#![allow(non_snake_case)]
use {bits, der, error, limb};
use untrusted;
mod padding;
#[cfg(feature = "rsa_signing")]
pub use self::padding::RSAEncoding;
pub use self::padding::{
RSA_PKCS1_SHA256,
RSA_PKCS1_SHA384,
RSA_PKCS1_SHA512,
RSA_PSS_SHA256,
RSA_PSS_SHA384,
RSA_PSS_SHA512
};
const PUBLIC_KEY_PUBLIC_MODULUS_MAX_LEN: usize = 8192 / 8;
#[cfg(feature = "rsa_signing")]
const PRIVATE_KEY_PUBLIC_MODULUS_MAX_BITS: bits::BitLength =
bits::BitLength(4096);
const PRIVATE_KEY_PUBLIC_MODULUS_MAX_LIMBS: usize =
(4096 + limb::LIMB_BITS - 1) / limb::LIMB_BITS;
pub struct RSAParameters {
padding_alg: &'static padding::RSAVerification,
min_bits: bits::BitLength,
}
fn parse_public_key(input: untrusted::Input)
-> Result<(untrusted::Input, untrusted::Input),
error::Unspecified> {
input.read_all(error::Unspecified, |input| {
der::nested(input, der::Tag::Sequence, error::Unspecified, |input| {
let n = try!(der::positive_integer(input));
let e = try!(der::positive_integer(input));
Ok((n, e))
})
})
}
fn check_public_modulus_and_exponent(
n: bigint::Positive, e: bigint::Positive, n_min_bits: bits::BitLength,
n_max_bits: bits::BitLength, e_min_bits: bits::BitLength)
-> Result<(bigint::OddPositive, bigint::PublicExponent),
error::Unspecified> {
let n = try!(n.into_odd_positive());
let e = try!(e.into_odd_positive());
const N_MIN_BITS: bits::BitLength = bits::BitLength(2048);
assert!(n_min_bits >= N_MIN_BITS);
let n_bits = n.bit_length();
let n_bits_rounded_up =
try!(bits::BitLength::from_usize_bytes(
n_bits.as_usize_bytes_rounded_up()));
if n_bits_rounded_up < n_min_bits {
return Err(error::Unspecified);
}
if n_bits > n_max_bits {
return Err(error::Unspecified);
}
debug_assert!(e_min_bits >= bits::BitLength::from_usize_bits(2));
let e_bits = e.bit_length();
if e_bits < e_min_bits {
return Err(error::Unspecified);
}
let e = try!(e.into_public_exponent());
debug_assert!(e_min_bits < bigint::PUBLIC_EXPONENT_MAX_BITS);
debug_assert!(bigint::PUBLIC_EXPONENT_MAX_BITS < N_MIN_BITS);
Ok((n, e))
}
pub enum N {}
pub mod verification;
#[cfg(feature = "rsa_signing")]
pub mod signing;
mod bigint;
#[cfg(feature = "rsa_signing")]
mod blinding;
mod random;
#[doc(hidden)]
pub use rsa::random::GFp_rand_mod;