2000-01-12 06:35:21 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
RSA_sign_ASN1_OCTET_STRING, RSA_verify_ASN1_OCTET_STRING - RSA signatures
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
|
|
|
|
int RSA_sign_ASN1_OCTET_STRING(int dummy, unsigned char *m,
|
|
|
|
unsigned int m_len, unsigned char *sigret, unsigned int *siglen,
|
|
|
|
RSA *rsa);
|
|
|
|
|
|
|
|
int RSA_verify_ASN1_OCTET_STRING(int dummy, unsigned char *m,
|
|
|
|
unsigned int m_len, unsigned char *sigbuf, unsigned int siglen,
|
|
|
|
RSA *rsa);
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
RSA_sign_ASN1_OCTET_STRING() signs the octet string B<m> of size
|
|
|
|
B<m_len> using the private key B<rsa> represented in DER using PKCS #1
|
|
|
|
padding. It stores the signature in B<sigret> and the signature size
|
|
|
|
in B<siglen>. B<sigret> must point to B<RSA_size(rsa)> bytes of
|
|
|
|
memory.
|
|
|
|
|
|
|
|
B<dummy> is ignored.
|
|
|
|
|
|
|
|
The random number generator must be seeded prior to calling RSA_sign_ASN1_OCTET_STRING().
|
|
|
|
|
|
|
|
RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf>
|
|
|
|
of size B<siglen> is the DER representation of a given octet string
|
|
|
|
B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's
|
|
|
|
public key.
|
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
RSA_sign_ASN1_OCTET_STRING() returns 1 on success, 0 otherwise.
|
|
|
|
RSA_verify_ASN1_OCTET_STRING() returns 1 on successful verification, 0
|
|
|
|
otherwise.
|
|
|
|
|
2015-08-18 03:21:33 +08:00
|
|
|
The error codes can be obtained by L<ERR_get_error(3)>.
|
2000-01-12 06:35:21 +08:00
|
|
|
|
|
|
|
=head1 BUGS
|
|
|
|
|
|
|
|
These functions serve no recognizable purpose.
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-28 00:28:08 +08:00
|
|
|
L<ERR_get_error(3)>,
|
2015-08-18 03:21:33 +08:00
|
|
|
L<rand(3)>, L<rsa(3)>, L<RSA_sign(3)>,
|
|
|
|
L<RSA_verify(3)>
|
2000-01-12 06:35:21 +08:00
|
|
|
|
|
|
|
=cut
|