RSA_meth_new.3ossl 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404
  1. .\" Automatically generated by Pod::Man 4.14 (Pod::Simple 3.42)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sp \" Vertical space (when we can't use .PP)
  6. .if t .sp .5v
  7. .if n .sp
  8. ..
  9. .de Vb \" Begin verbatim text
  10. .ft CW
  11. .nf
  12. .ne \\$1
  13. ..
  14. .de Ve \" End verbatim text
  15. .ft R
  16. .fi
  17. ..
  18. .\" Set up some character translations and predefined strings. \*(-- will
  19. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  20. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  21. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  22. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  23. .\" nothing in troff, for use with C<>.
  24. .tr \(*W-
  25. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  26. .ie n \{\
  27. . ds -- \(*W-
  28. . ds PI pi
  29. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  30. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  31. . ds L" ""
  32. . ds R" ""
  33. . ds C` ""
  34. . ds C' ""
  35. 'br\}
  36. .el\{\
  37. . ds -- \|\(em\|
  38. . ds PI \(*p
  39. . ds L" ``
  40. . ds R" ''
  41. . ds C`
  42. . ds C'
  43. 'br\}
  44. .\"
  45. .\" Escape single quotes in literal strings from groff's Unicode transform.
  46. .ie \n(.g .ds Aq \(aq
  47. .el .ds Aq '
  48. .\"
  49. .\" If the F register is >0, we'll generate index entries on stderr for
  50. .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
  51. .\" entries marked with X<> in POD. Of course, you'll have to process the
  52. .\" output yourself in some meaningful fashion.
  53. .\"
  54. .\" Avoid warning from groff about undefined register 'F'.
  55. .de IX
  56. ..
  57. .nr rF 0
  58. .if \n(.g .if rF .nr rF 1
  59. .if (\n(rF:(\n(.g==0)) \{\
  60. . if \nF \{\
  61. . de IX
  62. . tm Index:\\$1\t\\n%\t"\\$2"
  63. ..
  64. . if !\nF==2 \{\
  65. . nr % 0
  66. . nr F 2
  67. . \}
  68. . \}
  69. .\}
  70. .rr rF
  71. .\"
  72. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  73. .\" Fear. Run. Save yourself. No user-serviceable parts.
  74. . \" fudge factors for nroff and troff
  75. .if n \{\
  76. . ds #H 0
  77. . ds #V .8m
  78. . ds #F .3m
  79. . ds #[ \f1
  80. . ds #] \fP
  81. .\}
  82. .if t \{\
  83. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  84. . ds #V .6m
  85. . ds #F 0
  86. . ds #[ \&
  87. . ds #] \&
  88. .\}
  89. . \" simple accents for nroff and troff
  90. .if n \{\
  91. . ds ' \&
  92. . ds ` \&
  93. . ds ^ \&
  94. . ds , \&
  95. . ds ~ ~
  96. . ds /
  97. .\}
  98. .if t \{\
  99. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  100. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  101. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  102. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  103. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  104. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  105. .\}
  106. . \" troff and (daisy-wheel) nroff accents
  107. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  108. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  109. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  110. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  111. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  112. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  113. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  114. .ds ae a\h'-(\w'a'u*4/10)'e
  115. .ds Ae A\h'-(\w'A'u*4/10)'E
  116. . \" corrections for vroff
  117. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  118. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  119. . \" for low resolution devices (crt and lpr)
  120. .if \n(.H>23 .if \n(.V>19 \
  121. \{\
  122. . ds : e
  123. . ds 8 ss
  124. . ds o a
  125. . ds d- d\h'-1'\(ga
  126. . ds D- D\h'-1'\(hy
  127. . ds th \o'bp'
  128. . ds Th \o'LP'
  129. . ds ae ae
  130. . ds Ae AE
  131. .\}
  132. .rm #[ #] #H #V #F C
  133. .\" ========================================================================
  134. .\"
  135. .IX Title "RSA_METH_NEW 3ossl"
  136. .TH RSA_METH_NEW 3ossl "2024-09-03" "3.3.2" "OpenSSL"
  137. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  138. .\" way too many mistakes in technical documents.
  139. .if n .ad l
  140. .nh
  141. .SH "NAME"
  142. RSA_meth_get0_app_data, RSA_meth_set0_app_data,
  143. RSA_meth_new, RSA_meth_free, RSA_meth_dup, RSA_meth_get0_name,
  144. RSA_meth_set1_name, RSA_meth_get_flags, RSA_meth_set_flags,
  145. RSA_meth_get_pub_enc,
  146. RSA_meth_set_pub_enc, RSA_meth_get_pub_dec, RSA_meth_set_pub_dec,
  147. RSA_meth_get_priv_enc, RSA_meth_set_priv_enc, RSA_meth_get_priv_dec,
  148. RSA_meth_set_priv_dec, RSA_meth_get_mod_exp, RSA_meth_set_mod_exp,
  149. RSA_meth_get_bn_mod_exp, RSA_meth_set_bn_mod_exp, RSA_meth_get_init,
  150. RSA_meth_set_init, RSA_meth_get_finish, RSA_meth_set_finish,
  151. RSA_meth_get_sign, RSA_meth_set_sign, RSA_meth_get_verify,
  152. RSA_meth_set_verify, RSA_meth_get_keygen, RSA_meth_set_keygen,
  153. RSA_meth_get_multi_prime_keygen, RSA_meth_set_multi_prime_keygen
  154. \&\- Routines to build up RSA methods
  155. .SH "SYNOPSIS"
  156. .IX Header "SYNOPSIS"
  157. .Vb 1
  158. \& #include <openssl/rsa.h>
  159. .Ve
  160. .PP
  161. The following functions have been deprecated since OpenSSL 3.0, and can be
  162. hidden entirely by defining \fB\s-1OPENSSL_API_COMPAT\s0\fR with a suitable version value,
  163. see \fBopenssl_user_macros\fR\|(7):
  164. .PP
  165. .Vb 2
  166. \& RSA_METHOD *RSA_meth_new(const char *name, int flags);
  167. \& void RSA_meth_free(RSA_METHOD *meth);
  168. \&
  169. \& RSA_METHOD *RSA_meth_dup(const RSA_METHOD *meth);
  170. \&
  171. \& const char *RSA_meth_get0_name(const RSA_METHOD *meth);
  172. \& int RSA_meth_set1_name(RSA_METHOD *meth, const char *name);
  173. \&
  174. \& int RSA_meth_get_flags(const RSA_METHOD *meth);
  175. \& int RSA_meth_set_flags(RSA_METHOD *meth, int flags);
  176. \&
  177. \& void *RSA_meth_get0_app_data(const RSA_METHOD *meth);
  178. \& int RSA_meth_set0_app_data(RSA_METHOD *meth, void *app_data);
  179. \&
  180. \& int (*RSA_meth_get_pub_enc(const RSA_METHOD *meth))(int flen, const unsigned char *from,
  181. \& unsigned char *to, RSA *rsa, int padding);
  182. \& int RSA_meth_set_pub_enc(RSA_METHOD *rsa,
  183. \& int (*pub_enc)(int flen, const unsigned char *from,
  184. \& unsigned char *to, RSA *rsa,
  185. \& int padding));
  186. \&
  187. \& int (*RSA_meth_get_pub_dec(const RSA_METHOD *meth))
  188. \& (int flen, const unsigned char *from,
  189. \& unsigned char *to, RSA *rsa, int padding);
  190. \& int RSA_meth_set_pub_dec(RSA_METHOD *rsa,
  191. \& int (*pub_dec)(int flen, const unsigned char *from,
  192. \& unsigned char *to, RSA *rsa,
  193. \& int padding));
  194. \&
  195. \& int (*RSA_meth_get_priv_enc(const RSA_METHOD *meth))(int flen, const unsigned char *from,
  196. \& unsigned char *to, RSA *rsa,
  197. \& int padding);
  198. \& int RSA_meth_set_priv_enc(RSA_METHOD *rsa,
  199. \& int (*priv_enc)(int flen, const unsigned char *from,
  200. \& unsigned char *to, RSA *rsa, int padding));
  201. \&
  202. \& int (*RSA_meth_get_priv_dec(const RSA_METHOD *meth))(int flen, const unsigned char *from,
  203. \& unsigned char *to, RSA *rsa,
  204. \& int padding);
  205. \& int RSA_meth_set_priv_dec(RSA_METHOD *rsa,
  206. \& int (*priv_dec)(int flen, const unsigned char *from,
  207. \& unsigned char *to, RSA *rsa, int padding));
  208. \&
  209. \& /* Can be null */
  210. \& int (*RSA_meth_get_mod_exp(const RSA_METHOD *meth))(BIGNUM *r0, const BIGNUM *i,
  211. \& RSA *rsa, BN_CTX *ctx);
  212. \& int RSA_meth_set_mod_exp(RSA_METHOD *rsa,
  213. \& int (*mod_exp)(BIGNUM *r0, const BIGNUM *i, RSA *rsa,
  214. \& BN_CTX *ctx));
  215. \&
  216. \& /* Can be null */
  217. \& int (*RSA_meth_get_bn_mod_exp(const RSA_METHOD *meth))(BIGNUM *r, const BIGNUM *a,
  218. \& const BIGNUM *p, const BIGNUM *m,
  219. \& BN_CTX *ctx, BN_MONT_CTX *m_ctx);
  220. \& int RSA_meth_set_bn_mod_exp(RSA_METHOD *rsa,
  221. \& int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a,
  222. \& const BIGNUM *p, const BIGNUM *m,
  223. \& BN_CTX *ctx, BN_MONT_CTX *m_ctx));
  224. \&
  225. \& /* called at new */
  226. \& int (*RSA_meth_get_init(const RSA_METHOD *meth) (RSA *rsa);
  227. \& int RSA_meth_set_init(RSA_METHOD *rsa, int (*init (RSA *rsa));
  228. \&
  229. \& /* called at free */
  230. \& int (*RSA_meth_get_finish(const RSA_METHOD *meth))(RSA *rsa);
  231. \& int RSA_meth_set_finish(RSA_METHOD *rsa, int (*finish)(RSA *rsa));
  232. \&
  233. \& int (*RSA_meth_get_sign(const RSA_METHOD *meth))(int type, const unsigned char *m,
  234. \& unsigned int m_length,
  235. \& unsigned char *sigret,
  236. \& unsigned int *siglen, const RSA *rsa);
  237. \& int RSA_meth_set_sign(RSA_METHOD *rsa,
  238. \& int (*sign)(int type, const unsigned char *m,
  239. \& unsigned int m_length, unsigned char *sigret,
  240. \& unsigned int *siglen, const RSA *rsa));
  241. \&
  242. \& int (*RSA_meth_get_verify(const RSA_METHOD *meth))(int dtype, const unsigned char *m,
  243. \& unsigned int m_length,
  244. \& const unsigned char *sigbuf,
  245. \& unsigned int siglen, const RSA *rsa);
  246. \& int RSA_meth_set_verify(RSA_METHOD *rsa,
  247. \& int (*verify)(int dtype, const unsigned char *m,
  248. \& unsigned int m_length,
  249. \& const unsigned char *sigbuf,
  250. \& unsigned int siglen, const RSA *rsa));
  251. \&
  252. \& int (*RSA_meth_get_keygen(const RSA_METHOD *meth))(RSA *rsa, int bits, BIGNUM *e,
  253. \& BN_GENCB *cb);
  254. \& int RSA_meth_set_keygen(RSA_METHOD *rsa,
  255. \& int (*keygen)(RSA *rsa, int bits, BIGNUM *e,
  256. \& BN_GENCB *cb));
  257. \&
  258. \& int (*RSA_meth_get_multi_prime_keygen(const RSA_METHOD *meth))(RSA *rsa, int bits,
  259. \& int primes, BIGNUM *e,
  260. \& BN_GENCB *cb);
  261. \&
  262. \& int RSA_meth_set_multi_prime_keygen(RSA_METHOD *meth,
  263. \& int (*keygen) (RSA *rsa, int bits,
  264. \& int primes, BIGNUM *e,
  265. \& BN_GENCB *cb));
  266. .Ve
  267. .SH "DESCRIPTION"
  268. .IX Header "DESCRIPTION"
  269. All of the functions described on this page are deprecated.
  270. Applications should instead use the \s-1OSSL_PROVIDER\s0 APIs.
  271. .PP
  272. The \fB\s-1RSA_METHOD\s0\fR type is a structure used for the provision of custom
  273. \&\s-1RSA\s0 implementations. It provides a set of functions used by OpenSSL
  274. for the implementation of the various \s-1RSA\s0 capabilities.
  275. .PP
  276. \&\fBRSA_meth_new()\fR creates a new \fB\s-1RSA_METHOD\s0\fR structure. It should be
  277. given a unique \fBname\fR and a set of \fBflags\fR. The \fBname\fR should be a
  278. \&\s-1NULL\s0 terminated string, which will be duplicated and stored in the
  279. \&\fB\s-1RSA_METHOD\s0\fR object. It is the callers responsibility to free the
  280. original string. The flags will be used during the construction of a
  281. new \fB\s-1RSA\s0\fR object based on this \fB\s-1RSA_METHOD\s0\fR. Any new \fB\s-1RSA\s0\fR object
  282. will have those flags set by default.
  283. .PP
  284. \&\fBRSA_meth_dup()\fR creates a duplicate copy of the \fB\s-1RSA_METHOD\s0\fR object
  285. passed as a parameter. This might be useful for creating a new
  286. \&\fB\s-1RSA_METHOD\s0\fR based on an existing one, but with some differences.
  287. .PP
  288. \&\fBRSA_meth_free()\fR destroys an \fB\s-1RSA_METHOD\s0\fR structure and frees up any
  289. memory associated with it. If the argument is \s-1NULL,\s0 nothing is done.
  290. .PP
  291. \&\fBRSA_meth_get0_name()\fR will return a pointer to the name of this
  292. \&\s-1RSA_METHOD.\s0 This is a pointer to the internal name string and so
  293. should not be freed by the caller. \fBRSA_meth_set1_name()\fR sets the name
  294. of the \s-1RSA_METHOD\s0 to \fBname\fR. The string is duplicated and the copy is
  295. stored in the \s-1RSA_METHOD\s0 structure, so the caller remains responsible
  296. for freeing the memory associated with the name.
  297. .PP
  298. \&\fBRSA_meth_get_flags()\fR returns the current value of the flags associated
  299. with this \s-1RSA_METHOD.\s0 \fBRSA_meth_set_flags()\fR provides the ability to set
  300. these flags.
  301. .PP
  302. The functions \fBRSA_meth_get0_app_data()\fR and \fBRSA_meth_set0_app_data()\fR
  303. provide the ability to associate implementation specific data with the
  304. \&\s-1RSA_METHOD.\s0 It is the application's responsibility to free this data
  305. before the \s-1RSA_METHOD\s0 is freed via a call to \fBRSA_meth_free()\fR.
  306. .PP
  307. \&\fBRSA_meth_get_sign()\fR and \fBRSA_meth_set_sign()\fR get and set the function
  308. used for creating an \s-1RSA\s0 signature respectively. This function will be
  309. called in response to the application calling \fBRSA_sign()\fR. The
  310. parameters for the function have the same meaning as for \fBRSA_sign()\fR.
  311. .PP
  312. \&\fBRSA_meth_get_verify()\fR and \fBRSA_meth_set_verify()\fR get and set the
  313. function used for verifying an \s-1RSA\s0 signature respectively. This
  314. function will be called in response to the application calling
  315. \&\fBRSA_verify()\fR. The parameters for the function have the same meaning as
  316. for \fBRSA_verify()\fR.
  317. .PP
  318. \&\fBRSA_meth_get_mod_exp()\fR and \fBRSA_meth_set_mod_exp()\fR get and set the
  319. function used for \s-1CRT\s0 computations.
  320. .PP
  321. \&\fBRSA_meth_get_bn_mod_exp()\fR and \fBRSA_meth_set_bn_mod_exp()\fR get and set
  322. the function used for \s-1CRT\s0 computations, specifically the following
  323. value:
  324. .PP
  325. .Vb 1
  326. \& r = a ^ p mod m
  327. .Ve
  328. .PP
  329. Both the \fBmod_exp()\fR and \fBbn_mod_exp()\fR functions are called by the
  330. default OpenSSL method during encryption, decryption, signing and
  331. verification.
  332. .PP
  333. \&\fBRSA_meth_get_init()\fR and \fBRSA_meth_set_init()\fR get and set the function
  334. used for creating a new \s-1RSA\s0 instance respectively. This function will
  335. be called in response to the application calling \fBRSA_new()\fR (if the
  336. current default \s-1RSA_METHOD\s0 is this one) or \fBRSA_new_method()\fR. The
  337. \&\fBRSA_new()\fR and \fBRSA_new_method()\fR functions will allocate the memory for
  338. the new \s-1RSA\s0 object, and a pointer to this newly allocated structure
  339. will be passed as a parameter to the function. This function may be
  340. \&\s-1NULL.\s0
  341. .PP
  342. \&\fBRSA_meth_get_finish()\fR and \fBRSA_meth_set_finish()\fR get and set the
  343. function used for destroying an instance of an \s-1RSA\s0 object respectively.
  344. This function will be called in response to the application calling
  345. \&\fBRSA_free()\fR. A pointer to the \s-1RSA\s0 to be destroyed is passed as a
  346. parameter. The destroy function should be used for \s-1RSA\s0 implementation
  347. specific clean up. The memory for the \s-1RSA\s0 itself should not be freed
  348. by this function. This function may be \s-1NULL.\s0
  349. .PP
  350. \&\fBRSA_meth_get_keygen()\fR and \fBRSA_meth_set_keygen()\fR get and set the
  351. function used for generating a new \s-1RSA\s0 key pair respectively. This
  352. function will be called in response to the application calling
  353. \&\fBRSA_generate_key_ex()\fR. The parameter for the function has the same
  354. meaning as for \fBRSA_generate_key_ex()\fR.
  355. .PP
  356. \&\fBRSA_meth_get_multi_prime_keygen()\fR and \fBRSA_meth_set_multi_prime_keygen()\fR get
  357. and set the function used for generating a new multi-prime \s-1RSA\s0 key pair
  358. respectively. This function will be called in response to the application calling
  359. \&\fBRSA_generate_multi_prime_key()\fR. The parameter for the function has the same
  360. meaning as for \fBRSA_generate_multi_prime_key()\fR.
  361. .PP
  362. \&\fBRSA_meth_get_pub_enc()\fR, \fBRSA_meth_set_pub_enc()\fR,
  363. \&\fBRSA_meth_get_pub_dec()\fR, \fBRSA_meth_set_pub_dec()\fR,
  364. \&\fBRSA_meth_get_priv_enc()\fR, \fBRSA_meth_set_priv_enc()\fR,
  365. \&\fBRSA_meth_get_priv_dec()\fR, \fBRSA_meth_set_priv_dec()\fR get and set the
  366. functions used for public and private key encryption and decryption.
  367. These functions will be called in response to the application calling
  368. \&\fBRSA_public_encrypt()\fR, \fBRSA_private_decrypt()\fR, \fBRSA_private_encrypt()\fR and
  369. \&\fBRSA_public_decrypt()\fR and take the same parameters as those.
  370. .SH "RETURN VALUES"
  371. .IX Header "RETURN VALUES"
  372. \&\fBRSA_meth_new()\fR and \fBRSA_meth_dup()\fR return the newly allocated
  373. \&\s-1RSA_METHOD\s0 object or \s-1NULL\s0 on failure.
  374. .PP
  375. \&\fBRSA_meth_get0_name()\fR and \fBRSA_meth_get_flags()\fR return the name and
  376. flags associated with the \s-1RSA_METHOD\s0 respectively.
  377. .PP
  378. All other RSA_meth_get_*() functions return the appropriate function
  379. pointer that has been set in the \s-1RSA_METHOD,\s0 or \s-1NULL\s0 if no such
  380. pointer has yet been set.
  381. .PP
  382. RSA_meth_set1_name and all RSA_meth_set_*() functions return 1 on
  383. success or 0 on failure.
  384. .SH "SEE ALSO"
  385. .IX Header "SEE ALSO"
  386. \&\fBRSA_new\fR\|(3), \fBRSA_generate_key_ex\fR\|(3), \fBRSA_sign\fR\|(3),
  387. \&\fBRSA_set_method\fR\|(3), \fBRSA_size\fR\|(3), \fBRSA_get0_key\fR\|(3),
  388. \&\fBRSA_generate_multi_prime_key\fR\|(3)
  389. .SH "HISTORY"
  390. .IX Header "HISTORY"
  391. All of these functions were deprecated in OpenSSL 3.0.
  392. .PP
  393. \&\fBRSA_meth_get_multi_prime_keygen()\fR and \fBRSA_meth_set_multi_prime_keygen()\fR were
  394. added in OpenSSL 1.1.1.
  395. .PP
  396. Other functions described here were added in OpenSSL 1.1.0.
  397. .SH "COPYRIGHT"
  398. .IX Header "COPYRIGHT"
  399. Copyright 2016\-2024 The OpenSSL Project Authors. All Rights Reserved.
  400. .PP
  401. Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use
  402. this file except in compliance with the License. You can obtain a copy
  403. in the file \s-1LICENSE\s0 in the source distribution or at
  404. <https://www.openssl.org/source/license.html>.