diff options
| author | djm <> | 2006-06-27 05:07:03 +0000 | 
|---|---|---|
| committer | djm <> | 2006-06-27 05:07:03 +0000 | 
| commit | 7fe7e1ed6bcd0e342aed7c0f890962dda616aa0d (patch) | |
| tree | 224c33f66b0b932c84dda315d9ba4236bf125b1c /src/lib/libcrypto/rsa/rsa.h | |
| parent | 3f764f48d2626a43b6eeef7652c28303269d1204 (diff) | |
| download | openbsd-7fe7e1ed6bcd0e342aed7c0f890962dda616aa0d.tar.gz openbsd-7fe7e1ed6bcd0e342aed7c0f890962dda616aa0d.tar.bz2 openbsd-7fe7e1ed6bcd0e342aed7c0f890962dda616aa0d.zip | |
resolve conflicts
Diffstat (limited to 'src/lib/libcrypto/rsa/rsa.h')
| -rw-r--r-- | src/lib/libcrypto/rsa/rsa.h | 67 | 
1 files changed, 54 insertions, 13 deletions
| diff --git a/src/lib/libcrypto/rsa/rsa.h b/src/lib/libcrypto/rsa/rsa.h index fc3bb5f86d..0b639cd37f 100644 --- a/src/lib/libcrypto/rsa/rsa.h +++ b/src/lib/libcrypto/rsa/rsa.h | |||
| @@ -157,33 +157,41 @@ struct rsa_st | |||
| 157 | #define RSA_3 0x3L | 157 | #define RSA_3 0x3L | 
| 158 | #define RSA_F4 0x10001L | 158 | #define RSA_F4 0x10001L | 
| 159 | 159 | ||
| 160 | #define RSA_METHOD_FLAG_NO_CHECK 0x01 /* don't check pub/private match */ | 160 | #define RSA_METHOD_FLAG_NO_CHECK 0x0001 /* don't check pub/private match */ | 
| 161 | 161 | ||
| 162 | #define RSA_FLAG_CACHE_PUBLIC 0x02 | 162 | #define RSA_FLAG_CACHE_PUBLIC 0x0002 | 
| 163 | #define RSA_FLAG_CACHE_PRIVATE 0x04 | 163 | #define RSA_FLAG_CACHE_PRIVATE 0x0004 | 
| 164 | #define RSA_FLAG_BLINDING 0x08 | 164 | #define RSA_FLAG_BLINDING 0x0008 | 
| 165 | #define RSA_FLAG_THREAD_SAFE 0x10 | 165 | #define RSA_FLAG_THREAD_SAFE 0x0010 | 
| 166 | /* This flag means the private key operations will be handled by rsa_mod_exp | 166 | /* This flag means the private key operations will be handled by rsa_mod_exp | 
| 167 | * and that they do not depend on the private key components being present: | 167 | * and that they do not depend on the private key components being present: | 
| 168 | * for example a key stored in external hardware. Without this flag bn_mod_exp | 168 | * for example a key stored in external hardware. Without this flag bn_mod_exp | 
| 169 | * gets called when private key components are absent. | 169 | * gets called when private key components are absent. | 
| 170 | */ | 170 | */ | 
| 171 | #define RSA_FLAG_EXT_PKEY 0x20 | 171 | #define RSA_FLAG_EXT_PKEY 0x0020 | 
| 172 | 172 | ||
| 173 | /* This flag in the RSA_METHOD enables the new rsa_sign, rsa_verify functions. | 173 | /* This flag in the RSA_METHOD enables the new rsa_sign, rsa_verify functions. | 
| 174 | */ | 174 | */ | 
| 175 | #define RSA_FLAG_SIGN_VER 0x40 | 175 | #define RSA_FLAG_SIGN_VER 0x0040 | 
| 176 | 176 | ||
| 177 | #define RSA_FLAG_NO_BLINDING 0x80 /* new with 0.9.6j and 0.9.7b; the built-in | 177 | #define RSA_FLAG_NO_BLINDING 0x0080 /* new with 0.9.6j and 0.9.7b; the built-in | 
| 178 | * RSA implementation now uses blinding by | 178 | * RSA implementation now uses blinding by | 
| 179 | * default (ignoring RSA_FLAG_BLINDING), | 179 | * default (ignoring RSA_FLAG_BLINDING), | 
| 180 | * but other engines might not need it | 180 | * but other engines might not need it | 
| 181 | */ | 181 | */ | 
| 182 | #define RSA_FLAG_NO_EXP_CONSTTIME 0x0100 /* new with 0.9.7h; the built-in RSA | ||
| 183 | * implementation now uses constant time | ||
| 184 | * modular exponentiation for secret exponents | ||
| 185 | * by default. This flag causes the | ||
| 186 | * faster variable sliding window method to | ||
| 187 | * be used for all exponents. | ||
| 188 | */ | ||
| 182 | 189 | ||
| 183 | #define RSA_PKCS1_PADDING 1 | 190 | #define RSA_PKCS1_PADDING 1 | 
| 184 | #define RSA_SSLV23_PADDING 2 | 191 | #define RSA_SSLV23_PADDING 2 | 
| 185 | #define RSA_NO_PADDING 3 | 192 | #define RSA_NO_PADDING 3 | 
| 186 | #define RSA_PKCS1_OAEP_PADDING 4 | 193 | #define RSA_PKCS1_OAEP_PADDING 4 | 
| 194 | #define RSA_X931_PADDING 5 | ||
| 187 | 195 | ||
| 188 | #define RSA_PKCS1_PADDING_SIZE 11 | 196 | #define RSA_PKCS1_PADDING_SIZE 11 | 
| 189 | 197 | ||
| @@ -196,6 +204,15 @@ int RSA_size(const RSA *); | |||
| 196 | RSA * RSA_generate_key(int bits, unsigned long e,void | 204 | RSA * RSA_generate_key(int bits, unsigned long e,void | 
| 197 | (*callback)(int,int,void *),void *cb_arg); | 205 | (*callback)(int,int,void *),void *cb_arg); | 
| 198 | int RSA_check_key(const RSA *); | 206 | int RSA_check_key(const RSA *); | 
| 207 | #ifdef OPENSSL_FIPS | ||
| 208 | int RSA_X931_derive(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, BIGNUM *q2, | ||
| 209 | void (*cb)(int, int, void *), void *cb_arg, | ||
| 210 | const BIGNUM *Xp1, const BIGNUM *Xp2, const BIGNUM *Xp, | ||
| 211 | const BIGNUM *Xq1, const BIGNUM *Xq2, const BIGNUM *Xq, | ||
| 212 | const BIGNUM *e); | ||
| 213 | RSA *RSA_X931_generate_key(int bits, const BIGNUM *e, | ||
| 214 | void (*cb)(int,int,void *), void *cb_arg); | ||
| 215 | #endif | ||
| 199 | /* next 4 return -1 on error */ | 216 | /* next 4 return -1 on error */ | 
| 200 | int RSA_public_encrypt(int flen, const unsigned char *from, | 217 | int RSA_public_encrypt(int flen, const unsigned char *from, | 
| 201 | unsigned char *to, RSA *rsa,int padding); | 218 | unsigned char *to, RSA *rsa,int padding); | 
| @@ -268,6 +285,8 @@ int RSA_padding_add_PKCS1_type_2(unsigned char *to,int tlen, | |||
| 268 | const unsigned char *f,int fl); | 285 | const unsigned char *f,int fl); | 
| 269 | int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen, | 286 | int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen, | 
| 270 | const unsigned char *f,int fl,int rsa_len); | 287 | const unsigned char *f,int fl,int rsa_len); | 
| 288 | int PKCS1_MGF1(unsigned char *mask, long len, | ||
| 289 | const unsigned char *seed, long seedlen, const EVP_MD *dgst); | ||
| 271 | int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen, | 290 | int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen, | 
| 272 | const unsigned char *f,int fl, | 291 | const unsigned char *f,int fl, | 
| 273 | const unsigned char *p,int pl); | 292 | const unsigned char *p,int pl); | 
| @@ -282,6 +301,17 @@ int RSA_padding_add_none(unsigned char *to,int tlen, | |||
| 282 | const unsigned char *f,int fl); | 301 | const unsigned char *f,int fl); | 
| 283 | int RSA_padding_check_none(unsigned char *to,int tlen, | 302 | int RSA_padding_check_none(unsigned char *to,int tlen, | 
| 284 | const unsigned char *f,int fl,int rsa_len); | 303 | const unsigned char *f,int fl,int rsa_len); | 
| 304 | int RSA_padding_add_X931(unsigned char *to,int tlen, | ||
| 305 | const unsigned char *f,int fl); | ||
| 306 | int RSA_padding_check_X931(unsigned char *to,int tlen, | ||
| 307 | const unsigned char *f,int fl,int rsa_len); | ||
| 308 | int RSA_X931_hash_id(int nid); | ||
| 309 | |||
| 310 | int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash, | ||
| 311 | const EVP_MD *Hash, const unsigned char *EM, int sLen); | ||
| 312 | int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM, | ||
| 313 | const unsigned char *mHash, | ||
| 314 | const EVP_MD *Hash, int sLen); | ||
| 285 | 315 | ||
| 286 | int RSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | 316 | int RSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | 
| 287 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); | 317 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); | 
| @@ -311,20 +341,24 @@ void ERR_load_RSA_strings(void); | |||
| 311 | #define RSA_F_RSA_NULL 124 | 341 | #define RSA_F_RSA_NULL 124 | 
| 312 | #define RSA_F_RSA_PADDING_ADD_NONE 107 | 342 | #define RSA_F_RSA_PADDING_ADD_NONE 107 | 
| 313 | #define RSA_F_RSA_PADDING_ADD_PKCS1_OAEP 121 | 343 | #define RSA_F_RSA_PADDING_ADD_PKCS1_OAEP 121 | 
| 344 | #define RSA_F_RSA_PADDING_ADD_PKCS1_PSS 125 | ||
| 314 | #define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1 108 | 345 | #define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1 108 | 
| 315 | #define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2 109 | 346 | #define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2 109 | 
| 316 | #define RSA_F_RSA_PADDING_ADD_SSLV23 110 | 347 | #define RSA_F_RSA_PADDING_ADD_SSLV23 110 | 
| 348 | #define RSA_F_RSA_PADDING_ADD_X931 127 | ||
| 317 | #define RSA_F_RSA_PADDING_CHECK_NONE 111 | 349 | #define RSA_F_RSA_PADDING_CHECK_NONE 111 | 
| 318 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP 122 | 350 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP 122 | 
| 319 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1 112 | 351 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1 112 | 
| 320 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2 113 | 352 | #define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2 113 | 
| 321 | #define RSA_F_RSA_PADDING_CHECK_SSLV23 114 | 353 | #define RSA_F_RSA_PADDING_CHECK_SSLV23 114 | 
| 354 | #define RSA_F_RSA_PADDING_CHECK_X931 128 | ||
| 322 | #define RSA_F_RSA_PRINT 115 | 355 | #define RSA_F_RSA_PRINT 115 | 
| 323 | #define RSA_F_RSA_PRINT_FP 116 | 356 | #define RSA_F_RSA_PRINT_FP 116 | 
| 324 | #define RSA_F_RSA_SIGN 117 | 357 | #define RSA_F_RSA_SIGN 117 | 
| 325 | #define RSA_F_RSA_SIGN_ASN1_OCTET_STRING 118 | 358 | #define RSA_F_RSA_SIGN_ASN1_OCTET_STRING 118 | 
| 326 | #define RSA_F_RSA_VERIFY 119 | 359 | #define RSA_F_RSA_VERIFY 119 | 
| 327 | #define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING 120 | 360 | #define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING 120 | 
| 361 | #define RSA_F_RSA_VERIFY_PKCS1_PSS 126 | ||
| 328 | 362 | ||
| 329 | /* Reason codes. */ | 363 | /* Reason codes. */ | 
| 330 | #define RSA_R_ALGORITHM_MISMATCH 100 | 364 | #define RSA_R_ALGORITHM_MISMATCH 100 | 
| @@ -344,9 +378,14 @@ void ERR_load_RSA_strings(void); | |||
| 344 | #define RSA_R_DMP1_NOT_CONGRUENT_TO_D 124 | 378 | #define RSA_R_DMP1_NOT_CONGRUENT_TO_D 124 | 
| 345 | #define RSA_R_DMQ1_NOT_CONGRUENT_TO_D 125 | 379 | #define RSA_R_DMQ1_NOT_CONGRUENT_TO_D 125 | 
| 346 | #define RSA_R_D_E_NOT_CONGRUENT_TO_1 123 | 380 | #define RSA_R_D_E_NOT_CONGRUENT_TO_1 123 | 
| 381 | #define RSA_R_FIRST_OCTET_INVALID 133 | ||
| 382 | #define RSA_R_INVALID_HEADER 137 | ||
| 347 | #define RSA_R_INVALID_MESSAGE_LENGTH 131 | 383 | #define RSA_R_INVALID_MESSAGE_LENGTH 131 | 
| 384 | #define RSA_R_INVALID_PADDING 138 | ||
| 385 | #define RSA_R_INVALID_TRAILER 139 | ||
| 348 | #define RSA_R_IQMP_NOT_INVERSE_OF_Q 126 | 386 | #define RSA_R_IQMP_NOT_INVERSE_OF_Q 126 | 
| 349 | #define RSA_R_KEY_SIZE_TOO_SMALL 120 | 387 | #define RSA_R_KEY_SIZE_TOO_SMALL 120 | 
| 388 | #define RSA_R_LAST_OCTET_INVALID 134 | ||
| 350 | #define RSA_R_NULL_BEFORE_BLOCK_MISSING 113 | 389 | #define RSA_R_NULL_BEFORE_BLOCK_MISSING 113 | 
| 351 | #define RSA_R_N_DOES_NOT_EQUAL_P_Q 127 | 390 | #define RSA_R_N_DOES_NOT_EQUAL_P_Q 127 | 
| 352 | #define RSA_R_OAEP_DECODING_ERROR 121 | 391 | #define RSA_R_OAEP_DECODING_ERROR 121 | 
| @@ -354,6 +393,8 @@ void ERR_load_RSA_strings(void); | |||
| 354 | #define RSA_R_P_NOT_PRIME 128 | 393 | #define RSA_R_P_NOT_PRIME 128 | 
| 355 | #define RSA_R_Q_NOT_PRIME 129 | 394 | #define RSA_R_Q_NOT_PRIME 129 | 
| 356 | #define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED 130 | 395 | #define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED 130 | 
| 396 | #define RSA_R_SLEN_CHECK_FAILED 136 | ||
| 397 | #define RSA_R_SLEN_RECOVERY_FAILED 135 | ||
| 357 | #define RSA_R_SSLV3_ROLLBACK_ATTACK 115 | 398 | #define RSA_R_SSLV3_ROLLBACK_ATTACK 115 | 
| 358 | #define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116 | 399 | #define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116 | 
| 359 | #define RSA_R_UNKNOWN_ALGORITHM_TYPE 117 | 400 | #define RSA_R_UNKNOWN_ALGORITHM_TYPE 117 | 
