provider-keyexch.7ossl 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363
  1. .\" Automatically generated by Pod::Man 4.14 (Pod::Simple 3.42)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sp \" Vertical space (when we can't use .PP)
  6. .if t .sp .5v
  7. .if n .sp
  8. ..
  9. .de Vb \" Begin verbatim text
  10. .ft CW
  11. .nf
  12. .ne \\$1
  13. ..
  14. .de Ve \" End verbatim text
  15. .ft R
  16. .fi
  17. ..
  18. .\" Set up some character translations and predefined strings. \*(-- will
  19. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  20. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  21. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  22. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  23. .\" nothing in troff, for use with C<>.
  24. .tr \(*W-
  25. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  26. .ie n \{\
  27. . ds -- \(*W-
  28. . ds PI pi
  29. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  30. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  31. . ds L" ""
  32. . ds R" ""
  33. . ds C` ""
  34. . ds C' ""
  35. 'br\}
  36. .el\{\
  37. . ds -- \|\(em\|
  38. . ds PI \(*p
  39. . ds L" ``
  40. . ds R" ''
  41. . ds C`
  42. . ds C'
  43. 'br\}
  44. .\"
  45. .\" Escape single quotes in literal strings from groff's Unicode transform.
  46. .ie \n(.g .ds Aq \(aq
  47. .el .ds Aq '
  48. .\"
  49. .\" If the F register is >0, we'll generate index entries on stderr for
  50. .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
  51. .\" entries marked with X<> in POD. Of course, you'll have to process the
  52. .\" output yourself in some meaningful fashion.
  53. .\"
  54. .\" Avoid warning from groff about undefined register 'F'.
  55. .de IX
  56. ..
  57. .nr rF 0
  58. .if \n(.g .if rF .nr rF 1
  59. .if (\n(rF:(\n(.g==0)) \{\
  60. . if \nF \{\
  61. . de IX
  62. . tm Index:\\$1\t\\n%\t"\\$2"
  63. ..
  64. . if !\nF==2 \{\
  65. . nr % 0
  66. . nr F 2
  67. . \}
  68. . \}
  69. .\}
  70. .rr rF
  71. .\"
  72. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  73. .\" Fear. Run. Save yourself. No user-serviceable parts.
  74. . \" fudge factors for nroff and troff
  75. .if n \{\
  76. . ds #H 0
  77. . ds #V .8m
  78. . ds #F .3m
  79. . ds #[ \f1
  80. . ds #] \fP
  81. .\}
  82. .if t \{\
  83. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  84. . ds #V .6m
  85. . ds #F 0
  86. . ds #[ \&
  87. . ds #] \&
  88. .\}
  89. . \" simple accents for nroff and troff
  90. .if n \{\
  91. . ds ' \&
  92. . ds ` \&
  93. . ds ^ \&
  94. . ds , \&
  95. . ds ~ ~
  96. . ds /
  97. .\}
  98. .if t \{\
  99. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  100. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  101. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  102. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  103. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  104. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  105. .\}
  106. . \" troff and (daisy-wheel) nroff accents
  107. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  108. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  109. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  110. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  111. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  112. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  113. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  114. .ds ae a\h'-(\w'a'u*4/10)'e
  115. .ds Ae A\h'-(\w'A'u*4/10)'E
  116. . \" corrections for vroff
  117. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  118. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  119. . \" for low resolution devices (crt and lpr)
  120. .if \n(.H>23 .if \n(.V>19 \
  121. \{\
  122. . ds : e
  123. . ds 8 ss
  124. . ds o a
  125. . ds d- d\h'-1'\(ga
  126. . ds D- D\h'-1'\(hy
  127. . ds th \o'bp'
  128. . ds Th \o'LP'
  129. . ds ae ae
  130. . ds Ae AE
  131. .\}
  132. .rm #[ #] #H #V #F C
  133. .\" ========================================================================
  134. .\"
  135. .IX Title "PROVIDER-KEYEXCH 7ossl"
  136. .TH PROVIDER-KEYEXCH 7ossl "2024-09-03" "3.3.2" "OpenSSL"
  137. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  138. .\" way too many mistakes in technical documents.
  139. .if n .ad l
  140. .nh
  141. .SH "NAME"
  142. provider\-keyexch \- The keyexch library <\-> provider functions
  143. .SH "SYNOPSIS"
  144. .IX Header "SYNOPSIS"
  145. .Vb 2
  146. \& #include <openssl/core_dispatch.h>
  147. \& #include <openssl/core_names.h>
  148. \&
  149. \& /*
  150. \& * None of these are actual functions, but are displayed like this for
  151. \& * the function signatures for functions that are offered as function
  152. \& * pointers in OSSL_DISPATCH arrays.
  153. \& */
  154. \&
  155. \& /* Context management */
  156. \& void *OSSL_FUNC_keyexch_newctx(void *provctx);
  157. \& void OSSL_FUNC_keyexch_freectx(void *ctx);
  158. \& void *OSSL_FUNC_keyexch_dupctx(void *ctx);
  159. \&
  160. \& /* Shared secret derivation */
  161. \& int OSSL_FUNC_keyexch_init(void *ctx, void *provkey,
  162. \& const OSSL_PARAM params[]);
  163. \& int OSSL_FUNC_keyexch_set_peer(void *ctx, void *provkey);
  164. \& int OSSL_FUNC_keyexch_derive(void *ctx, unsigned char *secret, size_t *secretlen,
  165. \& size_t outlen);
  166. \&
  167. \& /* Key Exchange parameters */
  168. \& int OSSL_FUNC_keyexch_set_ctx_params(void *ctx, const OSSL_PARAM params[]);
  169. \& const OSSL_PARAM *OSSL_FUNC_keyexch_settable_ctx_params(void *ctx,
  170. \& void *provctx);
  171. \& int OSSL_FUNC_keyexch_get_ctx_params(void *ctx, OSSL_PARAM params[]);
  172. \& const OSSL_PARAM *OSSL_FUNC_keyexch_gettable_ctx_params(void *ctx,
  173. \& void *provctx);
  174. .Ve
  175. .SH "DESCRIPTION"
  176. .IX Header "DESCRIPTION"
  177. This documentation is primarily aimed at provider authors. See \fBprovider\fR\|(7)
  178. for further information.
  179. .PP
  180. The key exchange (\s-1OSSL_OP_KEYEXCH\s0) operation enables providers to implement key
  181. exchange algorithms and make them available to applications via
  182. \&\fBEVP_PKEY_derive\fR\|(3) and
  183. other related functions).
  184. .PP
  185. All \*(L"functions\*(R" mentioned here are passed as function pointers between
  186. \&\fIlibcrypto\fR and the provider in \s-1\fBOSSL_DISPATCH\s0\fR\|(3) arrays via
  187. \&\s-1\fBOSSL_ALGORITHM\s0\fR\|(3) arrays that are returned by the provider's
  188. \&\fBprovider_query_operation()\fR function
  189. (see \*(L"Provider Functions\*(R" in \fBprovider\-base\fR\|(7)).
  190. .PP
  191. All these \*(L"functions\*(R" have a corresponding function type definition
  192. named \fBOSSL_FUNC_{name}_fn\fR, and a helper function to retrieve the
  193. function pointer from an \s-1\fBOSSL_DISPATCH\s0\fR\|(3) element named
  194. \&\fBOSSL_FUNC_{name}\fR.
  195. For example, the \*(L"function\*(R" \fBOSSL_FUNC_keyexch_newctx()\fR has these:
  196. .PP
  197. .Vb 3
  198. \& typedef void *(OSSL_FUNC_keyexch_newctx_fn)(void *provctx);
  199. \& static ossl_inline OSSL_FUNC_keyexch_newctx_fn
  200. \& OSSL_FUNC_keyexch_newctx(const OSSL_DISPATCH *opf);
  201. .Ve
  202. .PP
  203. \&\s-1\fBOSSL_DISPATCH\s0\fR\|(3) arrays are indexed by numbers that are provided as
  204. macros in \fBopenssl\-core_dispatch.h\fR\|(7), as follows:
  205. .PP
  206. .Vb 3
  207. \& OSSL_FUNC_keyexch_newctx OSSL_FUNC_KEYEXCH_NEWCTX
  208. \& OSSL_FUNC_keyexch_freectx OSSL_FUNC_KEYEXCH_FREECTX
  209. \& OSSL_FUNC_keyexch_dupctx OSSL_FUNC_KEYEXCH_DUPCTX
  210. \&
  211. \& OSSL_FUNC_keyexch_init OSSL_FUNC_KEYEXCH_INIT
  212. \& OSSL_FUNC_keyexch_set_peer OSSL_FUNC_KEYEXCH_SET_PEER
  213. \& OSSL_FUNC_keyexch_derive OSSL_FUNC_KEYEXCH_DERIVE
  214. \&
  215. \& OSSL_FUNC_keyexch_set_ctx_params OSSL_FUNC_KEYEXCH_SET_CTX_PARAMS
  216. \& OSSL_FUNC_keyexch_settable_ctx_params OSSL_FUNC_KEYEXCH_SETTABLE_CTX_PARAMS
  217. \& OSSL_FUNC_keyexch_get_ctx_params OSSL_FUNC_KEYEXCH_GET_CTX_PARAMS
  218. \& OSSL_FUNC_keyexch_gettable_ctx_params OSSL_FUNC_KEYEXCH_GETTABLE_CTX_PARAMS
  219. .Ve
  220. .PP
  221. A key exchange algorithm implementation may not implement all of these functions.
  222. In order to be a consistent set of functions a provider must implement
  223. OSSL_FUNC_keyexch_newctx, OSSL_FUNC_keyexch_freectx, OSSL_FUNC_keyexch_init and OSSL_FUNC_keyexch_derive.
  224. All other functions are optional.
  225. .PP
  226. A key exchange algorithm must also implement some mechanism for generating,
  227. loading or importing keys via the key management (\s-1OSSL_OP_KEYMGMT\s0) operation.
  228. See \fBprovider\-keymgmt\fR\|(7) for further details.
  229. .SS "Context Management Functions"
  230. .IX Subsection "Context Management Functions"
  231. \&\fBOSSL_FUNC_keyexch_newctx()\fR should create and return a pointer to a provider side
  232. structure for holding context information during a key exchange operation.
  233. A pointer to this context will be passed back in a number of the other key
  234. exchange operation function calls.
  235. The parameter \fIprovctx\fR is the provider context generated during provider
  236. initialisation (see \fBprovider\fR\|(7)).
  237. .PP
  238. \&\fBOSSL_FUNC_keyexch_freectx()\fR is passed a pointer to the provider side key exchange
  239. context in the \fIctx\fR parameter.
  240. This function should free any resources associated with that context.
  241. .PP
  242. \&\fBOSSL_FUNC_keyexch_dupctx()\fR should duplicate the provider side key exchange context in
  243. the \fIctx\fR parameter and return the duplicate copy.
  244. .SS "Shared Secret Derivation Functions"
  245. .IX Subsection "Shared Secret Derivation Functions"
  246. \&\fBOSSL_FUNC_keyexch_init()\fR initialises a key exchange operation given a provider side key
  247. exchange context in the \fIctx\fR parameter, and a pointer to a provider key object
  248. in the \fIprovkey\fR parameter.
  249. The \fIparams\fR, if not \s-1NULL,\s0 should be set on the context in a manner similar to
  250. using \fBOSSL_FUNC_keyexch_set_params()\fR.
  251. The key object should have been previously
  252. generated, loaded or imported into the provider using the key management
  253. (\s-1OSSL_OP_KEYMGMT\s0) operation (see \fBprovider\-keymgmt\fR\|(7)>.
  254. .PP
  255. \&\fBOSSL_FUNC_keyexch_set_peer()\fR is called to supply the peer's public key (in the
  256. \&\fIprovkey\fR parameter) to be used when deriving the shared secret.
  257. It is also passed a previously initialised key exchange context in the \fIctx\fR
  258. parameter.
  259. The key object should have been previously generated, loaded or imported into
  260. the provider using the key management (\s-1OSSL_OP_KEYMGMT\s0) operation (see
  261. \&\fBprovider\-keymgmt\fR\|(7)>.
  262. .PP
  263. \&\fBOSSL_FUNC_keyexch_derive()\fR performs the actual key exchange itself by deriving a shared
  264. secret.
  265. A previously initialised key exchange context is passed in the \fIctx\fR
  266. parameter.
  267. The derived secret should be written to the location \fIsecret\fR which should not
  268. exceed \fIoutlen\fR bytes.
  269. The length of the shared secret should be written to \fI*secretlen\fR.
  270. If \fIsecret\fR is \s-1NULL\s0 then the maximum length of the shared secret should be
  271. written to \fI*secretlen\fR.
  272. .SS "Key Exchange Parameters Functions"
  273. .IX Subsection "Key Exchange Parameters Functions"
  274. \&\fBOSSL_FUNC_keyexch_set_ctx_params()\fR sets key exchange parameters associated with the
  275. given provider side key exchange context \fIctx\fR to \fIparams\fR,
  276. see \*(L"Common Key Exchange parameters\*(R".
  277. Any parameter settings are additional to any that were previously set.
  278. Passing \s-1NULL\s0 for \fIparams\fR should return true.
  279. .PP
  280. \&\fBOSSL_FUNC_keyexch_get_ctx_params()\fR gets key exchange parameters associated with the
  281. given provider side key exchange context \fIctx\fR into \fIparams\fR,
  282. see \*(L"Common Key Exchange parameters\*(R".
  283. Passing \s-1NULL\s0 for \fIparams\fR should return true.
  284. .PP
  285. \&\fBOSSL_FUNC_keyexch_settable_ctx_params()\fR yields a constant \s-1\fBOSSL_PARAM\s0\fR\|(3) array that
  286. describes the settable parameters, i.e. parameters that can be used with
  287. \&\fBOP_signature_set_ctx_params()\fR.
  288. If \fBOSSL_FUNC_keyexch_settable_ctx_params()\fR is present, \fBOSSL_FUNC_keyexch_set_ctx_params()\fR must
  289. also be present, and vice versa.
  290. Similarly, \fBOSSL_FUNC_keyexch_gettable_ctx_params()\fR yields a constant \s-1\fBOSSL_PARAM\s0\fR\|(3)
  291. array that describes the gettable parameters, i.e. parameters that can be
  292. handled by \fBOP_signature_get_ctx_params()\fR.
  293. If \fBOSSL_FUNC_keyexch_gettable_ctx_params()\fR is present, \fBOSSL_FUNC_keyexch_get_ctx_params()\fR must
  294. also be present, and vice versa.
  295. .PP
  296. Notice that not all settable parameters are also gettable, and vice versa.
  297. .SS "Common Key Exchange parameters"
  298. .IX Subsection "Common Key Exchange parameters"
  299. See \s-1\fBOSSL_PARAM\s0\fR\|(3) for further details on the parameters structure used by
  300. the \fBOSSL_FUNC_keyexch_set_ctx_params()\fR and \fBOSSL_FUNC_keyexch_get_ctx_params()\fR functions.
  301. .PP
  302. Common parameters currently recognised by built-in key exchange algorithms are
  303. as follows.
  304. .ie n .IP """kdf-type"" (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_TYPE\s0\fR) <\s-1UTF8\s0 string>" 4
  305. .el .IP "``kdf-type'' (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_TYPE\s0\fR) <\s-1UTF8\s0 string>" 4
  306. .IX Item "kdf-type (OSSL_EXCHANGE_PARAM_KDF_TYPE) <UTF8 string>"
  307. Sets or gets the Key Derivation Function type to apply within the associated key
  308. exchange ctx.
  309. .ie n .IP """kdf-digest"" (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_DIGEST\s0\fR) <\s-1UTF8\s0 string>" 4
  310. .el .IP "``kdf-digest'' (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_DIGEST\s0\fR) <\s-1UTF8\s0 string>" 4
  311. .IX Item "kdf-digest (OSSL_EXCHANGE_PARAM_KDF_DIGEST) <UTF8 string>"
  312. Sets or gets the Digest algorithm to be used as part of the Key Derivation Function
  313. associated with the given key exchange ctx.
  314. .ie n .IP """kdf-digest-props"" (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_DIGEST_PROPS\s0\fR) <\s-1UTF8\s0 string>" 4
  315. .el .IP "``kdf-digest-props'' (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_DIGEST_PROPS\s0\fR) <\s-1UTF8\s0 string>" 4
  316. .IX Item "kdf-digest-props (OSSL_EXCHANGE_PARAM_KDF_DIGEST_PROPS) <UTF8 string>"
  317. Sets properties to be used upon look up of the implementation for the selected
  318. Digest algorithm for the Key Derivation Function associated with the given key
  319. exchange ctx.
  320. .ie n .IP """kdf-outlen"" (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_OUTLEN\s0\fR) <unsigned integer>" 4
  321. .el .IP "``kdf-outlen'' (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_OUTLEN\s0\fR) <unsigned integer>" 4
  322. .IX Item "kdf-outlen (OSSL_EXCHANGE_PARAM_KDF_OUTLEN) <unsigned integer>"
  323. Sets or gets the desired size for the output of the chosen Key Derivation Function
  324. associated with the given key exchange ctx.
  325. The length of the \*(L"kdf-outlen\*(R" parameter should not exceed that of a \fBsize_t\fR.
  326. .ie n .IP """kdf-ukm"" (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_UKM\s0\fR) <octet string>" 4
  327. .el .IP "``kdf-ukm'' (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_UKM\s0\fR) <octet string>" 4
  328. .IX Item "kdf-ukm (OSSL_EXCHANGE_PARAM_KDF_UKM) <octet string>"
  329. Sets the User Key Material to be used as part of the selected Key Derivation
  330. Function associated with the given key exchange ctx.
  331. .ie n .IP """kdf-ukm"" (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_UKM\s0\fR) <octet string ptr>" 4
  332. .el .IP "``kdf-ukm'' (\fB\s-1OSSL_EXCHANGE_PARAM_KDF_UKM\s0\fR) <octet string ptr>" 4
  333. .IX Item "kdf-ukm (OSSL_EXCHANGE_PARAM_KDF_UKM) <octet string ptr>"
  334. Gets a pointer to the User Key Material to be used as part of the selected
  335. Key Derivation Function associated with the given key exchange ctx. Providers
  336. usually do not need to support this gettable parameter as its sole purpose
  337. is to support functionality of the deprecated \fBEVP_PKEY_CTX_get0_ecdh_kdf_ukm()\fR
  338. and \fBEVP_PKEY_CTX_get0_dh_kdf_ukm()\fR functions.
  339. .SH "RETURN VALUES"
  340. .IX Header "RETURN VALUES"
  341. \&\fBOSSL_FUNC_keyexch_newctx()\fR and \fBOSSL_FUNC_keyexch_dupctx()\fR should return the newly created
  342. provider side key exchange context, or \s-1NULL\s0 on failure.
  343. .PP
  344. \&\fBOSSL_FUNC_keyexch_init()\fR, \fBOSSL_FUNC_keyexch_set_peer()\fR, \fBOSSL_FUNC_keyexch_derive()\fR,
  345. \&\fBOSSL_FUNC_keyexch_set_params()\fR, and \fBOSSL_FUNC_keyexch_get_params()\fR should return 1 for success
  346. or 0 on error.
  347. .PP
  348. \&\fBOSSL_FUNC_keyexch_settable_ctx_params()\fR and \fBOSSL_FUNC_keyexch_gettable_ctx_params()\fR should
  349. always return a constant \s-1\fBOSSL_PARAM\s0\fR\|(3) array.
  350. .SH "SEE ALSO"
  351. .IX Header "SEE ALSO"
  352. \&\fBprovider\fR\|(7)
  353. .SH "HISTORY"
  354. .IX Header "HISTORY"
  355. The provider \s-1KEYEXCH\s0 interface was introduced in OpenSSL 3.0.
  356. .SH "COPYRIGHT"
  357. .IX Header "COPYRIGHT"
  358. Copyright 2019\-2022 The OpenSSL Project Authors. All Rights Reserved.
  359. .PP
  360. Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use
  361. this file except in compliance with the License. You can obtain a copy
  362. in the file \s-1LICENSE\s0 in the source distribution or at
  363. <https://www.openssl.org/source/license.html>.