aboutsummaryrefslogtreecommitdiffstats
path: root/doc/crypto/RSA_sign.pod
diff options
context:
space:
mode:
authorUlf Möller <ulf@openssl.org>2000-01-11 22:35:21 +0000
committerUlf Möller <ulf@openssl.org>2000-01-11 22:35:21 +0000
commit2186cd8ef1c4db86109af7a38182c2bd9ddbbb32 (patch)
tree407efa98f1a4fe9b118651f06c57e85d6d0139e5 /doc/crypto/RSA_sign.pod
parentde73e397f86c578ee514816ca1a312689a89686f (diff)
downloadopenssl-2186cd8ef1c4db86109af7a38182c2bd9ddbbb32.tar.gz
Document the RSA library.
Diffstat (limited to 'doc/crypto/RSA_sign.pod')
-rw-r--r--doc/crypto/RSA_sign.pod63
1 files changed, 63 insertions, 0 deletions
diff --git a/doc/crypto/RSA_sign.pod b/doc/crypto/RSA_sign.pod
new file mode 100644
index 0000000000..81771ba574
--- /dev/null
+++ b/doc/crypto/RSA_sign.pod
@@ -0,0 +1,63 @@
+=pod
+
+=head1 NAME
+
+RSA_sign, RSA_verify - RSA signatures
+
+=head1 SYNOPSIS
+
+ #include <openssl/rsa.h>
+
+ int RSA_sign(int type, unsigned char *m, unsigned int m_len,
+ unsigned char *sigret, unsigned int *siglen, RSA *rsa);
+
+ int RSA_verify(int type, unsigned char *m, unsigned int m_len,
+ unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
+
+=head1 DESCRIPTION
+
+RSA_sign() signs the message digest B<m> of size B<m_len> using the
+private key B<rsa> as specified in PKCS #1 v2.0. It stores the
+signature in B<sigret> and the signature size in B<siglen>. B<sigret>
+must point to B<RSA_size(rsa)> bytes of memory.
+
+B<type> denotes the message digest algorithm that was used to generate
+B<m>. It usually is one of B<NID_sha1>, B<NID_ripemd160> and
+B<NID_md5>; see L<objects> for details. If B<type> is B<NID_md5_sha1>,
+an SSL signature (MD5 and SHA1 message digests with PKCS #1 padding
+and no algorithm identifier) is created.
+
+The random number generator must be seeded prior to calling RSA_sign().
+
+RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
+matches a given message digest B<m> of size B<m_len>. B<type> denotes
+the message digest algorithm that was used to generate the signature.
+B<rsa> is the signer's public key.
+
+=head1 RETURN VALUES
+
+RSA_sign() returns 1 on success, 0 otherwise. RSA_verify() returns 1
+on successful verification, 0 otherwise.
+
+The error codes can be obtained by ERR_get_error(3).
+
+=head1 BUGS
+
+Certain signatures with an improper algorithm identifier are accepted
+for compatibility with SSLeay 0.4.5 :-)
+
+=head1 CONFORMING TO
+
+SSL, PKCS #1 v2.0
+
+=head1 SEE ALSO
+
+err(3), objects(3), rand(3), rsa(3), RSA_private_encrypt(3),
+RSA_public_decrypt(3)
+
+=head1 HISTORY
+
+RSA_sign() and RSA_verify() are available in all versions of SSLeay
+and OpenSSL.
+
+=cut