(PHP 4 >= 4.0.4, PHP 5, PHP 7)
openssl_verify — ��֤ǩ��
$data
, string $signature
, mixed $pub_key_id
[, mixed $signature_alg
= OPENSSL_ALGO_SHA1
] ) : int
openssl_verify() ʹ����pub_key_id
�����Ĺ�Կ��ָ֤������data
��ǩ��signature
�Ƿ���ȷ���������������ǩ����˽Կ���Ӧ�Ĺ�Կ��
data
��ǰ��������ǩ���������ַ�����
signature
ԭʼ�������ַ�����ͨ��openssl_sign()�����Ƶĺ������ɡ�
pub_key_id
resource - һ����Կ, ͨ�� openssl_get_publickey() �������ء�
string - һ�� PEM ��ʽ����Կ, ����, "-----BEGIN PUBLIC KEY----- MIIBCgK..."
signature_alg
int - ����ǩ���㷨֮һSignature Algorithms.
string - ��openssl_get_md_methods()�������صĿ����ַ��������磬 "sha1WithRSAEncryption" ���� "sha512".
���ǩ����ȷ���� 1, ǩ������ 0, �ڲ�����������-1.
�汾 | ˵�� |
---|---|
5.2.0 |
����� signature_alg ������
|
Example #1 openssl_verify() ������
<?php
// $data and $signature are assumed to contain the data and the signature
// fetch public key from certificate and ready it
$pubkeyid = openssl_pkey_get_public("file://src/openssl-0.9.6/demos/sign/cert.pem");
// state whether signature is okay or not
$ok = openssl_verify($data, $signature, $pubkeyid);
if ($ok == 1) {
echo "good";
} elseif ($ok == 0) {
echo "bad";
} else {
echo "ugly, error checking signature";
}
// free the key from memory
openssl_free_key($pubkeyid);
?>
Example #2 openssl_verify() ������
<?php
//data you want to sign
$data = 'my data';
//create new private and public key
$private_key_res = openssl_pkey_new(array(
"private_key_bits" => 2048,
"private_key_type" => OPENSSL_KEYTYPE_RSA,
));
$details = openssl_pkey_get_details($private_key_res);
$public_key_res = openssl_pkey_get_public($details['key']);
//create signature
openssl_sign($data, $signature, $private_key_res, "sha1WithRSAEncryption");
//verify signature
$ok = openssl_verify($data, $signature, $public_key_res, OPENSSL_ALGO_SHA1);
if ($ok == 1) {
echo "valid";
} elseif ($ok == 0) {
echo "invalid";
} else {
echo "error: ".openssl_error_string();
}
?>