wolfssl/cyassl/ctaocrypt/ecc.h

183 lines
5.1 KiB
C
Raw Normal View History

/* ecc.h
2011-02-05 22:14:47 +03:00
*
2013-02-06 00:44:17 +04:00
* Copyright (C) 2006-2013 wolfSSL Inc.
2011-02-05 22:14:47 +03:00
*
* This file is part of CyaSSL.
*
* CyaSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* CyaSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
*/
#ifdef HAVE_ECC
#ifndef CTAO_CRYPT_ECC_H
#define CTAO_CRYPT_ECC_H
#include <cyassl/ctaocrypt/types.h>
#include <cyassl/ctaocrypt/integer.h>
#include <cyassl/ctaocrypt/random.h>
2011-02-05 22:14:47 +03:00
#ifdef __cplusplus
extern "C" {
#endif
enum {
ECC_PUBLICKEY = 1,
ECC_PRIVATEKEY = 2,
ECC_MAXNAME = 16, /* MAX CURVE NAME LENGTH */
SIG_HEADER_SZ = 6, /* ECC signature header size */
ECC_BUFSIZE = 256, /* for exported keys temp buffer */
ECC_MINSIZE = 20, /* MIN Private Key size */
ECC_MAXSIZE = 66 /* MAX Private Key size */
2011-02-05 22:14:47 +03:00
};
/* ECC set type defined a NIST GF(p) curve */
typedef struct {
int size; /* The size of the curve in octets */
const char* name; /* name of this curve */
const char* prime; /* prime that defines the field, curve is in (hex) */
2013-11-14 22:10:29 +04:00
const char* Bf; /* fields B param (hex) */
const char* order; /* order of the curve (hex) */
const char* Gx; /* x coordinate of the base point on curve (hex) */
const char* Gy; /* y coordinate of the base point on curve (hex) */
2011-02-05 22:14:47 +03:00
} ecc_set_type;
/* A point on an ECC curve, stored in Jacbobian format such that (x,y,z) =>
(x/z^2, y/z^3, 1) when interpreted as affine */
typedef struct {
mp_int x; /* The x coordinate */
mp_int y; /* The y coordinate */
mp_int z; /* The z coordinate */
} ecc_point;
2011-02-05 22:14:47 +03:00
/* An ECC Key */
typedef struct {
int type; /* Public or Private */
int idx; /* Index into the ecc_sets[] for the parameters of
this curve if -1, this key is using user supplied
curve in dp */
const ecc_set_type* dp; /* domain parameters, either points to NIST
curves (idx >= 0) or user supplied */
ecc_point pubkey; /* public key */
mp_int k; /* private key */
} ecc_key;
/* ECC predefined curve sets */
extern const ecc_set_type ecc_sets[];
2011-05-02 19:38:01 +04:00
CYASSL_API
2011-02-05 22:14:47 +03:00
int ecc_make_key(RNG* rng, int keysize, ecc_key* key);
2011-05-02 19:38:01 +04:00
CYASSL_API
2011-02-05 22:14:47 +03:00
int ecc_shared_secret(ecc_key* private_key, ecc_key* public_key, byte* out,
word32* outlen);
2011-05-02 19:38:01 +04:00
CYASSL_API
2011-02-05 22:14:47 +03:00
int ecc_sign_hash(const byte* in, word32 inlen, byte* out, word32 *outlen,
RNG* rng, ecc_key* key);
2011-05-02 19:38:01 +04:00
CYASSL_API
int ecc_verify_hash(const byte* sig, word32 siglen, const byte* hash,
word32 hashlen, int* stat, ecc_key* key);
2011-05-02 19:38:01 +04:00
CYASSL_API
2011-02-05 22:14:47 +03:00
void ecc_init(ecc_key* key);
2011-05-02 19:38:01 +04:00
CYASSL_API
2011-02-05 22:14:47 +03:00
void ecc_free(ecc_key* key);
CYASSL_API
void ecc_fp_free(void);
2011-02-05 22:14:47 +03:00
/* ASN key helpers */
2011-05-02 19:38:01 +04:00
CYASSL_API
2011-02-05 22:14:47 +03:00
int ecc_export_x963(ecc_key*, byte* out, word32* outLen);
2011-05-02 19:38:01 +04:00
CYASSL_API
2011-02-05 22:14:47 +03:00
int ecc_import_x963(const byte* in, word32 inLen, ecc_key* key);
2011-05-02 19:38:01 +04:00
CYASSL_API
2011-02-05 22:14:47 +03:00
int ecc_import_private_key(const byte* priv, word32 privSz, const byte* pub,
word32 pubSz, ecc_key* key);
2013-10-30 03:44:33 +04:00
CYASSL_API
int ecc_export_private_only(ecc_key* key, byte* out, word32* outLen);
2011-02-05 22:14:47 +03:00
/* size helper */
2011-05-02 19:38:01 +04:00
CYASSL_API
2011-02-05 22:14:47 +03:00
int ecc_size(ecc_key* key);
2011-05-02 19:38:01 +04:00
CYASSL_API
2011-02-05 22:14:47 +03:00
int ecc_sig_size(ecc_key* key);
#ifdef HAVE_ECC_ENCRYPT
2013-11-08 03:59:31 +04:00
/* ecc encrypt */
enum ecEncAlgo {
ecAES_128_CBC = 1, /* default */
ecAES_256_CBC = 2
};
enum ecKdfAlgo {
ecHKDF_SHA256 = 1, /* default */
ecHKDF_SHA1 = 2
};
enum ecMacAlgo {
ecHMAC_SHA256 = 1, /* default */
ecHMAC_SHA1 = 2
};
enum {
KEY_SIZE_128 = 16,
KEY_SIZE_256 = 32,
IV_SIZE_64 = 8,
EXCHANGE_SALT_SZ = 16,
EXCHANGE_INFO_SZ = 23
};
enum ecFlags {
REQ_RESP_CLIENT = 1,
REQ_RESP_SERVER = 2
2013-11-08 03:59:31 +04:00
};
typedef struct ecEncCtx ecEncCtx;
2013-11-08 03:59:31 +04:00
CYASSL_API
ecEncCtx* ecc_ctx_new(int flags, RNG* rng);
2013-11-08 03:59:31 +04:00
CYASSL_API
void ecc_ctx_free(ecEncCtx*);
CYASSL_API
int ecc_ctx_reset(ecEncCtx*, RNG*); /* reset for use again w/o alloc/free */
CYASSL_API
const byte* ecc_ctx_get_own_salt(ecEncCtx*);
CYASSL_API
int ecc_ctx_set_peer_salt(ecEncCtx*, const byte* salt);
2013-11-08 03:59:31 +04:00
CYASSL_API
int ecc_encrypt(ecc_key* privKey, ecc_key* pubKey, const byte* msg,
word32 msgSz, byte* out, word32* outSz, ecEncCtx* ctx);
2013-11-08 03:59:31 +04:00
CYASSL_API
int ecc_decrypt(ecc_key* privKey, ecc_key* pubKey, const byte* msg,
word32 msgSz, byte* out, word32* outSz, ecEncCtx* ctx);
#endif /* HAVE_ECC_ENCRYPT */
2013-11-08 03:59:31 +04:00
2011-02-05 22:14:47 +03:00
#ifdef __cplusplus
} /* extern "C" */
#endif
#endif /* CTAO_CRYPT_ECC_H */
#endif /* HAVE_ECC */