"Fossies" - the Fresh Open Source Software Archive

Member "openssl-1.0.2r/doc/crypto/DSA_generate_parameters.pod" (26 Feb 2019, 3917 Bytes) of package /linux/misc/openssl-1.0.2r.tar.gz:

Caution: As a special service "Fossies" has tried to format the requested pod source page into HTML format but links to other pod pages may be missing or even errorneous. Alternatively you can here view or download the uninterpreted pod source code. A member file download can also be achieved by clicking within a package contents listing on the according byte size field. See also the last Fossies "Diffs" side-by-side code changes report for "DSA_generate_parameters.pod": 1.1.0i_vs_1.1.1.


DSA_generate_parameters_ex, DSA_generate_parameters - generate DSA parameters


 #include <openssl/dsa.h>

 int DSA_generate_parameters_ex(DSA *dsa, int bits,
                const unsigned char *seed,int seed_len,
                int *counter_ret, unsigned long *h_ret, BN_GENCB *cb);


 DSA *DSA_generate_parameters(int bits, unsigned char *seed,
                int seed_len, int *counter_ret, unsigned long *h_ret,
                void (*callback)(int, int, void *), void *cb_arg);


DSA_generate_parameters_ex() generates primes p and q and a generator g for use in the DSA and stores the result in dsa.

bits is the length of the prime to be generated; the DSS allows a maximum of 1024 bits.

If seed is NULL or seed_len < 20, the primes will be generated at random. Otherwise, the seed is used to generate them. If the given seed does not yield a prime q, a new random seed is chosen.

DSA_generate_parameters_ex() places the iteration count in *counter_ret and a counter used for finding a generator in *h_ret, unless these are NULL.

A callback function may be used to provide feedback about the progress of the key generation. If cb is not NULL, it will be called as shown below. For information on the BN_GENCB structure and the BN_GENCB_call function discussed below, refer to BN_generate_prime(3).

DSA_generate_parameters() (deprecated) works in much the same way as for DSA_generate_parameters_ex, except that no dsa parameter is passed and instead a newly allocated DSA structure is returned. Additionally "old style" callbacks are used instead of the newer BN_GENCB based approach. Refer to BN_generate_prime(3) for further information.


DSA_generate_parameters_ex() returns a 1 on success, or 0 otherwise.

DSA_generate_parameters() returns a pointer to the DSA structure, or NULL if the parameter generation fails.

The error codes can be obtained by ERR_get_error(3).


Seed lengths > 20 are not supported.


dsa(3), ERR_get_error(3), rand(3), DSA_free(3), BN_generate_prime(3)


DSA_generate_parameters() appeared in SSLeay 0.8. The cb_arg argument was added in SSLeay 0.9.0. In versions up to OpenSSL 0.9.4, callback(1, ...) was called in the inner loop of the Miller-Rabin test whenever it reached the squaring step (the parameters to callback did not reveal how many witnesses had been tested); since OpenSSL 0.9.5, callback(1, ...) is called as in BN_is_prime(3), i.e. once for each witness.