Sophie

Sophie

distrib > Mageia > 4 > x86_64 > by-pkgid > 9e72f3e7ecf68cce016a7c5c59e863d3 > files > 727

lib64polarssl-devel-1.3.8-1.mga4.x86_64.rpm

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
<meta name="generator" content="Doxygen 1.8.5"/>
<title>PolarSSL v1.3.8: rsa.h File Reference</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="jquery.js"></script>
<script type="text/javascript" src="dynsections.js"></script>
<link href="doxygen.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
 <tbody>
 <tr style="height: 56px;">
  <td style="padding-left: 0.5em;">
   <div id="projectname">PolarSSL v1.3.8
   </div>
  </td>
 </tr>
 </tbody>
</table>
</div>
<!-- end header part -->
<!-- Generated by Doxygen 1.8.5 -->
  <div id="navrow1" class="tabs">
    <ul class="tablist">
      <li><a href="index.html"><span>Main&#160;Page</span></a></li>
      <li><a href="modules.html"><span>Modules</span></a></li>
      <li><a href="annotated.html"><span>Data&#160;Structures</span></a></li>
      <li class="current"><a href="files.html"><span>Files</span></a></li>
    </ul>
  </div>
  <div id="navrow2" class="tabs2">
    <ul class="tablist">
      <li><a href="files.html"><span>File&#160;List</span></a></li>
      <li><a href="globals.html"><span>Globals</span></a></li>
    </ul>
  </div>
<div id="nav-path" class="navpath">
  <ul>
<li class="navelem"><a class="el" href="dir_6a9bbd12bf4e19a18c45e270f8fae3fd.html">include</a></li><li class="navelem"><a class="el" href="dir_04272d44da4745cf8b8bfc767d6c6523.html">polarssl</a></li>  </ul>
</div>
</div><!-- top -->
<div class="header">
  <div class="summary">
<a href="#nested-classes">Data Structures</a> &#124;
<a href="#define-members">Macros</a> &#124;
<a href="#func-members">Functions</a>  </div>
  <div class="headertitle">
<div class="title">rsa.h File Reference</div>  </div>
</div><!--header-->
<div class="contents">

<p>The RSA public-key cryptosystem.  
<a href="#details">More...</a></p>
<div class="textblock"><code>#include &quot;<a class="el" href="config_8h_source.html">config.h</a>&quot;</code><br/>
<code>#include &quot;<a class="el" href="bignum_8h_source.html">bignum.h</a>&quot;</code><br/>
<code>#include &quot;<a class="el" href="md_8h_source.html">md.h</a>&quot;</code><br/>
</div><div class="textblock"><div class="dynheader">
Include dependency graph for rsa.h:</div>
<div class="dyncontent">
<div class="center"><img src="rsa_8h__incl.png" border="0" usemap="#rsa_8h" alt=""/></div>
<map name="rsa_8h" id="rsa_8h">
</map>
</div>
</div><div class="textblock"><div class="dynheader">
This graph shows which files directly or indirectly include this file:</div>
<div class="dyncontent">
<div class="center"><img src="rsa_8h__dep__incl.png" border="0" usemap="#rsa_8hdep" alt=""/></div>
<map name="rsa_8hdep" id="rsa_8hdep">
</map>
</div>
</div>
<p><a href="rsa_8h_source.html">Go to the source code of this file.</a></p>
<table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="nested-classes"></a>
Data Structures</h2></td></tr>
<tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct &#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="structrsa__context.html">rsa_context</a></td></tr>
<tr class="memdesc:"><td class="mdescLeft">&#160;</td><td class="mdescRight">RSA context structure.  <a href="structrsa__context.html#details">More...</a><br/></td></tr>
<tr class="separator:"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="define-members"></a>
Macros</h2></td></tr>
<tr class="memitem:aa30403951a6242045d0b47e2b51eccb0"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#aa30403951a6242045d0b47e2b51eccb0">POLARSSL_ERR_RSA_BAD_INPUT_DATA</a>&#160;&#160;&#160;-0x4080</td></tr>
<tr class="memdesc:aa30403951a6242045d0b47e2b51eccb0"><td class="mdescLeft">&#160;</td><td class="mdescRight">Bad input parameters to function.  <a href="#aa30403951a6242045d0b47e2b51eccb0">More...</a><br/></td></tr>
<tr class="separator:aa30403951a6242045d0b47e2b51eccb0"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a2cab7b3c4ddc3bc02ffc59db19d0400f"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a2cab7b3c4ddc3bc02ffc59db19d0400f">POLARSSL_ERR_RSA_INVALID_PADDING</a>&#160;&#160;&#160;-0x4100</td></tr>
<tr class="memdesc:a2cab7b3c4ddc3bc02ffc59db19d0400f"><td class="mdescLeft">&#160;</td><td class="mdescRight">Input data contains invalid padding and is rejected.  <a href="#a2cab7b3c4ddc3bc02ffc59db19d0400f">More...</a><br/></td></tr>
<tr class="separator:a2cab7b3c4ddc3bc02ffc59db19d0400f"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a1cd4e872914a9c350dee5a7deda8b51f"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a1cd4e872914a9c350dee5a7deda8b51f">POLARSSL_ERR_RSA_KEY_GEN_FAILED</a>&#160;&#160;&#160;-0x4180</td></tr>
<tr class="memdesc:a1cd4e872914a9c350dee5a7deda8b51f"><td class="mdescLeft">&#160;</td><td class="mdescRight">Something failed during generation of a key.  <a href="#a1cd4e872914a9c350dee5a7deda8b51f">More...</a><br/></td></tr>
<tr class="separator:a1cd4e872914a9c350dee5a7deda8b51f"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a20c78c8fb43e505b891cf0ae19535316"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a20c78c8fb43e505b891cf0ae19535316">POLARSSL_ERR_RSA_KEY_CHECK_FAILED</a>&#160;&#160;&#160;-0x4200</td></tr>
<tr class="memdesc:a20c78c8fb43e505b891cf0ae19535316"><td class="mdescLeft">&#160;</td><td class="mdescRight">Key failed to pass the libraries validity check.  <a href="#a20c78c8fb43e505b891cf0ae19535316">More...</a><br/></td></tr>
<tr class="separator:a20c78c8fb43e505b891cf0ae19535316"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a6f6e6c330a1005f0846c4d033b49558c"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a6f6e6c330a1005f0846c4d033b49558c">POLARSSL_ERR_RSA_PUBLIC_FAILED</a>&#160;&#160;&#160;-0x4280</td></tr>
<tr class="memdesc:a6f6e6c330a1005f0846c4d033b49558c"><td class="mdescLeft">&#160;</td><td class="mdescRight">The public key operation failed.  <a href="#a6f6e6c330a1005f0846c4d033b49558c">More...</a><br/></td></tr>
<tr class="separator:a6f6e6c330a1005f0846c4d033b49558c"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a44f5543dce7fc29b240a516e68acd019"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a44f5543dce7fc29b240a516e68acd019">POLARSSL_ERR_RSA_PRIVATE_FAILED</a>&#160;&#160;&#160;-0x4300</td></tr>
<tr class="memdesc:a44f5543dce7fc29b240a516e68acd019"><td class="mdescLeft">&#160;</td><td class="mdescRight">The private key operation failed.  <a href="#a44f5543dce7fc29b240a516e68acd019">More...</a><br/></td></tr>
<tr class="separator:a44f5543dce7fc29b240a516e68acd019"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a6c8054af82b411547c45248cc684609b"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a6c8054af82b411547c45248cc684609b">POLARSSL_ERR_RSA_VERIFY_FAILED</a>&#160;&#160;&#160;-0x4380</td></tr>
<tr class="memdesc:a6c8054af82b411547c45248cc684609b"><td class="mdescLeft">&#160;</td><td class="mdescRight">The PKCS#1 verification failed.  <a href="#a6c8054af82b411547c45248cc684609b">More...</a><br/></td></tr>
<tr class="separator:a6c8054af82b411547c45248cc684609b"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a1eb1e554a1fbed5abf93c566bc7751be"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a1eb1e554a1fbed5abf93c566bc7751be">POLARSSL_ERR_RSA_OUTPUT_TOO_LARGE</a>&#160;&#160;&#160;-0x4400</td></tr>
<tr class="memdesc:a1eb1e554a1fbed5abf93c566bc7751be"><td class="mdescLeft">&#160;</td><td class="mdescRight">The output buffer for decryption is not large enough.  <a href="#a1eb1e554a1fbed5abf93c566bc7751be">More...</a><br/></td></tr>
<tr class="separator:a1eb1e554a1fbed5abf93c566bc7751be"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a07f72608ba6249132c9a6cf497f0371d"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a07f72608ba6249132c9a6cf497f0371d">POLARSSL_ERR_RSA_RNG_FAILED</a>&#160;&#160;&#160;-0x4480</td></tr>
<tr class="memdesc:a07f72608ba6249132c9a6cf497f0371d"><td class="mdescLeft">&#160;</td><td class="mdescRight">The random generator failed to generate non-zeros.  <a href="#a07f72608ba6249132c9a6cf497f0371d">More...</a><br/></td></tr>
<tr class="separator:a07f72608ba6249132c9a6cf497f0371d"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a1f00bab389d3db27a115db74e32be727"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a1f00bab389d3db27a115db74e32be727">RSA_PUBLIC</a>&#160;&#160;&#160;0</td></tr>
<tr class="separator:a1f00bab389d3db27a115db74e32be727"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:aeaabdd3bae85e564beb1ae9843169eb9"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#aeaabdd3bae85e564beb1ae9843169eb9">RSA_PRIVATE</a>&#160;&#160;&#160;1</td></tr>
<tr class="separator:aeaabdd3bae85e564beb1ae9843169eb9"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:acc924b6d08c92a2252fbab6c6ca5860e"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#acc924b6d08c92a2252fbab6c6ca5860e">RSA_PKCS_V15</a>&#160;&#160;&#160;0</td></tr>
<tr class="separator:acc924b6d08c92a2252fbab6c6ca5860e"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ade2521c3c28b0f5b222fdef75f9f87e9"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ade2521c3c28b0f5b222fdef75f9f87e9">RSA_PKCS_V21</a>&#160;&#160;&#160;1</td></tr>
<tr class="separator:ade2521c3c28b0f5b222fdef75f9f87e9"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ae1bbc14f00a5c873d7770b44c412df1d"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ae1bbc14f00a5c873d7770b44c412df1d">RSA_SIGN</a>&#160;&#160;&#160;1</td></tr>
<tr class="separator:ae1bbc14f00a5c873d7770b44c412df1d"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:afdeb08b89f455b4c80a8283a1559b97d"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#afdeb08b89f455b4c80a8283a1559b97d">RSA_CRYPT</a>&#160;&#160;&#160;2</td></tr>
<tr class="separator:afdeb08b89f455b4c80a8283a1559b97d"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a6361445cef26eba64992ea54ecb90a47"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a6361445cef26eba64992ea54ecb90a47">RSA_SALT_LEN_ANY</a>&#160;&#160;&#160;-1</td></tr>
<tr class="separator:a6361445cef26eba64992ea54ecb90a47"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="func-members"></a>
Functions</h2></td></tr>
<tr class="memitem:a79875c9f9d5831aecf5ea095905a5b64"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a79875c9f9d5831aecf5ea095905a5b64">rsa_init</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int padding, int hash_id)</td></tr>
<tr class="memdesc:a79875c9f9d5831aecf5ea095905a5b64"><td class="mdescLeft">&#160;</td><td class="mdescRight">Initialize an RSA context.  <a href="#a79875c9f9d5831aecf5ea095905a5b64">More...</a><br/></td></tr>
<tr class="separator:a79875c9f9d5831aecf5ea095905a5b64"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a4938556c8f689303c9a24f0d6281098c"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a4938556c8f689303c9a24f0d6281098c">rsa_set_padding</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int padding, int hash_id)</td></tr>
<tr class="memdesc:a4938556c8f689303c9a24f0d6281098c"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set padding for an already initialized RSA context See <code><a class="el" href="rsa_8h.html#a79875c9f9d5831aecf5ea095905a5b64" title="Initialize an RSA context. ">rsa_init()</a></code> for details.  <a href="#a4938556c8f689303c9a24f0d6281098c">More...</a><br/></td></tr>
<tr class="separator:a4938556c8f689303c9a24f0d6281098c"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:acff8aaec6c8fff40f733641e570cb9af"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#acff8aaec6c8fff40f733641e570cb9af">rsa_gen_key</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, unsigned int nbits, int exponent)</td></tr>
<tr class="memdesc:acff8aaec6c8fff40f733641e570cb9af"><td class="mdescLeft">&#160;</td><td class="mdescRight">Generate an RSA keypair.  <a href="#acff8aaec6c8fff40f733641e570cb9af">More...</a><br/></td></tr>
<tr class="separator:acff8aaec6c8fff40f733641e570cb9af"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ae8208f2c3741564581ec745b27524c45"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ae8208f2c3741564581ec745b27524c45">rsa_check_pubkey</a> (const <a class="el" href="structrsa__context.html">rsa_context</a> *ctx)</td></tr>
<tr class="memdesc:ae8208f2c3741564581ec745b27524c45"><td class="mdescLeft">&#160;</td><td class="mdescRight">Check a public RSA key.  <a href="#ae8208f2c3741564581ec745b27524c45">More...</a><br/></td></tr>
<tr class="separator:ae8208f2c3741564581ec745b27524c45"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a0fe904ec611cd6b53c72b7308f3ed3db"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a0fe904ec611cd6b53c72b7308f3ed3db">rsa_check_privkey</a> (const <a class="el" href="structrsa__context.html">rsa_context</a> *ctx)</td></tr>
<tr class="memdesc:a0fe904ec611cd6b53c72b7308f3ed3db"><td class="mdescLeft">&#160;</td><td class="mdescRight">Check a private RSA key.  <a href="#a0fe904ec611cd6b53c72b7308f3ed3db">More...</a><br/></td></tr>
<tr class="separator:a0fe904ec611cd6b53c72b7308f3ed3db"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a29709d2f3d05d833b28081b743f9815f"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a29709d2f3d05d833b28081b743f9815f">rsa_public</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, const unsigned char *input, unsigned char *output)</td></tr>
<tr class="memdesc:a29709d2f3d05d833b28081b743f9815f"><td class="mdescLeft">&#160;</td><td class="mdescRight">Do an RSA public key operation.  <a href="#a29709d2f3d05d833b28081b743f9815f">More...</a><br/></td></tr>
<tr class="separator:a29709d2f3d05d833b28081b743f9815f"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a305bf558a7137a1037d3f0c536060f06"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a305bf558a7137a1037d3f0c536060f06">rsa_private</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, const unsigned char *input, unsigned char *output)</td></tr>
<tr class="memdesc:a305bf558a7137a1037d3f0c536060f06"><td class="mdescLeft">&#160;</td><td class="mdescRight">Do an RSA private key operation.  <a href="#a305bf558a7137a1037d3f0c536060f06">More...</a><br/></td></tr>
<tr class="separator:a305bf558a7137a1037d3f0c536060f06"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a16791653e4d448e25944e3579f727b50"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a16791653e4d448e25944e3579f727b50">rsa_pkcs1_encrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, size_t ilen, const unsigned char *input, unsigned char *output)</td></tr>
<tr class="memdesc:a16791653e4d448e25944e3579f727b50"><td class="mdescLeft">&#160;</td><td class="mdescRight">Generic wrapper to perform a PKCS#1 encryption using the mode from the context.  <a href="#a16791653e4d448e25944e3579f727b50">More...</a><br/></td></tr>
<tr class="separator:a16791653e4d448e25944e3579f727b50"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a63c6784b611700b05a8e613a9e33f7cc"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a63c6784b611700b05a8e613a9e33f7cc">rsa_rsaes_pkcs1_v15_encrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, size_t ilen, const unsigned char *input, unsigned char *output)</td></tr>
<tr class="memdesc:a63c6784b611700b05a8e613a9e33f7cc"><td class="mdescLeft">&#160;</td><td class="mdescRight">Perform a PKCS#1 v1.5 encryption (RSAES-PKCS1-v1_5-ENCRYPT)  <a href="#a63c6784b611700b05a8e613a9e33f7cc">More...</a><br/></td></tr>
<tr class="separator:a63c6784b611700b05a8e613a9e33f7cc"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a7aa223539fe35b57b8a221fc9921b116"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a7aa223539fe35b57b8a221fc9921b116">rsa_rsaes_oaep_encrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, const unsigned char *label, size_t label_len, size_t ilen, const unsigned char *input, unsigned char *output)</td></tr>
<tr class="memdesc:a7aa223539fe35b57b8a221fc9921b116"><td class="mdescLeft">&#160;</td><td class="mdescRight">Perform a PKCS#1 v2.1 OAEP encryption (RSAES-OAEP-ENCRYPT)  <a href="#a7aa223539fe35b57b8a221fc9921b116">More...</a><br/></td></tr>
<tr class="separator:a7aa223539fe35b57b8a221fc9921b116"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a01f8396add05e6e621f8e97d58f75e3a"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a01f8396add05e6e621f8e97d58f75e3a">rsa_pkcs1_decrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, size_t *olen, const unsigned char *input, unsigned char *output, size_t output_max_len)</td></tr>
<tr class="memdesc:a01f8396add05e6e621f8e97d58f75e3a"><td class="mdescLeft">&#160;</td><td class="mdescRight">Generic wrapper to perform a PKCS#1 decryption using the mode from the context.  <a href="#a01f8396add05e6e621f8e97d58f75e3a">More...</a><br/></td></tr>
<tr class="separator:a01f8396add05e6e621f8e97d58f75e3a"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a09a2f3c16c6dd7a933763b1a91181fbb"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a09a2f3c16c6dd7a933763b1a91181fbb">rsa_rsaes_pkcs1_v15_decrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, size_t *olen, const unsigned char *input, unsigned char *output, size_t output_max_len)</td></tr>
<tr class="memdesc:a09a2f3c16c6dd7a933763b1a91181fbb"><td class="mdescLeft">&#160;</td><td class="mdescRight">Perform a PKCS#1 v1.5 decryption (RSAES-PKCS1-v1_5-DECRYPT)  <a href="#a09a2f3c16c6dd7a933763b1a91181fbb">More...</a><br/></td></tr>
<tr class="separator:a09a2f3c16c6dd7a933763b1a91181fbb"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ae89cbd38c2c40f9227326f3842d5b5da"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ae89cbd38c2c40f9227326f3842d5b5da">rsa_rsaes_oaep_decrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, const unsigned char *label, size_t label_len, size_t *olen, const unsigned char *input, unsigned char *output, size_t output_max_len)</td></tr>
<tr class="memdesc:ae89cbd38c2c40f9227326f3842d5b5da"><td class="mdescLeft">&#160;</td><td class="mdescRight">Perform a PKCS#1 v2.1 OAEP decryption (RSAES-OAEP-DECRYPT)  <a href="#ae89cbd38c2c40f9227326f3842d5b5da">More...</a><br/></td></tr>
<tr class="separator:ae89cbd38c2c40f9227326f3842d5b5da"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a1dd6fe83383d20d338a7434e80bc0554"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a1dd6fe83383d20d338a7434e80bc0554">rsa_pkcs1_sign</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, unsigned char *sig)</td></tr>
<tr class="memdesc:a1dd6fe83383d20d338a7434e80bc0554"><td class="mdescLeft">&#160;</td><td class="mdescRight">Generic wrapper to perform a PKCS#1 signature using the mode from the context.  <a href="#a1dd6fe83383d20d338a7434e80bc0554">More...</a><br/></td></tr>
<tr class="separator:a1dd6fe83383d20d338a7434e80bc0554"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a93379a69bfb2b40ca0bdcf4f992942d5"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a93379a69bfb2b40ca0bdcf4f992942d5">rsa_rsassa_pkcs1_v15_sign</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, unsigned char *sig)</td></tr>
<tr class="memdesc:a93379a69bfb2b40ca0bdcf4f992942d5"><td class="mdescLeft">&#160;</td><td class="mdescRight">Perform a PKCS#1 v1.5 signature (RSASSA-PKCS1-v1_5-SIGN)  <a href="#a93379a69bfb2b40ca0bdcf4f992942d5">More...</a><br/></td></tr>
<tr class="separator:a93379a69bfb2b40ca0bdcf4f992942d5"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ad362c2f0ab336f9dd778e26528d260fa"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ad362c2f0ab336f9dd778e26528d260fa">rsa_rsassa_pss_sign</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, unsigned char *sig)</td></tr>
<tr class="memdesc:ad362c2f0ab336f9dd778e26528d260fa"><td class="mdescLeft">&#160;</td><td class="mdescRight">Perform a PKCS#1 v2.1 PSS signature (RSASSA-PSS-SIGN)  <a href="#ad362c2f0ab336f9dd778e26528d260fa">More...</a><br/></td></tr>
<tr class="separator:ad362c2f0ab336f9dd778e26528d260fa"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a779660e9be48a800a1edde7815bf5fd8"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a779660e9be48a800a1edde7815bf5fd8">rsa_pkcs1_verify</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, const unsigned char *sig)</td></tr>
<tr class="memdesc:a779660e9be48a800a1edde7815bf5fd8"><td class="mdescLeft">&#160;</td><td class="mdescRight">Generic wrapper to perform a PKCS#1 verification using the mode from the context.  <a href="#a779660e9be48a800a1edde7815bf5fd8">More...</a><br/></td></tr>
<tr class="separator:a779660e9be48a800a1edde7815bf5fd8"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a3b4059189cd7e1bd97947811b9ab4d51"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a3b4059189cd7e1bd97947811b9ab4d51">rsa_rsassa_pkcs1_v15_verify</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, const unsigned char *sig)</td></tr>
<tr class="memdesc:a3b4059189cd7e1bd97947811b9ab4d51"><td class="mdescLeft">&#160;</td><td class="mdescRight">Perform a PKCS#1 v1.5 verification (RSASSA-PKCS1-v1_5-VERIFY)  <a href="#a3b4059189cd7e1bd97947811b9ab4d51">More...</a><br/></td></tr>
<tr class="separator:a3b4059189cd7e1bd97947811b9ab4d51"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a0b437fad52f75b4be7ec2f9389187bf3"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a0b437fad52f75b4be7ec2f9389187bf3">rsa_rsassa_pss_verify</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, const unsigned char *sig)</td></tr>
<tr class="memdesc:a0b437fad52f75b4be7ec2f9389187bf3"><td class="mdescLeft">&#160;</td><td class="mdescRight">Perform a PKCS#1 v2.1 PSS verification (RSASSA-PSS-VERIFY) (This is the "simple" version.)  <a href="#a0b437fad52f75b4be7ec2f9389187bf3">More...</a><br/></td></tr>
<tr class="separator:a0b437fad52f75b4be7ec2f9389187bf3"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a36ffdd0c13ed675bd027fc688c034f39"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a36ffdd0c13ed675bd027fc688c034f39">rsa_rsassa_pss_verify_ext</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> mgf1_hash_id, int expected_salt_len, const unsigned char *sig)</td></tr>
<tr class="memdesc:a36ffdd0c13ed675bd027fc688c034f39"><td class="mdescLeft">&#160;</td><td class="mdescRight">Perform a PKCS#1 v2.1 PSS verification (RSASSA-PSS-VERIFY) (This is the version with "full" options.)  <a href="#a36ffdd0c13ed675bd027fc688c034f39">More...</a><br/></td></tr>
<tr class="separator:a36ffdd0c13ed675bd027fc688c034f39"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a3cc93470d89478a9f89347dc01c95d5b"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a3cc93470d89478a9f89347dc01c95d5b">rsa_copy</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *dst, const <a class="el" href="structrsa__context.html">rsa_context</a> *src)</td></tr>
<tr class="memdesc:a3cc93470d89478a9f89347dc01c95d5b"><td class="mdescLeft">&#160;</td><td class="mdescRight">Copy the components of an RSA context.  <a href="#a3cc93470d89478a9f89347dc01c95d5b">More...</a><br/></td></tr>
<tr class="separator:a3cc93470d89478a9f89347dc01c95d5b"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:abb5d26b09e183c8a885eaee270c38fc7"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#abb5d26b09e183c8a885eaee270c38fc7">rsa_free</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx)</td></tr>
<tr class="memdesc:abb5d26b09e183c8a885eaee270c38fc7"><td class="mdescLeft">&#160;</td><td class="mdescRight">Free the components of an RSA key.  <a href="#abb5d26b09e183c8a885eaee270c38fc7">More...</a><br/></td></tr>
<tr class="separator:abb5d26b09e183c8a885eaee270c38fc7"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a118d1ea38ffeaef3ebfdfb418d2c42dd"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a118d1ea38ffeaef3ebfdfb418d2c42dd">rsa_self_test</a> (int verbose)</td></tr>
<tr class="memdesc:a118d1ea38ffeaef3ebfdfb418d2c42dd"><td class="mdescLeft">&#160;</td><td class="mdescRight">Checkup routine.  <a href="#a118d1ea38ffeaef3ebfdfb418d2c42dd">More...</a><br/></td></tr>
<tr class="separator:a118d1ea38ffeaef3ebfdfb418d2c42dd"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table>
<a name="details" id="details"></a><h2 class="groupheader">Detailed Description</h2>
<div class="textblock"><p>The RSA public-key cryptosystem. </p>
<p>Copyright (C) 2006-2014, Brainspark B.V.</p>
<p>This file is part of PolarSSL (<a href="http://www.polarssl.org">http://www.polarssl.org</a>) Lead Maintainer: Paul Bakker &lt;polarssl_maintainer at polarssl.org&gt;</p>
<p>All rights reserved.</p>
<p>This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.</p>
<p>This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.</p>
<p>You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. </p>

<p>Definition in file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>
</div><h2 class="groupheader">Macro Definition Documentation</h2>
<a class="anchor" id="aa30403951a6242045d0b47e2b51eccb0"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_RSA_BAD_INPUT_DATA&#160;&#160;&#160;-0x4080</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Bad input parameters to function. </p>

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00046">46</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="a2cab7b3c4ddc3bc02ffc59db19d0400f"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_RSA_INVALID_PADDING&#160;&#160;&#160;-0x4100</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Input data contains invalid padding and is rejected. </p>

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00047">47</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="a20c78c8fb43e505b891cf0ae19535316"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_RSA_KEY_CHECK_FAILED&#160;&#160;&#160;-0x4200</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Key failed to pass the libraries validity check. </p>

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00049">49</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="a1cd4e872914a9c350dee5a7deda8b51f"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_RSA_KEY_GEN_FAILED&#160;&#160;&#160;-0x4180</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Something failed during generation of a key. </p>

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00048">48</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="a1eb1e554a1fbed5abf93c566bc7751be"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_RSA_OUTPUT_TOO_LARGE&#160;&#160;&#160;-0x4400</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>The output buffer for decryption is not large enough. </p>

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00053">53</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="a44f5543dce7fc29b240a516e68acd019"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_RSA_PRIVATE_FAILED&#160;&#160;&#160;-0x4300</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>The private key operation failed. </p>

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00051">51</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="a6f6e6c330a1005f0846c4d033b49558c"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_RSA_PUBLIC_FAILED&#160;&#160;&#160;-0x4280</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>The public key operation failed. </p>

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00050">50</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="a07f72608ba6249132c9a6cf497f0371d"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_RSA_RNG_FAILED&#160;&#160;&#160;-0x4480</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>The random generator failed to generate non-zeros. </p>

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00054">54</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="a6c8054af82b411547c45248cc684609b"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_RSA_VERIFY_FAILED&#160;&#160;&#160;-0x4380</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>The PKCS#1 verification failed. </p>

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00052">52</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="afdeb08b89f455b4c80a8283a1559b97d"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define RSA_CRYPT&#160;&#160;&#160;2</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00066">66</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="acc924b6d08c92a2252fbab6c6ca5860e"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define RSA_PKCS_V15&#160;&#160;&#160;0</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00062">62</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="ade2521c3c28b0f5b222fdef75f9f87e9"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define RSA_PKCS_V21&#160;&#160;&#160;1</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00063">63</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="aeaabdd3bae85e564beb1ae9843169eb9"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define RSA_PRIVATE&#160;&#160;&#160;1</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00060">60</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

<p>Referenced by <a class="el" href="openssl_8h_source.html#l00132">RSA_private_decrypt()</a>, and <a class="el" href="openssl_8h_source.html#l00134">RSA_private_encrypt()</a>.</p>

</div>
</div>
<a class="anchor" id="a1f00bab389d3db27a115db74e32be727"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define RSA_PUBLIC&#160;&#160;&#160;0</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00059">59</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

<p>Referenced by <a class="el" href="openssl_8h_source.html#l00131">RSA_public_decrypt()</a>, and <a class="el" href="openssl_8h_source.html#l00133">RSA_public_encrypt()</a>.</p>

</div>
</div>
<a class="anchor" id="a6361445cef26eba64992ea54ecb90a47"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define RSA_SALT_LEN_ANY&#160;&#160;&#160;-1</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00068">68</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<a class="anchor" id="ae1bbc14f00a5c873d7770b44c412df1d"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define RSA_SIGN&#160;&#160;&#160;1</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Definition at line <a class="el" href="rsa_8h_source.html#l00065">65</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p>

</div>
</div>
<h2 class="groupheader">Function Documentation</h2>
<a class="anchor" id="a0fe904ec611cd6b53c72b7308f3ed3db"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_check_privkey </td>
          <td>(</td>
          <td class="paramtype">const <a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Check a private RSA key. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context to be checked</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code </dd></dl>

</div>
</div>
<a class="anchor" id="ae8208f2c3741564581ec745b27524c45"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_check_pubkey </td>
          <td>(</td>
          <td class="paramtype">const <a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Check a public RSA key. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context to be checked</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code </dd></dl>

</div>
</div>
<a class="anchor" id="a3cc93470d89478a9f89347dc01c95d5b"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_copy </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>dst</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const <a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>src</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Copy the components of an RSA context. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">dst</td><td>Destination context </td></tr>
    <tr><td class="paramname">src</td><td>Source context</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>O on success, POLARSSL_ERR_MPI_MALLOC_FAILED on memory allocation failure </dd></dl>

<p>Referenced by <a class="el" href="compat-1_82_8h_source.html#l00379">x509_write_key_der()</a>, <a class="el" href="compat-1_82_8h_source.html#l00370">x509_write_pubkey_der()</a>, <a class="el" href="compat-1_82_8h_source.html#l00333">x509parse_key()</a>, <a class="el" href="compat-1_82_8h_source.html#l00302">x509parse_keyfile()</a>, <a class="el" href="compat-1_82_8h_source.html#l00350">x509parse_public_key()</a>, and <a class="el" href="compat-1_82_8h_source.html#l00317">x509parse_public_keyfile()</a>.</p>

</div>
</div>
<a class="anchor" id="abb5d26b09e183c8a885eaee270c38fc7"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void rsa_free </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Free the components of an RSA key. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA Context to free </td></tr>
  </table>
  </dd>
</dl>

<p>Referenced by <a class="el" href="compat-1_82_8h_source.html#l00333">x509parse_key()</a>, <a class="el" href="compat-1_82_8h_source.html#l00302">x509parse_keyfile()</a>, <a class="el" href="compat-1_82_8h_source.html#l00350">x509parse_public_key()</a>, and <a class="el" href="compat-1_82_8h_source.html#l00317">x509parse_public_keyfile()</a>.</p>

</div>
</div>
<a class="anchor" id="acff8aaec6c8fff40f733641e570cb9af"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_gen_key </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned int&#160;</td>
          <td class="paramname"><em>nbits</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>exponent</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Generate an RSA keypair. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context that will hold the key </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">nbits</td><td>size of the public key in bits </td></tr>
    <tr><td class="paramname">exponent</td><td>public exponent (e.g., 65537)</td></tr>
  </table>
  </dd>
</dl>
<dl class="section note"><dt>Note</dt><dd><a class="el" href="rsa_8h.html#a79875c9f9d5831aecf5ea095905a5b64" title="Initialize an RSA context. ">rsa_init()</a> must be called beforehand to setup the RSA context.</dd></dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code </dd></dl>

</div>
</div>
<a class="anchor" id="a79875c9f9d5831aecf5ea095905a5b64"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void rsa_init </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>padding</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>hash_id</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Initialize an RSA context. </p>
<pre class="fragment">            Note: Set padding to RSA_PKCS_V21 for the RSAES-OAEP
            encryption scheme and the RSASSA-PSS signature scheme.
</pre><dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context to be initialized </td></tr>
    <tr><td class="paramname">padding</td><td>RSA_PKCS_V15 or RSA_PKCS_V21 </td></tr>
    <tr><td class="paramname">hash_id</td><td>RSA_PKCS_V21 hash identifier</td></tr>
  </table>
  </dd>
</dl>
<dl class="section note"><dt>Note</dt><dd>The hash_id parameter is actually ignored when using RSA_PKCS_V15 padding.</dd>
<dd>
Choice of padding mode is strictly enforced for private key operations, since there might be security concerns in mixing padding modes. For public key operations it's merely a default value, which can be overriden by calling specific rsa_rsaes_xxx or rsa_rsassa_xxx functions.</dd>
<dd>
The chosen hash is always used for OEAP encryption. For PSS signatures, it's always used for making signatures, but can be overriden (and always is, if set to POLARSSL_MD_NONE) for verifying them. </dd></dl>

</div>
</div>
<a class="anchor" id="a01f8396add05e6e621f8e97d58f75e3a"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_pkcs1_decrypt </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t *&#160;</td>
          <td class="paramname"><em>olen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>output_max_len</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Generic wrapper to perform a PKCS#1 decryption using the mode from the context. </p>
<p>Do an RSA operation, then remove the message padding</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">olen</td><td>will contain the plaintext length </td></tr>
    <tr><td class="paramname">input</td><td>buffer holding the encrypted data </td></tr>
    <tr><td class="paramname">output</td><td>buffer that will hold the plaintext </td></tr>
    <tr><td class="paramname">output_max_len</td><td>maximum length of the output buffer</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used) otherwise an error is thrown. </dd></dl>

<p>Referenced by <a class="el" href="openssl_8h_source.html#l00132">RSA_private_decrypt()</a>, and <a class="el" href="openssl_8h_source.html#l00131">RSA_public_decrypt()</a>.</p>

</div>
</div>
<a class="anchor" id="a16791653e4d448e25944e3579f727b50"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_pkcs1_encrypt </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>ilen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Generic wrapper to perform a PKCS#1 encryption using the mode from the context. </p>
<p>Add the message padding, then do an RSA operation.</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Needed for padding and PKCS#1 v2.1 encoding and RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">ilen</td><td>contains the plaintext length </td></tr>
    <tr><td class="paramname">input</td><td>buffer holding the data to be encrypted </td></tr>
    <tr><td class="paramname">output</td><td>buffer that will hold the ciphertext</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used). </dd></dl>

<p>Referenced by <a class="el" href="openssl_8h_source.html#l00134">RSA_private_encrypt()</a>, and <a class="el" href="openssl_8h_source.html#l00133">RSA_public_encrypt()</a>.</p>

</div>
</div>
<a class="anchor" id="a1dd6fe83383d20d338a7434e80bc0554"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_pkcs1_sign </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a>&#160;</td>
          <td class="paramname"><em>md_alg</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned int&#160;</td>
          <td class="paramname"><em>hashlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>hash</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>sig</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Generic wrapper to perform a PKCS#1 signature using the mode from the context. </p>
<p>Do a private RSA operation to sign a message digest</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Needed for PKCS#1 v2.1 encoding and for RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr>
    <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr>
    <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr>
    <tr><td class="paramname">sig</td><td>buffer that will hold the ciphertext</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if the signing operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used).</dd>
<dd>
In case of PKCS#1 v2.1 encoding, see comments on </dd>
<dd>
<code><a class="el" href="rsa_8h.html#ad362c2f0ab336f9dd778e26528d260fa" title="Perform a PKCS#1 v2.1 PSS signature (RSASSA-PSS-SIGN) ">rsa_rsassa_pss_sign()</a></code> for details on md_alg and hash_id. </dd></dl>

</div>
</div>
<a class="anchor" id="a779660e9be48a800a1edde7815bf5fd8"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_pkcs1_verify </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a>&#160;</td>
          <td class="paramname"><em>md_alg</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned int&#160;</td>
          <td class="paramname"><em>hashlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>hash</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>sig</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Generic wrapper to perform a PKCS#1 verification using the mode from the context. </p>
<p>Do a public RSA operation and check the message digest</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>points to an RSA public key </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr>
    <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr>
    <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr>
    <tr><td class="paramname">sig</td><td>buffer holding the ciphertext</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if the verify operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used).</dd>
<dd>
In case of PKCS#1 v2.1 encoding, see comments on <code><a class="el" href="rsa_8h.html#a0b437fad52f75b4be7ec2f9389187bf3" title="Perform a PKCS#1 v2.1 PSS verification (RSASSA-PSS-VERIFY) (This is the &quot;simple&quot; version.) ">rsa_rsassa_pss_verify()</a></code> about md_alg and hash_id. </dd></dl>

</div>
</div>
<a class="anchor" id="a305bf558a7137a1037d3f0c536060f06"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_private </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Do an RSA private key operation. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Needed for blinding) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">input</td><td>input buffer </td></tr>
    <tr><td class="paramname">output</td><td>output buffer</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The input and output buffers must be large enough (eg. 128 bytes if RSA-1024 is used). </dd></dl>

</div>
</div>
<a class="anchor" id="a29709d2f3d05d833b28081b743f9815f"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_public </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Do an RSA public key operation. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">input</td><td>input buffer </td></tr>
    <tr><td class="paramname">output</td><td>output buffer</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>This function does NOT take care of message padding. Also, be sure to set input[0] = 0 or assure that input is smaller than N.</dd>
<dd>
The input and output buffers must be large enough (eg. 128 bytes if RSA-1024 is used). </dd></dl>

</div>
</div>
<a class="anchor" id="ae89cbd38c2c40f9227326f3842d5b5da"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_rsaes_oaep_decrypt </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>label</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>label_len</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t *&#160;</td>
          <td class="paramname"><em>olen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>output_max_len</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Perform a PKCS#1 v2.1 OAEP decryption (RSAES-OAEP-DECRYPT) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">label</td><td>buffer holding the custom label to use </td></tr>
    <tr><td class="paramname">label_len</td><td>contains the label length </td></tr>
    <tr><td class="paramname">olen</td><td>will contain the plaintext length </td></tr>
    <tr><td class="paramname">input</td><td>buffer holding the encrypted data </td></tr>
    <tr><td class="paramname">output</td><td>buffer that will hold the plaintext </td></tr>
    <tr><td class="paramname">output_max_len</td><td>maximum length of the output buffer</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used) otherwise an error is thrown. </dd></dl>

</div>
</div>
<a class="anchor" id="a7aa223539fe35b57b8a221fc9921b116"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_rsaes_oaep_encrypt </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>label</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>label_len</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>ilen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Perform a PKCS#1 v2.1 OAEP encryption (RSAES-OAEP-ENCRYPT) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Needed for padding and PKCS#1 v2.1 encoding and RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">label</td><td>buffer holding the custom label to use </td></tr>
    <tr><td class="paramname">label_len</td><td>contains the label length </td></tr>
    <tr><td class="paramname">ilen</td><td>contains the plaintext length </td></tr>
    <tr><td class="paramname">input</td><td>buffer holding the data to be encrypted </td></tr>
    <tr><td class="paramname">output</td><td>buffer that will hold the ciphertext</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used). </dd></dl>

</div>
</div>
<a class="anchor" id="a09a2f3c16c6dd7a933763b1a91181fbb"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_rsaes_pkcs1_v15_decrypt </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t *&#160;</td>
          <td class="paramname"><em>olen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>output_max_len</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Perform a PKCS#1 v1.5 decryption (RSAES-PKCS1-v1_5-DECRYPT) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">olen</td><td>will contain the plaintext length </td></tr>
    <tr><td class="paramname">input</td><td>buffer holding the encrypted data </td></tr>
    <tr><td class="paramname">output</td><td>buffer that will hold the plaintext </td></tr>
    <tr><td class="paramname">output_max_len</td><td>maximum length of the output buffer</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used) otherwise an error is thrown. </dd></dl>

</div>
</div>
<a class="anchor" id="a63c6784b611700b05a8e613a9e33f7cc"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_rsaes_pkcs1_v15_encrypt </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>ilen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Perform a PKCS#1 v1.5 encryption (RSAES-PKCS1-v1_5-ENCRYPT) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Needed for padding and RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">ilen</td><td>contains the plaintext length </td></tr>
    <tr><td class="paramname">input</td><td>buffer holding the data to be encrypted </td></tr>
    <tr><td class="paramname">output</td><td>buffer that will hold the ciphertext</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used). </dd></dl>

</div>
</div>
<a class="anchor" id="a93379a69bfb2b40ca0bdcf4f992942d5"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_rsassa_pkcs1_v15_sign </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a>&#160;</td>
          <td class="paramname"><em>md_alg</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned int&#160;</td>
          <td class="paramname"><em>hashlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>hash</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>sig</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Perform a PKCS#1 v1.5 signature (RSASSA-PKCS1-v1_5-SIGN) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr>
    <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr>
    <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr>
    <tr><td class="paramname">sig</td><td>buffer that will hold the ciphertext</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if the signing operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used). </dd></dl>

</div>
</div>
<a class="anchor" id="a3b4059189cd7e1bd97947811b9ab4d51"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_rsassa_pkcs1_v15_verify </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a>&#160;</td>
          <td class="paramname"><em>md_alg</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned int&#160;</td>
          <td class="paramname"><em>hashlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>hash</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>sig</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Perform a PKCS#1 v1.5 verification (RSASSA-PKCS1-v1_5-VERIFY) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>points to an RSA public key </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr>
    <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr>
    <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr>
    <tr><td class="paramname">sig</td><td>buffer holding the ciphertext</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if the verify operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used). </dd></dl>

</div>
</div>
<a class="anchor" id="ad362c2f0ab336f9dd778e26528d260fa"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_rsassa_pss_sign </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a>&#160;</td>
          <td class="paramname"><em>md_alg</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned int&#160;</td>
          <td class="paramname"><em>hashlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>hash</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>sig</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Perform a PKCS#1 v2.1 PSS signature (RSASSA-PSS-SIGN) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Needed for PKCS#1 v2.1 encoding and for RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr>
    <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr>
    <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr>
    <tr><td class="paramname">sig</td><td>buffer that will hold the ciphertext</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if the signing operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used).</dd>
<dd>
The hash_id in the RSA context is the one used for the encoding. md_alg in the function call is the type of hash that is encoded. According to RFC 3447 it is advised to keep both hashes the same. </dd></dl>

</div>
</div>
<a class="anchor" id="a0b437fad52f75b4be7ec2f9389187bf3"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_rsassa_pss_verify </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a>&#160;</td>
          <td class="paramname"><em>md_alg</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned int&#160;</td>
          <td class="paramname"><em>hashlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>hash</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>sig</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Perform a PKCS#1 v2.1 PSS verification (RSASSA-PSS-VERIFY) (This is the "simple" version.) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>points to an RSA public key </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr>
    <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr>
    <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr>
    <tr><td class="paramname">sig</td><td>buffer holding the ciphertext</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if the verify operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used).</dd>
<dd>
The hash_id in the RSA context is the one used for the verification. md_alg in the function call is the type of hash that is verified. According to RFC 3447 it is advised to keep both hashes the same. If hash_id in the RSA context is unset, the md_alg from the function call is used. </dd></dl>

</div>
</div>
<a class="anchor" id="a36ffdd0c13ed675bd027fc688c034f39"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_rsassa_pss_verify_ext </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a>&#160;</td>
          <td class="paramname"><em>md_alg</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned int&#160;</td>
          <td class="paramname"><em>hashlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>hash</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a>&#160;</td>
          <td class="paramname"><em>mgf1_hash_id</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>expected_salt_len</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>sig</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Perform a PKCS#1 v2.1 PSS verification (RSASSA-PSS-VERIFY) (This is the version with "full" options.) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>points to an RSA public key </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr>
    <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr>
    <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr>
    <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr>
    <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr>
    <tr><td class="paramname">mgf1_hash_id</td><td>message digest used for mask generation </td></tr>
    <tr><td class="paramname">expected_salt_len</td><td>Length of the salt used in padding, use RSA_SALT_LEN_ANY to accept any salt length </td></tr>
    <tr><td class="paramname">sig</td><td>buffer holding the ciphertext</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if the verify operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx-&gt;N (eg. 128 bytes if RSA-1024 is used).</dd>
<dd>
The hash_id in the RSA context is ignored. </dd></dl>

</div>
</div>
<a class="anchor" id="a118d1ea38ffeaef3ebfdfb418d2c42dd"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int rsa_self_test </td>
          <td>(</td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>verbose</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Checkup routine. </p>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or 1 if the test failed </dd></dl>

</div>
</div>
<a class="anchor" id="a4938556c8f689303c9a24f0d6281098c"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void rsa_set_padding </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>padding</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>hash_id</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set padding for an already initialized RSA context See <code><a class="el" href="rsa_8h.html#a79875c9f9d5831aecf5ea095905a5b64" title="Initialize an RSA context. ">rsa_init()</a></code> for details. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>RSA context to be set </td></tr>
    <tr><td class="paramname">padding</td><td>RSA_PKCS_V15 or RSA_PKCS_V21 </td></tr>
    <tr><td class="paramname">hash_id</td><td>RSA_PKCS_V21 hash identifier </td></tr>
  </table>
  </dd>
</dl>

</div>
</div>
</div><!-- contents -->
<!-- start footer part -->
<hr class="footer"/><address class="footer"><small>
Generated on Thu Jul 31 2014 11:35:56 for PolarSSL v1.3.8 by &#160;<a href="http://www.doxygen.org/index.html">
<img class="footer" src="doxygen.png" alt="doxygen"/>
</a> 1.8.5
</small></address>
</body>
</html>