839b881c61
RSA with more than two primes is specified in https://tools.ietf.org/html/rfc3447, although the idea goes back far earier than that. This change ports some of the changes in http://rt.openssl.org/Ticket/Display.html?id=3477&user=guest&pass=guest to BoringSSL—specifically those bits that are under an OpenSSL license. Change-Id: I51e8e345e2148702b8ce12e00518f6ef4683d3e1 Reviewed-on: https://boringssl-review.googlesource.com/4870 Reviewed-by: Adam Langley <agl@google.com>
73 lines
2.6 KiB
Plaintext
73 lines
2.6 KiB
Plaintext
RSA,function,100,BN_BLINDING_convert_ex
|
|
RSA,function,101,BN_BLINDING_create_param
|
|
RSA,function,102,BN_BLINDING_invert_ex
|
|
RSA,function,103,BN_BLINDING_new
|
|
RSA,function,104,BN_BLINDING_update
|
|
RSA,function,105,RSA_check_key
|
|
RSA,function,106,RSA_new_method
|
|
RSA,function,107,RSA_padding_add_PKCS1_OAEP_mgf1
|
|
RSA,function,108,RSA_padding_add_PKCS1_PSS_mgf1
|
|
RSA,function,109,RSA_padding_add_PKCS1_type_1
|
|
RSA,function,110,RSA_padding_add_PKCS1_type_2
|
|
RSA,function,111,RSA_padding_add_none
|
|
RSA,function,112,RSA_padding_check_PKCS1_OAEP_mgf1
|
|
RSA,function,113,RSA_padding_check_PKCS1_type_1
|
|
RSA,function,114,RSA_padding_check_PKCS1_type_2
|
|
RSA,function,115,RSA_padding_check_none
|
|
RSA,function,116,RSA_recover_crt_params
|
|
RSA,function,117,RSA_sign
|
|
RSA,function,118,RSA_verify
|
|
RSA,function,119,RSA_verify_PKCS1_PSS_mgf1
|
|
RSA,function,120,decrypt
|
|
RSA,function,121,encrypt
|
|
RSA,function,122,keygen
|
|
RSA,function,128,keygen_multiprime
|
|
RSA,function,123,pkcs1_prefixed_msg
|
|
RSA,function,124,private_transform
|
|
RSA,function,125,rsa_setup_blinding
|
|
RSA,function,126,sign_raw
|
|
RSA,function,127,verify_raw
|
|
RSA,reason,100,BAD_E_VALUE
|
|
RSA,reason,101,BAD_FIXED_HEADER_DECRYPT
|
|
RSA,reason,102,BAD_PAD_BYTE_COUNT
|
|
RSA,reason,103,BAD_RSA_PARAMETERS
|
|
RSA,reason,104,BAD_SIGNATURE
|
|
RSA,reason,105,BLOCK_TYPE_IS_NOT_01
|
|
RSA,reason,106,BN_NOT_INITIALIZED
|
|
RSA,reason,142,CANNOT_RECOVER_MULTI_PRIME_KEY
|
|
RSA,reason,107,CRT_PARAMS_ALREADY_GIVEN
|
|
RSA,reason,108,CRT_VALUES_INCORRECT
|
|
RSA,reason,109,DATA_LEN_NOT_EQUAL_TO_MOD_LEN
|
|
RSA,reason,110,DATA_TOO_LARGE
|
|
RSA,reason,111,DATA_TOO_LARGE_FOR_KEY_SIZE
|
|
RSA,reason,112,DATA_TOO_LARGE_FOR_MODULUS
|
|
RSA,reason,113,DATA_TOO_SMALL
|
|
RSA,reason,114,DATA_TOO_SMALL_FOR_KEY_SIZE
|
|
RSA,reason,115,DIGEST_TOO_BIG_FOR_RSA_KEY
|
|
RSA,reason,116,D_E_NOT_CONGRUENT_TO_1
|
|
RSA,reason,117,EMPTY_PUBLIC_KEY
|
|
RSA,reason,118,FIRST_OCTET_INVALID
|
|
RSA,reason,119,INCONSISTENT_SET_OF_CRT_VALUES
|
|
RSA,reason,120,INTERNAL_ERROR
|
|
RSA,reason,121,INVALID_MESSAGE_LENGTH
|
|
RSA,reason,122,KEY_SIZE_TOO_SMALL
|
|
RSA,reason,123,LAST_OCTET_INVALID
|
|
RSA,reason,124,MODULUS_TOO_LARGE
|
|
RSA,reason,141,MUST_HAVE_AT_LEAST_TWO_PRIMES
|
|
RSA,reason,125,NO_PUBLIC_EXPONENT
|
|
RSA,reason,126,NULL_BEFORE_BLOCK_MISSING
|
|
RSA,reason,127,N_NOT_EQUAL_P_Q
|
|
RSA,reason,128,OAEP_DECODING_ERROR
|
|
RSA,reason,129,ONLY_ONE_OF_P_Q_GIVEN
|
|
RSA,reason,130,OUTPUT_BUFFER_TOO_SMALL
|
|
RSA,reason,131,PADDING_CHECK_FAILED
|
|
RSA,reason,132,PKCS_DECODING_ERROR
|
|
RSA,reason,133,SLEN_CHECK_FAILED
|
|
RSA,reason,134,SLEN_RECOVERY_FAILED
|
|
RSA,reason,135,TOO_LONG
|
|
RSA,reason,136,TOO_MANY_ITERATIONS
|
|
RSA,reason,137,UNKNOWN_ALGORITHM_TYPE
|
|
RSA,reason,138,UNKNOWN_PADDING_TYPE
|
|
RSA,reason,139,VALUE_MISSING
|
|
RSA,reason,140,WRONG_SIGNATURE_LENGTH
|