provider-keymgmt.pod 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408
  1. =pod
  2. =head1 NAME
  3. provider-keymgmt - The KEYMGMT library E<lt>-E<gt> provider functions
  4. =head1 SYNOPSIS
  5. #include <openssl/core_dispatch.h>
  6. /*
  7. * None of these are actual functions, but are displayed like this for
  8. * the function signatures for functions that are offered as function
  9. * pointers in OSSL_DISPATCH arrays.
  10. */
  11. /* Key object (keydata) creation and destruction */
  12. void *OSSL_FUNC_keymgmt_new(void *provctx);
  13. void OSSL_FUNC_keymgmt_free(void *keydata);
  14. /* Generation, a more complex constructor */
  15. void *OSSL_FUNC_keymgmt_gen_init(void *provctx, int selection);
  16. int OSSL_FUNC_keymgmt_gen_set_template(void *genctx, void *template);
  17. int OSSL_FUNC_keymgmt_gen_set_params(void *genctx, const OSSL_PARAM params[]);
  18. const OSSL_PARAM *OSSL_FUNC_keymgmt_gen_settable_params(void *provctx);
  19. void *OSSL_FUNC_keymgmt_gen(void *genctx, OSSL_CALLBACK *cb, void *cbarg);
  20. void OSSL_FUNC_keymgmt_gen_cleanup(void *genctx);
  21. /* Key loading by object reference, also a constructor */
  22. void *OSSL_FUNC_keymgmt_load(const void *reference, size_t *reference_sz);
  23. /* Key object information */
  24. int OSSL_FUNC_keymgmt_get_params(void *keydata, OSSL_PARAM params[]);
  25. const OSSL_PARAM *OSSL_FUNC_keymgmt_gettable_params(void *provctx);
  26. int OSSL_FUNC_keymgmt_set_params(void *keydata, const OSSL_PARAM params[]);
  27. const OSSL_PARAM *OSSL_FUNC_keymgmt_settable_params(void *provctx);
  28. /* Key object content checks */
  29. int OSSL_FUNC_keymgmt_has(const void *keydata, int selection);
  30. int OSSL_FUNC_keymgmt_match(const void *keydata1, const void *keydata2,
  31. int selection);
  32. /* Discovery of supported operations */
  33. const char *OSSL_FUNC_keymgmt_query_operation_name(int operation_id);
  34. /* Key object import and export functions */
  35. int OSSL_FUNC_keymgmt_import(int selection, void *keydata, const OSSL_PARAM params[]);
  36. const OSSL_PARAM *OSSL_FUNC_keymgmt_import_types(int selection);
  37. int OSSL_FUNC_keymgmt_export(int selection, void *keydata,
  38. OSSL_CALLBACK *param_cb, void *cbarg);
  39. const OSSL_PARAM *OSSL_FUNC_keymgmt_export_types(int selection);
  40. /* Key object copy */
  41. int OSSL_FUNC_keymgmt_copy(void *keydata_to, const void *keydata_from, int selection);
  42. /* Key object validation */
  43. int OSSL_FUNC_keymgmt_validate(const void *keydata, int selection);
  44. =head1 DESCRIPTION
  45. The KEYMGMT operation doesn't have much public visibility in OpenSSL
  46. libraries, it's rather an internal operation that's designed to work
  47. in tandem with operations that use private/public key pairs.
  48. Because the KEYMGMT operation shares knowledge with the operations it
  49. works with in tandem, they must belong to the same provider.
  50. The OpenSSL libraries will ensure that they do.
  51. The primary responsibility of the KEYMGMT operation is to hold the
  52. provider side key data for the OpenSSL library EVP_PKEY structure.
  53. All "functions" mentioned here are passed as function pointers between
  54. F<libcrypto> and the provider in B<OSSL_DISPATCH> arrays via
  55. B<OSSL_ALGORITHM> arrays that are returned by the provider's
  56. provider_query_operation() function
  57. (see L<provider-base(7)/Provider Functions>).
  58. All these "functions" have a corresponding function type definition
  59. named B<OSSL_{name}_fn>, and a helper function to retrieve the
  60. function pointer from a B<OSSL_DISPATCH> element named
  61. B<OSSL_FUNC_{name}>.
  62. For example, the "function" OSSL_FUNC_keymgmt_new() has these:
  63. typedef void *(OSSL_FUNC_keymgmt_new_fn)(void *provctx);
  64. static ossl_inline OSSL_FUNC_keymgmt_new_fn
  65. OSSL_FUNC_keymgmt_new(const OSSL_DISPATCH *opf);
  66. B<OSSL_DISPATCH> arrays are indexed by numbers that are provided as
  67. macros in L<openssl-core_dispatch.h(7)>, as follows:
  68. OSSL_FUNC_keymgmt_new OSSL_FUNC_KEYMGMT_NEW
  69. OSSL_FUNC_keymgmt_free OSSL_FUNC_KEYMGMT_FREE
  70. OSSL_FUNC_keymgmt_gen_init OSSL_FUNC_KEYMGMT_GEN_INIT
  71. OSSL_FUNC_keymgmt_gen_set_template OSSL_FUNC_KEYMGMT_GEN_SET_TEMPLATE
  72. OSSL_FUNC_keymgmt_gen_set_params OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS
  73. OSSL_FUNC_keymgmt_gen_settable_params OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS
  74. OSSL_FUNC_keymgmt_gen OSSL_FUNC_KEYMGMT_GEN
  75. OSSL_FUNC_keymgmt_gen_cleanup OSSL_FUNC_KEYMGMT_GEN_CLEANUP
  76. OSSL_FUNC_keymgmt_load OSSL_FUNC_KEYMGMT_LOAD
  77. OSSL_FUNC_keymgmt_get_params OSSL_FUNC_KEYMGMT_GET_PARAMS
  78. OSSL_FUNC_keymgmt_gettable_params OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS
  79. OSSL_FUNC_keymgmt_set_params OSSL_FUNC_KEYMGMT_SET_PARAMS
  80. OSSL_FUNC_keymgmt_settable_params OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS
  81. OSSL_FUNC_keymgmt_query_operation_name OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME
  82. OSSL_FUNC_keymgmt_has OSSL_FUNC_KEYMGMT_HAS
  83. OSSL_FUNC_keymgmt_validate OSSL_FUNC_KEYMGMT_VALIDATE
  84. OSSL_FUNC_keymgmt_match OSSL_FUNC_KEYMGMT_MATCH
  85. OSSL_FUNC_keymgmt_import OSSL_FUNC_KEYMGMT_IMPORT
  86. OSSL_FUNC_keymgmt_import_types OSSL_FUNC_KEYMGMT_IMPORT_TYPES
  87. OSSL_FUNC_keymgmt_export OSSL_FUNC_KEYMGMT_EXPORT
  88. OSSL_FUNC_keymgmt_export_types OSSL_FUNC_KEYMGMT_EXPORT_TYPES
  89. OSSL_FUNC_keymgmt_copy OSSL_FUNC_KEYMGMT_COPY
  90. =head2 Key Objects
  91. A key object is a collection of data for an asymmetric key, and is
  92. represented as I<keydata> in this manual.
  93. The exact contents of a key object are defined by the provider, and it
  94. is assumed that different operations in one and the same provider use
  95. the exact same structure to represent this collection of data, so that
  96. for example, a key object that has been created using the KEYMGMT
  97. interface that we document here can be passed as is to other provider
  98. operations, such as OP_signature_sign_init() (see
  99. L<provider-signature(7)>).
  100. With some of the KEYMGMT functions, it's possible to select a specific
  101. subset of data to handle, governed by the bits in a I<selection>
  102. indicator. The bits are:
  103. =over 4
  104. =item B<OSSL_KEYMGMT_SELECT_PRIVATE_KEY>
  105. Indicating that the private key data in a key object should be
  106. considered.
  107. =item B<OSSL_KEYMGMT_SELECT_PUBLIC_KEY>
  108. Indicating that the public key data in a key object should be
  109. considered.
  110. =item B<OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS>
  111. Indicating that the domain parameters in a key object should be
  112. considered.
  113. =item B<OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS>
  114. Indicating that other parameters in a key object should be
  115. considered.
  116. Other parameters are key parameters that don't fit any other
  117. classification. In other words, this particular selector bit works as
  118. a last resort bit bucket selector.
  119. =back
  120. Some selector bits have also been combined for easier use:
  121. =over 4
  122. =item B<OSSL_KEYMGMT_SELECT_ALL_PARAMETERS>
  123. Indicating that all key object parameters should be considered,
  124. regardless of their more granular classification.
  125. =for comment This should used by EVP functions such as
  126. EVP_PKEY_copy_parameters() and EVP_PKEY_cmp_parameters()
  127. This is a combination of B<OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS> and
  128. B<OSSL_KEYMGMT_SELECT_OTHER_PARAMETERS>.
  129. =for comment If more parameter categories are added, they should be
  130. mentioned here too.
  131. =item B<OSSL_KEYMGMT_SELECT_KEYPAIR>
  132. Indicating that both the whole key pair in a key object should be
  133. considered, i.e. the combination of public and private key.
  134. This is a combination of B<OSSL_KEYMGMT_SELECT_PRIVATE_KEY> and
  135. B<OSSL_KEYMGMT_SELECT_PUBLIC_KEY>.
  136. =item B<OSSL_KEYMGMT_SELECT_ALL>
  137. Indicating that everything in a key object should be considered.
  138. =back
  139. The exact interpretation of those bits or how they combine is left to
  140. each function where you can specify a selector.
  141. =for comment One might think that a combination of bits means that all
  142. the selected data subsets must be considered, but then you have to
  143. consider that when comparing key objects (future function), an
  144. implementation might opt to not compare the private key if it has
  145. compared the public key, since a match of one half implies a match of
  146. the other half.
  147. =head2 Constructing and Destructing Functions
  148. OSSL_FUNC_keymgmt_new() should create a provider side key object. The
  149. provider context I<provctx> is passed and may be incorporated in the
  150. key object, but that is not mandatory.
  151. OSSL_FUNC_keymgmt_free() should free the passed I<keydata>.
  152. OSSL_FUNC_keymgmt_gen_init(), OSSL_FUNC_keymgmt_gen_set_template(),
  153. OSSL_FUNC_keymgmt_gen_set_params(), OSSL_FUNC_keymgmt_gen_settable_params(),
  154. OSSL_FUNC_keymgmt_gen() and OSSL_FUNC_keymgmt_gen_cleanup() work together as a
  155. more elaborate context based key object constructor.
  156. OSSL_FUNC_keymgmt_gen_init() should create the key object generation context
  157. and initialize it with I<selections>, which will determine what kind
  158. of contents the key object to be generated should get.
  159. OSSL_FUNC_keymgmt_gen_set_template() should add I<template> to the context
  160. I<genctx>. The I<template> is assumed to be a key object constructed
  161. with the same KEYMGMT, and from which content that the implementation
  162. chooses can be used as a template for the key object to be generated.
  163. Typically, the generation of a DSA or DH key would get the domain
  164. parameters from this I<template>.
  165. OSSL_FUNC_keymgmt_gen_set_params() should set additional parameters from
  166. I<params> in the key object generation context I<genctx>.
  167. OSSL_FUNC_keymgmt_gen_settable_params() should return a constant array of
  168. descriptor B<OSSL_PARAM>, for parameters that OSSL_FUNC_keymgmt_gen_set_params()
  169. can handle.
  170. OSSL_FUNC_keymgmt_gen() should perform the key object generation itself, and
  171. return the result. The callback I<cb> should be called at regular
  172. intervals with indications on how the key object generation
  173. progresses.
  174. OSSL_FUNC_keymgmt_gen_cleanup() should clean up and free the key object
  175. generation context I<genctx>
  176. OSSL_FUNC_keymgmt_load() creates a provider side key object based on a
  177. I<reference> object with a size of I<reference_sz> bytes, that only the
  178. provider knows how to interpret, but that may come from other operations.
  179. Outside the provider, this reference is simply an array of bytes.
  180. At least one of OSSL_FUNC_keymgmt_new(), OSSL_FUNC_keymgmt_gen() and
  181. OSSL_FUNC_keymgmt_load() are mandatory, as well as OSSL_FUNC_keymgmt_free().
  182. Additionally, if OSSL_FUNC_keymgmt_gen() is present, OSSL_FUNC_keymgmt_gen_init()
  183. and OSSL_FUNC_keymgmt_gen_cleanup() must be present as well.
  184. =head2 Key Object Information Functions
  185. OSSL_FUNC_keymgmt_get_params() should extract information data associated
  186. with the given I<keydata>, see L</Common Information Parameters>.
  187. OSSL_FUNC_keymgmt_gettable_params() should return a constant array of
  188. descriptor B<OSSL_PARAM>, for parameters that OSSL_FUNC_keymgmt_get_params()
  189. can handle.
  190. If OSSL_FUNC_keymgmt_gettable_params() is present, OSSL_FUNC_keymgmt_get_params()
  191. must also be present, and vice versa.
  192. OSSL_FUNC_keymgmt_set_params() should update information data associated
  193. with the given I<keydata>, see L</Common Information Parameters>.
  194. OSSL_FUNC_keymgmt_settable_params() should return a constant array of
  195. descriptor B<OSSL_PARAM>, for parameters that OSSL_FUNC_keymgmt_set_params()
  196. can handle.
  197. If OSSL_FUNC_keymgmt_settable_params() is present, OSSL_FUNC_keymgmt_set_params()
  198. must also be present, and vice versa.
  199. =head2 Key Object Checking Functions
  200. OSSL_FUNC_keymgmt_query_operation_name() should return the name of the
  201. supported algorithm for the operation I<operation_id>. This is
  202. similar to provider_query_operation() (see L<provider-base(7)>),
  203. but only works as an advisory. If this function is not present, or
  204. returns NULL, the caller is free to assume that there's an algorithm
  205. from the same provider, of the same name as the one used to fetch the
  206. keymgmt and try to use that.
  207. OSSL_FUNC_keymgmt_has() should check whether the given I<keydata> contains the subsets
  208. of data indicated by the I<selector>. A combination of several
  209. selector bits must consider all those subsets, not just one. An
  210. implementation is, however, free to consider an empty subset of data
  211. to still be a valid subset.
  212. OSSL_FUNC_keymgmt_validate() should check if the I<keydata> contains valid
  213. data subsets indicated by I<selection>. Some combined selections of
  214. data subsets may cause validation of the combined data.
  215. For example, the combination of B<OSSL_KEYMGMT_SELECT_PRIVATE_KEY> and
  216. B<OSSL_KEYMGMT_SELECT_PUBLIC_KEY> (or B<OSSL_KEYMGMT_SELECT_KEYPAIR>
  217. for short) is expected to check that the pairwise consistency of
  218. I<keydata> is valid.
  219. OSSL_FUNC_keymgmt_match() should check if the data subset indicated by
  220. I<selection> in I<keydata1> and I<keydata2> match. It is assumed that
  221. the caller has ensured that I<keydata1> and I<keydata2> are both owned
  222. by the implementation of this function.
  223. =head2 Key Object Import, Export and Copy Functions
  224. OSSL_FUNC_keymgmt_import() should import data indicated by I<selection> into
  225. I<keydata> with values taken from the B<OSSL_PARAM> array I<params>.
  226. OSSL_FUNC_keymgmt_export() should extract values indicated by I<selection>
  227. from I<keydata>, create an B<OSSL_PARAM> array with them and call
  228. I<param_cb> with that array as well as the given I<cbarg>.
  229. OSSL_FUNC_keymgmt_import_types() should return a constant array of descriptor
  230. B<OSSL_PARAM> for data indicated by I<selection>, for parameters that
  231. OSSL_FUNC_keymgmt_import() can handle.
  232. OSSL_FUNC_keymgmt_export_types() should return a constant array of descriptor
  233. B<OSSL_PARAM> for data indicated by I<selection>, that the
  234. OSSL_FUNC_keymgmt_export() callback can expect to receive.
  235. OSSL_FUNC_keymgmt_copy() should copy data subsets indicated by I<selection>
  236. from I<keydata_from> to I<keydata_to>. It is assumed that the caller
  237. has ensured that I<keydata_to> and I<keydata_from> are both owned by
  238. the implementation of this function.
  239. =head2 Common Information Parameters
  240. See L<OSSL_PARAM(3)> for further details on the parameters structure.
  241. Common information parameters currently recognised by all built-in
  242. keymgmt algorithms are as follows:
  243. =over 4
  244. =item "bits" (B<OSSL_PKEY_PARAM_BITS>) <integer>
  245. The value should be the cryptographic length of the cryptosystem to
  246. which the key belongs, in bits. The definition of cryptographic
  247. length is specific to the key cryptosystem.
  248. =item "max-size" (B<OSSL_PKEY_PARAM_MAX_SIZE>) <integer>
  249. The value should be the maximum size that a caller should allocate to
  250. safely store a signature (called I<sig> in L<provider-signature(7)>),
  251. the result of asymmmetric encryption / decryption (I<out> in
  252. L<provider-asym_cipher(7)>, a derived secret (I<secret> in
  253. L<provider-keyexch(7)>, and similar data).
  254. Because an EVP_KEYMGMT method is always tightly bound to another method
  255. (signature, asymmetric cipher, key exchange, ...) and must be of the
  256. same provider, this number only needs to be synchronised with the
  257. dimensions handled in the rest of the same provider.
  258. =item "security-bits" (B<OSSL_PKEY_PARAM_SECURITY_BITS>) <integer>
  259. The value should be the number of security bits of the given key.
  260. Bits of security is defined in SP800-57.
  261. =back
  262. =head1 RETURN VALUES
  263. OSSL_FUNC_keymgmt_new() should return a valid reference to the newly created provider
  264. side key object, or NULL on failure.
  265. OSSL_FUNC_keymgmt_import(), OSSL_FUNC_keymgmt_export(), OSSL_FUNC_keymgmt_get_params() and
  266. OSSL_FUNC_keymgmt_set_params() should return 1 for success or 0 on error.
  267. OSSL_FUNC_keymgmt_validate() should return 1 on successful validation, or 0 on
  268. failure.
  269. OSSL_FUNC_keymgmt_has() should return 1 if all the selected data subsets are contained
  270. in the given I<keydata> or 0 otherwise.
  271. OSSL_FUNC_keymgmt_query_operation_name() should return a pointer to a string matching
  272. the requested operation, or NULL if the same name used to fetch the keymgmt
  273. applies.
  274. OSSL_FUNC_keymgmt_gettable_params() and OSSL_FUNC_keymgmt_settable_params()
  275. OSSL_FUNC_keymgmt_import_types(), OSSL_FUNC_keymgmt_export_types()
  276. should
  277. always return a constant B<OSSL_PARAM> array.
  278. =head1 SEE ALSO
  279. L<provider(7)>,
  280. L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>, L<EVP_PKEY-ED25519(7)>,
  281. L<EVP_PKEY-ED448(7)>, L<EVP_PKEY-EC(7)>, L<EVP_PKEY-RSA(7)>,
  282. L<EVP_PKEY-DSA(7)>, L<EVP_PKEY-DH(7)>
  283. =head1 HISTORY
  284. The KEYMGMT interface was introduced in OpenSSL 3.0.
  285. =head1 COPYRIGHT
  286. Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved.
  287. Licensed under the Apache License 2.0 (the "License"). You may not use
  288. this file except in compliance with the License. You can obtain a copy
  289. in the file LICENSE in the source distribution or at
  290. L<https://www.openssl.org/source/license.html>.
  291. =cut