2
0

ECDSA_SIG_new.pod 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222
  1. =pod
  2. =head1 NAME
  3. ECDSA_SIG_get0, ECDSA_SIG_get0_r, ECDSA_SIG_get0_s, ECDSA_SIG_set0,
  4. ECDSA_SIG_new, ECDSA_SIG_free, ECDSA_size, ECDSA_sign, ECDSA_do_sign,
  5. ECDSA_verify, ECDSA_do_verify, ECDSA_sign_setup, ECDSA_sign_ex,
  6. ECDSA_do_sign_ex - low-level elliptic curve digital signature algorithm (ECDSA)
  7. functions
  8. =head1 SYNOPSIS
  9. #include <openssl/ecdsa.h>
  10. ECDSA_SIG *ECDSA_SIG_new(void);
  11. void ECDSA_SIG_free(ECDSA_SIG *sig);
  12. void ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps);
  13. const BIGNUM *ECDSA_SIG_get0_r(const ECDSA_SIG *sig);
  14. const BIGNUM *ECDSA_SIG_get0_s(const ECDSA_SIG *sig);
  15. int ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s);
  16. Deprecated since OpenSSL 3.0, can be hidden entirely by defining
  17. B<OPENSSL_API_COMPAT> with a suitable version value, see
  18. L<openssl_user_macros(7)>:
  19. int ECDSA_size(const EC_KEY *eckey);
  20. int ECDSA_sign(int type, const unsigned char *dgst, int dgstlen,
  21. unsigned char *sig, unsigned int *siglen, EC_KEY *eckey);
  22. ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dgst_len,
  23. EC_KEY *eckey);
  24. int ECDSA_verify(int type, const unsigned char *dgst, int dgstlen,
  25. const unsigned char *sig, int siglen, EC_KEY *eckey);
  26. int ECDSA_do_verify(const unsigned char *dgst, int dgst_len,
  27. const ECDSA_SIG *sig, EC_KEY* eckey);
  28. ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dgstlen,
  29. const BIGNUM *kinv, const BIGNUM *rp,
  30. EC_KEY *eckey);
  31. int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, BIGNUM **rp);
  32. int ECDSA_sign_ex(int type, const unsigned char *dgst, int dgstlen,
  33. unsigned char *sig, unsigned int *siglen,
  34. const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey);
  35. =head1 DESCRIPTION
  36. B<ECDSA_SIG> is an opaque structure consisting of two BIGNUMs for the
  37. B<r> and B<s> value of an ECDSA signature (see X9.62 or FIPS 186-2).
  38. ECDSA_SIG_new() allocates an empty B<ECDSA_SIG> structure. Note: before
  39. OpenSSL 1.1.0 the: the B<r> and B<s> components were initialised.
  40. ECDSA_SIG_free() frees the B<ECDSA_SIG> structure B<sig>.
  41. ECDSA_SIG_get0() returns internal pointers the B<r> and B<s> values contained
  42. in B<sig> and stores them in B<*pr> and B<*ps>, respectively.
  43. The pointer B<pr> or B<ps> can be NULL, in which case the corresponding value
  44. is not returned.
  45. The values B<r>, B<s> can also be retrieved separately by the corresponding
  46. function ECDSA_SIG_get0_r() and ECDSA_SIG_get0_s(), respectively.
  47. The B<r> and B<s> values can be set by calling ECDSA_SIG_set0() and passing the
  48. new values for B<r> and B<s> as parameters to the function. Calling this
  49. function transfers the memory management of the values to the ECDSA_SIG object,
  50. and therefore the values that have been passed in should not be freed directly
  51. after this function has been called.
  52. See L<i2d_ECDSA_SIG(3)> and L<d2i_ECDSA_SIG(3)> for information about encoding
  53. and decoding ECDSA signatures to/from DER.
  54. All of the functions described below are deprecated. Applications should
  55. use the higher level B<EVP> interface such as L<EVP_DigestSignInit(3)>
  56. or L<EVP_DigestVerifyInit(3)> instead.
  57. ECDSA_size() returns the maximum length of a DER encoded ECDSA signature
  58. created with the private EC key B<eckey>. To obtain the actual signature
  59. size use L<EVP_PKEY_sign(3)> with a NULL B<sig> parameter.
  60. ECDSA_sign() computes a digital signature of the B<dgstlen> bytes hash value
  61. B<dgst> using the private EC key B<eckey>. The DER encoded signatures is
  62. stored in B<sig> and its length is returned in B<sig_len>. Note: B<sig> must
  63. point to ECDSA_size(eckey) bytes of memory. The parameter B<type> is currently
  64. ignored. ECDSA_sign() is wrapper function for ECDSA_sign_ex() with B<kinv>
  65. and B<rp> set to NULL.
  66. ECDSA_do_sign() is similar to ECDSA_sign() except the signature is returned
  67. as a newly allocated B<ECDSA_SIG> structure (or NULL on error). ECDSA_do_sign()
  68. is a wrapper function for ECDSA_do_sign_ex() with B<kinv> and B<rp> set to
  69. NULL.
  70. ECDSA_verify() verifies that the signature in B<sig> of size B<siglen> is a
  71. valid ECDSA signature of the hash value B<dgst> of size B<dgstlen> using the
  72. public key B<eckey>. The parameter B<type> is ignored.
  73. ECDSA_do_verify() is similar to ECDSA_verify() except the signature is
  74. presented in the form of a pointer to an B<ECDSA_SIG> structure.
  75. The remaining functions utilise the internal B<kinv> and B<r> values used
  76. during signature computation. Most applications will never need to call these
  77. and some external ECDSA ENGINE implementations may not support them at all if
  78. either B<kinv> or B<r> is not B<NULL>.
  79. ECDSA_sign_setup() may be used to precompute parts of the signing operation.
  80. B<eckey> is the private EC key and B<ctx> is a pointer to B<BN_CTX> structure
  81. (or NULL). The precomputed values or returned in B<kinv> and B<rp> and can be
  82. used in a later call to ECDSA_sign_ex() or ECDSA_do_sign_ex().
  83. ECDSA_sign_ex() computes a digital signature of the B<dgstlen> bytes hash value
  84. B<dgst> using the private EC key B<eckey> and the optional pre-computed values
  85. B<kinv> and B<rp>. The DER encoded signature is stored in B<sig> and its
  86. length is returned in B<sig_len>. Note: B<sig> must point to ECDSA_size(eckey)
  87. bytes of memory. The parameter B<type> is ignored.
  88. ECDSA_do_sign_ex() is similar to ECDSA_sign_ex() except the signature is
  89. returned as a newly allocated B<ECDSA_SIG> structure (or NULL on error).
  90. =head1 RETURN VALUES
  91. ECDSA_SIG_new() returns NULL if the allocation fails.
  92. ECDSA_SIG_set0() returns 1 on success or 0 on failure.
  93. ECDSA_SIG_get0_r() and ECDSA_SIG_get0_s() return the corresponding value,
  94. or NULL if it is unset.
  95. ECDSA_size() returns the maximum length signature or 0 on error.
  96. ECDSA_sign(), ECDSA_sign_ex() and ECDSA_sign_setup() return 1 if successful
  97. or 0 on error.
  98. ECDSA_do_sign() and ECDSA_do_sign_ex() return a pointer to an allocated
  99. B<ECDSA_SIG> structure or NULL on error.
  100. ECDSA_verify() and ECDSA_do_verify() return 1 for a valid
  101. signature, 0 for an invalid signature and -1 on error.
  102. The error codes can be obtained by L<ERR_get_error(3)>.
  103. =head1 EXAMPLES
  104. Creating an ECDSA signature of a given SHA-256 hash value using the
  105. named curve prime256v1 (aka P-256).
  106. First step: create an EC_KEY object (note: this part is B<not> ECDSA
  107. specific)
  108. int ret;
  109. ECDSA_SIG *sig;
  110. EC_KEY *eckey;
  111. eckey = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
  112. if (eckey == NULL)
  113. /* error */
  114. if (EC_KEY_generate_key(eckey) == 0)
  115. /* error */
  116. Second step: compute the ECDSA signature of a SHA-256 hash value
  117. using ECDSA_do_sign():
  118. sig = ECDSA_do_sign(digest, 32, eckey);
  119. if (sig == NULL)
  120. /* error */
  121. or using ECDSA_sign():
  122. unsigned char *buffer, *pp;
  123. int buf_len;
  124. buf_len = ECDSA_size(eckey);
  125. buffer = OPENSSL_malloc(buf_len);
  126. pp = buffer;
  127. if (ECDSA_sign(0, dgst, dgstlen, pp, &buf_len, eckey) == 0)
  128. /* error */
  129. Third step: verify the created ECDSA signature using ECDSA_do_verify():
  130. ret = ECDSA_do_verify(digest, 32, sig, eckey);
  131. or using ECDSA_verify():
  132. ret = ECDSA_verify(0, digest, 32, buffer, buf_len, eckey);
  133. and finally evaluate the return value:
  134. if (ret == 1)
  135. /* signature ok */
  136. else if (ret == 0)
  137. /* incorrect signature */
  138. else
  139. /* error */
  140. =head1 CONFORMING TO
  141. ANSI X9.62, US Federal Information Processing Standard FIPS 186-2
  142. (Digital Signature Standard, DSS)
  143. =head1 SEE ALSO
  144. L<EC_KEY_new(3)>,
  145. L<EVP_DigestSignInit(3)>,
  146. L<EVP_DigestVerifyInit(3)>,
  147. L<EVP_PKEY_sign(3)>
  148. L<i2d_ECDSA_SIG(3)>,
  149. L<d2i_ECDSA_SIG(3)>
  150. =head1 HISTORY
  151. The ECDSA_size(), ECDSA_sign(), ECDSA_do_sign(), ECDSA_verify(),
  152. ECDSA_do_verify(), ECDSA_sign_setup(), ECDSA_sign_ex() and ECDSA_do_sign_ex()
  153. functions were deprecated in OpenSSL 3.0.
  154. =head1 COPYRIGHT
  155. Copyright 2004-2020 The OpenSSL Project Authors. All Rights Reserved.
  156. Licensed under the Apache License 2.0 (the "License"). You may not use
  157. this file except in compliance with the License. You can obtain a copy
  158. in the file LICENSE in the source distribution or at
  159. L<https://www.openssl.org/source/license.html>.
  160. =cut