1 .\" $OpenBSD: RSA_get0_key.3,v 1.4 2018/03/23 23:18:17 schwarze Exp $
2 .\" selective merge up to: OpenSSL 665d899f Aug 2 02:19:43 2017 +0800
4 .\" This file was written by Richard Levitte <levitte@openssl.org>
5 .\" Copyright (c) 2016 The OpenSSL Project. All rights reserved.
7 .\" Redistribution and use in source and binary forms, with or without
8 .\" modification, are permitted provided that the following conditions
11 .\" 1. Redistributions of source code must retain the above copyright
12 .\" notice, this list of conditions and the following disclaimer.
14 .\" 2. Redistributions in binary form must reproduce the above copyright
15 .\" notice, this list of conditions and the following disclaimer in
16 .\" the documentation and/or other materials provided with the
19 .\" 3. All advertising materials mentioning features or use of this
20 .\" software must display the following acknowledgment:
21 .\" "This product includes software developed by the OpenSSL Project
22 .\" for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
24 .\" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
25 .\" endorse or promote products derived from this software without
26 .\" prior written permission. For written permission, please contact
27 .\" openssl-core@openssl.org.
29 .\" 5. Products derived from this software may not be called "OpenSSL"
30 .\" nor may "OpenSSL" appear in their names without prior written
31 .\" permission of the OpenSSL Project.
33 .\" 6. Redistributions of any form whatsoever must retain the following
35 .\" "This product includes software developed by the OpenSSL Project
36 .\" for use in the OpenSSL Toolkit (http://www.openssl.org/)"
38 .\" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
39 .\" EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
40 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
41 .\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
42 .\" ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
43 .\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
44 .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
45 .\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
46 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
47 .\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
48 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
49 .\" OF THE POSSIBILITY OF SUCH DAMAGE.
51 .Dd $Mdocdate: March 23 2018 $
57 .Nm RSA_get0_factors ,
58 .Nm RSA_set0_factors ,
59 .Nm RSA_get0_crt_params ,
60 .Nm RSA_set0_crt_params ,
64 .Nd get and set data in an RSA object
70 .Fa "const BIGNUM **n"
71 .Fa "const BIGNUM **e"
72 .Fa "const BIGNUM **d"
84 .Fa "const BIGNUM **p"
85 .Fa "const BIGNUM **q"
94 .Fo RSA_get0_crt_params
96 .Fa "const BIGNUM **dmp1"
97 .Fa "const BIGNUM **dmq1"
98 .Fa "const BIGNUM **iqmp"
101 .Fo RSA_set0_crt_params
125 object contains the components for the public and private key.
127 is the modulus common to both public and private key,
129 is the public exponent and
131 is the private exponent.
138 are the factors for the second representation of a private key
139 (see PKCS#1 section 3 Key Types), where
143 are the first and second factor of
149 are the exponents and coefficient for CRT calculations.
156 parameters can be obtained by calling
158 If they have not been set yet, then
165 Otherwise, they are set to pointers to the internal representations
166 of the values that should not be freed by the caller.
173 parameter values can be set by calling
181 the first time this function is called on a given
188 On subsequent calls, any of these values may be
190 which means that the corresponding field is left untouched.
191 Calling this function transfers the memory management of the values to
193 Therefore, the values that have been passed in
194 should not be freed by the caller.
196 In a similar fashion, the
200 parameters can be obtained and set with
203 .Fn RSA_set0_factors ,
209 parameters can be obtained and set with
210 .Fn RSA_get0_crt_params
212 .Fn RSA_set0_crt_params .
216 .Fn RSA_get0_factors ,
218 .Fn RSA_get0_crt_params ,
222 output arguments are permitted.
226 arguments but return values for other,
230 Values retrieved with
232 .Fn RSA_get0_factors ,
234 .Fn RSA_get0_crt_params
237 object used in the call and may therefore
241 .Fn RSA_set0_factors ,
243 .Fn RSA_set0_crt_params .
244 If needed, duplicate the received value using
246 and pass the duplicate.
263 any flags already set remain set.
264 For all three functions, multiple flags can be passed in one call,
265 OR'ed together bitwise.
268 .Fn RSA_set0_factors ,
270 .Fn RSA_set0_crt_params
271 return 1 on success or 0 on failure.
274 returns those of the given
278 or 0 if none of the given
282 .Xr RSA_check_key 3 ,
283 .Xr RSA_generate_key 3 ,
288 These functions first appeared in OpenSSL 1.1.0
289 and have been available since