Deleted Added
full compact
RSA_check_key.3 (100947) RSA_check_key.3 (110010)
1.\" Automatically generated by Pod::Man version 1.15
1.\" Automatically generated by Pod::Man version 1.15
2.\" Tue Jul 30 09:21:49 2002
2.\" Mon Jan 13 19:28:31 2003
3.\"
4.\" Standard preamble:
5.\" ======================================================================
6.de Sh \" Subsection heading
7.br
8.if t .Sp
9.ne 5
10.PP

--- 122 unchanged lines hidden (view full) ---

133. ds Th \o'LP'
134. ds ae ae
135. ds Ae AE
136.\}
137.rm #[ #] #H #V #F C
138.\" ======================================================================
139.\"
140.IX Title "RSA_check_key 3"
3.\"
4.\" Standard preamble:
5.\" ======================================================================
6.de Sh \" Subsection heading
7.br
8.if t .Sp
9.ne 5
10.PP

--- 122 unchanged lines hidden (view full) ---

133. ds Th \o'LP'
134. ds ae ae
135. ds Ae AE
136.\}
137.rm #[ #] #H #V #F C
138.\" ======================================================================
139.\"
140.IX Title "RSA_check_key 3"
141.TH RSA_check_key 3 "0.9.6e" "2002-07-30" "OpenSSL"
141.TH RSA_check_key 3 "0.9.7" "2003-01-13" "OpenSSL"
142.UC
143.SH "NAME"
144RSA_check_key \- validate private \s-1RSA\s0 keys
145.SH "SYNOPSIS"
146.IX Header "SYNOPSIS"
147.Vb 1
148\& #include <openssl/rsa.h>
149.Ve

--- 19 unchanged lines hidden (view full) ---

169If the key is invalid or an error occurred, the reason code can be
170obtained using ERR_get_error(3).
171.SH "NOTES"
172.IX Header "NOTES"
173This function does not work on \s-1RSA\s0 public keys that have only the modulus
174and public exponent elements populated. It performs integrity checks on all
175the \s-1RSA\s0 key material, so the \s-1RSA\s0 key structure must contain all the private
176key data too.
142.UC
143.SH "NAME"
144RSA_check_key \- validate private \s-1RSA\s0 keys
145.SH "SYNOPSIS"
146.IX Header "SYNOPSIS"
147.Vb 1
148\& #include <openssl/rsa.h>
149.Ve

--- 19 unchanged lines hidden (view full) ---

169If the key is invalid or an error occurred, the reason code can be
170obtained using ERR_get_error(3).
171.SH "NOTES"
172.IX Header "NOTES"
173This function does not work on \s-1RSA\s0 public keys that have only the modulus
174and public exponent elements populated. It performs integrity checks on all
175the \s-1RSA\s0 key material, so the \s-1RSA\s0 key structure must contain all the private
176key data too.
177.PP
178Unlike most other \s-1RSA\s0 functions, this function does \fBnot\fR work
179transparently with any underlying \s-1ENGINE\s0 implementation because it uses the
180key data in the \s-1RSA\s0 structure directly. An \s-1ENGINE\s0 implementation can
181override the way key data is stored and handled, and can even provide
182support for \s-1HSM\s0 keys \- in which case the \s-1RSA\s0 structure may contain \fBno\fR
183key data at all! If the \s-1ENGINE\s0 in question is only being used for
184acceleration or analysis purposes, then in all likelihood the \s-1RSA\s0 key data
185is complete and untouched, but this can't be assumed in the general case.
186.SH "BUGS"
187.IX Header "BUGS"
188A method of verifying the \s-1RSA\s0 key using opaque \s-1RSA\s0 \s-1API\s0 functions might need
189to be considered. Right now \fIRSA_check_key()\fR simply uses the \s-1RSA\s0 structure
190elements directly, bypassing the \s-1RSA_METHOD\s0 table altogether (and
191completely violating encapsulation and object-orientation in the process).
192The best fix will probably be to introduce a \*(L"\fIcheck_key()\fR\*(R" handler to the
193\&\s-1RSA_METHOD\s0 function table so that alternative implementations can also
194provide their own verifiers.
177.SH "SEE ALSO"
178.IX Header "SEE ALSO"
195.SH "SEE ALSO"
196.IX Header "SEE ALSO"
179rsa(3), err(3)
197rsa(3), ERR_get_error(3)
180.SH "HISTORY"
181.IX Header "HISTORY"
198.SH "HISTORY"
199.IX Header "HISTORY"
182\&\fIRSA_check()\fR appeared in OpenSSL 0.9.4.
200\&\fIRSA_check_key()\fR appeared in OpenSSL 0.9.4.