2 ''' $RCSfile$$Revision$$Date$
20 .ie \\n(.$>=3 .ne \\$3
36 ''' Set up \*(-- to give an unbreakable dash;
37 ''' string Tr holds user defined translation string.
38 ''' Bell System Logo is used as a dummy character.
44 .if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
45 .if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
48 ''' \*(M", \*(S", \*(N" and \*(T" are the equivalent of
49 ''' \*(L" and \*(R", except that they are used on ".xx" lines,
50 ''' such as .IP and .SH, which do another additional levels of
51 ''' double-quote interpretation
80 .\" If the F register is turned on, we'll generate
81 .\" index entries out stderr for the following things:
86 .\" X<> Xref (embedded
87 .\" Of course, you have to process the output yourself
88 .\" in some meaninful fashion.
91 .tm Index:\\$1\t\\n%\t"\\$2"
96 .TH RSA_public_encrypt 3 "0.9.7d" "2/Sep/2004" "OpenSSL"
100 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
101 .de CQ \" put $1 in typewriter font
107 \\&\\$2 \\$3 \\$4 \\$5 \\$6 \\$7
110 .\" @(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2
111 . \" AM - accent mark definitions
113 . \" fudge factors for nroff and troff
122 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
128 . \" simple accents for nroff and troff
141 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
142 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
143 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
144 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
145 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
146 . ds ? \s-2c\h'-\w'c'u*7/10'\u\h'\*(#H'\zi\d\s+2\h'\w'c'u*8/10'
147 . ds ! \s-2\(or\s+2\h'-\w'\(or'u'\v'-.8m'.\v'.8m'
148 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
149 . ds q o\h'-\w'o'u*8/10'\s-4\v'.4m'\z\(*i\v'-.4m'\s+4\h'\w'o'u*8/10'
151 . \" troff and (daisy-wheel) nroff accents
152 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
153 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
154 .ds v \\k:\h'-(\\n(.wu*9/10-\*(#H)'\v'-\*(#V'\*(#[\s-4v\s0\v'\*(#V'\h'|\\n:u'\*(#]
155 .ds _ \\k:\h'-(\\n(.wu*9/10-\*(#H+(\*(#F*2/3))'\v'-.4m'\z\(hy\v'.4m'\h'|\\n:u'
156 .ds . \\k:\h'-(\\n(.wu*8/10)'\v'\*(#V*4/10'\z.\v'-\*(#V*4/10'\h'|\\n:u'
157 .ds 3 \*(#[\v'.2m'\s-2\&3\s0\v'-.2m'\*(#]
158 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
159 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
160 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
161 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
162 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
163 .ds ae a\h'-(\w'a'u*4/10)'e
164 .ds Ae A\h'-(\w'A'u*4/10)'E
165 .ds oe o\h'-(\w'o'u*4/10)'e
166 .ds Oe O\h'-(\w'O'u*4/10)'E
167 . \" corrections for vroff
168 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
169 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
170 . \" for low resolution devices (crt and lpr)
171 .if \n(.H>23 .if \n(.V>19 \
175 . ds v \h'-1'\o'\(aa\(ga'
191 RSA_public_encrypt, RSA_private_decrypt \- RSA public key cryptography
195 \& #include <openssl/rsa.h>
198 \& int RSA_public_encrypt(int flen, unsigned char *from,
199 \& unsigned char *to, RSA *rsa, int padding);
202 \& int RSA_private_decrypt(int flen, unsigned char *from,
203 \& unsigned char *to, RSA *rsa, int padding);
206 \fIRSA_public_encrypt()\fR encrypts the \fBflen\fR bytes at \fBfrom\fR (usually a
207 session key) using the public key \fBrsa\fR and stores the ciphertext in
208 \fBto\fR. \fBto\fR must point to \fIRSA_size\fR\|(\fBrsa\fR) bytes of memory.
210 \fBpadding\fR denotes one of the following modes:
211 .Ip "\s-1RSA_PKCS1_PADDING\s0" 4
212 \s-1PKCS\s0 #1 v1.5 padding. This currently is the most widely used mode.
213 .Ip "\s-1RSA_PKCS1_OAEP_PADDING\s0" 4
214 \s-1EME\s0\-\s-1OAEP\s0 as defined in \s-1PKCS\s0 #1 v2.0 with \s-1SHA\s0\-1, \s-1MGF1\s0 and an empty
215 encoding parameter. This mode is recommended for all new applications.
216 .Ip "\s-1RSA_SSLV23_PADDING\s0" 4
217 \s-1PKCS\s0 #1 v1.5 padding with an \s-1SSL\s0\-specific modification that denotes
218 that the server is \s-1SSL3\s0 capable.
219 .Ip "\s-1RSA_NO_PADDING\s0" 4
220 Raw \s-1RSA\s0 encryption. This mode should \fIonly\fR be used to implement
221 cryptographically sound padding modes in the application code.
222 Encrypting user data directly with \s-1RSA\s0 is insecure.
224 \fBflen\fR must be less than \fIRSA_size\fR\|(\fBrsa\fR) \- 11 for the \s-1PKCS\s0 #1 v1.5
225 based padding modes, and less than \fIRSA_size\fR\|(\fBrsa\fR) \- 41 for
226 \s-1RSA_PKCS1_OAEP_PADDING\s0. The random number generator must be seeded
227 prior to calling \fIRSA_public_encrypt()\fR.
229 \fIRSA_private_decrypt()\fR decrypts the \fBflen\fR bytes at \fBfrom\fR using the
230 private key \fBrsa\fR and stores the plaintext in \fBto\fR. \fBto\fR must point
231 to a memory section large enough to hold the decrypted data (which is
232 smaller than \fIRSA_size\fR\|(\fBrsa\fR)). \fBpadding\fR is the padding mode that
233 was used to encrypt the data.
235 \fIRSA_public_encrypt()\fR returns the size of the encrypted data (i.e.,
236 \fIRSA_size\fR\|(\fBrsa\fR)). \fIRSA_private_decrypt()\fR returns the size of the
239 On error, \-1 is returned; the error codes can be
240 obtained by ERR_get_error(3).
244 ERR_get_error(3), rand(3), rsa(3),
247 The \fBpadding\fR argument was added in SSLeay 0.8. RSA_NO_PADDING is
248 available since SSLeay 0.9.0, OAEP was added in OpenSSL 0.9.2b.
251 .IX Title "RSA_public_encrypt 3"
252 .IX Name "RSA_public_encrypt, RSA_private_decrypt - RSA public key cryptography"
256 .IX Header "SYNOPSIS"
258 .IX Header "DESCRIPTION"
260 .IX Item "\s-1RSA_PKCS1_PADDING\s0"
262 .IX Item "\s-1RSA_PKCS1_OAEP_PADDING\s0"
264 .IX Item "\s-1RSA_SSLV23_PADDING\s0"
266 .IX Item "\s-1RSA_NO_PADDING\s0"
268 .IX Header "RETURN VALUES"
270 .IX Header "CONFORMING TO"
272 .IX Header "SEE ALSO"