2000-01-12 06:35:21 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
RSA_sign, RSA_verify - RSA signatures
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
|
2020-02-12 13:23:01 +08:00
|
|
|
Deprecated since OpenSSL 3.0, can be hidden entirely by defining
|
|
|
|
B<OPENSSL_API_COMPAT> with a suitable version value, see
|
|
|
|
L<openssl_user_macros(7)>:
|
|
|
|
|
2005-04-21 17:43:09 +08:00
|
|
|
int RSA_sign(int type, const unsigned char *m, unsigned int m_len,
|
2017-01-21 02:58:49 +08:00
|
|
|
unsigned char *sigret, unsigned int *siglen, RSA *rsa);
|
2000-01-12 06:35:21 +08:00
|
|
|
|
2005-04-21 17:43:09 +08:00
|
|
|
int RSA_verify(int type, const unsigned char *m, unsigned int m_len,
|
2017-01-21 02:58:49 +08:00
|
|
|
unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
|
2000-01-12 06:35:21 +08:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2020-02-12 13:23:01 +08:00
|
|
|
All of the functions described on this page are deprecated.
|
|
|
|
Applications should instead use L<EVP_PKEY_sign_init(3)>, L<EVP_PKEY_sign(3)>,
|
|
|
|
L<EVP_PKEY_verify_init(3)> and L<EVP_PKEY_verify(3)>.
|
|
|
|
|
2000-01-12 06:35:21 +08:00
|
|
|
RSA_sign() signs the message digest B<m> of size B<m_len> using the
|
2016-08-21 03:48:56 +08:00
|
|
|
private key B<rsa> using RSASSA-PKCS1-v1_5 as specified in RFC 3447. It
|
|
|
|
stores the signature in B<sigret> and the signature size in B<siglen>.
|
|
|
|
B<sigret> must point to RSA_size(B<rsa>) bytes of memory.
|
2014-07-03 10:42:40 +08:00
|
|
|
Note that PKCS #1 adds meta-data, placing limits on the size of the
|
|
|
|
key that can be used.
|
2015-08-18 03:21:33 +08:00
|
|
|
See L<RSA_private_encrypt(3)> for lower-level
|
2014-07-03 10:42:40 +08:00
|
|
|
operations.
|
2000-01-12 06:35:21 +08:00
|
|
|
|
|
|
|
B<type> denotes the message digest algorithm that was used to generate
|
2015-08-28 00:28:08 +08:00
|
|
|
B<m>.
|
|
|
|
If B<type> is B<NID_md5_sha1>,
|
2000-01-12 06:35:21 +08:00
|
|
|
an SSL signature (MD5 and SHA1 message digests with PKCS #1 padding
|
|
|
|
and no algorithm identifier) is created.
|
|
|
|
|
|
|
|
RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
|
|
|
|
matches a given message digest B<m> of size B<m_len>. B<type> denotes
|
|
|
|
the message digest algorithm that was used to generate the signature.
|
|
|
|
B<rsa> is the signer's public key.
|
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
2015-08-28 00:28:08 +08:00
|
|
|
RSA_sign() returns 1 on success.
|
|
|
|
RSA_verify() returns 1 on successful verification.
|
2000-01-12 06:35:21 +08:00
|
|
|
|
2015-08-18 03:21:33 +08:00
|
|
|
The error codes can be obtained by L<ERR_get_error(3)>.
|
2000-01-12 06:35:21 +08:00
|
|
|
|
|
|
|
=head1 CONFORMING TO
|
|
|
|
|
|
|
|
SSL, PKCS #1 v2.0
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-28 00:28:08 +08:00
|
|
|
L<ERR_get_error(3)>,
|
2016-06-10 04:39:19 +08:00
|
|
|
L<RSA_private_encrypt(3)>,
|
2016-05-20 20:11:46 +08:00
|
|
|
L<RSA_public_decrypt(3)>
|
2000-01-12 06:35:21 +08:00
|
|
|
|
2020-02-12 13:23:01 +08:00
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
All of these functions were deprecated in OpenSSL 3.0.
|
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-04-23 20:55:52 +08:00
|
|
|
Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|