Seth Woolley's Man Viewer

DSA_sign_setup(3) - DSA_sign, DSA_sign_setup, DSA_verify - DSA signatures - man 3 DSA_sign_setup

([section] manual, -k keyword, -K [section] search, -f whatis)
man plain no title

DSA_sign(3)                         OpenSSL                        DSA_sign(3)



NAME
       DSA_sign, DSA_sign_setup, DSA_verify - DSA signatures

SYNOPSIS
        #include <openssl/dsa.h>

        int    DSA_sign(int type, const unsigned char *dgst, int len,
                       unsigned char *sigret, unsigned int *siglen, DSA *dsa(1,3));

        int    DSA_sign_setup(DSA *dsa(1,3), BN_CTX *ctx, BIGNUM **kinvp,
                       BIGNUM **rp);

        int    DSA_verify(int type, const unsigned char *dgst, int len,
                       unsigned char *sigbuf, int siglen, DSA *dsa(1,3));

DESCRIPTION
       DSA_sign() computes a digital signature on the len byte message digest
       dgst using the private key dsa(1,3) and places its ASN.1 DER encoding(3,n) at
       sigret. The length of the signature is places in(1,8) *siglen. sigret must
       point to DSA_size(dsa(1,3)) bytes of memory.

       DSA_sign_setup() may be used to precompute part of the signing opera-
       tion in(1,8) case signature generation is time-critical. It expects dsa(1,3) to
       contain DSA parameters. It places the precomputed values in(1,8) newly allo-
       cated BIGNUMs at *kinvp and *rp, after freeing the old ones unless
       *kinvp and *rp are NULL. These values may be passed to DSA_sign() in(1,8)
       dsa->kinv and dsa->r.  ctx is a pre-allocated BN_CTX or NULL.

       DSA_verify() verifies that the signature sigbuf of size siglen matches
       a given message digest dgst of size len.  dsa(1,3) is the signer's public
       key.

       The type parameter is ignored.

       The PRNG must be seeded before DSA_sign() (or DSA_sign_setup()) is
       called.

RETURN VALUES
       DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error.
       DSA_verify() returns 1 for a valid signature, 0 for an incorrect signa-
       ture and -1 on error. The error(8,n) codes can be obtained by
       ERR_get_error(3).

CONFORMING TO
       US Federal Information Processing Standard FIPS 186 (Digital Signature
       Standard, DSS), ANSI X9.30

SEE ALSO
       dsa(1,3)(3), ERR_get_error(3), rand(1,3)(3), DSA_do_sign(3)

HISTORY
       DSA_sign() and DSA_verify() are available in(1,8) all versions of SSLeay.
       DSA_sign_setup() was added in(1,8) SSLeay 0.8.



0.9.7d                            2002-09-25                       DSA_sign(3)

References for this manual (incoming links)