DOC HOME SITE MAP MAN PAGES GNU INFO SEARCH PRINT BOOK
 

/usr/man/cat.3/BN_generate_prime.3




BN_generate_prime(3)         OpenSSL         BN_generate_prime(3)


NAME

     BN_generate_prime_ex, BN_is_prime_ex,
     BN_is_prime_fasttest_ex, BN_GENCB_call, BN_GENCB_set_old,
     BN_GENCB_set, BN_generate_prime, BN_is_prime,
     BN_is_prime_fasttest - generate primes and test for
     primality


SYNOPSIS

      #include <openssl/bn.h>

      int BN_generate_prime_ex(BIGNUM *ret,int bits,int safe, const BIGNUM *add,
          const BIGNUM *rem, BN_GENCB *cb);

      int BN_is_prime_ex(const BIGNUM *p,int nchecks, BN_CTX *ctx, BN_GENCB *cb);

      int BN_is_prime_fasttest_ex(const BIGNUM *p,int nchecks, BN_CTX *ctx,
          int do_trial_division, BN_GENCB *cb);

      int BN_GENCB_call(BN_GENCB *cb, int a, int b);

      #define BN_GENCB_set_old(gencb, callback, cb_arg) ...

      #define BN_GENCB_set(gencb, callback, cb_arg) ...

     Deprecated:

      BIGNUM *BN_generate_prime(BIGNUM *ret, int num, int safe, BIGNUM *add,
          BIGNUM *rem, void (*callback)(int, int, void *), void *cb_arg);

      int BN_is_prime(const BIGNUM *a, int checks, void (*callback)(int, int,
          void *), BN_CTX *ctx, void *cb_arg);

      int BN_is_prime_fasttest(const BIGNUM *a, int checks,
          void (*callback)(int, int, void *), BN_CTX *ctx, void *cb_arg,
          int do_trial_division);


DESCRIPTION

     BN_generate_prime_ex() generates a pseudo-random prime
     number of bit length bits.  If ret is not NULL, it will be
     used to store the number.

     If cb is not NULL, it is used as follows:

     o   BN_GENCB_call(cb, 0, i) is called after generating the
         i-th potential prime number.

     o   While the number is being tested for primality,
         BN_GENCB_call(cb, 1, j) is called as described below.

     o   When a prime has been found, BN_GENCB_call(cb, 2, i) is
         called.

1.0.2t               Last change: 2019-09-10                    1

BN_generate_prime(3)         OpenSSL         BN_generate_prime(3)

     The prime may have to fulfill additional requirements for
     use in Diffie-Hellman key exchange:

     If add is not NULL, the prime will fulfill the condition p %
     add == rem (p % add == 1 if rem == NULL) in order to suit a
     given generator.

     If safe is true, it will be a safe prime (i.e. a prime p so
     that (p-1)/2 is also prime).

     The PRNG must be seeded prior to calling
     BN_generate_prime_ex().  The prime number generation has a
     negligible error probability.

     BN_is_prime_ex() and BN_is_prime_fasttest_ex() test if the
     number p is prime.  The following tests are performed until
     one of them shows that p is composite; if p passes all these
     tests, it is considered prime.

     BN_is_prime_fasttest_ex(), when called with
     do_trial_division == 1, first attempts trial division by a
     number of small primes; if no divisors are found by this
     test and cb is not NULL, BN_GENCB_call(cb, 1, -1) is called.
     If do_trial_division == 0, this test is skipped.

     Both BN_is_prime_ex() and BN_is_prime_fasttest_ex() perform
     a Miller-Rabin probabilistic primality test with nchecks
     iterations. If nchecks == BN_prime_checks, a number of
     iterations is used that yields a false positive rate of at
     most 2^-64 for random input.  The error rate depends on the
     size of the prime and goes down for bigger primes.  The rate
     is 2^-80 starting at 308 bits, 2^-112 at 852 bits, 2^-128 at
     1080 bits, 2^-192 at 3747 bits and 2^-256 at 6394 bits.

     When the source of the prime is not random or not trusted,
     the number of checks needs to be much higher to reach the
     same level of assurance:  It should equal half of the
     targeted security level in bits (rounded up to the next
     integer if necessary).  For instance, to reach the 128 bit
     security level, nchecks should be set to 64.

     If cb is not NULL, BN_GENCB_call(cb, 1, j) is called after
     the j-th iteration (j = 0, 1, ...). ctx is a pre-allocated
     BN_CTX (to save the overhead of allocating and freeing the
     structure in a loop), or NULL.

     BN_GENCB_call calls the callback function held in the
     BN_GENCB structure and passes the ints a and b as arguments.
     There are two types of BN_GENCB structure that are
     supported: "new" style and "old" style. New programs should
     prefer the "new" style, whilst the "old" style is provided
     for backwards compatibility purposes.

1.0.2t               Last change: 2019-09-10                    2

BN_generate_prime(3)         OpenSSL         BN_generate_prime(3)

     For "new" style callbacks a BN_GENCB structure should be
     initialised with a call to BN_GENCB_set, where gencb is a
     BN_GENCB *, callback is of type int (*callback)(int, int,
     BN_GENCB *) and cb_arg is a void *.  "Old" style callbacks
     are the same except they are initialised with a call to
     BN_GENCB_set_old and callback is of type void
     (*callback)(int, int, void *).

     A callback is invoked through a call to BN_GENCB_call. This
     will check the type of the callback and will invoke
     callback(a, b, gencb) for new style callbacks or callback(a,
     b, cb_arg) for old style.

     BN_generate_prime (deprecated) works in the same way as
     BN_generate_prime_ex but expects an old style callback
     function directly in the callback parameter, and an argument
     to pass to it in the cb_arg. Similarly BN_is_prime and
     BN_is_prime_fasttest are deprecated and can be compared to
     BN_is_prime_ex and BN_is_prime_fasttest_ex respectively.


RETURN VALUES

     BN_generate_prime_ex() return 1 on success or 0 on error.

     BN_is_prime_ex(), BN_is_prime_fasttest_ex(), BN_is_prime()
     and BN_is_prime_fasttest() return 0 if the number is
     composite, 1 if it is prime with an error probability of
     less than 0.25^nchecks, and -1 on error.

     BN_generate_prime() returns the prime number on success,
     NULL otherwise.

     Callback functions should return 1 on success or 0 on error.

     The error codes can be obtained by ERR_get_error(3).


SEE ALSO

     bn(3), ERR_get_error(3), rand(3)


HISTORY

     The cb_arg arguments to BN_generate_prime() and to
     BN_is_prime() were added in SSLeay 0.9.0. The ret argument
     to BN_generate_prime() was added in SSLeay 0.9.1.
     BN_is_prime_fasttest() was added in OpenSSL 0.9.5.

1.0.2t               Last change: 2019-09-10                    3

See also BN_GENCB_call(3)
See also BN_GENCB_set(3)
See also BN_GENCB_set_old(3)
See also BN_generate_prime_ex(3)
See also BN_is_prime(3)
See also BN_is_prime_ex(3)
See also BN_is_prime_fasttest(3)
See also BN_is_prime_fasttest_ex(3)

Man(1) output converted with man2html