epoc32/include/stdapis/openssl/rsa.h
author William Roberts <williamr@symbian.org>
Wed, 31 Mar 2010 12:27:01 +0100
branchSymbian2
changeset 3 e1b950c65cb4
parent 0 061f57f2323e
permissions -rw-r--r--
Attempt to represent the S^2->S^3 header reorganisation as a series of "hg rename" operations
williamr@2
     1
/* crypto/rsa/rsa.h */
williamr@2
     2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
williamr@2
     3
 * All rights reserved.
williamr@2
     4
 *
williamr@2
     5
 * This package is an SSL implementation written
williamr@2
     6
 * by Eric Young (eay@cryptsoft.com).
williamr@2
     7
 * The implementation was written so as to conform with Netscapes SSL.
williamr@2
     8
 * 
williamr@2
     9
 * This library is free for commercial and non-commercial use as long as
williamr@2
    10
 * the following conditions are aheared to.  The following conditions
williamr@2
    11
 * apply to all code found in this distribution, be it the RC4, RSA,
williamr@2
    12
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
williamr@2
    13
 * included with this distribution is covered by the same copyright terms
williamr@2
    14
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
williamr@2
    15
 * 
williamr@2
    16
 * Copyright remains Eric Young's, and as such any Copyright notices in
williamr@2
    17
 * the code are not to be removed.
williamr@2
    18
 * If this package is used in a product, Eric Young should be given attribution
williamr@2
    19
 * as the author of the parts of the library used.
williamr@2
    20
 * This can be in the form of a textual message at program startup or
williamr@2
    21
 * in documentation (online or textual) provided with the package.
williamr@2
    22
 * 
williamr@2
    23
 * Redistribution and use in source and binary forms, with or without
williamr@2
    24
 * modification, are permitted provided that the following conditions
williamr@2
    25
 * are met:
williamr@2
    26
 * 1. Redistributions of source code must retain the copyright
williamr@2
    27
 *    notice, this list of conditions and the following disclaimer.
williamr@2
    28
 * 2. Redistributions in binary form must reproduce the above copyright
williamr@2
    29
 *    notice, this list of conditions and the following disclaimer in the
williamr@2
    30
 *    documentation and/or other materials provided with the distribution.
williamr@2
    31
 * 3. All advertising materials mentioning features or use of this software
williamr@2
    32
 *    must display the following acknowledgement:
williamr@2
    33
 *    "This product includes cryptographic software written by
williamr@2
    34
 *     Eric Young (eay@cryptsoft.com)"
williamr@2
    35
 *    The word 'cryptographic' can be left out if the rouines from the library
williamr@2
    36
 *    being used are not cryptographic related :-).
williamr@2
    37
 * 4. If you include any Windows specific code (or a derivative thereof) from 
williamr@2
    38
 *    the apps directory (application code) you must include an acknowledgement:
williamr@2
    39
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
williamr@2
    40
 * 
williamr@2
    41
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
williamr@2
    42
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
williamr@2
    43
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
williamr@2
    44
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
williamr@2
    45
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
williamr@2
    46
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
williamr@2
    47
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
williamr@2
    48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
williamr@2
    49
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
williamr@2
    50
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
williamr@2
    51
 * SUCH DAMAGE.
williamr@2
    52
 * 
williamr@2
    53
 * The licence and distribution terms for any publically available version or
williamr@2
    54
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
williamr@2
    55
 * copied and put under another distribution licence
williamr@2
    56
 * [including the GNU Public Licence.]
williamr@2
    57
 */
williamr@2
    58
/*
williamr@2
    59
 © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
williamr@2
    60
 */
williamr@2
    61
williamr@2
    62
#ifndef HEADER_RSA_H
williamr@2
    63
#define HEADER_RSA_H
williamr@2
    64
williamr@2
    65
#if (defined(__SYMBIAN32__) && !defined(SYMBIAN))
williamr@2
    66
#define SYMBIAN
williamr@2
    67
#endif
williamr@2
    68
williamr@2
    69
#ifdef SYMBIAN
williamr@2
    70
#include <e32def.h>
williamr@2
    71
#endif
williamr@2
    72
#include <openssl/asn1.h>
williamr@2
    73
williamr@2
    74
#ifndef OPENSSL_NO_BIO
williamr@2
    75
#include <openssl/bio.h>
williamr@2
    76
#endif
williamr@2
    77
#include <openssl/crypto.h>
williamr@2
    78
#include <openssl/ossl_typ.h>
williamr@2
    79
#ifndef OPENSSL_NO_DEPRECATED
williamr@2
    80
#include <openssl/bn.h>
williamr@2
    81
#endif
williamr@2
    82
williamr@2
    83
#ifdef OPENSSL_NO_RSA
williamr@2
    84
#error RSA is disabled.
williamr@2
    85
#endif
williamr@2
    86
williamr@2
    87
#ifdef  __cplusplus
williamr@2
    88
extern "C" {
williamr@2
    89
#endif
williamr@2
    90
williamr@2
    91
/* Declared already in ossl_typ.h */
williamr@2
    92
/* typedef struct rsa_st RSA; */
williamr@2
    93
/* typedef struct rsa_meth_st RSA_METHOD; */
williamr@2
    94
williamr@2
    95
struct rsa_meth_st
williamr@2
    96
	{
williamr@2
    97
	const char *name;
williamr@2
    98
	int (*rsa_pub_enc)(int flen,const unsigned char *from,
williamr@2
    99
			   unsigned char *to,
williamr@2
   100
			   RSA *rsa,int padding);
williamr@2
   101
	int (*rsa_pub_dec)(int flen,const unsigned char *from,
williamr@2
   102
			   unsigned char *to,
williamr@2
   103
			   RSA *rsa,int padding);
williamr@2
   104
	int (*rsa_priv_enc)(int flen,const unsigned char *from,
williamr@2
   105
			    unsigned char *to,
williamr@2
   106
			    RSA *rsa,int padding);
williamr@2
   107
	int (*rsa_priv_dec)(int flen,const unsigned char *from,
williamr@2
   108
			    unsigned char *to,
williamr@2
   109
			    RSA *rsa,int padding);
williamr@2
   110
	int (*rsa_mod_exp)(BIGNUM *r0,const BIGNUM *I,RSA *rsa,BN_CTX *ctx); /* Can be null */
williamr@2
   111
	int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
williamr@2
   112
			  const BIGNUM *m, BN_CTX *ctx,
williamr@2
   113
			  BN_MONT_CTX *m_ctx); /* Can be null */
williamr@2
   114
	int (*init)(RSA *rsa);		/* called at new */
williamr@2
   115
	int (*finish)(RSA *rsa);	/* called at free */
williamr@2
   116
	int flags;			/* RSA_METHOD_FLAG_* things */
williamr@2
   117
	char *app_data;			/* may be needed! */
williamr@2
   118
/* New sign and verify functions: some libraries don't allow arbitrary data
williamr@2
   119
 * to be signed/verified: this allows them to be used. Note: for this to work
williamr@2
   120
 * the RSA_public_decrypt() and RSA_private_encrypt() should *NOT* be used
williamr@2
   121
 * RSA_sign(), RSA_verify() should be used instead. Note: for backwards
williamr@2
   122
 * compatibility this functionality is only enabled if the RSA_FLAG_SIGN_VER
williamr@2
   123
 * option is set in 'flags'.
williamr@2
   124
 */
williamr@2
   125
	int (*rsa_sign)(int type,
williamr@2
   126
		const unsigned char *m, unsigned int m_length,
williamr@2
   127
		unsigned char *sigret, unsigned int *siglen, const RSA *rsa);
williamr@2
   128
	int (*rsa_verify)(int dtype,
williamr@2
   129
		const unsigned char *m, unsigned int m_length,
williamr@2
   130
		unsigned char *sigbuf, unsigned int siglen, const RSA *rsa);
williamr@2
   131
/* If this callback is NULL, the builtin software RSA key-gen will be used. This
williamr@2
   132
 * is for behavioural compatibility whilst the code gets rewired, but one day
williamr@2
   133
 * it would be nice to assume there are no such things as "builtin software"
williamr@2
   134
 * implementations. */
williamr@2
   135
	int (*rsa_keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
williamr@2
   136
	};
williamr@2
   137
williamr@2
   138
struct rsa_st
williamr@2
   139
	{
williamr@2
   140
	/* The first parameter is used to pickup errors where
williamr@2
   141
	 * this is passed instead of aEVP_PKEY, it is set to 0 */
williamr@2
   142
	int pad;
williamr@2
   143
	long version;
williamr@2
   144
	const RSA_METHOD *meth;
williamr@2
   145
	/* functional reference if 'meth' is ENGINE-provided */
williamr@2
   146
	ENGINE *engine;
williamr@2
   147
	BIGNUM *n;
williamr@2
   148
	BIGNUM *e;
williamr@2
   149
	BIGNUM *d;
williamr@2
   150
	BIGNUM *p;
williamr@2
   151
	BIGNUM *q;
williamr@2
   152
	BIGNUM *dmp1;
williamr@2
   153
	BIGNUM *dmq1;
williamr@2
   154
	BIGNUM *iqmp;
williamr@2
   155
	/* be careful using this if the RSA structure is shared */
williamr@2
   156
	CRYPTO_EX_DATA ex_data;
williamr@2
   157
	int references;
williamr@2
   158
	int flags;
williamr@2
   159
williamr@2
   160
	/* Used to cache montgomery values */
williamr@2
   161
	BN_MONT_CTX *_method_mod_n;
williamr@2
   162
	BN_MONT_CTX *_method_mod_p;
williamr@2
   163
	BN_MONT_CTX *_method_mod_q;
williamr@2
   164
williamr@2
   165
	/* all BIGNUM values are actually in the following data, if it is not
williamr@2
   166
	 * NULL */
williamr@2
   167
	char *bignum_data;
williamr@2
   168
	BN_BLINDING *blinding;
williamr@2
   169
	BN_BLINDING *mt_blinding;
williamr@2
   170
	};
williamr@2
   171
#ifndef OPENSSL_RSA_MAX_MODULUS_BITS
williamr@2
   172
# define OPENSSL_RSA_MAX_MODULUS_BITS	16384
williamr@2
   173
#endif
williamr@2
   174
williamr@2
   175
#ifndef OPENSSL_RSA_SMALL_MODULUS_BITS
williamr@2
   176
# define OPENSSL_RSA_SMALL_MODULUS_BITS	3072
williamr@2
   177
#endif
williamr@2
   178
#ifndef OPENSSL_RSA_MAX_PUBEXP_BITS
williamr@2
   179
# define OPENSSL_RSA_MAX_PUBEXP_BITS	64 /* exponent limit enforced for "large" modulus only */
williamr@2
   180
#endif
williamr@2
   181
williamr@2
   182
williamr@2
   183
#define RSA_3	0x3L
williamr@2
   184
#define RSA_F4	0x10001L
williamr@2
   185
williamr@2
   186
#define RSA_METHOD_FLAG_NO_CHECK	0x0001 /* don't check pub/private match */
williamr@2
   187
williamr@2
   188
#define RSA_FLAG_CACHE_PUBLIC		0x0002
williamr@2
   189
#define RSA_FLAG_CACHE_PRIVATE		0x0004
williamr@2
   190
#define RSA_FLAG_BLINDING		0x0008
williamr@2
   191
#define RSA_FLAG_THREAD_SAFE		0x0010
williamr@2
   192
/* This flag means the private key operations will be handled by rsa_mod_exp
williamr@2
   193
 * and that they do not depend on the private key components being present:
williamr@2
   194
 * for example a key stored in external hardware. Without this flag bn_mod_exp
williamr@2
   195
 * gets called when private key components are absent.
williamr@2
   196
 */
williamr@2
   197
#define RSA_FLAG_EXT_PKEY		0x0020
williamr@2
   198
williamr@2
   199
/* This flag in the RSA_METHOD enables the new rsa_sign, rsa_verify functions.
williamr@2
   200
 */
williamr@2
   201
#define RSA_FLAG_SIGN_VER		0x0040
williamr@2
   202
williamr@2
   203
#define RSA_FLAG_NO_BLINDING		0x0080 /* new with 0.9.6j and 0.9.7b; the built-in
williamr@2
   204
                                                * RSA implementation now uses blinding by
williamr@2
   205
                                                * default (ignoring RSA_FLAG_BLINDING),
williamr@2
   206
                                                * but other engines might not need it
williamr@2
   207
                                                */
williamr@2
   208
#define RSA_FLAG_NO_CONSTTIME		0x0100 /* new with 0.9.8f; the built-in RSA
williamr@2
   209
						* implementation now uses constant time
williamr@2
   210
						* operations by default in private key operations,
williamr@2
   211
						* e.g., constant time modular exponentiation, 
williamr@2
   212
                                                * modular inverse without leaking branches, 
williamr@2
   213
                                                * division without leaking branches. This 
williamr@2
   214
                                                * flag disables these constant time 
williamr@2
   215
                                                * operations and results in faster RSA 
williamr@2
   216
                                                * private key operations.
williamr@2
   217
                                                */ 
williamr@2
   218
#ifndef OPENSSL_NO_DEPRECATED
williamr@2
   219
#define RSA_FLAG_NO_EXP_CONSTTIME RSA_FLAG_NO_CONSTTIME /* deprecated name for the flag*/
williamr@2
   220
                                                /* new with 0.9.7h; the built-in RSA
williamr@2
   221
                                                * implementation now uses constant time
williamr@2
   222
                                                * modular exponentiation for secret exponents
williamr@2
   223
                                                * by default. This flag causes the
williamr@2
   224
                                                * faster variable sliding window method to
williamr@2
   225
                                                * be used for all exponents.
williamr@2
   226
                                                */
williamr@2
   227
#endif
williamr@2
   228
williamr@2
   229
#ifdef	SYMBIAN
williamr@2
   230
#define RSA_FLAG_NO_EXP_CONSTTIME RSA_FLAG_NO_CONSTTIME // if user not undef OPENSSL_NO_DEPRECATED
williamr@2
   231
#endif
williamr@2
   232
#define RSA_PKCS1_PADDING	1
williamr@2
   233
#define RSA_SSLV23_PADDING	2
williamr@2
   234
#define RSA_NO_PADDING		3
williamr@2
   235
#define RSA_PKCS1_OAEP_PADDING	4
williamr@2
   236
#define RSA_X931_PADDING	5
williamr@2
   237
williamr@2
   238
#define RSA_PKCS1_PADDING_SIZE	11
williamr@2
   239
williamr@2
   240
#define RSA_set_app_data(s,arg)         RSA_set_ex_data(s,0,arg)
williamr@2
   241
#define RSA_get_app_data(s)             RSA_get_ex_data(s,0)
williamr@2
   242
williamr@2
   243
IMPORT_C RSA *	RSA_new(void);
williamr@2
   244
RSA *	RSA_new_method(ENGINE *engine);
williamr@2
   245
IMPORT_C int	RSA_size(const RSA *);
williamr@2
   246
williamr@2
   247
/* Deprecated version */
williamr@2
   248
#ifndef OPENSSL_NO_DEPRECATED
williamr@2
   249
RSA *	RSA_generate_key(int bits, unsigned long e,void
williamr@2
   250
		(*callback)(int,int,void *),void *cb_arg);
williamr@2
   251
#endif /* !defined(OPENSSL_NO_DEPRECATED) */
williamr@2
   252
williamr@2
   253
/* New version */
williamr@2
   254
IMPORT_C int	RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
williamr@2
   255
williamr@2
   256
IMPORT_C int	RSA_check_key(const RSA *);
williamr@2
   257
	/* next 4 return -1 on error */
williamr@2
   258
IMPORT_C int	RSA_public_encrypt(int flen, const unsigned char *from,
williamr@2
   259
		unsigned char *to, RSA *rsa,int padding);
williamr@2
   260
IMPORT_C int	RSA_private_encrypt(int flen, const unsigned char *from,
williamr@2
   261
		unsigned char *to, RSA *rsa,int padding);
williamr@2
   262
IMPORT_C int	RSA_public_decrypt(int flen, const unsigned char *from, 
williamr@2
   263
		unsigned char *to, RSA *rsa,int padding);
williamr@2
   264
IMPORT_C int	RSA_private_decrypt(int flen, const unsigned char *from, 
williamr@2
   265
		unsigned char *to, RSA *rsa,int padding);
williamr@2
   266
IMPORT_C void	RSA_free (RSA *r);
williamr@2
   267
/* "up" the RSA object's reference count */
williamr@2
   268
IMPORT_C int	RSA_up_ref(RSA *r);
williamr@2
   269
williamr@2
   270
IMPORT_C int	RSA_flags(const RSA *r);
williamr@2
   271
williamr@2
   272
IMPORT_C void RSA_set_default_method(const RSA_METHOD *meth);
williamr@2
   273
IMPORT_C const RSA_METHOD *RSA_get_default_method(void);
williamr@2
   274
IMPORT_C const RSA_METHOD *RSA_get_method(const RSA *rsa);
williamr@2
   275
IMPORT_C int RSA_set_method(RSA *rsa, const RSA_METHOD *meth);
williamr@2
   276
williamr@2
   277
/* This function needs the memory locking malloc callbacks to be installed */
williamr@2
   278
IMPORT_C int RSA_memory_lock(RSA *r);
williamr@2
   279
williamr@2
   280
/* these are the actual SSLeay RSA functions */
williamr@2
   281
IMPORT_C const RSA_METHOD *RSA_PKCS1_SSLeay(void);
williamr@2
   282
williamr@2
   283
IMPORT_C const RSA_METHOD *RSA_null_method(void);
williamr@2
   284
williamr@2
   285
DECLARE_ASN1_ENCODE_FUNCTIONS_const(RSA, RSAPublicKey)
williamr@2
   286
DECLARE_ASN1_ENCODE_FUNCTIONS_const(RSA, RSAPrivateKey)
williamr@2
   287
williamr@2
   288
#ifndef OPENSSL_NO_FP_API
williamr@2
   289
IMPORT_C int	RSA_print_fp(FILE *fp, const RSA *r,int offset);
williamr@2
   290
#endif
williamr@2
   291
williamr@2
   292
#ifndef OPENSSL_NO_BIO
williamr@2
   293
IMPORT_C int	RSA_print(BIO *bp, const RSA *r,int offset);
williamr@2
   294
#endif
williamr@2
   295
williamr@2
   296
IMPORT_C int i2d_RSA_NET(const RSA *a, unsigned char **pp,
williamr@2
   297
		int (*cb)(char *buf, int len, const char *prompt, int verify),
williamr@2
   298
		int sgckey);
williamr@2
   299
IMPORT_C RSA *d2i_RSA_NET(RSA **a, const unsigned char **pp, long length,
williamr@2
   300
		 int (*cb)(char *buf, int len, const char *prompt, int verify),
williamr@2
   301
		 int sgckey);
williamr@2
   302
williamr@2
   303
IMPORT_C int i2d_Netscape_RSA(const RSA *a, unsigned char **pp,
williamr@2
   304
		     int (*cb)(char *buf, int len, const char *prompt,
williamr@2
   305
			       int verify));
williamr@2
   306
IMPORT_C RSA *d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length,
williamr@2
   307
		      int (*cb)(char *buf, int len, const char *prompt,
williamr@2
   308
				int verify));
williamr@2
   309
williamr@2
   310
/* The following 2 functions sign and verify a X509_SIG ASN1 object
williamr@2
   311
 * inside PKCS#1 padded RSA encryption */
williamr@2
   312
IMPORT_C int RSA_sign(int type, const unsigned char *m, unsigned int m_length,
williamr@2
   313
	unsigned char *sigret, unsigned int *siglen, RSA *rsa);
williamr@2
   314
IMPORT_C int RSA_verify(int type, const unsigned char *m, unsigned int m_length,
williamr@2
   315
	unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
williamr@2
   316
williamr@2
   317
/* The following 2 function sign and verify a ASN1_OCTET_STRING
williamr@2
   318
 * object inside PKCS#1 padded RSA encryption */
williamr@2
   319
IMPORT_C int RSA_sign_ASN1_OCTET_STRING(int type,
williamr@2
   320
	const unsigned char *m, unsigned int m_length,
williamr@2
   321
	unsigned char *sigret, unsigned int *siglen, RSA *rsa);
williamr@2
   322
IMPORT_C int RSA_verify_ASN1_OCTET_STRING(int type,
williamr@2
   323
	const unsigned char *m, unsigned int m_length,
williamr@2
   324
	unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
williamr@2
   325
williamr@2
   326
IMPORT_C int RSA_blinding_on(RSA *rsa, BN_CTX *ctx);
williamr@2
   327
IMPORT_C void RSA_blinding_off(RSA *rsa);
williamr@2
   328
IMPORT_C BN_BLINDING *RSA_setup_blinding(RSA *rsa, BN_CTX *ctx);
williamr@2
   329
williamr@2
   330
IMPORT_C int RSA_padding_add_PKCS1_type_1(unsigned char *to,int tlen,
williamr@2
   331
	const unsigned char *f,int fl);
williamr@2
   332
IMPORT_C int RSA_padding_check_PKCS1_type_1(unsigned char *to,int tlen,
williamr@2
   333
	const unsigned char *f,int fl,int rsa_len);
williamr@2
   334
IMPORT_C int RSA_padding_add_PKCS1_type_2(unsigned char *to,int tlen,
williamr@2
   335
	const unsigned char *f,int fl);
williamr@2
   336
IMPORT_C int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen,
williamr@2
   337
	const unsigned char *f,int fl,int rsa_len);
williamr@2
   338
IMPORT_C int PKCS1_MGF1(unsigned char *mask, long len,
williamr@2
   339
	const unsigned char *seed, long seedlen, const EVP_MD *dgst);
williamr@2
   340
IMPORT_C int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen,
williamr@2
   341
	const unsigned char *f,int fl,
williamr@2
   342
	const unsigned char *p,int pl);
williamr@2
   343
IMPORT_C int RSA_padding_check_PKCS1_OAEP(unsigned char *to,int tlen,
williamr@2
   344
	const unsigned char *f,int fl,int rsa_len,
williamr@2
   345
	const unsigned char *p,int pl);
williamr@2
   346
IMPORT_C int RSA_padding_add_SSLv23(unsigned char *to,int tlen,
williamr@2
   347
	const unsigned char *f,int fl);
williamr@2
   348
IMPORT_C int RSA_padding_check_SSLv23(unsigned char *to,int tlen,
williamr@2
   349
	const unsigned char *f,int fl,int rsa_len);
williamr@2
   350
IMPORT_C int RSA_padding_add_none(unsigned char *to,int tlen,
williamr@2
   351
	const unsigned char *f,int fl);
williamr@2
   352
IMPORT_C int RSA_padding_check_none(unsigned char *to,int tlen,
williamr@2
   353
	const unsigned char *f,int fl,int rsa_len);
williamr@2
   354
IMPORT_C int RSA_padding_add_X931(unsigned char *to,int tlen,
williamr@2
   355
	const unsigned char *f,int fl);
williamr@2
   356
IMPORT_C int RSA_padding_check_X931(unsigned char *to,int tlen,
williamr@2
   357
	const unsigned char *f,int fl,int rsa_len);
williamr@2
   358
IMPORT_C int RSA_X931_hash_id(int nid);
williamr@2
   359
williamr@2
   360
IMPORT_C int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash,
williamr@2
   361
			const EVP_MD *Hash, const unsigned char *EM, int sLen);
williamr@2
   362
IMPORT_C int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM,
williamr@2
   363
			const unsigned char *mHash,
williamr@2
   364
			const EVP_MD *Hash, int sLen);
williamr@2
   365
williamr@2
   366
IMPORT_C int RSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
williamr@2
   367
	CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
williamr@2
   368
IMPORT_C int RSA_set_ex_data(RSA *r,int idx,void *arg);
williamr@2
   369
IMPORT_C void *RSA_get_ex_data(const RSA *r, int idx);
williamr@2
   370
williamr@2
   371
IMPORT_C RSA *RSAPublicKey_dup(RSA *rsa);
williamr@2
   372
IMPORT_C RSA *RSAPrivateKey_dup(RSA *rsa);
williamr@2
   373
williamr@2
   374
/* BEGIN ERROR CODES */
williamr@2
   375
/* The following lines are auto generated by the script mkerr.pl. Any changes
williamr@2
   376
 * made after this point may be overwritten when the script is next run.
williamr@2
   377
 */
williamr@2
   378
IMPORT_C void ERR_load_RSA_strings(void);
williamr@2
   379
williamr@2
   380
/* Error codes for the RSA functions. */
williamr@2
   381
williamr@2
   382
/* Function codes. */
williamr@2
   383
#define RSA_F_MEMORY_LOCK				 100
williamr@2
   384
#define RSA_F_RSA_BUILTIN_KEYGEN			 129
williamr@2
   385
#define RSA_F_RSA_CHECK_KEY				 123
williamr@2
   386
#define RSA_F_RSA_EAY_PRIVATE_DECRYPT			 101
williamr@2
   387
#define RSA_F_RSA_EAY_PRIVATE_ENCRYPT			 102
williamr@2
   388
#define RSA_F_RSA_EAY_PUBLIC_DECRYPT			 103
williamr@2
   389
#define RSA_F_RSA_EAY_PUBLIC_ENCRYPT			 104
williamr@2
   390
#define RSA_F_RSA_GENERATE_KEY				 105
williamr@2
   391
#define RSA_F_RSA_MEMORY_LOCK				 130
williamr@2
   392
#define RSA_F_RSA_NEW_METHOD				 106
williamr@2
   393
#define RSA_F_RSA_NULL					 124
williamr@2
   394
#define RSA_F_RSA_NULL_MOD_EXP				 131
williamr@2
   395
#define RSA_F_RSA_NULL_PRIVATE_DECRYPT			 132
williamr@2
   396
#define RSA_F_RSA_NULL_PRIVATE_ENCRYPT			 133
williamr@2
   397
#define RSA_F_RSA_NULL_PUBLIC_DECRYPT			 134
williamr@2
   398
#define RSA_F_RSA_NULL_PUBLIC_ENCRYPT			 135
williamr@2
   399
#define RSA_F_RSA_PADDING_ADD_NONE			 107
williamr@2
   400
#define RSA_F_RSA_PADDING_ADD_PKCS1_OAEP		 121
williamr@2
   401
#define RSA_F_RSA_PADDING_ADD_PKCS1_PSS			 125
williamr@2
   402
#define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1		 108
williamr@2
   403
#define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2		 109
williamr@2
   404
#define RSA_F_RSA_PADDING_ADD_SSLV23			 110
williamr@2
   405
#define RSA_F_RSA_PADDING_ADD_X931			 127
williamr@2
   406
#define RSA_F_RSA_PADDING_CHECK_NONE			 111
williamr@2
   407
#define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP		 122
williamr@2
   408
#define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1		 112
williamr@2
   409
#define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2		 113
williamr@2
   410
#define RSA_F_RSA_PADDING_CHECK_SSLV23			 114
williamr@2
   411
#define RSA_F_RSA_PADDING_CHECK_X931			 128
williamr@2
   412
#define RSA_F_RSA_PRINT					 115
williamr@2
   413
#define RSA_F_RSA_PRINT_FP				 116
williamr@2
   414
#define RSA_F_RSA_SETUP_BLINDING			 136
williamr@2
   415
#define RSA_F_RSA_SIGN					 117
williamr@2
   416
#define RSA_F_RSA_SIGN_ASN1_OCTET_STRING		 118
williamr@2
   417
#define RSA_F_RSA_VERIFY				 119
williamr@2
   418
#define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING		 120
williamr@2
   419
#define RSA_F_RSA_VERIFY_PKCS1_PSS			 126
williamr@2
   420
williamr@2
   421
/* Reason codes. */
williamr@2
   422
#define RSA_R_ALGORITHM_MISMATCH			 100
williamr@2
   423
#define RSA_R_BAD_E_VALUE				 101
williamr@2
   424
#define RSA_R_BAD_FIXED_HEADER_DECRYPT			 102
williamr@2
   425
#define RSA_R_BAD_PAD_BYTE_COUNT			 103
williamr@2
   426
#define RSA_R_BAD_SIGNATURE				 104
williamr@2
   427
#define RSA_R_BLOCK_TYPE_IS_NOT_01			 106
williamr@2
   428
#define RSA_R_BLOCK_TYPE_IS_NOT_02			 107
williamr@2
   429
#define RSA_R_DATA_GREATER_THAN_MOD_LEN			 108
williamr@2
   430
#define RSA_R_DATA_TOO_LARGE				 109
williamr@2
   431
#define RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE		 110
williamr@2
   432
#define RSA_R_DATA_TOO_LARGE_FOR_MODULUS		 132
williamr@2
   433
#define RSA_R_DATA_TOO_SMALL				 111
williamr@2
   434
#define RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE		 122
williamr@2
   435
#define RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY		 112
williamr@2
   436
#define RSA_R_DMP1_NOT_CONGRUENT_TO_D			 124
williamr@2
   437
#define RSA_R_DMQ1_NOT_CONGRUENT_TO_D			 125
williamr@2
   438
#define RSA_R_D_E_NOT_CONGRUENT_TO_1			 123
williamr@2
   439
#define RSA_R_FIRST_OCTET_INVALID			 133
williamr@2
   440
#define RSA_R_INVALID_HEADER				 137
williamr@2
   441
#define RSA_R_INVALID_MESSAGE_LENGTH			 131
williamr@2
   442
#define RSA_R_INVALID_PADDING				 138
williamr@2
   443
#define RSA_R_INVALID_TRAILER				 139
williamr@2
   444
#define RSA_R_IQMP_NOT_INVERSE_OF_Q			 126
williamr@2
   445
#define RSA_R_KEY_SIZE_TOO_SMALL			 120
williamr@2
   446
#define RSA_R_LAST_OCTET_INVALID			 134
williamr@2
   447
#define RSA_R_MODULUS_TOO_LARGE				 105
williamr@2
   448
#define RSA_R_NO_PUBLIC_EXPONENT			 140
williamr@2
   449
#define RSA_R_NULL_BEFORE_BLOCK_MISSING			 113
williamr@2
   450
#define RSA_R_N_DOES_NOT_EQUAL_P_Q			 127
williamr@2
   451
#define RSA_R_OAEP_DECODING_ERROR			 121
williamr@2
   452
#define RSA_R_SLEN_RECOVERY_FAILED			 135
williamr@2
   453
#define RSA_R_PADDING_CHECK_FAILED			 114
williamr@2
   454
#define RSA_R_P_NOT_PRIME				 128
williamr@2
   455
#define RSA_R_Q_NOT_PRIME				 129
williamr@2
   456
#define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED		 130
williamr@2
   457
#define RSA_R_SSLV3_ROLLBACK_ATTACK			 115
williamr@2
   458
#define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116
williamr@2
   459
#define RSA_R_UNKNOWN_ALGORITHM_TYPE			 117
williamr@2
   460
#define RSA_R_UNKNOWN_PADDING_TYPE			 118
williamr@2
   461
#define RSA_R_WRONG_SIGNATURE_LENGTH			 119
williamr@2
   462
#define RSA_R_SLEN_CHECK_FAILED				 136
williamr@2
   463
williamr@2
   464
#ifdef  __cplusplus
williamr@2
   465
}
williamr@2
   466
#endif
williamr@2
   467
#endif