*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->Tru64 Unix man pages -> RSA_private_decrypt (3)              
Title
Content
Arch
Section
 

RSA_public_encrypt(3)

Contents


NAME    [Toc]    [Back]

       RSA_public_encrypt,  RSA_private_decrypt  - RSA public key
       cryptography

SYNOPSIS    [Toc]    [Back]

       #include <openssl/rsa.h>

       int RSA_public_encrypt(
               int flen,
               unsigned char *from,
               unsigned char *to,
               RSA *rsa,
               int padding ); int RSA_private_decrypt(
               int flen,
               unsigned char *from,
               unsigned char *to,
               RSA *rsa,
               int padding );

DESCRIPTION    [Toc]    [Back]

       The RSA_public_encrypt() function encrypts the flen  bytes
       at  from  (usually a session key) using the public key rsa
       and stores the ciphertext in to.  The  to  must  point  to
       RSA_size(rsa) bytes of memory.

       The  padding  denotes  one of the following modes: PKCS #1
       v1.5 padding. This currently is the most widely used mode.
       EME-OAEP  as  defined in PKCS #1 v2.0 with SHA-1, MGF1 and
       an empty encoding parameter. This mode is recommended  for
       all  new  applications.  PKCS #1 v1.5 padding with an SSLspecific
 modification that denotes that the server is SSL3
       capable.   Raw  RSA  encryption.  This mode should only be
       used to implement cryptographically sound padding modes in
       the  application  code. Encrypting user data directly with
       RSA is insecure.

       The flen must be less than RSA_size(rsa) - 11 for the PKCS
       #1 v1.5 based padding modes, and less than RSA_size(rsa) -
       41 for RSA_PKCS1_OAEP_PADDING. The random number generator
       must  be  seeded prior to calling the RSA_public_encrypt()
       function.

       The RSA_private_decrypt() function decrypts the flen bytes
       at from using the private key rsa and stores the plaintext
       in to. The to must point to a memory section large  enough
       to  hold  the  decrypted  data  ,  which  is  smaller than
       RSA_size(rsa). The padding is the padding  mode  that  was
       used to encrypt the data.

       These functions conform to SSL, PKCS #1 v2.0.

NOTES    [Toc]    [Back]

       The   RSA_PKCS1_RSAref(3)   method   supports   only   the
       RSA_PKCS1_PADDING mode.








RETURN VALUES    [Toc]    [Back]

       The RSA_public_encrypt() function returns the size of  the
       encrypted  data,  RSA_size(rsa). The RSA_private_decrypt()
       function returns the size of the recovered plaintext.

       On error, -1 is returned; the error codes can be  obtained
       by using the ERR_get_error() function.

HISTORY    [Toc]    [Back]

       The   padding   argument   was   added   in   SSLeay  0.8.
       RSA_NO_PADDING is available since SSLeay 0.9.0,  OAEP  was
       added in OpenSSL 0.9.2b.

SEE ALSO    [Toc]    [Back]

      
      
       Functions: err(3), rand_ssl(3), rsa(3), RSA_size(3)



                                            RSA_public_encrypt(3)
[ Back ]
 Similar pages
Name OS Title
publickey HP-UX public key database
publickey FreeBSD get public or secret key
rsa OpenBSD RSA public key cryptosystem
rsa Tru64 RSA public key cryptosystem
openssl_rsa NetBSD RSA public key cryptosystem
publickey FreeBSD public key database
publickey IRIX retrieve public or secret key
ssh-keyscan OpenBSD gather ssh public keys
ssh-keyscan FreeBSD gather ssh public keys
sh OpenBSD public domain Bourne shell
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service