2013-08-12 17:06:05 +02:00
|
|
|
/**
|
2021-03-09 18:03:29 +01:00
|
|
|
* \file pk_wrap.h
|
2013-08-12 17:06:05 +02:00
|
|
|
*
|
|
|
|
* \brief Public Key abstraction layer: wrapper functions
|
2018-01-05 16:33:17 +01:00
|
|
|
*/
|
|
|
|
/*
|
2020-08-07 13:07:28 +02:00
|
|
|
* Copyright The Mbed TLS Contributors
|
2015-09-04 14:21:07 +02:00
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
2013-08-12 17:06:05 +02:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
2013-08-12 17:06:05 +02:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2013-08-12 17:06:05 +02:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
2013-08-12 17:06:05 +02:00
|
|
|
*/
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#ifndef MBEDTLS_PK_WRAP_H
|
|
|
|
#define MBEDTLS_PK_WRAP_H
|
2013-08-12 17:06:05 +02:00
|
|
|
|
2021-05-27 11:25:03 +02:00
|
|
|
#include "mbedtls/build_info.h"
|
2013-08-12 17:06:05 +02:00
|
|
|
|
2019-07-04 21:01:14 +02:00
|
|
|
#include "mbedtls/pk.h"
|
2013-08-12 17:06:05 +02:00
|
|
|
|
2022-03-16 03:30:41 +01:00
|
|
|
#if defined(MBEDTLS_PSA_CRYPTO_C)
|
|
|
|
#include "psa/crypto.h"
|
|
|
|
#endif /* MBEDTLS_PSA_CRYPTO_C */
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
struct mbedtls_pk_info_t {
|
2015-03-31 14:43:19 +02:00
|
|
|
/** Public key type */
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_pk_type_t type;
|
2015-03-31 14:43:19 +02:00
|
|
|
|
|
|
|
/** Type name */
|
|
|
|
const char *name;
|
|
|
|
|
|
|
|
/** Get key size in bits */
|
2023-01-11 14:50:10 +01:00
|
|
|
size_t (*get_bitlen)(const void *);
|
2015-03-31 14:43:19 +02:00
|
|
|
|
|
|
|
/** Tell if the context implements this type (e.g. ECKEY can do ECDSA) */
|
2023-01-11 14:50:10 +01:00
|
|
|
int (*can_do)(mbedtls_pk_type_t type);
|
2015-03-31 14:43:19 +02:00
|
|
|
|
|
|
|
/** Verify signature */
|
2023-01-11 14:50:10 +01:00
|
|
|
int (*verify_func)(void *ctx, mbedtls_md_type_t md_alg,
|
|
|
|
const unsigned char *hash, size_t hash_len,
|
|
|
|
const unsigned char *sig, size_t sig_len);
|
2015-03-31 14:43:19 +02:00
|
|
|
|
|
|
|
/** Make signature */
|
2023-01-11 14:50:10 +01:00
|
|
|
int (*sign_func)(void *ctx, mbedtls_md_type_t md_alg,
|
|
|
|
const unsigned char *hash, size_t hash_len,
|
|
|
|
unsigned char *sig, size_t sig_size, size_t *sig_len,
|
|
|
|
int (*f_rng)(void *, unsigned char *, size_t),
|
|
|
|
void *p_rng);
|
2015-03-31 14:43:19 +02:00
|
|
|
|
2023-02-07 08:08:53 +01:00
|
|
|
#if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECP_RESTARTABLE)
|
2017-05-09 10:42:40 +02:00
|
|
|
/** Verify signature (restartable) */
|
2023-01-11 14:50:10 +01:00
|
|
|
int (*verify_rs_func)(void *ctx, mbedtls_md_type_t md_alg,
|
|
|
|
const unsigned char *hash, size_t hash_len,
|
|
|
|
const unsigned char *sig, size_t sig_len,
|
|
|
|
void *rs_ctx);
|
2017-05-09 10:42:40 +02:00
|
|
|
|
|
|
|
/** Make signature (restartable) */
|
2023-01-11 14:50:10 +01:00
|
|
|
int (*sign_rs_func)(void *ctx, mbedtls_md_type_t md_alg,
|
|
|
|
const unsigned char *hash, size_t hash_len,
|
|
|
|
unsigned char *sig, size_t sig_size, size_t *sig_len,
|
|
|
|
int (*f_rng)(void *, unsigned char *, size_t),
|
|
|
|
void *p_rng, void *rs_ctx);
|
2017-08-18 17:30:37 +02:00
|
|
|
#endif /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */
|
2017-05-09 10:42:40 +02:00
|
|
|
|
2015-03-31 14:43:19 +02:00
|
|
|
/** Decrypt message */
|
2023-01-11 14:50:10 +01:00
|
|
|
int (*decrypt_func)(void *ctx, const unsigned char *input, size_t ilen,
|
|
|
|
unsigned char *output, size_t *olen, size_t osize,
|
|
|
|
int (*f_rng)(void *, unsigned char *, size_t),
|
|
|
|
void *p_rng);
|
2015-03-31 14:43:19 +02:00
|
|
|
|
|
|
|
/** Encrypt message */
|
2023-01-11 14:50:10 +01:00
|
|
|
int (*encrypt_func)(void *ctx, const unsigned char *input, size_t ilen,
|
|
|
|
unsigned char *output, size_t *olen, size_t osize,
|
|
|
|
int (*f_rng)(void *, unsigned char *, size_t),
|
|
|
|
void *p_rng);
|
2015-03-31 14:43:19 +02:00
|
|
|
|
|
|
|
/** Check public-private key pair */
|
2023-01-11 14:50:10 +01:00
|
|
|
int (*check_pair_func)(const void *pub, const void *prv,
|
|
|
|
int (*f_rng)(void *, unsigned char *, size_t),
|
|
|
|
void *p_rng);
|
2015-03-31 14:43:19 +02:00
|
|
|
|
|
|
|
/** Allocate a new context */
|
2023-01-11 14:50:10 +01:00
|
|
|
void * (*ctx_alloc_func)(void);
|
2015-03-31 14:43:19 +02:00
|
|
|
|
|
|
|
/** Free the given context */
|
2023-01-11 14:50:10 +01:00
|
|
|
void (*ctx_free_func)(void *ctx);
|
2015-03-31 14:43:19 +02:00
|
|
|
|
2017-08-18 17:30:37 +02:00
|
|
|
#if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECP_RESTARTABLE)
|
2017-08-18 16:22:06 +02:00
|
|
|
/** Allocate the restart context */
|
2023-01-11 14:50:10 +01:00
|
|
|
void *(*rs_alloc_func)(void);
|
2017-08-18 16:22:06 +02:00
|
|
|
|
|
|
|
/** Free the restart context */
|
2023-01-11 14:50:10 +01:00
|
|
|
void (*rs_free_func)(void *rs_ctx);
|
2017-08-18 17:30:37 +02:00
|
|
|
#endif /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */
|
2017-08-18 16:22:06 +02:00
|
|
|
|
2015-03-31 14:43:19 +02:00
|
|
|
/** Interface with the debug module */
|
2023-01-11 14:50:10 +01:00
|
|
|
void (*debug_func)(const void *ctx, mbedtls_pk_debug_item *items);
|
2015-03-31 14:43:19 +02:00
|
|
|
|
|
|
|
};
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_PK_RSA_ALT_SUPPORT)
|
2013-08-21 12:28:31 +02:00
|
|
|
/* Container for RSA-alt */
|
2023-01-11 14:50:10 +01:00
|
|
|
typedef struct {
|
2013-08-21 12:28:31 +02:00
|
|
|
void *key;
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_pk_rsa_alt_decrypt_func decrypt_func;
|
|
|
|
mbedtls_pk_rsa_alt_sign_func sign_func;
|
|
|
|
mbedtls_pk_rsa_alt_key_len_func key_len_func;
|
|
|
|
} mbedtls_rsa_alt_context;
|
2015-03-31 14:01:33 +02:00
|
|
|
#endif
|
2013-08-21 12:28:31 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_RSA_C)
|
|
|
|
extern const mbedtls_pk_info_t mbedtls_rsa_info;
|
2013-08-12 17:06:05 +02:00
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_ECP_C)
|
|
|
|
extern const mbedtls_pk_info_t mbedtls_eckey_info;
|
|
|
|
extern const mbedtls_pk_info_t mbedtls_eckeydh_info;
|
2013-08-12 17:06:05 +02:00
|
|
|
#endif
|
|
|
|
|
2023-01-27 13:22:42 +01:00
|
|
|
#if defined(MBEDTLS_PK_CAN_ECDSA_SOME)
|
2015-04-08 12:49:31 +02:00
|
|
|
extern const mbedtls_pk_info_t mbedtls_ecdsa_info;
|
2013-08-12 17:06:05 +02:00
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_PK_RSA_ALT_SUPPORT)
|
|
|
|
extern const mbedtls_pk_info_t mbedtls_rsa_alt_info;
|
2015-03-31 14:01:33 +02:00
|
|
|
#endif
|
2013-08-21 12:28:31 +02:00
|
|
|
|
2018-10-22 12:11:15 +02:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
2022-03-15 12:01:26 +01:00
|
|
|
extern const mbedtls_pk_info_t mbedtls_pk_ecdsa_opaque_info;
|
|
|
|
extern const mbedtls_pk_info_t mbedtls_pk_rsa_opaque_info;
|
2022-03-01 15:21:02 +01:00
|
|
|
|
2022-12-23 17:00:06 +01:00
|
|
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
2022-03-01 15:21:02 +01:00
|
|
|
#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
|
2022-12-23 17:00:06 +01:00
|
|
|
int MBEDTLS_DEPRECATED mbedtls_pk_error_from_psa_ecdsa(psa_status_t status);
|
|
|
|
#endif
|
2022-03-01 15:21:02 +01:00
|
|
|
#endif
|
|
|
|
|
2022-03-23 13:40:28 +01:00
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
2022-03-23 05:06:31 +01:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_PSA_CRYPTO_C)
|
2022-12-23 17:00:06 +01:00
|
|
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
|
|
int MBEDTLS_DEPRECATED mbedtls_pk_error_from_psa(psa_status_t status);
|
2022-03-23 05:06:31 +01:00
|
|
|
|
2022-05-03 15:42:13 +02:00
|
|
|
#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY) || \
|
|
|
|
defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
|
2022-12-23 17:00:06 +01:00
|
|
|
int MBEDTLS_DEPRECATED mbedtls_pk_error_from_psa_rsa(psa_status_t status);
|
2022-05-03 15:42:13 +02:00
|
|
|
#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY || PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
|
2022-12-23 17:00:06 +01:00
|
|
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
2022-03-12 12:12:05 +01:00
|
|
|
|
2022-03-22 07:20:15 +01:00
|
|
|
#if defined(MBEDTLS_RSA_C)
|
2022-12-23 17:00:06 +01:00
|
|
|
int mbedtls_pk_psa_rsa_sign_ext(psa_algorithm_t psa_alg_md,
|
|
|
|
mbedtls_rsa_context *rsa_ctx,
|
|
|
|
const unsigned char *hash, size_t hash_len,
|
|
|
|
unsigned char *sig, size_t sig_size,
|
|
|
|
size_t *sig_len);
|
2022-03-22 07:20:15 +01:00
|
|
|
#endif /* MBEDTLS_RSA_C */
|
2022-03-12 12:12:05 +01:00
|
|
|
|
2022-03-22 04:33:42 +01:00
|
|
|
#endif /* MBEDTLS_PSA_CRYPTO_C */
|
2022-03-01 15:21:02 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_PK_WRAP_H */
|