* stylistic vision for SSLeay :-) */\r
\r
#ifndef HEADER_DSA_H\r
-#define HEADER_DSA_H\r
+# define HEADER_DSA_H\r
\r
-#include <openssl/e_os2.h>\r
+# include <openssl/e_os2.h>\r
\r
-#ifdef OPENSSL_NO_DSA\r
-#error DSA is disabled.\r
-#endif\r
+# ifdef OPENSSL_NO_DSA\r
+# error DSA is disabled.\r
+# endif\r
\r
-#ifndef OPENSSL_NO_BIO\r
-#include <openssl/bio.h>\r
-#endif\r
-#include <openssl/crypto.h>\r
-#include <openssl/ossl_typ.h>\r
+# ifndef OPENSSL_NO_BIO\r
+# include <openssl/bio.h>\r
+# endif\r
+# include <openssl/crypto.h>\r
+# include <openssl/ossl_typ.h>\r
\r
-#ifndef OPENSSL_NO_DEPRECATED\r
-#include <openssl/bn.h>\r
-#ifndef OPENSSL_NO_DH\r
-# include <openssl/dh.h>\r
-#endif\r
-#endif\r
+# ifndef OPENSSL_NO_DEPRECATED\r
+# include <openssl/bn.h>\r
+# ifndef OPENSSL_NO_DH\r
+# include <openssl/dh.h>\r
+# endif\r
+# endif\r
\r
-#ifndef OPENSSL_DSA_MAX_MODULUS_BITS\r
-# define OPENSSL_DSA_MAX_MODULUS_BITS 10000\r
-#endif\r
+# ifndef OPENSSL_DSA_MAX_MODULUS_BITS\r
+# define OPENSSL_DSA_MAX_MODULUS_BITS 10000\r
+# endif\r
\r
-#define DSA_FLAG_CACHE_MONT_P 0x01\r
-#define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA\r
- * implementation now uses constant time\r
- * modular exponentiation for secret exponents\r
- * by default. This flag causes the\r
- * faster variable sliding window method to\r
- * be used for all exponents.\r
- */\r
-\r
-/* If this flag is set the DSA method is FIPS compliant and can be used\r
- * in FIPS mode. This is set in the validated module method. If an\r
- * application sets this flag in its own methods it is its reposibility\r
- * to ensure the result is compliant.\r
+# define DSA_FLAG_CACHE_MONT_P 0x01\r
+/*\r
+ * new with 0.9.7h; the built-in DSA implementation now uses constant time\r
+ * modular exponentiation for secret exponents by default. This flag causes\r
+ * the faster variable sliding window method to be used for all exponents.\r
*/\r
+# define DSA_FLAG_NO_EXP_CONSTTIME 0x02\r
\r
-#define DSA_FLAG_FIPS_METHOD 0x0400\r
+/*\r
+ * If this flag is set the DSA method is FIPS compliant and can be used in\r
+ * FIPS mode. This is set in the validated module method. If an application\r
+ * sets this flag in its own methods it is its reposibility to ensure the\r
+ * result is compliant.\r
+ */\r
\r
-/* If this flag is set the operations normally disabled in FIPS mode are\r
+# define DSA_FLAG_FIPS_METHOD 0x0400\r
+\r
+/*\r
+ * If this flag is set the operations normally disabled in FIPS mode are\r
* permitted it is then the applications responsibility to ensure that the\r
* usage is compliant.\r
*/\r
\r
-#define DSA_FLAG_NON_FIPS_ALLOW 0x0400\r
+# define DSA_FLAG_NON_FIPS_ALLOW 0x0400\r
\r
#ifdef __cplusplus\r
extern "C" {\r
/* typedef struct dsa_st DSA; */\r
/* typedef struct dsa_method DSA_METHOD; */\r
\r
-typedef struct DSA_SIG_st\r
- {\r
- BIGNUM *r;\r
- BIGNUM *s;\r
- } DSA_SIG;\r
-\r
-struct dsa_method\r
- {\r
- const char *name;\r
- DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa);\r
- int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp,\r
- BIGNUM **rp);\r
- int (*dsa_do_verify)(const unsigned char *dgst, int dgst_len,\r
- DSA_SIG *sig, DSA *dsa);\r
- int (*dsa_mod_exp)(DSA *dsa, BIGNUM *rr, BIGNUM *a1, BIGNUM *p1,\r
- BIGNUM *a2, BIGNUM *p2, BIGNUM *m, BN_CTX *ctx,\r
- BN_MONT_CTX *in_mont);\r
- int (*bn_mod_exp)(DSA *dsa, BIGNUM *r, BIGNUM *a, const BIGNUM *p,\r
- const BIGNUM *m, BN_CTX *ctx,\r
- BN_MONT_CTX *m_ctx); /* Can be null */\r
- int (*init)(DSA *dsa);\r
- int (*finish)(DSA *dsa);\r
- int flags;\r
- char *app_data;\r
- /* If this is non-NULL, it is used to generate DSA parameters */\r
- int (*dsa_paramgen)(DSA *dsa, int bits,\r
- const unsigned char *seed, int seed_len,\r
- int *counter_ret, unsigned long *h_ret,\r
- BN_GENCB *cb);\r
- /* If this is non-NULL, it is used to generate DSA keys */\r
- int (*dsa_keygen)(DSA *dsa);\r
- };\r
-\r
-struct dsa_st\r
- {\r
- /* This first variable is used to pick up errors where\r
- * a DSA is passed instead of of a EVP_PKEY */\r
- int pad;\r
- long version;\r
- int write_params;\r
- BIGNUM *p;\r
- BIGNUM *q; /* == 20 */\r
- BIGNUM *g;\r
-\r
- BIGNUM *pub_key; /* y public key */\r
- BIGNUM *priv_key; /* x private key */\r
-\r
- BIGNUM *kinv; /* Signing pre-calc */\r
- BIGNUM *r; /* Signing pre-calc */\r
-\r
- int flags;\r
- /* Normally used to cache montgomery values */\r
- BN_MONT_CTX *method_mont_p;\r
- int references;\r
- CRYPTO_EX_DATA ex_data;\r
- const DSA_METHOD *meth;\r
- /* functional reference if 'meth' is ENGINE-provided */\r
- ENGINE *engine;\r
- };\r
-\r
-#define d2i_DSAparams_fp(fp,x) (DSA *)ASN1_d2i_fp((char *(*)())DSA_new, \\r
- (char *(*)())d2i_DSAparams,(fp),(unsigned char **)(x))\r
-#define i2d_DSAparams_fp(fp,x) ASN1_i2d_fp(i2d_DSAparams,(fp), \\r
- (unsigned char *)(x))\r
-#define d2i_DSAparams_bio(bp,x) ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAparams,bp,x)\r
-#define i2d_DSAparams_bio(bp,x) ASN1_i2d_bio_of_const(DSA,i2d_DSAparams,bp,x)\r
-\r
+typedef struct DSA_SIG_st {\r
+ BIGNUM *r;\r
+ BIGNUM *s;\r
+} DSA_SIG;\r
+\r
+struct dsa_method {\r
+ const char *name;\r
+ DSA_SIG *(*dsa_do_sign) (const unsigned char *dgst, int dlen, DSA *dsa);\r
+ int (*dsa_sign_setup) (DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp,\r
+ BIGNUM **rp);\r
+ int (*dsa_do_verify) (const unsigned char *dgst, int dgst_len,\r
+ DSA_SIG *sig, DSA *dsa);\r
+ int (*dsa_mod_exp) (DSA *dsa, BIGNUM *rr, BIGNUM *a1, BIGNUM *p1,\r
+ BIGNUM *a2, BIGNUM *p2, BIGNUM *m, BN_CTX *ctx,\r
+ BN_MONT_CTX *in_mont);\r
+ /* Can be null */\r
+ int (*bn_mod_exp) (DSA *dsa, BIGNUM *r, BIGNUM *a, const BIGNUM *p,\r
+ const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx);\r
+ int (*init) (DSA *dsa);\r
+ int (*finish) (DSA *dsa);\r
+ int flags;\r
+ char *app_data;\r
+ /* If this is non-NULL, it is used to generate DSA parameters */\r
+ int (*dsa_paramgen) (DSA *dsa, int bits,\r
+ const unsigned char *seed, int seed_len,\r
+ int *counter_ret, unsigned long *h_ret,\r
+ BN_GENCB *cb);\r
+ /* If this is non-NULL, it is used to generate DSA keys */\r
+ int (*dsa_keygen) (DSA *dsa);\r
+};\r
+\r
+struct dsa_st {\r
+ /*\r
+ * This first variable is used to pick up errors where a DSA is passed\r
+ * instead of of a EVP_PKEY\r
+ */\r
+ int pad;\r
+ long version;\r
+ int write_params;\r
+ BIGNUM *p;\r
+ BIGNUM *q; /* == 20 */\r
+ BIGNUM *g;\r
+ BIGNUM *pub_key; /* y public key */\r
+ BIGNUM *priv_key; /* x private key */\r
+ BIGNUM *kinv; /* Signing pre-calc */\r
+ BIGNUM *r; /* Signing pre-calc */\r
+ int flags;\r
+ /* Normally used to cache montgomery values */\r
+ BN_MONT_CTX *method_mont_p;\r
+ int references;\r
+ CRYPTO_EX_DATA ex_data;\r
+ const DSA_METHOD *meth;\r
+ /* functional reference if 'meth' is ENGINE-provided */\r
+ ENGINE *engine;\r
+};\r
+\r
+# define d2i_DSAparams_fp(fp,x) (DSA *)ASN1_d2i_fp((char *(*)())DSA_new, \\r
+ (char *(*)())d2i_DSAparams,(fp),(unsigned char **)(x))\r
+# define i2d_DSAparams_fp(fp,x) ASN1_i2d_fp(i2d_DSAparams,(fp), \\r
+ (unsigned char *)(x))\r
+# define d2i_DSAparams_bio(bp,x) ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAparams,bp,x)\r
+# define i2d_DSAparams_bio(bp,x) ASN1_i2d_bio_of_const(DSA,i2d_DSAparams,bp,x)\r
\r
DSA *DSAparams_dup(DSA *x);\r
-DSA_SIG * DSA_SIG_new(void);\r
-void DSA_SIG_free(DSA_SIG *a);\r
-int i2d_DSA_SIG(const DSA_SIG *a, unsigned char **pp);\r
-DSA_SIG * d2i_DSA_SIG(DSA_SIG **v, const unsigned char **pp, long length);\r
+DSA_SIG *DSA_SIG_new(void);\r
+void DSA_SIG_free(DSA_SIG *a);\r
+int i2d_DSA_SIG(const DSA_SIG *a, unsigned char **pp);\r
+DSA_SIG *d2i_DSA_SIG(DSA_SIG **v, const unsigned char **pp, long length);\r
\r
-DSA_SIG * DSA_do_sign(const unsigned char *dgst,int dlen,DSA *dsa);\r
-int DSA_do_verify(const unsigned char *dgst,int dgst_len,\r
- DSA_SIG *sig,DSA *dsa);\r
+DSA_SIG *DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa);\r
+int DSA_do_verify(const unsigned char *dgst, int dgst_len,\r
+ DSA_SIG *sig, DSA *dsa);\r
\r
const DSA_METHOD *DSA_OpenSSL(void);\r
\r
-void DSA_set_default_method(const DSA_METHOD *);\r
+void DSA_set_default_method(const DSA_METHOD *);\r
const DSA_METHOD *DSA_get_default_method(void);\r
-int DSA_set_method(DSA *dsa, const DSA_METHOD *);\r
+int DSA_set_method(DSA *dsa, const DSA_METHOD *);\r
\r
-DSA * DSA_new(void);\r
-DSA * DSA_new_method(ENGINE *engine);\r
-void DSA_free (DSA *r);\r
+DSA *DSA_new(void);\r
+DSA *DSA_new_method(ENGINE *engine);\r
+void DSA_free(DSA *r);\r
/* "up" the DSA object's reference count */\r
-int DSA_up_ref(DSA *r);\r
-int DSA_size(const DSA *);\r
- /* next 4 return -1 on error */\r
-int DSA_sign_setup( DSA *dsa,BN_CTX *ctx_in,BIGNUM **kinvp,BIGNUM **rp);\r
-int DSA_sign(int type,const unsigned char *dgst,int dlen,\r
- unsigned char *sig, unsigned int *siglen, DSA *dsa);\r
-int DSA_verify(int type,const unsigned char *dgst,int dgst_len,\r
- const unsigned char *sigbuf, int siglen, DSA *dsa);\r
+int DSA_up_ref(DSA *r);\r
+int DSA_size(const DSA *);\r
+ /* next 4 return -1 on error */\r
+int DSA_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp);\r
+int DSA_sign(int type, const unsigned char *dgst, int dlen,\r
+ unsigned char *sig, unsigned int *siglen, DSA *dsa);\r
+int DSA_verify(int type, const unsigned char *dgst, int dgst_len,\r
+ const unsigned char *sigbuf, int siglen, DSA *dsa);\r
int DSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,\r
- CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);\r
+ CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);\r
int DSA_set_ex_data(DSA *d, int idx, void *arg);\r
void *DSA_get_ex_data(DSA *d, int idx);\r
\r
-DSA * d2i_DSAPublicKey(DSA **a, const unsigned char **pp, long length);\r
-DSA * d2i_DSAPrivateKey(DSA **a, const unsigned char **pp, long length);\r
-DSA * d2i_DSAparams(DSA **a, const unsigned char **pp, long length);\r
+DSA *d2i_DSAPublicKey(DSA **a, const unsigned char **pp, long length);\r
+DSA *d2i_DSAPrivateKey(DSA **a, const unsigned char **pp, long length);\r
+DSA *d2i_DSAparams(DSA **a, const unsigned char **pp, long length);\r
\r
/* Deprecated version */\r
-#ifndef OPENSSL_NO_DEPRECATED\r
-DSA * DSA_generate_parameters(int bits,\r
- unsigned char *seed,int seed_len,\r
- int *counter_ret, unsigned long *h_ret,void\r
- (*callback)(int, int, void *),void *cb_arg);\r
-#endif /* !defined(OPENSSL_NO_DEPRECATED) */\r
+# ifndef OPENSSL_NO_DEPRECATED\r
+DSA *DSA_generate_parameters(int bits,\r
+ unsigned char *seed, int seed_len,\r
+ int *counter_ret, unsigned long *h_ret, void\r
+ (*callback) (int, int, void *), void *cb_arg);\r
+# endif /* !defined(OPENSSL_NO_DEPRECATED) */\r
\r
/* New version */\r
-int DSA_generate_parameters_ex(DSA *dsa, int bits,\r
- const unsigned char *seed,int seed_len,\r
- int *counter_ret, unsigned long *h_ret, BN_GENCB *cb);\r
-\r
-int DSA_generate_key(DSA *a);\r
-int i2d_DSAPublicKey(const DSA *a, unsigned char **pp);\r
-int i2d_DSAPrivateKey(const DSA *a, unsigned char **pp);\r
-int i2d_DSAparams(const DSA *a,unsigned char **pp);\r
-\r
-#ifndef OPENSSL_NO_BIO\r
-int DSAparams_print(BIO *bp, const DSA *x);\r
-int DSA_print(BIO *bp, const DSA *x, int off);\r
-#endif\r
-#ifndef OPENSSL_NO_FP_API\r
-int DSAparams_print_fp(FILE *fp, const DSA *x);\r
-int DSA_print_fp(FILE *bp, const DSA *x, int off);\r
-#endif\r
-\r
-#define DSS_prime_checks 50\r
-/* Primality test according to FIPS PUB 186[-1], Appendix 2.1:\r
- * 50 rounds of Rabin-Miller */\r
-#define DSA_is_prime(n, callback, cb_arg) \\r
- BN_is_prime(n, DSS_prime_checks, callback, NULL, cb_arg)\r
+int DSA_generate_parameters_ex(DSA *dsa, int bits,\r
+ const unsigned char *seed, int seed_len,\r
+ int *counter_ret, unsigned long *h_ret,\r
+ BN_GENCB *cb);\r
+\r
+int DSA_generate_key(DSA *a);\r
+int i2d_DSAPublicKey(const DSA *a, unsigned char **pp);\r
+int i2d_DSAPrivateKey(const DSA *a, unsigned char **pp);\r
+int i2d_DSAparams(const DSA *a, unsigned char **pp);\r
+\r
+# ifndef OPENSSL_NO_BIO\r
+int DSAparams_print(BIO *bp, const DSA *x);\r
+int DSA_print(BIO *bp, const DSA *x, int off);\r
+# endif\r
+# ifndef OPENSSL_NO_FP_API\r
+int DSAparams_print_fp(FILE *fp, const DSA *x);\r
+int DSA_print_fp(FILE *bp, const DSA *x, int off);\r
+# endif\r
+\r
+# define DSS_prime_checks 50\r
+/*\r
+ * Primality test according to FIPS PUB 186[-1], Appendix 2.1: 50 rounds of\r
+ * Rabin-Miller\r
+ */\r
+# define DSA_is_prime(n, callback, cb_arg) \\r
+ BN_is_prime(n, DSS_prime_checks, callback, NULL, cb_arg)\r
\r
-#ifndef OPENSSL_NO_DH\r
-/* Convert DSA structure (key or just parameters) into DH structure\r
- * (be careful to avoid small subgroup attacks when using this!) */\r
+# ifndef OPENSSL_NO_DH\r
+/*\r
+ * Convert DSA structure (key or just parameters) into DH structure (be\r
+ * careful to avoid small subgroup attacks when using this!)\r
+ */\r
DH *DSA_dup_DH(const DSA *r);\r
-#endif\r
+# endif\r
\r
-#define EVP_PKEY_CTX_set_dsa_paramgen_bits(ctx, nbits) \\r
- EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DSA, EVP_PKEY_OP_PARAMGEN, \\r
- EVP_PKEY_CTRL_DSA_PARAMGEN_BITS, nbits, NULL)\r
+# define EVP_PKEY_CTX_set_dsa_paramgen_bits(ctx, nbits) \\r
+ EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DSA, EVP_PKEY_OP_PARAMGEN, \\r
+ EVP_PKEY_CTRL_DSA_PARAMGEN_BITS, nbits, NULL)\r
\r
-#define EVP_PKEY_CTRL_DSA_PARAMGEN_BITS (EVP_PKEY_ALG_CTRL + 1)\r
-#define EVP_PKEY_CTRL_DSA_PARAMGEN_Q_BITS (EVP_PKEY_ALG_CTRL + 2)\r
-#define EVP_PKEY_CTRL_DSA_PARAMGEN_MD (EVP_PKEY_ALG_CTRL + 3)\r
+# define EVP_PKEY_CTRL_DSA_PARAMGEN_BITS (EVP_PKEY_ALG_CTRL + 1)\r
+# define EVP_PKEY_CTRL_DSA_PARAMGEN_Q_BITS (EVP_PKEY_ALG_CTRL + 2)\r
+# define EVP_PKEY_CTRL_DSA_PARAMGEN_MD (EVP_PKEY_ALG_CTRL + 3)\r
\r
/* BEGIN ERROR CODES */\r
-/* The following lines are auto generated by the script mkerr.pl. Any changes\r
+/*\r
+ * The following lines are auto generated by the script mkerr.pl. Any changes\r
* made after this point may be overwritten when the script is next run.\r
*/\r
void ERR_load_DSA_strings(void);\r
/* Error codes for the DSA functions. */\r
\r
/* Function codes. */\r
-#define DSA_F_D2I_DSA_SIG 110\r
-#define DSA_F_DO_DSA_PRINT 104\r
-#define DSA_F_DSAPARAMS_PRINT 100\r
-#define DSA_F_DSAPARAMS_PRINT_FP 101\r
-#define DSA_F_DSA_DO_SIGN 112\r
-#define DSA_F_DSA_DO_VERIFY 113\r
-#define DSA_F_DSA_GENERATE_KEY 124\r
-#define DSA_F_DSA_GENERATE_PARAMETERS_EX 123\r
-#define DSA_F_DSA_NEW_METHOD 103\r
-#define DSA_F_DSA_PARAM_DECODE 119\r
-#define DSA_F_DSA_PRINT_FP 105\r
-#define DSA_F_DSA_PRIV_DECODE 115\r
-#define DSA_F_DSA_PRIV_ENCODE 116\r
-#define DSA_F_DSA_PUB_DECODE 117\r
-#define DSA_F_DSA_PUB_ENCODE 118\r
-#define DSA_F_DSA_SIGN 106\r
-#define DSA_F_DSA_SIGN_SETUP 107\r
-#define DSA_F_DSA_SIG_NEW 109\r
-#define DSA_F_DSA_SIG_PRINT 125\r
-#define DSA_F_DSA_VERIFY 108\r
-#define DSA_F_I2D_DSA_SIG 111\r
-#define DSA_F_OLD_DSA_PRIV_DECODE 122\r
-#define DSA_F_PKEY_DSA_CTRL 120\r
-#define DSA_F_PKEY_DSA_KEYGEN 121\r
-#define DSA_F_SIG_CB 114\r
+# define DSA_F_D2I_DSA_SIG 110\r
+# define DSA_F_DO_DSA_PRINT 104\r
+# define DSA_F_DSAPARAMS_PRINT 100\r
+# define DSA_F_DSAPARAMS_PRINT_FP 101\r
+# define DSA_F_DSA_BUILTIN_PARAMGEN2 126\r
+# define DSA_F_DSA_DO_SIGN 112\r
+# define DSA_F_DSA_DO_VERIFY 113\r
+# define DSA_F_DSA_GENERATE_KEY 124\r
+# define DSA_F_DSA_GENERATE_PARAMETERS_EX 123\r
+# define DSA_F_DSA_NEW_METHOD 103\r
+# define DSA_F_DSA_PARAM_DECODE 119\r
+# define DSA_F_DSA_PRINT_FP 105\r
+# define DSA_F_DSA_PRIV_DECODE 115\r
+# define DSA_F_DSA_PRIV_ENCODE 116\r
+# define DSA_F_DSA_PUB_DECODE 117\r
+# define DSA_F_DSA_PUB_ENCODE 118\r
+# define DSA_F_DSA_SIGN 106\r
+# define DSA_F_DSA_SIGN_SETUP 107\r
+# define DSA_F_DSA_SIG_NEW 109\r
+# define DSA_F_DSA_SIG_PRINT 125\r
+# define DSA_F_DSA_VERIFY 108\r
+# define DSA_F_I2D_DSA_SIG 111\r
+# define DSA_F_OLD_DSA_PRIV_DECODE 122\r
+# define DSA_F_PKEY_DSA_CTRL 120\r
+# define DSA_F_PKEY_DSA_KEYGEN 121\r
+# define DSA_F_SIG_CB 114\r
\r
/* Reason codes. */\r
-#define DSA_R_BAD_Q_VALUE 102\r
-#define DSA_R_BN_DECODE_ERROR 108\r
-#define DSA_R_BN_ERROR 109\r
-#define DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 100\r
-#define DSA_R_DECODE_ERROR 104\r
-#define DSA_R_INVALID_DIGEST_TYPE 106\r
-#define DSA_R_MISSING_PARAMETERS 101\r
-#define DSA_R_MODULUS_TOO_LARGE 103\r
-#define DSA_R_NEED_NEW_SETUP_VALUES 110\r
-#define DSA_R_NON_FIPS_DSA_METHOD 111\r
-#define DSA_R_NO_PARAMETERS_SET 107\r
-#define DSA_R_PARAMETER_ENCODING_ERROR 105\r
+# define DSA_R_BAD_Q_VALUE 102\r
+# define DSA_R_BN_DECODE_ERROR 108\r
+# define DSA_R_BN_ERROR 109\r
+# define DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 100\r
+# define DSA_R_DECODE_ERROR 104\r
+# define DSA_R_INVALID_DIGEST_TYPE 106\r
+# define DSA_R_INVALID_PARAMETERS 112\r
+# define DSA_R_MISSING_PARAMETERS 101\r
+# define DSA_R_MODULUS_TOO_LARGE 103\r
+# define DSA_R_NEED_NEW_SETUP_VALUES 110\r
+# define DSA_R_NON_FIPS_DSA_METHOD 111\r
+# define DSA_R_NO_PARAMETERS_SET 107\r
+# define DSA_R_PARAMETER_ENCODING_ERROR 105\r
+# define DSA_R_Q_NOT_PRIME 113\r
\r
#ifdef __cplusplus\r
}\r