2
0

dsa.h 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343
  1. /* crypto/dsa/dsa.h */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. /*
  59. * The DSS routines are based on patches supplied by
  60. * Steven Schoch <schoch@sheba.arc.nasa.gov>. He basically did the
  61. * work and I have just tweaked them a little to fit into my
  62. * stylistic vision for SSLeay :-) */
  63. #ifndef HEADER_DSA_H
  64. #define HEADER_DSA_H
  65. #include <openssl/e_os2.h>
  66. #ifdef OPENSSL_NO_DSA
  67. #error DSA is disabled.
  68. #endif
  69. #ifndef OPENSSL_NO_BIO
  70. #include <openssl/bio.h>
  71. #endif
  72. #include <openssl/crypto.h>
  73. #include <openssl/ossl_typ.h>
  74. #ifndef OPENSSL_NO_DEPRECATED
  75. #include <openssl/bn.h>
  76. #ifndef OPENSSL_NO_DH
  77. # include <openssl/dh.h>
  78. #endif
  79. #endif
  80. #ifndef OPENSSL_DSA_MAX_MODULUS_BITS
  81. # define OPENSSL_DSA_MAX_MODULUS_BITS 10000
  82. #endif
  83. #define OPENSSL_DSA_FIPS_MIN_MODULUS_BITS 1024
  84. #define DSA_FLAG_CACHE_MONT_P 0x01
  85. #define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA
  86. * implementation now uses constant time
  87. * modular exponentiation for secret exponents
  88. * by default. This flag causes the
  89. * faster variable sliding window method to
  90. * be used for all exponents.
  91. */
  92. /* If this flag is set the DSA method is FIPS compliant and can be used
  93. * in FIPS mode. This is set in the validated module method. If an
  94. * application sets this flag in its own methods it is its reposibility
  95. * to ensure the result is compliant.
  96. */
  97. #define DSA_FLAG_FIPS_METHOD 0x0400
  98. /* If this flag is set the operations normally disabled in FIPS mode are
  99. * permitted it is then the applications responsibility to ensure that the
  100. * usage is compliant.
  101. */
  102. #define DSA_FLAG_NON_FIPS_ALLOW 0x0400
  103. #define DSA_FLAG_FIPS_CHECKED 0x0800
  104. #ifdef __cplusplus
  105. extern "C" {
  106. #endif
  107. /* Already defined in ossl_typ.h */
  108. /* typedef struct dsa_st DSA; */
  109. /* typedef struct dsa_method DSA_METHOD; */
  110. typedef struct DSA_SIG_st
  111. {
  112. BIGNUM *r;
  113. BIGNUM *s;
  114. } DSA_SIG;
  115. struct dsa_method
  116. {
  117. const char *name;
  118. DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa);
  119. int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp,
  120. BIGNUM **rp);
  121. int (*dsa_do_verify)(const unsigned char *dgst, int dgst_len,
  122. DSA_SIG *sig, DSA *dsa);
  123. int (*dsa_mod_exp)(DSA *dsa, BIGNUM *rr, BIGNUM *a1, BIGNUM *p1,
  124. BIGNUM *a2, BIGNUM *p2, BIGNUM *m, BN_CTX *ctx,
  125. BN_MONT_CTX *in_mont);
  126. int (*bn_mod_exp)(DSA *dsa, BIGNUM *r, BIGNUM *a, const BIGNUM *p,
  127. const BIGNUM *m, BN_CTX *ctx,
  128. BN_MONT_CTX *m_ctx); /* Can be null */
  129. int (*init)(DSA *dsa);
  130. int (*finish)(DSA *dsa);
  131. int flags;
  132. char *app_data;
  133. /* If this is non-NULL, it is used to generate DSA parameters */
  134. int (*dsa_paramgen)(DSA *dsa, int bits,
  135. const unsigned char *seed, int seed_len,
  136. int *counter_ret, unsigned long *h_ret,
  137. BN_GENCB *cb);
  138. /* If this is non-NULL, it is used to generate DSA keys */
  139. int (*dsa_keygen)(DSA *dsa);
  140. };
  141. struct dsa_st
  142. {
  143. /* This first variable is used to pick up errors where
  144. * a DSA is passed instead of of a EVP_PKEY */
  145. int pad;
  146. long version;
  147. int write_params;
  148. BIGNUM *p;
  149. BIGNUM *q; /* == 20 */
  150. BIGNUM *g;
  151. BIGNUM *pub_key; /* y public key */
  152. BIGNUM *priv_key; /* x private key */
  153. BIGNUM *kinv; /* Signing pre-calc */
  154. BIGNUM *r; /* Signing pre-calc */
  155. int flags;
  156. /* Normally used to cache montgomery values */
  157. BN_MONT_CTX *method_mont_p;
  158. int references;
  159. CRYPTO_EX_DATA ex_data;
  160. const DSA_METHOD *meth;
  161. /* functional reference if 'meth' is ENGINE-provided */
  162. ENGINE *engine;
  163. };
  164. #define d2i_DSAparams_fp(fp,x) (DSA *)ASN1_d2i_fp((char *(*)())DSA_new, \
  165. (char *(*)())d2i_DSAparams,(fp),(unsigned char **)(x))
  166. #define i2d_DSAparams_fp(fp,x) ASN1_i2d_fp(i2d_DSAparams,(fp), \
  167. (unsigned char *)(x))
  168. #define d2i_DSAparams_bio(bp,x) ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAparams,bp,x)
  169. #define i2d_DSAparams_bio(bp,x) ASN1_i2d_bio_of_const(DSA,i2d_DSAparams,bp,x)
  170. DSA *DSAparams_dup(DSA *x);
  171. DSA_SIG * DSA_SIG_new(void);
  172. void DSA_SIG_free(DSA_SIG *a);
  173. int i2d_DSA_SIG(const DSA_SIG *a, unsigned char **pp);
  174. DSA_SIG * d2i_DSA_SIG(DSA_SIG **v, const unsigned char **pp, long length);
  175. DSA_SIG * DSA_do_sign(const unsigned char *dgst,int dlen,DSA *dsa);
  176. int DSA_do_verify(const unsigned char *dgst,int dgst_len,
  177. DSA_SIG *sig,DSA *dsa);
  178. const DSA_METHOD *DSA_OpenSSL(void);
  179. void DSA_set_default_method(const DSA_METHOD *);
  180. const DSA_METHOD *DSA_get_default_method(void);
  181. int DSA_set_method(DSA *dsa, const DSA_METHOD *);
  182. #ifdef OPENSSL_FIPS
  183. DSA * FIPS_dsa_new(void);
  184. void FIPS_dsa_free (DSA *r);
  185. DSA_SIG * FIPS_dsa_sign_digest(DSA *dsa, const unsigned char *dig, int dlen);
  186. DSA_SIG * FIPS_dsa_sign_ctx(DSA *dsa, EVP_MD_CTX *ctx);
  187. int FIPS_dsa_verify_digest(DSA *dsa,
  188. const unsigned char *dig, int dlen, DSA_SIG *s);
  189. int FIPS_dsa_verify_ctx(DSA *dsa, EVP_MD_CTX *ctx, DSA_SIG *s);
  190. #endif
  191. DSA * DSA_new(void);
  192. DSA * DSA_new_method(ENGINE *engine);
  193. void DSA_free (DSA *r);
  194. /* "up" the DSA object's reference count */
  195. int DSA_up_ref(DSA *r);
  196. int DSA_size(const DSA *);
  197. /* next 4 return -1 on error */
  198. int DSA_sign_setup( DSA *dsa,BN_CTX *ctx_in,BIGNUM **kinvp,BIGNUM **rp);
  199. int DSA_sign(int type,const unsigned char *dgst,int dlen,
  200. unsigned char *sig, unsigned int *siglen, DSA *dsa);
  201. int DSA_verify(int type,const unsigned char *dgst,int dgst_len,
  202. const unsigned char *sigbuf, int siglen, DSA *dsa);
  203. int DSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
  204. CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
  205. int DSA_set_ex_data(DSA *d, int idx, void *arg);
  206. void *DSA_get_ex_data(DSA *d, int idx);
  207. DSA * d2i_DSAPublicKey(DSA **a, const unsigned char **pp, long length);
  208. DSA * d2i_DSAPrivateKey(DSA **a, const unsigned char **pp, long length);
  209. DSA * d2i_DSAparams(DSA **a, const unsigned char **pp, long length);
  210. /* Deprecated version */
  211. #ifndef OPENSSL_NO_DEPRECATED
  212. DSA * DSA_generate_parameters(int bits,
  213. unsigned char *seed,int seed_len,
  214. int *counter_ret, unsigned long *h_ret,void
  215. (*callback)(int, int, void *),void *cb_arg);
  216. #endif /* !defined(OPENSSL_NO_DEPRECATED) */
  217. /* New version */
  218. int DSA_generate_parameters_ex(DSA *dsa, int bits,
  219. const unsigned char *seed,int seed_len,
  220. int *counter_ret, unsigned long *h_ret, BN_GENCB *cb);
  221. int DSA_generate_key(DSA *a);
  222. int i2d_DSAPublicKey(const DSA *a, unsigned char **pp);
  223. int i2d_DSAPrivateKey(const DSA *a, unsigned char **pp);
  224. int i2d_DSAparams(const DSA *a,unsigned char **pp);
  225. #ifndef OPENSSL_NO_BIO
  226. int DSAparams_print(BIO *bp, const DSA *x);
  227. int DSA_print(BIO *bp, const DSA *x, int off);
  228. #endif
  229. #ifndef OPENSSL_NO_FP_API
  230. int DSAparams_print_fp(FILE *fp, const DSA *x);
  231. int DSA_print_fp(FILE *bp, const DSA *x, int off);
  232. #endif
  233. #define DSS_prime_checks 50
  234. /* Primality test according to FIPS PUB 186[-1], Appendix 2.1:
  235. * 50 rounds of Rabin-Miller */
  236. #define DSA_is_prime(n, callback, cb_arg) \
  237. BN_is_prime(n, DSS_prime_checks, callback, NULL, cb_arg)
  238. #ifndef OPENSSL_NO_DH
  239. /* Convert DSA structure (key or just parameters) into DH structure
  240. * (be careful to avoid small subgroup attacks when using this!) */
  241. DH *DSA_dup_DH(const DSA *r);
  242. #endif
  243. #define EVP_PKEY_CTX_set_dsa_paramgen_bits(ctx, nbits) \
  244. EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DSA, EVP_PKEY_OP_PARAMGEN, \
  245. EVP_PKEY_CTRL_DSA_PARAMGEN_BITS, nbits, NULL)
  246. #define EVP_PKEY_CTRL_DSA_PARAMGEN_BITS (EVP_PKEY_ALG_CTRL + 1)
  247. #define EVP_PKEY_CTRL_DSA_PARAMGEN_Q_BITS (EVP_PKEY_ALG_CTRL + 2)
  248. #define EVP_PKEY_CTRL_DSA_PARAMGEN_MD (EVP_PKEY_ALG_CTRL + 3)
  249. /* BEGIN ERROR CODES */
  250. /* The following lines are auto generated by the script mkerr.pl. Any changes
  251. * made after this point may be overwritten when the script is next run.
  252. */
  253. void ERR_load_DSA_strings(void);
  254. /* Error codes for the DSA functions. */
  255. /* Function codes. */
  256. #define DSA_F_D2I_DSA_SIG 110
  257. #define DSA_F_DO_DSA_PRINT 104
  258. #define DSA_F_DSAPARAMS_PRINT 100
  259. #define DSA_F_DSAPARAMS_PRINT_FP 101
  260. #define DSA_F_DSA_BUILTIN_KEYGEN 124
  261. #define DSA_F_DSA_BUILTIN_PARAMGEN 125
  262. #define DSA_F_DSA_BUILTIN_PARAMGEN2 126
  263. #define DSA_F_DSA_DO_SIGN 112
  264. #define DSA_F_DSA_DO_VERIFY 113
  265. #define DSA_F_DSA_NEW_METHOD 103
  266. #define DSA_F_DSA_PARAM_DECODE 119
  267. #define DSA_F_DSA_PRINT_FP 105
  268. #define DSA_F_DSA_PRIV_DECODE 115
  269. #define DSA_F_DSA_PRIV_ENCODE 116
  270. #define DSA_F_DSA_PUB_DECODE 117
  271. #define DSA_F_DSA_PUB_ENCODE 118
  272. #define DSA_F_DSA_SIGN 106
  273. #define DSA_F_DSA_SIGN_SETUP 107
  274. #define DSA_F_DSA_SIG_NEW 109
  275. #define DSA_F_DSA_SIG_PRINT 123
  276. #define DSA_F_DSA_VERIFY 108
  277. #define DSA_F_I2D_DSA_SIG 111
  278. #define DSA_F_OLD_DSA_PRIV_DECODE 122
  279. #define DSA_F_PKEY_DSA_CTRL 120
  280. #define DSA_F_PKEY_DSA_KEYGEN 121
  281. #define DSA_F_SIG_CB 114
  282. /* Reason codes. */
  283. #define DSA_R_BAD_Q_VALUE 102
  284. #define DSA_R_BN_DECODE_ERROR 108
  285. #define DSA_R_BN_ERROR 109
  286. #define DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 100
  287. #define DSA_R_DECODE_ERROR 104
  288. #define DSA_R_INVALID_DIGEST_TYPE 106
  289. #define DSA_R_INVALID_PARAMETERS 112
  290. #define DSA_R_KEY_SIZE_TOO_SMALL 111
  291. #define DSA_R_MISSING_PARAMETERS 101
  292. #define DSA_R_MODULUS_TOO_LARGE 103
  293. #define DSA_R_NEED_NEW_SETUP_VALUES 110
  294. #define DSA_R_NO_PARAMETERS_SET 107
  295. #define DSA_R_PARAMETER_ENCODING_ERROR 105
  296. #define DSA_R_Q_NOT_PRIME 113
  297. #ifdef __cplusplus
  298. }
  299. #endif
  300. #endif