gnunet-android

GNUnet for Android
Log | Files | Refs | README

ecdsa.h (10424B)


      1 // Copyright 2002-2016 The OpenSSL Project Authors. All Rights Reserved.
      2 //
      3 // Licensed under the Apache License, Version 2.0 (the "License");
      4 // you may not use this file except in compliance with the License.
      5 // You may obtain a copy of the License at
      6 //
      7 //     https://www.apache.org/licenses/LICENSE-2.0
      8 //
      9 // Unless required by applicable law or agreed to in writing, software
     10 // distributed under the License is distributed on an "AS IS" BASIS,
     11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     12 // See the License for the specific language governing permissions and
     13 // limitations under the License.
     14 
     15 #ifndef OPENSSL_HEADER_ECDSA_H
     16 #define OPENSSL_HEADER_ECDSA_H
     17 
     18 #include <openssl/base.h>   // IWYU pragma: export
     19 
     20 #include <openssl/ec_key.h>
     21 
     22 #if defined(__cplusplus)
     23 extern "C" {
     24 #endif
     25 
     26 
     27 // ECDSA contains functions for signing and verifying with the Digital Signature
     28 // Algorithm over elliptic curves.
     29 
     30 
     31 // Signing and verifying.
     32 //
     33 // ECDSA does not have a single, common signature format across all
     34 // applications. These functions implement the more common, ASN.1-based format.
     35 // In it, signatures are a DER-encoded ECDSA-Sig-Value structure. Note that this
     36 // format is variable-length. Callers must be prepared to receive signatures
     37 // that are slightly shorter than the maximum for the ECDSA curve.
     38 
     39 // ECDSA_sign signs |digest_len| bytes from |digest| with |key| and writes the
     40 // resulting ASN.1-based signature to |sig|, which must have |ECDSA_size(key)|
     41 // bytes of space. On successful exit, |*sig_len| is set to the actual number of
     42 // bytes written. The |type| argument should be zero. It returns one on success
     43 // and zero otherwise.
     44 //
     45 // WARNING: |digest| must be the output of some hash function on the data to be
     46 // signed. Passing unhashed inputs will not result in a secure signature scheme.
     47 OPENSSL_EXPORT int ECDSA_sign(int type, const uint8_t *digest,
     48                               size_t digest_len, uint8_t *sig,
     49                               unsigned int *sig_len, const EC_KEY *key);
     50 
     51 // ECDSA_verify verifies that |sig_len| bytes from |sig| constitute a valid
     52 // ASN.1-based signature by |key| of |digest|. (The |type| argument should be
     53 // zero.) It returns one on success or zero if the signature is invalid or an
     54 // error occurred.
     55 //
     56 // WARNING: |digest| must be the output of some hash function on the data to be
     57 // verified. Passing unhashed inputs will not result in a secure signature
     58 // scheme.
     59 OPENSSL_EXPORT int ECDSA_verify(int type, const uint8_t *digest,
     60                                 size_t digest_len, const uint8_t *sig,
     61                                 size_t sig_len, const EC_KEY *key);
     62 
     63 // ECDSA_size returns the maximum size of an ASN.1-based ECDSA signature using
     64 // |key|. It returns zero if |key| is NULL or if it doesn't have a group set.
     65 OPENSSL_EXPORT size_t ECDSA_size(const EC_KEY *key);
     66 
     67 
     68 // Low-level signing and verification.
     69 //
     70 // Low-level functions handle signatures as |ECDSA_SIG| structures which allow
     71 // the two values in an ECDSA signature to be handled separately.
     72 
     73 struct ecdsa_sig_st {
     74   BIGNUM *r;
     75   BIGNUM *s;
     76 };
     77 
     78 // ECDSA_SIG_new returns a fresh |ECDSA_SIG| structure or NULL on error.
     79 OPENSSL_EXPORT ECDSA_SIG *ECDSA_SIG_new(void);
     80 
     81 // ECDSA_SIG_free frees |sig| its member |BIGNUM|s.
     82 OPENSSL_EXPORT void ECDSA_SIG_free(ECDSA_SIG *sig);
     83 
     84 // ECDSA_SIG_get0_r returns the r component of |sig|.
     85 OPENSSL_EXPORT const BIGNUM *ECDSA_SIG_get0_r(const ECDSA_SIG *sig);
     86 
     87 // ECDSA_SIG_get0_s returns the s component of |sig|.
     88 OPENSSL_EXPORT const BIGNUM *ECDSA_SIG_get0_s(const ECDSA_SIG *sig);
     89 
     90 // ECDSA_SIG_get0 sets |*out_r| and |*out_s|, if non-NULL, to the two
     91 // components of |sig|.
     92 OPENSSL_EXPORT void ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **out_r,
     93                                    const BIGNUM **out_s);
     94 
     95 // ECDSA_SIG_set0 sets |sig|'s components to |r| and |s|, neither of which may
     96 // be NULL. On success, it takes ownership of each argument and returns one.
     97 // Otherwise, it returns zero.
     98 OPENSSL_EXPORT int ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s);
     99 
    100 // ECDSA_do_sign signs |digest_len| bytes from |digest| with |key| and returns
    101 // the resulting signature structure, or NULL on error.
    102 //
    103 // WARNING: |digest| must be the output of some hash function on the data to be
    104 // signed. Passing unhashed inputs will not result in a secure signature scheme.
    105 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest,
    106                                         size_t digest_len, const EC_KEY *key);
    107 
    108 // ECDSA_do_verify verifies that |sig| constitutes a valid signature by |key|
    109 // of |digest|. It returns one on success or zero if the signature is invalid
    110 // or on error.
    111 //
    112 // WARNING: |digest| must be the output of some hash function on the data to be
    113 // verified. Passing unhashed inputs will not result in a secure signature
    114 // scheme.
    115 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len,
    116                                    const ECDSA_SIG *sig, const EC_KEY *key);
    117 
    118 
    119 // ASN.1 functions.
    120 
    121 // ECDSA_SIG_parse parses a DER-encoded ECDSA-Sig-Value structure from |cbs| and
    122 // advances |cbs|. It returns a newly-allocated |ECDSA_SIG| or NULL on error.
    123 OPENSSL_EXPORT ECDSA_SIG *ECDSA_SIG_parse(CBS *cbs);
    124 
    125 // ECDSA_SIG_from_bytes parses |in| as a DER-encoded ECDSA-Sig-Value structure.
    126 // It returns a newly-allocated |ECDSA_SIG| structure or NULL on error.
    127 OPENSSL_EXPORT ECDSA_SIG *ECDSA_SIG_from_bytes(const uint8_t *in,
    128                                                size_t in_len);
    129 
    130 // ECDSA_SIG_marshal marshals |sig| as a DER-encoded ECDSA-Sig-Value and appends
    131 // the result to |cbb|. It returns one on success and zero on error.
    132 OPENSSL_EXPORT int ECDSA_SIG_marshal(CBB *cbb, const ECDSA_SIG *sig);
    133 
    134 // ECDSA_SIG_to_bytes marshals |sig| as a DER-encoded ECDSA-Sig-Value and, on
    135 // success, sets |*out_bytes| to a newly allocated buffer containing the result
    136 // and returns one. Otherwise, it returns zero. The result should be freed with
    137 // |OPENSSL_free|.
    138 OPENSSL_EXPORT int ECDSA_SIG_to_bytes(uint8_t **out_bytes, size_t *out_len,
    139                                       const ECDSA_SIG *sig);
    140 
    141 // ECDSA_SIG_max_len returns the maximum length of a DER-encoded ECDSA-Sig-Value
    142 // structure for a group whose order is represented in |order_len| bytes, or
    143 // zero on overflow.
    144 OPENSSL_EXPORT size_t ECDSA_SIG_max_len(size_t order_len);
    145 
    146 
    147 // IEEE P1363 signing and verifying.
    148 //
    149 // ECDSA does not have a single, common signature format across all
    150 // applications. These functions implement the less common, fixed-width format,
    151 // defined in IEEE P1363. It is also used in PKCS#11 and DNSSEC. In it,
    152 // signatures are a concatenation of r and s components, each zero-padded up to
    153 // the width of the group order. This format is fixed-width, so a given ECDSA
    154 // curve's signatures will always have the same size.
    155 
    156 // ECDSA_sign_p1363 signs |digest_len| bytes from |digest| with |key| and writes
    157 // the resulting P1363-based signature to |sig|, which must have
    158 // |ECDSA_size_p1363(key)| bytes of space. On successful exit, |*out_sig_len| is
    159 // set to the actual number of bytes written, which will always match
    160 // |ECDSA_size_p1363(key)|. It returns one on success and zero otherwise.
    161 //
    162 // WARNING: |digest| must be the output of some hash function on the data to be
    163 // signed. Passing unhashed inputs will not result in a secure signature scheme.
    164 OPENSSL_EXPORT int ECDSA_sign_p1363(const uint8_t *digest, size_t digest_len,
    165                                     uint8_t *sig, size_t *out_sig_len,
    166                                     size_t max_sig_len, const EC_KEY *key);
    167 
    168 // ECDSA_verify_p1363 verifies that |sig_len| bytes from |sig| constitute a
    169 // valid P1363-based signature by |key| of |digest|. It returns one on success
    170 // or zero if the signature is invalid or an error occurred.
    171 //
    172 // WARNING: |digest| must be the output of some hash function on the data to be
    173 // verified. Passing unhashed inputs will not result in a secure signature
    174 // scheme.
    175 OPENSSL_EXPORT int ECDSA_verify_p1363(const uint8_t *digest, size_t digest_len,
    176                                       const uint8_t *sig, size_t sig_len,
    177                                       const EC_KEY *key);
    178 
    179 // ECDSA_size_p1363 returns the size of a P1363-based ECDSA signature using
    180 // |key|. It returns zero if |key| is NULL or if it doesn't have a group set.
    181 OPENSSL_EXPORT size_t ECDSA_size_p1363(const EC_KEY *key);
    182 
    183 
    184 // Testing-only functions.
    185 
    186 // ECDSA_sign_with_nonce_and_leak_private_key_for_testing behaves like
    187 // |ECDSA_do_sign| but uses |nonce| for the ECDSA nonce 'k', instead of a random
    188 // value. |nonce| is interpreted as a big-endian integer. It must be reduced
    189 // modulo the group order and padded with zeros up to |BN_num_bytes(order)|
    190 // bytes.
    191 //
    192 // WARNING: This function is only exported for testing purposes, when using test
    193 // vectors or fuzzing strategies. It must not be used outside tests and may leak
    194 // any private keys it is used with.
    195 OPENSSL_EXPORT ECDSA_SIG *
    196 ECDSA_sign_with_nonce_and_leak_private_key_for_testing(const uint8_t *digest,
    197                                                        size_t digest_len,
    198                                                        const EC_KEY *eckey,
    199                                                        const uint8_t *nonce,
    200                                                        size_t nonce_len);
    201 
    202 
    203 // Deprecated functions.
    204 
    205 // d2i_ECDSA_SIG parses aa DER-encoded ECDSA-Sig-Value structure from |len|
    206 // bytes at |*inp|, as described in |d2i_SAMPLE|.
    207 //
    208 // Use |ECDSA_SIG_parse| instead.
    209 OPENSSL_EXPORT ECDSA_SIG *d2i_ECDSA_SIG(ECDSA_SIG **out, const uint8_t **inp,
    210                                         long len);
    211 
    212 // i2d_ECDSA_SIG marshals |sig| as a DER-encoded ECDSA-Sig-Value, as described
    213 // in |i2d_SAMPLE|.
    214 //
    215 // Use |ECDSA_SIG_marshal| instead.
    216 OPENSSL_EXPORT int i2d_ECDSA_SIG(const ECDSA_SIG *sig, uint8_t **outp);
    217 
    218 
    219 #if defined(__cplusplus)
    220 }  // extern C
    221 
    222 extern "C++" {
    223 
    224 BSSL_NAMESPACE_BEGIN
    225 
    226 BORINGSSL_MAKE_DELETER(ECDSA_SIG, ECDSA_SIG_free)
    227 
    228 BSSL_NAMESPACE_END
    229 
    230 }  // extern C++
    231 
    232 #endif
    233 
    234 #define ECDSA_R_BAD_SIGNATURE 100
    235 #define ECDSA_R_MISSING_PARAMETERS 101
    236 #define ECDSA_R_NEED_NEW_SETUP_VALUES 102
    237 #define ECDSA_R_NOT_IMPLEMENTED 103
    238 #define ECDSA_R_RANDOM_NUMBER_GENERATION_FAILED 104
    239 #define ECDSA_R_ENCODE_ERROR 105
    240 #define ECDSA_R_TOO_MANY_ITERATIONS 106
    241 
    242 #endif  // OPENSSL_HEADER_ECDSA_H