Provided by: libssl-doc_1.1.1c-1ubuntu4_all bug


       RSA_sign_ASN1_OCTET_STRING, RSA_verify_ASN1_OCTET_STRING - RSA signatures


        #include <openssl/rsa.h>

        int RSA_sign_ASN1_OCTET_STRING(int dummy, unsigned char *m,
                                       unsigned int m_len, unsigned char *sigret,
                                       unsigned int *siglen, RSA *rsa);

        int RSA_verify_ASN1_OCTET_STRING(int dummy, unsigned char *m,
                                         unsigned int m_len, unsigned char *sigbuf,
                                         unsigned int siglen, RSA *rsa);


       RSA_sign_ASN1_OCTET_STRING() signs the octet string m of size m_len using the private key
       rsa represented in DER using PKCS #1 padding. It stores the signature in sigret and the
       signature size in siglen. sigret must point to RSA_size(rsa) bytes of memory.

       dummy is ignored.

       The random number generator must be seeded prior to calling RSA_sign_ASN1_OCTET_STRING().

       RSA_verify_ASN1_OCTET_STRING() verifies that the signature sigbuf of size siglen is the
       DER representation of a given octet string m of size m_len. dummy is ignored. rsa is the
       signer's public key.


       RSA_sign_ASN1_OCTET_STRING() returns 1 on success, 0 otherwise.
       RSA_verify_ASN1_OCTET_STRING() returns 1 on successful verification, 0 otherwise.

       The error codes can be obtained by ERR_get_error(3).


       These functions serve no recognizable purpose.


       ERR_get_error(3), RAND_bytes(3), RSA_sign(3), RSA_verify(3)


       Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.

       Licensed under the OpenSSL license (the "License").  You may not use this file except in
       compliance with the License.  You can obtain a copy in the file LICENSE in the source
       distribution or at <>.