DSA_generate_parameters — generate DSA parameters
libcrypto.lib
#include <openssl/dsa.h>
DSA *DSA_generate_parameters(int bits, unsigned char *seed, int seed_len, int *counter_ret, unsigned long *h_ret, void (*callback)(int, int, void *), void *cb_arg);
DSA_generate_parameters()
generates primes p and q and a generator g
for use in the DSA.
bits is the length of the prime to be generated; the DSS allows a maximum of 1024 bits.
If seed is NULL or seed_len < 20, the primes will be generated at random. Otherwise, the seed is used to generate them. If the given seed does not yield a prime q, a new random seed is chosen and placed at seed.
DSA_generate_parameters()
places the iteration count in
*counter_ret and a counter used for finding a generator in
*h_ret, unless these are NULL.
A callback function may be used to provide feedback about the progress of the key generation. If callback is not NULL, it will be called as follows:
DSA_generate_parameters()
returns a pointer to the DSA structure, or
NULL if the parameter generation fails. The error codes can be
obtained by ERR_get_error().
Seed lengths > 20 are not supported.
dsa(), ERR_get_error(), rand(), DSA_free()
DSA_generate_parameters()
appeared in SSLeay 0.8. The cb_arg
argument was added in SSLeay 0.9.0.
In versions up to OpenSSL 0.9.4, callback(1, ...) was called
in the inner loop of the Miller-Rabin test whenever it reached the
squaring step (the parameters to callback did not reveal how many
witnesses had been tested); since OpenSSL 0.9.5, callback(1, ...)
is called as in BN_is_prime(), i.e. once for each witness
=cut
For additional information or queries on this page send feedback
© 2005-2007 Nokia |