blob: ce178af0be41d8c24f44b601341f884bca0ed6db [file] [log] [blame]
Ulf Möller4486d0c2000-01-22 20:05:23 +00001=pod
2
3=head1 NAME
4
Matt Caswellaafbe1c2013-06-12 23:42:08 +01005DH_generate_parameters_ex, DH_generate_parameters,
Richard Levitte6f8950a2017-01-15 18:20:49 +01006DH_check, DH_check_params - generate and check Diffie-Hellman
7parameters
Ulf Möller4486d0c2000-01-22 20:05:23 +00008
9=head1 SYNOPSIS
10
11 #include <openssl/dh.h>
12
Rich Salzaebb9aa2016-07-19 09:27:53 -040013 int DH_generate_parameters_ex(DH *dh, int prime_len, int generator, BN_GENCB *cb);
Ulf Möller4486d0c2000-01-22 20:05:23 +000014
15 int DH_check(DH *dh, int *codes);
Richard Levitte6f8950a2017-01-15 18:20:49 +010016 int DH_check_params(DH *dh, int *codes);
Ulf Möller4486d0c2000-01-22 20:05:23 +000017
Matt Caswellaafbe1c2013-06-12 23:42:08 +010018Deprecated:
19
Viktor Dukhovni98186eb2016-01-04 23:00:33 -050020 #if OPENSSL_API_COMPAT < 0x00908000L
Matt Caswellaafbe1c2013-06-12 23:42:08 +010021 DH *DH_generate_parameters(int prime_len, int generator,
22 void (*callback)(int, int, void *), void *cb_arg);
Viktor Dukhovni98186eb2016-01-04 23:00:33 -050023 #endif
Matt Caswellaafbe1c2013-06-12 23:42:08 +010024
Ulf Möller4486d0c2000-01-22 20:05:23 +000025=head1 DESCRIPTION
26
Matt Caswellaafbe1c2013-06-12 23:42:08 +010027DH_generate_parameters_ex() generates Diffie-Hellman parameters that can
28be shared among a group of users, and stores them in the provided B<DH>
29structure. The pseudo-random number generator must be
Ulf Möller4486d0c2000-01-22 20:05:23 +000030seeded prior to calling DH_generate_parameters().
31
32B<prime_len> is the length in bits of the safe prime to be generated.
Rich Salz1bc74512016-05-20 08:11:46 -040033B<generator> is a small number E<gt> 1, typically 2 or 5.
Ulf Möller4486d0c2000-01-22 20:05:23 +000034
35A callback function may be used to provide feedback about the progress
Matt Caswellaafbe1c2013-06-12 23:42:08 +010036of the key generation. If B<cb> is not B<NULL>, it will be
Rich Salz9b869742015-08-17 15:21:33 -040037called as described in L<BN_generate_prime(3)> while a random prime
Matt Caswellaafbe1c2013-06-12 23:42:08 +010038number is generated, and when a prime has been found, B<BN_GENCB_call(cb, 3, 0)>
Rich Salz9b869742015-08-17 15:21:33 -040039is called. See L<BN_generate_prime(3)> for information on
Matt Caswellaafbe1c2013-06-12 23:42:08 +010040the BN_GENCB_call() function.
Ulf Möller4486d0c2000-01-22 20:05:23 +000041
Richard Levitte6f8950a2017-01-15 18:20:49 +010042DH_check_params() confirms that the B<p> and B<g> are likely enough to
43be valid.
44This is a lightweight check, if a more thorough check is needed, use
45DH_check().
46The value of B<*codes> is updated with any problems found.
47If B<*codes> is zero then no problems were found, otherwise the
48following bits may be set:
49
50=over 4
51
52=item DH_CHECK_P_NOT_PRIME
53
54The parameter B<p> has been determined to not being an odd prime.
55Note that the lack of this bit doesn't guarantee that B<p> is a
56prime.
57
58=item DH_NOT_SUITABLE_GENERATOR
59
60The generator B<g> is not suitable.
61Note that the lack of this bit doesn't guarantee that B<g> is
62suitable, unless B<p> is known to be a strong prime.
63
64=back
65
Matt Caswelleeb21772016-05-27 13:26:03 +010066DH_check() confirms that the Diffie-Hellman parameters B<dh> are valid. The
67value of B<*codes> is updated with any problems found. If B<*codes> is zero then
68no problems were found, otherwise the following bits may be set:
69
70=over 4
71
72=item DH_CHECK_P_NOT_PRIME
73
74The parameter B<p> is not prime.
75
76=item DH_CHECK_P_NOT_SAFE_PRIME
77
78The parameter B<p> is not a safe prime and no B<q> value is present.
79
80=item DH_UNABLE_TO_CHECK_GENERATOR
81
82The generator B<g> cannot be checked for suitability.
83
84=item DH_NOT_SUITABLE_GENERATOR
85
86The generator B<g> is not suitable.
87
88=item DH_CHECK_Q_NOT_PRIME
89
90The parameter B<q> is not prime.
91
92=item DH_CHECK_INVALID_Q_VALUE
93
94The parameter B<q> is invalid.
95
96=item DH_CHECK_INVALID_J_VALUE
97
98The parameter B<j> is invalid.
99
100=back
Ulf Möller4486d0c2000-01-22 20:05:23 +0000101
102=head1 RETURN VALUES
103
Richard Levitte6f8950a2017-01-15 18:20:49 +0100104DH_generate_parameters_ex(), DH_check() and DH_check_params() return 1
105if the check could be performed, 0 otherwise.
Ulf Möller4486d0c2000-01-22 20:05:23 +0000106
Matt Caswellaafbe1c2013-06-12 23:42:08 +0100107DH_generate_parameters() (deprecated) returns a pointer to the DH structure, or
108NULL if the parameter generation fails.
109
Rich Salz9b869742015-08-17 15:21:33 -0400110The error codes can be obtained by L<ERR_get_error(3)>.
Ulf Möller4486d0c2000-01-22 20:05:23 +0000111
112=head1 NOTES
113
Matt Caswellaafbe1c2013-06-12 23:42:08 +0100114DH_generate_parameters_ex() and DH_generate_parameters() may run for several
115hours before finding a suitable prime.
Ulf Möller4486d0c2000-01-22 20:05:23 +0000116
Matt Caswellaafbe1c2013-06-12 23:42:08 +0100117The parameters generated by DH_generate_parameters_ex() and DH_generate_parameters()
118are not to be used in signature schemes.
Ulf Möller4486d0c2000-01-22 20:05:23 +0000119
Ulf Möller4486d0c2000-01-22 20:05:23 +0000120=head1 SEE ALSO
121
Richard Levitteb97fdb52016-11-11 09:33:09 +0100122L<DH_new(3)>, L<ERR_get_error(3)>, L<RAND_bytes(3)>,
Rich Salz9b869742015-08-17 15:21:33 -0400123L<DH_free(3)>
Ulf Möller4486d0c2000-01-22 20:05:23 +0000124
Rich Salze2f92612016-05-18 11:44:05 -0400125=head1 COPYRIGHT
126
127Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.
128
129Licensed under the OpenSSL license (the "License"). You may not use
130this file except in compliance with the License. You can obtain a copy
131in the file LICENSE in the source distribution or at
132L<https://www.openssl.org/source/license.html>.
133
134=cut