os/ossrv/ssl/libcrypto/src/crypto/rsa/rsa.h
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
sl@0
     1
/* crypto/rsa/rsa.h */
sl@0
     2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
sl@0
     3
 * All rights reserved.
sl@0
     4
 *
sl@0
     5
 * This package is an SSL implementation written
sl@0
     6
 * by Eric Young (eay@cryptsoft.com).
sl@0
     7
 * The implementation was written so as to conform with Netscapes SSL.
sl@0
     8
 * 
sl@0
     9
 * This library is free for commercial and non-commercial use as long as
sl@0
    10
 * the following conditions are aheared to.  The following conditions
sl@0
    11
 * apply to all code found in this distribution, be it the RC4, RSA,
sl@0
    12
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
sl@0
    13
 * included with this distribution is covered by the same copyright terms
sl@0
    14
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
sl@0
    15
 * 
sl@0
    16
 * Copyright remains Eric Young's, and as such any Copyright notices in
sl@0
    17
 * the code are not to be removed.
sl@0
    18
 * If this package is used in a product, Eric Young should be given attribution
sl@0
    19
 * as the author of the parts of the library used.
sl@0
    20
 * This can be in the form of a textual message at program startup or
sl@0
    21
 * in documentation (online or textual) provided with the package.
sl@0
    22
 * 
sl@0
    23
 * Redistribution and use in source and binary forms, with or without
sl@0
    24
 * modification, are permitted provided that the following conditions
sl@0
    25
 * are met:
sl@0
    26
 * 1. Redistributions of source code must retain the copyright
sl@0
    27
 *    notice, this list of conditions and the following disclaimer.
sl@0
    28
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    29
 *    notice, this list of conditions and the following disclaimer in the
sl@0
    30
 *    documentation and/or other materials provided with the distribution.
sl@0
    31
 * 3. All advertising materials mentioning features or use of this software
sl@0
    32
 *    must display the following acknowledgement:
sl@0
    33
 *    "This product includes cryptographic software written by
sl@0
    34
 *     Eric Young (eay@cryptsoft.com)"
sl@0
    35
 *    The word 'cryptographic' can be left out if the rouines from the library
sl@0
    36
 *    being used are not cryptographic related :-).
sl@0
    37
 * 4. If you include any Windows specific code (or a derivative thereof) from 
sl@0
    38
 *    the apps directory (application code) you must include an acknowledgement:
sl@0
    39
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
sl@0
    40
 * 
sl@0
    41
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
sl@0
    42
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    43
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
sl@0
    44
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
sl@0
    45
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
sl@0
    46
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
sl@0
    47
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
sl@0
    49
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
sl@0
    50
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
sl@0
    51
 * SUCH DAMAGE.
sl@0
    52
 * 
sl@0
    53
 * The licence and distribution terms for any publically available version or
sl@0
    54
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
sl@0
    55
 * copied and put under another distribution licence
sl@0
    56
 * [including the GNU Public Licence.]
sl@0
    57
 */
sl@0
    58
/*
sl@0
    59
 © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
sl@0
    60
 */
sl@0
    61
sl@0
    62
#ifndef HEADER_RSA_H
sl@0
    63
#define HEADER_RSA_H
sl@0
    64
sl@0
    65
#if (defined(__SYMBIAN32__) && !defined(SYMBIAN))
sl@0
    66
#define SYMBIAN
sl@0
    67
#endif
sl@0
    68
sl@0
    69
#ifdef SYMBIAN
sl@0
    70
#include <e32def.h>
sl@0
    71
#endif
sl@0
    72
#include <openssl/asn1.h>
sl@0
    73
sl@0
    74
#ifndef OPENSSL_NO_BIO
sl@0
    75
#include <openssl/bio.h>
sl@0
    76
#endif
sl@0
    77
#include <openssl/crypto.h>
sl@0
    78
#include <openssl/ossl_typ.h>
sl@0
    79
#ifndef OPENSSL_NO_DEPRECATED
sl@0
    80
#include <openssl/bn.h>
sl@0
    81
#endif
sl@0
    82
sl@0
    83
#ifdef OPENSSL_NO_RSA
sl@0
    84
#error RSA is disabled.
sl@0
    85
#endif
sl@0
    86
sl@0
    87
#ifdef  __cplusplus
sl@0
    88
extern "C" {
sl@0
    89
#endif
sl@0
    90
sl@0
    91
/* Declared already in ossl_typ.h */
sl@0
    92
/* typedef struct rsa_st RSA; */
sl@0
    93
/* typedef struct rsa_meth_st RSA_METHOD; */
sl@0
    94
sl@0
    95
struct rsa_meth_st
sl@0
    96
	{
sl@0
    97
	const char *name;
sl@0
    98
	int (*rsa_pub_enc)(int flen,const unsigned char *from,
sl@0
    99
			   unsigned char *to,
sl@0
   100
			   RSA *rsa,int padding);
sl@0
   101
	int (*rsa_pub_dec)(int flen,const unsigned char *from,
sl@0
   102
			   unsigned char *to,
sl@0
   103
			   RSA *rsa,int padding);
sl@0
   104
	int (*rsa_priv_enc)(int flen,const unsigned char *from,
sl@0
   105
			    unsigned char *to,
sl@0
   106
			    RSA *rsa,int padding);
sl@0
   107
	int (*rsa_priv_dec)(int flen,const unsigned char *from,
sl@0
   108
			    unsigned char *to,
sl@0
   109
			    RSA *rsa,int padding);
sl@0
   110
	int (*rsa_mod_exp)(BIGNUM *r0,const BIGNUM *I,RSA *rsa,BN_CTX *ctx); /* Can be null */
sl@0
   111
	int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
sl@0
   112
			  const BIGNUM *m, BN_CTX *ctx,
sl@0
   113
			  BN_MONT_CTX *m_ctx); /* Can be null */
sl@0
   114
	int (*init)(RSA *rsa);		/* called at new */
sl@0
   115
	int (*finish)(RSA *rsa);	/* called at free */
sl@0
   116
	int flags;			/* RSA_METHOD_FLAG_* things */
sl@0
   117
	char *app_data;			/* may be needed! */
sl@0
   118
/* New sign and verify functions: some libraries don't allow arbitrary data
sl@0
   119
 * to be signed/verified: this allows them to be used. Note: for this to work
sl@0
   120
 * the RSA_public_decrypt() and RSA_private_encrypt() should *NOT* be used
sl@0
   121
 * RSA_sign(), RSA_verify() should be used instead. Note: for backwards
sl@0
   122
 * compatibility this functionality is only enabled if the RSA_FLAG_SIGN_VER
sl@0
   123
 * option is set in 'flags'.
sl@0
   124
 */
sl@0
   125
	int (*rsa_sign)(int type,
sl@0
   126
		const unsigned char *m, unsigned int m_length,
sl@0
   127
		unsigned char *sigret, unsigned int *siglen, const RSA *rsa);
sl@0
   128
	int (*rsa_verify)(int dtype,
sl@0
   129
		const unsigned char *m, unsigned int m_length,
sl@0
   130
		unsigned char *sigbuf, unsigned int siglen, const RSA *rsa);
sl@0
   131
/* If this callback is NULL, the builtin software RSA key-gen will be used. This
sl@0
   132
 * is for behavioural compatibility whilst the code gets rewired, but one day
sl@0
   133
 * it would be nice to assume there are no such things as "builtin software"
sl@0
   134
 * implementations. */
sl@0
   135
	int (*rsa_keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
sl@0
   136
	};
sl@0
   137
sl@0
   138
struct rsa_st
sl@0
   139
	{
sl@0
   140
	/* The first parameter is used to pickup errors where
sl@0
   141
	 * this is passed instead of aEVP_PKEY, it is set to 0 */
sl@0
   142
	int pad;
sl@0
   143
	long version;
sl@0
   144
	const RSA_METHOD *meth;
sl@0
   145
	/* functional reference if 'meth' is ENGINE-provided */
sl@0
   146
	ENGINE *engine;
sl@0
   147
	BIGNUM *n;
sl@0
   148
	BIGNUM *e;
sl@0
   149
	BIGNUM *d;
sl@0
   150
	BIGNUM *p;
sl@0
   151
	BIGNUM *q;
sl@0
   152
	BIGNUM *dmp1;
sl@0
   153
	BIGNUM *dmq1;
sl@0
   154
	BIGNUM *iqmp;
sl@0
   155
	/* be careful using this if the RSA structure is shared */
sl@0
   156
	CRYPTO_EX_DATA ex_data;
sl@0
   157
	int references;
sl@0
   158
	int flags;
sl@0
   159
sl@0
   160
	/* Used to cache montgomery values */
sl@0
   161
	BN_MONT_CTX *_method_mod_n;
sl@0
   162
	BN_MONT_CTX *_method_mod_p;
sl@0
   163
	BN_MONT_CTX *_method_mod_q;
sl@0
   164
sl@0
   165
	/* all BIGNUM values are actually in the following data, if it is not
sl@0
   166
	 * NULL */
sl@0
   167
	char *bignum_data;
sl@0
   168
	BN_BLINDING *blinding;
sl@0
   169
	BN_BLINDING *mt_blinding;
sl@0
   170
	};
sl@0
   171
#ifndef OPENSSL_RSA_MAX_MODULUS_BITS
sl@0
   172
# define OPENSSL_RSA_MAX_MODULUS_BITS	16384
sl@0
   173
#endif
sl@0
   174
sl@0
   175
#ifndef OPENSSL_RSA_SMALL_MODULUS_BITS
sl@0
   176
# define OPENSSL_RSA_SMALL_MODULUS_BITS	3072
sl@0
   177
#endif
sl@0
   178
#ifndef OPENSSL_RSA_MAX_PUBEXP_BITS
sl@0
   179
# define OPENSSL_RSA_MAX_PUBEXP_BITS	64 /* exponent limit enforced for "large" modulus only */
sl@0
   180
#endif
sl@0
   181
sl@0
   182
sl@0
   183
#define RSA_3	0x3L
sl@0
   184
#define RSA_F4	0x10001L
sl@0
   185
sl@0
   186
#define RSA_METHOD_FLAG_NO_CHECK	0x0001 /* don't check pub/private match */
sl@0
   187
sl@0
   188
#define RSA_FLAG_CACHE_PUBLIC		0x0002
sl@0
   189
#define RSA_FLAG_CACHE_PRIVATE		0x0004
sl@0
   190
#define RSA_FLAG_BLINDING		0x0008
sl@0
   191
#define RSA_FLAG_THREAD_SAFE		0x0010
sl@0
   192
/* This flag means the private key operations will be handled by rsa_mod_exp
sl@0
   193
 * and that they do not depend on the private key components being present:
sl@0
   194
 * for example a key stored in external hardware. Without this flag bn_mod_exp
sl@0
   195
 * gets called when private key components are absent.
sl@0
   196
 */
sl@0
   197
#define RSA_FLAG_EXT_PKEY		0x0020
sl@0
   198
sl@0
   199
/* This flag in the RSA_METHOD enables the new rsa_sign, rsa_verify functions.
sl@0
   200
 */
sl@0
   201
#define RSA_FLAG_SIGN_VER		0x0040
sl@0
   202
sl@0
   203
#define RSA_FLAG_NO_BLINDING		0x0080 /* new with 0.9.6j and 0.9.7b; the built-in
sl@0
   204
                                                * RSA implementation now uses blinding by
sl@0
   205
                                                * default (ignoring RSA_FLAG_BLINDING),
sl@0
   206
                                                * but other engines might not need it
sl@0
   207
                                                */
sl@0
   208
#define RSA_FLAG_NO_CONSTTIME		0x0100 /* new with 0.9.8f; the built-in RSA
sl@0
   209
						* implementation now uses constant time
sl@0
   210
						* operations by default in private key operations,
sl@0
   211
						* e.g., constant time modular exponentiation, 
sl@0
   212
                                                * modular inverse without leaking branches, 
sl@0
   213
                                                * division without leaking branches. This 
sl@0
   214
                                                * flag disables these constant time 
sl@0
   215
                                                * operations and results in faster RSA 
sl@0
   216
                                                * private key operations.
sl@0
   217
                                                */ 
sl@0
   218
#ifndef OPENSSL_NO_DEPRECATED
sl@0
   219
#define RSA_FLAG_NO_EXP_CONSTTIME RSA_FLAG_NO_CONSTTIME /* deprecated name for the flag*/
sl@0
   220
                                                /* new with 0.9.7h; the built-in RSA
sl@0
   221
                                                * implementation now uses constant time
sl@0
   222
                                                * modular exponentiation for secret exponents
sl@0
   223
                                                * by default. This flag causes the
sl@0
   224
                                                * faster variable sliding window method to
sl@0
   225
                                                * be used for all exponents.
sl@0
   226
                                                */
sl@0
   227
#endif
sl@0
   228
sl@0
   229
#ifdef	SYMBIAN
sl@0
   230
#define RSA_FLAG_NO_EXP_CONSTTIME RSA_FLAG_NO_CONSTTIME // if user not undef OPENSSL_NO_DEPRECATED
sl@0
   231
#endif
sl@0
   232
#define RSA_PKCS1_PADDING	1
sl@0
   233
#define RSA_SSLV23_PADDING	2
sl@0
   234
#define RSA_NO_PADDING		3
sl@0
   235
#define RSA_PKCS1_OAEP_PADDING	4
sl@0
   236
#define RSA_X931_PADDING	5
sl@0
   237
sl@0
   238
#define RSA_PKCS1_PADDING_SIZE	11
sl@0
   239
sl@0
   240
#define RSA_set_app_data(s,arg)         RSA_set_ex_data(s,0,arg)
sl@0
   241
#define RSA_get_app_data(s)             RSA_get_ex_data(s,0)
sl@0
   242
sl@0
   243
RSA *	RSA_new(void);
sl@0
   244
RSA *	RSA_new_method(ENGINE *engine);
sl@0
   245
int	RSA_size(const RSA *);
sl@0
   246
sl@0
   247
/* Deprecated version */
sl@0
   248
#ifndef OPENSSL_NO_DEPRECATED
sl@0
   249
RSA *	RSA_generate_key(int bits, unsigned long e,void
sl@0
   250
		(*callback)(int,int,void *),void *cb_arg);
sl@0
   251
#endif /* !defined(OPENSSL_NO_DEPRECATED) */
sl@0
   252
sl@0
   253
/* New version */
sl@0
   254
IMPORT_C int	RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
sl@0
   255
sl@0
   256
IMPORT_C int	RSA_check_key(const RSA *);
sl@0
   257
	/* next 4 return -1 on error */
sl@0
   258
IMPORT_C int	RSA_public_encrypt(int flen, const unsigned char *from,
sl@0
   259
		unsigned char *to, RSA *rsa,int padding);
sl@0
   260
IMPORT_C int	RSA_private_encrypt(int flen, const unsigned char *from,
sl@0
   261
		unsigned char *to, RSA *rsa,int padding);
sl@0
   262
IMPORT_C int	RSA_public_decrypt(int flen, const unsigned char *from, 
sl@0
   263
		unsigned char *to, RSA *rsa,int padding);
sl@0
   264
IMPORT_C int	RSA_private_decrypt(int flen, const unsigned char *from, 
sl@0
   265
		unsigned char *to, RSA *rsa,int padding);
sl@0
   266
IMPORT_C void	RSA_free (RSA *r);
sl@0
   267
/* "up" the RSA object's reference count */
sl@0
   268
IMPORT_C int	RSA_up_ref(RSA *r);
sl@0
   269
sl@0
   270
IMPORT_C int	RSA_flags(const RSA *r);
sl@0
   271
sl@0
   272
IMPORT_C void RSA_set_default_method(const RSA_METHOD *meth);
sl@0
   273
IMPORT_C const RSA_METHOD *RSA_get_default_method(void);
sl@0
   274
IMPORT_C const RSA_METHOD *RSA_get_method(const RSA *rsa);
sl@0
   275
IMPORT_C int RSA_set_method(RSA *rsa, const RSA_METHOD *meth);
sl@0
   276
sl@0
   277
/* This function needs the memory locking malloc callbacks to be installed */
sl@0
   278
IMPORT_C int RSA_memory_lock(RSA *r);
sl@0
   279
sl@0
   280
/* these are the actual SSLeay RSA functions */
sl@0
   281
IMPORT_C const RSA_METHOD *RSA_PKCS1_SSLeay(void);
sl@0
   282
sl@0
   283
IMPORT_C const RSA_METHOD *RSA_null_method(void);
sl@0
   284
sl@0
   285
DECLARE_ASN1_ENCODE_FUNCTIONS_const(RSA, RSAPublicKey)
sl@0
   286
DECLARE_ASN1_ENCODE_FUNCTIONS_const(RSA, RSAPrivateKey)
sl@0
   287
sl@0
   288
#ifndef OPENSSL_NO_FP_API
sl@0
   289
IMPORT_C int	RSA_print_fp(FILE *fp, const RSA *r,int offset);
sl@0
   290
#endif
sl@0
   291
sl@0
   292
#ifndef OPENSSL_NO_BIO
sl@0
   293
IMPORT_C int	RSA_print(BIO *bp, const RSA *r,int offset);
sl@0
   294
#endif
sl@0
   295
sl@0
   296
IMPORT_C int i2d_RSA_NET(const RSA *a, unsigned char **pp,
sl@0
   297
		int (*cb)(char *buf, int len, const char *prompt, int verify),
sl@0
   298
		int sgckey);
sl@0
   299
IMPORT_C RSA *d2i_RSA_NET(RSA **a, const unsigned char **pp, long length,
sl@0
   300
		 int (*cb)(char *buf, int len, const char *prompt, int verify),
sl@0
   301
		 int sgckey);
sl@0
   302
sl@0
   303
IMPORT_C int i2d_Netscape_RSA(const RSA *a, unsigned char **pp,
sl@0
   304
		     int (*cb)(char *buf, int len, const char *prompt,
sl@0
   305
			       int verify));
sl@0
   306
IMPORT_C RSA *d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length,
sl@0
   307
		      int (*cb)(char *buf, int len, const char *prompt,
sl@0
   308
				int verify));
sl@0
   309
sl@0
   310
/* The following 2 functions sign and verify a X509_SIG ASN1 object
sl@0
   311
 * inside PKCS#1 padded RSA encryption */
sl@0
   312
IMPORT_C int RSA_sign(int type, const unsigned char *m, unsigned int m_length,
sl@0
   313
	unsigned char *sigret, unsigned int *siglen, RSA *rsa);
sl@0
   314
IMPORT_C int RSA_verify(int type, const unsigned char *m, unsigned int m_length,
sl@0
   315
	unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
sl@0
   316
sl@0
   317
/* The following 2 function sign and verify a ASN1_OCTET_STRING
sl@0
   318
 * object inside PKCS#1 padded RSA encryption */
sl@0
   319
IMPORT_C int RSA_sign_ASN1_OCTET_STRING(int type,
sl@0
   320
	const unsigned char *m, unsigned int m_length,
sl@0
   321
	unsigned char *sigret, unsigned int *siglen, RSA *rsa);
sl@0
   322
IMPORT_C int RSA_verify_ASN1_OCTET_STRING(int type,
sl@0
   323
	const unsigned char *m, unsigned int m_length,
sl@0
   324
	unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
sl@0
   325
sl@0
   326
IMPORT_C int RSA_blinding_on(RSA *rsa, BN_CTX *ctx);
sl@0
   327
IMPORT_C void RSA_blinding_off(RSA *rsa);
sl@0
   328
IMPORT_C BN_BLINDING *RSA_setup_blinding(RSA *rsa, BN_CTX *ctx);
sl@0
   329
sl@0
   330
IMPORT_C int RSA_padding_add_PKCS1_type_1(unsigned char *to,int tlen,
sl@0
   331
	const unsigned char *f,int fl);
sl@0
   332
IMPORT_C int RSA_padding_check_PKCS1_type_1(unsigned char *to,int tlen,
sl@0
   333
	const unsigned char *f,int fl,int rsa_len);
sl@0
   334
IMPORT_C int RSA_padding_add_PKCS1_type_2(unsigned char *to,int tlen,
sl@0
   335
	const unsigned char *f,int fl);
sl@0
   336
IMPORT_C int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen,
sl@0
   337
	const unsigned char *f,int fl,int rsa_len);
sl@0
   338
IMPORT_C int PKCS1_MGF1(unsigned char *mask, long len,
sl@0
   339
	const unsigned char *seed, long seedlen, const EVP_MD *dgst);
sl@0
   340
IMPORT_C int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen,
sl@0
   341
	const unsigned char *f,int fl,
sl@0
   342
	const unsigned char *p,int pl);
sl@0
   343
IMPORT_C int RSA_padding_check_PKCS1_OAEP(unsigned char *to,int tlen,
sl@0
   344
	const unsigned char *f,int fl,int rsa_len,
sl@0
   345
	const unsigned char *p,int pl);
sl@0
   346
IMPORT_C int RSA_padding_add_SSLv23(unsigned char *to,int tlen,
sl@0
   347
	const unsigned char *f,int fl);
sl@0
   348
IMPORT_C int RSA_padding_check_SSLv23(unsigned char *to,int tlen,
sl@0
   349
	const unsigned char *f,int fl,int rsa_len);
sl@0
   350
IMPORT_C int RSA_padding_add_none(unsigned char *to,int tlen,
sl@0
   351
	const unsigned char *f,int fl);
sl@0
   352
IMPORT_C int RSA_padding_check_none(unsigned char *to,int tlen,
sl@0
   353
	const unsigned char *f,int fl,int rsa_len);
sl@0
   354
IMPORT_C int RSA_padding_add_X931(unsigned char *to,int tlen,
sl@0
   355
	const unsigned char *f,int fl);
sl@0
   356
IMPORT_C int RSA_padding_check_X931(unsigned char *to,int tlen,
sl@0
   357
	const unsigned char *f,int fl,int rsa_len);
sl@0
   358
IMPORT_C int RSA_X931_hash_id(int nid);
sl@0
   359
sl@0
   360
IMPORT_C int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash,
sl@0
   361
			const EVP_MD *Hash, const unsigned char *EM, int sLen);
sl@0
   362
IMPORT_C int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM,
sl@0
   363
			const unsigned char *mHash,
sl@0
   364
			const EVP_MD *Hash, int sLen);
sl@0
   365
sl@0
   366
IMPORT_C int RSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
sl@0
   367
	CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
sl@0
   368
IMPORT_C int RSA_set_ex_data(RSA *r,int idx,void *arg);
sl@0
   369
IMPORT_C void *RSA_get_ex_data(const RSA *r, int idx);
sl@0
   370
sl@0
   371
IMPORT_C RSA *RSAPublicKey_dup(RSA *rsa);
sl@0
   372
IMPORT_C RSA *RSAPrivateKey_dup(RSA *rsa);
sl@0
   373
sl@0
   374
/* BEGIN ERROR CODES */
sl@0
   375
/* The following lines are auto generated by the script mkerr.pl. Any changes
sl@0
   376
 * made after this point may be overwritten when the script is next run.
sl@0
   377
 */
sl@0
   378
IMPORT_C void ERR_load_RSA_strings(void);
sl@0
   379
sl@0
   380
/* Error codes for the RSA functions. */
sl@0
   381
sl@0
   382
/* Function codes. */
sl@0
   383
#define RSA_F_MEMORY_LOCK				 100
sl@0
   384
#define RSA_F_RSA_BUILTIN_KEYGEN			 129
sl@0
   385
#define RSA_F_RSA_CHECK_KEY				 123
sl@0
   386
#define RSA_F_RSA_EAY_PRIVATE_DECRYPT			 101
sl@0
   387
#define RSA_F_RSA_EAY_PRIVATE_ENCRYPT			 102
sl@0
   388
#define RSA_F_RSA_EAY_PUBLIC_DECRYPT			 103
sl@0
   389
#define RSA_F_RSA_EAY_PUBLIC_ENCRYPT			 104
sl@0
   390
#define RSA_F_RSA_GENERATE_KEY				 105
sl@0
   391
#define RSA_F_RSA_MEMORY_LOCK				 130
sl@0
   392
#define RSA_F_RSA_NEW_METHOD				 106
sl@0
   393
#define RSA_F_RSA_NULL					 124
sl@0
   394
#define RSA_F_RSA_NULL_MOD_EXP				 131
sl@0
   395
#define RSA_F_RSA_NULL_PRIVATE_DECRYPT			 132
sl@0
   396
#define RSA_F_RSA_NULL_PRIVATE_ENCRYPT			 133
sl@0
   397
#define RSA_F_RSA_NULL_PUBLIC_DECRYPT			 134
sl@0
   398
#define RSA_F_RSA_NULL_PUBLIC_ENCRYPT			 135
sl@0
   399
#define RSA_F_RSA_PADDING_ADD_NONE			 107
sl@0
   400
#define RSA_F_RSA_PADDING_ADD_PKCS1_OAEP		 121
sl@0
   401
#define RSA_F_RSA_PADDING_ADD_PKCS1_PSS			 125
sl@0
   402
#define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1		 108
sl@0
   403
#define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2		 109
sl@0
   404
#define RSA_F_RSA_PADDING_ADD_SSLV23			 110
sl@0
   405
#define RSA_F_RSA_PADDING_ADD_X931			 127
sl@0
   406
#define RSA_F_RSA_PADDING_CHECK_NONE			 111
sl@0
   407
#define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP		 122
sl@0
   408
#define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1		 112
sl@0
   409
#define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2		 113
sl@0
   410
#define RSA_F_RSA_PADDING_CHECK_SSLV23			 114
sl@0
   411
#define RSA_F_RSA_PADDING_CHECK_X931			 128
sl@0
   412
#define RSA_F_RSA_PRINT					 115
sl@0
   413
#define RSA_F_RSA_PRINT_FP				 116
sl@0
   414
#define RSA_F_RSA_SETUP_BLINDING			 136
sl@0
   415
#define RSA_F_RSA_SIGN					 117
sl@0
   416
#define RSA_F_RSA_SIGN_ASN1_OCTET_STRING		 118
sl@0
   417
#define RSA_F_RSA_VERIFY				 119
sl@0
   418
#define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING		 120
sl@0
   419
#define RSA_F_RSA_VERIFY_PKCS1_PSS			 126
sl@0
   420
sl@0
   421
/* Reason codes. */
sl@0
   422
#define RSA_R_ALGORITHM_MISMATCH			 100
sl@0
   423
#define RSA_R_BAD_E_VALUE				 101
sl@0
   424
#define RSA_R_BAD_FIXED_HEADER_DECRYPT			 102
sl@0
   425
#define RSA_R_BAD_PAD_BYTE_COUNT			 103
sl@0
   426
#define RSA_R_BAD_SIGNATURE				 104
sl@0
   427
#define RSA_R_BLOCK_TYPE_IS_NOT_01			 106
sl@0
   428
#define RSA_R_BLOCK_TYPE_IS_NOT_02			 107
sl@0
   429
#define RSA_R_DATA_GREATER_THAN_MOD_LEN			 108
sl@0
   430
#define RSA_R_DATA_TOO_LARGE				 109
sl@0
   431
#define RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE		 110
sl@0
   432
#define RSA_R_DATA_TOO_LARGE_FOR_MODULUS		 132
sl@0
   433
#define RSA_R_DATA_TOO_SMALL				 111
sl@0
   434
#define RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE		 122
sl@0
   435
#define RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY		 112
sl@0
   436
#define RSA_R_DMP1_NOT_CONGRUENT_TO_D			 124
sl@0
   437
#define RSA_R_DMQ1_NOT_CONGRUENT_TO_D			 125
sl@0
   438
#define RSA_R_D_E_NOT_CONGRUENT_TO_1			 123
sl@0
   439
#define RSA_R_FIRST_OCTET_INVALID			 133
sl@0
   440
#define RSA_R_INVALID_HEADER				 137
sl@0
   441
#define RSA_R_INVALID_MESSAGE_LENGTH			 131
sl@0
   442
#define RSA_R_INVALID_PADDING				 138
sl@0
   443
#define RSA_R_INVALID_TRAILER				 139
sl@0
   444
#define RSA_R_IQMP_NOT_INVERSE_OF_Q			 126
sl@0
   445
#define RSA_R_KEY_SIZE_TOO_SMALL			 120
sl@0
   446
#define RSA_R_LAST_OCTET_INVALID			 134
sl@0
   447
#define RSA_R_MODULUS_TOO_LARGE				 105
sl@0
   448
#define RSA_R_NO_PUBLIC_EXPONENT			 140
sl@0
   449
#define RSA_R_NULL_BEFORE_BLOCK_MISSING			 113
sl@0
   450
#define RSA_R_N_DOES_NOT_EQUAL_P_Q			 127
sl@0
   451
#define RSA_R_OAEP_DECODING_ERROR			 121
sl@0
   452
#define RSA_R_SLEN_RECOVERY_FAILED			 135
sl@0
   453
#define RSA_R_PADDING_CHECK_FAILED			 114
sl@0
   454
#define RSA_R_P_NOT_PRIME				 128
sl@0
   455
#define RSA_R_Q_NOT_PRIME				 129
sl@0
   456
#define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED		 130
sl@0
   457
#define RSA_R_SSLV3_ROLLBACK_ATTACK			 115
sl@0
   458
#define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116
sl@0
   459
#define RSA_R_UNKNOWN_ALGORITHM_TYPE			 117
sl@0
   460
#define RSA_R_UNKNOWN_PADDING_TYPE			 118
sl@0
   461
#define RSA_R_WRONG_SIGNATURE_LENGTH			 119
sl@0
   462
#define RSA_R_SLEN_CHECK_FAILED				 136
sl@0
   463
sl@0
   464
#ifdef  __cplusplus
sl@0
   465
}
sl@0
   466
#endif
sl@0
   467
#endif