Rsa Unicode C Reference Documentation
Rsa
Current Version: 10.1.0
RSA encryption component / library. Encrypt and decrypt byte arrays and strings. Generate public/private key pairs from 384 to 4096 bits in length. Import and export RSA keys. Import keys from SNK files. Input/output in raw binary, base64, hex encoding, quoted-printable, URL-encoding, etc.
Create/Dispose
HCkRsaW instance = CkRsaW_Create(); // ... CkRsaW_Dispose(instance);
Creates an instance of the HCkRsaW object and returns a handle ("void *" pointer). The handle is passed in the 1st argument for the functions listed on this page.
Objects created by calling CkRsaW_Create must be freed by calling this method. A memory leak occurs if a handle is not disposed by calling this function. Also, any handle returned by a Chilkat "C" function must also be freed by the application by calling the appropriate Dispose method, such as CkRsaW_Dispose.
Properties
Charset
void CkRsaW_putCharset(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_charset(HCkRsaW cHandle);
This property only applies when encrypting, decrypting, signing, or verifying signatures for strings. When encrypting strings, the input string is first converted to this charset before encrypting.
When decrypting, the decrypted data is interpreted as a string with this charset encoding and converted to the appropriate return. For example, ActiveX's returning strings always return Unicode (2 bytes/char). Java strings are utf-8. Chilkat C++ strings are ANSI or utf-8. .NET strings are Unicode.
The default value of this property is the ANSI charset of the local computer.
When signing string data, the input string is first converted to this charset before being hashed and signed. When verifying the signature for string data, the input string is first converted to this charset before the verification process begins.
DebugLogFilePath
void CkRsaW_putDebugLogFilePath(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_debugLogFilePath(HCkRsaW cHandle);
If set to a file path, causes each Chilkat method or property call to automatically append it's LastErrorText to the specified log file. The information is appended such that if a hang or crash occurs, it is possible to see the context in which the problem occurred, as well as a history of all Chilkat calls up to the point of the problem. The VerboseLogging property can be set to provide more detailed information.
This property is typically used for debugging the rare cases where a Chilkat method call hangs or generates an exception that halts program execution (i.e. crashes). A hang or crash should generally never happen. The typical causes of a hang are:
- a timeout related property was set to 0 to explicitly indicate that an infinite timeout is desired,
- the hang is actually a hang within an event callback (i.e. it is a hang within the application code), or
- there is an internal problem (bug) in the Chilkat code that causes the hang.
EncodingMode
void CkRsaW_putEncodingMode(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_encodingMode(HCkRsaW cHandle);
Encoding mode to be used in methods ending in "ENC", such as EncryptStringENC. Valid EncodingModes are "base64", "hex", "url", or "quoted-printable" (or "qp"). Encryption methods ending in "ENC" will return encrypted data as a string encoded according to this property's value. Decryption methods ending in "ENC" accept an encoded string as specified by this property. The string is first decoded and then decrypted. The default value is "base64".
This property also applies to the "ENC" methods for creating and verifying digital signatures.
LastErrorHtml
const wchar_t *CkRsaW_lastErrorHtml(HCkRsaW cHandle);
Provides information in HTML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.
topLastErrorText
const wchar_t *CkRsaW_lastErrorText(HCkRsaW cHandle);
Provides information in plain-text format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.
LastErrorXml
const wchar_t *CkRsaW_lastErrorXml(HCkRsaW cHandle);
Provides information in XML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.
topLastMethodSuccess
void CkRsaW_putLastMethodSuccess(HCkRsaW cHandle, BOOL newVal);
Indicate whether the last method call succeeded or failed. A value of TRUE indicates success, a value of FALSE indicates failure. This property is automatically set for method calls. It is not modified by property accesses. The property is automatically set to indicate success for the following types of method calls:
- Any method that returns a string.
- Any method returning a Chilkat object, binary bytes, or a date/time.
- Any method returning a standard boolean status value where success = TRUE and failure = FALSE.
- Any method returning an integer where failure is defined by a return value less than zero.
Note: Methods that do not fit the above requirements will always set this property equal to TRUE. For example, a method that returns no value (such as a "void" in C++) will technically always succeed.
topLittleEndian
void CkRsaW_putLittleEndian(HCkRsaW cHandle, BOOL newVal);
The default value is FALSE, which means that signatures and encrypted output will be created using the big endian byte ordering. A value of TRUE will produce little-endian output, which is what Microsoft's Crypto API produces.
Important: Prior to v9.5.0.49, this property behaved the opposite as it should for encryption. When updating from an older version of Chilkat to v9.5.0.49 or greater, the following change is required:
- If the application did NOT explicity set the LittleEndian property, then no change is required for encryption/decryption. If signatures were being created or verified, then explicitly set this property to TRUE.
- If the application explicitly set this property, then reverse the setting ONLY if doing encryption/decryption. No changes are required if doing signature creation/verification.
NoUnpad
void CkRsaW_putNoUnpad(HCkRsaW cHandle, BOOL newVal);
If TRUE, skips unpadding when decrypting. The default is FALSE. This property value is typically left unchanged.
topNumBits
The number of bits of the key generated or imported into this RSA encryption object. Keys ranging in size from 384 bits to 4096 bits can be generated by calling GenerateKey. A public or private key may be imported by calling ImportPublicKey or ImportPrivateKey. A key must be available either via GenerateKey or import before any of the encrypt/decrypt methods may be called.
topOaepHash
void CkRsaW_putOaepHash(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_oaepHash(HCkRsaW cHandle);
Selects the hash algorithm for use within OAEP padding. The valid choices are "sha1", "sha256", "sha384", "sha512", "md2", "md5", "haval", "ripemd128", "ripemd160","ripemd256", or "ripemd320". The default is "sha1".
topOaepLabel
void CkRsaW_putOaepLabel(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_oaepLabel(HCkRsaW cHandle);
The optional RSA encryption OAEP label. This property is the hex representation of the OAEP label bytes to be used when encrypting with OAEP padding. In virtually all cases, it is left empty (the label is 0 bytes in length). Only set this property if you have a specific need. Otherwise, leave it empty.
topOaepMgfHash
void CkRsaW_putOaepMgfHash(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_oaepMgfHash(HCkRsaW cHandle);
Selects the MGF (mask generation) hash algorithm for use within OAEP padding. The valid choices are "sha1", "sha256", "sha384", "sha512", "md2", "md5", "haval", "ripemd128", "ripemd160","ripemd256", or "ripemd320". The default is "sha1".
topOaepPadding
void CkRsaW_putOaepPadding(HCkRsaW cHandle, BOOL newVal);
Controls whether Optimal Asymmetric Encryption Padding (OAEP) is used for the padding scheme (for encrypting/decrypting). If set to FALSE, PKCS1 v1.5 padding is used. If set to TRUE, PKCS1 v2.0 (OAEP) padding is used.
Important: The OAEP padding algorithm uses randomly generated bytes. Therefore, the RSA result will be different each time, even if all of the other inputs are identical. For example, if you RSA encrypt or sign the same data using the same key 100 times, the output will appear different each time, but they are all valid.
When creating digital signatures, this property controls whether RSA-PSS or PKCS1 v1.5 is used. If TRUE, then the RSA-PSS signature scheme is used. The default value of this property is FALSE.
PssSaltLen
void CkRsaW_putPssSaltLen(HCkRsaW cHandle, int newVal);
Selects the PSS salt length when RSASSA-PSS padding is selected for signatures. The default value is -1 to indicate that the length of the hash function should be used. For example, if the hash function is SHA256, then the PSS salt length will be 32 bytes. Can be optionally set to a value such as 20 if a specific salt length is required. This property should normally remain at the default value.
topUncommonOptions
void CkRsaW_putUncommonOptions(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_uncommonOptions(HCkRsaW cHandle);
This is a catch-all property to be used for uncommon needs. This property defaults to the empty string and should typically remain empty.
topVerboseLogging
void CkRsaW_putVerboseLogging(HCkRsaW cHandle, BOOL newVal);
If set to TRUE, then the contents of LastErrorText (or LastErrorXml, or LastErrorHtml) may contain more verbose information. The default value is FALSE. Verbose logging should only be used for debugging. The potentially large quantity of logged information may adversely affect peformance.
topVersion
const wchar_t *CkRsaW_version(HCkRsaW cHandle);
Methods
DecryptBd
RSA decrypts the contents of bd. usePrivateKey should be set to TRUE if the private key is to be used for decrypting. Otherwise it should be set to FALSE if the public key is to be used for decrypting.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.
Returns TRUE for success, FALSE for failure.
topDecryptBytes
Decrypts byte data using the RSA encryption algorithm. usePrivateKey should be set to TRUE if the private key is to be used for decrypting. Otherwise it should be set to FALSE if the public key is to be used for decrypting.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.
Returns TRUE for success, FALSE for failure.
topDecryptBytesENC
Same as DecryptBytes, except the input is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.
Returns TRUE for success, FALSE for failure.
topDecryptString
const wchar_t *CkRsaW_decryptString(HCkRsaW cHandle, HCkByteData encBytes, BOOL usePrivateKey);
Decrypts encrypted string data and returns an unencrypted string. usePrivateKey should be set to TRUE if the private key is to be used for decrypting. Otherwise it should be set to FALSE if the public key is to be used. The Charset property controls how the component interprets the decrypted string. Depending on the programming language, strings are returned to the application as Unicode, utf-8, or ANSI. Internal to DecryptString, the decrypted string is automatically converted from the charset specified by the Charset property to the encoding required by the calling programming language.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.
Returns TRUE for success, FALSE for failure.
topDecryptStringENC
const wchar_t *CkRsaW_decryptStringENC(HCkRsaW cHandle, const wchar_t *str, BOOL usePrivateKey);
Same as DecryptString, except the input is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.
Returns TRUE for success, FALSE for failure.
EncryptBd
RSA encrypts the contents of bd. usePrivateKey should be set to TRUE if the private key is to be used for encrypting. Otherwise it should be set to FALSE if the public key is to be used for encrypting.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.
Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.
Returns TRUE for success, FALSE for failure.
topEncryptBytes
Encrypts byte data using the RSA encryption algorithm. usePrivateKey should be set to TRUE if the private key is to be used for encrypting. Otherwise it should be set to FALSE if the public key is to be used for encrypting.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.
Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.
Returns TRUE for success, FALSE for failure.
topEncryptBytesENC
const wchar_t *CkRsaW_encryptBytesENC(HCkRsaW cHandle, HCkByteData data, BOOL bUsePrivateKey);
Same as EncryptBytes, except the output is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.
Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.
Returns TRUE for success, FALSE for failure.
EncryptString
Encrypts a string using the RSA encryption algorithm. usePrivateKey should be set to TRUE if the private key is to be used for encrypting. Otherwise it should be set to FALSE if the public key is to be used for encrypting. The string is first converted (if necessary) to the character encoding specified by the Charset property before encrypting. The encrypted bytes are returned.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.
Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.
Returns TRUE for success, FALSE for failure.
EncryptStringENC
const wchar_t *CkRsaW_encryptStringENC(HCkRsaW cHandle, const wchar_t *str, BOOL bUsePrivateKey);
Same as EncryptString, except the output is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.
Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.
Returns TRUE for success, FALSE for failure.
ExportPrivateKey
const wchar_t *CkRsaW_exportPrivateKey(HCkRsaW cHandle);
Exports the private-key of an RSA key pair to XML format. This is typically called after generating a new RSA key via the GenerateKey method.
Returns TRUE for success, FALSE for failure.
topExportPrivateKeyObj
Exports the private-key to a private key object. This is typically called after generating a new RSA key via the GenerateKey method. Once the private key object is obtained, it may be saved in a variety of different formats.
Returns NULL on failure
ExportPublicKey
const wchar_t *CkRsaW_exportPublicKey(HCkRsaW cHandle);
Exports the public-key of an RSA key pair to XML format. This is typically called after generating a new RSA key via the GenerateKey method.
Returns TRUE for success, FALSE for failure.
topExportPublicKeyObj
Exports the public key to a public key object. Once the public key object is obtained, it may be saved in a variety of different formats.
Returns NULL on failure
GenerateKey
Generates a new RSA public/private key pair. The number of bits can range from 512 to 8192. Typical key lengths are 1024, 2048, or 4096 bits. After successful generation, the public/private parts of the key can be exported to XML via the ExportPrivateKey and ExportPublicKey methods.
Note: Prior to version 9.5.0.49, the max key size was 4096 bits. Generating an 8192-bit RSA key takes a considerable amount of time and CPU processing power. There are no event callbacks or progress monitoring for RSA key generation. Calling this will block the thread until it returns.
Returns TRUE for success, FALSE for failure.
ImportPrivateKey
Imports a private key from XML format. After successful import, the private key can be used to encrypt or decrypt. A private key (by definition) contains both private and public parts. This is because the public key consist of modulus and exponent. The private key consists of modulus, exponent, P, Q, DP, DQ, InverseQ, and D using base64 representation:
<RSAKeyValue> <Modulus>...</Modulus> <Exponent>...</Exponent> <P>...</P> <Q>...</Q> <DP>...</DP> <DQ>...</DQ> <InverseQ>...</InverseQ> <D>...</D> </RSAKeyValue>
Important: The Rsa object can contain either a private key or a public key, but not both. Importing a private key overwrites the existing key regardless of whether the type of key is public or private.
Returns TRUE for success, FALSE for failure.
ImportPrivateKeyObj
Imports a private key from a private key object. The imported private key is used in methods that sign or decrypt.
Returns TRUE for success, FALSE for failure.
ImportPublicKey
Imports a public key from XML format. After successful import, the public key can be used to encrypt or decrypt.
Note: Importing a public key overwrites the key that is currently contained in this object - even if it's a private key.
A public key consists of modulus and exponent using base64 representation:
<RSAPublicKey> <Modulus>...</Modulus> <Exponent>...</Exponent> </RSAPublicKey>
Important: The Rsa object can contain either a private key or a public key, but not both. Importing a private key overwrites the existing key regardless of whether the type of key is public or private.
Returns TRUE for success, FALSE for failure.
ImportPublicKeyObj
Imports a public key from a public key object. The imported public key is used in methods that encrypt data or verify signatures.
Returns TRUE for success, FALSE for failure.
OpenSslSignBd
Duplicates OpenSSL's rsautl utility for creating RSA signatures. The contents of bd are signed. If successful, the result is that bd contains the RSA signature that itself contains (embeds) the original data.
Returns TRUE for success, FALSE for failure.
OpenSslSignBytes
Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data consists of binary bytes, and returns the signature bytes.
Returns TRUE for success, FALSE for failure.
OpenSslSignBytesENC
const wchar_t *CkRsaW_openSslSignBytesENC(HCkRsaW cHandle, HCkByteData data);
Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data consists of binary bytes, and returns the signature as a string encoded according to the EncodingMode property (base64, hex, etc.).
Returns TRUE for success, FALSE for failure.
topOpenSslSignString
Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data is a string, and returns the signature bytes.
Returns TRUE for success, FALSE for failure.
topOpenSslSignStringENC
const wchar_t *CkRsaW_openSslSignStringENC(HCkRsaW cHandle, const wchar_t *str);
Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data is a string, and returns the signature as a string encoded according to the EncodingMode property (base64, hex, etc.).
Returns TRUE for success, FALSE for failure.
OpenSslVerifyBd
Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. On input, the bd contains the RSA signature that embeds the original data. If successful (i.e. the signature was verified), then the bd is transformed to contain just the original data.
Returns TRUE for success, FALSE for failure.
OpenSslVerifyBytes
Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data consists of the raw signature bytes and returns the original bytes.
Returns TRUE for success, FALSE for failure.
OpenSslVerifyBytesENC
Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data is a signature string encoded according to the EncodingMode property (base64, hex, etc.). Returns the original bytes.
Returns TRUE for success, FALSE for failure.
topOpenSslVerifyString
const wchar_t *CkRsaW_openSslVerifyString(HCkRsaW cHandle, HCkByteData data);
Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data consists of the raw signature bytes and returns the original string.
Returns TRUE for success, FALSE for failure.
topOpenSslVerifyStringENC
const wchar_t *CkRsaW_openSslVerifyStringENC(HCkRsaW cHandle, const wchar_t *str);
Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data is a signature string encoded according to the EncodingMode property (base64, hex, etc.). Returns the original string.
Returns TRUE for success, FALSE for failure.
SetX509Cert
Provides the private or public key indirectly through a certificate. This method is especially useful on Windows computers where the private key is installed as non-exportable (such as on a hardware token).
Returns TRUE for success, FALSE for failure.
SignBd
Creates an RSA digital signature by hashing the contents of bdData and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The resulting signature is returned in bdSig.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)
A private key is required to create digital signatures.
SignBytes
Creates an RSA digital signature by hashing binaryData and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)
A private key is required to create a digital signature.
An error is indicated when a byte array of 0 length is returned.
Returns TRUE for success, FALSE for failure.
SignBytesENC
const wchar_t *CkRsaW_signBytesENC(HCkRsaW cHandle, HCkByteData binaryData, const wchar_t *hashAlgorithm);
Creates an RSA digital signature by hashing binaryData and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1". The digital signature is returned as an encoded string, where the encoding is specified by the EncodingMode property.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)
A private key is required to create a digital signature.
An error is indicated when null reference is returned.
Returns TRUE for success, FALSE for failure.
topSignHash
The same as the SignBytes method, except the hash to be signed is passed directly.
Returns TRUE for success, FALSE for failure.
topSignHashENC
const wchar_t *CkRsaW_signHashENC(HCkRsaW cHandle, const wchar_t *encodedHash, const wchar_t *hashAlg);
The same as SignBytesENC except the hash is passed directly.
Returns TRUE for success, FALSE for failure.
topSignString
Creates an RSA digital signature by hashing strToBeHashed and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)
A private key is required to create a digital signature.
An error is indicated when a byte array of 0 length is returned.
Returns TRUE for success, FALSE for failure.
SignStringENC
const wchar_t *CkRsaW_signStringENC(HCkRsaW cHandle, const wchar_t *strToBeHashed, const wchar_t *hashAlgorithm);
Creates an RSA digital signature by hashing strToBeHashed and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1". The digital signature is returned as an encoded string, where the encoding is specified by the EncodingMode property.
Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)
A private key is required to create a digital signature.
An error is indicated when null reference is returned.
Returns TRUE for success, FALSE for failure.
SnkToXml
const wchar_t *CkRsaW_snkToXml(HCkRsaW cHandle, const wchar_t *filename);
Imports a .snk file to an XML document that can be imported via the ImportPrivateKey method.
Returns TRUE for success, FALSE for failure.
topVerifyBd
Verifies an RSA digital signature. Returns TRUE if the signature in bdSig is valid an confirms that the original data in bdData has not been modified. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512".
Returns TRUE for success, FALSE for failure.
VerifyBytes
Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalData. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".
topVerifyBytesENC
Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalData. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".
The encodedSig is a digital signature encoded according to the EncodingMode property (i.e. base64, hex, etc.).
topVerifyHash
The same as VerifyBytes except the hash of the original data is passed directly.
topVerifyHashENC
The same as VerifyBytesENC except the hash of the original data is passed directly.
VerifyPrivateKey
Returns TRUE if the XML contains a valid RSA private key. Otherwise returns FALSE.
Returns TRUE for success, FALSE for failure.
topVerifyString
Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalString. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".
topVerifyStringENC
Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalString. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".
The encodedSig is a digital signature encoded according to the EncodingMode property (i.e. base64, hex, etc.).