DH_GENERATE_PARAMETERS - Online Linux Manual PageSection : 3ossl
Updated : 2022-03-15
Source : 3.0.2
Note : OpenSSL

NAMEDH_generate_parameters_ex, DH_generate_parameters, DH_check, DH_check_params, DH_check_ex, DH_check_params_ex, DH_check_pub_key_ex ​− generate and check Diffie−Hellman parameters

SYNOPSIS​ #include <openssl/dh.h> The following functions have been deprecated since OpenSSL 3.0, and can be hidden entirely by defining OPENSSL_API_COMPAT with a suitable version value, see openssl_user_macros(7): ​ int DH_generate_parameters_ex(DH *dh, int prime_len, int generator, BN_GENCB *cb); ​ ​ int DH_check(DH *dh, int *codes); ​ int DH_check_params(DH *dh, int *codes); ​ ​ int DH_check_ex(const DH *dh); ​ int DH_check_params_ex(const DH *dh); ​ int DH_check_pub_key_ex(const DH *dh, const BIGNUM *pub_key); The following functions have been deprecated since OpenSSL 0.9.8, and can be hidden entirely by defining OPENSSL_API_COMPAT with a suitable version value, see openssl_user_macros(7): ​ DH *DH_generate_parameters(int prime_len, int generator, ​ void (*callback)(int, int, void *), void *cb_arg);

DESCRIPTIONAll of the functions described on this page are deprecated. Applications should instead use EVP_PKEY_check(3), ​EVP_PKEY_public_check(3), EVP_PKEY_private_check(3) and ​EVP_PKEY_param_check(3). DH_generate_parameters_ex() generates Diffie-Hellman parameters that can be shared among a group of users, and stores them in the provided DH structure. The pseudo-random number generator must be seeded before calling it. The parameters generated by DH_generate_parameters_ex() should not be used in signature schemes. prime_len is the length in bits of the safe prime to be generated. ​generator is a small number > 1, typically 2 or 5. A callback function may be used to provide feedback about the progress of the key generation. If cb is not NULL, it will be called as described in BN_generate_prime(3) while a random prime number is generated, and when a prime has been found, BN_GENCB_call(cb, 3, 0) is called. See BN_generate_prime_ex(3) for information on the BN_GENCB_call() function. DH_generate_parameters() is similar to DH_generate_prime_ex() but expects an old-style callback function; see ​BN_generate_prime(3) for information on the old-style callback. DH_check_params() confirms that the p and g are likely enough to be valid. This is a lightweight check, if a more thorough check is needed, use ​DH_check(). The value of *codes is updated with any problems found. If *codes is zero then no problems were found, otherwise the following bits may be set: DH_CHECK_P_NOT_PRIME The parameter p has been determined to not being an odd prime. Note that the lack of this bit doesn't guarantee that p is a prime. DH_NOT_SUITABLE_GENERATOR The generator g is not suitable. Note that the lack of this bit doesn't guarantee that g is suitable, unless p is known to be a strong prime. DH_MODULUS_TOO_SMALL The modulus is too small. DH_MODULUS_TOO_LARGE The modulus is too large. DH_check() confirms that the Diffie-Hellman parameters dh are valid. The value of *codes is updated with any problems found. If *codes is zero then no problems were found, otherwise the following bits may be set: DH_CHECK_P_NOT_PRIME The parameter p is not prime. DH_CHECK_P_NOT_SAFE_PRIME The parameter p is not a safe prime and no q value is present. DH_UNABLE_TO_CHECK_GENERATOR The generator g cannot be checked for suitability. DH_NOT_SUITABLE_GENERATOR The generator g is not suitable. DH_CHECK_Q_NOT_PRIME The parameter q is not prime. DH_CHECK_INVALID_Q_VALUE The parameter q is invalid. DH_CHECK_INVALID_J_VALUE The parameter j is invalid. DH_check_ex(), DH_check_params() and DH_check_pub_key_ex() are similar to ​DH_check() and DH_check_params() respectively, but the error reasons are added to the thread's error queue instead of provided as return values from the function.

RETURN VALUESDH_generate_parameters_ex(), DH_check() and DH_check_params() return 1 if the check could be performed, 0 otherwise. DH_generate_parameters() returns a pointer to the DH structure or NULL if the parameter generation fails. DH_check_ex(), DH_check_params() and DH_check_pub_key_ex() return 1 if the check is successful, 0 for failed. The error codes can be obtained by ERR_get_error(3).

SEE ALSODH_new(3), ERR_get_error(3), RAND_bytes(3), ​DH_free(3)

HISTORYAll of these functions were deprecated in OpenSSL 3.0. DH_generate_parameters() was deprecated in OpenSSL 0.9.8; use ​DH_generate_parameters_ex() instead.

COPYRIGHTCopyright 2000−2021 The OpenSSL Project Authors. All Rights Reserved. Licensed under the Apache License 2.0 (the License). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.
0
Johanes Gumabo
Data Size   :   20,130 byte
man-DH_check.3osslBuild   :   2024-12-05, 20:55   :  
Visitor Screen   :   x
Visitor Counter ( page / site )   :   2 / 167,895
Visitor ID   :     :  
Visitor IP   :   18.116.118.214   :  
Visitor Provider   :   AMAZON-02   :  
Provider Position ( lat x lon )   :   39.962500 x -83.006100   :   x
Provider Accuracy Radius ( km )   :   1000   :  
Provider City   :   Columbus   :  
Provider Province   :   Ohio ,   :   ,
Provider Country   :   United States   :  
Provider Continent   :   North America   :  
Visitor Recorder   :   Version   :  
Visitor Recorder   :   Library   :  
Online Linux Manual Page   :   Version   :   Online Linux Manual Page - Fedora.40 - march=x86-64 - mtune=generic - 24.12.05
Online Linux Manual Page   :   Library   :   lib_c - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Online Linux Manual Page   :   Library   :   lib_m - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Data Base   :   Version   :   Online Linux Manual Page Database - 24.04.13 - march=x86-64 - mtune=generic - fedora-38
Data Base   :   Library   :   lib_c - 23.02.07 - march=x86-64 - mtune=generic - fedora.36

Very long time ago, I have the best tutor, Wenzel Svojanovsky . If someone knows the email address of Wenzel Svojanovsky , please send an email to johanes_gumabo@yahoo.co.id .
If error, please print screen and send to johanes_gumabo@yahoo.co.id
Under development. Support me via PayPal.

ERROR : Need New Coding :         (parse_manual_page_|249|D___H_check.3ossl|36/37|el══─{─══.|.el══─{─══. ds -- \|\(em\| )         (htmlprn|149|D___H_check.3ossl|36/37|.el══─{─══. ds --  —  |.el══─{─══. ds -- \|\(em\| )         (parse_manual_page_|249|D___H_check.3ossl|43|br══─}─══|'br══─}─══ )         (htmlprn|149|D___H_check.3ossl|43|'br══─}─══ |'br══─}─══ )