1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125
#![doc(html_logo_url = "https://raw.githubusercontent.com/RustCrypto/meta/master/logo_small.png")] //! RSA Implementation in pure Rust. //! //! //! # Usage //! //! Using PKCS1v15. //! ``` //! use rsa::{PublicKey, RSAPrivateKey, RSAPublicKey, PaddingScheme}; //! # /* //! use rand::rngs::OsRng; //! let mut rng = OsRng; //! # */ //! # use rand::{SeedableRng, rngs::StdRng}; //! # let mut rng = rand::rngs::StdRng::seed_from_u64(0); //! let bits = 2048; //! let private_key = RSAPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); //! let public_key = RSAPublicKey::from(&private_key); //! //! // Encrypt //! let data = b"hello world"; //! let padding = PaddingScheme::new_pkcs1v15_encrypt(); //! let enc_data = public_key.encrypt(&mut rng, padding, &data[..]).expect("failed to encrypt"); //! assert_ne!(&data[..], &enc_data[..]); //! //! // Decrypt //! let padding = PaddingScheme::new_pkcs1v15_encrypt(); //! let dec_data = private_key.decrypt(padding, &enc_data).expect("failed to decrypt"); //! assert_eq!(&data[..], &dec_data[..]); //! ``` //! //! Using OAEP. //! ``` //! use rsa::{PublicKey, RSAPrivateKey, RSAPublicKey, PaddingScheme}; //! # /* //! use rand::rngs::OsRng; //! let mut rng = OsRng; //! # */ //! # use rand::{SeedableRng, rngs::StdRng}; //! # let mut rng = rand::rngs::StdRng::seed_from_u64(0); //! //! let bits = 2048; //! let private_key = RSAPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); //! let public_key = RSAPublicKey::from(&private_key); //! //! // Encrypt //! let data = b"hello world"; //! let padding = PaddingScheme::new_oaep::<sha2::Sha256>(); //! let enc_data = public_key.encrypt(&mut rng, padding, &data[..]).expect("failed to encrypt"); //! assert_ne!(&data[..], &enc_data[..]); //! //! // Decrypt //! let padding = PaddingScheme::new_oaep::<sha2::Sha256>(); //! let dec_data = private_key.decrypt(padding, &enc_data).expect("failed to decrypt"); //! assert_eq!(&data[..], &dec_data[..]); //! ``` #![cfg_attr(not(test), no_std)] #[cfg(not(feature = "alloc"))] compile_error!("This crate does not yet support environments without liballoc. See https://github.com/RustCrypto/RSA/issues/51."); #[cfg(feature = "alloc")] extern crate alloc; #[cfg(feature = "std")] extern crate std; #[cfg(feature = "alloc")] pub use num_bigint::BigUint; /// Useful algorithms. #[cfg(feature = "alloc")] pub mod algorithms; /// Error types. #[cfg(feature = "alloc")] pub mod errors; /// Supported hash functions. #[cfg(feature = "alloc")] pub mod hash; /// Supported padding schemes. #[cfg(feature = "alloc")] pub mod padding; #[cfg(feature = "pem")] pub use pem; #[cfg(feature = "std")] mod encode; #[cfg(feature = "alloc")] mod key; #[cfg(feature = "alloc")] mod oaep; #[cfg(feature = "std")] mod parse; #[cfg(feature = "alloc")] mod pkcs1v15; #[cfg(feature = "alloc")] mod pss; #[cfg(feature = "alloc")] mod raw; #[cfg(feature = "std")] pub use self::encode::{PrivateKeyEncoding, PublicKeyEncoding}; #[cfg(all(feature = "std", feature = "pem"))] pub use self::encode::{PrivateKeyPemEncoding, PublicKeyPemEncoding}; #[cfg(feature = "alloc")] pub use self::hash::Hash; #[cfg(feature = "alloc")] pub use self::key::{PublicKey, PublicKeyParts, RSAPrivateKey, RSAPublicKey}; #[cfg(feature = "alloc")] pub use self::padding::PaddingScheme; // Optionally expose internals if requested via feature-flag. #[cfg(not(feature = "expose-internals"))] #[cfg(feature = "alloc")] mod internals; /// Internal raw RSA functions. #[cfg(feature = "expose-internals")] #[cfg(feature = "alloc")] pub mod internals;