Rsa Unicode C Reference Documentation

Rsa

Current Version: 9.5.0.97

RSA encryption component / library. Encrypt and decrypt byte arrays and strings. Generate public/private key pairs from 384 to 4096 bits in length. Import and export RSA keys. Import keys from SNK files. Input/output in raw binary, base64, hex encoding, quoted-printable, URL-encoding, etc.

Create/Dispose

HCkRsaW instance = CkRsaW_Create();
// ...
CkRsaW_Dispose(instance);
HCkRsaW CkRsaW_Create(void);

Creates an instance of the HCkRsaW object and returns a handle ("void *" pointer). The handle is passed in the 1st argument for the functions listed on this page.

void CkRsaW_Dispose(HCkRsaW handle);

Objects created by calling CkRsaW_Create must be freed by calling this method. A memory leak occurs if a handle is not disposed by calling this function. Also, any handle returned by a Chilkat "C" function must also be freed by the application by calling the appropriate Dispose method, such as CkRsaW_Dispose.

Properties

Charset
void CkRsaW_getCharset(HCkRsaW cHandle, HCkString retval);
void CkRsaW_putCharset(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_charset(HCkRsaW cHandle);

This property only applies when encrypting, decrypting, signing, or verifying signatures for strings. When encrypting strings, the input string is first converted to this charset before encrypting.

When decrypting, the decrypted data is interpreted as a string with this charset encoding and converted to the appropriate return. For example, ActiveX's returning strings always return Unicode (2 bytes/char). Java strings are utf-8. Chilkat C++ strings are ANSI or utf-8. .NET strings are Unicode.

The default value of this property is the ANSI charset of the local computer.

When signing string data, the input string is first converted to this charset before being hashed and signed. When verifying the signature for string data, the input string is first converted to this charset before the verification process begins.

top
DebugLogFilePath
void CkRsaW_getDebugLogFilePath(HCkRsaW cHandle, HCkString retval);
void CkRsaW_putDebugLogFilePath(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_debugLogFilePath(HCkRsaW cHandle);

If set to a file path, causes each Chilkat method or property call to automatically append it's LastErrorText to the specified log file. The information is appended such that if a hang or crash occurs, it is possible to see the context in which the problem occurred, as well as a history of all Chilkat calls up to the point of the problem. The VerboseLogging property can be set to provide more detailed information.

This property is typically used for debugging the rare cases where a Chilkat method call hangs or generates an exception that halts program execution (i.e. crashes). A hang or crash should generally never happen. The typical causes of a hang are:

  1. a timeout related property was set to 0 to explicitly indicate that an infinite timeout is desired,
  2. the hang is actually a hang within an event callback (i.e. it is a hang within the application code), or
  3. there is an internal problem (bug) in the Chilkat code that causes the hang.

top
EncodingMode
void CkRsaW_getEncodingMode(HCkRsaW cHandle, HCkString retval);
void CkRsaW_putEncodingMode(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_encodingMode(HCkRsaW cHandle);

Encoding mode to be used in methods ending in "ENC", such as EncryptStringENC. Valid EncodingModes are "base64", "hex", "url", or "quoted-printable" (or "qp"). Encryption methods ending in "ENC" will return encrypted data as a string encoded according to this property's value. Decryption methods ending in "ENC" accept an encoded string as specified by this property. The string is first decoded and then decrypted. The default value is "base64".

This property also applies to the "ENC" methods for creating and verifying digital signatures.

More Information and Examples
top
LastErrorHtml
void CkRsaW_getLastErrorHtml(HCkRsaW cHandle, HCkString retval);
const wchar_t *CkRsaW_lastErrorHtml(HCkRsaW cHandle);

Provides information in HTML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastErrorText
void CkRsaW_getLastErrorText(HCkRsaW cHandle, HCkString retval);
const wchar_t *CkRsaW_lastErrorText(HCkRsaW cHandle);

Provides information in plain-text format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastErrorXml
void CkRsaW_getLastErrorXml(HCkRsaW cHandle, HCkString retval);
const wchar_t *CkRsaW_lastErrorXml(HCkRsaW cHandle);

Provides information in XML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastMethodSuccess
BOOL CkRsaW_getLastMethodSuccess(HCkRsaW cHandle);
void CkRsaW_putLastMethodSuccess(HCkRsaW cHandle, BOOL newVal);

Indicate whether the last method call succeeded or failed. A value of TRUE indicates success, a value of FALSE indicates failure. This property is automatically set for method calls. It is not modified by property accesses. The property is automatically set to indicate success for the following types of method calls:

  • Any method that returns a string.
  • Any method returning a Chilkat object, binary bytes, or a date/time.
  • Any method returning a standard boolean status value where success = TRUE and failure = FALSE.
  • Any method returning an integer where failure is defined by a return value less than zero.

Note: Methods that do not fit the above requirements will always set this property equal to TRUE. For example, a method that returns no value (such as a "void" in C++) will technically always succeed.

top
LittleEndian
BOOL CkRsaW_getLittleEndian(HCkRsaW cHandle);
void CkRsaW_putLittleEndian(HCkRsaW cHandle, BOOL newVal);

The default value is FALSE, which means that signatures and encrypted output will be created using the big endian byte ordering. A value of TRUE will produce little-endian output, which is what Microsoft's Crypto API produces.

Important: Prior to v9.5.0.49, this property behaved the opposite as it should for encryption. When updating from an older version of Chilkat to v9.5.0.49 or greater, the following change is required:

  • If the application did NOT explicity set the LittleEndian property, then no change is required for encryption/decryption. If signatures were being created or verified, then explicitly set this property to TRUE.
  • If the application explicitly set this property, then reverse the setting ONLY if doing encryption/decryption. No changes are required if doing signature creation/verification.

top
NoUnpad
BOOL CkRsaW_getNoUnpad(HCkRsaW cHandle);
void CkRsaW_putNoUnpad(HCkRsaW cHandle, BOOL newVal);

If TRUE, skips unpadding when decrypting. The default is FALSE. This property value is typically left unchanged.

top
NumBits
int CkRsaW_getNumBits(HCkRsaW cHandle);

The number of bits of the key generated or imported into this RSA encryption object. Keys ranging in size from 384 bits to 4096 bits can be generated by calling GenerateKey. A public or private key may be imported by calling ImportPublicKey or ImportPrivateKey. A key must be available either via GenerateKey or import before any of the encrypt/decrypt methods may be called.

top
OaepHash
void CkRsaW_getOaepHash(HCkRsaW cHandle, HCkString retval);
void CkRsaW_putOaepHash(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_oaepHash(HCkRsaW cHandle);
Introduced in version 9.5.0.48

Selects the hash algorithm for use within OAEP padding. The valid choices are "sha1", "sha256", "sha384", "sha512", "md2", "md5", "haval", "ripemd128", "ripemd160","ripemd256", or "ripemd320". The default is "sha1".

top
OaepLabel
void CkRsaW_getOaepLabel(HCkRsaW cHandle, HCkString retval);
void CkRsaW_putOaepLabel(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_oaepLabel(HCkRsaW cHandle);
Introduced in version 9.5.0.95

The optional RSA encryption OAEP label. This property is the hex representation of the OAEP label bytes to be used when encrypting with OAEP padding. In virtually all cases, it is left empty (the label is 0 bytes in length). Only set this property if you have a specific need. Otherwise, leave it empty.

top
OaepMgfHash
void CkRsaW_getOaepMgfHash(HCkRsaW cHandle, HCkString retval);
void CkRsaW_putOaepMgfHash(HCkRsaW cHandle, const wchar_t *newVal);
const wchar_t *CkRsaW_oaepMgfHash(HCkRsaW cHandle);
Introduced in version 9.5.0.71

Selects the MGF (mask generation) hash algorithm for use within OAEP padding. The valid choices are "sha1", "sha256", "sha384", "sha512", "md2", "md5", "haval", "ripemd128", "ripemd160","ripemd256", or "ripemd320". The default is "sha1".

top
OaepPadding
BOOL CkRsaW_getOaepPadding(HCkRsaW cHandle);
void CkRsaW_putOaepPadding(HCkRsaW cHandle, BOOL newVal);

Controls whether Optimal Asymmetric Encryption Padding (OAEP) is used for the padding scheme (for encrypting/decrypting). If set to FALSE, PKCS1 v1.5 padding is used. If set to TRUE, PKCS1 v2.0 (OAEP) padding is used.

Important: The OAEP padding algorithm uses randomly generated bytes. Therefore, the RSA result will be different each time, even if all of the other inputs are identical. For example, if you RSA encrypt or sign the same data using the same key 100 times, the output will appear different each time, but they are all valid.

When creating digital signatures, this property controls whether RSA-PSS or PKCS1 v1.5 is used. If TRUE, then the RSA-PSS signature scheme is used. The default value of this property is FALSE.

More Information and Examples
top
PssSaltLen
int CkRsaW_getPssSaltLen(HCkRsaW cHandle);
void CkRsaW_putPssSaltLen(HCkRsaW cHandle, int newVal);
Introduced in version 9.5.0.80

Selects the PSS salt length when RSASSA-PSS padding is selected for signatures. The default value is -1 to indicate that the length of the hash function should be used. For example, if the hash function is SHA256, then the PSS salt length will be 32 bytes. Can be optionally set to a value such as 20 if a specific salt length is required. This property should normally remain at the default value.

top
VerboseLogging
BOOL CkRsaW_getVerboseLogging(HCkRsaW cHandle);
void CkRsaW_putVerboseLogging(HCkRsaW cHandle, BOOL newVal);

If set to TRUE, then the contents of LastErrorText (or LastErrorXml, or LastErrorHtml) may contain more verbose information. The default value is FALSE. Verbose logging should only be used for debugging. The potentially large quantity of logged information may adversely affect peformance.

top
Version
void CkRsaW_getVersion(HCkRsaW cHandle, HCkString retval);
const wchar_t *CkRsaW_version(HCkRsaW cHandle);

Version of the component/library, such as "9.5.0.94"

More Information and Examples
top

Methods

DecryptBd
BOOL CkRsaW_DecryptBd(HCkRsaW cHandle, HCkBinDataW bd, BOOL usePrivateKey);
Introduced in version 9.5.0.76

RSA decrypts the contents of bd. usePrivateKey should be set to TRUE if the private key is to be used for decrypting. Otherwise it should be set to FALSE if the public key is to be used for decrypting.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Returns TRUE for success, FALSE for failure.

top
DecryptBytes
BOOL CkRsaW_DecryptBytes(HCkRsaW cHandle, HCkByteData inData, BOOL usePrivateKey, const unsigned char * outData);

Decrypts byte data using the RSA encryption algorithm. usePrivateKey should be set to TRUE if the private key is to be used for decrypting. Otherwise it should be set to FALSE if the public key is to be used for decrypting.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Returns TRUE for success, FALSE for failure.

top
DecryptBytesENC
BOOL CkRsaW_DecryptBytesENC(HCkRsaW cHandle, const wchar_t *str, BOOL bUsePrivateKey, const unsigned char * outData);

Same as DecryptBytes, except the input is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Returns TRUE for success, FALSE for failure.

top
DecryptString
BOOL CkRsaW_DecryptString(HCkRsaW cHandle, HCkByteData binarySig, BOOL usePrivateKey, const wchar_t *outStr);
const wchar_t *CkRsaW_decryptString(HCkRsaW cHandle, HCkByteData binarySig, BOOL usePrivateKey);

Decrypts encrypted string data and returns an unencrypted string. usePrivateKey should be set to TRUE if the private key is to be used for decrypting. Otherwise it should be set to FALSE if the public key is to be used. The Charset property controls how the component interprets the decrypted string. Depending on the programming language, strings are returned to the application as Unicode, utf-8, or ANSI. Internal to DecryptString, the decrypted string is automatically converted from the charset specified by the Charset property to the encoding required by the calling programming language.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Returns TRUE for success, FALSE for failure.

top
DecryptStringENC
BOOL CkRsaW_DecryptStringENC(HCkRsaW cHandle, const wchar_t *encodedSig, BOOL usePrivateKey, const wchar_t *outStr);
const wchar_t *CkRsaW_decryptStringENC(HCkRsaW cHandle, const wchar_t *encodedSig, BOOL usePrivateKey);

Same as DecryptString, except the input is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Returns TRUE for success, FALSE for failure.

top
EncryptBd
BOOL CkRsaW_EncryptBd(HCkRsaW cHandle, HCkBinDataW bd, BOOL usePrivateKey);
Introduced in version 9.5.0.76

RSA encrypts the contents of bd. usePrivateKey should be set to TRUE if the private key is to be used for encrypting. Otherwise it should be set to FALSE if the public key is to be used for encrypting.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.

Returns TRUE for success, FALSE for failure.

top
EncryptBytes
BOOL CkRsaW_EncryptBytes(HCkRsaW cHandle, HCkByteData binaryData, BOOL usePrivateKey, const unsigned char * outData);

Encrypts byte data using the RSA encryption algorithm. usePrivateKey should be set to TRUE if the private key is to be used for encrypting. Otherwise it should be set to FALSE if the public key is to be used for encrypting.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.

Returns TRUE for success, FALSE for failure.

top
EncryptBytesENC
BOOL CkRsaW_EncryptBytesENC(HCkRsaW cHandle, HCkByteData data, BOOL bUsePrivateKey, const wchar_t *outStr);
const wchar_t *CkRsaW_encryptBytesENC(HCkRsaW cHandle, HCkByteData data, BOOL bUsePrivateKey);

Same as EncryptBytes, except the output is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.

Returns TRUE for success, FALSE for failure.

top
EncryptString
BOOL CkRsaW_EncryptString(HCkRsaW cHandle, const wchar_t *stringToEncrypt, BOOL usePrivateKey, const unsigned char * outData);

Encrypts a string using the RSA encryption algorithm. usePrivateKey should be set to TRUE if the private key is to be used for encrypting. Otherwise it should be set to FALSE if the public key is to be used for encrypting. The string is first converted (if necessary) to the character encoding specified by the Charset property before encrypting. The encrypted bytes are returned.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
EncryptStringENC
BOOL CkRsaW_EncryptStringENC(HCkRsaW cHandle, const wchar_t *str, BOOL bUsePrivateKey, const wchar_t *outStr);
const wchar_t *CkRsaW_encryptStringENC(HCkRsaW cHandle, const wchar_t *str, BOOL bUsePrivateKey);

Same as EncryptString, except the output is an encoded string. The encoding is specified by the EncodingMode property, which can have values such as "base64", "hex", "quoted-printable", "url", etc.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE.

Note: Except for special situations, the public key should always be used for encrypting, and the private key for decrypting. This makes sense because an encrypted message is sent to a recipient, and the recipient is the only one in possession of the private key, and therefore the only one that can decrypt and read the message.

Returns TRUE for success, FALSE for failure.

top
ExportPrivateKey
BOOL CkRsaW_ExportPrivateKey(HCkRsaW cHandle, const wchar_t *outStr);
const wchar_t *CkRsaW_exportPrivateKey(HCkRsaW cHandle);

Exports the private-key of an RSA key pair to XML format. This is typically called after generating a new RSA key via the GenerateKey method.

Returns TRUE for success, FALSE for failure.

top
ExportPrivateKeyObj
HCkPrivateKeyW CkRsaW_ExportPrivateKeyObj(HCkRsaW cHandle);
Introduced in version 9.5.0.40

Exports the private-key to a private key object. This is typically called after generating a new RSA key via the GenerateKey method. Once the private key object is obtained, it may be saved in a variety of different formats.

Returns NULL on failure

More Information and Examples
top
ExportPublicKey
BOOL CkRsaW_ExportPublicKey(HCkRsaW cHandle, const wchar_t *outStr);
const wchar_t *CkRsaW_exportPublicKey(HCkRsaW cHandle);

Exports the public-key of an RSA key pair to XML format. This is typically called after generating a new RSA key via the GenerateKey method.

Returns TRUE for success, FALSE for failure.

top
ExportPublicKeyObj
HCkPublicKeyW CkRsaW_ExportPublicKeyObj(HCkRsaW cHandle);
Introduced in version 9.5.0.40

Exports the public key to a public key object. Once the public key object is obtained, it may be saved in a variety of different formats.

Returns NULL on failure

More Information and Examples
top
GenerateKey
BOOL CkRsaW_GenerateKey(HCkRsaW cHandle, int numBits);

Generates a new RSA public/private key pair. The number of bits can range from 512 to 8192. Typical key lengths are 1024, 2048, or 4096 bits. After successful generation, the public/private parts of the key can be exported to XML via the ExportPrivateKey and ExportPublicKey methods.

Note: Prior to version 9.5.0.49, the max key size was 4096 bits. Generating an 8192-bit RSA key takes a considerable amount of time and CPU processing power. There are no event callbacks or progress monitoring for RSA key generation. Calling this will block the thread until it returns.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
ImportPrivateKey
BOOL CkRsaW_ImportPrivateKey(HCkRsaW cHandle, const wchar_t *xmlKey);

Imports a private key from XML format. After successful import, the private key can be used to encrypt or decrypt. A private key (by definition) contains both private and public parts. This is because the public key consist of modulus and exponent. The private key consists of modulus, exponent, P, Q, DP, DQ, InverseQ, and D using base64 representation:

<RSAKeyValue>
  <Modulus>...</Modulus>
  <Exponent>...</Exponent>
  <P>...</P>
  <Q>...</Q>
  <DP>...</DP>
  <DQ>...</DQ>
  <InverseQ>...</InverseQ>
  <D>...</D>
</RSAKeyValue>

Important: The Rsa object can contain either a private key or a public key, but not both. Importing a private key overwrites the existing key regardless of whether the type of key is public or private.

Returns TRUE for success, FALSE for failure.

top
ImportPrivateKeyObj
BOOL CkRsaW_ImportPrivateKeyObj(HCkRsaW cHandle, HCkPrivateKeyW key);
Introduced in version 9.5.0.40

Imports a private key from a private key object. The imported private key is used in methods that sign or decrypt.

Returns TRUE for success, FALSE for failure.

top
ImportPublicKey
BOOL CkRsaW_ImportPublicKey(HCkRsaW cHandle, const wchar_t *xmlKey);

Imports a public key from XML format. After successful import, the public key can be used to encrypt or decrypt.

Note: Importing a public key overwrites the key that is currently contained in this object - even if it's a private key.

A public key consists of modulus and exponent using base64 representation:

<RSAPublicKey>
  <Modulus>...</Modulus>
  <Exponent>...</Exponent>
</RSAPublicKey>

Important: The Rsa object can contain either a private key or a public key, but not both. Importing a private key overwrites the existing key regardless of whether the type of key is public or private.

Returns TRUE for success, FALSE for failure.

top
ImportPublicKeyObj
BOOL CkRsaW_ImportPublicKeyObj(HCkRsaW cHandle, HCkPublicKeyW key);
Introduced in version 9.5.0.40

Imports a public key from a public key object. The imported public key is used in methods that encrypt data or verify signatures.

Returns TRUE for success, FALSE for failure.

top
OpenSslSignBd
BOOL CkRsaW_OpenSslSignBd(HCkRsaW cHandle, HCkBinDataW bd);
Introduced in version 9.5.0.77

Duplicates OpenSSL's rsautl utility for creating RSA signatures. The contents of bd are signed. If successful, the result is that bd contains the RSA signature that itself contains (embeds) the original data.

Returns TRUE for success, FALSE for failure.

top
OpenSslSignBytes
BOOL CkRsaW_OpenSslSignBytes(HCkRsaW cHandle, HCkByteData data, const unsigned char * outBytes);

Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data consists of binary bytes, and returns the signature bytes.

Returns TRUE for success, FALSE for failure.

top
OpenSslSignBytesENC
BOOL CkRsaW_OpenSslSignBytesENC(HCkRsaW cHandle, HCkByteData data, const wchar_t *outStr);
const wchar_t *CkRsaW_openSslSignBytesENC(HCkRsaW cHandle, HCkByteData data);

Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data consists of binary bytes, and returns the signature as a string encoded according to the EncodingMode property (base64, hex, etc.).

Returns TRUE for success, FALSE for failure.

top
OpenSslSignString
BOOL CkRsaW_OpenSslSignString(HCkRsaW cHandle, const wchar_t *str, const unsigned char * outBytes);

Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data is a string, and returns the signature bytes.

Returns TRUE for success, FALSE for failure.

top
OpenSslSignStringENC
BOOL CkRsaW_OpenSslSignStringENC(HCkRsaW cHandle, const wchar_t *str, const wchar_t *outStr);
const wchar_t *CkRsaW_openSslSignStringENC(HCkRsaW cHandle, const wchar_t *str);

Duplicates OpenSSL's rsautl utility for creating RSA signatures. Input data is a string, and returns the signature as a string encoded according to the EncodingMode property (base64, hex, etc.).

Returns TRUE for success, FALSE for failure.

top
OpenSslVerifyBd
BOOL CkRsaW_OpenSslVerifyBd(HCkRsaW cHandle, HCkBinDataW bd);
Introduced in version 9.5.0.77

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. On input, the bd contains the RSA signature that embeds the original data. If successful (i.e. the signature was verified), then the bd is transformed to contain just the original data.

Returns TRUE for success, FALSE for failure.

top
OpenSslVerifyBytes
BOOL CkRsaW_OpenSslVerifyBytes(HCkRsaW cHandle, HCkByteData signature, const unsigned char * outBytes);

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data consists of the raw signature bytes and returns the original bytes.

Returns TRUE for success, FALSE for failure.

top
OpenSslVerifyBytesENC
BOOL CkRsaW_OpenSslVerifyBytesENC(HCkRsaW cHandle, const wchar_t *str, const unsigned char * outBytes);

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data is a signature string encoded according to the EncodingMode property (base64, hex, etc.). Returns the original bytes.

Returns TRUE for success, FALSE for failure.

top
OpenSslVerifyString
BOOL CkRsaW_OpenSslVerifyString(HCkRsaW cHandle, HCkByteData data, const wchar_t *outStr);
const wchar_t *CkRsaW_openSslVerifyString(HCkRsaW cHandle, HCkByteData data);

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data consists of the raw signature bytes and returns the original string.

Returns TRUE for success, FALSE for failure.

top
OpenSslVerifyStringENC
BOOL CkRsaW_OpenSslVerifyStringENC(HCkRsaW cHandle, const wchar_t *str, const wchar_t *outStr);
const wchar_t *CkRsaW_openSslVerifyStringENC(HCkRsaW cHandle, const wchar_t *str);

Duplicates OpenSSL's rsautl utility for verifying RSA signatures and recovering the original data. Input data is a signature string encoded according to the EncodingMode property (base64, hex, etc.). Returns the original string.

Returns TRUE for success, FALSE for failure.

top
SetX509Cert
BOOL CkRsaW_SetX509Cert(HCkRsaW cHandle, HCkCertW cert, BOOL usePrivateKey);
Introduced in version 9.5.0.73

Provides the private or public key indirectly through a certificate. This method is especially useful on Windows computers where the private key is installed as non-exportable (such as on a hardware token).

Returns TRUE for success, FALSE for failure.

top
SignBd
BOOL CkRsaW_SignBd(HCkRsaW cHandle, HCkBinDataW bdData, const wchar_t *hashAlgorithm, HCkBinDataW bdSig);
Introduced in version 9.5.0.77

Creates an RSA digital signature by hashing the contents of bdData and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The resulting signature is returned in bdSig.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)

A private key is required to create digital signatures.

More Information and Examples
top
SignBytes
BOOL CkRsaW_SignBytes(HCkRsaW cHandle, HCkByteData binaryData, const wchar_t *hashAlgorithm, const unsigned char * outData);

Creates an RSA digital signature by hashing binaryData and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)

A private key is required to create a digital signature.

An error is indicated when a byte array of 0 length is returned.

Returns TRUE for success, FALSE for failure.

top
SignBytesENC
BOOL CkRsaW_SignBytesENC(HCkRsaW cHandle, HCkByteData binaryData, const wchar_t *hashAlgorithm, const wchar_t *outStr);
const wchar_t *CkRsaW_signBytesENC(HCkRsaW cHandle, HCkByteData binaryData, const wchar_t *hashAlgorithm);

Creates an RSA digital signature by hashing binaryData and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1". The digital signature is returned as an encoded string, where the encoding is specified by the EncodingMode property.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)

A private key is required to create a digital signature.

An error is indicated when null reference is returned.

Returns TRUE for success, FALSE for failure.

top
SignHash
BOOL CkRsaW_SignHash(HCkRsaW cHandle, HCkByteData hashBytes, const wchar_t *hashAlg, const unsigned char * outBytes);

The same as the SignBytes method, except the hash to be signed is passed directly.

Returns TRUE for success, FALSE for failure.

top
SignHashENC
BOOL CkRsaW_SignHashENC(HCkRsaW cHandle, const wchar_t *encodedHash, const wchar_t *hashAlg, const wchar_t *outStr);
const wchar_t *CkRsaW_signHashENC(HCkRsaW cHandle, const wchar_t *encodedHash, const wchar_t *hashAlg);

The same as SignBytesENC except the hash is passed directly.

Returns TRUE for success, FALSE for failure.

top
SignString
BOOL CkRsaW_SignString(HCkRsaW cHandle, const wchar_t *strToBeHashed, const wchar_t *hashAlgorithm, const unsigned char * outData);

Creates an RSA digital signature by hashing strToBeHashed and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)

A private key is required to create a digital signature.

An error is indicated when a byte array of 0 length is returned.

Returns TRUE for success, FALSE for failure.

top
SignStringENC
BOOL CkRsaW_SignStringENC(HCkRsaW cHandle, const wchar_t *strToBeHashed, const wchar_t *hashAlgorithm, const wchar_t *outStr);
const wchar_t *CkRsaW_signStringENC(HCkRsaW cHandle, const wchar_t *strToBeHashed, const wchar_t *hashAlgorithm);

Creates an RSA digital signature by hashing strToBeHashed and then signing the hash. The hash algorithm is specified by hashAlgorithm, which may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1". The digital signature is returned as an encoded string, where the encoding is specified by the EncodingMode property.

Important: If trying to match OpenSSL results, set the LittleEndian property = FALSE. (The LittleEndian property should also be set to FALSE to match Amazon web services, such as CloudFront.)

A private key is required to create a digital signature.

An error is indicated when null reference is returned.

Returns TRUE for success, FALSE for failure.

top
SnkToXml
BOOL CkRsaW_SnkToXml(HCkRsaW cHandle, const wchar_t *filename, const wchar_t *outStr);
const wchar_t *CkRsaW_snkToXml(HCkRsaW cHandle, const wchar_t *filename);

Imports a .snk file to an XML document that can be imported via the ImportPrivateKey method.

Returns TRUE for success, FALSE for failure.

top
VerifyBd
BOOL CkRsaW_VerifyBd(HCkRsaW cHandle, HCkBinDataW bdData, const wchar_t *hashAlgorithm, HCkBinDataW bdSig);
Introduced in version 9.5.0.77

Verifies an RSA digital signature. Returns TRUE if the signature in bdSig is valid an confirms that the original data in bdData has not been modified. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512".

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
VerifyBytes
BOOL CkRsaW_VerifyBytes(HCkRsaW cHandle, HCkByteData originalData, const wchar_t *hashAlgorithm, HCkByteData signatureBytes);

Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalData. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

top
VerifyBytesENC
BOOL CkRsaW_VerifyBytesENC(HCkRsaW cHandle, HCkByteData originalData, const wchar_t *hashAlgorithm, const wchar_t *encodedSig);

Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalData. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

The encodedSig is a digital signature encoded according to the EncodingMode property (i.e. base64, hex, etc.).

top
VerifyHash
BOOL CkRsaW_VerifyHash(HCkRsaW cHandle, HCkByteData hashBytes, const wchar_t *hashAlg, HCkByteData sigBytes);

The same as VerifyBytes except the hash of the original data is passed directly.

top
VerifyHashENC
BOOL CkRsaW_VerifyHashENC(HCkRsaW cHandle, const wchar_t *encodedHash, const wchar_t *hashAlg, const wchar_t *encodedSig);

The same as VerifyBytesENC except the hash of the original data is passed directly.

More Information and Examples
top
VerifyPrivateKey
BOOL CkRsaW_VerifyPrivateKey(HCkRsaW cHandle, const wchar_t *xml);

Returns TRUE if the XML contains a valid RSA private key. Otherwise returns FALSE.

Returns TRUE for success, FALSE for failure.

top
VerifyString
BOOL CkRsaW_VerifyString(HCkRsaW cHandle, const wchar_t *originalString, const wchar_t *hashAlgorithm, HCkByteData binarySig);

Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalString. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

top
VerifyStringENC
BOOL CkRsaW_VerifyStringENC(HCkRsaW cHandle, const wchar_t *originalString, const wchar_t *hashAlgorithm, const wchar_t *encodedSig);

Verifies an RSA digital signature. Returns TRUE if the signature is valid for the originalString. The hashAlgorithm may be "SHA-1", "MD5", "MD2", "SHA-256", "SHA-384", or "SHA-512". The recommended hash algorithm is "SHA-1".

The encodedSig is a digital signature encoded according to the EncodingMode property (i.e. base64, hex, etc.).

More Information and Examples
top