Explain why RSA_check_key() doesn't work with hard keys.
PR: 86
This commit is contained in:
parent
73957bd323
commit
b61739874e
1 changed files with 10 additions and 1 deletions
|
@ -28,12 +28,21 @@ RSA_check_key() returns 1 if B<rsa> is a valid RSA key, and 0 otherwise.
|
||||||
If the key is invalid or an error occurred, the reason code can be
|
If the key is invalid or an error occurred, the reason code can be
|
||||||
obtained using L<ERR_get_error(3)|ERR_get_error(3)>.
|
obtained using L<ERR_get_error(3)|ERR_get_error(3)>.
|
||||||
|
|
||||||
|
=head1 NOTES
|
||||||
|
|
||||||
|
RSA_check_key() can only check soft keys. If given hard keys, i.e. keys
|
||||||
|
that were retreived from an ENGINE (with ENGINE_load_private_key()),
|
||||||
|
RSA_check_key() will always return 0, as if the key was invalid. The
|
||||||
|
reason is that the private components B<p>, B<q> and B<d> are normally
|
||||||
|
not available to OpenSSL for hard keys, and the checks can therefore not
|
||||||
|
be done.
|
||||||
|
|
||||||
=head1 SEE ALSO
|
=head1 SEE ALSO
|
||||||
|
|
||||||
L<rsa(3)|rsa(3)>, L<err(3)|err(3)>
|
L<rsa(3)|rsa(3)>, L<err(3)|err(3)>
|
||||||
|
|
||||||
=head1 HISTORY
|
=head1 HISTORY
|
||||||
|
|
||||||
RSA_check() appeared in OpenSSL 0.9.4.
|
RSA_check_key() appeared in OpenSSL 0.9.4.
|
||||||
|
|
||||||
=cut
|
=cut
|
||||||
|
|
Loading…
Reference in a new issue