EVP_PKEY_encapsulate.3ossl 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250
  1. .\" Automatically generated by Pod::Man 4.14 (Pod::Simple 3.42)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sp \" Vertical space (when we can't use .PP)
  6. .if t .sp .5v
  7. .if n .sp
  8. ..
  9. .de Vb \" Begin verbatim text
  10. .ft CW
  11. .nf
  12. .ne \\$1
  13. ..
  14. .de Ve \" End verbatim text
  15. .ft R
  16. .fi
  17. ..
  18. .\" Set up some character translations and predefined strings. \*(-- will
  19. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  20. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  21. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  22. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  23. .\" nothing in troff, for use with C<>.
  24. .tr \(*W-
  25. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  26. .ie n \{\
  27. . ds -- \(*W-
  28. . ds PI pi
  29. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  30. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  31. . ds L" ""
  32. . ds R" ""
  33. . ds C` ""
  34. . ds C' ""
  35. 'br\}
  36. .el\{\
  37. . ds -- \|\(em\|
  38. . ds PI \(*p
  39. . ds L" ``
  40. . ds R" ''
  41. . ds C`
  42. . ds C'
  43. 'br\}
  44. .\"
  45. .\" Escape single quotes in literal strings from groff's Unicode transform.
  46. .ie \n(.g .ds Aq \(aq
  47. .el .ds Aq '
  48. .\"
  49. .\" If the F register is >0, we'll generate index entries on stderr for
  50. .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
  51. .\" entries marked with X<> in POD. Of course, you'll have to process the
  52. .\" output yourself in some meaningful fashion.
  53. .\"
  54. .\" Avoid warning from groff about undefined register 'F'.
  55. .de IX
  56. ..
  57. .nr rF 0
  58. .if \n(.g .if rF .nr rF 1
  59. .if (\n(rF:(\n(.g==0)) \{\
  60. . if \nF \{\
  61. . de IX
  62. . tm Index:\\$1\t\\n%\t"\\$2"
  63. ..
  64. . if !\nF==2 \{\
  65. . nr % 0
  66. . nr F 2
  67. . \}
  68. . \}
  69. .\}
  70. .rr rF
  71. .\"
  72. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  73. .\" Fear. Run. Save yourself. No user-serviceable parts.
  74. . \" fudge factors for nroff and troff
  75. .if n \{\
  76. . ds #H 0
  77. . ds #V .8m
  78. . ds #F .3m
  79. . ds #[ \f1
  80. . ds #] \fP
  81. .\}
  82. .if t \{\
  83. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  84. . ds #V .6m
  85. . ds #F 0
  86. . ds #[ \&
  87. . ds #] \&
  88. .\}
  89. . \" simple accents for nroff and troff
  90. .if n \{\
  91. . ds ' \&
  92. . ds ` \&
  93. . ds ^ \&
  94. . ds , \&
  95. . ds ~ ~
  96. . ds /
  97. .\}
  98. .if t \{\
  99. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  100. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  101. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  102. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  103. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  104. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  105. .\}
  106. . \" troff and (daisy-wheel) nroff accents
  107. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  108. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  109. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  110. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  111. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  112. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  113. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  114. .ds ae a\h'-(\w'a'u*4/10)'e
  115. .ds Ae A\h'-(\w'A'u*4/10)'E
  116. . \" corrections for vroff
  117. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  118. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  119. . \" for low resolution devices (crt and lpr)
  120. .if \n(.H>23 .if \n(.V>19 \
  121. \{\
  122. . ds : e
  123. . ds 8 ss
  124. . ds o a
  125. . ds d- d\h'-1'\(ga
  126. . ds D- D\h'-1'\(hy
  127. . ds th \o'bp'
  128. . ds Th \o'LP'
  129. . ds ae ae
  130. . ds Ae AE
  131. .\}
  132. .rm #[ #] #H #V #F C
  133. .\" ========================================================================
  134. .\"
  135. .IX Title "EVP_PKEY_ENCAPSULATE 3ossl"
  136. .TH EVP_PKEY_ENCAPSULATE 3ossl "2024-09-03" "3.3.2" "OpenSSL"
  137. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  138. .\" way too many mistakes in technical documents.
  139. .if n .ad l
  140. .nh
  141. .SH "NAME"
  142. EVP_PKEY_encapsulate_init, EVP_PKEY_auth_encapsulate_init, EVP_PKEY_encapsulate
  143. \&\- Key encapsulation using a KEM algorithm with a public key
  144. .SH "SYNOPSIS"
  145. .IX Header "SYNOPSIS"
  146. .Vb 1
  147. \& #include <openssl/evp.h>
  148. \&
  149. \& int EVP_PKEY_encapsulate_init(EVP_PKEY_CTX *ctx, const OSSL_PARAM params[]);
  150. \& int EVP_PKEY_auth_encapsulate_init(EVP_PKEY_CTX *ctx, EVP_PKEY *authpriv,
  151. \& const OSSL_PARAM params[]);
  152. \& int EVP_PKEY_encapsulate(EVP_PKEY_CTX *ctx,
  153. \& unsigned char *wrappedkey, size_t *wrappedkeylen,
  154. \& unsigned char *genkey, size_t *genkeylen);
  155. .Ve
  156. .SH "DESCRIPTION"
  157. .IX Header "DESCRIPTION"
  158. The \fBEVP_PKEY_encapsulate_init()\fR function initializes a public key algorithm
  159. context \fIctx\fR for an encapsulation operation and then sets the \fIparams\fR
  160. on the context in the same way as calling \fBEVP_PKEY_CTX_set_params\fR\|(3).
  161. Note that \fIctx\fR is usually is produced using \fBEVP_PKEY_CTX_new_from_pkey\fR\|(3),
  162. specifying the public key to use.
  163. .PP
  164. The \fBEVP_PKEY_auth_encapsulate_init()\fR function is similar to
  165. \&\fBEVP_PKEY_encapsulate_init()\fR but also passes an \fIauthpriv\fR authentication private
  166. key that is used during encapsulation.
  167. .PP
  168. The \fBEVP_PKEY_encapsulate()\fR function performs a public key encapsulation
  169. operation using \fIctx\fR.
  170. The symmetric secret generated in \fIgenkey\fR can be used as key material.
  171. The ciphertext in \fIwrappedkey\fR is its encapsulated form, which can be sent
  172. to another party, who can use \fBEVP_PKEY_decapsulate\fR\|(3) to retrieve it
  173. using their private key.
  174. If \fIwrappedkey\fR is \s-1NULL\s0 then the maximum size of the output buffer
  175. is written to the \fI*wrappedkeylen\fR parameter unless \fIwrappedkeylen\fR is \s-1NULL\s0
  176. and the maximum size of the generated key buffer is written to \fI*genkeylen\fR
  177. unless \fIgenkeylen\fR is \s-1NULL.\s0
  178. If \fIwrappedkey\fR is not \s-1NULL\s0 and the call is successful then the
  179. internally generated key is written to \fIgenkey\fR and its size is written to
  180. \&\fI*genkeylen\fR. The encapsulated version of the generated key is written to
  181. \&\fIwrappedkey\fR and its size is written to \fI*wrappedkeylen\fR.
  182. .SH "NOTES"
  183. .IX Header "NOTES"
  184. After the call to \fBEVP_PKEY_encapsulate_init()\fR algorithm-specific parameters
  185. for the operation may be set or modified using \fBEVP_PKEY_CTX_set_params\fR\|(3).
  186. .SH "RETURN VALUES"
  187. .IX Header "RETURN VALUES"
  188. \&\fBEVP_PKEY_encapsulate_init()\fR, \fBEVP_PKEY_auth_encapsulate_init()\fR and
  189. \&\fBEVP_PKEY_encapsulate()\fR return 1 for success and 0 or a negative value for
  190. failure. In particular a return value of \-2 indicates the operation is not
  191. supported by the public key algorithm.
  192. .SH "EXAMPLES"
  193. .IX Header "EXAMPLES"
  194. Encapsulate an \s-1RSASVE\s0 key (for \s-1RSA\s0 keys).
  195. .PP
  196. .Vb 1
  197. \& #include <openssl/evp.h>
  198. \&
  199. \& /*
  200. \& * NB: assumes rsa_pub_key is an public key of another party.
  201. \& */
  202. \&
  203. \& EVP_PKEY_CTX *ctx = NULL;
  204. \& size_t secretlen = 0, outlen = 0;
  205. \& unsigned char *out = NULL, *secret = NULL;
  206. \&
  207. \& ctx = EVP_PKEY_CTX_new_from_pkey(libctx, rsa_pub_key, NULL);
  208. \& if (ctx = NULL)
  209. \& /* Error */
  210. \& if (EVP_PKEY_encapsulate_init(ctx, NULL) <= 0)
  211. \& /* Error */
  212. \&
  213. \& /* Set the mode \- only \*(AqRSASVE\*(Aq is currently supported */
  214. \& if (EVP_PKEY_CTX_set_kem_op(ctx, "RSASVE") <= 0)
  215. \& /* Error */
  216. \& /* Determine buffer length */
  217. \& if (EVP_PKEY_encapsulate(ctx, NULL, &outlen, NULL, &secretlen) <= 0)
  218. \& /* Error */
  219. \&
  220. \& out = OPENSSL_malloc(outlen);
  221. \& secret = OPENSSL_malloc(secretlen);
  222. \& if (out == NULL || secret == NULL)
  223. \& /* malloc failure */
  224. \&
  225. \& /*
  226. \& * The generated \*(Aqsecret\*(Aq can be used as key material.
  227. \& * The encapsulated \*(Aqout\*(Aq can be sent to another party who can
  228. \& * decapsulate it using their private key to retrieve the \*(Aqsecret\*(Aq.
  229. \& */
  230. \& if (EVP_PKEY_encapsulate(ctx, out, &outlen, secret, &secretlen) <= 0)
  231. \& /* Error */
  232. .Ve
  233. .SH "SEE ALSO"
  234. .IX Header "SEE ALSO"
  235. \&\fBEVP_PKEY_CTX_new_from_pkey\fR\|(3),
  236. \&\fBEVP_PKEY_decapsulate\fR\|(3),
  237. \&\s-1\fBEVP_KEM\-RSA\s0\fR\|(7), \s-1\fBEVP_KEM\-X25519\s0\fR\|(7), \s-1\fBEVP_KEM\-EC\s0\fR\|(7)
  238. .SH "HISTORY"
  239. .IX Header "HISTORY"
  240. These functions \fBEVP_PKEY_encapsulate_init()\fR and \fBEVP_PKEY_encapsulate()\fR were
  241. added in OpenSSL 3.0.
  242. The function \fBEVP_PKEY_auth_encapsulate_init()\fR was added in OpenSSL 3.2.
  243. .SH "COPYRIGHT"
  244. .IX Header "COPYRIGHT"
  245. Copyright 2020\-2023 The OpenSSL Project Authors. All Rights Reserved.
  246. .PP
  247. Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use
  248. this file except in compliance with the License. You can obtain a copy
  249. in the file \s-1LICENSE\s0 in the source distribution or at
  250. <https://www.openssl.org/source/license.html>.