Rsa Tcl Reference Documentation

Rsa

Current Version: 10.1.0

  • Create and validate RSA signatures
  • RSA encryption and decryption
  • Supports operations on smartcards and USB tokens
  • Generate RSA keys
  • Supports both PKCS#1 v1.5 and RSA-PSS padding for signatures
  • Supports both PKCS#1 v1.5 and OAEP padding for encryption

Object Creation

set myRsa [new CkRsa]

Properties

Charset
string
# ckStr is a CkString
CkRsa_get_Charset $myRsa $ckStr
set strVal [CkRsa_get_charset $myRsa]
CkRsa_put_Charset $myRsa $strVal

This property is relevant when signing or validating data originally provided as a string, but not when dealing with hashes or binary data. When hashing a string for these purposes, it's important to know its byte representation, such as UTF-8, ISO-8859-1, UTF-16, etc. This property defines the byte representation to use for the string before hashing, with the default being "ANSI", which is the default multibyte charset on a given computer.

Note: It is recommended that your application explicitly set this property to "utf-8".

top
DebugLogFilePath
string
# ckStr is a CkString
CkRsa_get_DebugLogFilePath $myRsa $ckStr
set strVal [CkRsa_get_debugLogFilePath $myRsa]
CkRsa_put_DebugLogFilePath $myRsa $strVal

If set to a file path, this property logs the LastErrorText of each Chilkat method or property call to the specified file. This logging helps identify the context and history of Chilkat calls leading up to any crash or hang, aiding in debugging.

Enabling the VerboseLogging property provides more detailed information. This property is mainly used for debugging rare instances where a Chilkat method call causes a hang or crash, which should generally not happen.

Possible causes of hangs include:

  • A timeout property set to 0, indicating an infinite timeout.
  • A hang occurring within an event callback in the application code.
  • An internal bug in the Chilkat code causing the hang.

More Information and Examples
top
EncodingMode
string
# ckStr is a CkString
CkRsa_get_EncodingMode $myRsa $ckStr
set strVal [CkRsa_get_encodingMode $myRsa]
CkRsa_put_EncodingMode $myRsa $strVal

This property defines the encoding for methods ending in "ENC", such as EncryptStringENC. Valid modes include "base64", "hex", "hex_lower", and more. The encoding mode applies to signatures, encrypted data, and hashes used in or returned by a method.

More Information and Examples
top
LastErrorHtml
string
# ckStr is a CkString
CkRsa_get_LastErrorHtml $myRsa $ckStr
set strVal [CkRsa_get_lastErrorHtml $myRsa]

Provides HTML-formatted information about the last called method or property. If a method call fails or behaves unexpectedly, check this property for details. Note that information is available regardless of the method call's success.

top
LastErrorText
string
# ckStr is a CkString
CkRsa_get_LastErrorText $myRsa $ckStr
set strVal [CkRsa_get_lastErrorText $myRsa]

Provides plain text information about the last called method or property. If a method call fails or behaves unexpectedly, check this property for details. Note that information is available regardless of the method call's success.

top
LastErrorXml
string
# ckStr is a CkString
CkRsa_get_LastErrorXml $myRsa $ckStr
set strVal [CkRsa_get_lastErrorXml $myRsa]

Provides XML-formatted information about the last called method or property. If a method call fails or behaves unexpectedly, check this property for details. Note that information is available regardless of the method call's success.

top
LastMethodSuccess
boolean 1/0
set boolVal [CkRsa_get_LastMethodSuccess $myRsa]
CkRsa_put_LastMethodSuccess $myRsa $boolVal

Indicates the success or failure of the most recent method call: 1 means success, 0 means failure. This property remains unchanged by property setters or getters. This method is present to address challenges in checking for null or Nothing returns in certain programming languages.

top
LittleEndian
boolean 1/0
set boolVal [CkRsa_get_LittleEndian $myRsa]
CkRsa_put_LittleEndian $myRsa $boolVal

When creating RSA signatures, this property determines the endianness: set it to 1 for little-endian signatures and 0 for big-endian signatures.

More Information and Examples
top
NoUnpad
boolean 1/0
set boolVal [CkRsa_get_NoUnpad $myRsa]
CkRsa_put_NoUnpad $myRsa $boolVal

If 1, skips unpadding when decrypting. The default is 0. This property value is typically left unchanged.

top
NumBits
integer
set intVal [CkRsa_get_NumBits $myRsa]

The bit length, such as 2048, of the imported or generated RSA key.

top
OaepHash
string
# ckStr is a CkString
CkRsa_get_OaepHash $myRsa $ckStr
set strVal [CkRsa_get_oaepHash $myRsa]
CkRsa_put_OaepHash $myRsa $strVal
Introduced in version 9.5.0.48

Selects the hash algorithm for use within OAEP padding for encryption. The valid choices are "sha256", "sha384", "sha512", or "sha1".

The default is SHA1. You'll likely want to change this to to SHA256. The next major version of Chilkat (11.0.0) will change the default to SHA256.

top
OaepLabel
string
# ckStr is a CkString
CkRsa_get_OaepLabel $myRsa $ckStr
set strVal [CkRsa_get_oaepLabel $myRsa]
CkRsa_put_OaepLabel $myRsa $strVal
Introduced in version 9.5.0.95

The optional RSA encryption OAEP label is a hex representation of the label bytes used for encrypting with OAEP padding. Typically, this is left empty (0 bytes) unless there's a specific requirement to set it.

top
OaepMgfHash
string
# ckStr is a CkString
CkRsa_get_OaepMgfHash $myRsa $ckStr
set strVal [CkRsa_get_oaepMgfHash $myRsa]
CkRsa_put_OaepMgfHash $myRsa $strVal
Introduced in version 9.5.0.71

Selects the MGF (mask generation) hash algorithm for use within OAEP padding for encryption. The valid choices are "sha256", "sha384", "sha512", or "sha1".

Note: This property should typically be set to the same value as the OaepHash property. Many software implementations are not able to handle cases where the MGF hash is different than the OAEP hash.

The default is SHA1. You'll likely want to change this to to SHA256. The next major version of Chilkat (11.0.0) will change the default to SHA256.

top
OaepPadding
boolean 1/0
set boolVal [CkRsa_get_OaepPadding $myRsa]
CkRsa_put_OaepPadding $myRsa $boolVal

This property controls both RSA-PSS and OAEP. When set to 0, Chilkat uses PKCS#1 v1.5 padding for both encryption and signature creation. When set to 1, Chilkat uses RSA-PSS padding for signatures, and OAEP padding for encryption.

Note: Both OAEP and RSA-PSS incorporate random bytes in the output. Therefore, the output is different each time even if all of the inputs are identical.

The default value of this property is 0.

PS> Please accept our apology for not having a separate RsaPss property. This oversight in design happened approximately 20 years ago. We've refrained from fixing to avoid backward compatibility problems.

top
PssSaltLen
integer
set intVal [CkRsa_get_PssSaltLen $myRsa]
CkRsa_put_PssSaltLen $myRsa $intVal
Introduced in version 9.5.0.80

When using RSASSA-PSS padding for signatures, you can choose the PSS salt length. By default, the salt length is set to -1, which uses the length of the hash function. For instance, with the SHA256 hash function, the salt length will be 32 bytes. You can specify a different salt length, like 20 bytes, if needed, but it's generally recommended to keep the default setting.

top
UncommonOptions
string
# ckStr is a CkString
CkRsa_get_UncommonOptions $myRsa $ckStr
set strVal [CkRsa_get_uncommonOptions $myRsa]
CkRsa_put_UncommonOptions $myRsa $strVal
Introduced in version 10.1.0

This is a catch-all property to be used for uncommon needs. This property defaults to the empty string and should typically remain empty.

top
Utf8
boolean 1/0
set boolVal [CkRsa_get_Utf8 $myRsa]
CkRsa_put_Utf8 $myRsa $boolVal

When set to 1, all "const char *" arguments are interpreted as utf-8 strings. If set to 0 (the default), then "const char *" arguments are interpreted as ANSI strings. Also, when set to 1, and Chilkat method returning a "const char *" is returning the utf-8 representation. If set to 0, all "const char *" return values are ANSI strings.

top
VerboseLogging
boolean 1/0
set boolVal [CkRsa_get_VerboseLogging $myRsa]
CkRsa_put_VerboseLogging $myRsa $boolVal

If set to 1, then the contents of LastErrorText (or LastErrorXml, or LastErrorHtml) may contain more verbose information. The default value is 0. Verbose logging should only be used for debugging. The potentially large quantity of logged information may adversely affect peformance.

top
Version
string
# ckStr is a CkString
CkRsa_get_Version $myRsa $ckStr
set strVal [CkRsa_get_version $myRsa]

Version of the component/library, such as "10.1.0"

More Information and Examples
top

Methods

DecryptBd
# bd is a CkBinData
# usePrivateKey is a boolean
set status [CkRsa_DecryptBd $bd $usePrivateKey]
Introduced in version 9.5.0.76

RSA decrypts the contents of bd. usePrivateKey should be set to 1 if the private key is to be used for decrypting. Otherwise it should be set to 0 if (in rare cases) the public key is to be used for decrypting.

Important: If trying to match OpenSSL results, set the LittleEndian property = 0.

Returns 1 for success, 0 for failure.

top
DecryptBytes
# inData is a CkByteData
# usePrivateKey is a boolean
# outData is a CkByteData (output)
set status [CkRsa_DecryptBytes $inData $usePrivateKey $outData]

Decrypts byte data using the RSA encryption algorithm. usePrivateKey should be set to 1 if the private key is to be used for decrypting. Otherwise it should be set to 0 if (in rare cases) the public key is to be used for decrypting.

Important: If trying to match OpenSSL results, set the LittleEndian property = 0.

Returns 1 for success, 0 for failure.

top
DecryptBytesENC
# str is a string
# bUsePrivateKey is a boolean
# outData is a CkByteData (output)
set status [CkRsa_DecryptBytesENC $str $bUsePrivateKey $outData]

Decrypts str using the RSA algorithm. str is the encoded form of the encrypted binary data. The EncodingMode property defines str's encoding. Set bUsePrivateKey to 1 to use the private key for decryption; otherwise, set it to 0 to use the public key (in rare cases).

Important: If trying to match OpenSSL results, set the LittleEndian property = 0.

Returns 1 for success, 0 for failure.

More Information and Examples
top
DecryptString
# encBytes is a CkByteData
# usePrivateKey is a boolean
# outStr is a CkString (output)
set status [CkRsa_DecryptString $encBytes $usePrivateKey $outStr]
set retStr [CkRsa_decryptString $myRsa $encBytes $usePrivateKey]

Decrypts encBytes with the RSA algorithm. encBytes holds the encrypted binary data. The Charset property specifies the byte representation for interpreting the decrypted text. Set usePrivateKey to 1 to use the private key for decryption; otherwise, set usePrivateKey to 0 to use the public key (used rarely). Returns the decrypted string.

Important: If trying to match OpenSSL results, set the LittleEndian property = 0.

Returns 1 for success, 0 for failure.

top
DecryptStringENC
# str is a string
# usePrivateKey is a boolean
# outStr is a CkString (output)
set status [CkRsa_DecryptStringENC $str $usePrivateKey $outStr]
set retStr [CkRsa_decryptStringENC $myRsa $str $usePrivateKey]

Decrypts str with the RSA algorithm. str is the encoded form of the encrypted binary data. The EncodingMode property defines str's encoding. The Charset property specifies the byte representation for interpreting the decrypted text. Set usePrivateKey to 1 to use the private key for decryption; otherwise, set usePrivateKey to 0 to use the public key (used rarely). Returns the decrypted string.

Important: If trying to match OpenSSL results, set the LittleEndian property = 0.

Returns 1 for success, 0 for failure.

top
EncryptBd
# bd is a CkBinData
# usePrivateKey is a boolean
set status [CkRsa_EncryptBd $bd $usePrivateKey]
Introduced in version 9.5.0.76

RSA encrypts the contents of bd. Set usePrivateKey to 0 to use the public key for encrypting; otherwise, set it to 1 to use the private key (in rare cases).

Important: If trying to match OpenSSL results, set the LittleEndian property = 0.

Note: The public key's role is to make encryption accessible to anyone while ensuring that only the private key holder can decrypt the messages. The public key is designed to be widely distributed so anyone can use it to encrypt messages intended for the owner of the private key.

Returns 1 for success, 0 for failure.

top
EncryptBytes
# binaryData is a CkByteData
# usePrivateKey is a boolean
# outData is a CkByteData (output)
set status [CkRsa_EncryptBytes $binaryData $usePrivateKey $outData]

Encrypts byte data using the RSA encryption algorithm. Set usePrivateKey to 0 to use the public key for encrypting; otherwise, set it to 1 to use the private key (in rare cases).

Important: If trying to match OpenSSL results, set the LittleEndian property = 0.

Note: The public key's role is to make encryption accessible to anyone while ensuring that only the private key holder can decrypt the messages. The public key is designed to be widely distributed so anyone can use it to encrypt messages intended for the owner of the private key.

Returns 1 for success, 0 for failure.

top
EncryptBytesENC
# data is a CkByteData
# bUsePrivateKey is a boolean
# outStr is a CkString (output)
set status [CkRsa_EncryptBytesENC $data $bUsePrivateKey $outStr]
set retStr [CkRsa_encryptBytesENC $myRsa $data $bUsePrivateKey]

Encrypts data using the RSA algorithm. Set bUsePrivateKey to 0 to use the public key for encrypting; otherwise, set it to 1 to use the private key (in rare cases). The encrypted data is returned in the format specified by the EncodingMode property.

Important: If trying to match OpenSSL results, set the LittleEndian property = 0.

Note: The public key's role is to make encryption accessible to anyone while ensuring that only the private key holder can decrypt the messages. The public key is designed to be widely distributed so anyone can use it to encrypt messages intended for the owner of the private key.

Returns 1 for success, 0 for failure.

top
EncryptString
# stringToEncrypt is a string
# usePrivateKey is a boolean
# outData is a CkByteData (output)
set status [CkRsa_EncryptString $stringToEncrypt $usePrivateKey $outData]

Encrypts stringToEncrypt with the RSA algorithm. The Charset property specifies the byte representation of the string that is encrypted. Set usePrivateKey to 0 to use the public key for encrypting; otherwise, set it to 1 to use the private key (in rare cases).

Important: If trying to match OpenSSL results, set the LittleEndian property = 0.

Note: The public key's role is to make encryption accessible to anyone while ensuring that only the private key holder can decrypt the messages. The public key is designed to be widely distributed so anyone can use it to encrypt messages intended for the owner of the private key.

Returns 1 for success, 0 for failure.

top
EncryptStringENC
# str is a string
# bUsePrivateKey is a boolean
# outStr is a CkString (output)
set status [CkRsa_EncryptStringENC $str $bUsePrivateKey $outStr]
set retStr [CkRsa_encryptStringENC $myRsa $str $bUsePrivateKey]

Encrypts str with the RSA algorithm. The Charset property specifies the byte representation of the string that is encrypted. Set bUsePrivateKey to 0 to use the public key for encrypting; otherwise, set it to 1 to use the private key (in rare cases). The encrypted data is returned in the format specified by the EncodingMode property.

Important: If trying to match OpenSSL results, set the LittleEndian property = 0.

Note: The public key's role is to make encryption accessible to anyone while ensuring that only the private key holder can decrypt the messages. The public key is designed to be widely distributed so anyone can use it to encrypt messages intended for the owner of the private key.

Returns 1 for success, 0 for failure.

top
ExportPrivateKey
# outStr is a CkString (output)
set status [CkRsa_ExportPrivateKey $outStr]
set retStr [CkRsa_exportPrivateKey $myRsa]

Exports the private-key of an RSA key pair to XML format. This is typically called after generating a new RSA key via the GenerateKey method.

Returns 1 for success, 0 for failure.

More Information and Examples
top
ExportPrivateKeyObj
# returns a CkPrivateKey
set ret_privateKey [CkRsa_ExportPrivateKeyObj]
Introduced in version 9.5.0.40

Exports the private-key to a private key object. This is typically called after generating a new RSA key via the GenerateKey method. Once the private key object is obtained, it may be saved in a variety of different formats.

Returns NULL on failure

top
ExportPublicKey
# outStr is a CkString (output)
set status [CkRsa_ExportPublicKey $outStr]
set retStr [CkRsa_exportPublicKey $myRsa]

Exports the public-key of an RSA key pair to XML format. This is typically called after generating a new RSA key via the GenerateKey method.

Returns 1 for success, 0 for failure.

top
ExportPublicKeyObj
# returns a CkPublicKey
set ret_publicKey [CkRsa_ExportPublicKeyObj]
Introduced in version 9.5.0.40

Exports the public key to a public key object. Once the public key object is obtained, it may be saved in a variety of different formats.

Returns NULL on failure

More Information and Examples
top
GenerateKey
# numBits is an integer
set status [CkRsa_GenerateKey $numBits]

Generates a new RSA public/private key pair. The number of bits can range from 512 to 8192. Typical key lengths are 1024, 2048, or 4096 bits. After successful generation, the public/private parts of the key can be exported to XML via the ExportPrivateKey and ExportPublicKey methods.

Note: Generating an 8192-bit RSA key can take a considerable amount of time. There are no event callbacks or progress monitoring for RSA key generation. Calling this will block the thread until it returns.

Returns 1 for success, 0 for failure.

top
ImportPrivateKey
# xmlKey is a string
set status [CkRsa_ImportPrivateKey $xmlKey]

Imports a private key from XML format. After successful import, the private key can be used to encrypt or decrypt. A private key (by definition) contains both private and public parts. This is because the public key consist of modulus and exponent. The private key consists of modulus, exponent, P, Q, DP, DQ, InverseQ, and D using base64 representation:

<RSAKeyValue>
  <Modulus>...</Modulus>
  <Exponent>...</Exponent>
  <P>...</P>
  <Q>...</Q>
  <DP>...</DP>
  <DQ>...</DQ>
  <InverseQ>...</InverseQ>
  <D>...</D>
</RSAKeyValue>

Important: The Rsa object can contain either a private key or a public key, but not both. Importing a private key overwrites the existing key regardless of whether the type of key is public or private.

Returns 1 for success, 0 for failure.

top
ImportPrivateKeyObj
# key is a CkPrivateKey
set status [CkRsa_ImportPrivateKeyObj $key]
Introduced in version 9.5.0.40

Imports a private key from a private key object. The imported private key is used in methods that sign or decrypt.

Returns 1 for success, 0 for failure.

top
ImportPublicKey
# xmlKey is a string
set status [CkRsa_ImportPublicKey $xmlKey]

Imports a public key from XML format. After successful import, the public key can be used to encrypt or decrypt.

Note: Importing a public key overwrites the key that is currently contained in this object - even if it's a private key.

A public key consists of modulus and exponent using base64 representation:

<RSAPublicKey>
  <Modulus>...</Modulus>
  <Exponent>...</Exponent>
</RSAPublicKey>

Important: The Rsa object can contain either a private key or a public key, but not both. Importing a private key overwrites the existing key regardless of whether the type of key is public or private.

Returns 1 for success, 0 for failure.

top
ImportPublicKeyObj
# key is a CkPublicKey
set status [CkRsa_ImportPublicKeyObj $key]
Introduced in version 9.5.0.40

Imports a public key from a public key object. The imported public key is used in methods that encrypt data or verify signatures.

Returns 1 for success, 0 for failure.

top
OpenSslSignBd
# bd is a CkBinData
set status [CkRsa_OpenSslSignBd $bd]
Introduced in version 9.5.0.77

The Chilkat RSA functions having names beginning with "OpenSsl" are provided to duplicate OpenSSL's rsautl functionality, which is to directly sign raw input data using an RSA private key without performing additional steps like hashing or ASN.1 encapsulation. These functions always use PKCS#1 v1.5 padding (because rsautl always uses PKCS#1 v1.5 padding and never RSA-PSS).

The maximum number of bytes that can be signed in any of the "OpenSsl" functions depends on the size of the RSA key. It is equal to the Key Size in Bytes - 11. Thus for a 2048-bit key, the maximum data size = 256 - 11 = 245 bytes.

The bytes to be signed are passed in bd. If successful, the contents of bd are replaced with the RSA signature.

Returns 1 for success, 0 for failure.

top
OpenSslSignBytes
# data is a CkByteData
# outBytes is a CkByteData (output)
set status [CkRsa_OpenSslSignBytes $data $outData]

The Chilkat RSA functions having names beginning with "OpenSsl" are provided to duplicate OpenSSL's rsautl functionality, which is to directly sign raw input data using an RSA private key without performing additional steps like hashing or ASN.1 encapsulation. These functions always use PKCS#1 v1.5 padding (because rsautl always uses PKCS#1 v1.5 padding and never RSA-PSS).

The maximum number of bytes that can be signed in any of the "OpenSsl" functions depends on the size of the RSA key. It is equal to the Key Size in Bytes - 11. Thus for a 2048-bit key, the maximum data size = 256 - 11 = 245 bytes.

The bytes to be signed are passed in data. The binary RSA signature is returned.

Returns 1 for success, 0 for failure.

top
OpenSslSignBytesENC
# data is a CkByteData
# outStr is a CkString (output)
set status [CkRsa_OpenSslSignBytesENC $data $outStr]
set retStr [CkRsa_openSslSignBytesENC $myRsa $data]

The Chilkat RSA functions having names beginning with "OpenSsl" are provided to duplicate OpenSSL's rsautl functionality, which is to directly sign raw input data using an RSA private key without performing additional steps like hashing or ASN.1 encapsulation. These functions always use PKCS#1 v1.5 padding (because rsautl always uses PKCS#1 v1.5 padding and never RSA-PSS).

The maximum number of bytes that can be signed in any of the "OpenSsl" functions depends on the size of the RSA key. It is equal to the Key Size in Bytes - 11. Thus for a 2048-bit key, the maximum data size = 256 - 11 = 245 bytes.

The bytes to be signed are passed in data. Returns the signature encoded based on the EncodingMode property.

Returns 1 for success, 0 for failure.

top
OpenSslSignString
# str is a string
# outBytes is a CkByteData (output)
set status [CkRsa_OpenSslSignString $str $outData]

The Chilkat RSA functions having names beginning with "OpenSsl" are provided to duplicate OpenSSL's rsautl functionality, which is to directly sign raw input data using an RSA private key without performing additional steps like hashing or ASN.1 encapsulation. These functions always use PKCS#1 v1.5 padding (because rsautl always uses PKCS#1 v1.5 padding and never RSA-PSS).

The maximum number of bytes that can be signed in any of the "OpenSsl" functions depends on the size of the RSA key. It is equal to the Key Size in Bytes - 11. Thus for a 2048-bit key, the maximum data size = 256 - 11 = 245 bytes.

The string to be signed is passed in str. Returns the binary signature.

Returns 1 for success, 0 for failure.

top
OpenSslSignStringENC
# str is a string
# outStr is a CkString (output)
set status [CkRsa_OpenSslSignStringENC $str $outStr]
set retStr [CkRsa_openSslSignStringENC $myRsa $str]

The Chilkat RSA functions having names beginning with "OpenSsl" are provided to duplicate OpenSSL's rsautl functionality, which is to directly sign raw input data using an RSA private key without performing additional steps like hashing or ASN.1 encapsulation. These functions always use PKCS#1 v1.5 padding (because rsautl always uses PKCS#1 v1.5 padding and never RSA-PSS).

The maximum number of bytes that can be signed in any of the "OpenSsl" functions depends on the size of the RSA key. It is equal to the Key Size in Bytes - 11. Thus for a 2048-bit key, the maximum data size = 256 - 11 = 245 bytes.

The string to be signed is passed in str. Returns the signature encoded based on the EncodingMode property.

Returns 1 for success, 0 for failure.

top
OpenSslVerifyBd
# bd is a CkBinData
set status [CkRsa_OpenSslVerifyBd $bd]
Introduced in version 9.5.0.77

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. On input, the bd contains the RSA signature that embeds the original data. If successful (i.e. the signature was verified), then the bd is transformed to contain just the original data.

Returns 1 for success, 0 for failure.

top
OpenSslVerifyBytes
# signature is a CkByteData
# outBytes is a CkByteData (output)
set status [CkRsa_OpenSslVerifyBytes $signature $outData]

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data consists of the raw signature bytes and returns the original bytes.

Returns 1 for success, 0 for failure.

top
OpenSslVerifyBytesENC
# str is a string
# outBytes is a CkByteData (output)
set status [CkRsa_OpenSslVerifyBytesENC $str $outData]

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data is a signature string encoded according to the EncodingMode property (base64, hex, etc.). Returns the original bytes.

Returns 1 for success, 0 for failure.

top
OpenSslVerifyString
# data is a CkByteData
# outStr is a CkString (output)
set status [CkRsa_OpenSslVerifyString $data $outStr]
set retStr [CkRsa_openSslVerifyString $myRsa $data]

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data consists of the raw signature bytes and returns the original string.

Returns 1 for success, 0 for failure.

top
OpenSslVerifyStringENC
# str is a string
# outStr is a CkString (output)
set status [CkRsa_OpenSslVerifyStringENC $str $outStr]
set retStr [CkRsa_openSslVerifyStringENC $myRsa $str]

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data is a signature string encoded according to the EncodingMode property (base64, hex, etc.). Returns the original string.

Returns 1 for success, 0 for failure.

top
SetX509Cert
# cert is a CkCert
# usePrivateKey is a boolean
set status [CkRsa_SetX509Cert $cert $usePrivateKey]
Introduced in version 9.5.0.73

Provides the private or public key indirectly through a certificate. This method is used when the private key is inaccessible, such as when stored on a smart card, USB token, in the Windows registry (marked as non-exportable), or in the Apple Keychain.

Returns 1 for success, 0 for failure.

top
SignBd
# bdData is a CkBinData
# hashAlgorithm is a string
# bdSig is a CkBinData
set retBool [CkRsa_SignBd $bdData $hashAlgorithm $bdSig]
Introduced in version 9.5.0.77

Generates an RSA digital signature by first hashing the contents of bdData with the hash algorithm specified by hashAlgorithm, which can be "sha256", "sha384", "sha512", or "sha1". The resulting signature is written to bdSig.

Note: It is important to be aware of endianness. Make sure the LittleEndian property is set according to your specific needs.

top
SignBytes
# binaryData is a CkByteData
# hashAlgorithm is a string
# outData is a CkByteData (output)
set status [CkRsa_SignBytes $binaryData $hashAlgorithm $outData]

Generates an RSA digital signature by first hashing the contents of binaryData with the hash algorithm specified by hashAlgorithm, which can be "sha256", "sha384", "sha512", or "sha1". The function returns the binary signature.

Note: It is important to be aware of endianness. Make sure the LittleEndian property is set according to your specific needs.

Returns 1 for success, 0 for failure.

top
SignBytesENC
# binaryData is a CkByteData
# hashAlgorithm is a string
# outStr is a CkString (output)
set status [CkRsa_SignBytesENC $binaryData $hashAlgorithm $outStr]
set retStr [CkRsa_signBytesENC $myRsa $binaryData $hashAlgorithm]

Generates an RSA digital signature by first hashing the bytes passed in binaryData with the hash algorithm specified by hashAlgorithm, which can be "sha256", "sha384", "sha512", or "sha1". Returns the signature encoded based on the EncodingMode property.

Returns 1 for success, 0 for failure.

top
SignHash
# hashBytes is a CkByteData
# hashAlg is a string
# outBytes is a CkByteData (output)
set status [CkRsa_SignHash $hashBytes $hashAlg $outData]

This function creates an RSA digital signature by signing the hash provided in hashBytes. hashAlg specifies the hash algorithm, which can be "sha256", "sha384", "sha512", or "sha1". The function returns the signature in binary format.

Returns 1 for success, 0 for failure.

top
SignHashENC
# encodedHash is a string
# hashAlg is a string
# outStr is a CkString (output)
set status [CkRsa_SignHashENC $encodedHash $hashAlg $outStr]
set retStr [CkRsa_signHashENC $myRsa $encodedHash $hashAlg]

This function creates an RSA digital signature for the hash provided in encodedHash, which should be encoded according to the EncodingMode setting (e.g., base64 if EncodingMode = "base64"). hashAlg specifies the hash algorithm and can be "sha256", "sha384", "sha512", or "sha1". The function returns the signature encoded as specified by EncodingMode.

Returns 1 for success, 0 for failure.

More Information and Examples
top
SignString
# strToBeHashed is a string
# hashAlgorithm is a string
# outData is a CkByteData (output)
set status [CkRsa_SignString $strToBeHashed $hashAlgorithm $outData]

Generates an RSA digital signature by first hashing strToBeHashed with the hash algorithm specified by hashAlgorithm, which can be "sha256", "sha384", "sha512", or "sha1". The function returns the binary signature.

Note: It is recommended to set the Charset property equal to "utf-8" before signing strings.

Note: It is important to be aware of endianness. Make sure the LittleEndian property is set according to your specific needs.

Returns 1 for success, 0 for failure.

top
SignStringENC
# strToBeHashed is a string
# hashAlgorithm is a string
# outStr is a CkString (output)
set status [CkRsa_SignStringENC $strToBeHashed $hashAlgorithm $outStr]
set retStr [CkRsa_signStringENC $myRsa $strToBeHashed $hashAlgorithm]

Generates an RSA digital signature by first hashing strToBeHashed with the hash algorithm specified by hashAlgorithm, which can be "sha256", "sha384", "sha512", or "sha1". Returns the signature encoded based on the EncodingMode property.

Note: It is important to be aware of endianness. Make sure the LittleEndian property is set according to your specific needs.

Note: It is recommended to set the Charset property equal to "utf-8" before signing strings.

Returns 1 for success, 0 for failure.

top
SnkToXml
# filename is a string
# outStr is a CkString (output)
set status [CkRsa_SnkToXml $filename $outStr]
set retStr [CkRsa_snkToXml $myRsa $filename]

Imports a .snk file to an XML document that can be imported via the ImportPrivateKey method.

Returns 1 for success, 0 for failure.

More Information and Examples
top
VerifyBd
# bdData is a CkBinData
# hashAlgorithm is a string
# bdSig is a CkBinData
set status [CkRsa_VerifyBd $bdData $hashAlgorithm $bdSig]
Introduced in version 9.5.0.77

Verifies the RSA signature passed in bdSig against the original data passed in bdData. The original data passed in bdData is hashed using the hash algorithm passed in hashAlgorithm (such as "sha256", "sha384", "sha512", or "sha1"). Returns 1 if the signature is validated, and 0 if not.

Note: Knowing the exact hash algorithm used to create the signature is not required. If the signature is not validated using the hash algorithm specified in hashAlgorithm, Chilkat will automatically try validating using the other supported algorithms and return success if any validate.

Returns 1 for success, 0 for failure.

top
VerifyBytes
# originalData is a CkByteData
# hashAlgorithm is a string
# signatureBytes is a CkByteData
set status [CkRsa_VerifyBytes $originalData $hashAlgorithm $signatureBytes]

Verifies the RSA signature passed in signatureBytes against the original data passed in originalData. The original data passed in originalData is hashed using the hash algorithm passed in hashAlgorithm (such as "sha256", "sha384", "sha512", or "sha1"). Returns 1 if the signature is validated, and 0 if not.

Note: Knowing the exact hash algorithm used to create the signature is not required. If the signature is not validated using the hash algorithm specified in hashAlgorithm, Chilkat will automatically try validating using the other supported algorithms and return success if any validate.

Returns 1 for success, 0 for failure.

top
VerifyBytesENC
# originalData is a CkByteData
# hashAlgorithm is a string
# encodedSig is a string
set status [CkRsa_VerifyBytesENC $originalData $hashAlgorithm $encodedSig]

Verifies the encoded RSA signature passed in encodedSig against the original data passed in originalData. The original data passed in originalData is hashed using the hash algorithm passed in hashAlgorithm (such as "sha256", "sha384", "sha512", or "sha1"). Returns 1 if the signature is validated, and 0 if not.

The signature passed in encodedSig should be encoded according to the EncodingMode property (e.g., base64 if EncodingMode = "base64")

Note: Knowing the exact hash algorithm used to create the signature is not required. If the signature is not validated using the hash algorithm specified in hashAlgorithm, Chilkat will automatically try validating using the other supported algorithms and return success if any validate.

Returns 1 for success, 0 for failure.

top
VerifyHash
# hashBytes is a CkByteData
# hashAlg is a string
# sigBytes is a CkByteData
set status [CkRsa_VerifyHash $hashBytes $hashAlg $sigBytes]

Validates an RSA signature provided in sigBytes against the hash of the original data in hashBytes. Returns 1 if validation is successful, otherwise returns 0. hashAlg specifies the hash algorithm used for hashBytes, such as "sha256", "sha384", "sha512", or "sha1". Ensure the hash's size (e.g., 32 bytes for sha256, 48 bytes for sha384, 64 bytes for sha512, 20 bytes for sha1) matches that of hashBytes.

Returns 1 for success, 0 for failure.

top
VerifyHashENC
# encodedHash is a string
# hashAlg is a string
# encodedSig is a string
set status [CkRsa_VerifyHashENC $encodedHash $hashAlg $encodedSig]

Validates an RSA signature provided in encodedSig against the hash of the original data in encodedHash. Returns 1 if validation is successful, otherwise returns 0. hashAlg specifies the hash algorithm used for encodedHash, such as "sha256", "sha384", "sha512", or "sha1". Ensure the hash's size (e.g., 32 bytes for sha256, 48 bytes for sha384, 64 bytes for sha512, 20 bytes for sha1) matches that of encodedHash.

Both encodedHash and encodedSig should be encoded according to the EncodingMode property (e.g., base64 if EncodingMode = "base64")

Returns 1 for success, 0 for failure.

top
VerifyString
# originalString is a string
# hashAlgorithm is a string
# binarySig is a CkByteData
set status [CkRsa_VerifyString $originalString $hashAlgorithm $binarySig]

Verifies the RSA signature passed in binarySig against the original data passed in originalString. The original data passed in originalString is hashed using the hash algorithm passed in hashAlgorithm (such as "sha256", "sha384", "sha512", or "sha1"). Returns 1 if the signature is validated, and 0 if not.

Note: Knowing the exact hash algorithm used to create the signature is not required. If the signature is not validated using the hash algorithm specified in hashAlgorithm, Chilkat will automatically try validating using the other supported algorithms and return success if any validate.

Returns 1 for success, 0 for failure.

top
VerifyStringENC
# originalString is a string
# hashAlgorithm is a string
# encodedSig is a string
set status [CkRsa_VerifyStringENC $originalString $hashAlgorithm $encodedSig]

Verifies the encoded RSA signature passed in encodedSig against the original data passed in originalString. The original data passed in originalString is hashed using the hash algorithm passed in hashAlgorithm (such as "sha256", "sha384", "sha512", or "sha1"). Returns 1 if the signature is validated, and 0 if not.

The signature passed in encodedSig should be encoded according to the EncodingMode property (e.g., base64 if EncodingMode = "base64")

Note: Knowing the exact hash algorithm used to create the signature is not required. If the signature is not validated using the hash algorithm specified in hashAlgorithm, Chilkat will automatically try validating using the other supported algorithms and return success if any validate.

Returns 1 for success, 0 for failure.

top