rsa.3 (206048) | rsa.3 (215698) |
---|---|
1.\" Automatically generated by Pod::Man v1.37, Pod::Parser v1.37 | 1.\" Automatically generated by Pod::Man 2.22 (Pod::Simple 3.07) |
2.\" 3.\" Standard preamble: 4.\" ======================================================================== | 2.\" 3.\" Standard preamble: 4.\" ======================================================================== |
5.de Sh \" Subsection heading 6.br 7.if t .Sp 8.ne 5 9.PP 10\fB\\$1\fR 11.PP 12.. | |
13.de Sp \" Vertical space (when we can't use .PP) 14.if t .sp .5v 15.if n .sp 16.. 17.de Vb \" Begin verbatim text 18.ft CW 19.nf 20.ne \\$1 21.. 22.de Ve \" End verbatim text 23.ft R 24.fi 25.. 26.\" Set up some character translations and predefined strings. \*(-- will 27.\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left | 5.de Sp \" Vertical space (when we can't use .PP) 6.if t .sp .5v 7.if n .sp 8.. 9.de Vb \" Begin verbatim text 10.ft CW 11.nf 12.ne \\$1 13.. 14.de Ve \" End verbatim text 15.ft R 16.fi 17.. 18.\" Set up some character translations and predefined strings. \*(-- will 19.\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left |
28.\" double quote, and \*(R" will give a right double quote. | will give a 29.\" real vertical bar. \*(C+ will give a nicer C++. Capital omega is used to 30.\" do unbreakable dashes and therefore won't be available. \*(C` and \*(C' 31.\" expand to `' in nroff, nothing in troff, for use with C<>. 32.tr \(*W-|\(bv\*(Tr | 20.\" double quote, and \*(R" will give a right double quote. \*(C+ will 21.\" give a nicer C++. Capital omega is used to do unbreakable dashes and 22.\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff, 23.\" nothing in troff, for use with C<>. 24.tr \(*W- |
33.ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p' 34.ie n \{\ 35. ds -- \(*W- 36. ds PI pi 37. if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 38. if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39. ds L" "" 40. ds R" "" 41. ds C` "" 42. ds C' "" 43'br\} 44.el\{\ 45. ds -- \|\(em\| 46. ds PI \(*p 47. ds L" `` 48. ds R" '' 49'br\} 50.\" | 25.ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p' 26.ie n \{\ 27. ds -- \(*W- 28. ds PI pi 29. if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30. if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 31. ds L" "" 32. ds R" "" 33. ds C` "" 34. ds C' "" 35'br\} 36.el\{\ 37. ds -- \|\(em\| 38. ds PI \(*p 39. ds L" `` 40. ds R" '' 41'br\} 42.\" |
43.\" Escape single quotes in literal strings from groff's Unicode transform. 44.ie \n(.g .ds Aq \(aq 45.el .ds Aq ' 46.\" |
|
51.\" If the F register is turned on, we'll generate index entries on stderr for | 47.\" If the F register is turned on, we'll generate index entries on stderr for |
52.\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index | 48.\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index |
53.\" entries marked with X<> in POD. Of course, you'll have to process the 54.\" output yourself in some meaningful fashion. | 49.\" entries marked with X<> in POD. Of course, you'll have to process the 50.\" output yourself in some meaningful fashion. |
55.if \nF \{\ | 51.ie \nF \{\ |
56. de IX 57. tm Index:\\$1\t\\n%\t"\\$2" 58.. 59. nr % 0 60. rr F 61.\} | 52. de IX 53. tm Index:\\$1\t\\n%\t"\\$2" 54.. 55. nr % 0 56. rr F 57.\} |
58.el \{\ 59. de IX 60.. 61.\} |
|
62.\" | 62.\" |
63.\" For nroff, turn off justification. Always turn off hyphenation; it makes 64.\" way too many mistakes in technical documents. 65.hy 0 66.if n .na 67.\" | |
68.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2). 69.\" Fear. Run. Save yourself. No user-serviceable parts. 70. \" fudge factors for nroff and troff 71.if n \{\ 72. ds #H 0 73. ds #V .8m 74. ds #F .3m 75. ds #[ \f1 --- 48 unchanged lines hidden (view full) --- 124. ds Th \o'LP' 125. ds ae ae 126. ds Ae AE 127.\} 128.rm #[ #] #H #V #F C 129.\" ======================================================================== 130.\" 131.IX Title "rsa 3" | 63.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2). 64.\" Fear. Run. Save yourself. No user-serviceable parts. 65. \" fudge factors for nroff and troff 66.if n \{\ 67. ds #H 0 68. ds #V .8m 69. ds #F .3m 70. ds #[ \f1 --- 48 unchanged lines hidden (view full) --- 119. ds Th \o'LP' 120. ds ae ae 121. ds Ae AE 122.\} 123.rm #[ #] #H #V #F C 124.\" ======================================================================== 125.\" 126.IX Title "rsa 3" |
132.TH rsa 3 "2010-03-24" "0.9.8n" "OpenSSL" | 127.TH rsa 3 "2010-11-16" "0.9.8p" "OpenSSL" 128.\" For nroff, turn off justification. Always turn off hyphenation; it makes 129.\" way too many mistakes in technical documents. 130.if n .ad l 131.nh |
133.SH "NAME" 134rsa \- RSA public key cryptosystem 135.SH "SYNOPSIS" 136.IX Header "SYNOPSIS" 137.Vb 2 138\& #include <openssl/rsa.h> 139\& #include <openssl/engine.h> | 132.SH "NAME" 133rsa \- RSA public key cryptosystem 134.SH "SYNOPSIS" 135.IX Header "SYNOPSIS" 136.Vb 2 137\& #include <openssl/rsa.h> 138\& #include <openssl/engine.h> |
140.Ve 141.PP 142.Vb 2 | 139\& |
143\& RSA * RSA_new(void); 144\& void RSA_free(RSA *rsa); | 140\& RSA * RSA_new(void); 141\& void RSA_free(RSA *rsa); |
145.Ve 146.PP 147.Vb 8 | 142\& |
148\& int RSA_public_encrypt(int flen, unsigned char *from, 149\& unsigned char *to, RSA *rsa, int padding); 150\& int RSA_private_decrypt(int flen, unsigned char *from, 151\& unsigned char *to, RSA *rsa, int padding); 152\& int RSA_private_encrypt(int flen, unsigned char *from, 153\& unsigned char *to, RSA *rsa,int padding); 154\& int RSA_public_decrypt(int flen, unsigned char *from, 155\& unsigned char *to, RSA *rsa,int padding); | 143\& int RSA_public_encrypt(int flen, unsigned char *from, 144\& unsigned char *to, RSA *rsa, int padding); 145\& int RSA_private_decrypt(int flen, unsigned char *from, 146\& unsigned char *to, RSA *rsa, int padding); 147\& int RSA_private_encrypt(int flen, unsigned char *from, 148\& unsigned char *to, RSA *rsa,int padding); 149\& int RSA_public_decrypt(int flen, unsigned char *from, 150\& unsigned char *to, RSA *rsa,int padding); |
156.Ve 157.PP 158.Vb 4 | 151\& |
159\& int RSA_sign(int type, unsigned char *m, unsigned int m_len, 160\& unsigned char *sigret, unsigned int *siglen, RSA *rsa); 161\& int RSA_verify(int type, unsigned char *m, unsigned int m_len, 162\& unsigned char *sigbuf, unsigned int siglen, RSA *rsa); | 152\& int RSA_sign(int type, unsigned char *m, unsigned int m_len, 153\& unsigned char *sigret, unsigned int *siglen, RSA *rsa); 154\& int RSA_verify(int type, unsigned char *m, unsigned int m_len, 155\& unsigned char *sigbuf, unsigned int siglen, RSA *rsa); |
163.Ve 164.PP 165.Vb 1 | 156\& |
166\& int RSA_size(const RSA *rsa); | 157\& int RSA_size(const RSA *rsa); |
167.Ve 168.PP 169.Vb 2 | 158\& |
170\& RSA *RSA_generate_key(int num, unsigned long e, 171\& void (*callback)(int,int,void *), void *cb_arg); | 159\& RSA *RSA_generate_key(int num, unsigned long e, 160\& void (*callback)(int,int,void *), void *cb_arg); |
172.Ve 173.PP 174.Vb 1 | 161\& |
175\& int RSA_check_key(RSA *rsa); | 162\& int RSA_check_key(RSA *rsa); |
176.Ve 177.PP 178.Vb 2 | 163\& |
179\& int RSA_blinding_on(RSA *rsa, BN_CTX *ctx); 180\& void RSA_blinding_off(RSA *rsa); | 164\& int RSA_blinding_on(RSA *rsa, BN_CTX *ctx); 165\& void RSA_blinding_off(RSA *rsa); |
181.Ve 182.PP 183.Vb 8 | 166\& |
184\& void RSA_set_default_method(const RSA_METHOD *meth); 185\& const RSA_METHOD *RSA_get_default_method(void); 186\& int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); 187\& const RSA_METHOD *RSA_get_method(const RSA *rsa); 188\& RSA_METHOD *RSA_PKCS1_SSLeay(void); 189\& RSA_METHOD *RSA_null_method(void); 190\& int RSA_flags(const RSA *rsa); 191\& RSA *RSA_new_method(ENGINE *engine); | 167\& void RSA_set_default_method(const RSA_METHOD *meth); 168\& const RSA_METHOD *RSA_get_default_method(void); 169\& int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); 170\& const RSA_METHOD *RSA_get_method(const RSA *rsa); 171\& RSA_METHOD *RSA_PKCS1_SSLeay(void); 172\& RSA_METHOD *RSA_null_method(void); 173\& int RSA_flags(const RSA *rsa); 174\& RSA *RSA_new_method(ENGINE *engine); |
192.Ve 193.PP 194.Vb 2 | 175\& |
195\& int RSA_print(BIO *bp, RSA *x, int offset); 196\& int RSA_print_fp(FILE *fp, RSA *x, int offset); | 176\& int RSA_print(BIO *bp, RSA *x, int offset); 177\& int RSA_print_fp(FILE *fp, RSA *x, int offset); |
197.Ve 198.PP 199.Vb 4 | 178\& |
200\& int RSA_get_ex_new_index(long argl, char *argp, int (*new_func)(), 201\& int (*dup_func)(), void (*free_func)()); 202\& int RSA_set_ex_data(RSA *r,int idx,char *arg); 203\& char *RSA_get_ex_data(RSA *r, int idx); | 179\& int RSA_get_ex_new_index(long argl, char *argp, int (*new_func)(), 180\& int (*dup_func)(), void (*free_func)()); 181\& int RSA_set_ex_data(RSA *r,int idx,char *arg); 182\& char *RSA_get_ex_data(RSA *r, int idx); |
204.Ve 205.PP 206.Vb 6 | 183\& |
207\& int RSA_sign_ASN1_OCTET_STRING(int dummy, unsigned char *m, 208\& unsigned int m_len, unsigned char *sigret, unsigned int *siglen, 209\& RSA *rsa); 210\& int RSA_verify_ASN1_OCTET_STRING(int dummy, unsigned char *m, 211\& unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, 212\& RSA *rsa); 213.Ve 214.SH "DESCRIPTION" 215.IX Header "DESCRIPTION" 216These functions implement \s-1RSA\s0 public key encryption and signatures 217as defined in \s-1PKCS\s0 #1 v2.0 [\s-1RFC\s0 2437]. 218.PP 219The \fB\s-1RSA\s0\fR structure consists of several \s-1BIGNUM\s0 components. It can 220contain public as well as private \s-1RSA\s0 keys: 221.PP | 184\& int RSA_sign_ASN1_OCTET_STRING(int dummy, unsigned char *m, 185\& unsigned int m_len, unsigned char *sigret, unsigned int *siglen, 186\& RSA *rsa); 187\& int RSA_verify_ASN1_OCTET_STRING(int dummy, unsigned char *m, 188\& unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, 189\& RSA *rsa); 190.Ve 191.SH "DESCRIPTION" 192.IX Header "DESCRIPTION" 193These functions implement \s-1RSA\s0 public key encryption and signatures 194as defined in \s-1PKCS\s0 #1 v2.0 [\s-1RFC\s0 2437]. 195.PP 196The \fB\s-1RSA\s0\fR structure consists of several \s-1BIGNUM\s0 components. It can 197contain public as well as private \s-1RSA\s0 keys: 198.PP |
222.Vb 13 | 199.Vb 10 |
223\& struct 224\& { 225\& BIGNUM *n; // public modulus 226\& BIGNUM *e; // public exponent 227\& BIGNUM *d; // private exponent 228\& BIGNUM *p; // secret prime factor 229\& BIGNUM *q; // secret prime factor | 200\& struct 201\& { 202\& BIGNUM *n; // public modulus 203\& BIGNUM *e; // public exponent 204\& BIGNUM *d; // private exponent 205\& BIGNUM *p; // secret prime factor 206\& BIGNUM *q; // secret prime factor |
230\& BIGNUM *dmp1; // d mod (p-1) 231\& BIGNUM *dmq1; // d mod (q-1) 232\& BIGNUM *iqmp; // q^-1 mod p | 207\& BIGNUM *dmp1; // d mod (p\-1) 208\& BIGNUM *dmq1; // d mod (q\-1) 209\& BIGNUM *iqmp; // q^\-1 mod p |
233\& // ... 234\& }; 235\& RSA 236.Ve 237.PP 238In public keys, the private exponent and the related secret values are 239\&\fB\s-1NULL\s0\fR. 240.PP --- 22 unchanged lines hidden (view full) --- 263\&\fIRSA_sign\fR\|(3), \fIRSA_size\fR\|(3), 264\&\fIRSA_generate_key\fR\|(3), 265\&\fIRSA_check_key\fR\|(3), 266\&\fIRSA_blinding_on\fR\|(3), 267\&\fIRSA_set_method\fR\|(3), \fIRSA_print\fR\|(3), 268\&\fIRSA_get_ex_new_index\fR\|(3), 269\&\fIRSA_private_encrypt\fR\|(3), 270\&\fIRSA_sign_ASN1_OCTET_STRING\fR\|(3), | 210\& // ... 211\& }; 212\& RSA 213.Ve 214.PP 215In public keys, the private exponent and the related secret values are 216\&\fB\s-1NULL\s0\fR. 217.PP --- 22 unchanged lines hidden (view full) --- 240\&\fIRSA_sign\fR\|(3), \fIRSA_size\fR\|(3), 241\&\fIRSA_generate_key\fR\|(3), 242\&\fIRSA_check_key\fR\|(3), 243\&\fIRSA_blinding_on\fR\|(3), 244\&\fIRSA_set_method\fR\|(3), \fIRSA_print\fR\|(3), 245\&\fIRSA_get_ex_new_index\fR\|(3), 246\&\fIRSA_private_encrypt\fR\|(3), 247\&\fIRSA_sign_ASN1_OCTET_STRING\fR\|(3), |
271\&\fIRSA_padding_add_PKCS1_type_1\fR\|(3) | 248\&\fIRSA_padding_add_PKCS1_type_1\fR\|(3) |