mirror of
https://github.com/openssl/openssl.git
synced 2024-12-09 05:51:54 +08:00
6963979f5c
Because decoders are coupled with keymgmts from the same provider, ours need to produce provider side keys the same way. Since our keymgmts create key data with the provider library context, so must our decoders. We solve with functions to adjust the library context of decoded keys, and use them. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13661)
79 lines
3.0 KiB
C
79 lines
3.0 KiB
C
/*
|
|
* Copyright 2018-2020 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
/* Internal EC functions for other submodules: not for application use */
|
|
|
|
#ifndef OSSL_CRYPTO_EC_H
|
|
# define OSSL_CRYPTO_EC_H
|
|
# include <openssl/opensslconf.h>
|
|
# include <openssl/evp.h>
|
|
|
|
const char *ec_curve_nid2name(int nid);
|
|
int ec_curve_name2nid(const char *name);
|
|
const char *ec_curve_nid2nist_int(int nid);
|
|
int ec_curve_nist2nid_int(const char *name);
|
|
int evp_pkey_ctx_set_ec_param_enc_prov(EVP_PKEY_CTX *ctx, int param_enc);
|
|
|
|
# ifndef OPENSSL_NO_EC
|
|
# include <openssl/core.h>
|
|
# include <openssl/ec.h>
|
|
|
|
/*-
|
|
* Computes the multiplicative inverse of x in the range
|
|
* [1,EC_GROUP::order), where EC_GROUP::order is the cardinality of the
|
|
* subgroup generated by the generator G:
|
|
*
|
|
* res := x^(-1) (mod EC_GROUP::order).
|
|
*
|
|
* This function expects the following two conditions to hold:
|
|
* - the EC_GROUP order is prime, and
|
|
* - x is included in the range [1, EC_GROUP::order).
|
|
*
|
|
* This function returns 1 on success, 0 on error.
|
|
*
|
|
* If the EC_GROUP order is even, this function explicitly returns 0 as
|
|
* an error.
|
|
* In case any of the two conditions stated above is not satisfied,
|
|
* the correctness of its output is not guaranteed, even if the return
|
|
* value could still be 1 (as primality testing and a conditional modular
|
|
* reduction round on the input can be omitted by the underlying
|
|
* implementations for better SCA properties on regular input values).
|
|
*/
|
|
__owur int ec_group_do_inverse_ord(const EC_GROUP *group, BIGNUM *res,
|
|
const BIGNUM *x, BN_CTX *ctx);
|
|
|
|
/*-
|
|
* ECDH Key Derivation Function as defined in ANSI X9.63
|
|
*/
|
|
int ecdh_KDF_X9_63(unsigned char *out, size_t outlen,
|
|
const unsigned char *Z, size_t Zlen,
|
|
const unsigned char *sinfo, size_t sinfolen,
|
|
const EVP_MD *md, OSSL_LIB_CTX *libctx, const char *propq);
|
|
|
|
int ec_key_public_check(const EC_KEY *eckey, BN_CTX *ctx);
|
|
int ec_key_private_check(const EC_KEY *eckey);
|
|
int ec_key_pairwise_check(const EC_KEY *eckey, BN_CTX *ctx);
|
|
OSSL_LIB_CTX *ec_key_get_libctx(const EC_KEY *eckey);
|
|
const char *ec_key_get0_propq(const EC_KEY *eckey);
|
|
void ec_key_set0_libctx(EC_KEY *key, OSSL_LIB_CTX *libctx);
|
|
|
|
/* Backend support */
|
|
int ec_group_todata(const EC_GROUP *group, OSSL_PARAM_BLD *tmpl,
|
|
OSSL_PARAM params[], OSSL_LIB_CTX *libctx,
|
|
const char *propq,
|
|
BN_CTX *bnctx, unsigned char **genbuf);
|
|
int ec_group_fromdata(EC_KEY *ec, const OSSL_PARAM params[]);
|
|
int ec_key_fromdata(EC_KEY *ecx, const OSSL_PARAM params[], int include_private);
|
|
int ec_key_otherparams_fromdata(EC_KEY *ec, const OSSL_PARAM params[]);
|
|
int ec_set_ecdh_cofactor_mode(EC_KEY *ec, int mode);
|
|
int ec_encoding_name2id(const char *name);
|
|
|
|
# endif /* OPENSSL_NO_EC */
|
|
#endif
|