Mercurial > repos > rliterman > csp2
comparison CSP2/CSP2_env/env-d9b9114564458d9d-741b3de822f2aaca6c6caa4325c4afce/include/openssl/rsa.h @ 69:33d812a61356
planemo upload commit 2e9511a184a1ca667c7be0c6321a36dc4e3d116d
author | jpayne |
---|---|
date | Tue, 18 Mar 2025 17:55:14 -0400 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
67:0e9998148a16 | 69:33d812a61356 |
---|---|
1 /* | |
2 * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. | |
3 * | |
4 * Licensed under the OpenSSL license (the "License"). You may not use | |
5 * this file except in compliance with the License. You can obtain a copy | |
6 * in the file LICENSE in the source distribution or at | |
7 * https://www.openssl.org/source/license.html | |
8 */ | |
9 | |
10 #ifndef HEADER_RSA_H | |
11 # define HEADER_RSA_H | |
12 | |
13 # include <openssl/opensslconf.h> | |
14 | |
15 # ifndef OPENSSL_NO_RSA | |
16 # include <openssl/asn1.h> | |
17 # include <openssl/bio.h> | |
18 # include <openssl/crypto.h> | |
19 # include <openssl/ossl_typ.h> | |
20 # if OPENSSL_API_COMPAT < 0x10100000L | |
21 # include <openssl/bn.h> | |
22 # endif | |
23 # include <openssl/rsaerr.h> | |
24 # ifdef __cplusplus | |
25 extern "C" { | |
26 # endif | |
27 | |
28 /* The types RSA and RSA_METHOD are defined in ossl_typ.h */ | |
29 | |
30 # ifndef OPENSSL_RSA_MAX_MODULUS_BITS | |
31 # define OPENSSL_RSA_MAX_MODULUS_BITS 16384 | |
32 # endif | |
33 | |
34 # define OPENSSL_RSA_FIPS_MIN_MODULUS_BITS 1024 | |
35 | |
36 # ifndef OPENSSL_RSA_SMALL_MODULUS_BITS | |
37 # define OPENSSL_RSA_SMALL_MODULUS_BITS 3072 | |
38 # endif | |
39 # ifndef OPENSSL_RSA_MAX_PUBEXP_BITS | |
40 | |
41 /* exponent limit enforced for "large" modulus only */ | |
42 # define OPENSSL_RSA_MAX_PUBEXP_BITS 64 | |
43 # endif | |
44 | |
45 # define RSA_3 0x3L | |
46 # define RSA_F4 0x10001L | |
47 | |
48 /* based on RFC 8017 appendix A.1.2 */ | |
49 # define RSA_ASN1_VERSION_DEFAULT 0 | |
50 # define RSA_ASN1_VERSION_MULTI 1 | |
51 | |
52 # define RSA_DEFAULT_PRIME_NUM 2 | |
53 | |
54 # define RSA_METHOD_FLAG_NO_CHECK 0x0001/* don't check pub/private | |
55 * match */ | |
56 | |
57 # define RSA_FLAG_CACHE_PUBLIC 0x0002 | |
58 # define RSA_FLAG_CACHE_PRIVATE 0x0004 | |
59 # define RSA_FLAG_BLINDING 0x0008 | |
60 # define RSA_FLAG_THREAD_SAFE 0x0010 | |
61 /* | |
62 * This flag means the private key operations will be handled by rsa_mod_exp | |
63 * and that they do not depend on the private key components being present: | |
64 * for example a key stored in external hardware. Without this flag | |
65 * bn_mod_exp gets called when private key components are absent. | |
66 */ | |
67 # define RSA_FLAG_EXT_PKEY 0x0020 | |
68 | |
69 /* | |
70 * new with 0.9.6j and 0.9.7b; the built-in | |
71 * RSA implementation now uses blinding by | |
72 * default (ignoring RSA_FLAG_BLINDING), | |
73 * but other engines might not need it | |
74 */ | |
75 # define RSA_FLAG_NO_BLINDING 0x0080 | |
76 # if OPENSSL_API_COMPAT < 0x10100000L | |
77 /* | |
78 * Does nothing. Previously this switched off constant time behaviour. | |
79 */ | |
80 # define RSA_FLAG_NO_CONSTTIME 0x0000 | |
81 # endif | |
82 # if OPENSSL_API_COMPAT < 0x00908000L | |
83 /* deprecated name for the flag*/ | |
84 /* | |
85 * new with 0.9.7h; the built-in RSA | |
86 * implementation now uses constant time | |
87 * modular exponentiation for secret exponents | |
88 * by default. This flag causes the | |
89 * faster variable sliding window method to | |
90 * be used for all exponents. | |
91 */ | |
92 # define RSA_FLAG_NO_EXP_CONSTTIME RSA_FLAG_NO_CONSTTIME | |
93 # endif | |
94 | |
95 # define EVP_PKEY_CTX_set_rsa_padding(ctx, pad) \ | |
96 RSA_pkey_ctx_ctrl(ctx, -1, EVP_PKEY_CTRL_RSA_PADDING, pad, NULL) | |
97 | |
98 # define EVP_PKEY_CTX_get_rsa_padding(ctx, ppad) \ | |
99 RSA_pkey_ctx_ctrl(ctx, -1, EVP_PKEY_CTRL_GET_RSA_PADDING, 0, ppad) | |
100 | |
101 # define EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx, len) \ | |
102 RSA_pkey_ctx_ctrl(ctx, (EVP_PKEY_OP_SIGN|EVP_PKEY_OP_VERIFY), \ | |
103 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, len, NULL) | |
104 /* Salt length matches digest */ | |
105 # define RSA_PSS_SALTLEN_DIGEST -1 | |
106 /* Verify only: auto detect salt length */ | |
107 # define RSA_PSS_SALTLEN_AUTO -2 | |
108 /* Set salt length to maximum possible */ | |
109 # define RSA_PSS_SALTLEN_MAX -3 | |
110 /* Old compatible max salt length for sign only */ | |
111 # define RSA_PSS_SALTLEN_MAX_SIGN -2 | |
112 | |
113 # define EVP_PKEY_CTX_set_rsa_pss_keygen_saltlen(ctx, len) \ | |
114 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_KEYGEN, \ | |
115 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, len, NULL) | |
116 | |
117 # define EVP_PKEY_CTX_get_rsa_pss_saltlen(ctx, plen) \ | |
118 RSA_pkey_ctx_ctrl(ctx, (EVP_PKEY_OP_SIGN|EVP_PKEY_OP_VERIFY), \ | |
119 EVP_PKEY_CTRL_GET_RSA_PSS_SALTLEN, 0, plen) | |
120 | |
121 # define EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, bits) \ | |
122 RSA_pkey_ctx_ctrl(ctx, EVP_PKEY_OP_KEYGEN, \ | |
123 EVP_PKEY_CTRL_RSA_KEYGEN_BITS, bits, NULL) | |
124 | |
125 # define EVP_PKEY_CTX_set_rsa_keygen_pubexp(ctx, pubexp) \ | |
126 RSA_pkey_ctx_ctrl(ctx, EVP_PKEY_OP_KEYGEN, \ | |
127 EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP, 0, pubexp) | |
128 | |
129 # define EVP_PKEY_CTX_set_rsa_keygen_primes(ctx, primes) \ | |
130 RSA_pkey_ctx_ctrl(ctx, EVP_PKEY_OP_KEYGEN, \ | |
131 EVP_PKEY_CTRL_RSA_KEYGEN_PRIMES, primes, NULL) | |
132 | |
133 # define EVP_PKEY_CTX_set_rsa_mgf1_md(ctx, md) \ | |
134 RSA_pkey_ctx_ctrl(ctx, EVP_PKEY_OP_TYPE_SIG | EVP_PKEY_OP_TYPE_CRYPT, \ | |
135 EVP_PKEY_CTRL_RSA_MGF1_MD, 0, (void *)(md)) | |
136 | |
137 # define EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md(ctx, md) \ | |
138 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_KEYGEN, \ | |
139 EVP_PKEY_CTRL_RSA_MGF1_MD, 0, (void *)(md)) | |
140 | |
141 # define EVP_PKEY_CTX_set_rsa_oaep_md(ctx, md) \ | |
142 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_TYPE_CRYPT, \ | |
143 EVP_PKEY_CTRL_RSA_OAEP_MD, 0, (void *)(md)) | |
144 | |
145 # define EVP_PKEY_CTX_get_rsa_mgf1_md(ctx, pmd) \ | |
146 RSA_pkey_ctx_ctrl(ctx, EVP_PKEY_OP_TYPE_SIG | EVP_PKEY_OP_TYPE_CRYPT, \ | |
147 EVP_PKEY_CTRL_GET_RSA_MGF1_MD, 0, (void *)(pmd)) | |
148 | |
149 # define EVP_PKEY_CTX_get_rsa_oaep_md(ctx, pmd) \ | |
150 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_TYPE_CRYPT, \ | |
151 EVP_PKEY_CTRL_GET_RSA_OAEP_MD, 0, (void *)(pmd)) | |
152 | |
153 # define EVP_PKEY_CTX_set0_rsa_oaep_label(ctx, l, llen) \ | |
154 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_TYPE_CRYPT, \ | |
155 EVP_PKEY_CTRL_RSA_OAEP_LABEL, llen, (void *)(l)) | |
156 | |
157 # define EVP_PKEY_CTX_get0_rsa_oaep_label(ctx, l) \ | |
158 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_TYPE_CRYPT, \ | |
159 EVP_PKEY_CTRL_GET_RSA_OAEP_LABEL, 0, (void *)(l)) | |
160 | |
161 # define EVP_PKEY_CTX_set_rsa_pss_keygen_md(ctx, md) \ | |
162 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA_PSS, \ | |
163 EVP_PKEY_OP_KEYGEN, EVP_PKEY_CTRL_MD, \ | |
164 0, (void *)(md)) | |
165 | |
166 # define EVP_PKEY_CTRL_RSA_PADDING (EVP_PKEY_ALG_CTRL + 1) | |
167 # define EVP_PKEY_CTRL_RSA_PSS_SALTLEN (EVP_PKEY_ALG_CTRL + 2) | |
168 | |
169 # define EVP_PKEY_CTRL_RSA_KEYGEN_BITS (EVP_PKEY_ALG_CTRL + 3) | |
170 # define EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP (EVP_PKEY_ALG_CTRL + 4) | |
171 # define EVP_PKEY_CTRL_RSA_MGF1_MD (EVP_PKEY_ALG_CTRL + 5) | |
172 | |
173 # define EVP_PKEY_CTRL_GET_RSA_PADDING (EVP_PKEY_ALG_CTRL + 6) | |
174 # define EVP_PKEY_CTRL_GET_RSA_PSS_SALTLEN (EVP_PKEY_ALG_CTRL + 7) | |
175 # define EVP_PKEY_CTRL_GET_RSA_MGF1_MD (EVP_PKEY_ALG_CTRL + 8) | |
176 | |
177 # define EVP_PKEY_CTRL_RSA_OAEP_MD (EVP_PKEY_ALG_CTRL + 9) | |
178 # define EVP_PKEY_CTRL_RSA_OAEP_LABEL (EVP_PKEY_ALG_CTRL + 10) | |
179 | |
180 # define EVP_PKEY_CTRL_GET_RSA_OAEP_MD (EVP_PKEY_ALG_CTRL + 11) | |
181 # define EVP_PKEY_CTRL_GET_RSA_OAEP_LABEL (EVP_PKEY_ALG_CTRL + 12) | |
182 | |
183 # define EVP_PKEY_CTRL_RSA_KEYGEN_PRIMES (EVP_PKEY_ALG_CTRL + 13) | |
184 | |
185 # define RSA_PKCS1_PADDING 1 | |
186 # define RSA_SSLV23_PADDING 2 | |
187 # define RSA_NO_PADDING 3 | |
188 # define RSA_PKCS1_OAEP_PADDING 4 | |
189 # define RSA_X931_PADDING 5 | |
190 /* EVP_PKEY_ only */ | |
191 # define RSA_PKCS1_PSS_PADDING 6 | |
192 | |
193 # define RSA_PKCS1_PADDING_SIZE 11 | |
194 | |
195 # define RSA_set_app_data(s,arg) RSA_set_ex_data(s,0,arg) | |
196 # define RSA_get_app_data(s) RSA_get_ex_data(s,0) | |
197 | |
198 RSA *RSA_new(void); | |
199 RSA *RSA_new_method(ENGINE *engine); | |
200 int RSA_bits(const RSA *rsa); | |
201 int RSA_size(const RSA *rsa); | |
202 int RSA_security_bits(const RSA *rsa); | |
203 | |
204 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); | |
205 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); | |
206 int RSA_set0_crt_params(RSA *r,BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp); | |
207 int RSA_set0_multi_prime_params(RSA *r, BIGNUM *primes[], BIGNUM *exps[], | |
208 BIGNUM *coeffs[], int pnum); | |
209 void RSA_get0_key(const RSA *r, | |
210 const BIGNUM **n, const BIGNUM **e, const BIGNUM **d); | |
211 void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q); | |
212 int RSA_get_multi_prime_extra_count(const RSA *r); | |
213 int RSA_get0_multi_prime_factors(const RSA *r, const BIGNUM *primes[]); | |
214 void RSA_get0_crt_params(const RSA *r, | |
215 const BIGNUM **dmp1, const BIGNUM **dmq1, | |
216 const BIGNUM **iqmp); | |
217 int RSA_get0_multi_prime_crt_params(const RSA *r, const BIGNUM *exps[], | |
218 const BIGNUM *coeffs[]); | |
219 const BIGNUM *RSA_get0_n(const RSA *d); | |
220 const BIGNUM *RSA_get0_e(const RSA *d); | |
221 const BIGNUM *RSA_get0_d(const RSA *d); | |
222 const BIGNUM *RSA_get0_p(const RSA *d); | |
223 const BIGNUM *RSA_get0_q(const RSA *d); | |
224 const BIGNUM *RSA_get0_dmp1(const RSA *r); | |
225 const BIGNUM *RSA_get0_dmq1(const RSA *r); | |
226 const BIGNUM *RSA_get0_iqmp(const RSA *r); | |
227 const RSA_PSS_PARAMS *RSA_get0_pss_params(const RSA *r); | |
228 void RSA_clear_flags(RSA *r, int flags); | |
229 int RSA_test_flags(const RSA *r, int flags); | |
230 void RSA_set_flags(RSA *r, int flags); | |
231 int RSA_get_version(RSA *r); | |
232 ENGINE *RSA_get0_engine(const RSA *r); | |
233 | |
234 /* Deprecated version */ | |
235 DEPRECATEDIN_0_9_8(RSA *RSA_generate_key(int bits, unsigned long e, void | |
236 (*callback) (int, int, void *), | |
237 void *cb_arg)) | |
238 | |
239 /* New version */ | |
240 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); | |
241 /* Multi-prime version */ | |
242 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, | |
243 BIGNUM *e, BN_GENCB *cb); | |
244 | |
245 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, | |
246 BIGNUM *q2, const BIGNUM *Xp1, const BIGNUM *Xp2, | |
247 const BIGNUM *Xp, const BIGNUM *Xq1, const BIGNUM *Xq2, | |
248 const BIGNUM *Xq, const BIGNUM *e, BN_GENCB *cb); | |
249 int RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e, | |
250 BN_GENCB *cb); | |
251 | |
252 int RSA_check_key(const RSA *); | |
253 int RSA_check_key_ex(const RSA *, BN_GENCB *cb); | |
254 /* next 4 return -1 on error */ | |
255 int RSA_public_encrypt(int flen, const unsigned char *from, | |
256 unsigned char *to, RSA *rsa, int padding); | |
257 int RSA_private_encrypt(int flen, const unsigned char *from, | |
258 unsigned char *to, RSA *rsa, int padding); | |
259 int RSA_public_decrypt(int flen, const unsigned char *from, | |
260 unsigned char *to, RSA *rsa, int padding); | |
261 int RSA_private_decrypt(int flen, const unsigned char *from, | |
262 unsigned char *to, RSA *rsa, int padding); | |
263 void RSA_free(RSA *r); | |
264 /* "up" the RSA object's reference count */ | |
265 int RSA_up_ref(RSA *r); | |
266 | |
267 int RSA_flags(const RSA *r); | |
268 | |
269 void RSA_set_default_method(const RSA_METHOD *meth); | |
270 const RSA_METHOD *RSA_get_default_method(void); | |
271 const RSA_METHOD *RSA_null_method(void); | |
272 const RSA_METHOD *RSA_get_method(const RSA *rsa); | |
273 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); | |
274 | |
275 /* these are the actual RSA functions */ | |
276 const RSA_METHOD *RSA_PKCS1_OpenSSL(void); | |
277 | |
278 int RSA_pkey_ctx_ctrl(EVP_PKEY_CTX *ctx, int optype, int cmd, int p1, void *p2); | |
279 | |
280 DECLARE_ASN1_ENCODE_FUNCTIONS_const(RSA, RSAPublicKey) | |
281 DECLARE_ASN1_ENCODE_FUNCTIONS_const(RSA, RSAPrivateKey) | |
282 | |
283 struct rsa_pss_params_st { | |
284 X509_ALGOR *hashAlgorithm; | |
285 X509_ALGOR *maskGenAlgorithm; | |
286 ASN1_INTEGER *saltLength; | |
287 ASN1_INTEGER *trailerField; | |
288 /* Decoded hash algorithm from maskGenAlgorithm */ | |
289 X509_ALGOR *maskHash; | |
290 }; | |
291 | |
292 DECLARE_ASN1_FUNCTIONS(RSA_PSS_PARAMS) | |
293 | |
294 typedef struct rsa_oaep_params_st { | |
295 X509_ALGOR *hashFunc; | |
296 X509_ALGOR *maskGenFunc; | |
297 X509_ALGOR *pSourceFunc; | |
298 /* Decoded hash algorithm from maskGenFunc */ | |
299 X509_ALGOR *maskHash; | |
300 } RSA_OAEP_PARAMS; | |
301 | |
302 DECLARE_ASN1_FUNCTIONS(RSA_OAEP_PARAMS) | |
303 | |
304 # ifndef OPENSSL_NO_STDIO | |
305 int RSA_print_fp(FILE *fp, const RSA *r, int offset); | |
306 # endif | |
307 | |
308 int RSA_print(BIO *bp, const RSA *r, int offset); | |
309 | |
310 /* | |
311 * The following 2 functions sign and verify a X509_SIG ASN1 object inside | |
312 * PKCS#1 padded RSA encryption | |
313 */ | |
314 int RSA_sign(int type, const unsigned char *m, unsigned int m_length, | |
315 unsigned char *sigret, unsigned int *siglen, RSA *rsa); | |
316 int RSA_verify(int type, const unsigned char *m, unsigned int m_length, | |
317 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa); | |
318 | |
319 /* | |
320 * The following 2 function sign and verify a ASN1_OCTET_STRING object inside | |
321 * PKCS#1 padded RSA encryption | |
322 */ | |
323 int RSA_sign_ASN1_OCTET_STRING(int type, | |
324 const unsigned char *m, unsigned int m_length, | |
325 unsigned char *sigret, unsigned int *siglen, | |
326 RSA *rsa); | |
327 int RSA_verify_ASN1_OCTET_STRING(int type, const unsigned char *m, | |
328 unsigned int m_length, unsigned char *sigbuf, | |
329 unsigned int siglen, RSA *rsa); | |
330 | |
331 int RSA_blinding_on(RSA *rsa, BN_CTX *ctx); | |
332 void RSA_blinding_off(RSA *rsa); | |
333 BN_BLINDING *RSA_setup_blinding(RSA *rsa, BN_CTX *ctx); | |
334 | |
335 int RSA_padding_add_PKCS1_type_1(unsigned char *to, int tlen, | |
336 const unsigned char *f, int fl); | |
337 int RSA_padding_check_PKCS1_type_1(unsigned char *to, int tlen, | |
338 const unsigned char *f, int fl, | |
339 int rsa_len); | |
340 int RSA_padding_add_PKCS1_type_2(unsigned char *to, int tlen, | |
341 const unsigned char *f, int fl); | |
342 int RSA_padding_check_PKCS1_type_2(unsigned char *to, int tlen, | |
343 const unsigned char *f, int fl, | |
344 int rsa_len); | |
345 int PKCS1_MGF1(unsigned char *mask, long len, const unsigned char *seed, | |
346 long seedlen, const EVP_MD *dgst); | |
347 int RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, | |
348 const unsigned char *f, int fl, | |
349 const unsigned char *p, int pl); | |
350 int RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, | |
351 const unsigned char *f, int fl, int rsa_len, | |
352 const unsigned char *p, int pl); | |
353 int RSA_padding_add_PKCS1_OAEP_mgf1(unsigned char *to, int tlen, | |
354 const unsigned char *from, int flen, | |
355 const unsigned char *param, int plen, | |
356 const EVP_MD *md, const EVP_MD *mgf1md); | |
357 int RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen, | |
358 const unsigned char *from, int flen, | |
359 int num, const unsigned char *param, | |
360 int plen, const EVP_MD *md, | |
361 const EVP_MD *mgf1md); | |
362 int RSA_padding_add_SSLv23(unsigned char *to, int tlen, | |
363 const unsigned char *f, int fl); | |
364 int RSA_padding_check_SSLv23(unsigned char *to, int tlen, | |
365 const unsigned char *f, int fl, int rsa_len); | |
366 int RSA_padding_add_none(unsigned char *to, int tlen, const unsigned char *f, | |
367 int fl); | |
368 int RSA_padding_check_none(unsigned char *to, int tlen, | |
369 const unsigned char *f, int fl, int rsa_len); | |
370 int RSA_padding_add_X931(unsigned char *to, int tlen, const unsigned char *f, | |
371 int fl); | |
372 int RSA_padding_check_X931(unsigned char *to, int tlen, | |
373 const unsigned char *f, int fl, int rsa_len); | |
374 int RSA_X931_hash_id(int nid); | |
375 | |
376 int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash, | |
377 const EVP_MD *Hash, const unsigned char *EM, | |
378 int sLen); | |
379 int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM, | |
380 const unsigned char *mHash, const EVP_MD *Hash, | |
381 int sLen); | |
382 | |
383 int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, | |
384 const EVP_MD *Hash, const EVP_MD *mgf1Hash, | |
385 const unsigned char *EM, int sLen); | |
386 | |
387 int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM, | |
388 const unsigned char *mHash, | |
389 const EVP_MD *Hash, const EVP_MD *mgf1Hash, | |
390 int sLen); | |
391 | |
392 #define RSA_get_ex_new_index(l, p, newf, dupf, freef) \ | |
393 CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_RSA, l, p, newf, dupf, freef) | |
394 int RSA_set_ex_data(RSA *r, int idx, void *arg); | |
395 void *RSA_get_ex_data(const RSA *r, int idx); | |
396 | |
397 RSA *RSAPublicKey_dup(RSA *rsa); | |
398 RSA *RSAPrivateKey_dup(RSA *rsa); | |
399 | |
400 /* | |
401 * If this flag is set the RSA method is FIPS compliant and can be used in | |
402 * FIPS mode. This is set in the validated module method. If an application | |
403 * sets this flag in its own methods it is its responsibility to ensure the | |
404 * result is compliant. | |
405 */ | |
406 | |
407 # define RSA_FLAG_FIPS_METHOD 0x0400 | |
408 | |
409 /* | |
410 * If this flag is set the operations normally disabled in FIPS mode are | |
411 * permitted it is then the applications responsibility to ensure that the | |
412 * usage is compliant. | |
413 */ | |
414 | |
415 # define RSA_FLAG_NON_FIPS_ALLOW 0x0400 | |
416 /* | |
417 * Application has decided PRNG is good enough to generate a key: don't | |
418 * check. | |
419 */ | |
420 # define RSA_FLAG_CHECKED 0x0800 | |
421 | |
422 RSA_METHOD *RSA_meth_new(const char *name, int flags); | |
423 void RSA_meth_free(RSA_METHOD *meth); | |
424 RSA_METHOD *RSA_meth_dup(const RSA_METHOD *meth); | |
425 const char *RSA_meth_get0_name(const RSA_METHOD *meth); | |
426 int RSA_meth_set1_name(RSA_METHOD *meth, const char *name); | |
427 int RSA_meth_get_flags(const RSA_METHOD *meth); | |
428 int RSA_meth_set_flags(RSA_METHOD *meth, int flags); | |
429 void *RSA_meth_get0_app_data(const RSA_METHOD *meth); | |
430 int RSA_meth_set0_app_data(RSA_METHOD *meth, void *app_data); | |
431 int (*RSA_meth_get_pub_enc(const RSA_METHOD *meth)) | |
432 (int flen, const unsigned char *from, | |
433 unsigned char *to, RSA *rsa, int padding); | |
434 int RSA_meth_set_pub_enc(RSA_METHOD *rsa, | |
435 int (*pub_enc) (int flen, const unsigned char *from, | |
436 unsigned char *to, RSA *rsa, | |
437 int padding)); | |
438 int (*RSA_meth_get_pub_dec(const RSA_METHOD *meth)) | |
439 (int flen, const unsigned char *from, | |
440 unsigned char *to, RSA *rsa, int padding); | |
441 int RSA_meth_set_pub_dec(RSA_METHOD *rsa, | |
442 int (*pub_dec) (int flen, const unsigned char *from, | |
443 unsigned char *to, RSA *rsa, | |
444 int padding)); | |
445 int (*RSA_meth_get_priv_enc(const RSA_METHOD *meth)) | |
446 (int flen, const unsigned char *from, | |
447 unsigned char *to, RSA *rsa, int padding); | |
448 int RSA_meth_set_priv_enc(RSA_METHOD *rsa, | |
449 int (*priv_enc) (int flen, const unsigned char *from, | |
450 unsigned char *to, RSA *rsa, | |
451 int padding)); | |
452 int (*RSA_meth_get_priv_dec(const RSA_METHOD *meth)) | |
453 (int flen, const unsigned char *from, | |
454 unsigned char *to, RSA *rsa, int padding); | |
455 int RSA_meth_set_priv_dec(RSA_METHOD *rsa, | |
456 int (*priv_dec) (int flen, const unsigned char *from, | |
457 unsigned char *to, RSA *rsa, | |
458 int padding)); | |
459 int (*RSA_meth_get_mod_exp(const RSA_METHOD *meth)) | |
460 (BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx); | |
461 int RSA_meth_set_mod_exp(RSA_METHOD *rsa, | |
462 int (*mod_exp) (BIGNUM *r0, const BIGNUM *i, RSA *rsa, | |
463 BN_CTX *ctx)); | |
464 int (*RSA_meth_get_bn_mod_exp(const RSA_METHOD *meth)) | |
465 (BIGNUM *r, const BIGNUM *a, const BIGNUM *p, | |
466 const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); | |
467 int RSA_meth_set_bn_mod_exp(RSA_METHOD *rsa, | |
468 int (*bn_mod_exp) (BIGNUM *r, | |
469 const BIGNUM *a, | |
470 const BIGNUM *p, | |
471 const BIGNUM *m, | |
472 BN_CTX *ctx, | |
473 BN_MONT_CTX *m_ctx)); | |
474 int (*RSA_meth_get_init(const RSA_METHOD *meth)) (RSA *rsa); | |
475 int RSA_meth_set_init(RSA_METHOD *rsa, int (*init) (RSA *rsa)); | |
476 int (*RSA_meth_get_finish(const RSA_METHOD *meth)) (RSA *rsa); | |
477 int RSA_meth_set_finish(RSA_METHOD *rsa, int (*finish) (RSA *rsa)); | |
478 int (*RSA_meth_get_sign(const RSA_METHOD *meth)) | |
479 (int type, | |
480 const unsigned char *m, unsigned int m_length, | |
481 unsigned char *sigret, unsigned int *siglen, | |
482 const RSA *rsa); | |
483 int RSA_meth_set_sign(RSA_METHOD *rsa, | |
484 int (*sign) (int type, const unsigned char *m, | |
485 unsigned int m_length, | |
486 unsigned char *sigret, unsigned int *siglen, | |
487 const RSA *rsa)); | |
488 int (*RSA_meth_get_verify(const RSA_METHOD *meth)) | |
489 (int dtype, const unsigned char *m, | |
490 unsigned int m_length, const unsigned char *sigbuf, | |
491 unsigned int siglen, const RSA *rsa); | |
492 int RSA_meth_set_verify(RSA_METHOD *rsa, | |
493 int (*verify) (int dtype, const unsigned char *m, | |
494 unsigned int m_length, | |
495 const unsigned char *sigbuf, | |
496 unsigned int siglen, const RSA *rsa)); | |
497 int (*RSA_meth_get_keygen(const RSA_METHOD *meth)) | |
498 (RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); | |
499 int RSA_meth_set_keygen(RSA_METHOD *rsa, | |
500 int (*keygen) (RSA *rsa, int bits, BIGNUM *e, | |
501 BN_GENCB *cb)); | |
502 int (*RSA_meth_get_multi_prime_keygen(const RSA_METHOD *meth)) | |
503 (RSA *rsa, int bits, int primes, BIGNUM *e, BN_GENCB *cb); | |
504 int RSA_meth_set_multi_prime_keygen(RSA_METHOD *meth, | |
505 int (*keygen) (RSA *rsa, int bits, | |
506 int primes, BIGNUM *e, | |
507 BN_GENCB *cb)); | |
508 | |
509 # ifdef __cplusplus | |
510 } | |
511 # endif | |
512 # endif | |
513 #endif |