# /usr/man/cat.3/BN_num_bytes.3.Z

## NAME

BN_num_bits, BN_num_bytes, BN_num_bits_word - get BIGNUM size

## SYNOPSIS

#include <openssl/bn.h>
int BN_num_bytes(const BIGNUM *a);
int BN_num_bits(const BIGNUM *a);
int BN_num_bits_word(BN_ULONG w);

## DESCRIPTION

*BN***_***num***_***bytes()* returns the size of a **BIGNUM** in bytes.
*BN***_***num***_***bits***_***word()* returns the number of significant bits in a word.
If we take 0x00000432 as an example, it returns 11, not 16, not 32.
Basically, except for a zero, it returns *floor(log2(w))+1*.
*BN***_***num***_***bits()* returns the number of significant bits in a **BIGNUM**, fol-
lowing the same principle as *BN***_***num***_***bits***_***word()*.
*BN***_***num***_***bytes()* is a macro.

## RETURN VALUES

The size.

## NOTES

Some have tried using *BN***_***num***_***bits()* on individual numbers in RSA keys,
DH keys and DSA keys, and found that they don't always come up with the
number of bits they expected (something like 512, 1024, 2048, ...).
This is because generating a number with some specific number of bits
doesn't always set the highest bits, thereby making the number of *sig-*
*nificant* bits a little lower. If you want to know the "key size" of
such a key, either use functions like *RSA***_***size()*, *DH***_***size()* and
*DSA***_***size()*, or use *BN***_***num***_***bytes()* and multiply with 8 (although there's
no real guarantee that will match the "key size", just a lot more prob-
ability).

## SEE ALSO

**bn(3)**, **DH_size(3)**, **DSA_size(3)**, **RSA_size(3)**

## HISTORY

*BN***_***num***_***bytes()*, *BN***_***num***_***bits()* and *BN***_***num***_***bits***_***word()* are available in
all versions of SSLeay and OpenSSL.
1.0.2t 2019-09-10 **BN_num_bytes(3)**
See also **BN_num_bits(3)**
See also **BN_num_bits_word(3)**

Man(1) output converted with
man2html