1=pod 2 3=head1 NAME 4 5RSA_sign_ASN1_OCTET_STRING, RSA_verify_ASN1_OCTET_STRING - RSA signatures 6 7=head1 SYNOPSIS 8 9 #include <openssl/rsa.h> 10 11 int RSA_sign_ASN1_OCTET_STRING(int dummy, unsigned char *m, 12 unsigned int m_len, unsigned char *sigret, unsigned int *siglen, 13 RSA *rsa); 14 15 int RSA_verify_ASN1_OCTET_STRING(int dummy, unsigned char *m, 16 unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, 17 RSA *rsa); 18 19=head1 DESCRIPTION 20 21RSA_sign_ASN1_OCTET_STRING() signs the octet string B<m> of size 22B<m_len> using the private key B<rsa> represented in DER using PKCS #1 23padding. It stores the signature in B<sigret> and the signature size 24in B<siglen>. B<sigret> must point to B<RSA_size(rsa)> bytes of 25memory. 26 27B<dummy> is ignored. 28 29The random number generator must be seeded prior to calling RSA_sign_ASN1_OCTET_STRING(). 30 31RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> 32of size B<siglen> is the DER representation of a given octet string 33B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's 34public key. 35 36=head1 RETURN VALUES 37 38RSA_sign_ASN1_OCTET_STRING() returns 1 on success, 0 otherwise. 39RSA_verify_ASN1_OCTET_STRING() returns 1 on successful verification, 0 40otherwise. 41 42The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. 43 44=head1 BUGS 45 46These functions serve no recognizable purpose. 47 48=head1 SEE ALSO 49 50L<ERR_get_error(3)|ERR_get_error(3)>, L<objects(3)|objects(3)>, 51L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, 52L<RSA_verify(3)|RSA_verify(3)> 53 54=head1 HISTORY 55 56RSA_sign_ASN1_OCTET_STRING() and RSA_verify_ASN1_OCTET_STRING() were 57added in SSLeay 0.8. 58 59=cut 60