59 lines
1.6 KiB
Text
59 lines
1.6 KiB
Text
=pod
|
|
|
|
=head1 NAME
|
|
|
|
RSA_sign_ASN1_OCTET_STRING, RSA_verify_ASN1_OCTET_STRING - RSA signatures
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
int RSA_sign_ASN1_OCTET_STRING(int dummy, unsigned char *m,
|
|
unsigned int m_len, unsigned char *sigret, unsigned int *siglen,
|
|
RSA *rsa);
|
|
|
|
int RSA_verify_ASN1_OCTET_STRING(int dummy, unsigned char *m,
|
|
unsigned int m_len, unsigned char *sigbuf, unsigned int siglen,
|
|
RSA *rsa);
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
RSA_sign_ASN1_OCTET_STRING() signs the octet string B<m> of size
|
|
B<m_len> using the private key B<rsa> represented in DER using PKCS #1
|
|
padding. It stores the signature in B<sigret> and the signature size
|
|
in B<siglen>. B<sigret> must point to B<RSA_size(rsa)> bytes of
|
|
memory.
|
|
|
|
B<dummy> is ignored.
|
|
|
|
The random number generator must be seeded prior to calling RSA_sign_ASN1_OCTET_STRING().
|
|
|
|
RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf>
|
|
of size B<siglen> is the DER representation of a given octet string
|
|
B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's
|
|
public key.
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
RSA_sign_ASN1_OCTET_STRING() returns 1 on success, 0 otherwise.
|
|
RSA_verify_ASN1_OCTET_STRING() returns 1 on successful verification, 0
|
|
otherwise.
|
|
|
|
The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>.
|
|
|
|
=head1 BUGS
|
|
|
|
These functions serve no recognizable purpose.
|
|
|
|
=head1 SEE ALSO
|
|
|
|
L<err(3)|err(3)>, L<objects(3)|objects(3)>, L<rand(3)|rand(3)>,
|
|
L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>,
|
|
L<RSA_verify(3)|RSA_verify(3)>
|
|
|
|
=head1 HISTORY
|
|
|
|
RSA_sign_ASN1_OCTET_STRING() and RSA_verify_ASN1_OCTET_STRING() were
|
|
added in SSLeay 0.8.
|
|
|
|
=cut
|