OLD | NEW |
1 /* crypto/rsa/rsa.h */ | 1 /* crypto/rsa/rsa.h */ |
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 * All rights reserved. | 3 * All rights reserved. |
4 * | 4 * |
5 * This package is an SSL implementation written | 5 * This package is an SSL implementation written |
6 * by Eric Young (eay@cryptsoft.com). | 6 * by Eric Young (eay@cryptsoft.com). |
7 * The implementation was written so as to conform with Netscapes SSL. | 7 * The implementation was written so as to conform with Netscapes SSL. |
8 * | 8 * |
9 * This library is free for commercial and non-commercial use as long as | 9 * This library is free for commercial and non-commercial use as long as |
10 * the following conditions are aheared to. The following conditions | 10 * the following conditions are aheared to. The following conditions |
(...skipping 56 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
67 #include <openssl/crypto.h> | 67 #include <openssl/crypto.h> |
68 #include <openssl/ossl_typ.h> | 68 #include <openssl/ossl_typ.h> |
69 #ifndef OPENSSL_NO_DEPRECATED | 69 #ifndef OPENSSL_NO_DEPRECATED |
70 #include <openssl/bn.h> | 70 #include <openssl/bn.h> |
71 #endif | 71 #endif |
72 | 72 |
73 #ifdef OPENSSL_NO_RSA | 73 #ifdef OPENSSL_NO_RSA |
74 #error RSA is disabled. | 74 #error RSA is disabled. |
75 #endif | 75 #endif |
76 | 76 |
77 /* If this flag is set the RSA method is FIPS compliant and can be used | |
78 * in FIPS mode. This is set in the validated module method. If an | |
79 * application sets this flag in its own methods it is its reposibility | |
80 * to ensure the result is compliant. | |
81 */ | |
82 | |
83 #define RSA_FLAG_FIPS_METHOD 0x0400 | |
84 | |
85 /* If this flag is set the operations normally disabled in FIPS mode are | |
86 * permitted it is then the applications responsibility to ensure that the | |
87 * usage is compliant. | |
88 */ | |
89 | |
90 #define RSA_FLAG_NON_FIPS_ALLOW 0x0400 | |
91 | |
92 #ifdef OPENSSL_FIPS | |
93 #define FIPS_RSA_SIZE_T int | |
94 #endif | |
95 | |
96 #ifdef __cplusplus | 77 #ifdef __cplusplus |
97 extern "C" { | 78 extern "C" { |
98 #endif | 79 #endif |
99 | 80 |
100 /* Declared already in ossl_typ.h */ | 81 /* Declared already in ossl_typ.h */ |
101 /* typedef struct rsa_st RSA; */ | 82 /* typedef struct rsa_st RSA; */ |
102 /* typedef struct rsa_meth_st RSA_METHOD; */ | 83 /* typedef struct rsa_meth_st RSA_METHOD; */ |
103 | 84 |
104 struct rsa_meth_st | 85 struct rsa_meth_st |
105 { | 86 { |
(...skipping 23 matching lines...) Expand all Loading... |
129 * the RSA_public_decrypt() and RSA_private_encrypt() should *NOT* be used | 110 * the RSA_public_decrypt() and RSA_private_encrypt() should *NOT* be used |
130 * RSA_sign(), RSA_verify() should be used instead. Note: for backwards | 111 * RSA_sign(), RSA_verify() should be used instead. Note: for backwards |
131 * compatibility this functionality is only enabled if the RSA_FLAG_SIGN_VER | 112 * compatibility this functionality is only enabled if the RSA_FLAG_SIGN_VER |
132 * option is set in 'flags'. | 113 * option is set in 'flags'. |
133 */ | 114 */ |
134 int (*rsa_sign)(int type, | 115 int (*rsa_sign)(int type, |
135 const unsigned char *m, unsigned int m_length, | 116 const unsigned char *m, unsigned int m_length, |
136 unsigned char *sigret, unsigned int *siglen, const RSA *rsa); | 117 unsigned char *sigret, unsigned int *siglen, const RSA *rsa); |
137 int (*rsa_verify)(int dtype, | 118 int (*rsa_verify)(int dtype, |
138 const unsigned char *m, unsigned int m_length, | 119 const unsigned char *m, unsigned int m_length, |
139 » » unsigned char *sigbuf, unsigned int siglen, const RSA *rsa); | 120 » » const unsigned char *sigbuf, unsigned int siglen, |
| 121 » » » » » » » » const RSA *rsa); |
140 /* If this callback is NULL, the builtin software RSA key-gen will be used. This | 122 /* If this callback is NULL, the builtin software RSA key-gen will be used. This |
141 * is for behavioural compatibility whilst the code gets rewired, but one day | 123 * is for behavioural compatibility whilst the code gets rewired, but one day |
142 * it would be nice to assume there are no such things as "builtin software" | 124 * it would be nice to assume there are no such things as "builtin software" |
143 * implementations. */ | 125 * implementations. */ |
144 int (*rsa_keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); | 126 int (*rsa_keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); |
145 }; | 127 }; |
146 | 128 |
147 struct rsa_st | 129 struct rsa_st |
148 { | 130 { |
149 /* The first parameter is used to pickup errors where | 131 /* The first parameter is used to pickup errors where |
(...skipping 25 matching lines...) Expand all Loading... |
175 * NULL */ | 157 * NULL */ |
176 char *bignum_data; | 158 char *bignum_data; |
177 BN_BLINDING *blinding; | 159 BN_BLINDING *blinding; |
178 BN_BLINDING *mt_blinding; | 160 BN_BLINDING *mt_blinding; |
179 }; | 161 }; |
180 | 162 |
181 #ifndef OPENSSL_RSA_MAX_MODULUS_BITS | 163 #ifndef OPENSSL_RSA_MAX_MODULUS_BITS |
182 # define OPENSSL_RSA_MAX_MODULUS_BITS 16384 | 164 # define OPENSSL_RSA_MAX_MODULUS_BITS 16384 |
183 #endif | 165 #endif |
184 | 166 |
185 #define OPENSSL_RSA_FIPS_MIN_MODULUS_BITS 1024 | |
186 | |
187 #ifndef OPENSSL_RSA_SMALL_MODULUS_BITS | 167 #ifndef OPENSSL_RSA_SMALL_MODULUS_BITS |
188 # define OPENSSL_RSA_SMALL_MODULUS_BITS 3072 | 168 # define OPENSSL_RSA_SMALL_MODULUS_BITS 3072 |
189 #endif | 169 #endif |
190 #ifndef OPENSSL_RSA_MAX_PUBEXP_BITS | 170 #ifndef OPENSSL_RSA_MAX_PUBEXP_BITS |
191 # define OPENSSL_RSA_MAX_PUBEXP_BITS 64 /* exponent limit enforced for "large
" modulus only */ | 171 # define OPENSSL_RSA_MAX_PUBEXP_BITS 64 /* exponent limit enforced for "large
" modulus only */ |
192 #endif | 172 #endif |
193 | 173 |
194 #define RSA_3 0x3L | 174 #define RSA_3 0x3L |
195 #define RSA_F4 0x10001L | 175 #define RSA_F4 0x10001L |
196 | 176 |
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
231 /* new with 0.9.7h; the built-in
RSA | 211 /* new with 0.9.7h; the built-in
RSA |
232 * implementation now uses consta
nt time | 212 * implementation now uses consta
nt time |
233 * modular exponentiation for sec
ret exponents | 213 * modular exponentiation for sec
ret exponents |
234 * by default. This flag causes t
he | 214 * by default. This flag causes t
he |
235 * faster variable sliding window
method to | 215 * faster variable sliding window
method to |
236 * be used for all exponents. | 216 * be used for all exponents. |
237 */ | 217 */ |
238 #endif | 218 #endif |
239 | 219 |
240 | 220 |
| 221 #define EVP_PKEY_CTX_set_rsa_padding(ctx, pad) \ |
| 222 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, -1, EVP_PKEY_CTRL_RSA_PADDING, \ |
| 223 pad, NULL) |
| 224 |
| 225 #define EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx, len) \ |
| 226 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, \ |
| 227 (EVP_PKEY_OP_SIGN|EVP_PKEY_OP_VERIFY), \ |
| 228 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, \ |
| 229 len, NULL) |
| 230 |
| 231 #define EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, bits) \ |
| 232 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_KEYGEN, \ |
| 233 EVP_PKEY_CTRL_RSA_KEYGEN_BITS, bits, NULL) |
| 234 |
| 235 #define EVP_PKEY_CTX_set_rsa_keygen_pubexp(ctx, pubexp) \ |
| 236 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_KEYGEN, \ |
| 237 EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP, 0, pubexp) |
| 238 |
| 239 #define EVP_PKEY_CTRL_RSA_PADDING (EVP_PKEY_ALG_CTRL + 1) |
| 240 #define EVP_PKEY_CTRL_RSA_PSS_SALTLEN (EVP_PKEY_ALG_CTRL + 2) |
| 241 |
| 242 #define EVP_PKEY_CTRL_RSA_KEYGEN_BITS (EVP_PKEY_ALG_CTRL + 3) |
| 243 #define EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP (EVP_PKEY_ALG_CTRL + 4) |
| 244 |
241 #define RSA_PKCS1_PADDING 1 | 245 #define RSA_PKCS1_PADDING 1 |
242 #define RSA_SSLV23_PADDING 2 | 246 #define RSA_SSLV23_PADDING 2 |
243 #define RSA_NO_PADDING 3 | 247 #define RSA_NO_PADDING 3 |
244 #define RSA_PKCS1_OAEP_PADDING 4 | 248 #define RSA_PKCS1_OAEP_PADDING 4 |
245 #define RSA_X931_PADDING 5 | 249 #define RSA_X931_PADDING 5 |
| 250 /* EVP_PKEY_ only */ |
| 251 #define RSA_PKCS1_PSS_PADDING 6 |
246 | 252 |
247 #define RSA_PKCS1_PADDING_SIZE 11 | 253 #define RSA_PKCS1_PADDING_SIZE 11 |
248 | 254 |
249 #define RSA_set_app_data(s,arg) RSA_set_ex_data(s,0,arg) | 255 #define RSA_set_app_data(s,arg) RSA_set_ex_data(s,0,arg) |
250 #define RSA_get_app_data(s) RSA_get_ex_data(s,0) | 256 #define RSA_get_app_data(s) RSA_get_ex_data(s,0) |
251 | 257 |
252 RSA * RSA_new(void); | 258 RSA * RSA_new(void); |
253 RSA * RSA_new_method(ENGINE *engine); | 259 RSA * RSA_new_method(ENGINE *engine); |
254 int RSA_size(const RSA *); | 260 int RSA_size(const RSA *); |
255 | 261 |
256 /* Deprecated version */ | 262 /* Deprecated version */ |
257 #ifndef OPENSSL_NO_DEPRECATED | 263 #ifndef OPENSSL_NO_DEPRECATED |
258 RSA * RSA_generate_key(int bits, unsigned long e,void | 264 RSA * RSA_generate_key(int bits, unsigned long e,void |
259 (*callback)(int,int,void *),void *cb_arg); | 265 (*callback)(int,int,void *),void *cb_arg); |
260 #endif /* !defined(OPENSSL_NO_DEPRECATED) */ | 266 #endif /* !defined(OPENSSL_NO_DEPRECATED) */ |
261 | 267 |
262 /* New version */ | 268 /* New version */ |
263 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); | 269 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); |
264 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, BIGNUM *q2, | |
265 const BIGNUM *Xp1, const BIGNUM *Xp2, const BIGNUM *Xp, | |
266 const BIGNUM *Xq1, const BIGNUM *Xq2, const BIGNUM *Xq, | |
267 const BIGNUM *e, BN_GENCB *cb); | |
268 int RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e, BN_GENCB *cb); | |
269 | 270 |
270 int RSA_check_key(const RSA *); | 271 int RSA_check_key(const RSA *); |
271 /* next 4 return -1 on error */ | 272 /* next 4 return -1 on error */ |
272 int RSA_public_encrypt(int flen, const unsigned char *from, | 273 int RSA_public_encrypt(int flen, const unsigned char *from, |
273 unsigned char *to, RSA *rsa,int padding); | 274 unsigned char *to, RSA *rsa,int padding); |
274 int RSA_private_encrypt(int flen, const unsigned char *from, | 275 int RSA_private_encrypt(int flen, const unsigned char *from, |
275 unsigned char *to, RSA *rsa,int padding); | 276 unsigned char *to, RSA *rsa,int padding); |
276 int RSA_public_decrypt(int flen, const unsigned char *from, | 277 int RSA_public_decrypt(int flen, const unsigned char *from, |
277 unsigned char *to, RSA *rsa,int padding); | 278 unsigned char *to, RSA *rsa,int padding); |
278 int RSA_private_decrypt(int flen, const unsigned char *from, | 279 int RSA_private_decrypt(int flen, const unsigned char *from, |
279 unsigned char *to, RSA *rsa,int padding); | 280 unsigned char *to, RSA *rsa,int padding); |
280 void RSA_free (RSA *r); | 281 void RSA_free (RSA *r); |
281 /* "up" the RSA object's reference count */ | 282 /* "up" the RSA object's reference count */ |
282 int RSA_up_ref(RSA *r); | 283 int RSA_up_ref(RSA *r); |
283 | 284 |
284 int RSA_flags(const RSA *r); | 285 int RSA_flags(const RSA *r); |
285 | 286 |
286 #ifdef OPENSSL_FIPS | |
287 RSA *FIPS_rsa_new(void); | |
288 void FIPS_rsa_free(RSA *r); | |
289 #endif | |
290 | |
291 void RSA_set_default_method(const RSA_METHOD *meth); | 287 void RSA_set_default_method(const RSA_METHOD *meth); |
292 const RSA_METHOD *RSA_get_default_method(void); | 288 const RSA_METHOD *RSA_get_default_method(void); |
293 const RSA_METHOD *RSA_get_method(const RSA *rsa); | 289 const RSA_METHOD *RSA_get_method(const RSA *rsa); |
294 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); | 290 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); |
295 | 291 |
296 /* This function needs the memory locking malloc callbacks to be installed */ | 292 /* This function needs the memory locking malloc callbacks to be installed */ |
297 int RSA_memory_lock(RSA *r); | 293 int RSA_memory_lock(RSA *r); |
298 | 294 |
299 /* these are the actual SSLeay RSA functions */ | 295 /* these are the actual SSLeay RSA functions */ |
300 const RSA_METHOD *RSA_PKCS1_SSLeay(void); | 296 const RSA_METHOD *RSA_PKCS1_SSLeay(void); |
(...skipping 25 matching lines...) Expand all Loading... |
326 RSA *d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length, | 322 RSA *d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length, |
327 int (*cb)(char *buf, int len, const char *prompt, | 323 int (*cb)(char *buf, int len, const char *prompt, |
328 int verify)); | 324 int verify)); |
329 #endif | 325 #endif |
330 | 326 |
331 /* The following 2 functions sign and verify a X509_SIG ASN1 object | 327 /* The following 2 functions sign and verify a X509_SIG ASN1 object |
332 * inside PKCS#1 padded RSA encryption */ | 328 * inside PKCS#1 padded RSA encryption */ |
333 int RSA_sign(int type, const unsigned char *m, unsigned int m_length, | 329 int RSA_sign(int type, const unsigned char *m, unsigned int m_length, |
334 unsigned char *sigret, unsigned int *siglen, RSA *rsa); | 330 unsigned char *sigret, unsigned int *siglen, RSA *rsa); |
335 int RSA_verify(int type, const unsigned char *m, unsigned int m_length, | 331 int RSA_verify(int type, const unsigned char *m, unsigned int m_length, |
336 » unsigned char *sigbuf, unsigned int siglen, RSA *rsa); | 332 » const unsigned char *sigbuf, unsigned int siglen, RSA *rsa); |
337 | 333 |
338 /* The following 2 function sign and verify a ASN1_OCTET_STRING | 334 /* The following 2 function sign and verify a ASN1_OCTET_STRING |
339 * object inside PKCS#1 padded RSA encryption */ | 335 * object inside PKCS#1 padded RSA encryption */ |
340 int RSA_sign_ASN1_OCTET_STRING(int type, | 336 int RSA_sign_ASN1_OCTET_STRING(int type, |
341 const unsigned char *m, unsigned int m_length, | 337 const unsigned char *m, unsigned int m_length, |
342 unsigned char *sigret, unsigned int *siglen, RSA *rsa); | 338 unsigned char *sigret, unsigned int *siglen, RSA *rsa); |
343 int RSA_verify_ASN1_OCTET_STRING(int type, | 339 int RSA_verify_ASN1_OCTET_STRING(int type, |
344 const unsigned char *m, unsigned int m_length, | 340 const unsigned char *m, unsigned int m_length, |
345 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); | 341 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); |
346 | 342 |
(...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
394 | 390 |
395 /* BEGIN ERROR CODES */ | 391 /* BEGIN ERROR CODES */ |
396 /* The following lines are auto generated by the script mkerr.pl. Any changes | 392 /* The following lines are auto generated by the script mkerr.pl. Any changes |
397 * made after this point may be overwritten when the script is next run. | 393 * made after this point may be overwritten when the script is next run. |
398 */ | 394 */ |
399 void ERR_load_RSA_strings(void); | 395 void ERR_load_RSA_strings(void); |
400 | 396 |
401 /* Error codes for the RSA functions. */ | 397 /* Error codes for the RSA functions. */ |
402 | 398 |
403 /* Function codes. */ | 399 /* Function codes. */ |
404 #define RSA_F_FIPS_RSA_SIGN» » » » 140 | 400 #define RSA_F_CHECK_PADDING_MD» » » » 140 |
405 #define RSA_F_FIPS_RSA_VERIFY» » » » 141 | 401 #define RSA_F_DO_RSA_PRINT» » » » 146 |
| 402 #define RSA_F_INT_RSA_VERIFY» » » » 145 |
406 #define RSA_F_MEMORY_LOCK 100 | 403 #define RSA_F_MEMORY_LOCK 100 |
| 404 #define RSA_F_OLD_RSA_PRIV_DECODE 147 |
| 405 #define RSA_F_PKEY_RSA_CTRL 143 |
| 406 #define RSA_F_PKEY_RSA_CTRL_STR 144 |
| 407 #define RSA_F_PKEY_RSA_SIGN 142 |
| 408 #define RSA_F_PKEY_RSA_VERIFYRECOVER 141 |
407 #define RSA_F_RSA_BUILTIN_KEYGEN 129 | 409 #define RSA_F_RSA_BUILTIN_KEYGEN 129 |
408 #define RSA_F_RSA_CHECK_KEY 123 | 410 #define RSA_F_RSA_CHECK_KEY 123 |
409 #define RSA_F_RSA_EAY_PRIVATE_DECRYPT 101 | 411 #define RSA_F_RSA_EAY_PRIVATE_DECRYPT 101 |
410 #define RSA_F_RSA_EAY_PRIVATE_ENCRYPT 102 | 412 #define RSA_F_RSA_EAY_PRIVATE_ENCRYPT 102 |
411 #define RSA_F_RSA_EAY_PUBLIC_DECRYPT 103 | 413 #define RSA_F_RSA_EAY_PUBLIC_DECRYPT 103 |
412 #define RSA_F_RSA_EAY_PUBLIC_ENCRYPT 104 | 414 #define RSA_F_RSA_EAY_PUBLIC_ENCRYPT 104 |
413 #define RSA_F_RSA_GENERATE_KEY 105 | 415 #define RSA_F_RSA_GENERATE_KEY 105 |
414 #define RSA_F_RSA_MEMORY_LOCK 130 | 416 #define RSA_F_RSA_MEMORY_LOCK 130 |
415 #define RSA_F_RSA_NEW_METHOD 106 | 417 #define RSA_F_RSA_NEW_METHOD 106 |
416 #define RSA_F_RSA_NULL 124 | 418 #define RSA_F_RSA_NULL 124 |
(...skipping 10 matching lines...) Expand all Loading... |
427 #define RSA_F_RSA_PADDING_ADD_SSLV23 110 | 429 #define RSA_F_RSA_PADDING_ADD_SSLV23 110 |
428 #define RSA_F_RSA_PADDING_ADD_X931 127 | 430 #define RSA_F_RSA_PADDING_ADD_X931 127 |
429 #define RSA_F_RSA_PADDING_CHECK_NONE 111 | 431 #define RSA_F_RSA_PADDING_CHECK_NONE 111 |
430 #define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP 122 | 432 #define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP 122 |
431 #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1 112 | 433 #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1 112 |
432 #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2 113 | 434 #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2 113 |
433 #define RSA_F_RSA_PADDING_CHECK_SSLV23 114 | 435 #define RSA_F_RSA_PADDING_CHECK_SSLV23 114 |
434 #define RSA_F_RSA_PADDING_CHECK_X931 128 | 436 #define RSA_F_RSA_PADDING_CHECK_X931 128 |
435 #define RSA_F_RSA_PRINT 115 | 437 #define RSA_F_RSA_PRINT 115 |
436 #define RSA_F_RSA_PRINT_FP 116 | 438 #define RSA_F_RSA_PRINT_FP 116 |
437 #define RSA_F_RSA_PRIVATE_ENCRYPT» » » 137 | 439 #define RSA_F_RSA_PRIV_DECODE» » » » 137 |
438 #define RSA_F_RSA_PUBLIC_DECRYPT» » » 138 | 440 #define RSA_F_RSA_PRIV_ENCODE» » » » 138 |
| 441 #define RSA_F_RSA_PUB_DECODE» » » » 139 |
439 #define RSA_F_RSA_SETUP_BLINDING 136 | 442 #define RSA_F_RSA_SETUP_BLINDING 136 |
440 #define RSA_F_RSA_SET_DEFAULT_METHOD 139 | |
441 #define RSA_F_RSA_SET_METHOD 142 | |
442 #define RSA_F_RSA_SIGN 117 | 443 #define RSA_F_RSA_SIGN 117 |
443 #define RSA_F_RSA_SIGN_ASN1_OCTET_STRING 118 | 444 #define RSA_F_RSA_SIGN_ASN1_OCTET_STRING 118 |
444 #define RSA_F_RSA_VERIFY 119 | 445 #define RSA_F_RSA_VERIFY 119 |
445 #define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING 120 | 446 #define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING 120 |
446 #define RSA_F_RSA_VERIFY_PKCS1_PSS 126 | 447 #define RSA_F_RSA_VERIFY_PKCS1_PSS 126 |
447 | 448 |
448 /* Reason codes. */ | 449 /* Reason codes. */ |
449 #define RSA_R_ALGORITHM_MISMATCH 100 | 450 #define RSA_R_ALGORITHM_MISMATCH 100 |
450 #define RSA_R_BAD_E_VALUE 101 | 451 #define RSA_R_BAD_E_VALUE 101 |
451 #define RSA_R_BAD_FIXED_HEADER_DECRYPT 102 | 452 #define RSA_R_BAD_FIXED_HEADER_DECRYPT 102 |
452 #define RSA_R_BAD_PAD_BYTE_COUNT 103 | 453 #define RSA_R_BAD_PAD_BYTE_COUNT 103 |
453 #define RSA_R_BAD_SIGNATURE 104 | 454 #define RSA_R_BAD_SIGNATURE 104 |
454 #define RSA_R_BLOCK_TYPE_IS_NOT_01 106 | 455 #define RSA_R_BLOCK_TYPE_IS_NOT_01 106 |
455 #define RSA_R_BLOCK_TYPE_IS_NOT_02 107 | 456 #define RSA_R_BLOCK_TYPE_IS_NOT_02 107 |
456 #define RSA_R_DATA_GREATER_THAN_MOD_LEN 108 | 457 #define RSA_R_DATA_GREATER_THAN_MOD_LEN 108 |
457 #define RSA_R_DATA_TOO_LARGE 109 | 458 #define RSA_R_DATA_TOO_LARGE 109 |
458 #define RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 110 | 459 #define RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 110 |
459 #define RSA_R_DATA_TOO_LARGE_FOR_MODULUS 132 | 460 #define RSA_R_DATA_TOO_LARGE_FOR_MODULUS 132 |
460 #define RSA_R_DATA_TOO_SMALL 111 | 461 #define RSA_R_DATA_TOO_SMALL 111 |
461 #define RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE 122 | 462 #define RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE 122 |
462 #define RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY 112 | 463 #define RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY 112 |
463 #define RSA_R_DMP1_NOT_CONGRUENT_TO_D 124 | 464 #define RSA_R_DMP1_NOT_CONGRUENT_TO_D 124 |
464 #define RSA_R_DMQ1_NOT_CONGRUENT_TO_D 125 | 465 #define RSA_R_DMQ1_NOT_CONGRUENT_TO_D 125 |
465 #define RSA_R_D_E_NOT_CONGRUENT_TO_1 123 | 466 #define RSA_R_D_E_NOT_CONGRUENT_TO_1 123 |
466 #define RSA_R_FIRST_OCTET_INVALID 133 | 467 #define RSA_R_FIRST_OCTET_INVALID 133 |
| 468 #define RSA_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE 144 |
| 469 #define RSA_R_INVALID_DIGEST_LENGTH 143 |
467 #define RSA_R_INVALID_HEADER 137 | 470 #define RSA_R_INVALID_HEADER 137 |
| 471 #define RSA_R_INVALID_KEYBITS 145 |
468 #define RSA_R_INVALID_MESSAGE_LENGTH 131 | 472 #define RSA_R_INVALID_MESSAGE_LENGTH 131 |
469 #define RSA_R_INVALID_PADDING 138 | 473 #define RSA_R_INVALID_PADDING 138 |
| 474 #define RSA_R_INVALID_PADDING_MODE 141 |
| 475 #define RSA_R_INVALID_PSS_SALTLEN 146 |
470 #define RSA_R_INVALID_TRAILER 139 | 476 #define RSA_R_INVALID_TRAILER 139 |
| 477 #define RSA_R_INVALID_X931_DIGEST 142 |
471 #define RSA_R_IQMP_NOT_INVERSE_OF_Q 126 | 478 #define RSA_R_IQMP_NOT_INVERSE_OF_Q 126 |
472 #define RSA_R_KEY_SIZE_TOO_SMALL 120 | 479 #define RSA_R_KEY_SIZE_TOO_SMALL 120 |
473 #define RSA_R_LAST_OCTET_INVALID 134 | 480 #define RSA_R_LAST_OCTET_INVALID 134 |
474 #define RSA_R_MODULUS_TOO_LARGE 105 | 481 #define RSA_R_MODULUS_TOO_LARGE 105 |
475 #define RSA_R_NON_FIPS_METHOD 141 | |
476 #define RSA_R_NO_PUBLIC_EXPONENT 140 | 482 #define RSA_R_NO_PUBLIC_EXPONENT 140 |
477 #define RSA_R_NULL_BEFORE_BLOCK_MISSING 113 | 483 #define RSA_R_NULL_BEFORE_BLOCK_MISSING 113 |
478 #define RSA_R_N_DOES_NOT_EQUAL_P_Q 127 | 484 #define RSA_R_N_DOES_NOT_EQUAL_P_Q 127 |
479 #define RSA_R_OAEP_DECODING_ERROR 121 | 485 #define RSA_R_OAEP_DECODING_ERROR 121 |
480 #define RSA_R_OPERATION_NOT_ALLOWED_IN_FIPS_MODE» 142 | 486 #define RSA_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE» 148 |
481 #define RSA_R_PADDING_CHECK_FAILED 114 | 487 #define RSA_R_PADDING_CHECK_FAILED 114 |
482 #define RSA_R_P_NOT_PRIME 128 | 488 #define RSA_R_P_NOT_PRIME 128 |
483 #define RSA_R_Q_NOT_PRIME 129 | 489 #define RSA_R_Q_NOT_PRIME 129 |
484 #define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED 130 | 490 #define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED 130 |
485 #define RSA_R_SLEN_CHECK_FAILED 136 | 491 #define RSA_R_SLEN_CHECK_FAILED 136 |
486 #define RSA_R_SLEN_RECOVERY_FAILED 135 | 492 #define RSA_R_SLEN_RECOVERY_FAILED 135 |
487 #define RSA_R_SSLV3_ROLLBACK_ATTACK 115 | 493 #define RSA_R_SSLV3_ROLLBACK_ATTACK 115 |
488 #define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116 | 494 #define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116 |
489 #define RSA_R_UNKNOWN_ALGORITHM_TYPE 117 | 495 #define RSA_R_UNKNOWN_ALGORITHM_TYPE 117 |
490 #define RSA_R_UNKNOWN_PADDING_TYPE 118 | 496 #define RSA_R_UNKNOWN_PADDING_TYPE 118 |
| 497 #define RSA_R_VALUE_MISSING 147 |
491 #define RSA_R_WRONG_SIGNATURE_LENGTH 119 | 498 #define RSA_R_WRONG_SIGNATURE_LENGTH 119 |
492 | 499 |
493 #ifdef __cplusplus | 500 #ifdef __cplusplus |
494 } | 501 } |
495 #endif | 502 #endif |
496 #endif | 503 #endif |
OLD | NEW |