diff options
author | Ulf Möller <ulf@openssl.org> | 2000-01-11 22:35:21 +0000 |
---|---|---|
committer | Ulf Möller <ulf@openssl.org> | 2000-01-11 22:35:21 +0000 |
commit | 2186cd8ef1c4db86109af7a38182c2bd9ddbbb32 (patch) | |
tree | 407efa98f1a4fe9b118651f06c57e85d6d0139e5 /doc/crypto/RSA_sign.pod | |
parent | de73e397f86c578ee514816ca1a312689a89686f (diff) | |
download | openssl-2186cd8ef1c4db86109af7a38182c2bd9ddbbb32.tar.gz |
Document the RSA library.
Diffstat (limited to 'doc/crypto/RSA_sign.pod')
-rw-r--r-- | doc/crypto/RSA_sign.pod | 63 |
1 files changed, 63 insertions, 0 deletions
diff --git a/doc/crypto/RSA_sign.pod b/doc/crypto/RSA_sign.pod new file mode 100644 index 0000000000..81771ba574 --- /dev/null +++ b/doc/crypto/RSA_sign.pod @@ -0,0 +1,63 @@ +=pod + +=head1 NAME + +RSA_sign, RSA_verify - RSA signatures + +=head1 SYNOPSIS + + #include <openssl/rsa.h> + + int RSA_sign(int type, unsigned char *m, unsigned int m_len, + unsigned char *sigret, unsigned int *siglen, RSA *rsa); + + int RSA_verify(int type, unsigned char *m, unsigned int m_len, + unsigned char *sigbuf, unsigned int siglen, RSA *rsa); + +=head1 DESCRIPTION + +RSA_sign() signs the message digest B<m> of size B<m_len> using the +private key B<rsa> as specified in PKCS #1 v2.0. It stores the +signature in B<sigret> and the signature size in B<siglen>. B<sigret> +must point to B<RSA_size(rsa)> bytes of memory. + +B<type> denotes the message digest algorithm that was used to generate +B<m>. It usually is one of B<NID_sha1>, B<NID_ripemd160> and +B<NID_md5>; see L<objects> for details. If B<type> is B<NID_md5_sha1>, +an SSL signature (MD5 and SHA1 message digests with PKCS #1 padding +and no algorithm identifier) is created. + +The random number generator must be seeded prior to calling RSA_sign(). + +RSA_verify() verifies that the signature B<sigbuf> of size B<siglen> +matches a given message digest B<m> of size B<m_len>. B<type> denotes +the message digest algorithm that was used to generate the signature. +B<rsa> is the signer's public key. + +=head1 RETURN VALUES + +RSA_sign() returns 1 on success, 0 otherwise. RSA_verify() returns 1 +on successful verification, 0 otherwise. + +The error codes can be obtained by ERR_get_error(3). + +=head1 BUGS + +Certain signatures with an improper algorithm identifier are accepted +for compatibility with SSLeay 0.4.5 :-) + +=head1 CONFORMING TO + +SSL, PKCS #1 v2.0 + +=head1 SEE ALSO + +err(3), objects(3), rand(3), rsa(3), RSA_private_encrypt(3), +RSA_public_decrypt(3) + +=head1 HISTORY + +RSA_sign() and RSA_verify() are available in all versions of SSLeay +and OpenSSL. + +=cut |