 const RSA_METHOD *RSA_PKCS1_SSLeay(void); |
| (...skipping 25 matching lines...) Expand all Loading... |
| 326 RSA *d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length, | 322 RSA *d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length, |
| 327 int (*cb)(char *buf, int len, const char *prompt, | 323 int (*cb)(char *buf, int len, const char *prompt, |
| 328 int verify)); | 324 int verify)); |
| 329 #endif | 325 #endif |
| 330 | 326 |
| 331 /* The following 2 functions sign and verify a X509_SIG ASN1 object | 327 /* The following 2 functions sign and verify a X509_SIG ASN1 object |
| 332 * inside PKCS#1 padded RSA encryption */ | 328 * inside PKCS#1 padded RSA encryption */ |
| 333 int RSA_sign(int type, const unsigned char *m, unsigned int m_length, | 329 int RSA_sign(int type, const unsigned char *m, unsigned int m_length, |
| 334 unsigned char *sigret, unsigned int *siglen, RSA *rsa); | 330 unsigned char *sigret, unsigned int *siglen, RSA *rsa); |
| 335 int RSA_verify(int type, const unsigned char *m, unsigned int m_length, | 331 int RSA_verify(int type, const unsigned char *m, unsigned int m_length, |
| 336 » unsigned char *sigbuf, unsigned int siglen, RSA *rsa); | 332 » const unsigned char *sigbuf, unsigned int siglen, RSA *rsa); |
| 337 | 333 |
| 338 /* The following 2 function sign and verify a ASN1_OCTET_STRING | 334 /* The following 2 function sign and verify a ASN1_OCTET_STRING |
| 339 * object inside PKCS#1 padded RSA encryption */ | 335 * object inside PKCS#1 padded RSA encryption */ |
| 340 int RSA_sign_ASN1_OCTET_STRING(int type, | 336 int RSA_sign_ASN1_OCTET_STRING(int type, |
| 341 const unsigned char *m, unsigned int m_length, | 337 const unsigned char *m, unsigned int m_length, |
| 342 unsigned char *sigret, unsigned int *siglen, RSA *rsa); | 338 unsigned char *sigret, unsigned int *siglen, RSA *rsa); |
| 343 int RSA_verify_ASN1_OCTET_STRING(int type, | 339 int RSA_verify_ASN1_OCTET_STRING(int type, |
| 344 const unsigned char *m, unsigned int m_length, | 340 const unsigned char *m, unsigned int m_length, |
| 345 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); | 341 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); |
| 346 | 342 |
| (...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 394 | 390 |
| 395 /* BEGIN ERROR CODES */ | 391 /* BEGIN ERROR CODES */ |
| 396 /* The following lines are auto generated by the script mkerr.pl. Any changes | 392 /* The following lines are auto generated by the script mkerr.pl. Any changes |
| 397 * made after this point may be overwritten when the script is next run. | 393 * made after this point may be overwritten when the script is next run. |
| 398 */ | 394 */ |
| 399 void ERR_load_RSA_strings(void); | 395 void ERR_load_RSA_strings(void); |
| 400 | 396 |
| 401 /* Error codes for the RSA functions. */ | 397 /* Error codes for the RSA functions. */ |
| 402 | 398 |
| 403 /* Function codes. */ | 399 /* Function codes. */ |
| 404 #define RSA_F_FIPS_RSA_SIGN» » » » 140 | 400 #define RSA_F_CHECK_PADDING_MD» » » » 140 |
| 405 #define RSA_F_FIPS_RSA_VERIFY» » » » 141 | 401 #define RSA_F_DO_RSA_PRINT» » » » 146 |
| 402 #define RSA_F_INT_RSA_VERIFY» » » » 145 |
| 406 #define RSA_F_MEMORY_LOCK 100 | 403 #define RSA_F_MEMORY_LOCK 100 |
| 404 #define RSA_F_OLD_RSA_PRIV_DECODE 147 |
| 405 #define RSA_F_PKEY_RSA_CTRL 143 |
| 406 #define RSA_F_PKEY_RSA_CTRL_STR 144 |
| 407 #define RSA_F_PKEY_RSA_SIGN 142 |
| 408 #define RSA_F_PKEY_RSA_VERIFYRECOVER 141 |
| 407 #define RSA_F_RSA_BUILTIN_KEYGEN 129 | 409 #define RSA_F_RSA_BUILTIN_KEYGEN 129 |
| 408 #define RSA_F_RSA_CHECK_KEY 123 | 410 #define RSA_F_RSA_CHECK_KEY 123 |
| 409 #define RSA_F_RSA_EAY_PRIVATE_DECRYPT 101 | 411 #define RSA_F_RSA_EAY_PRIVATE_DECRYPT 101 |
| 410 #define RSA_F_RSA_EAY_PRIVATE_ENCRYPT 102 | 412 #define RSA_F_RSA_EAY_PRIVATE_ENCRYPT 102 |
| 411 #define RSA_F_RSA_EAY_PUBLIC_DECRYPT 103 | 413 #define RSA_F_RSA_EAY_PUBLIC_DECRYPT 103 |
| 412 #define RSA_F_RSA_EAY_PUBLIC_ENCRYPT 104 | 414 #define RSA_F_RSA_EAY_PUBLIC_ENCRYPT 104 |
| 413 #define RSA_F_RSA_GENERATE_KEY 105 | 415 #define RSA_F_RSA_GENERATE_KEY 105 |
| 414 #define RSA_F_RSA_MEMORY_LOCK 130 | 416 #define RSA_F_RSA_MEMORY_LOCK 130 |
| 415 #define RSA_F_RSA_NEW_METHOD 106 | 417 #define RSA_F_RSA_NEW_METHOD 106 |
| 416 #define RSA_F_RSA_NULL 124 | 418 #define RSA_F_RSA_NULL 124 |
| (...skipping 10 matching lines...) Expand all Loading... |
| 427 #define RSA_F_RSA_PADDING_ADD_SSLV23 110 | 429 #define RSA_F_RSA_PADDING_ADD_SSLV23 110 |
| 428 #define RSA_F_RSA_PADDING_ADD_X931 127 | 430 #define RSA_F_RSA_PADDING_ADD_X931 127 |
| 429 #define RSA_F_RSA_PADDING_CHECK_NONE 111 | 431 #define RSA_F_RSA_PADDING_CHECK_NONE 111 |
| 430 #define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP 122 | 432 #define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP 122 |
| 431 #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1 112 | 433 #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1 112 |
| 432 #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2 113 | 434 #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2 113 |
| 433 #define RSA_F_RSA_PADDING_CHECK_SSLV23 114 | 435 #define RSA_F_RSA_PADDING_CHECK_SSLV23 114 |
| 434 #define RSA_F_RSA_PADDING_CHECK_X931 128 | 436 #define RSA_F_RSA_PADDING_CHECK_X931 128 |
| 435 #define RSA_F_RSA_PRINT 115 | 437 #define RSA_F_RSA_PRINT 115 |
| 436 #define RSA_F_RSA_PRINT_FP 116 | 438 #define RSA_F_RSA_PRINT_FP 116 |
| 437 #define RSA_F_RSA_PRIVATE_ENCRYPT» » » 137 | 439 #define RSA_F_RSA_PRIV_DECODE» » » » 137 |
| 438 #define RSA_F_RSA_PUBLIC_DECRYPT» » » 138 | 440 #define RSA_F_RSA_PRIV_ENCODE» » » » 138 |
| 441 #define RSA_F_RSA_PUB_DECODE» » » » 139 |
| 439 #define RSA_F_RSA_SETUP_BLINDING 136 | 442 #define RSA_F_RSA_SETUP_BLINDING 136 |
| 440 #define RSA_F_RSA_SET_DEFAULT_METHOD 139 | |
| 441 #define RSA_F_RSA_SET_METHOD 142 | |
| 442 #define RSA_F_RSA_SIGN 117 | 443 #define RSA_F_RSA_SIGN 117 |
| 443 #define RSA_F_RSA_SIGN_ASN1_OCTET_STRING 118 | 444 #define RSA_F_RSA_SIGN_ASN1_OCTET_STRING 118 |
| 444 #define RSA_F_RSA_VERIFY 119 | 445 #define RSA_F_RSA_VERIFY 119 |
| 445 #define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING 120 | 446 #define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING 120 |
| 446 #define RSA_F_RSA_VERIFY_PKCS1_PSS 126 | 447 #define RSA_F_RSA_VERIFY_PKCS1_PSS 126 |
| 447 | 448 |
| 448 /* Reason codes. */ | 449 /* Reason codes. */ |
| 449 #define RSA_R_ALGORITHM_MISMATCH 100 | 450 #define RSA_R_ALGORITHM_MISMATCH 100 |
| 450 #define RSA_R_BAD_E_VALUE 101 | 451 #define RSA_R_BAD_E_VALUE 101 |
| 451 #define RSA_R_BAD_FIXED_HEADER_DECRYPT 102 | 452 #define RSA_R_BAD_FIXED_HEADER_DECRYPT 102 |
| 452 #define RSA_R_BAD_PAD_BYTE_COUNT 103 | 453 #define RSA_R_BAD_PAD_BYTE_COUNT 103 |
| 453 #define RSA_R_BAD_SIGNATURE 104 | 454 #define RSA_R_BAD_SIGNATURE 104 |
| 454 #define RSA_R_BLOCK_TYPE_IS_NOT_01 106 | 455 #define RSA_R_BLOCK_TYPE_IS_NOT_01 106 |
| 455 #define RSA_R_BLOCK_TYPE_IS_NOT_02 107 | 456 #define RSA_R_BLOCK_TYPE_IS_NOT_02 107 |
| 456 #define RSA_R_DATA_GREATER_THAN_MOD_LEN 108 | 457 #define RSA_R_DATA_GREATER_THAN_MOD_LEN 108 |
| 457 #define RSA_R_DATA_TOO_LARGE 109 | 458 #define RSA_R_DATA_TOO_LARGE 109 |
| 458 #define RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 110 | 459 #define RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 110 |
| 459 #define RSA_R_DATA_TOO_LARGE_FOR_MODULUS 132 | 460 #define RSA_R_DATA_TOO_LARGE_FOR_MODULUS 132 |
| 460 #define RSA_R_DATA_TOO_SMALL 111 | 461 #define RSA_R_DATA_TOO_SMALL 111 |
| 461 #define RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE 122 | 462 #define RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE 122 |
| 462 #define RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY 112 | 463 #define RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY 112 |
| 463 #define RSA_R_DMP1_NOT_CONGRUENT_TO_D 124 | 464 #define RSA_R_DMP1_NOT_CONGRUENT_TO_D 124 |
| 464 #define RSA_R_DMQ1_NOT_CONGRUENT_TO_D 125 | 465 #define RSA_R_DMQ1_NOT_CONGRUENT_TO_D 125 |
| 465 #define RSA_R_D_E_NOT_CONGRUENT_TO_1 123 | 466 #define RSA_R_D_E_NOT_CONGRUENT_TO_1 123 |
| 466 #define RSA_R_FIRST_OCTET_INVALID 133 | 467 #define RSA_R_FIRST_OCTET_INVALID 133 |
| 468 #define RSA_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE 144 |
| 469 #define RSA_R_INVALID_DIGEST_LENGTH 143 |
| 467 #define RSA_R_INVALID_HEADER 137 | 470 #define RSA_R_INVALID_HEADER 137 |
| 471 #define RSA_R_INVALID_KEYBITS 145 |
| 468 #define RSA_R_INVALID_MESSAGE_LENGTH 131 | 472 #define RSA_R_INVALID_MESSAGE_LENGTH 131 |
| 469 #define RSA_R_INVALID_PADDING 138 | 473 #define RSA_R_INVALID_PADDING 138 |
| 474 #define RSA_R_INVALID_PADDING_MODE 141 |
| 475 #define RSA_R_INVALID_PSS_SALTLEN 146 |
| 470 #define RSA_R_INVALID_TRAILER 139 | 476 #define RSA_R_INVALID_TRAILER 139 |
| 477 #define RSA_R_INVALID_X931_DIGEST 142 |
| 471 #define RSA_R_IQMP_NOT_INVERSE_OF_Q 126 | 478 #define RSA_R_IQMP_NOT_INVERSE_OF_Q 126 |
| 472 #define RSA_R_KEY_SIZE_TOO_SMALL 120 | 479 #define RSA_R_KEY_SIZE_TOO_SMALL 120 |
| 473 #define RSA_R_LAST_OCTET_INVALID 134 | 480 #define RSA_R_LAST_OCTET_INVALID 134 |
| 474 #define RSA_R_MODULUS_TOO_LARGE 105 | 481 #define RSA_R_MODULUS_TOO_LARGE 105 |
| 475 #define RSA_R_NON_FIPS_METHOD 141 | |
| 476 #define RSA_R_NO_PUBLIC_EXPONENT 140 | 482 #define RSA_R_NO_PUBLIC_EXPONENT 140 |
| 477 #define RSA_R_NULL_BEFORE_BLOCK_MISSING 113 | 483 #define RSA_R_NULL_BEFORE_BLOCK_MISSING 113 |
| 478 #define RSA_R_N_DOES_NOT_EQUAL_P_Q 127 | 484 #define RSA_R_N_DOES_NOT_EQUAL_P_Q 127 |
| 479 #define RSA_R_OAEP_DECODING_ERROR 121 | 485 #define RSA_R_OAEP_DECODING_ERROR 121 |
| 480 #define RSA_R_OPERATION_NOT_ALLOWED_IN_FIPS_MODE» 142 | 486 #define RSA_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE» 148 |
| 481 #define RSA_R_PADDING_CHECK_FAILED 114 | 487 #define RSA_R_PADDING_CHECK_FAILED 114 |
| 482 #define RSA_R_P_NOT_PRIME 128 | 488 #define RSA_R_P_NOT_PRIME 128 |
| 483 #define RSA_R_Q_NOT_PRIME 129 | 489 #define RSA_R_Q_NOT_PRIME 129 |
| 484 #define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED 130 | 490 #define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED 130 |
| 485 #define RSA_R_SLEN_CHECK_FAILED 136 | 491 #define RSA_R_SLEN_CHECK_FAILED 136 |
| 486 #define RSA_R_SLEN_RECOVERY_FAILED 135 | 492 #define RSA_R_SLEN_RECOVERY_FAILED 135 |
| 487 #define RSA_R_SSLV3_ROLLBACK_ATTACK 115 | 493 #define RSA_R_SSLV3_ROLLBACK_ATTACK 115 |
| 488 #define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116 | 494 #define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116 |
| 489 #define RSA_R_UNKNOWN_ALGORITHM_TYPE 117 | 495 #define RSA_R_UNKNOWN_ALGORITHM_TYPE 117 |
| 490 #define RSA_R_UNKNOWN_PADDING_TYPE 118 | 496 #define RSA_R_UNKNOWN_PADDING_TYPE 118 |
| 497 #define RSA_R_VALUE_MISSING 147 |
| 491 #define RSA_R_WRONG_SIGNATURE_LENGTH 119 | 498 #define RSA_R_WRONG_SIGNATURE_LENGTH 119 |
| 492 | 499 |
| 493 #ifdef __cplusplus | 500 #ifdef __cplusplus |
| 494 } | 501 } |
| 495 #endif | 502 #endif |
| 496 #endif | 503 #endif |
| OLD | NEW |