Rsa C Reference Documentation

Rsa

Current Version: 10.0.0

RSA encryption component / library. Encrypt and decrypt byte arrays and strings. Generate public/private key pairs from 384 to 4096 bits in length. Import and export RSA keys. Import keys from SNK files. Input/output in raw binary, base64, hex encoding, quoted-printable, URL-encoding, etc.

Create/Dispose

HCkRsa instance = CkRsa_Create();
// ...
CkRsa_Dispose(instance);
HCkRsa CkRsa_Create(void);

Creates an instance of the HCkRsa object and returns a handle ("void *" pointer). The handle is passed in the 1st argument for the functions listed on this page.

void CkRsa_Dispose(HCkRsa handle);

Objects created by calling CkRsa_Create must be freed by calling this method. A memory leak occurs if a handle is not disposed by calling this function. Also, any handle returned by a Chilkat "C" function must also be freed by the application by calling the appropriate Dispose method, such as CkRsa_Dispose.

Properties

Charset
void CkRsa_getCharset(HCkRsa cHandle, HCkString retval);
void CkRsa_putCharset(HCkRsa cHandle, const char *newVal);
const char *CkRsa_charset(HCkRsa cHandle);

This property only applies when encrypting, decrypting, signing, or verifying signatures for strings. When encrypting strings, the input string is first converted to this charset before encrypting.

When decrypting, the decrypted data is interpreted as a string with this charset encoding and converted to the appropriate return. For example, ActiveX's returning strings always return Unicode (2 bytes/char). Java strings are utf-8. Chilkat C++ strings are ANSI or utf-8. .NET strings are Unicode.

The default value of this property is the ANSI charset of the local computer.

When signing string data, the input string is first converted to this charset before being hashed and signed. When verifying the signature for string data, the input string is first converted to this charset before the verification process begins.

top
DebugLogFilePath
void CkRsa_getDebugLogFilePath(HCkRsa cHandle, HCkString retval);
void CkRsa_putDebugLogFilePath(HCkRsa cHandle, const char *newVal);
const char *CkRsa_debugLogFilePath(HCkRsa cHandle);

If set to a file path, causes each Chilkat method or property call to automatically append it's LastErrorText to the specified log file. The information is appended such that if a hang or crash occurs, it is possible to see the context in which the problem occurred, as well as a history of all Chilkat calls up to the point of the problem. The VerboseLogging property can be set to provide more detailed information.

This property is typically used for debugging the rare cases where a Chilkat method call hangs or generates an exception that halts program execution (i.e. crashes). A hang or crash should generally never happen. The typical causes of a hang are:

  1. a timeout related property was set to 0 to explicitly indicate that an infinite timeout is desired,
  2. the hang is actually a hang within an event callback (i.e. it is a hang within the application code), or
  3. there is an internal problem (bug) in the Chilkat code that causes the hang.

More Information and Examples
top
EncodingMode
void CkRsa_getEncodingMode(HCkRsa cHandle, HCkString retval);
void CkRsa_putEncodingMode(HCkRsa cHandle, const char *newVal);
const char *CkRsa_encodingMode(HCkRsa cHandle);

Encoding mode to be used in methods ending in "ENC", such as EncryptStringENC. Valid EncodingModes are "base64", "hex", "url", or "quoted-printable" (or "qp"). Encryption methods ending in "ENC" will return encrypted data as a string encoded according to this property's value. Decryption methods ending in "ENC" accept an encoded string as specified by this property. The string is first decoded and then decrypted. The default value is "base64".

This property also applies to the "ENC" methods for creating and verifying digital signatures.

More Information and Examples
top
LastErrorHtml
void CkRsa_getLastErrorHtml(HCkRsa cHandle, HCkString retval);
const char *CkRsa_lastErrorHtml(HCkRsa cHandle);

Provides information in HTML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastErrorText
void CkRsa_getLastErrorText(HCkRsa cHandle, HCkString retval);
const char *CkRsa_lastErrorText(HCkRsa cHandle);

Provides information in plain-text format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastErrorXml
void CkRsa_getLastErrorXml(HCkRsa cHandle, HCkString retval);
const char *CkRsa_lastErrorXml(HCkRsa cHandle);

Provides information in XML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastMethodSuccess
BOOL CkRsa_getLastMethodSuccess(HCkRsa cHandle);
void CkRsa_putLastMethodSuccess(HCkRsa cHandle, BOOL newVal);

Indicate whether the last method call succeeded or failed. A value of TRUE indicates success, a value of FALSE indicates failure. This property is automatically set for method calls. It is not modified by property accesses. The property is automatically set to indicate success for the following types of method calls:

  • Any method that returns a string.
  • Any method returning a Chilkat object, binary bytes, or a date/time.
  • Any method returning a standard boolean status value where success = TRUE and failure = FALSE.
  • Any method returning an integer where failure is defined by a return value less than zero.

Note: Methods that do not fit the above requirements will always set this property equal to TRUE. For example, a method that returns no value (such as a "void" in C++) will technically always succeed.

top
LittleEndian
BOOL CkRsa_getLittleEndian(HCkRsa cHandle);
void CkRsa_putLittleEndian(HCkRsa cHandle, BOOL newVal);

The default value is FALSE, which means that signatures and encrypted output will be created using the big endian byte ordering. A value of TRUE will produce little-endian output, which is what Microsoft's Crypto API produces.

Important: Prior to v9.5.0.49, this property behaved the opposite as it should for encryption. When updating from an older version of Chilkat to v9.5.0.49 or greater, the following change is required:

  • If the application did NOT explicity set the LittleEndian property, then no change is required for encryption/decryption. If signatures were being created or verified, then explicitly set this property to TRUE.
  • If the application explicitly set this property, then reverse the setting ONLY if doing encryption/decryption. No changes are required if doing signature creation/verification.

top
NoUnpad
BOOL CkRsa_getNoUnpad(HCkRsa cHandle);
void CkRsa_putNoUnpad(HCkRsa cHandle, BOOL newVal);

If TRUE, skips unpadding when decrypting. The default is FALSE. This property value is typically left unchanged.

top
NumBits
int CkRsa_getNumBits(HCkRsa cHandle);

The number of bits of the key generated or imported into this RSA encryption object. Keys ranging in size from 384 bits to 4096 bits can be generated by calling GenerateKey. A public or private key may be imported by calling ImportPublicKey or ImportPrivateKey. A key must be available either via GenerateKey or import before any of the encrypt/decrypt methods may be called.

top
OaepHash
void CkRsa_getOaepHash(HCkRsa cHandle, HCkString retval);
void CkRsa_putOaepHash(HCkRsa cHandle, const char *newVal);
const char *CkRsa_oaepHash(HCkRsa cHandle);
Introduced in version 9.5.0.48

Selects the hash algorithm for use within OAEP padding. The valid choices are "sha1", "sha256", "sha384", "sha512", "md2", "md5", "haval", "ripemd128", "ripemd160","ripemd256", or "ripemd320". The default is "sha1".

top
OaepLabel
void CkRsa_getOaepLabel(HCkRsa cHandle, HCkString retval);
void CkRsa_putOaepLabel(HCkRsa cHandle, const char *newVal);
const char *CkRsa_oaepLabel(HCkRsa cHandle);
Introduced in version 9.5.0.95

The optional RSA encryption OAEP label. This property is the hex representation of the OAEP label bytes to be used when encrypting with OAEP padding. In virtually all cases, it is left empty (the label is 0 bytes in length). Only set this property if you have a specific need. Otherwise, leave it empty.

top
OaepMgfHash
void CkRsa_getOaepMgfHash(HCkRsa cHandle, HCkString retval);
void CkRsa_putOaepMgfHash(HCkRsa cHandle, const char *newVal);
const char *CkRsa_oaepMgfHash(HCkRsa cHandle);
Introduced in version 9.5.0.71

Selects the MGF (mask generation) hash algorithm for use within OAEP padding. The valid choices are "sha1", "sha256", "sha384", "sha512", "md2", "md5", "haval", "ripemd128", "ripemd160","ripemd256", or "ripemd320". The default is "sha1".

top
OaepPadding
BOOL CkRsa_getOaepPadding(HCkRsa cHandle);
void CkRsa_putOaepPadding(HCkRsa cHandle, BOOL newVal);

Controls whether Optimal Asymmetric Encryption Padding (OAEP) is used for the padding scheme (for encrypting/decrypting). If set to FALSE, PKCS1 v1.5 padding is used. If set to TRUE, PKCS1 v2.0 (OAEP) padding is used.

Important: The OAEP padding algorithm uses randomly generated bytes. Therefore, the RSA result will be different each time, even if all of the other inputs are identical. For example, if you RSA encrypt or sign the same data using the same key 100 times, the output will appear different each time, but they are all valid.

When creating digital signatures, this property controls whether RSA-PSS or PKCS1 v1.5 is used. If TRUE, then the RSA-PSS signature scheme is used. The default value of this property is FALSE.

More Information and Examples
top
PssSaltLen
int CkRsa_getPssSaltLen(HCkRsa cHandle);
void CkRsa_putPssSaltLen(HCkRsa cHandle, int newVal);
Introduced in version 9.5.0.80

Selects the PSS salt length when RSASSA-PSS padding is selected for signatures. The default value is -1 to indicate that the length of the hash function should be used. For example, if the hash function is SHA256, then the PSS salt length will be 32 bytes. Can be optionally set to a value such as 20 if a specific salt length is required. This property should normally remain at the default value.

top
Utf8
BOOL CkRsa_getUtf8(HCkRsa cHandle);
void CkRsa_putUtf8(HCkRsa cHandle, BOOL newVal);

When set to TRUE, all "const char *" arguments are interpreted as utf-8 strings. If set to FALSE (the default), then "const char *" arguments are interpreted as ANSI strings. Also, when set to TRUE, and Chilkat method returning a "const char *" is returning the utf-8 representation. If set to FALSE, all "const char *" return values are ANSI strings.

top
VerboseLogging
BOOL CkRsa_getVerboseLogging(HCkRsa cHandle);
void CkRsa_putVerboseLogging(HCkRsa cHandle, BOOL newVal);

If set to TRUE, then the contents of LastErrorText (or LastErrorXml, or LastErrorHtml) may contain more verbose information. The default value is FALSE. Verbose logging should only be used for debugging. The potentially large quantity of logged information may adversely affect peformance.

top
Version
void CkRsa_getVersion(HCkRsa cHandle, HCkString retval);
const char *CkRsa_version(HCkRsa cHandle);

Version of the component/library, such as "9.5.0.94"

More Information and Examples
top

Methods

DecryptBd
BOOL CkRsa_DecryptBd(HCkRsa cHandle, HCkBinData bd, BOOL usePrivateKey);
Introduced in version 9.5.0.76

RSA decrypts the contents of bd. usePrivateKey should be set to TRUE if the private key is to be used for decrypting. Otherwise it should be set to FALSE if the public key is to be used for decrypting.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Returns TRUE for success, FALSE for failure.

top
DecryptBytes
BOOL CkRsa_DecryptBytes(HCkRsa cHandle, HCkByteData inData, BOOL usePrivateKey, HCkByteData outData);

Decrypts byte data using the RSA encryption algorithm. usePrivateKey should be set to TRUE if the private key is to be used for decrypting. Otherwise it should be set to FALSE if the public key is to be used for decrypting.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Returns TRUE for success, FALSE for failure.

top
DecryptBytesENC
BOOL CkRsa_DecryptBytesENC(HCkRsa cHandle, const char *str, BOOL bUsePrivateKey, HCkByteData outData);

Same as DecryptBytes, except the input is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Returns TRUE for success, FALSE for failure.

top
DecryptString
BOOL CkRsa_DecryptString(HCkRsa cHandle, HCkByteData encBytes, BOOL usePrivateKey, HCkString outStr);
const char *CkRsa_decryptString(HCkRsa cHandle, HCkByteData encBytes, BOOL usePrivateKey);

Decrypts encrypted string data and returns an unencrypted string. usePrivateKey should be set to TRUE if the private key is to be used for decrypting. Otherwise it should be set to FALSE if the public key is to be used. The Charset property controls how the component interprets the decrypted string. Depending on the programming language, strings are returned to the application as Unicode, utf-8, or ANSI. Internal to DecryptString, the decrypted string is automatically converted from the charset specified by the Charset property to the encoding required by the calling programming language.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Returns TRUE for success, FALSE for failure.

top
DecryptStringENC
BOOL CkRsa_DecryptStringENC(HCkRsa cHandle, const char *str, BOOL usePrivateKey, HCkString outStr);
const char *CkRsa_decryptStringENC(HCkRsa cHandle, const char *str, BOOL usePrivateKey);

Same as DecryptString, except the input is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Returns TRUE for success, FALSE for failure.

top
EncryptBd
BOOL CkRsa_EncryptBd(HCkRsa cHandle, HCkBinData bd, BOOL usePrivateKey);
Introduced in version 9.5.0.76

RSA encrypts the contents of bd. usePrivateKey should be set to TRUE if the private key is to be used for encrypting. Otherwise it should be set to FALSE if the public key is to be used for encrypting.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.

Returns TRUE for success, FALSE for failure.

top
EncryptBytes
BOOL CkRsa_EncryptBytes(HCkRsa cHandle, HCkByteData binaryData, BOOL usePrivateKey, HCkByteData outData);

Encrypts byte data using the RSA encryption algorithm. usePrivateKey should be set to TRUE if the private key is to be used for encrypting. Otherwise it should be set to FALSE if the public key is to be used for encrypting.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.

Returns TRUE for success, FALSE for failure.

top
EncryptBytesENC
BOOL CkRsa_EncryptBytesENC(HCkRsa cHandle, HCkByteData data, BOOL bUsePrivateKey, HCkString outStr);
const char *CkRsa_encryptBytesENC(HCkRsa cHandle, HCkByteData data, BOOL bUsePrivateKey);

Same as EncryptBytes, except the output is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.

Returns TRUE for success, FALSE for failure.

top
EncryptString
BOOL CkRsa_EncryptString(HCkRsa cHandle, const char *stringToEncrypt, BOOL usePrivateKey, HCkByteData outData);

Encrypts a string using the RSA encryption algorithm. usePrivateKey should be set to TRUE if the private key is to be used for encrypting. Otherwise it should be set to FALSE if the public key is to be used for encrypting. The string is first converted (if necessary) to the character encoding specified by the Charset property before encrypting. The encrypted bytes are returned.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
EncryptStringENC
BOOL CkRsa_EncryptStringENC(HCkRsa cHandle, const char *str, BOOL bUsePrivateKey, HCkString outStr);
const char *CkRsa_encryptStringENC(HCkRsa cHandle, const char *str, BOOL bUsePrivateKey);

Same as EncryptString, except the output is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.

Returns TRUE for success, FALSE for failure.

top
ExportPrivateKey
BOOL CkRsa_ExportPrivateKey(HCkRsa cHandle, HCkString outStr);
const char *CkRsa_exportPrivateKey(HCkRsa cHandle);

Exports the private-key of an RSA key pair to XML format. This is typically called after generating a new RSA key via the GenerateKey method.

Returns TRUE for success, FALSE for failure.

top
ExportPrivateKeyObj
HCkPrivateKey CkRsa_ExportPrivateKeyObj(HCkRsa cHandle);
Introduced in version 9.5.0.40

Exports the private-key to a private key object. This is typically called after generating a new RSA key via the GenerateKey method. Once the private key object is obtained, it may be saved in a variety of different formats.

Returns NULL on failure

More Information and Examples
top
ExportPublicKey
BOOL CkRsa_ExportPublicKey(HCkRsa cHandle, HCkString outStr);
const char *CkRsa_exportPublicKey(HCkRsa cHandle);

Exports the public-key of an RSA key pair to XML format. This is typically called after generating a new RSA key via the GenerateKey method.

Returns TRUE for success, FALSE for failure.

top
ExportPublicKeyObj
HCkPublicKey CkRsa_ExportPublicKeyObj(HCkRsa cHandle);
Introduced in version 9.5.0.40

Exports the public key to a public key object. Once the public key object is obtained, it may be saved in a variety of different formats.

Returns NULL on failure

More Information and Examples
top
GenerateKey
BOOL CkRsa_GenerateKey(HCkRsa cHandle, int numBits);

Generates a new RSA public/private key pair. The number of bits can range from 512 to 8192. Typical key lengths are 1024, 2048, or 4096 bits. After successful generation, the public/private parts of the key can be exported to XML via the ExportPrivateKey and ExportPublicKey methods.

Note: Prior to version 9.5.0.49, the max key size was 4096 bits. Generating an 8192-bit RSA key takes a considerable amount of time and CPU processing power. There are no event callbacks or progress monitoring for RSA key generation. Calling this will block the thread until it returns.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
ImportPrivateKey
BOOL CkRsa_ImportPrivateKey(HCkRsa cHandle, const char *xmlKey);

Imports a private key from XML format. After successful import, the private key can be used to encrypt or decrypt. A private key (by definition) contains both private and public parts. This is because the public key consist of modulus and exponent. The private key consists of modulus, exponent, P, Q, DP, DQ, InverseQ, and D using base64 representation:

<RSAKeyValue>
  <Modulus>...</Modulus>
  <Exponent>...</Exponent>
  <P>...</P>
  <Q>...</Q>
  <DP>...</DP>
  <DQ>...</DQ>
  <InverseQ>...</InverseQ>
  <D>...</D>
</RSAKeyValue>

Important: The Rsa object can contain either a private key or a public key, but not both. Importing a private key overwrites the existing key regardless of whether the type of key is public or private.

Returns TRUE for success, FALSE for failure.

top
ImportPrivateKeyObj
BOOL CkRsa_ImportPrivateKeyObj(HCkRsa cHandle, HCkPrivateKey key);
Introduced in version 9.5.0.40

Imports a private key from a private key object. The imported private key is used in methods that sign or decrypt.

Returns TRUE for success, FALSE for failure.

top
ImportPublicKey
BOOL CkRsa_ImportPublicKey(HCkRsa cHandle, const char *xmlKey);

Imports a public key from XML format. After successful import, the public key can be used to encrypt or decrypt.

Note: Importing a public key overwrites the key that is currently contained in this object - even if it's a private key.

A public key consists of modulus and exponent using base64 representation:

<RSAPublicKey>
  <Modulus>...</Modulus>
  <Exponent>...</Exponent>
</RSAPublicKey>

Important: The Rsa object can contain either a private key or a public key, but not both. Importing a private key overwrites the existing key regardless of whether the type of key is public or private.

Returns TRUE for success, FALSE for failure.

top
ImportPublicKeyObj
BOOL CkRsa_ImportPublicKeyObj(HCkRsa cHandle, HCkPublicKey key);
Introduced in version 9.5.0.40

Imports a public key from a public key object. The imported public key is used in methods that encrypt data or verify signatures.

Returns TRUE for success, FALSE for failure.

top
OpenSslSignBd
BOOL CkRsa_OpenSslSignBd(HCkRsa cHandle, HCkBinData bd);
Introduced in version 9.5.0.77

Duplicates OpenSSL's rsautl utility for creating RSA signatures. The contents of bd are signed. If successful, the result is that bd contains the RSA signature that itself contains (embeds) the original data.

Returns TRUE for success, FALSE for failure.

top
OpenSslSignBytes
BOOL CkRsa_OpenSslSignBytes(HCkRsa cHandle, HCkByteData data, HCkByteData outBytes);

Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data consists of binary bytes, and returns the signature bytes.

Returns TRUE for success, FALSE for failure.

top
OpenSslSignBytesENC
BOOL CkRsa_OpenSslSignBytesENC(HCkRsa cHandle, HCkByteData data, HCkString outStr);
const char *CkRsa_openSslSignBytesENC(HCkRsa cHandle, HCkByteData data);

Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data consists of binary bytes, and returns the signature as a string encoded according to the EncodingMode property (base64, hex, etc.).

Returns TRUE for success, FALSE for failure.

top
OpenSslSignString
BOOL CkRsa_OpenSslSignString(HCkRsa cHandle, const char *str, HCkByteData outBytes);

Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data is a string, and returns the signature bytes.

Returns TRUE for success, FALSE for failure.

top
OpenSslSignStringENC
BOOL CkRsa_OpenSslSignStringENC(HCkRsa cHandle, const char *str, HCkString outStr);
const char *CkRsa_openSslSignStringENC(HCkRsa cHandle, const char *str);

Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data is a string, and returns the signature as a string encoded according to the EncodingMode property (base64, hex, etc.).

Returns TRUE for success, FALSE for failure.

top
OpenSslVerifyBd
BOOL CkRsa_OpenSslVerifyBd(HCkRsa cHandle, HCkBinData bd);
Introduced in version 9.5.0.77

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. On input, the bd contains the RSA signature that embeds the original data. If successful (i.e. the signature was verified), then the bd is transformed to contain just the original data.

Returns TRUE for success, FALSE for failure.

top
OpenSslVerifyBytes
BOOL CkRsa_OpenSslVerifyBytes(HCkRsa cHandle, HCkByteData signature, HCkByteData outBytes);

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data consists of the raw signature bytes and returns the original bytes.

Returns TRUE for success, FALSE for failure.

top
OpenSslVerifyBytesENC
BOOL CkRsa_OpenSslVerifyBytesENC(HCkRsa cHandle, const char *str, HCkByteData outBytes);

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data is a signature string encoded according to the EncodingMode property (base64, hex, etc.). Returns the original bytes.

Returns TRUE for success, FALSE for failure.

top
OpenSslVerifyString
BOOL CkRsa_OpenSslVerifyString(HCkRsa cHandle, HCkByteData data, HCkString outStr);
const char *CkRsa_openSslVerifyString(HCkRsa cHandle, HCkByteData data);

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data consists of the raw signature bytes and returns the original string.

Returns TRUE for success, FALSE for failure.

top
OpenSslVerifyStringENC
BOOL CkRsa_OpenSslVerifyStringENC(HCkRsa cHandle, const char *str, HCkString outStr);
const char *CkRsa_openSslVerifyStringENC(HCkRsa cHandle, const char *str);

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data is a signature string encoded according to the EncodingMode property (base64, hex, etc.). Returns the original string.

Returns TRUE for success, FALSE for failure.

top
SetX509Cert
BOOL CkRsa_SetX509Cert(HCkRsa cHandle, HCkCert cert, BOOL usePrivateKey);
Introduced in version 9.5.0.73

Provides the private or public key indirectly through a certificate. This method is especially useful on Windows computers where the private key is installed as non-exportable (such as on a hardware token).

Returns TRUE for success, FALSE for failure.

top
SignBd
BOOL CkRsa_SignBd(HCkRsa cHandle, HCkBinData bdData, const char *hashAlgorithm, HCkBinData bdSig);
Introduced in version 9.5.0.77

Creates an RSA digital signature by hashing the contents of bdData and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The resulting signature is returned in bdSig.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)

A private key is required to create digital signatures.

More Information and Examples
top
SignBytes
BOOL CkRsa_SignBytes(HCkRsa cHandle, HCkByteData binaryData, const char *hashAlgorithm, HCkByteData outData);

Creates an RSA digital signature by hashing binaryData and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)

A private key is required to create a digital signature.

An error is indicated when a byte array of 0 length is returned.

Returns TRUE for success, FALSE for failure.

top
SignBytesENC
BOOL CkRsa_SignBytesENC(HCkRsa cHandle, HCkByteData binaryData, const char *hashAlgorithm, HCkString outStr);
const char *CkRsa_signBytesENC(HCkRsa cHandle, HCkByteData binaryData, const char *hashAlgorithm);

Creates an RSA digital signature by hashing binaryData and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1". The digital signature is returned as an encoded string, where the encoding is specified by the EncodingMode property.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)

A private key is required to create a digital signature.

An error is indicated when null reference is returned.

Returns TRUE for success, FALSE for failure.

top
SignHash
BOOL CkRsa_SignHash(HCkRsa cHandle, HCkByteData hashBytes, const char *hashAlg, HCkByteData outBytes);

The same as the SignBytes method, except the hash to be signed is passed directly.

Returns TRUE for success, FALSE for failure.

top
SignHashENC
BOOL CkRsa_SignHashENC(HCkRsa cHandle, const char *encodedHash, const char *hashAlg, HCkString outStr);
const char *CkRsa_signHashENC(HCkRsa cHandle, const char *encodedHash, const char *hashAlg);

The same as SignBytesENC except the hash is passed directly.

Returns TRUE for success, FALSE for failure.

top
SignString
BOOL CkRsa_SignString(HCkRsa cHandle, const char *strToBeHashed, const char *hashAlgorithm, HCkByteData outData);

Creates an RSA digital signature by hashing strToBeHashed and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)

A private key is required to create a digital signature.

An error is indicated when a byte array of 0 length is returned.

Returns TRUE for success, FALSE for failure.

top
SignStringENC
BOOL CkRsa_SignStringENC(HCkRsa cHandle, const char *strToBeHashed, const char *hashAlgorithm, HCkString outStr);
const char *CkRsa_signStringENC(HCkRsa cHandle, const char *strToBeHashed, const char *hashAlgorithm);

Creates an RSA digital signature by hashing strToBeHashed and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1". The digital signature is returned as an encoded string, where the encoding is specified by the EncodingMode property.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)

A private key is required to create a digital signature.

An error is indicated when null reference is returned.

Returns TRUE for success, FALSE for failure.

top
SnkToXml
BOOL CkRsa_SnkToXml(HCkRsa cHandle, const char *filename, HCkString outStr);
const char *CkRsa_snkToXml(HCkRsa cHandle, const char *filename);

Imports a .snk file to an XML document that can be imported via the ImportPrivateKey method.

Returns TRUE for success, FALSE for failure.

top
VerifyBd
BOOL CkRsa_VerifyBd(HCkRsa cHandle, HCkBinData bdData, const char *hashAlgorithm, HCkBinData bdSig);
Introduced in version 9.5.0.77

Verifies an RSA digital signature. Returns TRUE if the signature in bdSig is valid an confirms that the original data in bdData has not been modified. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512".

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
VerifyBytes
BOOL CkRsa_VerifyBytes(HCkRsa cHandle, HCkByteData originalData, const char *hashAlgorithm, HCkByteData signatureBytes);

Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalData. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

top
VerifyBytesENC
BOOL CkRsa_VerifyBytesENC(HCkRsa cHandle, HCkByteData originalData, const char *hashAlgorithm, const char *encodedSig);

Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalData. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

The encodedSig is a digital signature encoded according to the EncodingMode property (i.e. base64, hex, etc.).

top
VerifyHash
BOOL CkRsa_VerifyHash(HCkRsa cHandle, HCkByteData hashBytes, const char *hashAlg, HCkByteData sigBytes);

The same as VerifyBytes except the hash of the original data is passed directly.

top
VerifyHashENC
BOOL CkRsa_VerifyHashENC(HCkRsa cHandle, const char *encodedHash, const char *hashAlg, const char *encodedSig);

The same as VerifyBytesENC except the hash of the original data is passed directly.

More Information and Examples
top
VerifyPrivateKey
BOOL CkRsa_VerifyPrivateKey(HCkRsa cHandle, const char *xml);

Returns TRUE if the XML contains a valid RSA private key. Otherwise returns FALSE.

Returns TRUE for success, FALSE for failure.

top
VerifyString
BOOL CkRsa_VerifyString(HCkRsa cHandle, const char *originalString, const char *hashAlgorithm, HCkByteData binarySig);

Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalString. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

top
VerifyStringENC
BOOL CkRsa_VerifyStringENC(HCkRsa cHandle, const char *originalString, const char *hashAlgorithm, const char *encodedSig);

Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalString. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

The encodedSig is a digital signature encoded according to the EncodingMode property (i.e. base64, hex, etc.).

More Information and Examples
top