123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360 |
- /* Originally written by Bodo Moeller for the OpenSSL project.
- * ====================================================================
- * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- *
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- *
- * 3. All advertising materials mentioning features or use of this
- * software must display the following acknowledgment:
- * "This product includes software developed by the OpenSSL Project
- * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
- *
- * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
- * endorse or promote products derived from this software without
- * prior written permission. For written permission, please contact
- * openssl-core@openssl.org.
- *
- * 5. Products derived from this software may not be called "OpenSSL"
- * nor may "OpenSSL" appear in their names without prior written
- * permission of the OpenSSL Project.
- *
- * 6. Redistributions of any form whatsoever must retain the following
- * acknowledgment:
- * "This product includes software developed by the OpenSSL Project
- * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
- *
- * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
- * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
- * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
- * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
- * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
- * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
- * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
- * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
- * OF THE POSSIBILITY OF SUCH DAMAGE.
- * ====================================================================
- *
- * This product includes cryptographic software written by Eric Young
- * (eay@cryptsoft.com). This product includes software written by Tim
- * Hudson (tjh@cryptsoft.com).
- *
- */
- /* ====================================================================
- * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
- *
- * Portions of the attached software ("Contribution") are developed by
- * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
- *
- * The Contribution is licensed pursuant to the OpenSSL open source
- * license provided above.
- *
- * The elliptic curve binary polynomial software is originally written by
- * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems
- * Laboratories. */
- #ifndef OPENSSL_HEADER_EC_KEY_H
- #define OPENSSL_HEADER_EC_KEY_H
- #include <openssl/base.h>
- #include <openssl/ec.h>
- #include <openssl/engine.h>
- #include <openssl/ex_data.h>
- #if defined(__cplusplus)
- extern "C" {
- #endif
- // ec_key.h contains functions that handle elliptic-curve points that are
- // public/private keys.
- // EC key objects.
- //
- // An |EC_KEY| object represents a public or private EC key. A given object may
- // be used concurrently on multiple threads by non-mutating functions, provided
- // no other thread is concurrently calling a mutating function. Unless otherwise
- // documented, functions which take a |const| pointer are non-mutating and
- // functions which take a non-|const| pointer are mutating.
- // EC_KEY_new returns a fresh |EC_KEY| object or NULL on error.
- OPENSSL_EXPORT EC_KEY *EC_KEY_new(void);
- // EC_KEY_new_method acts the same as |EC_KEY_new|, but takes an explicit
- // |ENGINE|.
- OPENSSL_EXPORT EC_KEY *EC_KEY_new_method(const ENGINE *engine);
- // EC_KEY_new_by_curve_name returns a fresh EC_KEY for group specified by |nid|
- // or NULL on error.
- OPENSSL_EXPORT EC_KEY *EC_KEY_new_by_curve_name(int nid);
- // EC_KEY_free frees all the data owned by |key| and |key| itself.
- OPENSSL_EXPORT void EC_KEY_free(EC_KEY *key);
- // EC_KEY_dup returns a fresh copy of |src| or NULL on error.
- OPENSSL_EXPORT EC_KEY *EC_KEY_dup(const EC_KEY *src);
- // EC_KEY_up_ref increases the reference count of |key| and returns one. It does
- // not mutate |key| for thread-safety purposes and may be used concurrently.
- OPENSSL_EXPORT int EC_KEY_up_ref(EC_KEY *key);
- // EC_KEY_is_opaque returns one if |key| is opaque and doesn't expose its key
- // material. Otherwise it return zero.
- OPENSSL_EXPORT int EC_KEY_is_opaque(const EC_KEY *key);
- // EC_KEY_get0_group returns a pointer to the |EC_GROUP| object inside |key|.
- OPENSSL_EXPORT const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key);
- // EC_KEY_set_group sets the |EC_GROUP| object that |key| will use to |group|.
- // It returns one on success and zero if |key| is already configured with a
- // different group.
- OPENSSL_EXPORT int EC_KEY_set_group(EC_KEY *key, const EC_GROUP *group);
- // EC_KEY_get0_private_key returns a pointer to the private key inside |key|.
- OPENSSL_EXPORT const BIGNUM *EC_KEY_get0_private_key(const EC_KEY *key);
- // EC_KEY_set_private_key sets the private key of |key| to |priv|. It returns
- // one on success and zero otherwise. |key| must already have had a group
- // configured (see |EC_KEY_set_group| and |EC_KEY_new_by_curve_name|).
- OPENSSL_EXPORT int EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *priv);
- // EC_KEY_get0_public_key returns a pointer to the public key point inside
- // |key|.
- OPENSSL_EXPORT const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key);
- // EC_KEY_set_public_key sets the public key of |key| to |pub|, by copying it.
- // It returns one on success and zero otherwise. |key| must already have had a
- // group configured (see |EC_KEY_set_group| and |EC_KEY_new_by_curve_name|), and
- // |pub| must also belong to that group.
- OPENSSL_EXPORT int EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub);
- #define EC_PKEY_NO_PARAMETERS 0x001
- #define EC_PKEY_NO_PUBKEY 0x002
- // EC_KEY_get_enc_flags returns the encoding flags for |key|, which is a
- // bitwise-OR of |EC_PKEY_*| values.
- OPENSSL_EXPORT unsigned EC_KEY_get_enc_flags(const EC_KEY *key);
- // EC_KEY_set_enc_flags sets the encoding flags for |key|, which is a
- // bitwise-OR of |EC_PKEY_*| values.
- OPENSSL_EXPORT void EC_KEY_set_enc_flags(EC_KEY *key, unsigned flags);
- // EC_KEY_get_conv_form returns the conversation form that will be used by
- // |key|.
- OPENSSL_EXPORT point_conversion_form_t EC_KEY_get_conv_form(const EC_KEY *key);
- // EC_KEY_set_conv_form sets the conversion form to be used by |key|.
- OPENSSL_EXPORT void EC_KEY_set_conv_form(EC_KEY *key,
- point_conversion_form_t cform);
- // EC_KEY_check_key performs several checks on |key| (possibly including an
- // expensive check that the public key is in the primary subgroup). It returns
- // one if all checks pass and zero otherwise. If it returns zero then detail
- // about the problem can be found on the error stack.
- OPENSSL_EXPORT int EC_KEY_check_key(const EC_KEY *key);
- // EC_KEY_check_fips performs both a signing pairwise consistency test
- // (FIPS 140-2 4.9.2) and the consistency test from SP 800-56Ar3 section
- // 5.6.2.1.4. It returns one if it passes and zero otherwise.
- OPENSSL_EXPORT int EC_KEY_check_fips(const EC_KEY *key);
- // EC_KEY_set_public_key_affine_coordinates sets the public key in |key| to
- // (|x|, |y|). It returns one on success and zero on error. It's considered an
- // error if |x| and |y| do not represent a point on |key|'s curve.
- OPENSSL_EXPORT int EC_KEY_set_public_key_affine_coordinates(EC_KEY *key,
- const BIGNUM *x,
- const BIGNUM *y);
- // EC_KEY_key2buf encodes the public key in |key| to an allocated octet string
- // and sets |*out_buf| to point to it. It returns the length of the encoded
- // octet string or zero if an error occurred.
- OPENSSL_EXPORT size_t EC_KEY_key2buf(const EC_KEY *key,
- point_conversion_form_t form,
- unsigned char **out_buf, BN_CTX *ctx);
- // Key generation.
- // EC_KEY_generate_key generates a random, private key, calculates the
- // corresponding public key and stores both in |key|. It returns one on success
- // or zero otherwise.
- OPENSSL_EXPORT int EC_KEY_generate_key(EC_KEY *key);
- // EC_KEY_generate_key_fips behaves like |EC_KEY_generate_key| but performs
- // additional checks for FIPS compliance. This function is applicable when
- // generating keys for either signing/verification or key agreement because
- // both types of consistency check (PCT) are performed.
- OPENSSL_EXPORT int EC_KEY_generate_key_fips(EC_KEY *key);
- // EC_KEY_derive_from_secret deterministically derives a private key for |group|
- // from an input secret using HKDF-SHA256. It returns a newly-allocated |EC_KEY|
- // on success or NULL on error. |secret| must not be used in any other
- // algorithm. If using a base secret for multiple operations, derive separate
- // values with a KDF such as HKDF first.
- //
- // Note this function implements an arbitrary derivation scheme, rather than any
- // particular standard one. New protocols are recommended to use X25519 and
- // Ed25519, which have standard byte import functions. See
- // |X25519_public_from_private| and |ED25519_keypair_from_seed|.
- OPENSSL_EXPORT EC_KEY *EC_KEY_derive_from_secret(const EC_GROUP *group,
- const uint8_t *secret,
- size_t secret_len);
- // Serialisation.
- // EC_KEY_parse_private_key parses a DER-encoded ECPrivateKey structure (RFC
- // 5915) from |cbs| and advances |cbs|. It returns a newly-allocated |EC_KEY| or
- // NULL on error. If |group| is non-null, the parameters field of the
- // ECPrivateKey may be omitted (but must match |group| if present). Otherwise,
- // the parameters field is required.
- OPENSSL_EXPORT EC_KEY *EC_KEY_parse_private_key(CBS *cbs,
- const EC_GROUP *group);
- // EC_KEY_marshal_private_key marshals |key| as a DER-encoded ECPrivateKey
- // structure (RFC 5915) and appends the result to |cbb|. It returns one on
- // success and zero on failure. |enc_flags| is a combination of |EC_PKEY_*|
- // values and controls whether corresponding fields are omitted.
- OPENSSL_EXPORT int EC_KEY_marshal_private_key(CBB *cbb, const EC_KEY *key,
- unsigned enc_flags);
- // EC_KEY_parse_curve_name parses a DER-encoded OBJECT IDENTIFIER as a curve
- // name from |cbs| and advances |cbs|. It returns a newly-allocated |EC_GROUP|
- // or NULL on error.
- OPENSSL_EXPORT EC_GROUP *EC_KEY_parse_curve_name(CBS *cbs);
- // EC_KEY_marshal_curve_name marshals |group| as a DER-encoded OBJECT IDENTIFIER
- // and appends the result to |cbb|. It returns one on success and zero on
- // failure.
- OPENSSL_EXPORT int EC_KEY_marshal_curve_name(CBB *cbb, const EC_GROUP *group);
- // EC_KEY_parse_parameters parses a DER-encoded ECParameters structure (RFC
- // 5480) from |cbs| and advances |cbs|. It returns a newly-allocated |EC_GROUP|
- // or NULL on error. It supports the namedCurve and specifiedCurve options, but
- // use of specifiedCurve is deprecated. Use |EC_KEY_parse_curve_name|
- // instead.
- OPENSSL_EXPORT EC_GROUP *EC_KEY_parse_parameters(CBS *cbs);
- // ex_data functions.
- //
- // These functions are wrappers. See |ex_data.h| for details.
- OPENSSL_EXPORT int EC_KEY_get_ex_new_index(long argl, void *argp,
- CRYPTO_EX_unused *unused,
- CRYPTO_EX_dup *dup_unused,
- CRYPTO_EX_free *free_func);
- OPENSSL_EXPORT int EC_KEY_set_ex_data(EC_KEY *r, int idx, void *arg);
- OPENSSL_EXPORT void *EC_KEY_get_ex_data(const EC_KEY *r, int idx);
- // ECDSA method.
- // ECDSA_FLAG_OPAQUE specifies that this ECDSA_METHOD does not expose its key
- // material. This may be set if, for instance, it is wrapping some other crypto
- // API, like a platform key store.
- #define ECDSA_FLAG_OPAQUE 1
- // ecdsa_method_st is a structure of function pointers for implementing ECDSA.
- // See engine.h.
- struct ecdsa_method_st {
- struct openssl_method_common_st common;
- void *app_data;
- int (*init)(EC_KEY *key);
- int (*finish)(EC_KEY *key);
- // group_order_size returns the number of bytes needed to represent the order
- // of the group. This is used to calculate the maximum size of an ECDSA
- // signature in |ECDSA_size|.
- size_t (*group_order_size)(const EC_KEY *key);
- // sign matches the arguments and behaviour of |ECDSA_sign|.
- int (*sign)(const uint8_t *digest, size_t digest_len, uint8_t *sig,
- unsigned int *sig_len, EC_KEY *eckey);
- int flags;
- };
- // Deprecated functions.
- // EC_KEY_set_asn1_flag does nothing.
- OPENSSL_EXPORT void EC_KEY_set_asn1_flag(EC_KEY *key, int flag);
- // d2i_ECPrivateKey parses a DER-encoded ECPrivateKey structure (RFC 5915) from
- // |len| bytes at |*inp|, as described in |d2i_SAMPLE|. On input, if |*out_key|
- // is non-NULL and has a group configured, the parameters field may be omitted
- // but must match that group if present.
- //
- // Use |EC_KEY_parse_private_key| instead.
- OPENSSL_EXPORT EC_KEY *d2i_ECPrivateKey(EC_KEY **out_key, const uint8_t **inp,
- long len);
- // i2d_ECPrivateKey marshals |key| as a DER-encoded ECPrivateKey structure (RFC
- // 5915), as described in |i2d_SAMPLE|.
- //
- // Use |EC_KEY_marshal_private_key| instead.
- OPENSSL_EXPORT int i2d_ECPrivateKey(const EC_KEY *key, uint8_t **outp);
- // d2i_ECParameters parses a DER-encoded ECParameters structure (RFC 5480) from
- // |len| bytes at |*inp|, as described in |d2i_SAMPLE|.
- //
- // Use |EC_KEY_parse_parameters| or |EC_KEY_parse_curve_name| instead.
- OPENSSL_EXPORT EC_KEY *d2i_ECParameters(EC_KEY **out_key, const uint8_t **inp,
- long len);
- // i2d_ECParameters marshals |key|'s parameters as a DER-encoded OBJECT
- // IDENTIFIER, as described in |i2d_SAMPLE|.
- //
- // Use |EC_KEY_marshal_curve_name| instead.
- OPENSSL_EXPORT int i2d_ECParameters(const EC_KEY *key, uint8_t **outp);
- // o2i_ECPublicKey parses an EC point from |len| bytes at |*inp| into
- // |*out_key|. Note that this differs from the d2i format in that |*out_key|
- // must be non-NULL with a group set. On successful exit, |*inp| is advanced by
- // |len| bytes. It returns |*out_key| or NULL on error.
- //
- // Use |EC_POINT_oct2point| instead.
- OPENSSL_EXPORT EC_KEY *o2i_ECPublicKey(EC_KEY **out_key, const uint8_t **inp,
- long len);
- // i2o_ECPublicKey marshals an EC point from |key|, as described in
- // |i2d_SAMPLE|.
- //
- // Use |EC_POINT_point2cbb| instead.
- OPENSSL_EXPORT int i2o_ECPublicKey(const EC_KEY *key, unsigned char **outp);
- #if defined(__cplusplus)
- } // extern C
- extern "C++" {
- BSSL_NAMESPACE_BEGIN
- BORINGSSL_MAKE_DELETER(EC_KEY, EC_KEY_free)
- BORINGSSL_MAKE_UP_REF(EC_KEY, EC_KEY_up_ref)
- BSSL_NAMESPACE_END
- } // extern C++
- #endif
- #endif // OPENSSL_HEADER_EC_KEY_H
|