1 .\" $NetBSD: libcrypto.pl,v 1.3 2007/11/27 22:16:03 christos Exp $
3 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)
6 .\" ========================================================================
7 .de Sh \" Subsection heading
15 .de Sp \" Vertical space (when we can't use .PP)
19 .de Vb \" Begin verbatim text
24 .de Ve \" End verbatim text
28 .\" Set up some character translations and predefined strings. \*(-- will
29 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
30 .\" double quote, and \*(R" will give a right double quote. \*(C+ will
31 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
32 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
33 .\" nothing in troff, for use with C<>.
35 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
39 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
40 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
53 .\" Escape single quotes in literal strings from groff's Unicode transform.
57 .\" If the F register is turned on, we'll generate index entries on stderr for
58 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index
59 .\" entries marked with X<> in POD. Of course, you'll have to process the
60 .\" output yourself in some meaningful fashion.
63 . tm Index:\\$1\t\\n%\t"\\$2"
73 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
74 .\" Fear. Run. Save yourself. No user-serviceable parts.
75 . \" fudge factors for nroff and troff
84 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
90 . \" simple accents for nroff and troff
100 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
101 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
102 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
103 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
104 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
105 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
107 . \" troff and (daisy-wheel) nroff accents
108 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
109 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
110 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
111 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
112 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
113 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
114 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
115 .ds ae a\h'-(\w'a'u*4/10)'e
116 .ds Ae A\h'-(\w'A'u*4/10)'E
117 . \" corrections for vroff
118 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
119 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
120 . \" for low resolution devices (crt and lpr)
121 .if \n(.H>23 .if \n(.V>19 \
134 .\" ========================================================================
136 .IX Title "RSA_public_encrypt 3"
137 .TH RSA_public_encrypt 3 "2004-03-23" "1.1.0-dev" "OpenSSL"
138 .\" For nroff, turn off justification. Always turn off hyphenation; it makes
139 .\" way too many mistakes in technical documents.
143 RSA_public_encrypt, RSA_private_decrypt \- RSA public key cryptography
147 .IX Header "SYNOPSIS"
149 \& #include <openssl/rsa.h>
151 \& int RSA_public_encrypt(int flen, unsigned char *from,
152 \& unsigned char *to, RSA *rsa, int padding);
154 \& int RSA_private_decrypt(int flen, unsigned char *from,
155 \& unsigned char *to, RSA *rsa, int padding);
158 .IX Header "DESCRIPTION"
159 \&\fIRSA_public_encrypt()\fR encrypts the \fBflen\fR bytes at \fBfrom\fR (usually a
160 session key) using the public key \fBrsa\fR and stores the ciphertext in
161 \&\fBto\fR. \fBto\fR must point to RSA_size(\fBrsa\fR) bytes of memory.
163 \&\fBpadding\fR denotes one of the following modes:
164 .IP "\s-1RSA_PKCS1_PADDING\s0" 4
165 .IX Item "RSA_PKCS1_PADDING"
166 \&\s-1PKCS\s0 #1 v1.5 padding. This currently is the most widely used mode.
167 .IP "\s-1RSA_PKCS1_OAEP_PADDING\s0" 4
168 .IX Item "RSA_PKCS1_OAEP_PADDING"
169 EME-OAEP as defined in \s-1PKCS\s0 #1 v2.0 with \s-1SHA\-1\s0, \s-1MGF1\s0 and an empty
170 encoding parameter. This mode is recommended for all new applications.
171 .IP "\s-1RSA_SSLV23_PADDING\s0" 4
172 .IX Item "RSA_SSLV23_PADDING"
173 \&\s-1PKCS\s0 #1 v1.5 padding with an SSL-specific modification that denotes
174 that the server is \s-1SSL3\s0 capable.
175 .IP "\s-1RSA_NO_PADDING\s0" 4
176 .IX Item "RSA_NO_PADDING"
177 Raw \s-1RSA\s0 encryption. This mode should \fIonly\fR be used to implement
178 cryptographically sound padding modes in the application code.
179 Encrypting user data directly with \s-1RSA\s0 is insecure.
181 \&\fBflen\fR must be less than RSA_size(\fBrsa\fR) \- 11 for the \s-1PKCS\s0 #1 v1.5
182 based padding modes, less than RSA_size(\fBrsa\fR) \- 41 for
183 \&\s-1RSA_PKCS1_OAEP_PADDING\s0 and exactly RSA_size(\fBrsa\fR) for \s-1RSA_NO_PADDING\s0.
184 The random number generator must be seeded prior to calling
185 \&\fIRSA_public_encrypt()\fR.
187 \&\fIRSA_private_decrypt()\fR decrypts the \fBflen\fR bytes at \fBfrom\fR using the
188 private key \fBrsa\fR and stores the plaintext in \fBto\fR. \fBto\fR must point
189 to a memory section large enough to hold the decrypted data (which is
190 smaller than RSA_size(\fBrsa\fR)). \fBpadding\fR is the padding mode that
191 was used to encrypt the data.
193 .IX Header "RETURN VALUES"
194 \&\fIRSA_public_encrypt()\fR returns the size of the encrypted data (i.e.,
195 RSA_size(\fBrsa\fR)). \fIRSA_private_decrypt()\fR returns the size of the
198 On error, \-1 is returned; the error codes can be
199 obtained by \fIERR_get_error\fR\|(3).
201 .IX Header "CONFORMING TO"
202 \&\s-1SSL\s0, \s-1PKCS\s0 #1 v2.0
204 .IX Header "SEE ALSO"
205 \&\fIERR_get_error\fR\|(3), \fIopenssl_rand\fR\|(3), \fIopenssl_rsa\fR\|(3),
206 \&\fIRSA_size\fR\|(3)
209 The \fBpadding\fR argument was added in SSLeay 0.8. \s-1RSA_NO_PADDING\s0 is
210 available since SSLeay 0.9.0, \s-1OAEP\s0 was added in OpenSSL 0.9.2b.