xref: /openbsd-src/lib/libcrypto/rsa/rsa.h (revision f6aab3d83b51b91c24247ad2c2573574de475a82)
1 /* $OpenBSD: rsa.h,v 1.65 2023/07/28 10:05:16 tb Exp $ */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #ifndef HEADER_RSA_H
60 #define HEADER_RSA_H
61 
62 #include <openssl/opensslconf.h>
63 
64 #include <openssl/asn1.h>
65 
66 #ifndef OPENSSL_NO_BIO
67 #include <openssl/bio.h>
68 #endif
69 #include <openssl/bn.h>
70 #include <openssl/crypto.h>
71 
72 #include <openssl/ossl_typ.h>
73 
74 #ifdef OPENSSL_NO_RSA
75 #error RSA is disabled.
76 #endif
77 
78 #ifdef  __cplusplus
79 extern "C" {
80 #endif
81 
82 struct rsa_pss_params_st {
83 	X509_ALGOR *hashAlgorithm;
84 	X509_ALGOR *maskGenAlgorithm;
85 	ASN1_INTEGER *saltLength;
86 	ASN1_INTEGER *trailerField;
87 
88 	/* Hash algorithm decoded from maskGenAlgorithm. */
89 	X509_ALGOR *maskHash;
90 } /* RSA_PSS_PARAMS */;
91 
92 typedef struct rsa_oaep_params_st {
93 	X509_ALGOR *hashFunc;
94 	X509_ALGOR *maskGenFunc;
95 	X509_ALGOR *pSourceFunc;
96 
97 	/* Hash algorithm decoded from maskGenFunc. */
98 	X509_ALGOR *maskHash;
99 } RSA_OAEP_PARAMS;
100 
101 #ifndef OPENSSL_RSA_MAX_MODULUS_BITS
102 # define OPENSSL_RSA_MAX_MODULUS_BITS	16384
103 #endif
104 
105 #ifndef OPENSSL_RSA_SMALL_MODULUS_BITS
106 # define OPENSSL_RSA_SMALL_MODULUS_BITS	3072
107 #endif
108 #ifndef OPENSSL_RSA_MAX_PUBEXP_BITS
109 # define OPENSSL_RSA_MAX_PUBEXP_BITS	64 /* exponent limit enforced for "large" modulus only */
110 #endif
111 
112 #define RSA_3	0x3L
113 #define RSA_F4	0x10001L
114 
115 /* Don't check pub/private match. */
116 #define RSA_METHOD_FLAG_NO_CHECK	0x0001
117 
118 #define RSA_FLAG_CACHE_PUBLIC		0x0002
119 #define RSA_FLAG_CACHE_PRIVATE		0x0004
120 #define RSA_FLAG_BLINDING		0x0008
121 #define RSA_FLAG_THREAD_SAFE		0x0010
122 
123 /*
124  * This flag means the private key operations will be handled by rsa_mod_exp
125  * and that they do not depend on the private key components being present:
126  * for example a key stored in external hardware. Without this flag bn_mod_exp
127  * gets called when private key components are absent.
128  */
129 #define RSA_FLAG_EXT_PKEY		0x0020
130 
131 /*
132  * This flag in the RSA_METHOD enables the new rsa_sign, rsa_verify functions.
133  */
134 #define RSA_FLAG_SIGN_VER		0x0040
135 
136 /*
137  * The built-in RSA implementation uses blinding by default, but other engines
138  * might not need it.
139  */
140 #define RSA_FLAG_NO_BLINDING		0x0080
141 
142 /* Salt length matches digest */
143 #define RSA_PSS_SALTLEN_DIGEST		-1
144 /* Verify only: auto detect salt length */
145 #define RSA_PSS_SALTLEN_AUTO		-2
146 /* Set salt length to maximum possible */
147 #define RSA_PSS_SALTLEN_MAX		-3
148 
149 #define EVP_PKEY_CTX_set_rsa_padding(ctx, pad) \
150 	RSA_pkey_ctx_ctrl(ctx, -1, EVP_PKEY_CTRL_RSA_PADDING, pad, NULL)
151 
152 #define EVP_PKEY_CTX_get_rsa_padding(ctx, ppad) \
153 	RSA_pkey_ctx_ctrl(ctx, -1, EVP_PKEY_CTRL_GET_RSA_PADDING, 0, ppad)
154 
155 #define EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx, len) \
156 	RSA_pkey_ctx_ctrl(ctx, (EVP_PKEY_OP_SIGN|EVP_PKEY_OP_VERIFY), \
157 	    EVP_PKEY_CTRL_RSA_PSS_SALTLEN, len, NULL)
158 
159 #define EVP_PKEY_CTX_set_rsa_pss_keygen_saltlen(ctx, len) \
160 	EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_KEYGEN, \
161 	    EVP_PKEY_CTRL_RSA_PSS_SALTLEN, len, NULL)
162 
163 #define EVP_PKEY_CTX_get_rsa_pss_saltlen(ctx, plen) \
164 	RSA_pkey_ctx_ctrl(ctx, (EVP_PKEY_OP_SIGN|EVP_PKEY_OP_VERIFY), \
165 	    EVP_PKEY_CTRL_GET_RSA_PSS_SALTLEN, 0, plen)
166 
167 #define EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, bits) \
168 	RSA_pkey_ctx_ctrl(ctx, EVP_PKEY_OP_KEYGEN, \
169 	    EVP_PKEY_CTRL_RSA_KEYGEN_BITS, bits, NULL)
170 
171 #define EVP_PKEY_CTX_set_rsa_keygen_pubexp(ctx, pubexp) \
172 	RSA_pkey_ctx_ctrl(ctx, EVP_PKEY_OP_KEYGEN, \
173 	    EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP, 0, pubexp)
174 
175 #define EVP_PKEY_CTX_set_rsa_mgf1_md(ctx, md) \
176 	RSA_pkey_ctx_ctrl(ctx, EVP_PKEY_OP_TYPE_SIG | EVP_PKEY_OP_TYPE_CRYPT, \
177 	    EVP_PKEY_CTRL_RSA_MGF1_MD, 0, (void *)(md))
178 
179 #define EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md(ctx, md) \
180 	EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_KEYGEN, \
181 	    EVP_PKEY_CTRL_RSA_MGF1_MD, 0, (void *)(md))
182 
183 #define EVP_PKEY_CTX_set_rsa_oaep_md(ctx, md) \
184 	EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_TYPE_CRYPT, \
185 	    EVP_PKEY_CTRL_RSA_OAEP_MD, 0, (void *)(md))
186 
187 #define EVP_PKEY_CTX_get_rsa_mgf1_md(ctx, pmd) \
188 	RSA_pkey_ctx_ctrl(ctx, EVP_PKEY_OP_TYPE_SIG | EVP_PKEY_OP_TYPE_CRYPT, \
189 	    EVP_PKEY_CTRL_GET_RSA_MGF1_MD, 0, (void *)(pmd))
190 
191 #define EVP_PKEY_CTX_get_rsa_oaep_md(ctx, pmd) \
192 	EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_TYPE_CRYPT, \
193 	    EVP_PKEY_CTRL_GET_RSA_OAEP_MD, 0, (void *)(pmd))
194 
195 #define EVP_PKEY_CTX_set0_rsa_oaep_label(ctx, l, llen) \
196 	EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_TYPE_CRYPT, \
197 	    EVP_PKEY_CTRL_RSA_OAEP_LABEL, llen, (void *)(l))
198 
199 #define EVP_PKEY_CTX_get0_rsa_oaep_label(ctx, l) \
200 	EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_TYPE_CRYPT, \
201 	    EVP_PKEY_CTRL_GET_RSA_OAEP_LABEL, 0, (void *)(l))
202 
203 #define EVP_PKEY_CTX_set_rsa_pss_keygen_md(ctx, md) \
204 	EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA_PSS, \
205 	    EVP_PKEY_OP_KEYGEN, EVP_PKEY_CTRL_MD, 0, (void *)(md))
206 
207 #define EVP_PKEY_CTRL_RSA_PADDING		(EVP_PKEY_ALG_CTRL + 1)
208 #define EVP_PKEY_CTRL_RSA_PSS_SALTLEN		(EVP_PKEY_ALG_CTRL + 2)
209 
210 #define EVP_PKEY_CTRL_RSA_KEYGEN_BITS		(EVP_PKEY_ALG_CTRL + 3)
211 #define EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP		(EVP_PKEY_ALG_CTRL + 4)
212 #define EVP_PKEY_CTRL_RSA_MGF1_MD		(EVP_PKEY_ALG_CTRL + 5)
213 
214 #define EVP_PKEY_CTRL_GET_RSA_PADDING		(EVP_PKEY_ALG_CTRL + 6)
215 #define EVP_PKEY_CTRL_GET_RSA_PSS_SALTLEN	(EVP_PKEY_ALG_CTRL + 7)
216 #define EVP_PKEY_CTRL_GET_RSA_MGF1_MD		(EVP_PKEY_ALG_CTRL + 8)
217 
218 #define EVP_PKEY_CTRL_RSA_OAEP_MD		(EVP_PKEY_ALG_CTRL + 9)
219 #define EVP_PKEY_CTRL_RSA_OAEP_LABEL		(EVP_PKEY_ALG_CTRL + 10)
220 
221 #define EVP_PKEY_CTRL_GET_RSA_OAEP_MD		(EVP_PKEY_ALG_CTRL + 11)
222 #define EVP_PKEY_CTRL_GET_RSA_OAEP_LABEL	(EVP_PKEY_ALG_CTRL + 12)
223 
224 #define RSA_PKCS1_PADDING	1
225 #define RSA_SSLV23_PADDING	2
226 #define RSA_NO_PADDING		3
227 #define RSA_PKCS1_OAEP_PADDING	4
228 /* rust-openssl and erlang expose this and salt even uses it. */
229 #define RSA_X931_PADDING	5
230 /* EVP_PKEY_ only */
231 #define RSA_PKCS1_PSS_PADDING	6
232 
233 #define RSA_PKCS1_PADDING_SIZE	11
234 
235 #define RSA_set_app_data(s,arg)         RSA_set_ex_data(s,0,arg)
236 #define RSA_get_app_data(s)             RSA_get_ex_data(s,0)
237 
238 RSA *RSA_new(void);
239 RSA *RSA_new_method(ENGINE *engine);
240 int RSA_bits(const RSA *rsa);
241 int RSA_size(const RSA *rsa);
242 
243 /*
244  * Wrapped in OPENSSL_NO_DEPRECATED in 0.9.8. Still used for libressl bindings
245  * in rust-openssl.
246  */
247 RSA *RSA_generate_key(int bits, unsigned long e,
248     void (*callback)(int, int, void *), void *cb_arg);
249 
250 /* New version */
251 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
252 
253 int RSA_check_key(const RSA *);
254 /* next 4 return -1 on error */
255 int RSA_public_encrypt(int flen, const unsigned char *from,
256     unsigned char *to, RSA *rsa, int padding);
257 int RSA_private_encrypt(int flen, const unsigned char *from,
258     unsigned char *to, RSA *rsa, int padding);
259 int RSA_public_decrypt(int flen, const unsigned char *from,
260     unsigned char *to, RSA *rsa, int padding);
261 int RSA_private_decrypt(int flen, const unsigned char *from,
262     unsigned char *to, RSA *rsa, int padding);
263 void RSA_free(RSA *r);
264 /* "up" the RSA object's reference count */
265 int RSA_up_ref(RSA *r);
266 
267 int RSA_flags(const RSA *r);
268 
269 void RSA_set_default_method(const RSA_METHOD *meth);
270 const RSA_METHOD *RSA_get_default_method(void);
271 const RSA_METHOD *RSA_get_method(const RSA *rsa);
272 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth);
273 
274 const RSA_METHOD *RSA_PKCS1_OpenSSL(void);
275 const RSA_METHOD *RSA_PKCS1_SSLeay(void);
276 
277 const RSA_METHOD *RSA_null_method(void);
278 
279 int RSA_pkey_ctx_ctrl(EVP_PKEY_CTX *ctx, int optype, int cmd, int p1, void *p2);
280 
281 RSA *d2i_RSAPublicKey(RSA **a, const unsigned char **in, long len);
282 int i2d_RSAPublicKey(const RSA *a, unsigned char **out);
283 extern const ASN1_ITEM RSAPublicKey_it;
284 RSA *d2i_RSAPrivateKey(RSA **a, const unsigned char **in, long len);
285 int i2d_RSAPrivateKey(const RSA *a, unsigned char **out);
286 extern const ASN1_ITEM RSAPrivateKey_it;
287 
288 RSA_PSS_PARAMS *RSA_PSS_PARAMS_new(void);
289 void RSA_PSS_PARAMS_free(RSA_PSS_PARAMS *a);
290 RSA_PSS_PARAMS *d2i_RSA_PSS_PARAMS(RSA_PSS_PARAMS **a, const unsigned char **in, long len);
291 int i2d_RSA_PSS_PARAMS(RSA_PSS_PARAMS *a, unsigned char **out);
292 extern const ASN1_ITEM RSA_PSS_PARAMS_it;
293 
294 RSA_OAEP_PARAMS *RSA_OAEP_PARAMS_new(void);
295 void RSA_OAEP_PARAMS_free(RSA_OAEP_PARAMS *a);
296 RSA_OAEP_PARAMS *d2i_RSA_OAEP_PARAMS(RSA_OAEP_PARAMS **a, const unsigned char **in, long len);
297 int i2d_RSA_OAEP_PARAMS(RSA_OAEP_PARAMS *a, unsigned char **out);
298 extern const ASN1_ITEM RSA_OAEP_PARAMS_it;
299 
300 int RSA_print_fp(FILE *fp, const RSA *r, int offset);
301 
302 #ifndef OPENSSL_NO_BIO
303 int RSA_print(BIO *bp, const RSA *r, int offset);
304 #endif
305 
306 /* The following 2 functions sign and verify a X509_SIG ASN1 object
307  * inside PKCS#1 padded RSA encryption */
308 int RSA_sign(int type, const unsigned char *m, unsigned int m_length,
309     unsigned char *sigret, unsigned int *siglen, RSA *rsa);
310 int RSA_verify(int type, const unsigned char *m, unsigned int m_length,
311     const unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
312 
313 /* The following 2 function sign and verify a ASN1_OCTET_STRING
314  * object inside PKCS#1 padded RSA encryption */
315 int RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m,
316     unsigned int m_length, unsigned char *sigret, unsigned int *siglen,
317     RSA *rsa);
318 int RSA_verify_ASN1_OCTET_STRING(int type, const unsigned char *m,
319     unsigned int m_length, unsigned char *sigbuf, unsigned int siglen,
320     RSA *rsa);
321 
322 int RSA_blinding_on(RSA *rsa, BN_CTX *ctx);
323 void RSA_blinding_off(RSA *rsa);
324 
325 int RSA_padding_add_PKCS1_type_1(unsigned char *to, int tlen,
326     const unsigned char *f, int fl);
327 int RSA_padding_check_PKCS1_type_1(unsigned char *to, int tlen,
328     const unsigned char *f, int fl, int rsa_len);
329 int RSA_padding_add_PKCS1_type_2(unsigned char *to, int tlen,
330     const unsigned char *f, int fl);
331 int RSA_padding_check_PKCS1_type_2(unsigned char *to, int tlen,
332     const unsigned char *f, int fl, int rsa_len);
333 int PKCS1_MGF1(unsigned char *mask, long len,
334     const unsigned char *seed, long seedlen, const EVP_MD *dgst);
335 int RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen,
336     const unsigned char *f, int fl,
337     const unsigned char *p, int pl);
338 int RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen,
339     const unsigned char *f, int fl, int rsa_len,
340     const unsigned char *p, int pl);
341 int RSA_padding_add_PKCS1_OAEP_mgf1(unsigned char *to, int tlen,
342     const unsigned char *from, int flen, const unsigned char *param, int plen,
343     const EVP_MD *md, const EVP_MD *mgf1md);
344 int RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen,
345     const unsigned char *from, int flen, int num, const unsigned char *param,
346     int plen, const EVP_MD *md, const EVP_MD *mgf1md);
347 int RSA_padding_add_none(unsigned char *to, int tlen,
348     const unsigned char *f, int fl);
349 int RSA_padding_check_none(unsigned char *to, int tlen,
350     const unsigned char *f, int fl, int rsa_len);
351 
352 int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash,
353     const EVP_MD *Hash, const unsigned char *EM, int sLen);
354 int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM,
355     const unsigned char *mHash, const EVP_MD *Hash, int sLen);
356 
357 int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash,
358     const EVP_MD *Hash, const EVP_MD *mgf1Hash, const unsigned char *EM,
359     int sLen);
360 
361 int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM,
362     const unsigned char *mHash, const EVP_MD *Hash, const EVP_MD *mgf1Hash,
363     int sLen);
364 
365 int RSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
366     CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
367 int RSA_set_ex_data(RSA *r, int idx, void *arg);
368 void *RSA_get_ex_data(const RSA *r, int idx);
369 
370 int RSA_security_bits(const RSA *rsa);
371 
372 void RSA_get0_key(const RSA *r, const BIGNUM **n, const BIGNUM **e,
373     const BIGNUM **d);
374 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d);
375 void RSA_get0_crt_params(const RSA *r, const BIGNUM **dmp1, const BIGNUM **dmq1,
376     const BIGNUM **iqmp);
377 int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp);
378 void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q);
379 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q);
380 const BIGNUM *RSA_get0_n(const RSA *r);
381 const BIGNUM *RSA_get0_e(const RSA *r);
382 const BIGNUM *RSA_get0_d(const RSA *r);
383 const BIGNUM *RSA_get0_p(const RSA *r);
384 const BIGNUM *RSA_get0_q(const RSA *r);
385 const BIGNUM *RSA_get0_dmp1(const RSA *r);
386 const BIGNUM *RSA_get0_dmq1(const RSA *r);
387 const BIGNUM *RSA_get0_iqmp(const RSA *r);
388 const RSA_PSS_PARAMS *RSA_get0_pss_params(const RSA *r);
389 void RSA_clear_flags(RSA *r, int flags);
390 int RSA_test_flags(const RSA *r, int flags);
391 void RSA_set_flags(RSA *r, int flags);
392 
393 RSA *RSAPublicKey_dup(RSA *rsa);
394 RSA *RSAPrivateKey_dup(RSA *rsa);
395 
396 /* If this flag is set the RSA method is FIPS compliant and can be used
397  * in FIPS mode. This is set in the validated module method. If an
398  * application sets this flag in its own methods it is its responsibility
399  * to ensure the result is compliant.
400  */
401 
402 #define RSA_FLAG_FIPS_METHOD			0x0400
403 
404 /* If this flag is set the operations normally disabled in FIPS mode are
405  * permitted it is then the applications responsibility to ensure that the
406  * usage is compliant.
407  */
408 
409 #define RSA_FLAG_NON_FIPS_ALLOW			0x0400
410 /* Application has decided PRNG is good enough to generate a key: don't
411  * check.
412  */
413 #define RSA_FLAG_CHECKED			0x0800
414 
415 RSA_METHOD *RSA_meth_new(const char *name, int flags);
416 void RSA_meth_free(RSA_METHOD *meth);
417 RSA_METHOD *RSA_meth_dup(const RSA_METHOD *meth);
418 int RSA_meth_set1_name(RSA_METHOD *meth, const char *name);
419 int RSA_meth_set_priv_enc(RSA_METHOD *meth, int (*priv_enc)(int flen,
420     const unsigned char *from, unsigned char *to, RSA *rsa, int padding));
421 int RSA_meth_set_priv_dec(RSA_METHOD *meth, int (*priv_dec)(int flen,
422     const unsigned char *from, unsigned char *to, RSA *rsa, int padding));
423 int (*RSA_meth_get_finish(const RSA_METHOD *meth))(RSA *rsa);
424 int RSA_meth_set_finish(RSA_METHOD *meth, int (*finish)(RSA *rsa));
425 int RSA_meth_set_pub_enc(RSA_METHOD *meth, int (*pub_enc)(int flen,
426     const unsigned char *from, unsigned char *to, RSA *rsa, int padding));
427 int RSA_meth_set_pub_dec(RSA_METHOD *meth, int (*pub_dec)(int flen,
428     const unsigned char *from, unsigned char *to, RSA *rsa, int padding));
429 int RSA_meth_set_mod_exp(RSA_METHOD *meth, int (*mod_exp)(BIGNUM *r0,
430     const BIGNUM *i, RSA *rsa, BN_CTX *ctx));
431 int RSA_meth_set_bn_mod_exp(RSA_METHOD *meth, int (*bn_mod_exp)(BIGNUM *r,
432     const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, BN_CTX *ctx,
433     BN_MONT_CTX *m_ctx));
434 int RSA_meth_set_init(RSA_METHOD *meth, int (*init)(RSA *rsa));
435 int RSA_meth_set_keygen(RSA_METHOD *meth, int (*keygen)(RSA *rsa, int bits,
436     BIGNUM *e, BN_GENCB *cb));
437 int RSA_meth_set_flags(RSA_METHOD *meth, int flags);
438 int RSA_meth_set0_app_data(RSA_METHOD *meth, void *app_data);
439 const char *RSA_meth_get0_name(const RSA_METHOD *);
440 int (*RSA_meth_get_pub_enc(const RSA_METHOD *meth))(int flen,
441     const unsigned char *from, unsigned char *to, RSA *rsa, int padding);
442 int (*RSA_meth_get_pub_dec(const RSA_METHOD *meth))(int flen,
443     const unsigned char *from, unsigned char *to, RSA *rsa, int padding);
444 int (*RSA_meth_get_priv_enc(const RSA_METHOD *meth))(int flen,
445     const unsigned char *from, unsigned char *to, RSA *rsa, int padding);
446 int (*RSA_meth_get_priv_dec(const RSA_METHOD *meth))(int flen,
447     const unsigned char *from, unsigned char *to, RSA *rsa, int padding);
448 int (*RSA_meth_get_mod_exp(const RSA_METHOD *meth))(BIGNUM *r0, const BIGNUM *i,
449     RSA *rsa, BN_CTX *ctx);
450 int (*RSA_meth_get_bn_mod_exp(const RSA_METHOD *meth))(BIGNUM *r,
451     const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, BN_CTX *ctx,
452     BN_MONT_CTX *m_ctx);
453 int (*RSA_meth_get_init(const RSA_METHOD *meth))(RSA *rsa);
454 int (*RSA_meth_get_keygen(const RSA_METHOD *meth))(RSA *rsa, int bits, BIGNUM *e,
455     BN_GENCB *cb);
456 int RSA_meth_get_flags(const RSA_METHOD *meth);
457 void *RSA_meth_get0_app_data(const RSA_METHOD *meth);
458 int (*RSA_meth_get_sign(const RSA_METHOD *meth))(int type,
459     const unsigned char *m, unsigned int m_length,
460     unsigned char *sigret, unsigned int *siglen,
461     const RSA *rsa);
462 int RSA_meth_set_sign(RSA_METHOD *rsa, int (*sign)(int type,
463     const unsigned char *m, unsigned int m_length, unsigned char *sigret,
464     unsigned int *siglen, const RSA *rsa));
465 int (*RSA_meth_get_verify(const RSA_METHOD *meth))(int dtype,
466     const unsigned char *m, unsigned int m_length, const unsigned char *sigbuf,
467     unsigned int siglen, const RSA *rsa);
468 int RSA_meth_set_verify(RSA_METHOD *rsa, int (*verify)(int dtype,
469     const unsigned char *m, unsigned int m_length, const unsigned char *sigbuf,
470     unsigned int siglen, const RSA *rsa));
471 
472 
473 void ERR_load_RSA_strings(void);
474 
475 /* Error codes for the RSA functions. */
476 
477 /* Function codes. */
478 #define RSA_F_CHECK_PADDING_MD				 140
479 #define RSA_F_DO_RSA_PRINT				 146
480 #define RSA_F_INT_RSA_VERIFY				 145
481 #define RSA_F_MEMORY_LOCK				 100
482 #define RSA_F_OLD_RSA_PRIV_DECODE			 147
483 #define RSA_F_PKEY_RSA_CTRL				 143
484 #define RSA_F_PKEY_RSA_CTRL_STR				 144
485 #define RSA_F_PKEY_RSA_SIGN				 142
486 #define RSA_F_PKEY_RSA_VERIFY				 154
487 #define RSA_F_PKEY_RSA_VERIFYRECOVER			 141
488 #define RSA_F_RSA_BUILTIN_KEYGEN			 129
489 #define RSA_F_RSA_CHECK_KEY				 123
490 #define RSA_F_RSA_EAY_MOD_EXP				 157
491 #define RSA_F_RSA_EAY_PRIVATE_DECRYPT			 101
492 #define RSA_F_RSA_EAY_PRIVATE_ENCRYPT			 102
493 #define RSA_F_RSA_EAY_PUBLIC_DECRYPT			 103
494 #define RSA_F_RSA_EAY_PUBLIC_ENCRYPT			 104
495 #define RSA_F_RSA_GENERATE_KEY				 105
496 #define RSA_F_RSA_GENERATE_KEY_EX			 155
497 #define RSA_F_RSA_ITEM_VERIFY				 156
498 #define RSA_F_RSA_MEMORY_LOCK				 130
499 #define RSA_F_RSA_NEW_METHOD				 106
500 #define RSA_F_RSA_NULL					 124
501 #define RSA_F_RSA_NULL_MOD_EXP				 131
502 #define RSA_F_RSA_NULL_PRIVATE_DECRYPT			 132
503 #define RSA_F_RSA_NULL_PRIVATE_ENCRYPT			 133
504 #define RSA_F_RSA_NULL_PUBLIC_DECRYPT			 134
505 #define RSA_F_RSA_NULL_PUBLIC_ENCRYPT			 135
506 #define RSA_F_RSA_PADDING_ADD_NONE			 107
507 #define RSA_F_RSA_PADDING_ADD_PKCS1_OAEP		 121
508 #define RSA_F_RSA_PADDING_ADD_PKCS1_PSS			 125
509 #define RSA_F_RSA_PADDING_ADD_PKCS1_PSS_MGF1		 148
510 #define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1		 108
511 #define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2		 109
512 #define RSA_F_RSA_PADDING_ADD_X931			 127
513 #define RSA_F_RSA_PADDING_CHECK_NONE			 111
514 #define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP		 122
515 #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1		 112
516 #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2		 113
517 #define RSA_F_RSA_PADDING_CHECK_X931			 128
518 #define RSA_F_RSA_PRINT					 115
519 #define RSA_F_RSA_PRINT_FP				 116
520 #define RSA_F_RSA_PRIVATE_DECRYPT			 150
521 #define RSA_F_RSA_PRIVATE_ENCRYPT			 151
522 #define RSA_F_RSA_PRIV_DECODE				 137
523 #define RSA_F_RSA_PRIV_ENCODE				 138
524 #define RSA_F_RSA_PUBLIC_DECRYPT			 152
525 #define RSA_F_RSA_PUBLIC_ENCRYPT			 153
526 #define RSA_F_RSA_PUB_DECODE				 139
527 #define RSA_F_RSA_SETUP_BLINDING			 136
528 #define RSA_F_RSA_SIGN					 117
529 #define RSA_F_RSA_SIGN_ASN1_OCTET_STRING		 118
530 #define RSA_F_RSA_VERIFY				 119
531 #define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING		 120
532 #define RSA_F_RSA_VERIFY_PKCS1_PSS			 126
533 #define RSA_F_RSA_VERIFY_PKCS1_PSS_MGF1			 149
534 
535 /* Reason codes. */
536 #define RSA_R_ALGORITHM_MISMATCH			 100
537 #define RSA_R_BAD_E_VALUE				 101
538 #define RSA_R_BAD_FIXED_HEADER_DECRYPT			 102
539 #define RSA_R_BAD_PAD_BYTE_COUNT			 103
540 #define RSA_R_BAD_SIGNATURE				 104
541 #define RSA_R_BLOCK_TYPE_IS_NOT_01			 106
542 #define RSA_R_BLOCK_TYPE_IS_NOT_02			 107
543 #define RSA_R_DATA_GREATER_THAN_MOD_LEN			 108
544 #define RSA_R_DATA_TOO_LARGE				 109
545 #define RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE		 110
546 #define RSA_R_DATA_TOO_LARGE_FOR_MODULUS		 132
547 #define RSA_R_DATA_TOO_SMALL				 111
548 #define RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE		 122
549 #define RSA_R_DIGEST_DOES_NOT_MATCH			 158
550 #define RSA_R_DIGEST_NOT_ALLOWED			 145
551 #define RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY		 112
552 #define RSA_R_DMP1_NOT_CONGRUENT_TO_D			 124
553 #define RSA_R_DMQ1_NOT_CONGRUENT_TO_D			 125
554 #define RSA_R_D_E_NOT_CONGRUENT_TO_1			 123
555 #define RSA_R_FIRST_OCTET_INVALID			 133
556 #define RSA_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE	 144
557 #define RSA_R_INVALID_DIGEST				 157
558 #define RSA_R_INVALID_DIGEST_LENGTH			 143
559 #define RSA_R_INVALID_HEADER				 137
560 #define RSA_R_INVALID_KEYBITS				 145
561 #define RSA_R_INVALID_LABEL				 160
562 #define RSA_R_INVALID_MESSAGE_LENGTH			 131
563 #define RSA_R_INVALID_MGF1_MD				 156
564 #define RSA_R_INVALID_OAEP_PARAMETERS			 161
565 #define RSA_R_INVALID_PADDING				 138
566 #define RSA_R_INVALID_PADDING_MODE			 141
567 #define RSA_R_INVALID_PSS_PARAMETERS			 149
568 #define RSA_R_INVALID_PSS_SALTLEN			 146
569 #define RSA_R_INVALID_SALT_LENGTH			 150
570 #define RSA_R_INVALID_TRAILER				 139
571 #define RSA_R_INVALID_X931_DIGEST			 142
572 #define RSA_R_IQMP_NOT_INVERSE_OF_Q			 126
573 #define RSA_R_KEY_SIZE_TOO_SMALL			 120
574 #define RSA_R_LAST_OCTET_INVALID			 134
575 #define RSA_R_MODULUS_TOO_LARGE				 105
576 #define RSA_R_MGF1_DIGEST_NOT_ALLOWED			 152
577 #define RSA_R_NON_FIPS_RSA_METHOD			 157
578 #define RSA_R_NO_PUBLIC_EXPONENT			 140
579 #define RSA_R_NULL_BEFORE_BLOCK_MISSING			 113
580 #define RSA_R_N_DOES_NOT_EQUAL_P_Q			 127
581 #define RSA_R_OAEP_DECODING_ERROR			 121
582 #define RSA_R_OPERATION_NOT_ALLOWED_IN_FIPS_MODE	 158
583 #define RSA_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE	 148
584 #define RSA_R_PADDING_CHECK_FAILED			 114
585 #define RSA_R_PSS_SALTLEN_TOO_SMALL			 164
586 #define RSA_R_P_NOT_PRIME				 128
587 #define RSA_R_Q_NOT_PRIME				 129
588 #define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED		 130
589 #define RSA_R_SLEN_CHECK_FAILED				 136
590 #define RSA_R_SLEN_RECOVERY_FAILED			 135
591 #define RSA_R_SSLV3_ROLLBACK_ATTACK			 115
592 #define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116
593 #define RSA_R_UNKNOWN_ALGORITHM_TYPE			 117
594 #define RSA_R_UNKNOWN_DIGEST				 166
595 #define RSA_R_UNKNOWN_MASK_DIGEST			 151
596 #define RSA_R_UNKNOWN_PADDING_TYPE			 118
597 #define RSA_R_UNKNOWN_PSS_DIGEST			 152
598 #define RSA_R_UNSUPPORTED_ENCRYPTION_TYPE		 162
599 #define RSA_R_UNSUPPORTED_LABEL_SOURCE			 163
600 #define RSA_R_UNSUPPORTED_MASK_ALGORITHM		 153
601 #define RSA_R_UNSUPPORTED_MASK_PARAMETER		 154
602 #define RSA_R_UNSUPPORTED_SIGNATURE_TYPE		 155
603 #define RSA_R_VALUE_MISSING				 147
604 #define RSA_R_WRONG_SIGNATURE_LENGTH			 119
605 
606 #ifdef  __cplusplus
607 }
608 #endif
609 #endif
610