You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
59 lines
1.6 KiB
59 lines
1.6 KiB
=pod |
|
|
|
=head1 NAME |
|
|
|
RSA_sign_ASN1_OCTET_STRING, RSA_verify_ASN1_OCTET_STRING - RSA signatures |
|
|
|
=head1 SYNOPSIS |
|
|
|
#include <openssl/rsa.h> |
|
|
|
int RSA_sign_ASN1_OCTET_STRING(int dummy, unsigned char *m, |
|
unsigned int m_len, unsigned char *sigret, unsigned int *siglen, |
|
RSA *rsa); |
|
|
|
int RSA_verify_ASN1_OCTET_STRING(int dummy, unsigned char *m, |
|
unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, |
|
RSA *rsa); |
|
|
|
=head1 DESCRIPTION |
|
|
|
RSA_sign_ASN1_OCTET_STRING() signs the octet string B<m> of size |
|
B<m_len> using the private key B<rsa> represented in DER using PKCS #1 |
|
padding. It stores the signature in B<sigret> and the signature size |
|
in B<siglen>. B<sigret> must point to B<RSA_size(rsa)> bytes of |
|
memory. |
|
|
|
B<dummy> is ignored. |
|
|
|
The random number generator must be seeded prior to calling RSA_sign_ASN1_OCTET_STRING(). |
|
|
|
RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> |
|
of size B<siglen> is the DER representation of a given octet string |
|
B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's |
|
public key. |
|
|
|
=head1 RETURN VALUES |
|
|
|
RSA_sign_ASN1_OCTET_STRING() returns 1 on success, 0 otherwise. |
|
RSA_verify_ASN1_OCTET_STRING() returns 1 on successful verification, 0 |
|
otherwise. |
|
|
|
The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. |
|
|
|
=head1 BUGS |
|
|
|
These functions serve no recognizable purpose. |
|
|
|
=head1 SEE ALSO |
|
|
|
L<ERR_get_error(3)|ERR_get_error(3)>, L<objects(3)|objects(3)>, |
|
L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, |
|
L<RSA_verify(3)|RSA_verify(3)> |
|
|
|
=head1 HISTORY |
|
|
|
RSA_sign_ASN1_OCTET_STRING() and RSA_verify_ASN1_OCTET_STRING() were |
|
added in SSLeay 0.8. |
|
|
|
=cut
|
|
|