2000-01-11 22:35:21 +00:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
RSA_sign, RSA_verify - RSA signatures
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
|
2020-02-12 15:23:01 +10:00
|
|
|
Deprecated since OpenSSL 3.0, can be hidden entirely by defining
|
|
|
|
B<OPENSSL_API_COMPAT> with a suitable version value, see
|
|
|
|
L<openssl_user_macros(7)>:
|
|
|
|
|
2005-04-21 09:43:09 +00:00
|
|
|
int RSA_sign(int type, const unsigned char *m, unsigned int m_len,
|
2017-01-20 19:58:49 +01:00
|
|
|
unsigned char *sigret, unsigned int *siglen, RSA *rsa);
|
2000-01-11 22:35:21 +00:00
|
|
|
|
2005-04-21 09:43:09 +00:00
|
|
|
int RSA_verify(int type, const unsigned char *m, unsigned int m_len,
|
2017-01-20 19:58:49 +01:00
|
|
|
unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
|
2000-01-11 22:35:21 +00:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2020-02-12 15:23:01 +10:00
|
|
|
All of the functions described on this page are deprecated.
|
|
|
|
Applications should instead use L<EVP_PKEY_sign_init(3)>, L<EVP_PKEY_sign(3)>,
|
|
|
|
L<EVP_PKEY_verify_init(3)> and L<EVP_PKEY_verify(3)>.
|
|
|
|
|
2000-01-11 22:35:21 +00:00
|
|
|
RSA_sign() signs the message digest B<m> of size B<m_len> using the
|
2016-08-20 15:48:56 -04:00
|
|
|
private key B<rsa> using RSASSA-PKCS1-v1_5 as specified in RFC 3447. It
|
|
|
|
stores the signature in B<sigret> and the signature size in B<siglen>.
|
|
|
|
B<sigret> must point to RSA_size(B<rsa>) bytes of memory.
|
2014-07-02 22:42:40 -04:00
|
|
|
Note that PKCS #1 adds meta-data, placing limits on the size of the
|
|
|
|
key that can be used.
|
2015-08-17 15:21:33 -04:00
|
|
|
See L<RSA_private_encrypt(3)> for lower-level
|
2014-07-02 22:42:40 -04:00
|
|
|
operations.
|
2000-01-11 22:35:21 +00:00
|
|
|
|
|
|
|
B<type> denotes the message digest algorithm that was used to generate
|
2015-08-27 12:28:08 -04:00
|
|
|
B<m>.
|
|
|
|
If B<type> is B<NID_md5_sha1>,
|
2000-01-11 22:35:21 +00:00
|
|
|
an SSL signature (MD5 and SHA1 message digests with PKCS #1 padding
|
|
|
|
and no algorithm identifier) is created.
|
|
|
|
|
|
|
|
RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
|
|
|
|
matches a given message digest B<m> of size B<m_len>. B<type> denotes
|
|
|
|
the message digest algorithm that was used to generate the signature.
|
|
|
|
B<rsa> is the signer's public key.
|
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
2015-08-27 12:28:08 -04:00
|
|
|
RSA_sign() returns 1 on success.
|
|
|
|
RSA_verify() returns 1 on successful verification.
|
2000-01-11 22:35:21 +00:00
|
|
|
|
2015-08-17 15:21:33 -04:00
|
|
|
The error codes can be obtained by L<ERR_get_error(3)>.
|
2000-01-11 22:35:21 +00:00
|
|
|
|
|
|
|
=head1 CONFORMING TO
|
|
|
|
|
|
|
|
SSL, PKCS #1 v2.0
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-27 12:28:08 -04:00
|
|
|
L<ERR_get_error(3)>,
|
2016-06-09 16:39:19 -04:00
|
|
|
L<RSA_private_encrypt(3)>,
|
2016-05-20 08:11:46 -04:00
|
|
|
L<RSA_public_decrypt(3)>
|
2000-01-11 22:35:21 +00:00
|
|
|
|
2020-02-12 15:23:01 +10:00
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
All of these functions were deprecated in OpenSSL 3.0.
|
|
|
|
|
2016-05-18 11:44:05 -04:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-04-23 13:55:52 +01:00
|
|
|
Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 11:44:05 -04:00
|
|
|
|
2018-12-06 14:04:44 +01:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 11:44:05 -04:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|