Module jose_jwa_pkcs1

PKCS #1: RSA Cryptography Specifications Version 2.1 See RFC 3447: https://tools.ietf.org/html/rfc3447

Copyright © 2014-2015, Andrew Bennett

Authors: Andrew Bennett (andrew@pixid.com).

Description

PKCS #1: RSA Cryptography Specifications Version 2.1 See RFC 3447: https://tools.ietf.org/html/rfc3447

Data Types

rsa_digest_type()

rsa_digest_type() = md5 | sha | sha224 | sha256 | sha384 | sha512

rsa_hash_fun()

rsa_hash_fun() = rsa_digest_type() | {hmac, rsa_digest_type(), iodata()} | fun((iodata()) -> binary())

rsa_private_key()

rsa_private_key() = #'RSAPrivateKey'{}

rsa_public_key()

rsa_public_key() = #'RSAPublicKey'{}

Function Index

decrypt_private/3
eme_oaep_decode/4
eme_oaep_encode/5
eme_pkcs1_decode/2
eme_pkcs1_encode/2
emsa_pkcs1_encode/4
emsa_pss_encode/3
emsa_pss_encode/4
emsa_pss_verify/4
emsa_pss_verify/5
encrypt_public/3
mgf1/3
rsaes_oaep_decrypt/3
rsaes_oaep_decrypt/4
rsaes_oaep_encrypt/3
rsaes_oaep_encrypt/4
rsaes_oaep_encrypt/5
rsaes_pkcs1_decrypt/2
rsaes_pkcs1_encrypt/2
rsassa_pkcs1_sign/3
rsassa_pkcs1_sign/4
rsassa_pkcs1_verify/4
rsassa_pkcs1_verify/5
rsassa_pss_sign/3
rsassa_pss_sign/4
rsassa_pss_verify/4
rsassa_pss_verify/5
sign/4
verify/5

Function Details

decrypt_private/3

decrypt_private(CipherText, RSAPrivateKey, Options) -> any()

eme_oaep_decode/4

eme_oaep_decode(Hash, EM, Label, K) -> M | error

eme_oaep_encode/5

eme_oaep_encode(Hash, DM, Label, Seed, K) -> {ok, EM} | {error, Reason}

eme_pkcs1_decode/2

eme_pkcs1_decode(EM, K) -> M | error

eme_pkcs1_encode/2

eme_pkcs1_encode(DM, K) -> {ok, EM} | {error, Reason}

emsa_pkcs1_encode/4

emsa_pkcs1_encode(Hash, Algorithm, Message, EMBits) -> {ok, EM} | {error, Reason}

emsa_pss_encode/3

emsa_pss_encode(Hash, Message, EMBits) -> {ok, EM} | {error, Reason}

emsa_pss_encode/4

emsa_pss_encode(Hash, Message, Salt, EMBits) -> {ok, EM} | {error, Reason}

emsa_pss_verify/4

emsa_pss_verify(Hash, Message, EM, EMBits) -> boolean()

emsa_pss_verify/5

emsa_pss_verify(Hash, Message, EM, SaltLen, EMBits) -> boolean()

encrypt_public/3

encrypt_public(PlainText, RSAPublicKey, Options) -> any()

mgf1/3

mgf1(Hash, Seed, MaskLen) -> {ok, binary()} | {error, mask_too_long}

rsaes_oaep_decrypt/3

rsaes_oaep_decrypt(Hash, CipherText, RSAPrivateKey) -> PlainText

rsaes_oaep_decrypt/4

rsaes_oaep_decrypt(Hash, CipherText, Label, RSAPrivateKey) -> PlainText

rsaes_oaep_encrypt/3

rsaes_oaep_encrypt(Hash, PlainText, RSAPublicKey) -> CipherText

rsaes_oaep_encrypt/4

rsaes_oaep_encrypt(Hash, PlainText, Label, RSAPublicKey) -> CipherText

rsaes_oaep_encrypt/5

rsaes_oaep_encrypt(Hash, PlainText, Label, Seed, RSAPublicKey) -> CipherText

rsaes_pkcs1_decrypt/2

rsaes_pkcs1_decrypt(CipherText, RSAPrivateKey) -> PlainText

rsaes_pkcs1_encrypt/2

rsaes_pkcs1_encrypt(PlainText, RSAPublicKey) -> CipherText

rsassa_pkcs1_sign/3

rsassa_pkcs1_sign(Hash, Message, RSAPrivateKey) -> {ok, Signature} | {error, Reason}

rsassa_pkcs1_sign/4

rsassa_pkcs1_sign(Hash, Algorithm, Message, RSAPrivateKey) -> {ok, Signature} | {error, Reason}

rsassa_pkcs1_verify/4

rsassa_pkcs1_verify(Hash, Message, Signature, RSAPublicKey) -> boolean()

rsassa_pkcs1_verify/5

rsassa_pkcs1_verify(Hash, Algorithm, Message, Signature, RSAPublicKey) -> boolean()

rsassa_pss_sign/3

rsassa_pss_sign(Hash, Message, RSAPrivateKey) -> {ok, Signature} | {error, Reason}

rsassa_pss_sign/4

rsassa_pss_sign(Hash, Message, Salt, RSAPrivateKey) -> {ok, Signature} | {error, Reason}

rsassa_pss_verify/4

rsassa_pss_verify(Hash, Message, Signature, RSAPublicKey) -> boolean()

rsassa_pss_verify/5

rsassa_pss_verify(Hash, Message, Signature, SaltLen, RSAPublicKey) -> boolean()

sign/4

sign(Message, DigestType, RSAPrivateKey, Options) -> any()

verify/5

verify(Message, DigestType, Signature, RSAPublicKey, Options) -> any()


Generated by EDoc