blob: 5b0f516f471e46407609a6107bf683c8ac4f9eab [file] [log] [blame]
Adam Langley95c29f32014-06-20 12:00:00 -07001/* Originally written by Bodo Moeller for the OpenSSL project.
2 * ====================================================================
3 * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 *
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in
14 * the documentation and/or other materials provided with the
15 * distribution.
16 *
17 * 3. All advertising materials mentioning features or use of this
18 * software must display the following acknowledgment:
19 * "This product includes software developed by the OpenSSL Project
20 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
21 *
22 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
23 * endorse or promote products derived from this software without
24 * prior written permission. For written permission, please contact
25 * openssl-core@openssl.org.
26 *
27 * 5. Products derived from this software may not be called "OpenSSL"
28 * nor may "OpenSSL" appear in their names without prior written
29 * permission of the OpenSSL Project.
30 *
31 * 6. Redistributions of any form whatsoever must retain the following
32 * acknowledgment:
33 * "This product includes software developed by the OpenSSL Project
34 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
35 *
36 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
37 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
38 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
39 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
40 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
41 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
42 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
43 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
44 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
45 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
46 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
47 * OF THE POSSIBILITY OF SUCH DAMAGE.
48 * ====================================================================
49 *
50 * This product includes cryptographic software written by Eric Young
51 * (eay@cryptsoft.com). This product includes software written by Tim
52 * Hudson (tjh@cryptsoft.com).
53 *
54 */
55/* ====================================================================
56 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
57 *
58 * Portions of the attached software ("Contribution") are developed by
59 * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
60 *
61 * The Contribution is licensed pursuant to the OpenSSL open source
62 * license provided above.
63 *
64 * The elliptic curve binary polynomial software is originally written by
65 * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems
66 * Laboratories. */
67
68#ifndef OPENSSL_HEADER_EC_KEY_H
69#define OPENSSL_HEADER_EC_KEY_H
70
71#include <openssl/base.h>
72
73#include <openssl/ec.h>
74#include <openssl/engine.h>
75#include <openssl/ex_data.h>
76
77#if defined(__cplusplus)
78extern "C" {
79#endif
80
81
David Benjamine00fc882015-04-08 03:35:43 -040082/* ec_key.h contains functions that handle elliptic-curve points that are
Adam Langley95c29f32014-06-20 12:00:00 -070083 * public/private keys. */
84
85
86/* EC key objects. */
87
88/* EC_KEY_new returns a fresh |EC_KEY| object or NULL on error. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070089OPENSSL_EXPORT EC_KEY *EC_KEY_new(void);
Adam Langley95c29f32014-06-20 12:00:00 -070090
91/* EC_KEY_new_method acts the same as |EC_KEY_new|, but takes an explicit
92 * |ENGINE|. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070093OPENSSL_EXPORT EC_KEY *EC_KEY_new_method(const ENGINE *engine);
Adam Langley95c29f32014-06-20 12:00:00 -070094
95/* EC_KEY_new_by_curve_name returns a fresh EC_KEY for group specified by |nid|
96 * or NULL on error. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070097OPENSSL_EXPORT EC_KEY *EC_KEY_new_by_curve_name(int nid);
Adam Langley95c29f32014-06-20 12:00:00 -070098
99/* EC_KEY_free frees all the data owned by |key| and |key| itself. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700100OPENSSL_EXPORT void EC_KEY_free(EC_KEY *key);
Adam Langley95c29f32014-06-20 12:00:00 -0700101
102/* EC_KEY_copy sets |dst| equal to |src| and returns |dst| or NULL on error. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700103OPENSSL_EXPORT EC_KEY *EC_KEY_copy(EC_KEY *dst, const EC_KEY *src);
Adam Langley95c29f32014-06-20 12:00:00 -0700104
105/* EC_KEY_dup returns a fresh copy of |src| or NULL on error. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700106OPENSSL_EXPORT EC_KEY *EC_KEY_dup(const EC_KEY *src);
Adam Langley95c29f32014-06-20 12:00:00 -0700107
108/* EC_KEY_up_ref increases the reference count of |key|. It returns one on
109 * success and zero otherwise. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700110OPENSSL_EXPORT int EC_KEY_up_ref(EC_KEY *key);
Adam Langley95c29f32014-06-20 12:00:00 -0700111
David Benjaminecc0ce72014-07-18 18:39:42 -0400112/* EC_KEY_is_opaque returns one if |key| is opaque and doesn't expose its key
113 * material. Otherwise it return zero. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700114OPENSSL_EXPORT int EC_KEY_is_opaque(const EC_KEY *key);
David Benjaminecc0ce72014-07-18 18:39:42 -0400115
Adam Langley95c29f32014-06-20 12:00:00 -0700116/* EC_KEY_get0_group returns a pointer to the |EC_GROUP| object inside |key|. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700117OPENSSL_EXPORT const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key);
Adam Langley95c29f32014-06-20 12:00:00 -0700118
119/* EC_KEY_set_group sets the |EC_GROUP| object that |key| will use to |group|.
120 * It returns one on success and zero otherwise. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700121OPENSSL_EXPORT int EC_KEY_set_group(EC_KEY *key, const EC_GROUP *group);
Adam Langley95c29f32014-06-20 12:00:00 -0700122
123/* EC_KEY_get0_private_key returns a pointer to the private key inside |key|. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700124OPENSSL_EXPORT const BIGNUM *EC_KEY_get0_private_key(const EC_KEY *key);
Adam Langley95c29f32014-06-20 12:00:00 -0700125
126/* EC_KEY_set_private_key sets the private key of |key| to |priv|. It returns
127 * one on success and zero otherwise. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700128OPENSSL_EXPORT int EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *prv);
Adam Langley95c29f32014-06-20 12:00:00 -0700129
130/* EC_KEY_get0_public_key returns a pointer to the public key point inside
131 * |key|. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700132OPENSSL_EXPORT const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key);
Adam Langley95c29f32014-06-20 12:00:00 -0700133
134/* EC_KEY_set_public_key sets the public key of |key| to |pub|, by copying it.
135 * It returns one on success and zero otherwise. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700136OPENSSL_EXPORT int EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub);
Adam Langley95c29f32014-06-20 12:00:00 -0700137
138#define EC_PKEY_NO_PARAMETERS 0x001
139#define EC_PKEY_NO_PUBKEY 0x002
140
141/* EC_KEY_get_enc_flags returns the encoding flags for |key|, which is a
142 * bitwise-OR of |EC_PKEY_*| values. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700143OPENSSL_EXPORT unsigned EC_KEY_get_enc_flags(const EC_KEY *key);
Adam Langley95c29f32014-06-20 12:00:00 -0700144
145/* EC_KEY_set_enc_flags sets the encoding flags for |key|, which is a
146 * bitwise-OR of |EC_PKEY_*| values. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700147OPENSSL_EXPORT void EC_KEY_set_enc_flags(EC_KEY *key, unsigned flags);
Adam Langley95c29f32014-06-20 12:00:00 -0700148
149/* EC_KEY_get_conv_form returns the conversation form that will be used by
150 * |key|. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700151OPENSSL_EXPORT point_conversion_form_t EC_KEY_get_conv_form(const EC_KEY *key);
Adam Langley95c29f32014-06-20 12:00:00 -0700152
153/* EC_KEY_set_conv_form sets the conversion form to be used by |key|. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700154OPENSSL_EXPORT void EC_KEY_set_conv_form(EC_KEY *key,
155 point_conversion_form_t cform);
Adam Langley95c29f32014-06-20 12:00:00 -0700156
Adam Langley95c29f32014-06-20 12:00:00 -0700157/* EC_KEY_check_key performs several checks on |key| (possibly including an
158 * expensive check that the public key is in the primary subgroup). It returns
159 * one if all checks pass and zero otherwise. If it returns zero then detail
160 * about the problem can be found on the error stack. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700161OPENSSL_EXPORT int EC_KEY_check_key(const EC_KEY *key);
Adam Langley95c29f32014-06-20 12:00:00 -0700162
163/* EC_KEY_set_public_key_affine_coordinates sets the public key in |key| to
164 * (|x|, |y|). It returns one on success and zero otherwise. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700165OPENSSL_EXPORT int EC_KEY_set_public_key_affine_coordinates(EC_KEY *key,
166 BIGNUM *x,
167 BIGNUM *y);
Adam Langley95c29f32014-06-20 12:00:00 -0700168
169
170/* Key generation. */
171
172/* EC_KEY_generate_key generates a random, private key, calculates the
173 * corresponding public key and stores both in |key|. It returns one on success
174 * or zero otherwise. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700175OPENSSL_EXPORT int EC_KEY_generate_key(EC_KEY *key);
Adam Langley95c29f32014-06-20 12:00:00 -0700176
177
178/* Serialisation. */
179
David Benjamin2f6410b2016-01-03 00:57:37 -0800180/* EC_KEY_parse_private_key parses a DER-encoded ECPrivateKey structure (RFC
181 * 5915) from |cbs| and advances |cbs|. It returns a newly-allocated |EC_KEY| or
182 * NULL on error. If |group| is non-null, the parameters field of the
183 * ECPrivateKey may be omitted (but must match |group| if present). Otherwise,
184 * the parameters field is required. */
185OPENSSL_EXPORT EC_KEY *EC_KEY_parse_private_key(CBS *cbs,
186 const EC_GROUP *group);
Adam Langley95c29f32014-06-20 12:00:00 -0700187
David Benjamin2f6410b2016-01-03 00:57:37 -0800188/* EC_KEY_marshal_private_key marshals |key| as a DER-encoded ECPrivateKey
189 * structure (RFC 5915) and appends the result to |cbb|. It returns one on
190 * success and zero on failure. |enc_flags| is a combination of |EC_PKEY_*|
191 * values and controls whether corresponding fields are omitted. */
192OPENSSL_EXPORT int EC_KEY_marshal_private_key(CBB *cbb, const EC_KEY *key,
193 unsigned enc_flags);
Adam Langley95c29f32014-06-20 12:00:00 -0700194
David Benjamind44a9432016-03-31 18:15:27 -0400195/* EC_KEY_parse_curve_name parses a DER-encoded OBJECT IDENTIFIER as a curve
David Benjamin0d76c402016-03-25 18:07:15 -0400196 * name from |cbs| and advances |cbs|. It returns a newly-allocated |EC_GROUP|
197 * or NULL on error. */
198OPENSSL_EXPORT EC_GROUP *EC_KEY_parse_curve_name(CBS *cbs);
199
200/* EC_KEY_marshal_curve_name marshals |group| as a DER-encoded OBJECT IDENTIFIER
201 * and appends the result to |cbb|. It returns one on success and zero on
202 * failure. */
203OPENSSL_EXPORT int EC_KEY_marshal_curve_name(CBB *cbb, const EC_GROUP *group);
204
David Benjamin2f6410b2016-01-03 00:57:37 -0800205/* EC_KEY_parse_parameters parses a DER-encoded ECParameters structure (RFC
206 * 5480) from |cbs| and advances |cbs|. It returns a newly-allocated |EC_GROUP|
207 * or NULL on error. It supports the namedCurve and specifiedCurve options, but
David Benjamin0d76c402016-03-25 18:07:15 -0400208 * use of specifiedCurve is deprecated. Use |EC_KEY_parse_curve_name|
209 * instead. */
David Benjamin2f6410b2016-01-03 00:57:37 -0800210OPENSSL_EXPORT EC_GROUP *EC_KEY_parse_parameters(CBS *cbs);
Adam Langley95c29f32014-06-20 12:00:00 -0700211
212
213/* ex_data functions.
214 *
215 * These functions are wrappers. See |ex_data.h| for details. */
216
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700217OPENSSL_EXPORT int EC_KEY_get_ex_new_index(long argl, void *argp,
David Benjamin8a589332015-12-04 23:14:35 -0500218 CRYPTO_EX_unused *unused,
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700219 CRYPTO_EX_dup *dup_func,
220 CRYPTO_EX_free *free_func);
221OPENSSL_EXPORT int EC_KEY_set_ex_data(EC_KEY *r, int idx, void *arg);
222OPENSSL_EXPORT void *EC_KEY_get_ex_data(const EC_KEY *r, int idx);
Adam Langley95c29f32014-06-20 12:00:00 -0700223
224
225/* ECDSA method. */
226
David Benjaminecc0ce72014-07-18 18:39:42 -0400227/* ECDSA_FLAG_OPAQUE specifies that this ECDSA_METHOD does not expose its key
228 * material. This may be set if, for instance, it is wrapping some other crypto
229 * API, like a platform key store. */
230#define ECDSA_FLAG_OPAQUE 1
231
Adam Langley95c29f32014-06-20 12:00:00 -0700232/* ecdsa_method_st is a structure of function pointers for implementing ECDSA.
233 * See engine.h. */
234struct ecdsa_method_st {
235 struct openssl_method_common_st common;
236
237 void *app_data;
238
239 int (*init)(EC_KEY *key);
240 int (*finish)(EC_KEY *key);
241
Adam Langley449f16b2014-07-15 15:15:09 -0700242 /* group_order_size returns the number of bytes needed to represent the order
243 * of the group. This is used to calculate the maximum size of an ECDSA
244 * signature in |ECDSA_size|. */
245 size_t (*group_order_size)(const EC_KEY *key);
Adam Langley95c29f32014-06-20 12:00:00 -0700246
247 /* sign matches the arguments and behaviour of |ECDSA_sign|. */
248 int (*sign)(const uint8_t *digest, size_t digest_len, uint8_t *sig,
249 unsigned int *sig_len, EC_KEY *eckey);
250
Brian Smithc0b196d2016-03-04 08:54:07 -1000251 /* Ignored. Set this to NULL. */
Adam Langley95c29f32014-06-20 12:00:00 -0700252 int (*verify)(const uint8_t *digest, size_t digest_len, const uint8_t *sig,
253 size_t sig_len, EC_KEY *eckey);
David Benjaminecc0ce72014-07-18 18:39:42 -0400254
255 int flags;
Adam Langley95c29f32014-06-20 12:00:00 -0700256};
257
258
Adam Langleyc3ef76f2015-04-13 14:34:17 -0700259/* Deprecated functions. */
260
261/* EC_KEY_set_asn1_flag does nothing. */
262OPENSSL_EXPORT void EC_KEY_set_asn1_flag(EC_KEY *key, int flag);
263
David Benjamin2f6410b2016-01-03 00:57:37 -0800264/* d2i_ECPrivateKey parses an ASN.1, DER-encoded, private key from |len| bytes
265 * at |*inp|. If |out_key| is not NULL then, on exit, a pointer to the result
266 * is in |*out_key|. Note that, even if |*out_key| is already non-NULL on entry,
267 * it * will not be written to. Rather, a fresh |EC_KEY| is allocated and the
268 * previous * one is freed. On successful exit, |*inp| is advanced past the DER
269 * structure. It returns the result or NULL on error.
270 *
271 * On input, if |*out_key| is non-NULL and has a group configured, the
272 * parameters field may be omitted but must match that group if present.
273 *
274 * Use |EC_KEY_parse_private_key| instead. */
275OPENSSL_EXPORT EC_KEY *d2i_ECPrivateKey(EC_KEY **out_key, const uint8_t **inp,
276 long len);
277
278/* i2d_ECPrivateKey marshals an EC private key from |key| to an ASN.1, DER
279 * structure. If |outp| is not NULL then the result is written to |*outp| and
280 * |*outp| is advanced just past the output. It returns the number of bytes in
281 * the result, whether written or not, or a negative value on error.
282 *
283 * Use |EC_KEY_marshal_private_key| instead. */
284OPENSSL_EXPORT int i2d_ECPrivateKey(const EC_KEY *key, uint8_t **outp);
285
286/* d2i_ECParameters parses an ASN.1, DER-encoded, set of EC parameters from
287 * |len| bytes at |*inp|. If |out_key| is not NULL then, on exit, a pointer to
288 * the result is in |*out_key|. Note that, even if |*out_key| is already
289 * non-NULL on entry, it will not be written to. Rather, a fresh |EC_KEY| is
290 * allocated and the previous one is freed. On successful exit, |*inp| is
291 * advanced past the DER structure. It returns the result or NULL on error.
292 *
David Benjamin0d76c402016-03-25 18:07:15 -0400293 * Use |EC_KEY_parse_parameters| or |EC_KEY_parse_curve_name| instead. */
David Benjamin2f6410b2016-01-03 00:57:37 -0800294OPENSSL_EXPORT EC_KEY *d2i_ECParameters(EC_KEY **out_key, const uint8_t **inp,
295 long len);
296
297/* i2d_ECParameters marshals EC parameters from |key| to an ASN.1, DER
298 * structure. If |outp| is not NULL then the result is written to |*outp| and
299 * |*outp| is advanced just past the output. It returns the number of bytes in
300 * the result, whether written or not, or a negative value on error.
301 *
David Benjamin0d76c402016-03-25 18:07:15 -0400302 * Use |EC_KEY_marshal_curve_name| instead. */
David Benjamin2f6410b2016-01-03 00:57:37 -0800303OPENSSL_EXPORT int i2d_ECParameters(const EC_KEY *key, uint8_t **outp);
304
305/* o2i_ECPublicKey parses an EC point from |len| bytes at |*inp| into
306 * |*out_key|. Note that this differs from the d2i format in that |*out_key|
307 * must be non-NULL with a group set. On successful exit, |*inp| is advanced by
308 * |len| bytes. It returns |*out_key| or NULL on error.
309 *
310 * Use |EC_POINT_oct2point| instead. */
311OPENSSL_EXPORT EC_KEY *o2i_ECPublicKey(EC_KEY **out_key, const uint8_t **inp,
312 long len);
313
314/* i2o_ECPublicKey marshals an EC point from |key|. If |outp| is not NULL then
315 * the result is written to |*outp| and |*outp| is advanced just past the
316 * output. It returns the number of bytes in the result, whether written or
317 * not, or a negative value on error.
318 *
319 * Use |EC_POINT_point2cbb| instead. */
320OPENSSL_EXPORT int i2o_ECPublicKey(const EC_KEY *key, unsigned char **outp);
321
Adam Langleyc3ef76f2015-04-13 14:34:17 -0700322
Adam Langley95c29f32014-06-20 12:00:00 -0700323#if defined(__cplusplus)
324} /* extern C */
Adam Langley8c3c3132016-07-11 15:22:19 -0700325
Adam Langley8d79ed62016-07-11 17:00:46 -0700326#if defined(BORINGSSL_HAVE_CXX11)
Adam Langley8c3c3132016-07-11 15:22:19 -0700327
328namespace bssl {
329
330using ScopedEC_KEY = ScopedType<EC_KEY, EC_KEY_free>;
331
332} // namespace bssl
333
334#endif
335
Adam Langley95c29f32014-06-20 12:00:00 -0700336#endif
337
338#endif /* OPENSSL_HEADER_EC_KEY_H */