2000-01-12 06:35:21 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2016-06-21 19:03:34 +08:00
|
|
|
RSA_check_key_ex, RSA_check_key - validate private RSA keys
|
2000-01-12 06:35:21 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
|
2021-12-02 19:33:49 +08:00
|
|
|
The following functions have been deprecated since OpenSSL 3.0, and can be
|
|
|
|
hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
|
|
|
|
see L<openssl_user_macros(7)>:
|
2020-02-12 13:23:01 +08:00
|
|
|
|
2021-10-18 16:49:14 +08:00
|
|
|
int RSA_check_key_ex(const RSA *rsa, BN_GENCB *cb);
|
2014-08-15 04:47:13 +08:00
|
|
|
|
2021-10-18 16:49:14 +08:00
|
|
|
int RSA_check_key(const RSA *rsa);
|
2000-01-12 06:35:21 +08:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2020-02-12 13:23:01 +08:00
|
|
|
Both of the functions described on this page are deprecated.
|
|
|
|
Applications should instead use L<EVP_PKEY_public_check(3)>,
|
|
|
|
L<EVP_PKEY_private_check(3)> and L<EVP_PKEY_pairwise_check(3)>.
|
|
|
|
|
2014-08-15 04:47:13 +08:00
|
|
|
RSA_check_key_ex() function validates RSA keys.
|
|
|
|
It checks that B<p> and B<q> are
|
2000-01-12 06:35:21 +08:00
|
|
|
in fact prime, and that B<n = p*q>.
|
|
|
|
|
2014-08-15 04:47:13 +08:00
|
|
|
It does not work on RSA public keys that have only the modulus
|
|
|
|
and public exponent elements populated.
|
2000-01-12 21:59:20 +08:00
|
|
|
It also checks that B<d*e = 1 mod (p-1*q-1)>,
|
2000-01-12 06:35:21 +08:00
|
|
|
and that B<dmp1>, B<dmq1> and B<iqmp> are set correctly or are B<NULL>.
|
2014-08-15 04:47:13 +08:00
|
|
|
It performs integrity checks on all
|
|
|
|
the RSA key material, so the RSA key structure must contain all the private
|
|
|
|
key data too.
|
|
|
|
Therefore, it cannot be used with any arbitrary RSA key object,
|
|
|
|
even if it is otherwise fit for regular RSA operation.
|
|
|
|
|
|
|
|
The B<cb> parameter is a callback that will be invoked in the same
|
2015-08-18 03:21:33 +08:00
|
|
|
manner as L<BN_is_prime_ex(3)>.
|
2000-01-12 06:35:21 +08:00
|
|
|
|
2014-08-15 04:47:13 +08:00
|
|
|
RSA_check_key() is equivalent to RSA_check_key_ex() with a NULL B<cb>.
|
2000-01-12 06:35:21 +08:00
|
|
|
|
2017-12-25 17:50:39 +08:00
|
|
|
=head1 RETURN VALUES
|
2000-01-12 06:35:21 +08:00
|
|
|
|
2014-08-15 04:47:13 +08:00
|
|
|
RSA_check_key_ex() and RSA_check_key()
|
|
|
|
return 1 if B<rsa> is a valid RSA key, and 0 otherwise.
|
|
|
|
They return -1 if an error occurs while checking the key.
|
2000-01-12 06:35:21 +08:00
|
|
|
|
|
|
|
If the key is invalid or an error occurred, the reason code can be
|
2015-08-18 03:21:33 +08:00
|
|
|
obtained using L<ERR_get_error(3)>.
|
2000-01-12 06:35:21 +08:00
|
|
|
|
2002-07-19 03:10:57 +08:00
|
|
|
=head1 NOTES
|
|
|
|
|
2002-07-19 04:59:22 +08:00
|
|
|
Unlike most other RSA functions, this function does B<not> work
|
|
|
|
transparently with any underlying ENGINE implementation because it uses the
|
|
|
|
key data in the RSA structure directly. An ENGINE implementation can
|
|
|
|
override the way key data is stored and handled, and can even provide
|
|
|
|
support for HSM keys - in which case the RSA structure may contain B<no>
|
|
|
|
key data at all! If the ENGINE in question is only being used for
|
|
|
|
acceleration or analysis purposes, then in all likelihood the RSA key data
|
|
|
|
is complete and untouched, but this can't be assumed in the general case.
|
|
|
|
|
|
|
|
=head1 BUGS
|
|
|
|
|
|
|
|
A method of verifying the RSA key using opaque RSA API functions might need
|
|
|
|
to be considered. Right now RSA_check_key() simply uses the RSA structure
|
|
|
|
elements directly, bypassing the RSA_METHOD table altogether (and
|
|
|
|
completely violating encapsulation and object-orientation in the process).
|
|
|
|
The best fix will probably be to introduce a "check_key()" handler to the
|
|
|
|
RSA_METHOD function table so that alternative implementations can also
|
|
|
|
provide their own verifiers.
|
2002-07-19 03:10:57 +08:00
|
|
|
|
2000-01-12 06:35:21 +08:00
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-18 03:21:33 +08:00
|
|
|
L<BN_is_prime_ex(3)>,
|
|
|
|
L<ERR_get_error(3)>
|
2000-01-12 06:35:21 +08:00
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
2020-02-12 13:23:01 +08:00
|
|
|
All of these functions were deprecated in OpenSSL 3.0.
|
|
|
|
|
2014-08-15 04:47:13 +08:00
|
|
|
RSA_check_key_ex() appeared after OpenSSL 1.0.2.
|
2000-01-12 06:35:21 +08:00
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-04-23 20:55:52 +08:00
|
|
|
Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|