<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <meta http-equiv="X-UA-Compatible" content="IE=9"/> <meta name="generator" content="Doxygen 1.8.5"/> <title>PolarSSL v1.3.8: rsa.h File Reference</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="jquery.js"></script> <script type="text/javascript" src="dynsections.js"></script> <link href="doxygen.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="top"><!-- do not remove this div, it is closed by doxygen! --> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td style="padding-left: 0.5em;"> <div id="projectname">PolarSSL v1.3.8 </div> </td> </tr> </tbody> </table> </div> <!-- end header part --> <!-- Generated by Doxygen 1.8.5 --> <div id="navrow1" class="tabs"> <ul class="tablist"> <li><a href="index.html"><span>Main Page</span></a></li> <li><a href="modules.html"><span>Modules</span></a></li> <li><a href="annotated.html"><span>Data Structures</span></a></li> <li class="current"><a href="files.html"><span>Files</span></a></li> </ul> </div> <div id="navrow2" class="tabs2"> <ul class="tablist"> <li><a href="files.html"><span>File List</span></a></li> <li><a href="globals.html"><span>Globals</span></a></li> </ul> </div> <div id="nav-path" class="navpath"> <ul> <li class="navelem"><a class="el" href="dir_6a9bbd12bf4e19a18c45e270f8fae3fd.html">include</a></li><li class="navelem"><a class="el" href="dir_04272d44da4745cf8b8bfc767d6c6523.html">polarssl</a></li> </ul> </div> </div><!-- top --> <div class="header"> <div class="summary"> <a href="#nested-classes">Data Structures</a> | <a href="#define-members">Macros</a> | <a href="#func-members">Functions</a> </div> <div class="headertitle"> <div class="title">rsa.h File Reference</div> </div> </div><!--header--> <div class="contents"> <p>The RSA public-key cryptosystem. <a href="#details">More...</a></p> <div class="textblock"><code>#include "<a class="el" href="config_8h_source.html">config.h</a>"</code><br/> <code>#include "<a class="el" href="bignum_8h_source.html">bignum.h</a>"</code><br/> <code>#include "<a class="el" href="md_8h_source.html">md.h</a>"</code><br/> </div><div class="textblock"><div class="dynheader"> Include dependency graph for rsa.h:</div> <div class="dyncontent"> <div class="center"><img src="rsa_8h__incl.png" border="0" usemap="#rsa_8h" alt=""/></div> <map name="rsa_8h" id="rsa_8h"> </map> </div> </div><div class="textblock"><div class="dynheader"> This graph shows which files directly or indirectly include this file:</div> <div class="dyncontent"> <div class="center"><img src="rsa_8h__dep__incl.png" border="0" usemap="#rsa_8hdep" alt=""/></div> <map name="rsa_8hdep" id="rsa_8hdep"> </map> </div> </div> <p><a href="rsa_8h_source.html">Go to the source code of this file.</a></p> <table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="nested-classes"></a> Data Structures</h2></td></tr> <tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct  </td><td class="memItemRight" valign="bottom"><a class="el" href="structrsa__context.html">rsa_context</a></td></tr> <tr class="memdesc:"><td class="mdescLeft"> </td><td class="mdescRight">RSA context structure. <a href="structrsa__context.html#details">More...</a><br/></td></tr> <tr class="separator:"><td class="memSeparator" colspan="2"> </td></tr> </table><table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="define-members"></a> Macros</h2></td></tr> <tr class="memitem:aa30403951a6242045d0b47e2b51eccb0"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#aa30403951a6242045d0b47e2b51eccb0">POLARSSL_ERR_RSA_BAD_INPUT_DATA</a>   -0x4080</td></tr> <tr class="memdesc:aa30403951a6242045d0b47e2b51eccb0"><td class="mdescLeft"> </td><td class="mdescRight">Bad input parameters to function. <a href="#aa30403951a6242045d0b47e2b51eccb0">More...</a><br/></td></tr> <tr class="separator:aa30403951a6242045d0b47e2b51eccb0"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a2cab7b3c4ddc3bc02ffc59db19d0400f"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a2cab7b3c4ddc3bc02ffc59db19d0400f">POLARSSL_ERR_RSA_INVALID_PADDING</a>   -0x4100</td></tr> <tr class="memdesc:a2cab7b3c4ddc3bc02ffc59db19d0400f"><td class="mdescLeft"> </td><td class="mdescRight">Input data contains invalid padding and is rejected. <a href="#a2cab7b3c4ddc3bc02ffc59db19d0400f">More...</a><br/></td></tr> <tr class="separator:a2cab7b3c4ddc3bc02ffc59db19d0400f"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a1cd4e872914a9c350dee5a7deda8b51f"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a1cd4e872914a9c350dee5a7deda8b51f">POLARSSL_ERR_RSA_KEY_GEN_FAILED</a>   -0x4180</td></tr> <tr class="memdesc:a1cd4e872914a9c350dee5a7deda8b51f"><td class="mdescLeft"> </td><td class="mdescRight">Something failed during generation of a key. <a href="#a1cd4e872914a9c350dee5a7deda8b51f">More...</a><br/></td></tr> <tr class="separator:a1cd4e872914a9c350dee5a7deda8b51f"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a20c78c8fb43e505b891cf0ae19535316"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a20c78c8fb43e505b891cf0ae19535316">POLARSSL_ERR_RSA_KEY_CHECK_FAILED</a>   -0x4200</td></tr> <tr class="memdesc:a20c78c8fb43e505b891cf0ae19535316"><td class="mdescLeft"> </td><td class="mdescRight">Key failed to pass the libraries validity check. <a href="#a20c78c8fb43e505b891cf0ae19535316">More...</a><br/></td></tr> <tr class="separator:a20c78c8fb43e505b891cf0ae19535316"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a6f6e6c330a1005f0846c4d033b49558c"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a6f6e6c330a1005f0846c4d033b49558c">POLARSSL_ERR_RSA_PUBLIC_FAILED</a>   -0x4280</td></tr> <tr class="memdesc:a6f6e6c330a1005f0846c4d033b49558c"><td class="mdescLeft"> </td><td class="mdescRight">The public key operation failed. <a href="#a6f6e6c330a1005f0846c4d033b49558c">More...</a><br/></td></tr> <tr class="separator:a6f6e6c330a1005f0846c4d033b49558c"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a44f5543dce7fc29b240a516e68acd019"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a44f5543dce7fc29b240a516e68acd019">POLARSSL_ERR_RSA_PRIVATE_FAILED</a>   -0x4300</td></tr> <tr class="memdesc:a44f5543dce7fc29b240a516e68acd019"><td class="mdescLeft"> </td><td class="mdescRight">The private key operation failed. <a href="#a44f5543dce7fc29b240a516e68acd019">More...</a><br/></td></tr> <tr class="separator:a44f5543dce7fc29b240a516e68acd019"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a6c8054af82b411547c45248cc684609b"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a6c8054af82b411547c45248cc684609b">POLARSSL_ERR_RSA_VERIFY_FAILED</a>   -0x4380</td></tr> <tr class="memdesc:a6c8054af82b411547c45248cc684609b"><td class="mdescLeft"> </td><td class="mdescRight">The PKCS#1 verification failed. <a href="#a6c8054af82b411547c45248cc684609b">More...</a><br/></td></tr> <tr class="separator:a6c8054af82b411547c45248cc684609b"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a1eb1e554a1fbed5abf93c566bc7751be"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a1eb1e554a1fbed5abf93c566bc7751be">POLARSSL_ERR_RSA_OUTPUT_TOO_LARGE</a>   -0x4400</td></tr> <tr class="memdesc:a1eb1e554a1fbed5abf93c566bc7751be"><td class="mdescLeft"> </td><td class="mdescRight">The output buffer for decryption is not large enough. <a href="#a1eb1e554a1fbed5abf93c566bc7751be">More...</a><br/></td></tr> <tr class="separator:a1eb1e554a1fbed5abf93c566bc7751be"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a07f72608ba6249132c9a6cf497f0371d"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a07f72608ba6249132c9a6cf497f0371d">POLARSSL_ERR_RSA_RNG_FAILED</a>   -0x4480</td></tr> <tr class="memdesc:a07f72608ba6249132c9a6cf497f0371d"><td class="mdescLeft"> </td><td class="mdescRight">The random generator failed to generate non-zeros. <a href="#a07f72608ba6249132c9a6cf497f0371d">More...</a><br/></td></tr> <tr class="separator:a07f72608ba6249132c9a6cf497f0371d"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a1f00bab389d3db27a115db74e32be727"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a1f00bab389d3db27a115db74e32be727">RSA_PUBLIC</a>   0</td></tr> <tr class="separator:a1f00bab389d3db27a115db74e32be727"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:aeaabdd3bae85e564beb1ae9843169eb9"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#aeaabdd3bae85e564beb1ae9843169eb9">RSA_PRIVATE</a>   1</td></tr> <tr class="separator:aeaabdd3bae85e564beb1ae9843169eb9"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:acc924b6d08c92a2252fbab6c6ca5860e"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#acc924b6d08c92a2252fbab6c6ca5860e">RSA_PKCS_V15</a>   0</td></tr> <tr class="separator:acc924b6d08c92a2252fbab6c6ca5860e"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ade2521c3c28b0f5b222fdef75f9f87e9"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ade2521c3c28b0f5b222fdef75f9f87e9">RSA_PKCS_V21</a>   1</td></tr> <tr class="separator:ade2521c3c28b0f5b222fdef75f9f87e9"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ae1bbc14f00a5c873d7770b44c412df1d"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ae1bbc14f00a5c873d7770b44c412df1d">RSA_SIGN</a>   1</td></tr> <tr class="separator:ae1bbc14f00a5c873d7770b44c412df1d"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:afdeb08b89f455b4c80a8283a1559b97d"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#afdeb08b89f455b4c80a8283a1559b97d">RSA_CRYPT</a>   2</td></tr> <tr class="separator:afdeb08b89f455b4c80a8283a1559b97d"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a6361445cef26eba64992ea54ecb90a47"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a6361445cef26eba64992ea54ecb90a47">RSA_SALT_LEN_ANY</a>   -1</td></tr> <tr class="separator:a6361445cef26eba64992ea54ecb90a47"><td class="memSeparator" colspan="2"> </td></tr> </table><table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="func-members"></a> Functions</h2></td></tr> <tr class="memitem:a79875c9f9d5831aecf5ea095905a5b64"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a79875c9f9d5831aecf5ea095905a5b64">rsa_init</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int padding, int hash_id)</td></tr> <tr class="memdesc:a79875c9f9d5831aecf5ea095905a5b64"><td class="mdescLeft"> </td><td class="mdescRight">Initialize an RSA context. <a href="#a79875c9f9d5831aecf5ea095905a5b64">More...</a><br/></td></tr> <tr class="separator:a79875c9f9d5831aecf5ea095905a5b64"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a4938556c8f689303c9a24f0d6281098c"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a4938556c8f689303c9a24f0d6281098c">rsa_set_padding</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int padding, int hash_id)</td></tr> <tr class="memdesc:a4938556c8f689303c9a24f0d6281098c"><td class="mdescLeft"> </td><td class="mdescRight">Set padding for an already initialized RSA context See <code><a class="el" href="rsa_8h.html#a79875c9f9d5831aecf5ea095905a5b64" title="Initialize an RSA context. ">rsa_init()</a></code> for details. <a href="#a4938556c8f689303c9a24f0d6281098c">More...</a><br/></td></tr> <tr class="separator:a4938556c8f689303c9a24f0d6281098c"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:acff8aaec6c8fff40f733641e570cb9af"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#acff8aaec6c8fff40f733641e570cb9af">rsa_gen_key</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, unsigned int nbits, int exponent)</td></tr> <tr class="memdesc:acff8aaec6c8fff40f733641e570cb9af"><td class="mdescLeft"> </td><td class="mdescRight">Generate an RSA keypair. <a href="#acff8aaec6c8fff40f733641e570cb9af">More...</a><br/></td></tr> <tr class="separator:acff8aaec6c8fff40f733641e570cb9af"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ae8208f2c3741564581ec745b27524c45"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ae8208f2c3741564581ec745b27524c45">rsa_check_pubkey</a> (const <a class="el" href="structrsa__context.html">rsa_context</a> *ctx)</td></tr> <tr class="memdesc:ae8208f2c3741564581ec745b27524c45"><td class="mdescLeft"> </td><td class="mdescRight">Check a public RSA key. <a href="#ae8208f2c3741564581ec745b27524c45">More...</a><br/></td></tr> <tr class="separator:ae8208f2c3741564581ec745b27524c45"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a0fe904ec611cd6b53c72b7308f3ed3db"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a0fe904ec611cd6b53c72b7308f3ed3db">rsa_check_privkey</a> (const <a class="el" href="structrsa__context.html">rsa_context</a> *ctx)</td></tr> <tr class="memdesc:a0fe904ec611cd6b53c72b7308f3ed3db"><td class="mdescLeft"> </td><td class="mdescRight">Check a private RSA key. <a href="#a0fe904ec611cd6b53c72b7308f3ed3db">More...</a><br/></td></tr> <tr class="separator:a0fe904ec611cd6b53c72b7308f3ed3db"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a29709d2f3d05d833b28081b743f9815f"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a29709d2f3d05d833b28081b743f9815f">rsa_public</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, const unsigned char *input, unsigned char *output)</td></tr> <tr class="memdesc:a29709d2f3d05d833b28081b743f9815f"><td class="mdescLeft"> </td><td class="mdescRight">Do an RSA public key operation. <a href="#a29709d2f3d05d833b28081b743f9815f">More...</a><br/></td></tr> <tr class="separator:a29709d2f3d05d833b28081b743f9815f"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a305bf558a7137a1037d3f0c536060f06"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a305bf558a7137a1037d3f0c536060f06">rsa_private</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, const unsigned char *input, unsigned char *output)</td></tr> <tr class="memdesc:a305bf558a7137a1037d3f0c536060f06"><td class="mdescLeft"> </td><td class="mdescRight">Do an RSA private key operation. <a href="#a305bf558a7137a1037d3f0c536060f06">More...</a><br/></td></tr> <tr class="separator:a305bf558a7137a1037d3f0c536060f06"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a16791653e4d448e25944e3579f727b50"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a16791653e4d448e25944e3579f727b50">rsa_pkcs1_encrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, size_t ilen, const unsigned char *input, unsigned char *output)</td></tr> <tr class="memdesc:a16791653e4d448e25944e3579f727b50"><td class="mdescLeft"> </td><td class="mdescRight">Generic wrapper to perform a PKCS#1 encryption using the mode from the context. <a href="#a16791653e4d448e25944e3579f727b50">More...</a><br/></td></tr> <tr class="separator:a16791653e4d448e25944e3579f727b50"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a63c6784b611700b05a8e613a9e33f7cc"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a63c6784b611700b05a8e613a9e33f7cc">rsa_rsaes_pkcs1_v15_encrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, size_t ilen, const unsigned char *input, unsigned char *output)</td></tr> <tr class="memdesc:a63c6784b611700b05a8e613a9e33f7cc"><td class="mdescLeft"> </td><td class="mdescRight">Perform a PKCS#1 v1.5 encryption (RSAES-PKCS1-v1_5-ENCRYPT) <a href="#a63c6784b611700b05a8e613a9e33f7cc">More...</a><br/></td></tr> <tr class="separator:a63c6784b611700b05a8e613a9e33f7cc"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a7aa223539fe35b57b8a221fc9921b116"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a7aa223539fe35b57b8a221fc9921b116">rsa_rsaes_oaep_encrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, const unsigned char *label, size_t label_len, size_t ilen, const unsigned char *input, unsigned char *output)</td></tr> <tr class="memdesc:a7aa223539fe35b57b8a221fc9921b116"><td class="mdescLeft"> </td><td class="mdescRight">Perform a PKCS#1 v2.1 OAEP encryption (RSAES-OAEP-ENCRYPT) <a href="#a7aa223539fe35b57b8a221fc9921b116">More...</a><br/></td></tr> <tr class="separator:a7aa223539fe35b57b8a221fc9921b116"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a01f8396add05e6e621f8e97d58f75e3a"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a01f8396add05e6e621f8e97d58f75e3a">rsa_pkcs1_decrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, size_t *olen, const unsigned char *input, unsigned char *output, size_t output_max_len)</td></tr> <tr class="memdesc:a01f8396add05e6e621f8e97d58f75e3a"><td class="mdescLeft"> </td><td class="mdescRight">Generic wrapper to perform a PKCS#1 decryption using the mode from the context. <a href="#a01f8396add05e6e621f8e97d58f75e3a">More...</a><br/></td></tr> <tr class="separator:a01f8396add05e6e621f8e97d58f75e3a"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a09a2f3c16c6dd7a933763b1a91181fbb"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a09a2f3c16c6dd7a933763b1a91181fbb">rsa_rsaes_pkcs1_v15_decrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, size_t *olen, const unsigned char *input, unsigned char *output, size_t output_max_len)</td></tr> <tr class="memdesc:a09a2f3c16c6dd7a933763b1a91181fbb"><td class="mdescLeft"> </td><td class="mdescRight">Perform a PKCS#1 v1.5 decryption (RSAES-PKCS1-v1_5-DECRYPT) <a href="#a09a2f3c16c6dd7a933763b1a91181fbb">More...</a><br/></td></tr> <tr class="separator:a09a2f3c16c6dd7a933763b1a91181fbb"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ae89cbd38c2c40f9227326f3842d5b5da"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ae89cbd38c2c40f9227326f3842d5b5da">rsa_rsaes_oaep_decrypt</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, const unsigned char *label, size_t label_len, size_t *olen, const unsigned char *input, unsigned char *output, size_t output_max_len)</td></tr> <tr class="memdesc:ae89cbd38c2c40f9227326f3842d5b5da"><td class="mdescLeft"> </td><td class="mdescRight">Perform a PKCS#1 v2.1 OAEP decryption (RSAES-OAEP-DECRYPT) <a href="#ae89cbd38c2c40f9227326f3842d5b5da">More...</a><br/></td></tr> <tr class="separator:ae89cbd38c2c40f9227326f3842d5b5da"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a1dd6fe83383d20d338a7434e80bc0554"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a1dd6fe83383d20d338a7434e80bc0554">rsa_pkcs1_sign</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, unsigned char *sig)</td></tr> <tr class="memdesc:a1dd6fe83383d20d338a7434e80bc0554"><td class="mdescLeft"> </td><td class="mdescRight">Generic wrapper to perform a PKCS#1 signature using the mode from the context. <a href="#a1dd6fe83383d20d338a7434e80bc0554">More...</a><br/></td></tr> <tr class="separator:a1dd6fe83383d20d338a7434e80bc0554"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a93379a69bfb2b40ca0bdcf4f992942d5"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a93379a69bfb2b40ca0bdcf4f992942d5">rsa_rsassa_pkcs1_v15_sign</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, unsigned char *sig)</td></tr> <tr class="memdesc:a93379a69bfb2b40ca0bdcf4f992942d5"><td class="mdescLeft"> </td><td class="mdescRight">Perform a PKCS#1 v1.5 signature (RSASSA-PKCS1-v1_5-SIGN) <a href="#a93379a69bfb2b40ca0bdcf4f992942d5">More...</a><br/></td></tr> <tr class="separator:a93379a69bfb2b40ca0bdcf4f992942d5"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ad362c2f0ab336f9dd778e26528d260fa"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#ad362c2f0ab336f9dd778e26528d260fa">rsa_rsassa_pss_sign</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, unsigned char *sig)</td></tr> <tr class="memdesc:ad362c2f0ab336f9dd778e26528d260fa"><td class="mdescLeft"> </td><td class="mdescRight">Perform a PKCS#1 v2.1 PSS signature (RSASSA-PSS-SIGN) <a href="#ad362c2f0ab336f9dd778e26528d260fa">More...</a><br/></td></tr> <tr class="separator:ad362c2f0ab336f9dd778e26528d260fa"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a779660e9be48a800a1edde7815bf5fd8"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a779660e9be48a800a1edde7815bf5fd8">rsa_pkcs1_verify</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, const unsigned char *sig)</td></tr> <tr class="memdesc:a779660e9be48a800a1edde7815bf5fd8"><td class="mdescLeft"> </td><td class="mdescRight">Generic wrapper to perform a PKCS#1 verification using the mode from the context. <a href="#a779660e9be48a800a1edde7815bf5fd8">More...</a><br/></td></tr> <tr class="separator:a779660e9be48a800a1edde7815bf5fd8"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a3b4059189cd7e1bd97947811b9ab4d51"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a3b4059189cd7e1bd97947811b9ab4d51">rsa_rsassa_pkcs1_v15_verify</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, const unsigned char *sig)</td></tr> <tr class="memdesc:a3b4059189cd7e1bd97947811b9ab4d51"><td class="mdescLeft"> </td><td class="mdescRight">Perform a PKCS#1 v1.5 verification (RSASSA-PKCS1-v1_5-VERIFY) <a href="#a3b4059189cd7e1bd97947811b9ab4d51">More...</a><br/></td></tr> <tr class="separator:a3b4059189cd7e1bd97947811b9ab4d51"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a0b437fad52f75b4be7ec2f9389187bf3"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a0b437fad52f75b4be7ec2f9389187bf3">rsa_rsassa_pss_verify</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, const unsigned char *sig)</td></tr> <tr class="memdesc:a0b437fad52f75b4be7ec2f9389187bf3"><td class="mdescLeft"> </td><td class="mdescRight">Perform a PKCS#1 v2.1 PSS verification (RSASSA-PSS-VERIFY) (This is the "simple" version.) <a href="#a0b437fad52f75b4be7ec2f9389187bf3">More...</a><br/></td></tr> <tr class="separator:a0b437fad52f75b4be7ec2f9389187bf3"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a36ffdd0c13ed675bd027fc688c034f39"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a36ffdd0c13ed675bd027fc688c034f39">rsa_rsassa_pss_verify_ext</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg, unsigned int hashlen, const unsigned char *hash, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> mgf1_hash_id, int expected_salt_len, const unsigned char *sig)</td></tr> <tr class="memdesc:a36ffdd0c13ed675bd027fc688c034f39"><td class="mdescLeft"> </td><td class="mdescRight">Perform a PKCS#1 v2.1 PSS verification (RSASSA-PSS-VERIFY) (This is the version with "full" options.) <a href="#a36ffdd0c13ed675bd027fc688c034f39">More...</a><br/></td></tr> <tr class="separator:a36ffdd0c13ed675bd027fc688c034f39"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a3cc93470d89478a9f89347dc01c95d5b"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a3cc93470d89478a9f89347dc01c95d5b">rsa_copy</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *dst, const <a class="el" href="structrsa__context.html">rsa_context</a> *src)</td></tr> <tr class="memdesc:a3cc93470d89478a9f89347dc01c95d5b"><td class="mdescLeft"> </td><td class="mdescRight">Copy the components of an RSA context. <a href="#a3cc93470d89478a9f89347dc01c95d5b">More...</a><br/></td></tr> <tr class="separator:a3cc93470d89478a9f89347dc01c95d5b"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:abb5d26b09e183c8a885eaee270c38fc7"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#abb5d26b09e183c8a885eaee270c38fc7">rsa_free</a> (<a class="el" href="structrsa__context.html">rsa_context</a> *ctx)</td></tr> <tr class="memdesc:abb5d26b09e183c8a885eaee270c38fc7"><td class="mdescLeft"> </td><td class="mdescRight">Free the components of an RSA key. <a href="#abb5d26b09e183c8a885eaee270c38fc7">More...</a><br/></td></tr> <tr class="separator:abb5d26b09e183c8a885eaee270c38fc7"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a118d1ea38ffeaef3ebfdfb418d2c42dd"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="rsa_8h.html#a118d1ea38ffeaef3ebfdfb418d2c42dd">rsa_self_test</a> (int verbose)</td></tr> <tr class="memdesc:a118d1ea38ffeaef3ebfdfb418d2c42dd"><td class="mdescLeft"> </td><td class="mdescRight">Checkup routine. <a href="#a118d1ea38ffeaef3ebfdfb418d2c42dd">More...</a><br/></td></tr> <tr class="separator:a118d1ea38ffeaef3ebfdfb418d2c42dd"><td class="memSeparator" colspan="2"> </td></tr> </table> <a name="details" id="details"></a><h2 class="groupheader">Detailed Description</h2> <div class="textblock"><p>The RSA public-key cryptosystem. </p> <p>Copyright (C) 2006-2014, Brainspark B.V.</p> <p>This file is part of PolarSSL (<a href="http://www.polarssl.org">http://www.polarssl.org</a>) Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org></p> <p>All rights reserved.</p> <p>This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.</p> <p>This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.</p> <p>You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. </p> <p>Definition in file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div><h2 class="groupheader">Macro Definition Documentation</h2> <a class="anchor" id="aa30403951a6242045d0b47e2b51eccb0"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_RSA_BAD_INPUT_DATA   -0x4080</td> </tr> </table> </div><div class="memdoc"> <p>Bad input parameters to function. </p> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00046">46</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="a2cab7b3c4ddc3bc02ffc59db19d0400f"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_RSA_INVALID_PADDING   -0x4100</td> </tr> </table> </div><div class="memdoc"> <p>Input data contains invalid padding and is rejected. </p> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00047">47</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="a20c78c8fb43e505b891cf0ae19535316"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_RSA_KEY_CHECK_FAILED   -0x4200</td> </tr> </table> </div><div class="memdoc"> <p>Key failed to pass the libraries validity check. </p> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00049">49</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="a1cd4e872914a9c350dee5a7deda8b51f"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_RSA_KEY_GEN_FAILED   -0x4180</td> </tr> </table> </div><div class="memdoc"> <p>Something failed during generation of a key. </p> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00048">48</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="a1eb1e554a1fbed5abf93c566bc7751be"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_RSA_OUTPUT_TOO_LARGE   -0x4400</td> </tr> </table> </div><div class="memdoc"> <p>The output buffer for decryption is not large enough. </p> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00053">53</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="a44f5543dce7fc29b240a516e68acd019"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_RSA_PRIVATE_FAILED   -0x4300</td> </tr> </table> </div><div class="memdoc"> <p>The private key operation failed. </p> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00051">51</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="a6f6e6c330a1005f0846c4d033b49558c"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_RSA_PUBLIC_FAILED   -0x4280</td> </tr> </table> </div><div class="memdoc"> <p>The public key operation failed. </p> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00050">50</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="a07f72608ba6249132c9a6cf497f0371d"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_RSA_RNG_FAILED   -0x4480</td> </tr> </table> </div><div class="memdoc"> <p>The random generator failed to generate non-zeros. </p> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00054">54</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="a6c8054af82b411547c45248cc684609b"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_RSA_VERIFY_FAILED   -0x4380</td> </tr> </table> </div><div class="memdoc"> <p>The PKCS#1 verification failed. </p> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00052">52</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="afdeb08b89f455b4c80a8283a1559b97d"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define RSA_CRYPT   2</td> </tr> </table> </div><div class="memdoc"> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00066">66</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="acc924b6d08c92a2252fbab6c6ca5860e"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define RSA_PKCS_V15   0</td> </tr> </table> </div><div class="memdoc"> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00062">62</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="ade2521c3c28b0f5b222fdef75f9f87e9"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define RSA_PKCS_V21   1</td> </tr> </table> </div><div class="memdoc"> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00063">63</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="aeaabdd3bae85e564beb1ae9843169eb9"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define RSA_PRIVATE   1</td> </tr> </table> </div><div class="memdoc"> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00060">60</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> <p>Referenced by <a class="el" href="openssl_8h_source.html#l00132">RSA_private_decrypt()</a>, and <a class="el" href="openssl_8h_source.html#l00134">RSA_private_encrypt()</a>.</p> </div> </div> <a class="anchor" id="a1f00bab389d3db27a115db74e32be727"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define RSA_PUBLIC   0</td> </tr> </table> </div><div class="memdoc"> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00059">59</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> <p>Referenced by <a class="el" href="openssl_8h_source.html#l00131">RSA_public_decrypt()</a>, and <a class="el" href="openssl_8h_source.html#l00133">RSA_public_encrypt()</a>.</p> </div> </div> <a class="anchor" id="a6361445cef26eba64992ea54ecb90a47"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define RSA_SALT_LEN_ANY   -1</td> </tr> </table> </div><div class="memdoc"> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00068">68</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <a class="anchor" id="ae1bbc14f00a5c873d7770b44c412df1d"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define RSA_SIGN   1</td> </tr> </table> </div><div class="memdoc"> <p>Definition at line <a class="el" href="rsa_8h_source.html#l00065">65</a> of file <a class="el" href="rsa_8h_source.html">rsa.h</a>.</p> </div> </div> <h2 class="groupheader">Function Documentation</h2> <a class="anchor" id="a0fe904ec611cd6b53c72b7308f3ed3db"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_check_privkey </td> <td>(</td> <td class="paramtype">const <a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Check a private RSA key. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context to be checked</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code </dd></dl> </div> </div> <a class="anchor" id="ae8208f2c3741564581ec745b27524c45"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_check_pubkey </td> <td>(</td> <td class="paramtype">const <a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Check a public RSA key. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context to be checked</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code </dd></dl> </div> </div> <a class="anchor" id="a3cc93470d89478a9f89347dc01c95d5b"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_copy </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>dst</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const <a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>src</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Copy the components of an RSA context. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">dst</td><td>Destination context </td></tr> <tr><td class="paramname">src</td><td>Source context</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>O on success, POLARSSL_ERR_MPI_MALLOC_FAILED on memory allocation failure </dd></dl> <p>Referenced by <a class="el" href="compat-1_82_8h_source.html#l00379">x509_write_key_der()</a>, <a class="el" href="compat-1_82_8h_source.html#l00370">x509_write_pubkey_der()</a>, <a class="el" href="compat-1_82_8h_source.html#l00333">x509parse_key()</a>, <a class="el" href="compat-1_82_8h_source.html#l00302">x509parse_keyfile()</a>, <a class="el" href="compat-1_82_8h_source.html#l00350">x509parse_public_key()</a>, and <a class="el" href="compat-1_82_8h_source.html#l00317">x509parse_public_keyfile()</a>.</p> </div> </div> <a class="anchor" id="abb5d26b09e183c8a885eaee270c38fc7"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void rsa_free </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Free the components of an RSA key. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA Context to free </td></tr> </table> </dd> </dl> <p>Referenced by <a class="el" href="compat-1_82_8h_source.html#l00333">x509parse_key()</a>, <a class="el" href="compat-1_82_8h_source.html#l00302">x509parse_keyfile()</a>, <a class="el" href="compat-1_82_8h_source.html#l00350">x509parse_public_key()</a>, and <a class="el" href="compat-1_82_8h_source.html#l00317">x509parse_public_keyfile()</a>.</p> </div> </div> <a class="anchor" id="acff8aaec6c8fff40f733641e570cb9af"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_gen_key </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned int </td> <td class="paramname"><em>nbits</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>exponent</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Generate an RSA keypair. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context that will hold the key </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">nbits</td><td>size of the public key in bits </td></tr> <tr><td class="paramname">exponent</td><td>public exponent (e.g., 65537)</td></tr> </table> </dd> </dl> <dl class="section note"><dt>Note</dt><dd><a class="el" href="rsa_8h.html#a79875c9f9d5831aecf5ea095905a5b64" title="Initialize an RSA context. ">rsa_init()</a> must be called beforehand to setup the RSA context.</dd></dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code </dd></dl> </div> </div> <a class="anchor" id="a79875c9f9d5831aecf5ea095905a5b64"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void rsa_init </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>padding</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>hash_id</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Initialize an RSA context. </p> <pre class="fragment"> Note: Set padding to RSA_PKCS_V21 for the RSAES-OAEP encryption scheme and the RSASSA-PSS signature scheme. </pre><dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context to be initialized </td></tr> <tr><td class="paramname">padding</td><td>RSA_PKCS_V15 or RSA_PKCS_V21 </td></tr> <tr><td class="paramname">hash_id</td><td>RSA_PKCS_V21 hash identifier</td></tr> </table> </dd> </dl> <dl class="section note"><dt>Note</dt><dd>The hash_id parameter is actually ignored when using RSA_PKCS_V15 padding.</dd> <dd> Choice of padding mode is strictly enforced for private key operations, since there might be security concerns in mixing padding modes. For public key operations it's merely a default value, which can be overriden by calling specific rsa_rsaes_xxx or rsa_rsassa_xxx functions.</dd> <dd> The chosen hash is always used for OEAP encryption. For PSS signatures, it's always used for making signatures, but can be overriden (and always is, if set to POLARSSL_MD_NONE) for verifying them. </dd></dl> </div> </div> <a class="anchor" id="a01f8396add05e6e621f8e97d58f75e3a"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_pkcs1_decrypt </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t * </td> <td class="paramname"><em>olen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>output_max_len</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Generic wrapper to perform a PKCS#1 decryption using the mode from the context. </p> <p>Do an RSA operation, then remove the message padding</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">olen</td><td>will contain the plaintext length </td></tr> <tr><td class="paramname">input</td><td>buffer holding the encrypted data </td></tr> <tr><td class="paramname">output</td><td>buffer that will hold the plaintext </td></tr> <tr><td class="paramname">output_max_len</td><td>maximum length of the output buffer</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used) otherwise an error is thrown. </dd></dl> <p>Referenced by <a class="el" href="openssl_8h_source.html#l00132">RSA_private_decrypt()</a>, and <a class="el" href="openssl_8h_source.html#l00131">RSA_public_decrypt()</a>.</p> </div> </div> <a class="anchor" id="a16791653e4d448e25944e3579f727b50"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_pkcs1_encrypt </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>ilen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Generic wrapper to perform a PKCS#1 encryption using the mode from the context. </p> <p>Add the message padding, then do an RSA operation.</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Needed for padding and PKCS#1 v2.1 encoding and RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">ilen</td><td>contains the plaintext length </td></tr> <tr><td class="paramname">input</td><td>buffer holding the data to be encrypted </td></tr> <tr><td class="paramname">output</td><td>buffer that will hold the ciphertext</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used). </dd></dl> <p>Referenced by <a class="el" href="openssl_8h_source.html#l00134">RSA_private_encrypt()</a>, and <a class="el" href="openssl_8h_source.html#l00133">RSA_public_encrypt()</a>.</p> </div> </div> <a class="anchor" id="a1dd6fe83383d20d338a7434e80bc0554"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_pkcs1_sign </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> </td> <td class="paramname"><em>md_alg</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned int </td> <td class="paramname"><em>hashlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>hash</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>sig</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Generic wrapper to perform a PKCS#1 signature using the mode from the context. </p> <p>Do a private RSA operation to sign a message digest</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Needed for PKCS#1 v2.1 encoding and for RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr> <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr> <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr> <tr><td class="paramname">sig</td><td>buffer that will hold the ciphertext</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if the signing operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used).</dd> <dd> In case of PKCS#1 v2.1 encoding, see comments on </dd> <dd> <code><a class="el" href="rsa_8h.html#ad362c2f0ab336f9dd778e26528d260fa" title="Perform a PKCS#1 v2.1 PSS signature (RSASSA-PSS-SIGN) ">rsa_rsassa_pss_sign()</a></code> for details on md_alg and hash_id. </dd></dl> </div> </div> <a class="anchor" id="a779660e9be48a800a1edde7815bf5fd8"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_pkcs1_verify </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> </td> <td class="paramname"><em>md_alg</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned int </td> <td class="paramname"><em>hashlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>hash</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>sig</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Generic wrapper to perform a PKCS#1 verification using the mode from the context. </p> <p>Do a public RSA operation and check the message digest</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>points to an RSA public key </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr> <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr> <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr> <tr><td class="paramname">sig</td><td>buffer holding the ciphertext</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if the verify operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used).</dd> <dd> In case of PKCS#1 v2.1 encoding, see comments on <code><a class="el" href="rsa_8h.html#a0b437fad52f75b4be7ec2f9389187bf3" title="Perform a PKCS#1 v2.1 PSS verification (RSASSA-PSS-VERIFY) (This is the "simple" version.) ">rsa_rsassa_pss_verify()</a></code> about md_alg and hash_id. </dd></dl> </div> </div> <a class="anchor" id="a305bf558a7137a1037d3f0c536060f06"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_private </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Do an RSA private key operation. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Needed for blinding) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">input</td><td>input buffer </td></tr> <tr><td class="paramname">output</td><td>output buffer</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The input and output buffers must be large enough (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="a29709d2f3d05d833b28081b743f9815f"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_public </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Do an RSA public key operation. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">input</td><td>input buffer </td></tr> <tr><td class="paramname">output</td><td>output buffer</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>This function does NOT take care of message padding. Also, be sure to set input[0] = 0 or assure that input is smaller than N.</dd> <dd> The input and output buffers must be large enough (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="ae89cbd38c2c40f9227326f3842d5b5da"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_rsaes_oaep_decrypt </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>label</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>label_len</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t * </td> <td class="paramname"><em>olen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>output_max_len</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Perform a PKCS#1 v2.1 OAEP decryption (RSAES-OAEP-DECRYPT) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">label</td><td>buffer holding the custom label to use </td></tr> <tr><td class="paramname">label_len</td><td>contains the label length </td></tr> <tr><td class="paramname">olen</td><td>will contain the plaintext length </td></tr> <tr><td class="paramname">input</td><td>buffer holding the encrypted data </td></tr> <tr><td class="paramname">output</td><td>buffer that will hold the plaintext </td></tr> <tr><td class="paramname">output_max_len</td><td>maximum length of the output buffer</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used) otherwise an error is thrown. </dd></dl> </div> </div> <a class="anchor" id="a7aa223539fe35b57b8a221fc9921b116"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_rsaes_oaep_encrypt </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>label</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>label_len</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>ilen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Perform a PKCS#1 v2.1 OAEP encryption (RSAES-OAEP-ENCRYPT) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Needed for padding and PKCS#1 v2.1 encoding and RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">label</td><td>buffer holding the custom label to use </td></tr> <tr><td class="paramname">label_len</td><td>contains the label length </td></tr> <tr><td class="paramname">ilen</td><td>contains the plaintext length </td></tr> <tr><td class="paramname">input</td><td>buffer holding the data to be encrypted </td></tr> <tr><td class="paramname">output</td><td>buffer that will hold the ciphertext</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="a09a2f3c16c6dd7a933763b1a91181fbb"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_rsaes_pkcs1_v15_decrypt </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t * </td> <td class="paramname"><em>olen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>output_max_len</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Perform a PKCS#1 v1.5 decryption (RSAES-PKCS1-v1_5-DECRYPT) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">olen</td><td>will contain the plaintext length </td></tr> <tr><td class="paramname">input</td><td>buffer holding the encrypted data </td></tr> <tr><td class="paramname">output</td><td>buffer that will hold the plaintext </td></tr> <tr><td class="paramname">output_max_len</td><td>maximum length of the output buffer</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used) otherwise an error is thrown. </dd></dl> </div> </div> <a class="anchor" id="a63c6784b611700b05a8e613a9e33f7cc"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_rsaes_pkcs1_v15_encrypt </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>ilen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Perform a PKCS#1 v1.5 encryption (RSAES-PKCS1-v1_5-ENCRYPT) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Needed for padding and RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">ilen</td><td>contains the plaintext length </td></tr> <tr><td class="paramname">input</td><td>buffer holding the data to be encrypted </td></tr> <tr><td class="paramname">output</td><td>buffer that will hold the ciphertext</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The output buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="a93379a69bfb2b40ca0bdcf4f992942d5"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_rsassa_pkcs1_v15_sign </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> </td> <td class="paramname"><em>md_alg</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned int </td> <td class="paramname"><em>hashlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>hash</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>sig</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Perform a PKCS#1 v1.5 signature (RSASSA-PKCS1-v1_5-SIGN) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr> <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr> <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr> <tr><td class="paramname">sig</td><td>buffer that will hold the ciphertext</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if the signing operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="a3b4059189cd7e1bd97947811b9ab4d51"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_rsassa_pkcs1_v15_verify </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> </td> <td class="paramname"><em>md_alg</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned int </td> <td class="paramname"><em>hashlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>hash</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>sig</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Perform a PKCS#1 v1.5 verification (RSASSA-PKCS1-v1_5-VERIFY) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>points to an RSA public key </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr> <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr> <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr> <tr><td class="paramname">sig</td><td>buffer holding the ciphertext</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if the verify operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used). </dd></dl> </div> </div> <a class="anchor" id="ad362c2f0ab336f9dd778e26528d260fa"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_rsassa_pss_sign </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> </td> <td class="paramname"><em>md_alg</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned int </td> <td class="paramname"><em>hashlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>hash</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>sig</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Perform a PKCS#1 v2.1 PSS signature (RSASSA-PSS-SIGN) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Needed for PKCS#1 v2.1 encoding and for RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr> <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr> <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr> <tr><td class="paramname">sig</td><td>buffer that will hold the ciphertext</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if the signing operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used).</dd> <dd> The hash_id in the RSA context is the one used for the encoding. md_alg in the function call is the type of hash that is encoded. According to RFC 3447 it is advised to keep both hashes the same. </dd></dl> </div> </div> <a class="anchor" id="a0b437fad52f75b4be7ec2f9389187bf3"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_rsassa_pss_verify </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> </td> <td class="paramname"><em>md_alg</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned int </td> <td class="paramname"><em>hashlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>hash</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>sig</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Perform a PKCS#1 v2.1 PSS verification (RSASSA-PSS-VERIFY) (This is the "simple" version.) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>points to an RSA public key </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr> <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr> <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr> <tr><td class="paramname">sig</td><td>buffer holding the ciphertext</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if the verify operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used).</dd> <dd> The hash_id in the RSA context is the one used for the verification. md_alg in the function call is the type of hash that is verified. According to RFC 3447 it is advised to keep both hashes the same. If hash_id in the RSA context is unset, the md_alg from the function call is used. </dd></dl> </div> </div> <a class="anchor" id="a36ffdd0c13ed675bd027fc688c034f39"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_rsassa_pss_verify_ext </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> </td> <td class="paramname"><em>md_alg</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned int </td> <td class="paramname"><em>hashlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>hash</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> </td> <td class="paramname"><em>mgf1_hash_id</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>expected_salt_len</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>sig</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Perform a PKCS#1 v2.1 PSS verification (RSASSA-PSS-VERIFY) (This is the version with "full" options.) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>points to an RSA public key </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (Only needed for RSA_PRIVATE) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter </td></tr> <tr><td class="paramname">mode</td><td>RSA_PUBLIC or RSA_PRIVATE </td></tr> <tr><td class="paramname">md_alg</td><td>a POLARSSL_MD_* (use POLARSSL_MD_NONE for signing raw data) </td></tr> <tr><td class="paramname">hashlen</td><td>message digest length (for POLARSSL_MD_NONE only) </td></tr> <tr><td class="paramname">hash</td><td>buffer holding the message digest </td></tr> <tr><td class="paramname">mgf1_hash_id</td><td>message digest used for mask generation </td></tr> <tr><td class="paramname">expected_salt_len</td><td>Length of the salt used in padding, use RSA_SALT_LEN_ANY to accept any salt length </td></tr> <tr><td class="paramname">sig</td><td>buffer holding the ciphertext</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if the verify operation was successful, or an POLARSSL_ERR_RSA_XXX error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>The "sig" buffer must be as large as the size of ctx->N (eg. 128 bytes if RSA-1024 is used).</dd> <dd> The hash_id in the RSA context is ignored. </dd></dl> </div> </div> <a class="anchor" id="a118d1ea38ffeaef3ebfdfb418d2c42dd"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int rsa_self_test </td> <td>(</td> <td class="paramtype">int </td> <td class="paramname"><em>verbose</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Checkup routine. </p> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or 1 if the test failed </dd></dl> </div> </div> <a class="anchor" id="a4938556c8f689303c9a24f0d6281098c"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void rsa_set_padding </td> <td>(</td> <td class="paramtype"><a class="el" href="structrsa__context.html">rsa_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>padding</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>hash_id</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set padding for an already initialized RSA context See <code><a class="el" href="rsa_8h.html#a79875c9f9d5831aecf5ea095905a5b64" title="Initialize an RSA context. ">rsa_init()</a></code> for details. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>RSA context to be set </td></tr> <tr><td class="paramname">padding</td><td>RSA_PKCS_V15 or RSA_PKCS_V21 </td></tr> <tr><td class="paramname">hash_id</td><td>RSA_PKCS_V21 hash identifier </td></tr> </table> </dd> </dl> </div> </div> </div><!-- contents --> <!-- start footer part --> <hr class="footer"/><address class="footer"><small> Generated on Thu Jul 31 2014 11:35:56 for PolarSSL v1.3.8 by  <a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/> </a> 1.8.5 </small></address> </body> </html>