1 .\" $NetBSD: libcrypto.pl,v 1.3 2007/11/27 22:16:03 christos Exp $
3 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)
6 .\" ========================================================================
7 .de Sh \" Subsection heading
15 .de Sp \" Vertical space (when we can't use .PP)
19 .de Vb \" Begin verbatim text
24 .de Ve \" End verbatim text
28 .\" Set up some character translations and predefined strings. \*(-- will
29 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
30 .\" double quote, and \*(R" will give a right double quote. \*(C+ will
31 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
32 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
33 .\" nothing in troff, for use with C<>.
35 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
39 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
40 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
53 .\" Escape single quotes in literal strings from groff's Unicode transform.
57 .\" If the F register is turned on, we'll generate index entries on stderr for
58 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index
59 .\" entries marked with X<> in POD. Of course, you'll have to process the
60 .\" output yourself in some meaningful fashion.
63 . tm Index:\\$1\t\\n%\t"\\$2"
73 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
74 .\" Fear. Run. Save yourself. No user-serviceable parts.
75 . \" fudge factors for nroff and troff
84 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
90 . \" simple accents for nroff and troff
100 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
101 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
102 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
103 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
104 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
105 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
107 . \" troff and (daisy-wheel) nroff accents
108 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
109 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
110 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
111 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
112 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
113 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
114 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
115 .ds ae a\h'-(\w'a'u*4/10)'e
116 .ds Ae A\h'-(\w'A'u*4/10)'E
117 . \" corrections for vroff
118 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
119 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
120 . \" for low resolution devices (crt and lpr)
121 .if \n(.H>23 .if \n(.V>19 \
134 .\" ========================================================================
136 .IX Title "RSA_check_key 3"
137 .TH RSA_check_key 3 "2002-09-25" "1.1.0-dev" "OpenSSL"
138 .\" For nroff, turn off justification. Always turn off hyphenation; it makes
139 .\" way too many mistakes in technical documents.
143 RSA_check_key \- validate private RSA keys
147 .IX Header "SYNOPSIS"
149 \& #include <openssl/rsa.h>
151 \& int RSA_check_key(RSA *rsa);
154 .IX Header "DESCRIPTION"
155 This function validates \s-1RSA\s0 keys. It checks that \fBp\fR and \fBq\fR are
156 in fact prime, and that \fBn = p*q\fR.
158 It also checks that \fBd*e = 1 mod (p\-1*q\-1)\fR,
159 and that \fBdmp1\fR, \fBdmq1\fR and \fBiqmp\fR are set correctly or are \fB\s-1NULL\s0\fR.
161 As such, this function can not be used with any arbitrary \s-1RSA\s0 key object,
162 even if it is otherwise fit for regular \s-1RSA\s0 operation. See \fB\s-1NOTES\s0\fR for more
165 .IX Header "RETURN VALUE"
166 \&\fIRSA_check_key()\fR returns 1 if \fBrsa\fR is a valid \s-1RSA\s0 key, and 0 otherwise.
167 \&\-1 is returned if an error occurs while checking the key.
169 If the key is invalid or an error occurred, the reason code can be
170 obtained using \fIERR_get_error\fR\|(3).
173 This function does not work on \s-1RSA\s0 public keys that have only the modulus
174 and public exponent elements populated. It performs integrity checks on all
175 the \s-1RSA\s0 key material, so the \s-1RSA\s0 key structure must contain all the private
178 Unlike most other \s-1RSA\s0 functions, this function does \fBnot\fR work
179 transparently with any underlying \s-1ENGINE\s0 implementation because it uses the
180 key data in the \s-1RSA\s0 structure directly. An \s-1ENGINE\s0 implementation can
181 override the way key data is stored and handled, and can even provide
182 support for \s-1HSM\s0 keys \- in which case the \s-1RSA\s0 structure may contain \fBno\fR
183 key data at all! If the \s-1ENGINE\s0 in question is only being used for
184 acceleration or analysis purposes, then in all likelihood the \s-1RSA\s0 key data
185 is complete and untouched, but this can't be assumed in the general case.
188 A method of verifying the \s-1RSA\s0 key using opaque \s-1RSA\s0 \s-1API\s0 functions might need
189 to be considered. Right now \fIRSA_check_key()\fR simply uses the \s-1RSA\s0 structure
190 elements directly, bypassing the \s-1RSA_METHOD\s0 table altogether (and
191 completely violating encapsulation and object-orientation in the process).
192 The best fix will probably be to introduce a \*(L"\fIcheck_key()\fR\*(R" handler to the
193 \&\s-1RSA_METHOD\s0 function table so that alternative implementations can also
194 provide their own verifiers.
196 .IX Header "SEE ALSO"
197 \&\fIopenssl_rsa\fR\|(3), \fIERR_get_error\fR\|(3)
200 \&\fIRSA_check_key()\fR appeared in OpenSSL 0.9.4.