DH_generate_parameters.pod 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. =pod
  2. =head1 NAME
  3. DH_generate_parameters_ex, DH_generate_parameters,
  4. DH_check, DH_check_params,
  5. DH_check_ex, DH_check_params_ex, DH_check_pub_key_ex
  6. - generate and check Diffie-Hellman
  7. parameters
  8. =head1 SYNOPSIS
  9. #include <openssl/dh.h>
  10. The following functions have been deprecated since OpenSSL 3.0, and can be
  11. hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
  12. see L<openssl_user_macros(7)>:
  13. int DH_generate_parameters_ex(DH *dh, int prime_len, int generator, BN_GENCB *cb);
  14. int DH_check(DH *dh, int *codes);
  15. int DH_check_params(DH *dh, int *codes);
  16. int DH_check_ex(const DH *dh);
  17. int DH_check_params_ex(const DH *dh);
  18. int DH_check_pub_key_ex(const DH *dh, const BIGNUM *pub_key);
  19. The following functions have been deprecated since OpenSSL 0.9.8, and can be
  20. hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
  21. see L<openssl_user_macros(7)>:
  22. DH *DH_generate_parameters(int prime_len, int generator,
  23. void (*callback)(int, int, void *), void *cb_arg);
  24. =head1 DESCRIPTION
  25. All of the functions described on this page are deprecated.
  26. Applications should instead use L<EVP_PKEY_check(3)>,
  27. L<EVP_PKEY_public_check(3)>, L<EVP_PKEY_private_check(3)> and
  28. L<EVP_PKEY_param_check(3)>.
  29. DH_generate_parameters_ex() generates Diffie-Hellman parameters that can
  30. be shared among a group of users, and stores them in the provided B<DH>
  31. structure. The pseudo-random number generator must be
  32. seeded before calling it.
  33. The parameters generated by DH_generate_parameters_ex() should not be used in
  34. signature schemes.
  35. B<prime_len> is the length in bits of the safe prime to be generated.
  36. B<generator> is a small number E<gt> 1, typically 2 or 5.
  37. A callback function may be used to provide feedback about the progress
  38. of the key generation. If B<cb> is not B<NULL>, it will be
  39. called as described in L<BN_generate_prime(3)> while a random prime
  40. number is generated, and when a prime has been found, B<BN_GENCB_call(cb, 3, 0)>
  41. is called. See L<BN_generate_prime_ex(3)> for information on
  42. the BN_GENCB_call() function.
  43. DH_generate_parameters() is similar to DH_generate_prime_ex() but
  44. expects an old-style callback function; see
  45. L<BN_generate_prime(3)> for information on the old-style callback.
  46. DH_check_params() confirms that the B<p> and B<g> are likely enough to
  47. be valid.
  48. This is a lightweight check, if a more thorough check is needed, use
  49. DH_check().
  50. The value of B<*codes> is updated with any problems found.
  51. If B<*codes> is zero then no problems were found, otherwise the
  52. following bits may be set:
  53. =over 4
  54. =item DH_CHECK_P_NOT_PRIME
  55. The parameter B<p> has been determined to not being an odd prime.
  56. Note that the lack of this bit doesn't guarantee that B<p> is a
  57. prime.
  58. =item DH_NOT_SUITABLE_GENERATOR
  59. The generator B<g> is not suitable.
  60. Note that the lack of this bit doesn't guarantee that B<g> is
  61. suitable, unless B<p> is known to be a strong prime.
  62. =item DH_MODULUS_TOO_SMALL
  63. The modulus is too small.
  64. =item DH_MODULUS_TOO_LARGE
  65. The modulus is too large.
  66. =back
  67. DH_check() confirms that the Diffie-Hellman parameters B<dh> are valid. The
  68. value of B<*codes> is updated with any problems found. If B<*codes> is zero then
  69. no problems were found, otherwise the following bits may be set:
  70. =over 4
  71. =item DH_CHECK_P_NOT_PRIME
  72. The parameter B<p> is not prime.
  73. =item DH_CHECK_P_NOT_SAFE_PRIME
  74. The parameter B<p> is not a safe prime and no B<q> value is present.
  75. =item DH_UNABLE_TO_CHECK_GENERATOR
  76. The generator B<g> cannot be checked for suitability.
  77. =item DH_NOT_SUITABLE_GENERATOR
  78. The generator B<g> is not suitable.
  79. =item DH_CHECK_Q_NOT_PRIME
  80. The parameter B<q> is not prime.
  81. =item DH_CHECK_INVALID_Q_VALUE
  82. The parameter B<q> is invalid.
  83. =item DH_CHECK_INVALID_J_VALUE
  84. The parameter B<j> is invalid.
  85. =back
  86. DH_check_ex(), DH_check_params() and DH_check_pub_key_ex() are similar to
  87. DH_check() and DH_check_params() respectively, but the error reasons are added
  88. to the thread's error queue instead of provided as return values from the
  89. function.
  90. =head1 RETURN VALUES
  91. DH_generate_parameters_ex(), DH_check() and DH_check_params() return 1
  92. if the check could be performed, 0 otherwise.
  93. DH_generate_parameters() returns a pointer to the DH structure or NULL if
  94. the parameter generation fails.
  95. DH_check_ex(), DH_check_params() and DH_check_pub_key_ex() return 1 if the
  96. check is successful, 0 for failed.
  97. The error codes can be obtained by L<ERR_get_error(3)>.
  98. =head1 SEE ALSO
  99. L<DH_new(3)>, L<ERR_get_error(3)>, L<RAND_bytes(3)>,
  100. L<DH_free(3)>
  101. =head1 HISTORY
  102. All of these functions were deprecated in OpenSSL 3.0.
  103. DH_generate_parameters() was deprecated in OpenSSL 0.9.8; use
  104. DH_generate_parameters_ex() instead.
  105. =head1 COPYRIGHT
  106. Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
  107. Licensed under the Apache License 2.0 (the "License"). You may not use
  108. this file except in compliance with the License. You can obtain a copy
  109. in the file LICENSE in the source distribution or at
  110. L<https://www.openssl.org/source/license.html>.
  111. =cut