Lines Matching full:and
19 .\" \*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>.
34 .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
72 \&\- Routines for getting and setting data in an RSA object
79 The following functions have been deprecated since OpenSSL 3.0, and can be
120 An RSA object contains the components for the public and private key,
121 \&\fBn\fR, \fBe\fR, \fBd\fR, \fBp\fR, \fBq\fR, \fBdmp1\fR, \fBdmq1\fR and \fBiqmp\fR. \fBn\fR is
122 the modulus common to both public and private key, \fBe\fR is the public
123 exponent and \fBd\fR is the private exponent. \fBp\fR, \fBq\fR, \fBdmp1\fR,
124 \&\fBdmq1\fR and \fBiqmp\fR are the factors for the second representation of a
125 private key (see PKCS#1 section 3 Key Types), where \fBp\fR and \fBq\fR are
126 the first and second factor of \fBn\fR and \fBdmp1\fR, \fBdmq1\fR and \fBiqmp\fR
127 are the exponents and coefficient for CRT calculations.
131 and \fBt\fR. \fBr\fR is the additional prime besides \fBp\fR and \fBq\fR. \fBd\fR and
132 \&\fBt\fR are the exponent and coefficient for CRT calculations.
134 The \fBn\fR, \fBe\fR and \fBd\fR parameters can be obtained by calling
135 \&\fBRSA_get0_key()\fR. If they have not been set yet, then \fB*n\fR, \fB*e\fR and
138 representations of the values and therefore should not be freed
141 The \fBn\fR, \fBe\fR and \fBd\fR parameter values can be set by calling
142 \&\fBRSA_set0_key()\fR and passing the new values for \fBn\fR, \fBe\fR and \fBd\fR as
143 parameters to the function. The values \fBn\fR and \fBe\fR must be non-NULL
148 the RSA object, and therefore the values that have been passed in
151 In a similar fashion, the \fBp\fR and \fBq\fR parameters can be obtained and
152 set with \fBRSA_get0_factors()\fR and \fBRSA_set0_factors()\fR, and the \fBdmp1\fR,
153 \&\fBdmq1\fR and \fBiqmp\fR parameters can be obtained and set with
154 \&\fBRSA_get0_crt_params()\fR and \fBRSA_set0_crt_params()\fR.
156 For \fBRSA_get0_key()\fR, \fBRSA_get0_factors()\fR, and \fBRSA_get0_crt_params()\fR,
160 For multi-prime RSA, \fBRSA_get0_multi_prime_factors()\fR and \fBRSA_get0_multi_prime_params()\fR
161 can be used to obtain other primes and related CRT parameters. The
163 sets a collect of multi-prime 'triplet' members (prime, exponent and coefficient)
166 Any of the values \fBn\fR, \fBe\fR, \fBd\fR, \fBp\fR, \fBq\fR, \fBdmp1\fR, \fBdmq1\fR, and \fBiqmp\…
169 \&\fBRSA_get0_dmp1()\fR, \fBRSA_get0_dmq1()\fR, and \fBRSA_get0_iqmp()\fR, respectively.
189 in the call and may therefore \fInot\fR be passed to \fBRSA_set0_key()\fR. If
190 needed, duplicate the received value using \fBBN_dup()\fR and pass the
191 duplicate. The same applies to \fBRSA_get0_factors()\fR and \fBRSA_set0_factors()\fR
192 as well as \fBRSA_get0_crt_params()\fR and \fBRSA_set0_crt_params()\fR.
195 in advance and allocate sufficient buffer to store the return values before
196 calling \fBRSA_get0_multi_prime_factors()\fR and \fBRSA_get0_multi_prime_params()\fR.
199 triplets in RSA object \fBr\fR and assign the new set of triplets into it.
202 \&\fBRSA_set0_key()\fR, \fBRSA_set0_factors()\fR, \fBRSA_set0_crt_params()\fR and
206 \&\fBRSA_get0_dmp1()\fR, \fBRSA_get0_dmq1()\fR, and \fBRSA_get0_iqmp()\fR
212 \&\fBRSA_get0_multi_prime_factors()\fR and \fBRSA_get0_multi_prime_crt_params()\fR return
216 in use, which is 0 for traditional RSA and the number of extra primes for
219 \&\fBRSA_get_version()\fR returns \fBRSA_ASN1_VERSION_MULTI\fR for multi-prime RSA and