<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <title>PolarSSL: polarssl/rsa.h File Reference</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <link href="search/search.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="search/search.js"></script> <link href="doxygen.css" rel="stylesheet" type="text/css"/> </head> <body onload='searchBox.OnSelectItem(0);'> <!-- Generated by Doxygen 1.7.4 --> <script type="text/javascript"><!-- var searchBox = new SearchBox("searchBox", "search",false,'Search'); --></script> <div id="top"> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td style="padding-left: 0.5em;"> <div id="projectname">PolarSSL</div> </td> </tr> </tbody> </table> </div> <div id="navrow1" class="tabs"> <ul class="tablist"> <li><a href="index.html"><span>Main Page</span></a></li> <li><a href="annotated.html"><span>Classes</span></a></li> <li class="current"><a href="files.html"><span>Files</span></a></li> <li id="searchli"> <div id="MSearchBox" class="MSearchBoxInactive"> <span class="left"> <img id="MSearchSelect" src="search/mag_sel.png" onmouseover="return searchBox.OnSearchSelectShow()" onmouseout="return searchBox.OnSearchSelectHide()" alt=""/> <input type="text" id="MSearchField" value="Search" accesskey="S" onfocus="searchBox.OnSearchFieldFocus(true)" onblur="searchBox.OnSearchFieldFocus(false)" onkeyup="searchBox.OnSearchFieldChange(event)"/> </span><span class="right"> <a id="MSearchClose" href="javascript:searchBox.CloseResultsWindow()"><img id="MSearchCloseImg" border="0" src="search/close.png" alt=""/></a> </span> </div> </li> </ul> </div> <div id="navrow2" class="tabs2"> <ul class="tablist"> <li><a href="files.html"><span>File List</span></a></li> <li><a href="globals.html"><span>File Members</span></a></li> </ul> </div> </div> <div class="header"> <div class="summary"> <a href="#nested-classes">Classes</a> | <a href="#define-members">Defines</a> | <a href="#func-members">Functions</a> </div> <div class="headertitle"> <div class="title">polarssl/rsa.h File Reference</div> </div> </div> <div class="contents"> <div class="textblock"><code>#include "<a class="el" href="bignum_8h_source.html">polarssl/bignum.h</a>"</code><br/> </div> <p><a href="rsa_8h_source.html">Go to the source code of this file.</a></p> <table class="memberdecls"> <tr><td colspan="2"><h2><a name="nested-classes"></a> Classes</h2></td></tr> <tr><td class="memItemLeft" align="right" valign="top">struct  </td><td class="memItemRight" valign="bottom"><a class="el" href="structrsa__context.html">rsa_context</a></td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">RSA context structure. <a href="structrsa__context.html#details">More...</a><br/></td></tr> <tr><td colspan="2"><h2><a name="define-members"></a> Defines</h2></td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="aa30403951a6242045d0b47e2b51eccb0"></a><!-- doxytag: member="rsa.h::POLARSSL_ERR_RSA_BAD_INPUT_DATA" ref="aa30403951a6242045d0b47e2b51eccb0" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>POLARSSL_ERR_RSA_BAD_INPUT_DATA</b>   -0x0400</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a2cab7b3c4ddc3bc02ffc59db19d0400f"></a><!-- doxytag: member="rsa.h::POLARSSL_ERR_RSA_INVALID_PADDING" ref="a2cab7b3c4ddc3bc02ffc59db19d0400f" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>POLARSSL_ERR_RSA_INVALID_PADDING</b>   -0x0410</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a1cd4e872914a9c350dee5a7deda8b51f"></a><!-- doxytag: member="rsa.h::POLARSSL_ERR_RSA_KEY_GEN_FAILED" ref="a1cd4e872914a9c350dee5a7deda8b51f" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>POLARSSL_ERR_RSA_KEY_GEN_FAILED</b>   -0x0420</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a20c78c8fb43e505b891cf0ae19535316"></a><!-- doxytag: member="rsa.h::POLARSSL_ERR_RSA_KEY_CHECK_FAILED" ref="a20c78c8fb43e505b891cf0ae19535316" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>POLARSSL_ERR_RSA_KEY_CHECK_FAILED</b>   -0x0430</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a6f6e6c330a1005f0846c4d033b49558c"></a><!-- doxytag: member="rsa.h::POLARSSL_ERR_RSA_PUBLIC_FAILED" ref="a6f6e6c330a1005f0846c4d033b49558c" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>POLARSSL_ERR_RSA_PUBLIC_FAILED</b>   -0x0440</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a44f5543dce7fc29b240a516e68acd019"></a><!-- doxytag: member="rsa.h::POLARSSL_ERR_RSA_PRIVATE_FAILED" ref="a44f5543dce7fc29b240a516e68acd019" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>POLARSSL_ERR_RSA_PRIVATE_FAILED</b>   -0x0450</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a6c8054af82b411547c45248cc684609b"></a><!-- doxytag: member="rsa.h::POLARSSL_ERR_RSA_VERIFY_FAILED" ref="a6c8054af82b411547c45248cc684609b" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>POLARSSL_ERR_RSA_VERIFY_FAILED</b>   -0x0460</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a1eb1e554a1fbed5abf93c566bc7751be"></a><!-- doxytag: member="rsa.h::POLARSSL_ERR_RSA_OUTPUT_TOO_LARGE" ref="a1eb1e554a1fbed5abf93c566bc7751be" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>POLARSSL_ERR_RSA_OUTPUT_TOO_LARGE</b>   -0x0470</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a07f72608ba6249132c9a6cf497f0371d"></a><!-- doxytag: member="rsa.h::POLARSSL_ERR_RSA_RNG_FAILED" ref="a07f72608ba6249132c9a6cf497f0371d" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>POLARSSL_ERR_RSA_RNG_FAILED</b>   -0x0480</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a9ebbb0361ff22e4136277f4b956e10b3"></a><!-- doxytag: member="rsa.h::SIG_RSA_RAW" ref="a9ebbb0361ff22e4136277f4b956e10b3" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>SIG_RSA_RAW</b>   0</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="ac844984e1199b323e48874205b5aa34a"></a><!-- doxytag: member="rsa.h::SIG_RSA_MD2" ref="ac844984e1199b323e48874205b5aa34a" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>SIG_RSA_MD2</b>   2</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a5c0041d6be578a2c690c895a14b49c61"></a><!-- doxytag: member="rsa.h::SIG_RSA_MD4" ref="a5c0041d6be578a2c690c895a14b49c61" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>SIG_RSA_MD4</b>   3</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="abd48a5411c9e398f8f338e5a4e22bfcc"></a><!-- doxytag: member="rsa.h::SIG_RSA_MD5" ref="abd48a5411c9e398f8f338e5a4e22bfcc" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>SIG_RSA_MD5</b>   4</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a770c8731881b448f34e50f542874b378"></a><!-- doxytag: member="rsa.h::SIG_RSA_SHA1" ref="a770c8731881b448f34e50f542874b378" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>SIG_RSA_SHA1</b>   5</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a530b9da516b477b79f473b7c633bc122"></a><!-- doxytag: member="rsa.h::SIG_RSA_SHA224" ref="a530b9da516b477b79f473b7c633bc122" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>SIG_RSA_SHA224</b>   14</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a9d9753f3bc798ea73dc86c8a414fed4e"></a><!-- doxytag: member="rsa.h::SIG_RSA_SHA256" ref="a9d9753f3bc798ea73dc86c8a414fed4e" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>SIG_RSA_SHA256</b>   11</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="adb13cdf68a18e7e07e636f3417004f31"></a><!-- doxytag: member="rsa.h::SIG_RSA_SHA384" ref="adb13cdf68a18e7e07e636f3417004f31" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>SIG_RSA_SHA384</b>   12</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="ad356c169f7fb2902af87ce3835eca7e5"></a><!-- doxytag: member="rsa.h::SIG_RSA_SHA512" ref="ad356c169f7fb2902af87ce3835eca7e5" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>SIG_RSA_SHA512</b>   13</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a1f00bab389d3db27a115db74e32be727"></a><!-- doxytag: member="rsa.h::RSA_PUBLIC" ref="a1f00bab389d3db27a115db74e32be727" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>RSA_PUBLIC</b>   0</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="aeaabdd3bae85e564beb1ae9843169eb9"></a><!-- doxytag: member="rsa.h::RSA_PRIVATE" ref="aeaabdd3bae85e564beb1ae9843169eb9" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>RSA_PRIVATE</b>   1</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="acc924b6d08c92a2252fbab6c6ca5860e"></a><!-- doxytag: member="rsa.h::RSA_PKCS_V15" ref="acc924b6d08c92a2252fbab6c6ca5860e" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>RSA_PKCS_V15</b>   0</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="ade2521c3c28b0f5b222fdef75f9f87e9"></a><!-- doxytag: member="rsa.h::RSA_PKCS_V21" ref="ade2521c3c28b0f5b222fdef75f9f87e9" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>RSA_PKCS_V21</b>   1</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="ae1bbc14f00a5c873d7770b44c412df1d"></a><!-- doxytag: member="rsa.h::RSA_SIGN" ref="ae1bbc14f00a5c873d7770b44c412df1d" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>RSA_SIGN</b>   1</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="afdeb08b89f455b4c80a8283a1559b97d"></a><!-- doxytag: member="rsa.h::RSA_CRYPT" ref="afdeb08b89f455b4c80a8283a1559b97d" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>RSA_CRYPT</b>   2</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a903d47509f25653a8760146c61b17cb6"></a><!-- doxytag: member="rsa.h::ASN1_STR_CONSTRUCTED_SEQUENCE" ref="a903d47509f25653a8760146c61b17cb6" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>ASN1_STR_CONSTRUCTED_SEQUENCE</b>   "\x30"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a05bcf77c2a404dbacc9db8f2e88b2cb1"></a><!-- doxytag: member="rsa.h::ASN1_STR_NULL" ref="a05bcf77c2a404dbacc9db8f2e88b2cb1" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>ASN1_STR_NULL</b>   "\x05"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="abc8ed401e1ec67778dd3589b63fda05d"></a><!-- doxytag: member="rsa.h::ASN1_STR_OID" ref="abc8ed401e1ec67778dd3589b63fda05d" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>ASN1_STR_OID</b>   "\x06"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="abe1365e6f84608ef50b56331e287db72"></a><!-- doxytag: member="rsa.h::ASN1_STR_OCTET_STRING" ref="abe1365e6f84608ef50b56331e287db72" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>ASN1_STR_OCTET_STRING</b>   "\x04"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a1bc9d7849811e4eac776f2d655ce4e6d"></a><!-- doxytag: member="rsa.h::OID_DIGEST_ALG_MDX" ref="a1bc9d7849811e4eac776f2d655ce4e6d" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>OID_DIGEST_ALG_MDX</b>   "\x2A\x86\x48\x86\xF7\x0D\x02\x00"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a8e4a58be5dbe0dca79a138665a68e321"></a><!-- doxytag: member="rsa.h::OID_HASH_ALG_SHA1" ref="a8e4a58be5dbe0dca79a138665a68e321" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>OID_HASH_ALG_SHA1</b>   "\x2b\x0e\x03\x02\x1a"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a4f694be0ac4656c7e79a56776db97090"></a><!-- doxytag: member="rsa.h::OID_HASH_ALG_SHA2X" ref="a4f694be0ac4656c7e79a56776db97090" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>OID_HASH_ALG_SHA2X</b>   "\x60\x86\x48\x01\x65\x03\x04\x02\x00"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a43449224983a1f2892271cdd5eb6f6ef"></a><!-- doxytag: member="rsa.h::OID_ISO_MEMBER_BODIES" ref="a43449224983a1f2892271cdd5eb6f6ef" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>OID_ISO_MEMBER_BODIES</b>   "\x2a"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="a6b6756e93042d2732d1531e24530b350"></a><!-- doxytag: member="rsa.h::OID_ISO_IDENTIFIED_ORG" ref="a6b6756e93042d2732d1531e24530b350" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>OID_ISO_IDENTIFIED_ORG</b>   "\x2b"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="af1cac94c1d85ce021e8f6b9c7643defb"></a><!-- doxytag: member="rsa.h::OID_COUNTRY_US" ref="af1cac94c1d85ce021e8f6b9c7643defb" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>OID_COUNTRY_US</b>   "\x86\x48"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="afff1d3451f6d6da3ae5fc5ce96050aff"></a><!-- doxytag: member="rsa.h::OID_RSA_DATA_SECURITY" ref="afff1d3451f6d6da3ae5fc5ce96050aff" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>OID_RSA_DATA_SECURITY</b>   "\x86\xf7\x0d"</td></tr> <tr><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="aeff120691691d3875a336684c165b0c3"></a><!-- doxytag: member="rsa.h::OID_OIW_SECSIG_SHA1" ref="aeff120691691d3875a336684c165b0c3" args="" --> #define </td><td class="memItemRight" valign="bottom"><b>OID_OIW_SECSIG_SHA1</b>   "\x0e\x03\x02\x1a"</td></tr> <tr><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><b>ASN1_HASH_MDX</b></td></tr> <tr><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><b>ASN1_HASH_SHA1</b></td></tr> <tr><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><b>ASN1_HASH_SHA2X</b></td></tr> <tr><td colspan="2"><h2><a name="func-members"></a> Functions</h2></td></tr> <tr><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a79875c9f9d5831aecf5ea095905a5b64">rsa_init</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int padding, int hash_id)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Initialize an RSA context. <a href="#a79875c9f9d5831aecf5ea095905a5b64"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a6d0bb4ec8c16e181065e4664f6dbd3ee">rsa_gen_key</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *), void *p_rng, int nbits, int exponent)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Generate an RSA keypair. <a href="#a6d0bb4ec8c16e181065e4664f6dbd3ee"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ae8208f2c3741564581ec745b27524c45">rsa_check_pubkey</a> (const <a class="el" href="structrsa__context.html">rsa_context</a> *ctx)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Check a public RSA key. <a href="#ae8208f2c3741564581ec745b27524c45"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a0fe904ec611cd6b53c72b7308f3ed3db">rsa_check_privkey</a> (const <a class="el" href="structrsa__context.html">rsa_context</a> *ctx)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Check a private RSA key. <a href="#a0fe904ec611cd6b53c72b7308f3ed3db"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a29709d2f3d05d833b28081b743f9815f">rsa_public</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, const unsigned char *input, unsigned char *output)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Do an RSA public key operation. <a href="#a29709d2f3d05d833b28081b743f9815f"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a14b35bc11521151b55a28f64d39cd776">rsa_private</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, const unsigned char *input, unsigned char *output)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Do an RSA private key operation. <a href="#a14b35bc11521151b55a28f64d39cd776"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#acf422a8f269e001804d2bbcb78a25c64">rsa_pkcs1_encrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *), void *p_rng, int mode, int ilen, const unsigned char *input, unsigned char *output)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Add the message padding, then do an RSA operation. <a href="#acf422a8f269e001804d2bbcb78a25c64"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a912c26404661e52922076f21a558fc2b">rsa_pkcs1_decrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int mode, int *olen, const unsigned char *input, unsigned char *output, int output_max_len)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Do an RSA operation, then remove the message padding. <a href="#a912c26404661e52922076f21a558fc2b"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#af4e36c6b80f03e668505d2892e570c5b">rsa_pkcs1_sign</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int mode, int hash_id, int hashlen, const unsigned char *hash, unsigned char *sig)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Do a private RSA to sign a message digest. <a href="#af4e36c6b80f03e668505d2892e570c5b"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a0d205476542d3a06558ffecfab4340eb">rsa_pkcs1_verify</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int mode, int hash_id, int hashlen, const unsigned char *hash, unsigned char *sig)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Do a public RSA and check the message digest. <a href="#a0d205476542d3a06558ffecfab4340eb"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#abb5d26b09e183c8a885eaee270c38fc7">rsa_free</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Free the components of an RSA key. <a href="#abb5d26b09e183c8a885eaee270c38fc7"></a><br/></td></tr> <tr><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a118d1ea38ffeaef3ebfdfb418d2c42dd">rsa_self_test</a> (int verbose)</td></tr> <tr><td class="mdescLeft"> </td><td class="mdescRight">Checkup routine. <a href="#a118d1ea38ffeaef3ebfdfb418d2c42dd"></a><br/></td></tr> </table> <hr/><a name="details" id="details"></a><h2>Detailed Description</h2> <div class="textblock"><p>Copyright (C) 2006-2010, Brainspark B.V.</p> <p>This file is part of PolarSSL (<a href="http://www.polarssl.org">http://www.polarssl.org</a>) Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org></p> <p>All rights reserved.</p> <p>This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.</p> <p>This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.</p> <p>You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. </p> </div><hr/><h2>Define Documentation</h2> <a class="anchor" id="a2a755e1f5cf1373bb6f98436c4d9b212"></a><!-- doxytag: member="rsa.h::ASN1_HASH_MDX" ref="a2a755e1f5cf1373bb6f98436c4d9b212" args="" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define ASN1_HASH_MDX</td> </tr> </table> </div> <div class="memdoc"> <b>Value:</b><div class="fragment"><pre class="fragment">( \ ASN1_STR_CONSTRUCTED_SEQUENCE <span class="stringliteral">"\x20"</span> \ ASN1_STR_CONSTRUCTED_SEQUENCE <span class="stringliteral">"\x0C"</span> \ ASN1_STR_OID <span class="stringliteral">"\x08"</span> \ OID_DIGEST_ALG_MDX \ ASN1_STR_NULL <span class="stringliteral">"\x00"</span> \ ASN1_STR_OCTET_STRING <span class="stringliteral">"\x10"</span> \ ) </pre></div> </div> </div> <a class="anchor" id="a826638d4b874ebc70f1133d0db67c6b2"></a><!-- doxytag: member="rsa.h::ASN1_HASH_SHA1" ref="a826638d4b874ebc70f1133d0db67c6b2" args="" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define ASN1_HASH_SHA1</td> </tr> </table> </div> <div class="memdoc"> <b>Value:</b><div class="fragment"><pre class="fragment">ASN1_STR_CONSTRUCTED_SEQUENCE <span class="stringliteral">"\x21"</span> \ ASN1_STR_CONSTRUCTED_SEQUENCE <span class="stringliteral">"\x09"</span> \ ASN1_STR_OID <span class="stringliteral">"\x05"</span> \ OID_HASH_ALG_SHA1 \ ASN1_STR_NULL <span class="stringliteral">"\x00"</span> \ ASN1_STR_OCTET_STRING <span class="stringliteral">"\x14"</span> </pre></div> </div> </div> <a class="anchor" id="a46c5f9992fbbc6b3e539005e2d558a06"></a><!-- doxytag: member="rsa.h::ASN1_HASH_SHA2X" ref="a46c5f9992fbbc6b3e539005e2d558a06" args="" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define ASN1_HASH_SHA2X</td> </tr> </table> </div> <div class="memdoc"> <b>Value:</b><div class="fragment"><pre class="fragment">ASN1_STR_CONSTRUCTED_SEQUENCE <span class="stringliteral">"\x11"</span> \ ASN1_STR_CONSTRUCTED_SEQUENCE <span class="stringliteral">"\x0d"</span> \ ASN1_STR_OID <span class="stringliteral">"\x09"</span> \ OID_HASH_ALG_SHA2X \ ASN1_STR_NULL <span class="stringliteral">"\x00"</span> \ ASN1_STR_OCTET_STRING <span class="stringliteral">"\x00"</span> </pre></div> </div> </div> <hr/><h2>Function Documentation</h2> <a class="anchor" id="a0fe904ec611cd6b53c72b7308f3ed3db"></a><!-- doxytag: member="rsa.h::rsa_check_privkey" ref="a0fe904ec611cd6b53c72b7308f3ed3db" args="(const rsa_context *ctx)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_check_privkey </td> <td>(</td> <td class="paramtype">const <a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div> <div class="memdoc"> <p>Check a private RSA key. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context to be checked</td></tr> </table> </dd> </dl> <dl class="return"><dt><b>Returns:</b></dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code </dd></dl> </div> </div> <a class="anchor" id="ae8208f2c3741564581ec745b27524c45"></a><!-- doxytag: member="rsa.h::rsa_check_pubkey" ref="ae8208f2c3741564581ec745b27524c45" args="(const rsa_context *ctx)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_check_pubkey </td> <td>(</td> <td class="paramtype">const <a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div> <div class="memdoc"> <p>Check a public RSA key. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context to be checked</td></tr> </table> </dd> </dl> <dl class="return"><dt><b>Returns:</b></dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code </dd></dl> </div> </div> <a class="anchor" id="abb5d26b09e183c8a885eaee270c38fc7"></a><!-- doxytag: member="rsa.h::rsa_free" ref="abb5d26b09e183c8a885eaee270c38fc7" args="(rsa_context *ctx)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void rsa_free </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div> <div class="memdoc"> <p>Free the components of an RSA key. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA Context to free </td></tr> </table> </dd> </dl> </div> </div> <a class="anchor" id="a6d0bb4ec8c16e181065e4664f6dbd3ee"></a><!-- doxytag: member="rsa.h::rsa_gen_key" ref="a6d0bb4ec8c16e181065e4664f6dbd3ee" args="(rsa_context *ctx, int(*f_rng)(void *), void *p_rng, int nbits, int exponent)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_gen_key </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>nbits</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>exponent</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div> <div class="memdoc"> <p>Generate an RSA keypair. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context that will hold the key </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">nbits</td><td>size of the public key in bits </td></tr> <tr><td class="paramname">exponent</td><td>public exponent (e.g., 65537)</td></tr> </table> </dd> </dl> <dl class="note"><dt><b>Note:</b></dt><dd><a class="el" href="rsa_8h.html#a79875c9f9d5831aecf5ea095905a5b64" title="Initialize an RSA context.">rsa_init()</a> must be called beforehand to setup the RSA context.</dd></dl> <dl class="return"><dt><b>Returns:</b></dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code </dd></dl> </div> </div> <a class="anchor" id="a79875c9f9d5831aecf5ea095905a5b64"></a><!-- doxytag: member="rsa.h::rsa_init" ref="a79875c9f9d5831aecf5ea095905a5b64" args="(rsa_context *ctx, int padding, int hash_id)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void rsa_init </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>padding</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>hash_id</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div> <div class="memdoc"> <p>Initialize an RSA context. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context to be initialized </td></tr> <tr><td class="paramname">padding</td><td>RSA_PKCS_V15 or RSA_PKCS_V21 </td></tr> <tr><td class="paramname">hash_id</td><td>RSA_PKCS_V21 hash identifier</td></tr> </table> </dd> </dl> <dl class="note"><dt><b>Note:</b></dt><dd>The hash_id parameter is actually ignored when using RSA_PKCS_V15 padding.</dd> <dd> Currently, RSA_PKCS_V21 padding is not supported. </dd></dl> </div> </div> <a class="anchor" id="a912c26404661e52922076f21a558fc2b"></a><!-- doxytag: member="rsa.h::rsa_pkcs1_decrypt" ref="a912c26404661e52922076f21a558fc2b" args="(rsa_context *ctx, int mode, int *olen, const unsigned char *input, unsigned char *output, int output_max_len)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_pkcs1_decrypt </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int * </td> <td class="paramname"><em>olen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>output_max_len</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div> <div class="memdoc"> <p>Do an RSA operation, then remove the message padding. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">input</td><td>buffer holding the encrypted data </td></tr> <tr><td class="paramname">output</td><td>buffer that will hold the plaintext </td></tr> <tr><td class="paramname">olen</td><td>will contain the plaintext length </td></tr> <tr><td class="paramname">output_max_len</td><td>maximum length of the output buffer</td></tr> </table> </dd> </dl> <dl class="return"><dt><b>Returns:</b></dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="note"><dt><b>Note:</b></dt><dd>The output buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used) otherwise an error is thrown. </dd></dl> </div> </div> <a class="anchor" id="acf422a8f269e001804d2bbcb78a25c64"></a><!-- doxytag: member="rsa.h::rsa_pkcs1_encrypt" ref="acf422a8f269e001804d2bbcb78a25c64" args="(rsa_context *ctx, int(*f_rng)(void *), void *p_rng, int mode, int ilen, const unsigned char *input, unsigned char *output)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_pkcs1_encrypt </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>ilen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div> <div class="memdoc"> <p>Add the message padding, then do an RSA operation. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">ilen</td><td>contains the plaintext length </td></tr> <tr><td class="paramname">input</td><td>buffer holding the data to be encrypted </td></tr> <tr><td class="paramname">output</td><td>buffer that will hold the ciphertext</td></tr> </table> </dd> </dl> <dl class="return"><dt><b>Returns:</b></dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="note"><dt><b>Note:</b></dt><dd>The output buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="af4e36c6b80f03e668505d2892e570c5b"></a><!-- doxytag: member="rsa.h::rsa_pkcs1_sign" ref="af4e36c6b80f03e668505d2892e570c5b" args="(rsa_context *ctx, int mode, int hash_id, int hashlen, const unsigned char *hash, unsigned char *sig)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_pkcs1_sign </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>hash_id</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>hashlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>hash</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>sig</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div> <div class="memdoc"> <p>Do a private RSA to sign a message digest. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">hash_id</td><td>SIG_RSA_RAW, SIG_RSA_MD{2,4,5} or SIG_RSA_SHA{1,224,256,384,512} </td></tr> <tr><td class="paramname">hashlen</td><td>message digest length (for SIG_RSA_RAW only) </td></tr> <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr> <tr><td class="paramname">sig</td><td>buffer that will hold the ciphertext</td></tr> </table> </dd> </dl> <dl class="return"><dt><b>Returns:</b></dt><dd>0 if the signing operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="note"><dt><b>Note:</b></dt><dd>The "sig" buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="a0d205476542d3a06558ffecfab4340eb"></a><!-- doxytag: member="rsa.h::rsa_pkcs1_verify" ref="a0d205476542d3a06558ffecfab4340eb" args="(rsa_context *ctx, int mode, int hash_id, int hashlen, const unsigned char *hash, unsigned char *sig)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_pkcs1_verify </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>hash_id</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>hashlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>hash</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>sig</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div> <div class="memdoc"> <p>Do a public RSA and check the message digest. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>points to an RSA public key </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">hash_id</td><td>SIG_RSA_RAW, SIG_RSA_MD{2,4,5} or SIG_RSA_SHA{1,224,256,384,512} </td></tr> <tr><td class="paramname">hashlen</td><td>message digest length (for SIG_RSA_RAW only) </td></tr> <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr> <tr><td class="paramname">sig</td><td>buffer holding the ciphertext</td></tr> </table> </dd> </dl> <dl class="return"><dt><b>Returns:</b></dt><dd>0 if the verify operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="note"><dt><b>Note:</b></dt><dd>The "sig" buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="a14b35bc11521151b55a28f64d39cd776"></a><!-- doxytag: member="rsa.h::rsa_private" ref="a14b35bc11521151b55a28f64d39cd776" args="(rsa_context *ctx, const unsigned char *input, unsigned char *output)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_private </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div> <div class="memdoc"> <p>Do an RSA private key operation. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">input</td><td>input buffer </td></tr> <tr><td class="paramname">output</td><td>output buffer</td></tr> </table> </dd> </dl> <dl class="return"><dt><b>Returns:</b></dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="note"><dt><b>Note:</b></dt><dd>The input and output buffers must be large enough (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="a29709d2f3d05d833b28081b743f9815f"></a><!-- doxytag: member="rsa.h::rsa_public" ref="a29709d2f3d05d833b28081b743f9815f" args="(rsa_context *ctx, const unsigned char *input, unsigned char *output)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_public </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div> <div class="memdoc"> <p>Do an RSA public key operation. </p> <dl><dt><b>Parameters:</b></dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">input</td><td>input buffer </td></tr> <tr><td class="paramname">output</td><td>output buffer</td></tr> </table> </dd> </dl> <dl class="return"><dt><b>Returns:</b></dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="note"><dt><b>Note:</b></dt><dd>This function does NOT take care of message padding. Also, be sure to set input[0] = 0 or assure that input is smaller than N.</dd> <dd> The input and output buffers must be large enough (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="a118d1ea38ffeaef3ebfdfb418d2c42dd"></a><!-- doxytag: member="rsa.h::rsa_self_test" ref="a118d1ea38ffeaef3ebfdfb418d2c42dd" args="(int verbose)" --> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_self_test </td> <td>(</td> <td class="paramtype">int </td> <td class="paramname"><em>verbose</em></td><td>)</td> <td></td> </tr> </table> </div> <div class="memdoc"> <p>Checkup routine. </p> <dl class="return"><dt><b>Returns:</b></dt><dd>0 if successful, or 1 if the test failed </dd></dl> </div> </div> </div> <!-- window showing the filter options --> <div id="MSearchSelectWindow" onmouseover="return searchBox.OnSearchSelectShow()" onmouseout="return searchBox.OnSearchSelectHide()" onkeydown="return searchBox.OnSearchSelectKey(event)"> <a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(0)"><span class="SelectionMark"> </span>All</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(1)"><span class="SelectionMark"> </span>Classes</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(2)"><span class="SelectionMark"> </span>Files</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(3)"><span class="SelectionMark"> </span>Functions</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(4)"><span class="SelectionMark"> </span>Variables</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(5)"><span class="SelectionMark"> </span>Defines</a></div> <!-- iframe showing the search results (closed by default) --> <div id="MSearchResultsWindow"> <iframe src="javascript:void(0)" frameborder="0" name="MSearchResults" id="MSearchResults"> </iframe> </div> <hr class="footer"/><address class="footer"><small>Generated on Mon May 16 2011 for PolarSSL by  <a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/></a> 1.7.4 </small></address> </body> </html>