life_cycle-pkey.7ossl 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322
  1. .\" Automatically generated by Pod::Man 4.14 (Pod::Simple 3.42)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sp \" Vertical space (when we can't use .PP)
  6. .if t .sp .5v
  7. .if n .sp
  8. ..
  9. .de Vb \" Begin verbatim text
  10. .ft CW
  11. .nf
  12. .ne \\$1
  13. ..
  14. .de Ve \" End verbatim text
  15. .ft R
  16. .fi
  17. ..
  18. .\" Set up some character translations and predefined strings. \*(-- will
  19. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  20. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  21. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  22. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  23. .\" nothing in troff, for use with C<>.
  24. .tr \(*W-
  25. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  26. .ie n \{\
  27. . ds -- \(*W-
  28. . ds PI pi
  29. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  30. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  31. . ds L" ""
  32. . ds R" ""
  33. . ds C` ""
  34. . ds C' ""
  35. 'br\}
  36. .el\{\
  37. . ds -- \|\(em\|
  38. . ds PI \(*p
  39. . ds L" ``
  40. . ds R" ''
  41. . ds C`
  42. . ds C'
  43. 'br\}
  44. .\"
  45. .\" Escape single quotes in literal strings from groff's Unicode transform.
  46. .ie \n(.g .ds Aq \(aq
  47. .el .ds Aq '
  48. .\"
  49. .\" If the F register is >0, we'll generate index entries on stderr for
  50. .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
  51. .\" entries marked with X<> in POD. Of course, you'll have to process the
  52. .\" output yourself in some meaningful fashion.
  53. .\"
  54. .\" Avoid warning from groff about undefined register 'F'.
  55. .de IX
  56. ..
  57. .nr rF 0
  58. .if \n(.g .if rF .nr rF 1
  59. .if (\n(rF:(\n(.g==0)) \{\
  60. . if \nF \{\
  61. . de IX
  62. . tm Index:\\$1\t\\n%\t"\\$2"
  63. ..
  64. . if !\nF==2 \{\
  65. . nr % 0
  66. . nr F 2
  67. . \}
  68. . \}
  69. .\}
  70. .rr rF
  71. .\"
  72. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  73. .\" Fear. Run. Save yourself. No user-serviceable parts.
  74. . \" fudge factors for nroff and troff
  75. .if n \{\
  76. . ds #H 0
  77. . ds #V .8m
  78. . ds #F .3m
  79. . ds #[ \f1
  80. . ds #] \fP
  81. .\}
  82. .if t \{\
  83. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  84. . ds #V .6m
  85. . ds #F 0
  86. . ds #[ \&
  87. . ds #] \&
  88. .\}
  89. . \" simple accents for nroff and troff
  90. .if n \{\
  91. . ds ' \&
  92. . ds ` \&
  93. . ds ^ \&
  94. . ds , \&
  95. . ds ~ ~
  96. . ds /
  97. .\}
  98. .if t \{\
  99. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  100. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  101. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  102. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  103. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  104. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  105. .\}
  106. . \" troff and (daisy-wheel) nroff accents
  107. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  108. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  109. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  110. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  111. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  112. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  113. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  114. .ds ae a\h'-(\w'a'u*4/10)'e
  115. .ds Ae A\h'-(\w'A'u*4/10)'E
  116. . \" corrections for vroff
  117. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  118. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  119. . \" for low resolution devices (crt and lpr)
  120. .if \n(.H>23 .if \n(.V>19 \
  121. \{\
  122. . ds : e
  123. . ds 8 ss
  124. . ds o a
  125. . ds d- d\h'-1'\(ga
  126. . ds D- D\h'-1'\(hy
  127. . ds th \o'bp'
  128. . ds Th \o'LP'
  129. . ds ae ae
  130. . ds Ae AE
  131. .\}
  132. .rm #[ #] #H #V #F C
  133. .\" ========================================================================
  134. .\"
  135. .IX Title "LIFE_CYCLE-PKEY 7ossl"
  136. .TH LIFE_CYCLE-PKEY 7ossl "2024-09-03" "3.3.2" "OpenSSL"
  137. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  138. .\" way too many mistakes in technical documents.
  139. .if n .ad l
  140. .nh
  141. .SH "NAME"
  142. life_cycle\-pkey \- The PKEY algorithm life\-cycle
  143. .SH "DESCRIPTION"
  144. .IX Header "DESCRIPTION"
  145. All public keys (PKEYs) go through a number of stages in their life-cycle:
  146. .IP "start" 4
  147. .IX Item "start"
  148. This state represents the \s-1PKEY\s0 before it has been allocated. It is the
  149. starting state for any life-cycle transitions.
  150. .IP "newed" 4
  151. .IX Item "newed"
  152. This state represents the \s-1PKEY\s0 after it has been allocated.
  153. .IP "decapsulate" 4
  154. .IX Item "decapsulate"
  155. This state represents the \s-1PKEY\s0 when it is ready to perform a private key decapsulation
  156. operation.
  157. .IP "decrypt" 4
  158. .IX Item "decrypt"
  159. This state represents the \s-1PKEY\s0 when it is ready to decrypt some ciphertext.
  160. .IP "derive" 4
  161. .IX Item "derive"
  162. This state represents the \s-1PKEY\s0 when it is ready to derive a shared secret.
  163. .IP "digest sign" 4
  164. .IX Item "digest sign"
  165. This state represents the \s-1PKEY\s0 when it is ready to perform a private key signature
  166. operation.
  167. .IP "encapsulate" 4
  168. .IX Item "encapsulate"
  169. This state represents the \s-1PKEY\s0 when it is ready to perform a public key encapsulation
  170. operation.
  171. .IP "encrypt" 4
  172. .IX Item "encrypt"
  173. This state represents the \s-1PKEY\s0 when it is ready to encrypt some plaintext.
  174. .IP "key generation" 4
  175. .IX Item "key generation"
  176. This state represents the \s-1PKEY\s0 when it is ready to generate a new public/private key.
  177. .IP "parameter generation" 4
  178. .IX Item "parameter generation"
  179. This state represents the \s-1PKEY\s0 when it is ready to generate key parameters.
  180. .IP "verify" 4
  181. .IX Item "verify"
  182. This state represents the \s-1PKEY\s0 when it is ready to verify a public key signature.
  183. .IP "verify recover" 4
  184. .IX Item "verify recover"
  185. This state represents the \s-1PKEY\s0 when it is ready to recover a public key signature data.
  186. .IP "freed" 4
  187. .IX Item "freed"
  188. This state is entered when the \s-1PKEY\s0 is freed. It is the terminal state
  189. for all life-cycle transitions.
  190. .SS "State Transition Diagram"
  191. .IX Subsection "State Transition Diagram"
  192. The usual life-cycle of a \s-1PKEY\s0 object is illustrated:
  193. +-------------+
  194. | |
  195. | start |
  196. | |
  197. EVP_PKEY_derive +-------------+
  198. +-------------+ EVP_PKEY_derive_set_peer | +-------------+
  199. | |----------------------------+ | +----------------------------| |
  200. | derive | | | | EVP_PKEY_verify | verify |
  201. | |<---------------------------+ | +--------------------------->| |
  202. +-------------+ | +-------------+
  203. ^ | ^
  204. | EVP_PKEY_derive_init | EVP_PKEY_verify_init |
  205. +---------------------------------------+ | +---------------------------------------+
  206. | | |
  207. +-------------+ | | | +-------------+
  208. | |----------------------------+ | | | +----------------------------| |
  209. | digest sign | EVP_PKEY_sign | | | | | EVP_PKEY_verify_recover | verify |
  210. | |<---------------------------+ | | | +--------------------------->| recover |
  211. +-------------+ | | | +-------------+
  212. ^ | | | ^
  213. | EVP_PKEY_sign_init | | | EVP_PKEY_verify_recover_init |
  214. +---------------------------------+ | | | +---------------------------------+
  215. | | | | |
  216. +-------------+ | | | | | +-------------+
  217. | |----------------------------+ | | | | | +----------------------------| |
  218. | decapsulate | EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt | decrypt |
  219. | |<---------------------------+ | | v | | +--------------------------->| |
  220. +-------------+ | +-------------+ | +-------------+
  221. ^ +---| |---+ ^
  222. | EVP_PKEY_decapsulate_init | | EVP_PKEY_decrypt_init |
  223. +-------------------------------------| newed |-------------------------------------+
  224. | |
  225. +---| |---+
  226. +-------------+ | +-------------+ | +-------------+
  227. | |----------------------------+ | | | | +----------------------------| |
  228. | encapsulate | EVP_PKEY_encapsulate | | | | | | EVP_PKEY_encrypt | encrypt |
  229. | |<---------------------------+ | | | | +--------------------------->| |
  230. +-------------+ | | | | +-------------+
  231. ^ | | | | ^
  232. | EVP_PKEY_encapsulate_init | | | | EVP_PKEY_encrypt_init |
  233. +---------------------------------+ | | +---------------------------------+
  234. | |
  235. +---------------------------------------+ +---------------------------------------+
  236. | EVP_PKEY_paramgen_init EVP_PKEY_keygen_init |
  237. v v
  238. +-------------+ +-------------+
  239. | |----------------------------+ +----------------------------| |
  240. | parameter | | | | key |
  241. | generation |<---------------------------+ +--------------------------->| generation |
  242. +-------------+ EVP_PKEY_paramgen EVP_PKEY_keygen +-------------+
  243. EVP_PKEY_gen EVP_PKEY_gen
  244. + - - - - - + +-----------+
  245. ' ' EVP_PKEY_CTX_free | |
  246. ' any state '------------------->| freed |
  247. ' ' | |
  248. + - - - - - + +-----------+
  249. .SS "Formal State Transitions"
  250. .IX Subsection "Formal State Transitions"
  251. This section defines all of the legal state transitions.
  252. This is the canonical list.
  253. Function Call ---------------------------------------------------------------------- Current State ----------------------------------------------------------------------
  254. start newed digest verify verify encrypt decrypt derive encapsulate decapsulate parameter key freed
  255. sign recover generation generation
  256. EVP_PKEY_CTX_new newed
  257. EVP_PKEY_CTX_new_id newed
  258. EVP_PKEY_CTX_new_from_name newed
  259. EVP_PKEY_CTX_new_from_pkey newed
  260. EVP_PKEY_sign_init digest digest digest digest digest digest digest digest digest digest digest
  261. sign sign sign sign sign sign sign sign sign sign sign
  262. EVP_PKEY_sign digest
  263. sign
  264. EVP_PKEY_verify_init verify verify verify verify verify verify verify verify verify verify verify
  265. EVP_PKEY_verify verify
  266. EVP_PKEY_verify_recover_init verify verify verify verify verify verify verify verify verify verify verify
  267. recover recover recover recover recover recover recover recover recover recover recover
  268. EVP_PKEY_verify_recover verify
  269. recover
  270. EVP_PKEY_encrypt_init encrypt encrypt encrypt encrypt encrypt encrypt encrypt encrypt encrypt encrypt encrypt
  271. EVP_PKEY_encrypt encrypt
  272. EVP_PKEY_decrypt_init decrypt decrypt decrypt decrypt decrypt decrypt decrypt decrypt decrypt decrypt decrypt
  273. EVP_PKEY_decrypt decrypt
  274. EVP_PKEY_derive_init derive derive derive derive derive derive derive derive derive derive derive
  275. EVP_PKEY_derive_set_peer derive
  276. EVP_PKEY_derive derive
  277. EVP_PKEY_encapsulate_init encapsulate encapsulate encapsulate encapsulate encapsulate encapsulate encapsulate encapsulate encapsulate encapsulate encapsulate
  278. EVP_PKEY_encapsulate encapsulate
  279. EVP_PKEY_decapsulate_init decapsulate decapsulate decapsulate decapsulate decapsulate decapsulate decapsulate decapsulate decapsulate decapsulate decapsulate
  280. EVP_PKEY_decapsulate decapsulate
  281. EVP_PKEY_paramgen_init parameter parameter parameter parameter parameter parameter parameter parameter parameter parameter parameter
  282. generation generation generation generation generation generation generation generation generation generation generation
  283. EVP_PKEY_paramgen parameter
  284. generation
  285. EVP_PKEY_keygen_init key key key key key key key key key key key
  286. generation generation generation generation generation generation generation generation generation generation generation
  287. EVP_PKEY_keygen key
  288. generation
  289. EVP_PKEY_gen parameter key
  290. generation generation
  291. EVP_PKEY_CTX_get_params newed digest verify verify encrypt decrypt derive encapsulate decapsulate parameter key
  292. sign recover generation generation
  293. EVP_PKEY_CTX_set_params newed digest verify verify encrypt decrypt derive encapsulate decapsulate parameter key
  294. sign recover generation generation
  295. EVP_PKEY_CTX_gettable_params newed digest verify verify encrypt decrypt derive encapsulate decapsulate parameter key
  296. sign recover generation generation
  297. EVP_PKEY_CTX_settable_params newed digest verify verify encrypt decrypt derive encapsulate decapsulate parameter key
  298. sign recover generation generation
  299. EVP_PKEY_CTX_free freed freed freed freed freed freed freed freed freed freed freed freed
  300. .SH "NOTES"
  301. .IX Header "NOTES"
  302. At some point the \s-1EVP\s0 layer will begin enforcing the transitions described
  303. herein.
  304. .SH "SEE ALSO"
  305. .IX Header "SEE ALSO"
  306. \&\fBEVP_PKEY_new\fR\|(3),
  307. \&\fBEVP_PKEY_decapsulate\fR\|(3), \fBEVP_PKEY_decrypt\fR\|(3), \fBEVP_PKEY_encapsulate\fR\|(3),
  308. \&\fBEVP_PKEY_encrypt\fR\|(3), \fBEVP_PKEY_derive\fR\|(3), \fBEVP_PKEY_keygen\fR\|(3),
  309. \&\fBEVP_PKEY_sign\fR\|(3), \fBEVP_PKEY_verify\fR\|(3), \fBEVP_PKEY_verify_recover\fR\|(3)
  310. .SH "HISTORY"
  311. .IX Header "HISTORY"
  312. The provider \s-1PKEY\s0 interface was introduced in OpenSSL 3.0.
  313. .SH "COPYRIGHT"
  314. .IX Header "COPYRIGHT"
  315. Copyright 2021\-2022 The OpenSSL Project Authors. All Rights Reserved.
  316. .PP
  317. Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use
  318. this file except in compliance with the License. You can obtain a copy
  319. in the file \s-1LICENSE\s0 in the source distribution or at
  320. <https://www.openssl.org/source/license.html>.