2000-01-23 04:05:23 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2019-10-06 23:21:16 +08:00
|
|
|
BN_generate_prime_ex2, BN_generate_prime_ex, BN_is_prime_ex, BN_check_prime,
|
2019-07-04 22:41:17 +08:00
|
|
|
BN_is_prime_fasttest_ex, BN_GENCB_call, BN_GENCB_new, BN_GENCB_free,
|
|
|
|
BN_GENCB_set_old, BN_GENCB_set, BN_GENCB_get_arg, BN_generate_prime,
|
|
|
|
BN_is_prime, BN_is_prime_fasttest - generate primes and test for primality
|
2000-01-23 04:05:23 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/bn.h>
|
|
|
|
|
2019-07-04 22:41:17 +08:00
|
|
|
int BN_generate_prime_ex2(BIGNUM *ret, int bits, int safe,
|
|
|
|
const BIGNUM *add, const BIGNUM *rem, BN_GENCB *cb,
|
|
|
|
BN_CTX *ctx);
|
|
|
|
|
2016-07-19 21:27:53 +08:00
|
|
|
int BN_generate_prime_ex(BIGNUM *ret, int bits, int safe, const BIGNUM *add,
|
2017-01-21 02:58:49 +08:00
|
|
|
const BIGNUM *rem, BN_GENCB *cb);
|
2013-06-13 06:42:08 +08:00
|
|
|
|
2019-10-06 23:21:16 +08:00
|
|
|
int BN_check_prime(const BIGNUM *p, BN_CTX *ctx, BN_GENCB *cb);
|
2013-06-13 06:42:08 +08:00
|
|
|
|
|
|
|
int BN_GENCB_call(BN_GENCB *cb, int a, int b);
|
|
|
|
|
2014-11-03 03:45:04 +08:00
|
|
|
BN_GENCB *BN_GENCB_new(void);
|
2013-06-13 06:42:08 +08:00
|
|
|
|
2014-11-03 03:45:04 +08:00
|
|
|
void BN_GENCB_free(BN_GENCB *cb);
|
2013-06-13 06:42:08 +08:00
|
|
|
|
2014-11-03 03:45:04 +08:00
|
|
|
void BN_GENCB_set_old(BN_GENCB *gencb,
|
2017-01-21 02:58:49 +08:00
|
|
|
void (*callback)(int, int, void *), void *cb_arg);
|
2014-11-03 03:45:04 +08:00
|
|
|
|
|
|
|
void BN_GENCB_set(BN_GENCB *gencb,
|
2017-01-21 02:58:49 +08:00
|
|
|
int (*callback)(int, int, BN_GENCB *), void *cb_arg);
|
2014-11-03 03:45:04 +08:00
|
|
|
|
|
|
|
void *BN_GENCB_get_arg(BN_GENCB *cb);
|
2013-06-13 06:42:08 +08:00
|
|
|
|
2021-12-02 19:33:49 +08:00
|
|
|
The following functions have been deprecated since OpenSSL 0.9.8, and can be
|
|
|
|
hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
|
|
|
|
see L<openssl_user_macros(7)>:
|
2013-06-13 06:42:08 +08:00
|
|
|
|
2000-01-23 04:05:23 +08:00
|
|
|
BIGNUM *BN_generate_prime(BIGNUM *ret, int num, int safe, BIGNUM *add,
|
2017-01-21 02:58:49 +08:00
|
|
|
BIGNUM *rem, void (*callback)(int, int, void *),
|
|
|
|
void *cb_arg);
|
2000-01-23 04:05:23 +08:00
|
|
|
|
2019-10-06 23:21:16 +08:00
|
|
|
int BN_is_prime(const BIGNUM *p, int nchecks,
|
2017-01-21 02:58:49 +08:00
|
|
|
void (*callback)(int, int, void *), BN_CTX *ctx, void *cb_arg);
|
2000-01-23 04:05:23 +08:00
|
|
|
|
2019-10-06 23:21:16 +08:00
|
|
|
int BN_is_prime_fasttest(const BIGNUM *p, int nchecks,
|
2017-01-21 02:58:49 +08:00
|
|
|
void (*callback)(int, int, void *), BN_CTX *ctx,
|
|
|
|
void *cb_arg, int do_trial_division);
|
2000-01-30 19:05:39 +08:00
|
|
|
|
2021-12-02 19:33:49 +08:00
|
|
|
The following functions have been deprecated since OpenSSL 3.0, and can be
|
|
|
|
hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
|
|
|
|
see L<openssl_user_macros(7)>:
|
2019-10-06 23:21:16 +08:00
|
|
|
|
|
|
|
int BN_is_prime_ex(const BIGNUM *p, int nchecks, BN_CTX *ctx, BN_GENCB *cb);
|
|
|
|
|
|
|
|
int BN_is_prime_fasttest_ex(const BIGNUM *p, int nchecks, BN_CTX *ctx,
|
|
|
|
int do_trial_division, BN_GENCB *cb);
|
|
|
|
|
2000-01-23 04:05:23 +08:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2019-07-04 22:41:17 +08:00
|
|
|
BN_generate_prime_ex2() generates a pseudo-random prime number of
|
|
|
|
at least bit length B<bits> using the BN_CTX provided in B<ctx>. The value of
|
|
|
|
B<ctx> must not be NULL.
|
2019-10-06 23:21:16 +08:00
|
|
|
|
2019-07-04 22:41:17 +08:00
|
|
|
The returned number is probably prime with a negligible error.
|
2019-10-06 23:21:16 +08:00
|
|
|
The maximum error rate is 2^-128.
|
|
|
|
It's 2^-287 for a 512 bit prime, 2^-435 for a 1024 bit prime,
|
|
|
|
2^-648 for a 2048 bit prime, and lower than 2^-882 for primes larger
|
|
|
|
than 2048 bit.
|
|
|
|
|
2019-07-11 03:33:48 +08:00
|
|
|
If B<add> is B<NULL> the returned prime number will have exact bit
|
|
|
|
length B<bits> with the top most two bits set.
|
2019-06-27 16:12:08 +08:00
|
|
|
|
2000-01-30 19:05:39 +08:00
|
|
|
If B<ret> is not B<NULL>, it will be used to store the number.
|
2000-01-23 04:05:23 +08:00
|
|
|
|
2013-06-13 06:42:08 +08:00
|
|
|
If B<cb> is not B<NULL>, it is used as follows:
|
2000-01-23 04:05:23 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
=over 2
|
2000-01-23 04:05:23 +08:00
|
|
|
|
|
|
|
=item *
|
|
|
|
|
2013-06-13 06:42:08 +08:00
|
|
|
B<BN_GENCB_call(cb, 0, i)> is called after generating the i-th
|
2000-01-23 04:05:23 +08:00
|
|
|
potential prime number.
|
|
|
|
|
|
|
|
=item *
|
|
|
|
|
2013-06-13 06:42:08 +08:00
|
|
|
While the number is being tested for primality,
|
|
|
|
B<BN_GENCB_call(cb, 1, j)> is called as described below.
|
2000-01-23 04:05:23 +08:00
|
|
|
|
|
|
|
=item *
|
|
|
|
|
2013-06-13 06:42:08 +08:00
|
|
|
When a prime has been found, B<BN_GENCB_call(cb, 2, i)> is called.
|
2000-01-23 04:05:23 +08:00
|
|
|
|
2018-07-29 04:45:22 +08:00
|
|
|
=item *
|
|
|
|
|
|
|
|
The callers of BN_generate_prime_ex() may call B<BN_GENCB_call(cb, i, j)> with
|
|
|
|
other values as described in their respective man pages; see L</SEE ALSO>.
|
|
|
|
|
2000-01-23 04:05:23 +08:00
|
|
|
=back
|
|
|
|
|
|
|
|
The prime may have to fulfill additional requirements for use in
|
|
|
|
Diffie-Hellman key exchange:
|
|
|
|
|
2000-01-30 19:05:39 +08:00
|
|
|
If B<add> is not B<NULL>, the prime will fulfill the condition p % B<add>
|
|
|
|
== B<rem> (p % B<add> == 1 if B<rem> == B<NULL>) in order to suit a given
|
2000-01-23 04:05:23 +08:00
|
|
|
generator.
|
|
|
|
|
|
|
|
If B<safe> is true, it will be a safe prime (i.e. a prime p so
|
2019-07-11 03:33:48 +08:00
|
|
|
that (p-1)/2 is also prime). If B<safe> is true, and B<rem> == B<NULL>
|
|
|
|
the condition will be p % B<add> == 3.
|
|
|
|
It is recommended that B<add> is a multiple of 4.
|
2000-01-23 04:05:23 +08:00
|
|
|
|
2019-06-27 16:12:08 +08:00
|
|
|
The random generator must be seeded prior to calling BN_generate_prime_ex().
|
|
|
|
If the automatic seeding or reseeding of the OpenSSL CSPRNG fails due to
|
|
|
|
external circumstances (see L<RAND(7)>), the operation will fail.
|
2020-10-15 17:55:50 +08:00
|
|
|
The random number generator configured for the OSSL_LIB_CTX associated with
|
2019-07-04 22:41:17 +08:00
|
|
|
B<ctx> will be used.
|
|
|
|
|
|
|
|
BN_generate_prime_ex() is the same as BN_generate_prime_ex2() except that no
|
|
|
|
B<ctx> parameter is passed.
|
2020-10-15 17:55:50 +08:00
|
|
|
In this case the random number generator associated with the default OSSL_LIB_CTX
|
2019-07-04 22:41:17 +08:00
|
|
|
will be used.
|
2000-01-23 04:05:23 +08:00
|
|
|
|
2019-10-06 23:21:16 +08:00
|
|
|
BN_check_prime(), BN_is_prime_ex(), BN_is_prime_fasttest_ex(), BN_is_prime()
|
|
|
|
and BN_is_prime_fasttest() test if the number B<p> is prime.
|
|
|
|
The functions tests until one of the tests shows that B<p> is composite,
|
|
|
|
or all the tests passed.
|
|
|
|
If B<p> passes all these tests, it is considered a probable prime.
|
|
|
|
|
|
|
|
The test performed on B<p> are trial division by a number of small primes
|
|
|
|
and rounds of the of the Miller-Rabin probabilistic primality test.
|
|
|
|
|
|
|
|
The functions do at least 64 rounds of the Miller-Rabin test giving a maximum
|
|
|
|
false positive rate of 2^-128.
|
|
|
|
If the size of B<p> is more than 2048 bits, they do at least 128 rounds
|
|
|
|
giving a maximum false positive rate of 2^-256.
|
|
|
|
|
|
|
|
If B<nchecks> is larger than the minimum above (64 or 128), B<nchecks>
|
|
|
|
rounds of the Miller-Rabin test will be done.
|
|
|
|
|
|
|
|
If B<do_trial_division> set to B<0>, the trial division will be skipped.
|
|
|
|
BN_is_prime_ex() and BN_is_prime() always skip the trial division.
|
|
|
|
|
|
|
|
BN_is_prime_ex(), BN_is_prime_fasttest_ex(), BN_is_prime()
|
|
|
|
and BN_is_prime_fasttest() are deprecated.
|
|
|
|
|
|
|
|
BN_is_prime_fasttest() and BN_is_prime() behave just like
|
|
|
|
BN_is_prime_fasttest_ex() and BN_is_prime_ex() respectively, but with the old
|
|
|
|
style call back.
|
|
|
|
|
2020-07-17 18:31:26 +08:00
|
|
|
B<ctx> is a preallocated B<BN_CTX> (to save the overhead of allocating and
|
2000-02-03 05:20:44 +08:00
|
|
|
freeing the structure in a loop), or B<NULL>.
|
2000-01-30 19:05:39 +08:00
|
|
|
|
2019-10-06 23:21:16 +08:00
|
|
|
If the trial division is done, and no divisors are found and B<cb>
|
|
|
|
is not B<NULL>, B<BN_GENCB_call(cb, 1, -1)> is called.
|
|
|
|
|
|
|
|
After each round of the Miller-Rabin probabilistic primality test,
|
|
|
|
if B<cb> is not B<NULL>, B<BN_GENCB_call(cb, 1, j)> is called
|
|
|
|
with B<j> the iteration (j = 0, 1, ...).
|
|
|
|
|
2017-09-02 21:35:50 +08:00
|
|
|
BN_GENCB_call() calls the callback function held in the B<BN_GENCB> structure
|
2013-06-13 06:42:08 +08:00
|
|
|
and passes the ints B<a> and B<b> as arguments. There are two types of
|
|
|
|
B<BN_GENCB> structure that are supported: "new" style and "old" style. New
|
|
|
|
programs should prefer the "new" style, whilst the "old" style is provided
|
|
|
|
for backwards compatibility purposes.
|
|
|
|
|
2017-09-02 21:35:50 +08:00
|
|
|
A B<BN_GENCB> structure should be created through a call to BN_GENCB_new(),
|
2015-05-01 09:37:06 +08:00
|
|
|
and freed through a call to BN_GENCB_free().
|
2014-11-03 03:45:04 +08:00
|
|
|
|
2013-06-13 06:42:08 +08:00
|
|
|
For "new" style callbacks a BN_GENCB structure should be initialised with a
|
2014-08-15 04:47:13 +08:00
|
|
|
call to BN_GENCB_set(), where B<gencb> is a B<BN_GENCB *>, B<callback> is of
|
2013-06-13 06:42:08 +08:00
|
|
|
type B<int (*callback)(int, int, BN_GENCB *)> and B<cb_arg> is a B<void *>.
|
|
|
|
"Old" style callbacks are the same except they are initialised with a call
|
2014-08-15 04:47:13 +08:00
|
|
|
to BN_GENCB_set_old() and B<callback> is of type
|
2013-06-13 06:42:08 +08:00
|
|
|
B<void (*callback)(int, int, void *)>.
|
|
|
|
|
|
|
|
A callback is invoked through a call to B<BN_GENCB_call>. This will check
|
|
|
|
the type of the callback and will invoke B<callback(a, b, gencb)> for new
|
|
|
|
style callbacks or B<callback(a, b, cb_arg)> for old style.
|
|
|
|
|
2018-08-22 00:30:34 +08:00
|
|
|
It is possible to obtain the argument associated with a BN_GENCB structure
|
2014-11-03 03:45:04 +08:00
|
|
|
(set via a call to BN_GENCB_set or BN_GENCB_set_old) using BN_GENCB_get_arg.
|
|
|
|
|
2017-09-02 21:35:50 +08:00
|
|
|
BN_generate_prime() (deprecated) works in the same way as
|
|
|
|
BN_generate_prime_ex() but expects an old-style callback function
|
2013-06-13 06:42:08 +08:00
|
|
|
directly in the B<callback> parameter, and an argument to pass to it in
|
2017-09-02 21:35:50 +08:00
|
|
|
the B<cb_arg>. BN_is_prime() and BN_is_prime_fasttest()
|
|
|
|
can similarly be compared to BN_is_prime_ex() and
|
|
|
|
BN_is_prime_fasttest_ex(), respectively.
|
2013-06-13 06:42:08 +08:00
|
|
|
|
2000-01-23 04:05:23 +08:00
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
2013-06-13 06:42:08 +08:00
|
|
|
BN_generate_prime_ex() return 1 on success or 0 on error.
|
2000-01-23 04:05:23 +08:00
|
|
|
|
2019-10-06 23:21:16 +08:00
|
|
|
BN_is_prime_ex(), BN_is_prime_fasttest_ex(), BN_is_prime(),
|
|
|
|
BN_is_prime_fasttest() and BN_check_prime return 0 if the number is composite,
|
|
|
|
1 if it is prime with an error probability of less than 0.25^B<nchecks>, and
|
2000-01-23 04:05:23 +08:00
|
|
|
-1 on error.
|
|
|
|
|
2013-06-13 06:42:08 +08:00
|
|
|
BN_generate_prime() returns the prime number on success, B<NULL> otherwise.
|
|
|
|
|
2014-11-03 03:45:04 +08:00
|
|
|
BN_GENCB_new returns a pointer to a BN_GENCB structure on success, or B<NULL>
|
|
|
|
otherwise.
|
|
|
|
|
|
|
|
BN_GENCB_get_arg returns the argument previously associated with a BN_GENCB
|
|
|
|
structure.
|
|
|
|
|
2013-06-13 06:42:08 +08:00
|
|
|
Callback functions should return 1 on success or 0 on error.
|
|
|
|
|
2015-08-18 03:21:33 +08:00
|
|
|
The error codes can be obtained by L<ERR_get_error(3)>.
|
2000-01-23 04:05:23 +08:00
|
|
|
|
2014-11-03 03:45:04 +08:00
|
|
|
=head1 REMOVED FUNCTIONALITY
|
|
|
|
|
|
|
|
As of OpenSSL 1.1.0 it is no longer possible to create a BN_GENCB structure
|
|
|
|
directly, as in:
|
|
|
|
|
|
|
|
BN_GENCB callback;
|
|
|
|
|
|
|
|
Instead applications should create a BN_GENCB structure using BN_GENCB_new:
|
|
|
|
|
|
|
|
BN_GENCB *callback;
|
|
|
|
callback = BN_GENCB_new();
|
2016-11-19 07:10:05 +08:00
|
|
|
if (!callback)
|
|
|
|
/* error */
|
2014-11-03 03:45:04 +08:00
|
|
|
...
|
|
|
|
BN_GENCB_free(callback);
|
|
|
|
|
2000-01-23 04:05:23 +08:00
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2018-07-29 04:45:22 +08:00
|
|
|
L<DH_generate_parameters(3)>, L<DSA_generate_parameters(3)>,
|
2019-06-27 16:12:08 +08:00
|
|
|
L<RSA_generate_key(3)>, L<ERR_get_error(3)>, L<RAND_bytes(3)>,
|
|
|
|
L<RAND(7)>
|
2000-01-23 04:05:23 +08:00
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
2021-02-05 01:40:33 +08:00
|
|
|
The BN_is_prime_ex() and BN_is_prime_fasttest_ex() functions were
|
|
|
|
deprecated in OpenSSL 3.0.
|
|
|
|
|
2018-12-09 08:02:36 +08:00
|
|
|
The BN_GENCB_new(), BN_GENCB_free(),
|
|
|
|
and BN_GENCB_get_arg() functions were added in OpenSSL 1.1.0.
|
2000-01-23 04:05:23 +08:00
|
|
|
|
2019-10-06 23:21:16 +08:00
|
|
|
BN_check_prime() was added in OpenSSL 3.0.
|
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2021-02-18 22:57:13 +08:00
|
|
|
Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|