| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639 |
- .\" -*- mode: troff; coding: utf-8 -*-
- .\" Automatically generated by Pod::Man 5.01 (Pod::Simple 3.43)
- .\"
- .\" Standard preamble:
- .\" ========================================================================
- .de Sp \" Vertical space (when we can't use .PP)
- .if t .sp .5v
- .if n .sp
- ..
- .de Vb \" Begin verbatim text
- .ft CW
- .nf
- .ne \\$1
- ..
- .de Ve \" End verbatim text
- .ft R
- .fi
- ..
- .\" \*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>.
- .ie n \{\
- . ds C` ""
- . ds C' ""
- 'br\}
- .el\{\
- . ds C`
- . ds C'
- 'br\}
- .\"
- .\" Escape single quotes in literal strings from groff's Unicode transform.
- .ie \n(.g .ds Aq \(aq
- .el .ds Aq '
- .\"
- .\" If the F register is >0, we'll generate index entries on stderr for
- .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
- .\" entries marked with X<> in POD. Of course, you'll have to process the
- .\" output yourself in some meaningful fashion.
- .\"
- .\" Avoid warning from groff about undefined register 'F'.
- .de IX
- ..
- .nr rF 0
- .if \n(.g .if rF .nr rF 1
- .if (\n(rF:(\n(.g==0)) \{\
- . if \nF \{\
- . de IX
- . tm Index:\\$1\t\\n%\t"\\$2"
- ..
- . if !\nF==2 \{\
- . nr % 0
- . nr F 2
- . \}
- . \}
- .\}
- .rr rF
- .\" ========================================================================
- .\"
- .IX Title "PROVIDER-SIGNATURE 7ossl"
- .TH PROVIDER-SIGNATURE 7ossl 2025-01-17 3.4.0 OpenSSL
- .\" For nroff, turn off justification. Always turn off hyphenation; it makes
- .\" way too many mistakes in technical documents.
- .if n .ad l
- .nh
- .SH NAME
- provider\-signature \- The signature library <\-> provider functions
- .SH SYNOPSIS
- .IX Header "SYNOPSIS"
- .Vb 2
- \& #include <openssl/core_dispatch.h>
- \& #include <openssl/core_names.h>
- \&
- \& /*
- \& * None of these are actual functions, but are displayed like this for
- \& * the function signatures for functions that are offered as function
- \& * pointers in OSSL_DISPATCH arrays.
- \& */
- \&
- \& /* Context management */
- \& void *OSSL_FUNC_signature_newctx(void *provctx, const char *propq);
- \& void OSSL_FUNC_signature_freectx(void *ctx);
- \& void *OSSL_FUNC_signature_dupctx(void *ctx);
- \&
- \& /* Get the key types that a signature algorithm supports */
- \& const char **OSSL_FUNC_signature_query_key_types(void);
- \&
- \& /* Signing */
- \& int OSSL_FUNC_signature_sign_init(void *ctx, void *provkey,
- \& const OSSL_PARAM params[]);
- \& int OSSL_FUNC_signature_sign(void *ctx, unsigned char *sig, size_t *siglen,
- \& size_t sigsize, const unsigned char *tbs, size_t tbslen);
- \& int OSSL_FUNC_signature_sign_message_init(void *ctx, void *provkey,
- \& const OSSL_PARAM params[]);
- \& int OSSL_FUNC_signature_sign_message_update(void *ctx, const unsigned char *in,
- \& size_t inlen);
- \& int OSSL_FUNC_signature_sign_message_final(void *ctx, unsigned char *sig,
- \& size_t *siglen, size_t sigsize);
- \&
- \& /* Verifying */
- \& int OSSL_FUNC_signature_verify_init(void *ctx, void *provkey,
- \& const OSSL_PARAM params[]);
- \& int OSSL_FUNC_signature_verify(void *ctx, const unsigned char *sig, size_t siglen,
- \& const unsigned char *tbs, size_t tbslen);
- \& int OSSL_FUNC_signature_verify_message_init(void *ctx, void *provkey,
- \& const OSSL_PARAM params[]);
- \& int OSSL_FUNC_signature_verify_message_update(void *ctx, const unsigned char *in,
- \& size_t inlen);
- \& /*
- \& * OSSL_FUNC_signature_verify_message_final requires that the signature to be
- \& * verified is specified via a "signature" OSSL_PARAM, which is given with a
- \& * previous call of OSSL_FUNC_signature_set_ctx_params().
- \& */
- \& int OSSL_FUNC_signature_verify_message_final(void *ctx);
- \&
- \& /* Verify Recover */
- \& int OSSL_FUNC_signature_verify_recover_init(void *ctx, void *provkey,
- \& const OSSL_PARAM params[]);
- \& int OSSL_FUNC_signature_verify_recover(void *ctx, unsigned char *rout,
- \& size_t *routlen, size_t routsize,
- \& const unsigned char *sig, size_t siglen);
- \&
- \& /* Digest Sign */
- \& int OSSL_FUNC_signature_digest_sign_init(void *ctx, const char *mdname,
- \& void *provkey,
- \& const OSSL_PARAM params[]);
- \& int OSSL_FUNC_signature_digest_sign_update(void *ctx, const unsigned char *data,
- \& size_t datalen);
- \& int OSSL_FUNC_signature_digest_sign_final(void *ctx, unsigned char *sig,
- \& size_t *siglen, size_t sigsize);
- \& int OSSL_FUNC_signature_digest_sign(void *ctx,
- \& unsigned char *sig, size_t *siglen,
- \& size_t sigsize, const unsigned char *tbs,
- \& size_t tbslen);
- \&
- \& /* Digest Verify */
- \& int OSSL_FUNC_signature_digest_verify_init(void *ctx, const char *mdname,
- \& void *provkey,
- \& const OSSL_PARAM params[]);
- \& int OSSL_FUNC_signature_digest_verify_update(void *ctx,
- \& const unsigned char *data,
- \& size_t datalen);
- \& int OSSL_FUNC_signature_digest_verify_final(void *ctx, const unsigned char *sig,
- \& size_t siglen);
- \& int OSSL_FUNC_signature_digest_verify(void *ctx, const unsigned char *sig,
- \& size_t siglen, const unsigned char *tbs,
- \& size_t tbslen);
- \&
- \& /* Signature parameters */
- \& int OSSL_FUNC_signature_get_ctx_params(void *ctx, OSSL_PARAM params[]);
- \& const OSSL_PARAM *OSSL_FUNC_signature_gettable_ctx_params(void *ctx,
- \& void *provctx);
- \& int OSSL_FUNC_signature_set_ctx_params(void *ctx, const OSSL_PARAM params[]);
- \& const OSSL_PARAM *OSSL_FUNC_signature_settable_ctx_params(void *ctx,
- \& void *provctx);
- \& /* MD parameters */
- \& int OSSL_FUNC_signature_get_ctx_md_params(void *ctx, OSSL_PARAM params[]);
- \& const OSSL_PARAM * OSSL_FUNC_signature_gettable_ctx_md_params(void *ctx);
- \& int OSSL_FUNC_signature_set_ctx_md_params(void *ctx, const OSSL_PARAM params[]);
- \& const OSSL_PARAM * OSSL_FUNC_signature_settable_ctx_md_params(void *ctx);
- .Ve
- .SH DESCRIPTION
- .IX Header "DESCRIPTION"
- This documentation is primarily aimed at provider authors. See \fBprovider\fR\|(7)
- for further information.
- .PP
- The signature (OSSL_OP_SIGNATURE) operation enables providers to implement
- signature algorithms and make them available to applications via the API
- functions \fBEVP_PKEY_sign\fR\|(3), \fBEVP_PKEY_verify\fR\|(3),
- and \fBEVP_PKEY_verify_recover\fR\|(3) (as well
- as other related functions).
- .PP
- All "functions" mentioned here are passed as function pointers between
- \&\fIlibcrypto\fR and the provider in \fBOSSL_DISPATCH\fR\|(3) arrays via
- \&\fBOSSL_ALGORITHM\fR\|(3) arrays that are returned by the provider's
- \&\fBprovider_query_operation()\fR function
- (see "Provider Functions" in \fBprovider\-base\fR\|(7)).
- .PP
- All these "functions" have a corresponding function type definition
- named \fBOSSL_FUNC_{name}_fn\fR, and a helper function to retrieve the
- function pointer from an \fBOSSL_DISPATCH\fR\|(3) element named
- \&\fBOSSL_FUNC_{name}\fR.
- For example, the "function" \fBOSSL_FUNC_signature_newctx()\fR has these:
- .PP
- .Vb 3
- \& typedef void *(OSSL_FUNC_signature_newctx_fn)(void *provctx, const char *propq);
- \& static ossl_inline OSSL_FUNC_signature_newctx_fn
- \& OSSL_FUNC_signature_newctx(const OSSL_DISPATCH *opf);
- .Ve
- .PP
- \&\fBOSSL_DISPATCH\fR\|(3) arrays are indexed by numbers that are provided as
- macros in \fBopenssl\-core_dispatch.h\fR\|(7), as follows:
- .PP
- .Vb 3
- \& OSSL_FUNC_signature_newctx OSSL_FUNC_SIGNATURE_NEWCTX
- \& OSSL_FUNC_signature_freectx OSSL_FUNC_SIGNATURE_FREECTX
- \& OSSL_FUNC_signature_dupctx OSSL_FUNC_SIGNATURE_DUPCTX
- \&
- \& OSSL_FUNC_signature_query_key_types OSSL_FUNC_SIGNATURE_QUERY_KEY_TYPES
- \&
- \& OSSL_FUNC_signature_sign_init OSSL_FUNC_SIGNATURE_SIGN_INIT
- \& OSSL_FUNC_signature_sign OSSL_FUNC_SIGNATURE_SIGN
- \& OSSL_FUNC_signature_sign_message_init OSSL_FUNC_SIGNATURE_SIGN_MESSAGE_INIT
- \& OSSL_FUNC_signature_sign_message_update OSSL_FUNC_SIGNATURE_SIGN_MESSAGE_UPDATE
- \& OSSL_FUNC_signature_sign_message_final OSSL_FUNC_SIGNATURE_SIGN_MESSAGE_FINAL
- \&
- \& OSSL_FUNC_signature_verify_init OSSL_FUNC_SIGNATURE_VERIFY_INIT
- \& OSSL_FUNC_signature_verify OSSL_FUNC_SIGNATURE_VERIFY
- \& OSSL_FUNC_signature_verify_message_init OSSL_FUNC_SIGNATURE_VERIFY_MESSAGE_INIT
- \& OSSL_FUNC_signature_verify_message_update OSSL_FUNC_SIGNATURE_VERIFY_MESSAGE_UPDATE
- \& OSSL_FUNC_signature_verify_message_final OSSL_FUNC_SIGNATURE_VERIFY_MESSAGE_FINAL
- \&
- \& OSSL_FUNC_signature_verify_recover_init OSSL_FUNC_SIGNATURE_VERIFY_RECOVER_INIT
- \& OSSL_FUNC_signature_verify_recover OSSL_FUNC_SIGNATURE_VERIFY_RECOVER
- \&
- \& OSSL_FUNC_signature_digest_sign_init OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT
- \& OSSL_FUNC_signature_digest_sign_update OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE
- \& OSSL_FUNC_signature_digest_sign_final OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL
- \& OSSL_FUNC_signature_digest_sign OSSL_FUNC_SIGNATURE_DIGEST_SIGN
- \&
- \& OSSL_FUNC_signature_digest_verify_init OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT
- \& OSSL_FUNC_signature_digest_verify_update OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_UPDATE
- \& OSSL_FUNC_signature_digest_verify_final OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_FINAL
- \& OSSL_FUNC_signature_digest_verify OSSL_FUNC_SIGNATURE_DIGEST_VERIFY
- \&
- \& OSSL_FUNC_signature_get_ctx_params OSSL_FUNC_SIGNATURE_GET_CTX_PARAMS
- \& OSSL_FUNC_signature_gettable_ctx_params OSSL_FUNC_SIGNATURE_GETTABLE_CTX_PARAMS
- \& OSSL_FUNC_signature_set_ctx_params OSSL_FUNC_SIGNATURE_SET_CTX_PARAMS
- \& OSSL_FUNC_signature_settable_ctx_params OSSL_FUNC_SIGNATURE_SETTABLE_CTX_PARAMS
- \&
- \& OSSL_FUNC_signature_get_ctx_md_params OSSL_FUNC_SIGNATURE_GET_CTX_MD_PARAMS
- \& OSSL_FUNC_signature_gettable_ctx_md_params OSSL_FUNC_SIGNATURE_GETTABLE_CTX_MD_PARAMS
- \& OSSL_FUNC_signature_set_ctx_md_params OSSL_FUNC_SIGNATURE_SET_CTX_MD_PARAMS
- \& OSSL_FUNC_signature_settable_ctx_md_params OSSL_FUNC_SIGNATURE_SETTABLE_CTX_MD_PARAMS
- .Ve
- .PP
- A signature algorithm implementation may not implement all of these functions.
- In order to be a consistent set of functions we must have at least a set of
- context functions (OSSL_FUNC_signature_newctx and OSSL_FUNC_signature_freectx) as well as a
- set of "signature" functions, i.e. at least one of:
- .IP "OSSL_FUNC_signature_sign_init and OSSL_FUNC_signature_sign" 4
- .IX Item "OSSL_FUNC_signature_sign_init and OSSL_FUNC_signature_sign"
- .PD 0
- .IP "OSSL_FUNC_signature_sign_message_init and OSSL_FUNC_signature_sign" 4
- .IX Item "OSSL_FUNC_signature_sign_message_init and OSSL_FUNC_signature_sign"
- .IP "OSSL_FUNC_signature_sign_message_init, OSSL_FUNC_signature_sign_message_update and OSSL_FUNC_signature_sign_message_final" 4
- .IX Item "OSSL_FUNC_signature_sign_message_init, OSSL_FUNC_signature_sign_message_update and OSSL_FUNC_signature_sign_message_final"
- .IP "OSSL_FUNC_signature_verify_init and OSSL_FUNC_signature_verify" 4
- .IX Item "OSSL_FUNC_signature_verify_init and OSSL_FUNC_signature_verify"
- .IP "OSSL_FUNC_signature_verify_message_init and OSSL_FUNC_signature_verify" 4
- .IX Item "OSSL_FUNC_signature_verify_message_init and OSSL_FUNC_signature_verify"
- .IP "OSSL_FUNC_signature_verify_message_init, OSSL_FUNC_signature_verify_message_update and OSSL_FUNC_signature_verify_message_final" 4
- .IX Item "OSSL_FUNC_signature_verify_message_init, OSSL_FUNC_signature_verify_message_update and OSSL_FUNC_signature_verify_message_final"
- .IP "OSSL_FUNC_signature_verify_recover_init and OSSL_FUNC_signature_verify_recover" 4
- .IX Item "OSSL_FUNC_signature_verify_recover_init and OSSL_FUNC_signature_verify_recover"
- .IP "OSSL_FUNC_signature_digest_sign_init, OSSL_FUNC_signature_digest_sign_update and OSSL_FUNC_signature_digest_sign_final" 4
- .IX Item "OSSL_FUNC_signature_digest_sign_init, OSSL_FUNC_signature_digest_sign_update and OSSL_FUNC_signature_digest_sign_final"
- .IP "OSSL_FUNC_signature_digest_verify_init, OSSL_FUNC_signature_digest_verify_update and OSSL_FUNC_signature_digest_verify_final" 4
- .IX Item "OSSL_FUNC_signature_digest_verify_init, OSSL_FUNC_signature_digest_verify_update and OSSL_FUNC_signature_digest_verify_final"
- .IP "OSSL_FUNC_signature_digest_sign_init and OSSL_FUNC_signature_digest_sign" 4
- .IX Item "OSSL_FUNC_signature_digest_sign_init and OSSL_FUNC_signature_digest_sign"
- .IP "OSSL_FUNC_signature_digest_verify_init and OSSL_FUNC_signature_digest_verify" 4
- .IX Item "OSSL_FUNC_signature_digest_verify_init and OSSL_FUNC_signature_digest_verify"
- .PD
- .PP
- OSSL_FUNC_signature_set_ctx_params and OSSL_FUNC_signature_settable_ctx_params are optional,
- but if one of them is present then the other one must also be present. The same
- applies to OSSL_FUNC_signature_get_ctx_params and OSSL_FUNC_signature_gettable_ctx_params, as
- well as the "md_params" functions. The OSSL_FUNC_signature_dupctx function is optional.
- .PP
- A signature algorithm must also implement some mechanism for generating,
- loading or importing keys via the key management (OSSL_OP_KEYMGMT) operation.
- See \fBprovider\-keymgmt\fR\|(7) for further details.
- .SS "Context Management Functions"
- .IX Subsection "Context Management Functions"
- \&\fBOSSL_FUNC_signature_newctx()\fR should create and return a pointer to a provider side
- structure for holding context information during a signature operation.
- A pointer to this context will be passed back in a number of the other signature
- operation function calls.
- The parameter \fIprovctx\fR is the provider context generated during provider
- initialisation (see \fBprovider\fR\|(7)). The \fIpropq\fR parameter is a property query
- string that may be (optionally) used by the provider during any "fetches" that
- it may perform (if it performs any).
- .PP
- \&\fBOSSL_FUNC_signature_freectx()\fR is passed a pointer to the provider side signature
- context in the \fIctx\fR parameter.
- This function should free any resources associated with that context.
- .PP
- \&\fBOSSL_FUNC_signature_dupctx()\fR should duplicate the provider side signature context in
- the \fIctx\fR parameter and return the duplicate copy.
- .SS "Signing Functions"
- .IX Subsection "Signing Functions"
- \&\fBOSSL_FUNC_signature_sign_init()\fR initialises a context for signing given a provider side
- signature context in the \fIctx\fR parameter, and a pointer to a provider key object
- in the \fIprovkey\fR parameter.
- The \fIparams\fR, if not NULL, should be set on the context in a manner similar to
- using \fBOSSL_FUNC_signature_set_ctx_params()\fR.
- The key object should have been previously generated, loaded or imported into
- the provider using the key management (OSSL_OP_KEYMGMT) operation (see
- \&\fBprovider\-keymgmt\fR\|(7)).
- .PP
- \&\fBOSSL_FUNC_signature_sign()\fR performs the actual signing itself.
- A previously initialised signature context is passed in the \fIctx\fR
- parameter.
- The data to be signed is pointed to be the \fItbs\fR parameter which is \fItbslen\fR
- bytes long.
- Unless \fIsig\fR is NULL, the signature should be written to the location pointed
- to by the \fIsig\fR parameter and it should not exceed \fIsigsize\fR bytes in length.
- The length of the signature should be written to \fI*siglen\fR.
- If \fIsig\fR is NULL then the maximum length of the signature should be written to
- \&\fI*siglen\fR.
- .SS "Message Signing Functions"
- .IX Subsection "Message Signing Functions"
- These functions are suitable for providers that implement algorithms that
- accumulate a full message and sign the result of that accumulation, such as
- RSA\-SHA256.
- .PP
- \&\fBOSSL_FUNC_signature_sign_message_init()\fR initialises a context for signing a
- message given a provider side signature context in the \fIctx\fR parameter, and a
- pointer to a provider key object in the \fIprovkey\fR parameter.
- The \fIparams\fR, if not NULL, should be set on the context in a manner similar to
- using \fBOSSL_FUNC_signature_set_ctx_params()\fR.
- The key object should have been previously generated, loaded or imported into
- the provider using the key management (OSSL_OP_KEYMGMT) operation (see
- \&\fBprovider\-keymgmt\fR\|(7)).
- .PP
- \&\fBOSSL_FUNC_signature_sign_message_update()\fR gathers the data pointed at by
- \&\fIin\fR, which is \fIinlen\fR bytes long.
- .PP
- \&\fBOSSL_FUNC_signature_sign_message_final()\fR performs the actual signing on the
- data that was gathered with \fBOSSL_FUNC_signature_sign_message_update()\fR.
- .PP
- \&\fBOSSL_FUNC_signature_sign()\fR can be used for one-shot signature calls. In that
- case, \fItbs\fR is expected to be the whole message to be signed, \fItbslen\fR bytes
- long.
- .PP
- For both \fBOSSL_FUNC_signature_sign_message_final()\fR and \fBOSSL_FUNC_signature_sign()\fR,
- if \fIsig\fR is not NULL, the signature should be written to the location pointed
- to by \fIsig\fR, and it should not exceed \fIsigsize\fR bytes in length.
- The length of the signature should be written to \fI*siglen\fR.
- If \fIsig\fR is NULL then the maximum length of the signature should be written to
- \&\fI*siglen\fR.
- .SS "Verify Functions"
- .IX Subsection "Verify Functions"
- \&\fBOSSL_FUNC_signature_verify_init()\fR initialises a context for verifying a signature given
- a provider side signature context in the \fIctx\fR parameter, and a pointer to a
- provider key object in the \fIprovkey\fR parameter.
- The \fIparams\fR, if not NULL, should be set on the context in a manner similar to
- using \fBOSSL_FUNC_signature_set_ctx_params()\fR.
- The key object should have been previously generated, loaded or imported into
- the provider using the key management (OSSL_OP_KEYMGMT) operation (see
- \&\fBprovider\-keymgmt\fR\|(7)).
- .PP
- \&\fBOSSL_FUNC_signature_verify()\fR performs the actual verification itself.
- A previously initialised signature context is passed in the \fIctx\fR parameter.
- The data that the signature covers is pointed to be the \fItbs\fR parameter which
- is \fItbslen\fR bytes long.
- The signature is pointed to by the \fIsig\fR parameter which is \fIsiglen\fR bytes
- long.
- .SS "Message Verify Functions"
- .IX Subsection "Message Verify Functions"
- These functions are suitable for providers that implement algorithms that
- accumulate a full message and verify a signature on the result of that
- accumulation, such as RSA\-SHA256.
- .PP
- \&\fBOSSL_FUNC_signature_verify_message_init()\fR initialises a context for verifying
- a signature on a message given a provider side signature context in the \fIctx\fR
- parameter, and a pointer to a provider key object in the \fIprovkey\fR parameter.
- The \fIparams\fR, if not NULL, should be set on the context in a manner similar to
- using \fBOSSL_FUNC_signature_set_ctx_params()\fR.
- The key object should have been previously generated, loaded or imported into
- the provider using the key management (OSSL_OP_KEYMGMT) operation (see
- \&\fBprovider\-keymgmt\fR\|(7)).
- .PP
- \&\fBOSSL_FUNC_signature_verify_message_update()\fR gathers the data pointed at by
- \&\fIin\fR, which is \fIinlen\fR bytes long.
- .PP
- \&\fBOSSL_FUNC_signature_verify_message_final()\fR performs the actual verification on
- the data that was gathered with \fBOSSL_FUNC_signature_verify_message_update()\fR.
- The signature itself must have been passed through the "signature"
- (\fBOSSL_SIGNATURE_PARAM_SIGNATURE\fR) Signature parameter
- before this function is called.
- .PP
- \&\fBOSSL_FUNC_signature_verify()\fR can be used for one-shot verification calls. In
- that case, \fItbs\fR is expected to be the whole message to be verified on,
- \&\fItbslen\fR bytes long.
- .SS "Verify Recover Functions"
- .IX Subsection "Verify Recover Functions"
- \&\fBOSSL_FUNC_signature_verify_recover_init()\fR initialises a context for recovering the
- signed data given a provider side signature context in the \fIctx\fR parameter, and
- a pointer to a provider key object in the \fIprovkey\fR parameter.
- The \fIparams\fR, if not NULL, should be set on the context in a manner similar to
- using \fBOSSL_FUNC_signature_set_ctx_params()\fR.
- The key object should have been previously generated, loaded or imported into
- the provider using the key management (OSSL_OP_KEYMGMT) operation (see
- \&\fBprovider\-keymgmt\fR\|(7)).
- .PP
- \&\fBOSSL_FUNC_signature_verify_recover()\fR performs the actual verify recover itself.
- A previously initialised signature context is passed in the \fIctx\fR parameter.
- The signature is pointed to by the \fIsig\fR parameter which is \fIsiglen\fR bytes
- long.
- Unless \fIrout\fR is NULL, the recovered data should be written to the location
- pointed to by \fIrout\fR which should not exceed \fIroutsize\fR bytes in length.
- The length of the recovered data should be written to \fI*routlen\fR.
- If \fIrout\fR is NULL then the maximum size of the output buffer is written to
- the \fIroutlen\fR parameter.
- .SS "Digest Sign Functions"
- .IX Subsection "Digest Sign Functions"
- \&\fBOSSL_FUNC_signature_digest_sign_init()\fR initialises a context for signing given a
- provider side signature context in the \fIctx\fR parameter, and a pointer to a
- provider key object in the \fIprovkey\fR parameter.
- The \fIparams\fR, if not NULL, should be set on the context in a manner similar to
- using \fBOSSL_FUNC_signature_set_ctx_params()\fR and
- \&\fBOSSL_FUNC_signature_set_ctx_md_params()\fR.
- The key object should have been
- previously generated, loaded or imported into the provider using the
- key management (OSSL_OP_KEYMGMT) operation (see \fBprovider\-keymgmt\fR\|(7)).
- The name of the digest to be used will be in the \fImdname\fR parameter.
- .PP
- \&\fBOSSL_FUNC_signature_digest_sign_update()\fR provides data to be signed in the \fIdata\fR
- parameter which should be of length \fIdatalen\fR. A previously initialised
- signature context is passed in the \fIctx\fR parameter. This function may be called
- multiple times to cumulatively add data to be signed.
- .PP
- \&\fBOSSL_FUNC_signature_digest_sign_final()\fR finalises a signature operation previously
- started through \fBOSSL_FUNC_signature_digest_sign_init()\fR and
- \&\fBOSSL_FUNC_signature_digest_sign_update()\fR calls. Once finalised no more data will be
- added through \fBOSSL_FUNC_signature_digest_sign_update()\fR. A previously initialised
- signature context is passed in the \fIctx\fR parameter. Unless \fIsig\fR is NULL, the
- signature should be written to the location pointed to by the \fIsig\fR parameter
- and it should not exceed \fIsigsize\fR bytes in length. The length of the signature
- should be written to \fI*siglen\fR. If \fIsig\fR is NULL then the maximum length of
- the signature should be written to \fI*siglen\fR.
- .PP
- \&\fBOSSL_FUNC_signature_digest_sign()\fR implements a "one shot" digest sign operation
- previously started through \fBOSSL_FUNC_signature_digeset_sign_init()\fR. A previously
- initialised signature context is passed in the \fIctx\fR parameter. The data to be
- signed is in \fItbs\fR which should be \fItbslen\fR bytes long. Unless \fIsig\fR is NULL,
- the signature should be written to the location pointed to by the \fIsig\fR
- parameter and it should not exceed \fIsigsize\fR bytes in length. The length of the
- signature should be written to \fI*siglen\fR. If \fIsig\fR is NULL then the maximum
- length of the signature should be written to \fI*siglen\fR.
- .SS "Digest Verify Functions"
- .IX Subsection "Digest Verify Functions"
- \&\fBOSSL_FUNC_signature_digeset_verify_init()\fR initialises a context for verifying given a
- provider side verification context in the \fIctx\fR parameter, and a pointer to a
- provider key object in the \fIprovkey\fR parameter.
- The \fIparams\fR, if not NULL, should be set on the context in a manner similar to
- \&\fBOSSL_FUNC_signature_set_ctx_params()\fR and
- \&\fBOSSL_FUNC_signature_set_ctx_md_params()\fR.
- The key object should have been
- previously generated, loaded or imported into the provider using the
- key management (OSSL_OP_KEYMGMT) operation (see \fBprovider\-keymgmt\fR\|(7)).
- The name of the digest to be used will be in the \fImdname\fR parameter.
- .PP
- \&\fBOSSL_FUNC_signature_digest_verify_update()\fR provides data to be verified in the \fIdata\fR
- parameter which should be of length \fIdatalen\fR. A previously initialised
- verification context is passed in the \fIctx\fR parameter. This function may be
- called multiple times to cumulatively add data to be verified.
- .PP
- \&\fBOSSL_FUNC_signature_digest_verify_final()\fR finalises a verification operation previously
- started through \fBOSSL_FUNC_signature_digest_verify_init()\fR and
- \&\fBOSSL_FUNC_signature_digest_verify_update()\fR calls. Once finalised no more data will be
- added through \fBOSSL_FUNC_signature_digest_verify_update()\fR. A previously initialised
- verification context is passed in the \fIctx\fR parameter. The signature to be
- verified is in \fIsig\fR which is \fIsiglen\fR bytes long.
- .PP
- \&\fBOSSL_FUNC_signature_digest_verify()\fR implements a "one shot" digest verify operation
- previously started through \fBOSSL_FUNC_signature_digeset_verify_init()\fR. A previously
- initialised verification context is passed in the \fIctx\fR parameter. The data to be
- verified is in \fItbs\fR which should be \fItbslen\fR bytes long. The signature to be
- verified is in \fIsig\fR which is \fIsiglen\fR bytes long.
- .SS "Signature parameters"
- .IX Subsection "Signature parameters"
- See \fBOSSL_PARAM\fR\|(3) for further details on the parameters structure used by
- the \fBOSSL_FUNC_signature_get_ctx_params()\fR and \fBOSSL_FUNC_signature_set_ctx_params()\fR functions.
- .PP
- \&\fBOSSL_FUNC_signature_get_ctx_params()\fR gets signature parameters associated with the
- given provider side signature context \fIctx\fR and stored them in \fIparams\fR.
- Passing NULL for \fIparams\fR should return true.
- .PP
- \&\fBOSSL_FUNC_signature_set_ctx_params()\fR sets the signature parameters associated with the
- given provider side signature context \fIctx\fR to \fIparams\fR.
- Any parameter settings are additional to any that were previously set.
- Passing NULL for \fIparams\fR should return true.
- .PP
- Common parameters currently recognised by built-in signature algorithms are as
- follows.
- .IP """digest"" (\fBOSSL_SIGNATURE_PARAM_DIGEST\fR) <UTF8 string>" 4
- .IX Item """digest"" (OSSL_SIGNATURE_PARAM_DIGEST) <UTF8 string>"
- Get or sets the name of the digest algorithm used for the input to the
- signature functions. It is required in order to calculate the "algorithm-id".
- .IP """properties"" (\fBOSSL_SIGNATURE_PARAM_PROPERTIES\fR) <UTF8 string>" 4
- .IX Item """properties"" (OSSL_SIGNATURE_PARAM_PROPERTIES) <UTF8 string>"
- Sets the name of the property query associated with the "digest" algorithm.
- NULL is used if this optional value is not set.
- .PP
- Note that when implementing a signature algorithm that gathers a full message,
- like RSA\-SHA256, the "digest" and "properties" parameters should not be used.
- For such implementations, it's acceptable to simply ignore them if they happen
- to be passed in a call to \fBOSSL_FUNC_signature_set_ctx_params()\fR. For such
- implementations, however, it is not acceptable to have them in the \fBOSSL_PARAM\fR
- array that's returned by \fBOSSL_FUNC_signature_settable_ctx_params()\fR.
- .IP """signature"" (\fBOSSL_SIGNATURE_PARAM_SIGNATURE\fR) <octet string>" 4
- .IX Item """signature"" (OSSL_SIGNATURE_PARAM_SIGNATURE) <octet string>"
- Sets the signature to verify, specifically when
- \&\fBOSSL_FUNC_signature_verify_message_final()\fR is used.
- .IP """digest-size"" (\fBOSSL_SIGNATURE_PARAM_DIGEST_SIZE\fR) <unsigned integer>" 4
- .IX Item """digest-size"" (OSSL_SIGNATURE_PARAM_DIGEST_SIZE) <unsigned integer>"
- Gets or sets the output size of the digest algorithm used for the input to the
- signature functions.
- The length of the "digest-size" parameter should not exceed that of a \fBsize_t\fR.
- .IP """algorithm-id"" (\fBOSSL_SIGNATURE_PARAM_ALGORITHM_ID\fR) <octet string>" 4
- .IX Item """algorithm-id"" (OSSL_SIGNATURE_PARAM_ALGORITHM_ID) <octet string>"
- Gets the DER encoded AlgorithmIdentifier that corresponds to the combination of
- signature algorithm and digest algorithm for the signature operation.
- .IP """nonce-type"" (\fBOSSL_SIGNATURE_PARAM_NONCE_TYPE\fR) <unsigned integer>" 4
- .IX Item """nonce-type"" (OSSL_SIGNATURE_PARAM_NONCE_TYPE) <unsigned integer>"
- Set this to 1 to use deterministic digital signature generation with
- ECDSA or DSA, as defined in RFC 6979 (see Section 3.2 "Generation of
- k"). In this case, the "digest" parameter must be explicitly set
- (otherwise, deterministic nonce generation will fail). Before using
- deterministic digital signature generation, please read RFC 6979
- Section 4 "Security Considerations". The default value for
- "nonce-type" is 0 and results in a random value being used for the
- nonce \fBk\fR as defined in FIPS 186\-4 Section 6.3 "Secret Number
- Generation".
- .IP """kat"" (\fBOSSL_SIGNATURE_PARAM_KAT\fR) <unsigned integer>" 4
- .IX Item """kat"" (OSSL_SIGNATURE_PARAM_KAT) <unsigned integer>"
- Sets a flag to modify the sign operation to return an error if the initial
- calculated signature is invalid.
- In the normal mode of operation \- new random values are chosen until the
- signature operation succeeds.
- By default it retries until a signature is calculated.
- Setting the value to 0 causes the sign operation to retry,
- otherwise the sign operation is only tried once and returns whether or not it
- was successful.
- Known answer tests can be performed if the random generator is overridden to
- supply known values that either pass or fail.
- .PP
- The following parameters are used by the OpenSSL FIPS provider:
- .IP """fips-indicator"" (\fBOSSL_SIGNATURE_PARAM_FIPS_APPROVED_INDICATOR\fR) <integer>" 4
- .IX Item """fips-indicator"" (OSSL_SIGNATURE_PARAM_FIPS_APPROVED_INDICATOR) <integer>"
- A getter that returns 1 if the operation is FIPS approved, or 0 otherwise.
- This may be used after calling either the sign or verify final functions. It may
- return 0 if either the "digest-check", "key-check", or "sign-check" are set to 0.
- .IP """verify-message"" (\fBOSSL_SIGNATURE_PARAM_FIPS_VERIFY_MESSAGE\fR <integer>" 4
- .IX Item """verify-message"" (OSSL_SIGNATURE_PARAM_FIPS_VERIFY_MESSAGE <integer>"
- A getter that returns 1 if a signature verification operation acted on
- a raw message, or 0 if it verified a predigested message. A value of 0
- indicates likely non-approved usage of the FIPS provider. This flag is
- set when any signature verification initialisation function is called.
- It is also set to 1 when any signing operation is performed to signify
- compliance. See FIPS 140\-3 IG 2.4.B for further information.
- .IP """key-check"" (\fBOSSL_SIGNATURE_PARAM_FIPS_KEY_CHECK\fR) <integer>" 4
- .IX Item """key-check"" (OSSL_SIGNATURE_PARAM_FIPS_KEY_CHECK) <integer>"
- If required this parameter should be set early via an init function
- (e.g. \fBOSSL_FUNC_signature_sign_init()\fR or \fBOSSL_FUNC_signature_verify_init()\fR).
- The default value of 1 causes an error during the init if the key is not FIPS
- approved (e.g. The key has a security strength of less than 112 bits).
- Setting this to 0 will ignore the error and set the approved "indicator" to 0.
- This option breaks FIPS compliance if it causes the approved "fips-indicator"
- to return 0.
- .IP """digest-check"" (\fBOSSL_SIGNATURE_PARAM_FIPS_DIGEST_CHECK\fR) <integer>" 4
- .IX Item """digest-check"" (OSSL_SIGNATURE_PARAM_FIPS_DIGEST_CHECK) <integer>"
- If required this parameter should be set before the signature digest is set.
- The default value of 1 causes an error when the digest is set if the digest is
- not FIPS approved (e.g. SHA1 is used for signing). Setting this to 0 will ignore
- the error and set the approved "fips-indicator" to 0.
- This option breaks FIPS compliance if it causes the approved "fips-indicator"
- to return 0.
- .IP """sign-check"" (\fBOSSL_SIGNATURE_PARAM_FIPS_SIGN_CHECK\fR) <integer>" 4
- .IX Item """sign-check"" (OSSL_SIGNATURE_PARAM_FIPS_SIGN_CHECK) <integer>"
- If required this parameter should be set early via an init function.
- The default value of 1 causes an error when a signing algorithm is used. (This
- is triggered by deprecated signing algorithms).
- Setting this to 0 will ignore the error and set the approved "fips-indicator" to 0.
- This option breaks FIPS compliance if it causes the approved "fips-indicator" to
- return 0.
- .IP """sign\-x931\-pad\-check"" (\fBOSSL_SIGNATURE_PARAM_FIPS_SIGN_X931_PAD_CHECK\fR) <integer>" 4
- .IX Item """sign-x931-pad-check"" (OSSL_SIGNATURE_PARAM_FIPS_SIGN_X931_PAD_CHECK) <integer>"
- If required this parameter should be set before the padding mode is set.
- The default value of 1 causes an error if the padding mode is set to X9.31 padding
- for a RSA signing operation. Setting this to 0 will ignore the error and set the
- approved "fips-indicator" to 0.
- This option breaks FIPS compliance if it causes the approved "fips-indicator"
- to return 0.
- .PP
- \&\fBOSSL_FUNC_signature_gettable_ctx_params()\fR and \fBOSSL_FUNC_signature_settable_ctx_params()\fR get a
- constant \fBOSSL_PARAM\fR\|(3) array that describes the gettable and settable parameters,
- i.e. parameters that can be used with \fBOSSL_FUNC_signature_get_ctx_params()\fR and
- \&\fBOSSL_FUNC_signature_set_ctx_params()\fR respectively.
- .SS "MD parameters"
- .IX Subsection "MD parameters"
- See \fBOSSL_PARAM\fR\|(3) for further details on the parameters structure used by
- the \fBOSSL_FUNC_signature_get_md_ctx_params()\fR and \fBOSSL_FUNC_signature_set_md_ctx_params()\fR
- functions.
- .PP
- \&\fBOSSL_FUNC_signature_get_md_ctx_params()\fR gets digest parameters associated with the
- given provider side digest signature context \fIctx\fR and stores them in \fIparams\fR.
- Passing NULL for \fIparams\fR should return true.
- .PP
- \&\fBOSSL_FUNC_signature_set_ms_ctx_params()\fR sets the digest parameters associated with the
- given provider side digest signature context \fIctx\fR to \fIparams\fR.
- Any parameter settings are additional to any that were previously set.
- Passing NULL for \fIparams\fR should return true.
- .PP
- Parameters currently recognised by built-in signature algorithms are the same
- as those for built-in digest algorithms. See
- "Digest Parameters" in \fBprovider\-digest\fR\|(7) for further information.
- .PP
- \&\fBOSSL_FUNC_signature_gettable_md_ctx_params()\fR and \fBOSSL_FUNC_signature_settable_md_ctx_params()\fR
- get a constant \fBOSSL_PARAM\fR\|(3) array that describes the gettable and settable
- digest parameters, i.e. parameters that can be used with
- \&\fBOSSL_FUNC_signature_get_md_ctx_params()\fR and \fBOSSL_FUNC_signature_set_md_ctx_params()\fR
- respectively.
- .SH "RETURN VALUES"
- .IX Header "RETURN VALUES"
- \&\fBOSSL_FUNC_signature_newctx()\fR and \fBOSSL_FUNC_signature_dupctx()\fR should return the newly created
- provider side signature context, or NULL on failure.
- .PP
- \&\fBOSSL_FUNC_signature_gettable_ctx_params()\fR, \fBOSSL_FUNC_signature_settable_ctx_params()\fR,
- \&\fBOSSL_FUNC_signature_gettable_md_ctx_params()\fR and \fBOSSL_FUNC_signature_settable_md_ctx_params()\fR,
- return the gettable or settable parameters in a constant \fBOSSL_PARAM\fR\|(3) array.
- .PP
- All other functions should return 1 for success or 0 on error.
- .SH "SEE ALSO"
- .IX Header "SEE ALSO"
- \&\fBprovider\fR\|(7)
- .SH HISTORY
- .IX Header "HISTORY"
- The provider SIGNATURE interface was introduced in OpenSSL 3.0.
- The Signature Parameters "fips-indicator", "key-check" and "digest-check"
- were added in OpenSSL 3.4.
- .SH COPYRIGHT
- .IX Header "COPYRIGHT"
- Copyright 2019\-2024 The OpenSSL Project Authors. All Rights Reserved.
- .PP
- Licensed under the Apache License 2.0 (the "License"). You may not use
- this file except in compliance with the License. You can obtain a copy
- in the file LICENSE in the source distribution or at
- <https://www.openssl.org/source/license.html>.
|