FreeBSD manual

download PDF document: RSA_blinding_off.3.pdf

RSA_BLINDING_ON(3ossl) OpenSSL RSA_BLINDING_ON(3ossl)

NAME RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing attacks
SYNOPSIS #include <openssl/rsa.h>
The following functions have been deprecated since OpenSSL 3.0, and can be hidden entirely by defining OPENSSL_API_COMPAT with a suitable version value, see openssl_user_macros(7):
int RSA_blinding_on(RSA *rsa, BN_CTX *ctx);
void RSA_blinding_off(RSA *rsa);
DESCRIPTION All of the functions described on this page are deprecated.
RSA is vulnerable to timing attacks. In a setup where attackers can measure the time of RSA decryption or signature operations, blinding must be used to protect the RSA operation from that attack.
RSA_blinding_on() turns blinding on for key rsa and generates a random blinding factor. ctx is NULL or a preallocated and initialized BN_CTX.
RSA_blinding_off() turns blinding off and frees the memory used for the blinding factor.
RETURN VALUES RSA_blinding_on() returns 1 on success, and 0 if an error occurred.
RSA_blinding_off() returns no value.
HISTORY All of these functions were deprecated in OpenSSL 3.0.
COPYRIGHT Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the Apache License 2.0 (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.
3.0.11 2023-09-19 RSA_BLINDING_ON(3ossl)