2018-06-22 00:08:50 +08:00
|
|
|
/*
|
2020-04-23 20:55:52 +08:00
|
|
|
* Copyright 2018-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2018-06-22 00:08:50 +08:00
|
|
|
*
|
2018-12-06 20:12:35 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2018-06-22 00:08:50 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Internal EC functions for other submodules: not for application use */
|
|
|
|
|
2019-09-28 06:45:57 +08:00
|
|
|
#ifndef OSSL_CRYPTO_EC_H
|
|
|
|
# define OSSL_CRYPTO_EC_H
|
2018-06-22 00:08:50 +08:00
|
|
|
# include <openssl/opensslconf.h>
|
|
|
|
|
|
|
|
# ifndef OPENSSL_NO_EC
|
2020-03-23 12:40:47 +08:00
|
|
|
# include <openssl/core.h>
|
2018-06-22 00:08:50 +08:00
|
|
|
# include <openssl/ec.h>
|
|
|
|
|
|
|
|
/*-
|
|
|
|
* Computes the multiplicative inverse of x in the range
|
|
|
|
* [1,EC_GROUP::order), where EC_GROUP::order is the cardinality of the
|
|
|
|
* subgroup generated by the generator G:
|
|
|
|
*
|
|
|
|
* res := x^(-1) (mod EC_GROUP::order).
|
|
|
|
*
|
|
|
|
* This function expects the following two conditions to hold:
|
|
|
|
* - the EC_GROUP order is prime, and
|
|
|
|
* - x is included in the range [1, EC_GROUP::order).
|
|
|
|
*
|
|
|
|
* This function returns 1 on success, 0 on error.
|
|
|
|
*
|
|
|
|
* If the EC_GROUP order is even, this function explicitly returns 0 as
|
|
|
|
* an error.
|
|
|
|
* In case any of the two conditions stated above is not satisfied,
|
|
|
|
* the correctness of its output is not guaranteed, even if the return
|
|
|
|
* value could still be 1 (as primality testing and a conditional modular
|
|
|
|
* reduction round on the input can be omitted by the underlying
|
|
|
|
* implementations for better SCA properties on regular input values).
|
|
|
|
*/
|
|
|
|
__owur int ec_group_do_inverse_ord(const EC_GROUP *group, BIGNUM *res,
|
|
|
|
const BIGNUM *x, BN_CTX *ctx);
|
|
|
|
|
2018-10-02 05:11:57 +08:00
|
|
|
/*-
|
|
|
|
* ECDH Key Derivation Function as defined in ANSI X9.63
|
|
|
|
*/
|
|
|
|
int ecdh_KDF_X9_63(unsigned char *out, size_t outlen,
|
|
|
|
const unsigned char *Z, size_t Zlen,
|
|
|
|
const unsigned char *sinfo, size_t sinfolen,
|
2020-08-07 12:29:00 +08:00
|
|
|
const EVP_MD *md, OPENSSL_CTX *libctx, const char *propq);
|
2018-10-02 05:11:57 +08:00
|
|
|
|
2020-01-16 15:18:26 +08:00
|
|
|
int ec_key_public_check(const EC_KEY *eckey, BN_CTX *ctx);
|
|
|
|
int ec_key_private_check(const EC_KEY *eckey);
|
|
|
|
int ec_key_pairwise_check(const EC_KEY *eckey, BN_CTX *ctx);
|
|
|
|
OPENSSL_CTX *ec_key_get_libctx(const EC_KEY *eckey);
|
2020-06-15 21:21:00 +08:00
|
|
|
const char *ec_key_get0_propq(const EC_KEY *eckey);
|
2020-02-20 14:16:21 +08:00
|
|
|
const char *ec_curve_nid2name(int nid);
|
|
|
|
int ec_curve_name2nid(const char *name);
|
2020-03-23 12:40:47 +08:00
|
|
|
|
|
|
|
/* Backend support */
|
2020-08-22 12:55:41 +08:00
|
|
|
int ec_group_todata(const EC_GROUP *group, OSSL_PARAM_BLD *tmpl,
|
|
|
|
OSSL_PARAM params[], OPENSSL_CTX *libctx, const char *propq,
|
|
|
|
BN_CTX *bnctx, unsigned char **genbuf);
|
|
|
|
int ec_group_fromdata(EC_KEY *ec, const OSSL_PARAM params[]);
|
2020-03-23 12:40:47 +08:00
|
|
|
int ec_key_fromdata(EC_KEY *ecx, const OSSL_PARAM params[], int include_private);
|
|
|
|
int ec_key_otherparams_fromdata(EC_KEY *ec, const OSSL_PARAM params[]);
|
2020-05-26 11:53:07 +08:00
|
|
|
int ec_set_ecdh_cofactor_mode(EC_KEY *ec, int mode);
|
2020-08-22 12:55:41 +08:00
|
|
|
int ec_encoding_name2id(const char *name);
|
2020-03-23 12:40:47 +08:00
|
|
|
|
2020-09-11 04:06:46 +08:00
|
|
|
int evp_pkey_ctx_set_ec_param_enc_prov(EVP_PKEY_CTX *ctx, int param_enc);
|
|
|
|
|
2018-06-22 00:08:50 +08:00
|
|
|
# endif /* OPENSSL_NO_EC */
|
|
|
|
#endif
|