RSA_check_key.3ossl 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225
  1. .\" Automatically generated by Pod::Man 4.14 (Pod::Simple 3.42)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sp \" Vertical space (when we can't use .PP)
  6. .if t .sp .5v
  7. .if n .sp
  8. ..
  9. .de Vb \" Begin verbatim text
  10. .ft CW
  11. .nf
  12. .ne \\$1
  13. ..
  14. .de Ve \" End verbatim text
  15. .ft R
  16. .fi
  17. ..
  18. .\" Set up some character translations and predefined strings. \*(-- will
  19. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  20. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  21. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  22. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  23. .\" nothing in troff, for use with C<>.
  24. .tr \(*W-
  25. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  26. .ie n \{\
  27. . ds -- \(*W-
  28. . ds PI pi
  29. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  30. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  31. . ds L" ""
  32. . ds R" ""
  33. . ds C` ""
  34. . ds C' ""
  35. 'br\}
  36. .el\{\
  37. . ds -- \|\(em\|
  38. . ds PI \(*p
  39. . ds L" ``
  40. . ds R" ''
  41. . ds C`
  42. . ds C'
  43. 'br\}
  44. .\"
  45. .\" Escape single quotes in literal strings from groff's Unicode transform.
  46. .ie \n(.g .ds Aq \(aq
  47. .el .ds Aq '
  48. .\"
  49. .\" If the F register is >0, we'll generate index entries on stderr for
  50. .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
  51. .\" entries marked with X<> in POD. Of course, you'll have to process the
  52. .\" output yourself in some meaningful fashion.
  53. .\"
  54. .\" Avoid warning from groff about undefined register 'F'.
  55. .de IX
  56. ..
  57. .nr rF 0
  58. .if \n(.g .if rF .nr rF 1
  59. .if (\n(rF:(\n(.g==0)) \{\
  60. . if \nF \{\
  61. . de IX
  62. . tm Index:\\$1\t\\n%\t"\\$2"
  63. ..
  64. . if !\nF==2 \{\
  65. . nr % 0
  66. . nr F 2
  67. . \}
  68. . \}
  69. .\}
  70. .rr rF
  71. .\"
  72. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  73. .\" Fear. Run. Save yourself. No user-serviceable parts.
  74. . \" fudge factors for nroff and troff
  75. .if n \{\
  76. . ds #H 0
  77. . ds #V .8m
  78. . ds #F .3m
  79. . ds #[ \f1
  80. . ds #] \fP
  81. .\}
  82. .if t \{\
  83. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  84. . ds #V .6m
  85. . ds #F 0
  86. . ds #[ \&
  87. . ds #] \&
  88. .\}
  89. . \" simple accents for nroff and troff
  90. .if n \{\
  91. . ds ' \&
  92. . ds ` \&
  93. . ds ^ \&
  94. . ds , \&
  95. . ds ~ ~
  96. . ds /
  97. .\}
  98. .if t \{\
  99. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  100. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  101. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  102. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  103. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  104. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  105. .\}
  106. . \" troff and (daisy-wheel) nroff accents
  107. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  108. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  109. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  110. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  111. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  112. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  113. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  114. .ds ae a\h'-(\w'a'u*4/10)'e
  115. .ds Ae A\h'-(\w'A'u*4/10)'E
  116. . \" corrections for vroff
  117. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  118. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  119. . \" for low resolution devices (crt and lpr)
  120. .if \n(.H>23 .if \n(.V>19 \
  121. \{\
  122. . ds : e
  123. . ds 8 ss
  124. . ds o a
  125. . ds d- d\h'-1'\(ga
  126. . ds D- D\h'-1'\(hy
  127. . ds th \o'bp'
  128. . ds Th \o'LP'
  129. . ds ae ae
  130. . ds Ae AE
  131. .\}
  132. .rm #[ #] #H #V #F C
  133. .\" ========================================================================
  134. .\"
  135. .IX Title "RSA_CHECK_KEY 3ossl"
  136. .TH RSA_CHECK_KEY 3ossl "2024-09-03" "3.3.2" "OpenSSL"
  137. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  138. .\" way too many mistakes in technical documents.
  139. .if n .ad l
  140. .nh
  141. .SH "NAME"
  142. RSA_check_key_ex, RSA_check_key \- validate private RSA keys
  143. .SH "SYNOPSIS"
  144. .IX Header "SYNOPSIS"
  145. .Vb 1
  146. \& #include <openssl/rsa.h>
  147. .Ve
  148. .PP
  149. The following functions have been deprecated since OpenSSL 3.0, and can be
  150. hidden entirely by defining \fB\s-1OPENSSL_API_COMPAT\s0\fR with a suitable version value,
  151. see \fBopenssl_user_macros\fR\|(7):
  152. .PP
  153. .Vb 1
  154. \& int RSA_check_key_ex(const RSA *rsa, BN_GENCB *cb);
  155. \&
  156. \& int RSA_check_key(const RSA *rsa);
  157. .Ve
  158. .SH "DESCRIPTION"
  159. .IX Header "DESCRIPTION"
  160. Both of the functions described on this page are deprecated.
  161. Applications should instead use \fBEVP_PKEY_public_check\fR\|(3),
  162. \&\fBEVP_PKEY_private_check\fR\|(3) and \fBEVP_PKEY_pairwise_check\fR\|(3).
  163. .PP
  164. \&\fBRSA_check_key_ex()\fR function validates \s-1RSA\s0 keys.
  165. It checks that \fBp\fR and \fBq\fR are
  166. in fact prime, and that \fBn = p*q\fR.
  167. .PP
  168. It does not work on \s-1RSA\s0 public keys that have only the modulus
  169. and public exponent elements populated.
  170. It also checks that \fBd*e = 1 mod (p\-1*q\-1)\fR,
  171. and that \fBdmp1\fR, \fBdmq1\fR and \fBiqmp\fR are set correctly or are \fB\s-1NULL\s0\fR.
  172. It performs integrity checks on all
  173. the \s-1RSA\s0 key material, so the \s-1RSA\s0 key structure must contain all the private
  174. key data too.
  175. Therefore, it cannot be used with any arbitrary \s-1RSA\s0 key object,
  176. even if it is otherwise fit for regular \s-1RSA\s0 operation.
  177. .PP
  178. The \fBcb\fR parameter is a callback that will be invoked in the same
  179. manner as \fBBN_is_prime_ex\fR\|(3).
  180. .PP
  181. \&\fBRSA_check_key()\fR is equivalent to \fBRSA_check_key_ex()\fR with a \s-1NULL\s0 \fBcb\fR.
  182. .SH "RETURN VALUES"
  183. .IX Header "RETURN VALUES"
  184. \&\fBRSA_check_key_ex()\fR and \fBRSA_check_key()\fR
  185. return 1 if \fBrsa\fR is a valid \s-1RSA\s0 key, and 0 otherwise.
  186. They return \-1 if an error occurs while checking the key.
  187. .PP
  188. If the key is invalid or an error occurred, the reason code can be
  189. obtained using \fBERR_get_error\fR\|(3).
  190. .SH "NOTES"
  191. .IX Header "NOTES"
  192. Unlike most other \s-1RSA\s0 functions, this function does \fBnot\fR work
  193. transparently with any underlying \s-1ENGINE\s0 implementation because it uses the
  194. key data in the \s-1RSA\s0 structure directly. An \s-1ENGINE\s0 implementation can
  195. override the way key data is stored and handled, and can even provide
  196. support for \s-1HSM\s0 keys \- in which case the \s-1RSA\s0 structure may contain \fBno\fR
  197. key data at all! If the \s-1ENGINE\s0 in question is only being used for
  198. acceleration or analysis purposes, then in all likelihood the \s-1RSA\s0 key data
  199. is complete and untouched, but this can't be assumed in the general case.
  200. .SH "BUGS"
  201. .IX Header "BUGS"
  202. A method of verifying the \s-1RSA\s0 key using opaque \s-1RSA API\s0 functions might need
  203. to be considered. Right now \fBRSA_check_key()\fR simply uses the \s-1RSA\s0 structure
  204. elements directly, bypassing the \s-1RSA_METHOD\s0 table altogether (and
  205. completely violating encapsulation and object-orientation in the process).
  206. The best fix will probably be to introduce a \*(L"\fBcheck_key()\fR\*(R" handler to the
  207. \&\s-1RSA_METHOD\s0 function table so that alternative implementations can also
  208. provide their own verifiers.
  209. .SH "SEE ALSO"
  210. .IX Header "SEE ALSO"
  211. \&\fBBN_is_prime_ex\fR\|(3),
  212. \&\fBERR_get_error\fR\|(3)
  213. .SH "HISTORY"
  214. .IX Header "HISTORY"
  215. All of these functions were deprecated in OpenSSL 3.0.
  216. .PP
  217. \&\fBRSA_check_key_ex()\fR appeared after OpenSSL 1.0.2.
  218. .SH "COPYRIGHT"
  219. .IX Header "COPYRIGHT"
  220. Copyright 2000\-2020 The OpenSSL Project Authors. All Rights Reserved.
  221. .PP
  222. Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use
  223. this file except in compliance with the License. You can obtain a copy
  224. in the file \s-1LICENSE\s0 in the source distribution or at
  225. <https://www.openssl.org/source/license.html>.