DSA_SIGN - Online Linux Manual PageSection : 3
Updated : 2021-03-26
Source : 1.1.1k
Note : OpenSSL

NAMEDSA_sign, DSA_sign_setup, DSA_verify − DSA signatures

SYNOPSIS​ #include <openssl/dsa.h> ​ ​ int DSA_sign(int type, const unsigned char *dgst, int len, ​ unsigned char *sigret, unsigned int *siglen, DSA *dsa); ​ ​ int DSA_sign_setup(DSA *dsa, BN_CTX *ctx, BIGNUM **kinvp, BIGNUM **rp); ​ ​ int DSA_verify(int type, const unsigned char *dgst, int len, ​ unsigned char *sigbuf, int siglen, DSA *dsa);

DESCRIPTIONDSA_sign() computes a digital signature on the len byte message digest dgst using the private key dsa and places its ASN.1 DER encoding at sigret. The length of the signature is places in *siglen. sigret must point to DSA_size(dsa) bytes of memory. DSA_sign_setup() is defined only for backward binary compatibility and should not be used. Since OpenSSL 1.1.0 the DSA type is opaque and the output of ​DSA_sign_setup() cannot be used anyway: calling this function will only cause overhead, and does not affect the actual signature (pre−)computation. DSA_verify() verifies that the signature sigbuf of size siglen matches a given message digest dgst of size len. ​dsa is the signer's public key. The type parameter is ignored. The random generator must be seeded when DSA_sign() (or DSA_sign_setup()) is called. If the automatic seeding or reseeding of the OpenSSL CSPRNG fails due to external circumstances (see RAND(7)), the operation will fail.

RETURN VALUESDSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. ​DSA_verify() returns 1 for a valid signature, 0 for an incorrect signature and −1 on error. The error codes can be obtained by ​ERR_get_error(3).

CONFORMING TOUS Federal Information Processing Standard FIPS 186 (Digital Signature Standard, DSS), ANSI X9.30

SEE ALSODSA_new(3), ERR_get_error(3), RAND_bytes(3), ​DSA_do_sign(3), ​RAND(7)

COPYRIGHTCopyright 2000−2019 The OpenSSL Project Authors. All Rights Reserved. Licensed under the OpenSSL license (the License). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.
0
Johanes Gumabo
Data Size   :   9,478 byte
man-D___SA_sign.3sslBuild   :   2024-12-05, 20:55   :  
Visitor Screen   :   x
Visitor Counter ( page / site )   :   3 / 165,283
Visitor ID   :     :  
Visitor IP   :   3.142.174.8   :  
Visitor Provider   :   AMAZON-02   :  
Provider Position ( lat x lon )   :   39.962500 x -83.006100   :   x
Provider Accuracy Radius ( km )   :   1000   :  
Provider City   :   Columbus   :  
Provider Province   :   Ohio ,   :   ,
Provider Country   :   United States   :  
Provider Continent   :   North America   :  
Visitor Recorder   :   Version   :  
Visitor Recorder   :   Library   :  
Online Linux Manual Page   :   Version   :   Online Linux Manual Page - Fedora.40 - march=x86-64 - mtune=generic - 24.12.05
Online Linux Manual Page   :   Library   :   lib_c - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Online Linux Manual Page   :   Library   :   lib_m - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Data Base   :   Version   :   Online Linux Manual Page Database - 24.04.13 - march=x86-64 - mtune=generic - fedora-38
Data Base   :   Library   :   lib_c - 23.02.07 - march=x86-64 - mtune=generic - fedora.36

Very long time ago, I have the best tutor, Wenzel Svojanovsky . If someone knows the email address of Wenzel Svojanovsky , please send an email to johanes_gumabo@yahoo.co.id .
If error, please print screen and send to johanes_gumabo@yahoo.co.id
Under development. Support me via PayPal.

ERROR : Need New Coding :         (parse_manual_page_|249|D___SA_sign.3ssl|36/37|el══─{─══.|.el══─{─══. ds -- \|\(em\| )         (htmlprn|149|D___SA_sign.3ssl|36/37|.el══─{─══. ds --  —  |.el══─{─══. ds -- \|\(em\| )         (parse_manual_page_|249|D___SA_sign.3ssl|43|br══─}─══|'br══─}─══ )         (htmlprn|149|D___SA_sign.3ssl|43|'br══─}─══ |'br══─}─══ )