2
0

PKCS7_decrypt.pod 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. =pod
  2. =head1 NAME
  3. PKCS7_decrypt - decrypt content from a PKCS#7 envelopedData structure
  4. =head1 SYNOPSIS
  5. #include <openssl/pkcs7.h>
  6. int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
  7. =head1 DESCRIPTION
  8. PKCS7_decrypt() extracts and decrypts the content from a PKCS#7 envelopedData
  9. structure. B<pkey> is the private key of the recipient, B<cert> is the
  10. recipients certificate, B<data> is a BIO to write the content to and
  11. B<flags> is an optional set of flags.
  12. =head1 NOTES
  13. OpenSSL_add_all_algorithms() (or equivalent) should be called before using this
  14. function or errors about unknown algorithms will occur.
  15. Although the recipients certificate is not needed to decrypt the data it is needed
  16. to locate the appropriate (of possible several) recipients in the PKCS#7 structure.
  17. The following flags can be passed in the B<flags> parameter.
  18. If the B<PKCS7_TEXT> flag is set MIME headers for type B<text/plain> are deleted
  19. from the content. If the content is not of type B<text/plain> then an error is
  20. returned.
  21. =head1 RETURN VALUES
  22. PKCS7_decrypt() returns either 1 for success or 0 for failure.
  23. The error can be obtained from ERR_get_error(3)
  24. =head1 BUGS
  25. PKCS7_decrypt() must be passed the correct recipient key and certificate. It would
  26. be better if it could look up the correct key and certificate from a database.
  27. The lack of single pass processing and need to hold all data in memory as
  28. mentioned in PKCS7_sign() also applies to PKCS7_verify().
  29. =head1 SEE ALSO
  30. L<ERR_get_error(3)|ERR_get_error(3)>, L<PKCS7_encrypt(3)|PKCS7_encrypt(3)>
  31. =head1 HISTORY
  32. PKCS7_decrypt() was added to OpenSSL 0.9.5
  33. =cut