Lines Matching full:and

18 .\" Set up some character translations and predefined strings.  \*(-- will
20 .\" double quote, and \*(R" will give a right double quote. \*(C+ will
21 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
22 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
50 .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
72 . \" fudge factors for nroff and troff
87 . \" simple accents for nroff and troff
104 . \" troff and (daisy-wheel) nroff accents
117 . \" for low resolution devices (crt and lpr)
148 \&\- Routines for getting and setting data in an RSA object
155 The following functions have been deprecated since OpenSSL 3.0, and can be
196 An \s-1RSA\s0 object contains the components for the public and private key,
197 \&\fBn\fR, \fBe\fR, \fBd\fR, \fBp\fR, \fBq\fR, \fBdmp1\fR, \fBdmq1\fR and \fBiqmp\fR. \fBn\fR is
198 the modulus common to both public and private key, \fBe\fR is the public
199 exponent and \fBd\fR is the private exponent. \fBp\fR, \fBq\fR, \fBdmp1\fR,
200 \&\fBdmq1\fR and \fBiqmp\fR are the factors for the second representation of a
201 private key (see PKCS#1 section 3 Key Types), where \fBp\fR and \fBq\fR are
202 the first and second factor of \fBn\fR and \fBdmp1\fR, \fBdmq1\fR and \fBiqmp\fR
203 are the exponents and coefficient for \s-1CRT\s0 calculations.
207 and \fBt\fR. \fBr\fR is the additional prime besides \fBp\fR and \fBq\fR. \fBd\fR and
208 \&\fBt\fR are the exponent and coefficient for \s-1CRT\s0 calculations.
210 The \fBn\fR, \fBe\fR and \fBd\fR parameters can be obtained by calling
211 \&\fBRSA_get0_key()\fR. If they have not been set yet, then \fB*n\fR, \fB*e\fR and
214 representations of the values and therefore should not be freed
217 The \fBn\fR, \fBe\fR and \fBd\fR parameter values can be set by calling
218 \&\fBRSA_set0_key()\fR and passing the new values for \fBn\fR, \fBe\fR and \fBd\fR as
219 parameters to the function. The values \fBn\fR and \fBe\fR must be non-NULL
224 the \s-1RSA\s0 object, and therefore the values that have been passed in
227 In a similar fashion, the \fBp\fR and \fBq\fR parameters can be obtained and
228 set with \fBRSA_get0_factors()\fR and \fBRSA_set0_factors()\fR, and the \fBdmp1\fR,
229 \&\fBdmq1\fR and \fBiqmp\fR parameters can be obtained and set with
230 \&\fBRSA_get0_crt_params()\fR and \fBRSA_set0_crt_params()\fR.
232 For \fBRSA_get0_key()\fR, \fBRSA_get0_factors()\fR, and \fBRSA_get0_crt_params()\fR,
236 For multi-prime \s-1RSA,\s0 \fBRSA_get0_multi_prime_factors()\fR and \fBRSA_get0_multi_prime_params…
237 can be used to obtain other primes and related \s-1CRT\s0 parameters. The
239 sets a collect of multi-prime 'triplet' members (prime, exponent and coefficient)
242 Any of the values \fBn\fR, \fBe\fR, \fBd\fR, \fBp\fR, \fBq\fR, \fBdmp1\fR, \fBdmq1\fR, and \fBiqmp\…
245 \&\fBRSA_get0_dmp1()\fR, \fBRSA_get0_dmq1()\fR, and \fBRSA_get0_iqmp()\fR, respectively.
265 in the call and may therefore \fInot\fR be passed to \fBRSA_set0_key()\fR. If
266 needed, duplicate the received value using \fBBN_dup()\fR and pass the
267 duplicate. The same applies to \fBRSA_get0_factors()\fR and \fBRSA_set0_factors()\fR
268 as well as \fBRSA_get0_crt_params()\fR and \fBRSA_set0_crt_params()\fR.
271 in advance and allocate sufficient buffer to store the return values before
272 calling \fBRSA_get0_multi_prime_factors()\fR and \fBRSA_get0_multi_prime_params()\fR.
275 triplets in \s-1RSA\s0 object \fBr\fR and assign the new set of triplets into it.
278 \&\fBRSA_set0_key()\fR, \fBRSA_set0_factors()\fR, \fBRSA_set0_crt_params()\fR and
282 \&\fBRSA_get0_dmp1()\fR, \fBRSA_get0_dmq1()\fR, and \fBRSA_get0_iqmp()\fR
288 \&\fBRSA_get0_multi_prime_factors()\fR and \fBRSA_get0_multi_prime_crt_params()\fR return
292 in use, which is 0 for traditional \s-1RSA\s0 and the number of extra primes for
295 \&\fBRSA_get_version()\fR returns \fB\s-1RSA_ASN1_VERSION_MULTI\s0\fR for multi-prime \s-1RSA\s0 and