Mbed TLS v3.5.2
Loading...
Searching...
No Matches
pk.h
Go to the documentation of this file.
1
6/*
7 * Copyright The Mbed TLS Contributors
8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
9 */
10
11#ifndef MBEDTLS_PK_H
12#define MBEDTLS_PK_H
14
15#include "mbedtls/build_info.h"
16
17#include "mbedtls/md.h"
18
19#if defined(MBEDTLS_RSA_C)
20#include "mbedtls/rsa.h"
21#endif
22
23#if defined(MBEDTLS_ECP_C)
24#include "mbedtls/ecp.h"
25#endif
26
27#if defined(MBEDTLS_ECDSA_C)
28#include "mbedtls/ecdsa.h"
29#endif
30
31#if defined(MBEDTLS_USE_PSA_CRYPTO) || defined(MBEDTLS_PSA_CRYPTO_C)
32#include "psa/crypto.h"
33#endif
34
36#define MBEDTLS_ERR_PK_ALLOC_FAILED -0x3F80
38#define MBEDTLS_ERR_PK_TYPE_MISMATCH -0x3F00
40#define MBEDTLS_ERR_PK_BAD_INPUT_DATA -0x3E80
42#define MBEDTLS_ERR_PK_FILE_IO_ERROR -0x3E00
44#define MBEDTLS_ERR_PK_KEY_INVALID_VERSION -0x3D80
46#define MBEDTLS_ERR_PK_KEY_INVALID_FORMAT -0x3D00
48#define MBEDTLS_ERR_PK_UNKNOWN_PK_ALG -0x3C80
50#define MBEDTLS_ERR_PK_PASSWORD_REQUIRED -0x3C00
52#define MBEDTLS_ERR_PK_PASSWORD_MISMATCH -0x3B80
54#define MBEDTLS_ERR_PK_INVALID_PUBKEY -0x3B00
56#define MBEDTLS_ERR_PK_INVALID_ALG -0x3A80
58#define MBEDTLS_ERR_PK_UNKNOWN_NAMED_CURVE -0x3A00
60#define MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE -0x3980
62#define MBEDTLS_ERR_PK_SIG_LEN_MISMATCH -0x3900
64#define MBEDTLS_ERR_PK_BUFFER_TOO_SMALL -0x3880
65
66#ifdef __cplusplus
67extern "C" {
68#endif
69
73typedef enum {
83
98
107
109
113/* We need to set MBEDTLS_PK_SIGNATURE_MAX_SIZE to the maximum signature
114 * size among the supported signature types. Do it by starting at 0,
115 * then incrementally increasing to be large enough for each supported
116 * signature mechanism.
117 *
118 * The resulting value can be 0, for example if MBEDTLS_ECDH_C is enabled
119 * (which allows the pk module to be included) but neither MBEDTLS_ECDSA_C
120 * nor MBEDTLS_RSA_C nor any opaque signature mechanism (PSA or RSA_ALT).
121 */
122#define MBEDTLS_PK_SIGNATURE_MAX_SIZE 0
123
124#if (defined(MBEDTLS_RSA_C) || defined(MBEDTLS_PK_RSA_ALT_SUPPORT)) && \
125 MBEDTLS_MPI_MAX_SIZE > MBEDTLS_PK_SIGNATURE_MAX_SIZE
126/* For RSA, the signature can be as large as the bignum module allows.
127 * For RSA_ALT, the signature size is not necessarily tied to what the
128 * bignum module can do, but in the absence of any specific setting,
129 * we use that (rsa_alt_sign_wrap in library/pk_wrap.h will check). */
130#undef MBEDTLS_PK_SIGNATURE_MAX_SIZE
131#define MBEDTLS_PK_SIGNATURE_MAX_SIZE MBEDTLS_MPI_MAX_SIZE
132#endif
133
134#if defined(MBEDTLS_ECDSA_C) && \
135 MBEDTLS_ECDSA_MAX_LEN > MBEDTLS_PK_SIGNATURE_MAX_SIZE
136/* For ECDSA, the ecdsa module exports a constant for the maximum
137 * signature size. */
138#undef MBEDTLS_PK_SIGNATURE_MAX_SIZE
139#define MBEDTLS_PK_SIGNATURE_MAX_SIZE MBEDTLS_ECDSA_MAX_LEN
140#endif
141
142#if defined(MBEDTLS_USE_PSA_CRYPTO)
143#if PSA_SIGNATURE_MAX_SIZE > MBEDTLS_PK_SIGNATURE_MAX_SIZE
144/* PSA_SIGNATURE_MAX_SIZE is the maximum size of a signature made
145 * through the PSA API in the PSA representation. */
146#undef MBEDTLS_PK_SIGNATURE_MAX_SIZE
147#define MBEDTLS_PK_SIGNATURE_MAX_SIZE PSA_SIGNATURE_MAX_SIZE
148#endif
149
150#if PSA_VENDOR_ECDSA_SIGNATURE_MAX_SIZE + 11 > MBEDTLS_PK_SIGNATURE_MAX_SIZE
151/* The Mbed TLS representation is different for ECDSA signatures:
152 * PSA uses the raw concatenation of r and s,
153 * whereas Mbed TLS uses the ASN.1 representation (SEQUENCE of two INTEGERs).
154 * Add the overhead of ASN.1: up to (1+2) + 2 * (1+2+1) for the
155 * types, lengths (represented by up to 2 bytes), and potential leading
156 * zeros of the INTEGERs and the SEQUENCE. */
157#undef MBEDTLS_PK_SIGNATURE_MAX_SIZE
158#define MBEDTLS_PK_SIGNATURE_MAX_SIZE (PSA_VENDOR_ECDSA_SIGNATURE_MAX_SIZE + 11)
159#endif
160#endif /* defined(MBEDTLS_USE_PSA_CRYPTO) */
161
162/* Internal helper to define which fields in the pk_context structure below
163 * should be used for EC keys: legacy ecp_keypair or the raw (PSA friendly)
164 * format. It should be noted that this only affects how data is stored, not
165 * which functions are used for various operations. The overall picture looks
166 * like this:
167 * - if USE_PSA is not defined and ECP_C is defined then use ecp_keypair data
168 * structure and legacy functions
169 * - if USE_PSA is defined and
170 * - if ECP_C then use ecp_keypair structure, convert data to a PSA friendly
171 * format and use PSA functions
172 * - if !ECP_C then use new raw data and PSA functions directly.
173 *
174 * The main reason for the "intermediate" (USE_PSA + ECP_C) above is that as long
175 * as ECP_C is defined mbedtls_pk_ec() gives the user a read/write access to the
176 * ecp_keypair structure inside the pk_context so they can modify it using
177 * ECP functions which are not under PK module's control.
178 */
179#if defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY) && \
180 !defined(MBEDTLS_ECP_C)
181#define MBEDTLS_PK_USE_PSA_EC_DATA
182#endif
183
184/* Helper symbol to state that the PK module has support for EC keys. This
185 * can either be provided through the legacy ECP solution or through the
186 * PSA friendly MBEDTLS_PK_USE_PSA_EC_DATA. */
187#if defined(MBEDTLS_PK_USE_PSA_EC_DATA) || defined(MBEDTLS_ECP_C)
188#define MBEDTLS_PK_HAVE_ECC_KEYS
189#endif /* MBEDTLS_PK_USE_PSA_EC_DATA || MBEDTLS_ECP_C */
190
194typedef enum {
200
204typedef struct mbedtls_pk_debug_item {
206 const char *MBEDTLS_PRIVATE(name);
207 void *MBEDTLS_PRIVATE(value);
209
211#define MBEDTLS_PK_DEBUG_MAX_ITEMS 3
212
221
222#define MBEDTLS_PK_MAX_EC_PUBKEY_RAW_LEN \
223 PSA_KEY_EXPORT_ECC_PUBLIC_KEY_MAX_SIZE(PSA_VENDOR_ECC_MAX_CURVE_BITS)
227typedef struct mbedtls_pk_context {
229 void *MBEDTLS_PRIVATE(pk_ctx);
230 /* The following field is used to store the ID of a private key in the
231 * following cases:
232 * - opaque key when MBEDTLS_PSA_CRYPTO_C is defined
233 * - normal key when MBEDTLS_PK_USE_PSA_EC_DATA is defined. In this case:
234 * - the pk_ctx above is not not used to store the private key anymore.
235 * Actually that field not populated at all in this case because also
236 * the public key will be stored in raw format as explained below
237 * - this ID is used for all private key operations (ex: sign, check
238 * key pair, key write, etc) using PSA functions
239 *
240 * Note: this private key storing solution only affects EC keys, not the
241 * other ones. The latters still use the pk_ctx to store their own
242 * context.
243 *
244 * Note: this priv_id is guarded by MBEDTLS_PSA_CRYPTO_C and not by
245 * MBEDTLS_PK_USE_PSA_EC_DATA (as the public counterpart below) because,
246 * when working with opaque keys, it can be used also in
247 * mbedtls_pk_sign_ext for RSA keys. */
248#if defined(MBEDTLS_PSA_CRYPTO_C)
250#endif /* MBEDTLS_PSA_CRYPTO_C */
251 /* The following fields are meant for storing the public key in raw format
252 * which is handy for:
253 * - easily importing it into the PSA context
254 * - reducing the ECP module dependencies in the PK one.
255 *
256 * When MBEDTLS_PK_USE_PSA_EC_DATA is enabled:
257 * - the pk_ctx above is not used anymore for storing the public key
258 * inside the ecp_keypair structure
259 * - the following fields are used for all public key operations: signature
260 * verify, key pair check and key write.
261 * Of course, when MBEDTLS_PK_USE_PSA_EC_DATA is not enabled, the legacy
262 * ecp_keypair structure is used for storing the public key and performing
263 * all the operations.
264 *
265 * Note: This new public key storing solution only works for EC keys, not
266 * other ones. The latters still use pk_ctx to store their own
267 * context.
268 */
269#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
271 size_t MBEDTLS_PRIVATE(pub_raw_len);
273 size_t MBEDTLS_PRIVATE(ec_bits);
274#endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
276
277#if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECP_RESTARTABLE)
281typedef struct {
282 const mbedtls_pk_info_t *MBEDTLS_PRIVATE(pk_info);
283 void *MBEDTLS_PRIVATE(rs_ctx);
285#else /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */
286/* Now we can declare functions that take a pointer to that */
288#endif /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */
289
290#if defined(MBEDTLS_PK_RSA_ALT_SUPPORT)
294typedef int (*mbedtls_pk_rsa_alt_decrypt_func)(void *ctx, size_t *olen,
295 const unsigned char *input, unsigned char *output,
296 size_t output_max_len);
297typedef int (*mbedtls_pk_rsa_alt_sign_func)(void *ctx,
298 int (*f_rng)(void *, unsigned char *, size_t),
299 void *p_rng,
300 mbedtls_md_type_t md_alg, unsigned int hashlen,
301 const unsigned char *hash, unsigned char *sig);
302typedef size_t (*mbedtls_pk_rsa_alt_key_len_func)(void *ctx);
303#endif /* MBEDTLS_PK_RSA_ALT_SUPPORT */
304
313
321
334
335#if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECP_RESTARTABLE)
342void mbedtls_pk_restart_init(mbedtls_pk_restart_ctx *ctx);
343
350void mbedtls_pk_restart_free(mbedtls_pk_restart_ctx *ctx);
351#endif /* MBEDTLS_ECDSA_C && MBEDTLS_ECP_RESTARTABLE */
352
369
370#if defined(MBEDTLS_USE_PSA_CRYPTO)
399int mbedtls_pk_setup_opaque(mbedtls_pk_context *ctx,
400 const mbedtls_svc_key_id_t key);
401#endif /* MBEDTLS_USE_PSA_CRYPTO */
402
403#if defined(MBEDTLS_PK_RSA_ALT_SUPPORT)
423#endif /* MBEDTLS_PK_RSA_ALT_SUPPORT */
424
433
441static inline size_t mbedtls_pk_get_len(const mbedtls_pk_context *ctx)
442{
443 return (mbedtls_pk_get_bitlen(ctx) + 7) / 8;
444}
445
459
460#if defined(MBEDTLS_USE_PSA_CRYPTO)
488int mbedtls_pk_can_do_ext(const mbedtls_pk_context *ctx, psa_algorithm_t alg,
489 psa_key_usage_t usage);
490#endif /* MBEDTLS_USE_PSA_CRYPTO */
491
520 const unsigned char *hash, size_t hash_len,
521 const unsigned char *sig, size_t sig_len);
522
544 mbedtls_md_type_t md_alg,
545 const unsigned char *hash, size_t hash_len,
546 const unsigned char *sig, size_t sig_len,
547 mbedtls_pk_restart_ctx *rs_ctx);
548
580int mbedtls_pk_verify_ext(mbedtls_pk_type_t type, const void *options,
582 const unsigned char *hash, size_t hash_len,
583 const unsigned char *sig, size_t sig_len);
584
614 const unsigned char *hash, size_t hash_len,
615 unsigned char *sig, size_t sig_size, size_t *sig_len,
616 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng);
617
618#if defined(MBEDTLS_PSA_CRYPTO_C)
650 mbedtls_md_type_t md_alg,
651 const unsigned char *hash, size_t hash_len,
652 unsigned char *sig, size_t sig_size, size_t *sig_len,
653 int (*f_rng)(void *, unsigned char *, size_t),
654 void *p_rng);
655#endif /* MBEDTLS_PSA_CRYPTO_C */
656
687 mbedtls_md_type_t md_alg,
688 const unsigned char *hash, size_t hash_len,
689 unsigned char *sig, size_t sig_size, size_t *sig_len,
690 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
691 mbedtls_pk_restart_ctx *rs_ctx);
692
711 const unsigned char *input, size_t ilen,
712 unsigned char *output, size_t *olen, size_t osize,
713 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng);
714
734 const unsigned char *input, size_t ilen,
735 unsigned char *output, size_t *olen, size_t osize,
736 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng);
737
753 const mbedtls_pk_context *prv,
754 int (*f_rng)(void *, unsigned char *, size_t),
755 void *p_rng);
756
766
775
785
786#if defined(MBEDTLS_RSA_C)
798{
799 switch (mbedtls_pk_get_type(&pk)) {
800 case MBEDTLS_PK_RSA:
801 return (mbedtls_rsa_context *) (pk).MBEDTLS_PRIVATE(pk_ctx);
802 default:
803 return NULL;
804 }
805}
806#endif /* MBEDTLS_RSA_C */
807
808#if defined(MBEDTLS_ECP_C)
821{
822 switch (mbedtls_pk_get_type(&pk)) {
823 case MBEDTLS_PK_ECKEY:
825 case MBEDTLS_PK_ECDSA:
826 return (mbedtls_ecp_keypair *) (pk).MBEDTLS_PRIVATE(pk_ctx);
827 default:
828 return NULL;
829 }
830}
831#endif /* MBEDTLS_ECP_C */
832
833#if defined(MBEDTLS_PK_PARSE_C)
870 const unsigned char *key, size_t keylen,
871 const unsigned char *pwd, size_t pwdlen,
872 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng);
873
904 const unsigned char *key, size_t keylen);
905
906#if defined(MBEDTLS_FS_IO)
935 const char *path, const char *password,
936 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng);
937
956#endif /* MBEDTLS_FS_IO */
957#endif /* MBEDTLS_PK_PARSE_C */
958
959#if defined(MBEDTLS_PK_WRITE_C)
973int mbedtls_pk_write_key_der(const mbedtls_pk_context *ctx, unsigned char *buf, size_t size);
974
988int mbedtls_pk_write_pubkey_der(const mbedtls_pk_context *ctx, unsigned char *buf, size_t size);
989
990#if defined(MBEDTLS_PEM_WRITE_C)
1001int mbedtls_pk_write_pubkey_pem(const mbedtls_pk_context *ctx, unsigned char *buf, size_t size);
1002
1013int mbedtls_pk_write_key_pem(const mbedtls_pk_context *ctx, unsigned char *buf, size_t size);
1014#endif /* MBEDTLS_PEM_WRITE_C */
1015#endif /* MBEDTLS_PK_WRITE_C */
1016
1017/*
1018 * WARNING: Low-level functions. You probably do not want to use these unless
1019 * you are certain you do ;)
1020 */
1021
1022#if defined(MBEDTLS_PK_PARSE_C)
1033int mbedtls_pk_parse_subpubkey(unsigned char **p, const unsigned char *end,
1034 mbedtls_pk_context *pk);
1035#endif /* MBEDTLS_PK_PARSE_C */
1036
1037#if defined(MBEDTLS_PK_WRITE_C)
1048int mbedtls_pk_write_pubkey(unsigned char **p, unsigned char *start,
1049 const mbedtls_pk_context *key);
1050#endif /* MBEDTLS_PK_WRITE_C */
1051
1052/*
1053 * Internal module functions. You probably do not want to use these unless you
1054 * know you do.
1055 */
1056#if defined(MBEDTLS_FS_IO)
1057int mbedtls_pk_load_file(const char *path, unsigned char **buf, size_t *n);
1058#endif
1059
1060#if defined(MBEDTLS_USE_PSA_CRYPTO)
1080int mbedtls_pk_wrap_as_opaque(mbedtls_pk_context *pk,
1082 psa_algorithm_t alg,
1083 psa_key_usage_t usage,
1084 psa_algorithm_t alg2);
1085#endif /* MBEDTLS_USE_PSA_CRYPTO */
1086
1087#ifdef __cplusplus
1088}
1089#endif
1090
1091#endif /* MBEDTLS_PK_H */
Platform Security Architecture cryptography module.
This file contains ECDSA definitions and functions.
This file provides an API for Elliptic Curves over GF(P) (ECP).
uint32_t psa_algorithm_t
Encoding of a cryptographic algorithm.
uint8_t psa_ecc_family_t
psa_key_id_t mbedtls_svc_key_id_t
uint32_t psa_key_usage_t
Encoding of permitted usage on a key.
Build-time configuration info.
This file contains the generic functions for message-digest (hashing) and HMAC.
mbedtls_md_type_t
Supported message digests.
Definition md.h:161
int mbedtls_pk_write_pubkey_pem(const mbedtls_pk_context *ctx, unsigned char *buf, size_t size)
Write a public key to a PEM string.
int mbedtls_pk_debug(const mbedtls_pk_context *ctx, mbedtls_pk_debug_item *items)
Export debug information.
static size_t mbedtls_pk_get_len(const mbedtls_pk_context *ctx)
Get the length in bytes of the underlying key.
Definition pk.h:441
int mbedtls_pk_check_pair(const mbedtls_pk_context *pub, const mbedtls_pk_context *prv, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Check if a public-private pair of keys matches.
int mbedtls_pk_parse_subpubkey(unsigned char **p, const unsigned char *end, mbedtls_pk_context *pk)
Parse a SubjectPublicKeyInfo DER structure.
int mbedtls_pk_write_key_der(const mbedtls_pk_context *ctx, unsigned char *buf, size_t size)
Write a private key to a PKCS#1 or SEC1 DER structure Note: data is written at the end of the buffer!...
int mbedtls_pk_can_do(const mbedtls_pk_context *ctx, mbedtls_pk_type_t type)
Tell if a context can do the operation given by type.
int(* mbedtls_pk_rsa_alt_sign_func)(void *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, mbedtls_md_type_t md_alg, unsigned int hashlen, const unsigned char *hash, unsigned char *sig)
Definition pk.h:297
int(* mbedtls_pk_rsa_alt_decrypt_func)(void *ctx, size_t *olen, const unsigned char *input, unsigned char *output, size_t output_max_len)
Types for RSA-alt abstraction.
Definition pk.h:294
mbedtls_pk_type_t
Public key types.
Definition pk.h:73
@ MBEDTLS_PK_NONE
Definition pk.h:74
@ MBEDTLS_PK_OPAQUE
Definition pk.h:81
@ MBEDTLS_PK_ECDSA
Definition pk.h:78
@ MBEDTLS_PK_RSASSA_PSS
Definition pk.h:80
@ MBEDTLS_PK_RSA_ALT
Definition pk.h:79
@ MBEDTLS_PK_RSA
Definition pk.h:75
@ MBEDTLS_PK_ECKEY_DH
Definition pk.h:77
@ MBEDTLS_PK_ECKEY
Definition pk.h:76
int mbedtls_pk_decrypt(mbedtls_pk_context *ctx, const unsigned char *input, size_t ilen, unsigned char *output, size_t *olen, size_t osize, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Decrypt message (including padding if relevant).
size_t mbedtls_pk_get_bitlen(const mbedtls_pk_context *ctx)
Get the size in bits of the underlying key.
struct mbedtls_pk_info_t mbedtls_pk_info_t
Public key information and operations.
Definition pk.h:220
static mbedtls_rsa_context * mbedtls_pk_rsa(const mbedtls_pk_context pk)
Definition pk.h:797
int mbedtls_pk_parse_keyfile(mbedtls_pk_context *ctx, const char *path, const char *password, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Load and parse a private key.
int mbedtls_pk_write_pubkey_der(const mbedtls_pk_context *ctx, unsigned char *buf, size_t size)
Write a public key to a SubjectPublicKeyInfo DER structure Note: data is written at the end of the bu...
int mbedtls_pk_load_file(const char *path, unsigned char **buf, size_t *n)
static mbedtls_ecp_keypair * mbedtls_pk_ec(const mbedtls_pk_context pk)
Definition pk.h:820
int mbedtls_pk_setup(mbedtls_pk_context *ctx, const mbedtls_pk_info_t *info)
Initialize a PK context with the information given and allocates the type-specific PK subcontext.
int mbedtls_pk_verify_ext(mbedtls_pk_type_t type, const void *options, mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len)
Verify signature, with options. (Includes verification of the padding depending on type....
int mbedtls_pk_sign_ext(mbedtls_pk_type_t pk_type, mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Make signature given a signature type.
int mbedtls_pk_sign_restartable(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, mbedtls_pk_restart_ctx *rs_ctx)
Restartable version of mbedtls_pk_sign()
mbedtls_pk_debug_type
Types for interfacing with the debug module.
Definition pk.h:194
@ MBEDTLS_PK_DEBUG_MPI
Definition pk.h:196
@ MBEDTLS_PK_DEBUG_ECP
Definition pk.h:197
@ MBEDTLS_PK_DEBUG_NONE
Definition pk.h:195
@ MBEDTLS_PK_DEBUG_PSA_EC
Definition pk.h:198
void mbedtls_pk_init(mbedtls_pk_context *ctx)
Initialize a mbedtls_pk_context (as NONE).
const mbedtls_pk_info_t * mbedtls_pk_info_from_type(mbedtls_pk_type_t pk_type)
Return information associated with the given PK type.
int mbedtls_pk_verify_restartable(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len, mbedtls_pk_restart_ctx *rs_ctx)
Restartable version of mbedtls_pk_verify()
int mbedtls_pk_parse_key(mbedtls_pk_context *ctx, const unsigned char *key, size_t keylen, const unsigned char *pwd, size_t pwdlen, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Parse a private key in PEM or DER format.
mbedtls_pk_type_t mbedtls_pk_get_type(const mbedtls_pk_context *ctx)
Get the key type.
int mbedtls_pk_setup_rsa_alt(mbedtls_pk_context *ctx, void *key, mbedtls_pk_rsa_alt_decrypt_func decrypt_func, mbedtls_pk_rsa_alt_sign_func sign_func, mbedtls_pk_rsa_alt_key_len_func key_len_func)
Initialize an RSA-alt context.
#define MBEDTLS_PK_MAX_EC_PUBKEY_RAW_LEN
Definition pk.h:222
int mbedtls_pk_verify(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, const unsigned char *sig, size_t sig_len)
Verify signature (including padding if relevant).
size_t(* mbedtls_pk_rsa_alt_key_len_func)(void *ctx)
Definition pk.h:302
void mbedtls_pk_free(mbedtls_pk_context *ctx)
Free the components of a mbedtls_pk_context.
int mbedtls_pk_write_pubkey(unsigned char **p, unsigned char *start, const mbedtls_pk_context *key)
Write a subjectPublicKey to ASN.1 data Note: function works backwards in data buffer.
void mbedtls_pk_restart_ctx
Definition pk.h:287
int mbedtls_pk_parse_public_key(mbedtls_pk_context *ctx, const unsigned char *key, size_t keylen)
Parse a public key in PEM or DER format.
int mbedtls_pk_encrypt(mbedtls_pk_context *ctx, const unsigned char *input, size_t ilen, unsigned char *output, size_t *olen, size_t osize, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Encrypt message (including padding if relevant).
int mbedtls_pk_sign(mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len, unsigned char *sig, size_t sig_size, size_t *sig_len, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Make signature, including padding if relevant.
const char * mbedtls_pk_get_name(const mbedtls_pk_context *ctx)
Access the type name.
int mbedtls_pk_parse_public_keyfile(mbedtls_pk_context *ctx, const char *path)
Load and parse a public key.
int mbedtls_pk_write_key_pem(const mbedtls_pk_context *ctx, unsigned char *buf, size_t size)
Write a private key to a PKCS#1 or SEC1 PEM string.
Macro wrapper for struct's members.
#define MBEDTLS_PRIVATE(member)
This file provides an API for the RSA public-key cryptosystem.
The ECP key-pair structure.
Definition ecp.h:427
Public key container.
Definition pk.h:227
Item to send to the debug module.
Definition pk.h:204
Options for RSASSA-PSS signature verification. See mbedtls_rsa_rsassa_pss_verify_ext()
Definition pk.h:88
mbedtls_md_type_t mgf1_hash_id
Definition pk.h:97
The RSA context structure.
Definition rsa.h:85