]> git.ipfire.org Git - thirdparty/openssl.git/blame - include/openssl/dsa.h
Support -no-CAfile -no-CApath in ctx2
[thirdparty/openssl.git] / include / openssl / dsa.h
CommitLineData
21dcbebc
RS
1/*
2 * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
0f113f3e 3 *
21dcbebc
RS
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
d02b48c6
RE
8 */
9
10/*
11 * The DSS routines are based on patches supplied by
b0700d2c
RS
12 * Steven Schoch <schoch@sheba.arc.nasa.gov>.
13 */
d02b48c6
RE
14
15#ifndef HEADER_DSA_H
0f113f3e 16# define HEADER_DSA_H
d02b48c6 17
3c27208f 18# include <openssl/opensslconf.h>
751ff1d3 19
3c27208f
RS
20# ifndef OPENSSL_NO_DSA
21# ifdef __cplusplus
22extern "C" {
0f113f3e 23# endif
3c27208f 24# include <openssl/e_os2.h>
a00ae6c4 25# include <openssl/bio.h>
0f113f3e
MC
26# include <openssl/crypto.h>
27# include <openssl/ossl_typ.h>
98186eb4 28# include <openssl/opensslconf.h>
6e9fa57c 29# include <openssl/bn.h>
98186eb4 30# if OPENSSL_API_COMPAT < 0x10100000L
3c27208f 31# include <openssl/dh.h>
0f113f3e 32# endif
d02b48c6 33
0f113f3e
MC
34# ifndef OPENSSL_DSA_MAX_MODULUS_BITS
35# define OPENSSL_DSA_MAX_MODULUS_BITS 10000
36# endif
37
38# define OPENSSL_DSA_FIPS_MIN_MODULUS_BITS 1024
5e3225cc 39
0f113f3e
MC
40# define DSA_FLAG_CACHE_MONT_P 0x01
41/*
42 * new with 0.9.7h; the built-in DSA implementation now uses constant time
43 * modular exponentiation for secret exponents by default. This flag causes
44 * the faster variable sliding window method to be used for all exponents.
68d39f3c 45 */
0f113f3e 46# define DSA_FLAG_NO_EXP_CONSTTIME 0x02
dfeab068 47
0f113f3e
MC
48/*
49 * If this flag is set the DSA method is FIPS compliant and can be used in
50 * FIPS mode. This is set in the validated module method. If an application
8483a003 51 * sets this flag in its own methods it is its responsibility to ensure the
0f113f3e 52 * result is compliant.
20818e00
DSH
53 */
54
0f113f3e 55# define DSA_FLAG_FIPS_METHOD 0x0400
20818e00 56
0f113f3e
MC
57/*
58 * If this flag is set the operations normally disabled in FIPS mode are
20818e00
DSH
59 * permitted it is then the applications responsibility to ensure that the
60 * usage is compliant.
61 */
62
0f113f3e
MC
63# define DSA_FLAG_NON_FIPS_ALLOW 0x0400
64# define DSA_FLAG_FIPS_CHECKED 0x0800
20818e00 65
3a87a9b9
GT
66/* Already defined in ossl_typ.h */
67/* typedef struct dsa_st DSA; */
68/* typedef struct dsa_method DSA_METHOD; */
c0711f7f 69
706a13f1 70typedef struct DSA_SIG_st DSA_SIG;
0f113f3e 71
0f113f3e
MC
72# define d2i_DSAparams_fp(fp,x) (DSA *)ASN1_d2i_fp((char *(*)())DSA_new, \
73 (char *(*)())d2i_DSAparams,(fp),(unsigned char **)(x))
74# define i2d_DSAparams_fp(fp,x) ASN1_i2d_fp(i2d_DSAparams,(fp), \
75 (unsigned char *)(x))
76# define d2i_DSAparams_bio(bp,x) ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAparams,bp,x)
77# define i2d_DSAparams_bio(bp,x) ASN1_i2d_bio_of_const(DSA,i2d_DSAparams,bp,x)
d02b48c6 78
f4274da1 79DSA *DSAparams_dup(DSA *x);
0f113f3e
MC
80DSA_SIG *DSA_SIG_new(void);
81void DSA_SIG_free(DSA_SIG *a);
82int i2d_DSA_SIG(const DSA_SIG *a, unsigned char **pp);
83DSA_SIG *d2i_DSA_SIG(DSA_SIG **v, const unsigned char **pp, long length);
99cccf36 84void DSA_SIG_get0(BIGNUM **pr, BIGNUM **ps, const DSA_SIG *sig);
a8da8918 85
0f113f3e
MC
86DSA_SIG *DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa);
87int DSA_do_verify(const unsigned char *dgst, int dgst_len,
88 DSA_SIG *sig, DSA *dsa);
a8da8918 89
a4aba800 90const DSA_METHOD *DSA_OpenSSL(void);
c0711f7f 91
0f113f3e 92void DSA_set_default_method(const DSA_METHOD *);
cb78486d 93const DSA_METHOD *DSA_get_default_method(void);
0f113f3e 94int DSA_set_method(DSA *dsa, const DSA_METHOD *);
6e9fa57c 95const DSA_METHOD *DSA_get_method(DSA *d);
f8463356 96
0f113f3e
MC
97DSA *DSA_new(void);
98DSA *DSA_new_method(ENGINE *engine);
99void DSA_free(DSA *r);
5cbc2e8b 100/* "up" the DSA object's reference count */
0f113f3e
MC
101int DSA_up_ref(DSA *r);
102int DSA_size(const DSA *);
103int DSA_security_bits(const DSA *d);
104 /* next 4 return -1 on error */
105int DSA_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp);
106int DSA_sign(int type, const unsigned char *dgst, int dlen,
107 unsigned char *sig, unsigned int *siglen, DSA *dsa);
108int DSA_verify(int type, const unsigned char *dgst, int dgst_len,
109 const unsigned char *sigbuf, int siglen, DSA *dsa);
e6390aca
RS
110#define DSA_get_ex_new_index(l, p, newf, dupf, freef) \
111 CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_DSA, l, p, newf, dupf, freef)
dd9d233e
DSH
112int DSA_set_ex_data(DSA *d, int idx, void *arg);
113void *DSA_get_ex_data(DSA *d, int idx);
d02b48c6 114
0f113f3e
MC
115DSA *d2i_DSAPublicKey(DSA **a, const unsigned char **pp, long length);
116DSA *d2i_DSAPrivateKey(DSA **a, const unsigned char **pp, long length);
117DSA *d2i_DSAparams(DSA **a, const unsigned char **pp, long length);
e9224c71
GT
118
119/* Deprecated version */
98186eb4 120DEPRECATEDIN_0_9_8(DSA *DSA_generate_parameters(int bits,
0f113f3e
MC
121 unsigned char *seed,
122 int seed_len,
123 int *counter_ret,
124 unsigned long *h_ret, void
125 (*callback) (int, int,
126 void *),
98186eb4 127 void *cb_arg))
e9224c71
GT
128
129/* New version */
0f113f3e
MC
130int DSA_generate_parameters_ex(DSA *dsa, int bits,
131 const unsigned char *seed, int seed_len,
132 int *counter_ret, unsigned long *h_ret,
133 BN_GENCB *cb);
134
135int DSA_generate_key(DSA *a);
136int i2d_DSAPublicKey(const DSA *a, unsigned char **pp);
137int i2d_DSAPrivateKey(const DSA *a, unsigned char **pp);
138int i2d_DSAparams(const DSA *a, unsigned char **pp);
139
0f113f3e
MC
140int DSAparams_print(BIO *bp, const DSA *x);
141int DSA_print(BIO *bp, const DSA *x, int off);
0f113f3e
MC
142# ifndef OPENSSL_NO_STDIO
143int DSAparams_print_fp(FILE *fp, const DSA *x);
144int DSA_print_fp(FILE *bp, const DSA *x, int off);
145# endif
146
147# define DSS_prime_checks 50
148/*
149 * Primality test according to FIPS PUB 186[-1], Appendix 2.1: 50 rounds of
150 * Rabin-Miller
151 */
152# define DSA_is_prime(n, callback, cb_arg) \
153 BN_is_prime(n, DSS_prime_checks, callback, NULL, cb_arg)
d02b48c6 154
0f113f3e
MC
155# ifndef OPENSSL_NO_DH
156/*
157 * Convert DSA structure (key or just parameters) into DH structure (be
158 * careful to avoid small subgroup attacks when using this!)
159 */
a4aba800 160DH *DSA_dup_DH(const DSA *r);
0f113f3e 161# endif
48c843c3 162
0f113f3e
MC
163# define EVP_PKEY_CTX_set_dsa_paramgen_bits(ctx, nbits) \
164 EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DSA, EVP_PKEY_OP_PARAMGEN, \
165 EVP_PKEY_CTRL_DSA_PARAMGEN_BITS, nbits, NULL)
c927df3f 166
0f113f3e
MC
167# define EVP_PKEY_CTRL_DSA_PARAMGEN_BITS (EVP_PKEY_ALG_CTRL + 1)
168# define EVP_PKEY_CTRL_DSA_PARAMGEN_Q_BITS (EVP_PKEY_ALG_CTRL + 2)
169# define EVP_PKEY_CTRL_DSA_PARAMGEN_MD (EVP_PKEY_ALG_CTRL + 3)
c927df3f 170
6e9fa57c 171void DSA_get0_pqg(const DSA *d, BIGNUM **p, BIGNUM **q, BIGNUM **g);
1258396d 172int DSA_set0_pqg(DSA *d, BIGNUM *p, BIGNUM *q, BIGNUM *g);
6e9fa57c 173void DSA_get0_key(const DSA *d, BIGNUM **pub_key, BIGNUM **priv_key);
1258396d
MC
174int DSA_set0_key(DSA *d, BIGNUM *pub_key, BIGNUM *priv_key);
175void DSA_clear_flags(DSA *d, int flags);
176int DSA_test_flags(const DSA *d, int flags);
177void DSA_set_flags(DSA *d, int flags);
178ENGINE *DSA_get0_engine(DSA *d);
179
6e9fa57c
MC
180DSA_METHOD *DSA_meth_new(const char *name, int flags);
181void DSA_meth_free(DSA_METHOD *dsam);
a517f7fc
MC
182DSA_METHOD *DSA_meth_dup(const DSA_METHOD *dsam);
183const char *DSA_meth_get0_name(const DSA_METHOD *dsam);
184int DSA_meth_set1_name(DSA_METHOD *dsam, const char *name);
6e9fa57c
MC
185int DSA_meth_get_flags(DSA_METHOD *dsam);
186int DSA_meth_set_flags(DSA_METHOD *dsam, int flags);
aa05e7ca
MC
187void *DSA_meth_get0_app_data(const DSA_METHOD *dsam);
188int DSA_meth_set0_app_data(DSA_METHOD *dsam, void *app_data);
6e9fa57c
MC
189DSA_SIG *(*DSA_meth_get_sign(const DSA_METHOD *dsam))
190 (const unsigned char *, int, DSA *);
191int DSA_meth_set_sign(DSA_METHOD *dsam,
192 DSA_SIG *(*sign) (const unsigned char *, int, DSA *));
193int (*DSA_meth_get_sign_setup(const DSA_METHOD *dsam))
194 (DSA *, BN_CTX *, BIGNUM **, BIGNUM **);
195int DSA_meth_set_sign_setup(DSA_METHOD *dsam,
196 int (*sign_setup) (DSA *, BN_CTX *, BIGNUM **, BIGNUM **));
197int (*DSA_meth_get_verify(const DSA_METHOD *dsam))
198 (const unsigned char *, int , DSA_SIG *, DSA *);
199int DSA_meth_set_verify(DSA_METHOD *dsam,
200 int (*verify) (const unsigned char *, int, DSA_SIG *, DSA *));
201int (*DSA_meth_get_mod_exp(const DSA_METHOD *dsam))
202 (DSA *, BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *,
203 BN_CTX *, BN_MONT_CTX *);
204int DSA_meth_set_mod_exp(DSA_METHOD *dsam,
205 int (*mod_exp) (DSA *, BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *,
206 BIGNUM *, BN_CTX *, BN_MONT_CTX *));
207int (*DSA_meth_get_bn_mod_exp(const DSA_METHOD *dsam))
208 (DSA *, BIGNUM *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *,
209 BN_MONT_CTX *);
210int DSA_meth_set_bn_mod_exp(DSA_METHOD *dsam,
211 int (*bn_mod_exp) (DSA *, BIGNUM *, BIGNUM *, const BIGNUM *,
212 const BIGNUM *, BN_CTX *, BN_MONT_CTX *));
213int (*DSA_meth_get_init(const DSA_METHOD *dsam))(DSA *);
214int DSA_meth_set_init(DSA_METHOD *dsam, int (*init)(DSA *));
215int (*DSA_meth_get_finish(const DSA_METHOD *dsam)) (DSA *);
216int DSA_meth_set_finish(DSA_METHOD *dsam, int (*finish) (DSA *));
217int (*DSA_meth_get_paramgen(const DSA_METHOD *dsam))
218 (DSA *, int, const unsigned char *, int, int *, unsigned long *,
219 BN_GENCB *);
220int DSA_meth_set_paramgen(DSA_METHOD *dsam,
221 int (*paramgen) (DSA *, int, const unsigned char *, int, int *,
222 unsigned long *, BN_GENCB *));
223int (*DSA_meth_get_keygen(const DSA_METHOD *dsam)) (DSA *);
224int DSA_meth_set_keygen(DSA_METHOD *dsam, int (*keygen) (DSA *));
225
d02b48c6 226/* BEGIN ERROR CODES */
0f113f3e
MC
227/*
228 * The following lines are auto generated by the script mkerr.pl. Any changes
6d311938
DSH
229 * made after this point may be overwritten when the script is next run.
230 */
c962479b 231void ERR_load_DSA_strings(void);
6d311938 232
d02b48c6
RE
233/* Error codes for the DSA functions. */
234
235/* Function codes. */
0f113f3e
MC
236# define DSA_F_D2I_DSA_SIG 110
237# define DSA_F_DO_DSA_PRINT 104
238# define DSA_F_DSAPARAMS_PRINT 100
239# define DSA_F_DSAPARAMS_PRINT_FP 101
240# define DSA_F_DSA_BUILTIN_KEYGEN 124
241# define DSA_F_DSA_BUILTIN_PARAMGEN 125
242# define DSA_F_DSA_BUILTIN_PARAMGEN2 126
243# define DSA_F_DSA_DO_SIGN 112
244# define DSA_F_DSA_DO_VERIFY 113
569d0646
MC
245# define DSA_F_DSA_METH_DUP 127
246# define DSA_F_DSA_METH_NEW 128
247# define DSA_F_DSA_METH_SET1_NAME 129
0f113f3e
MC
248# define DSA_F_DSA_NEW_METHOD 103
249# define DSA_F_DSA_PARAM_DECODE 119
250# define DSA_F_DSA_PRINT_FP 105
251# define DSA_F_DSA_PRIV_DECODE 115
252# define DSA_F_DSA_PRIV_ENCODE 116
253# define DSA_F_DSA_PUB_DECODE 117
254# define DSA_F_DSA_PUB_ENCODE 118
255# define DSA_F_DSA_SIGN 106
256# define DSA_F_DSA_SIGN_SETUP 107
257# define DSA_F_DSA_SIG_NEW 109
258# define DSA_F_DSA_SIG_PRINT 123
259# define DSA_F_DSA_VERIFY 108
260# define DSA_F_I2D_DSA_SIG 111
261# define DSA_F_OLD_DSA_PRIV_DECODE 122
262# define DSA_F_PKEY_DSA_CTRL 120
263# define DSA_F_PKEY_DSA_KEYGEN 121
264# define DSA_F_SIG_CB 114
d02b48c6
RE
265
266/* Reason codes. */
0f113f3e
MC
267# define DSA_R_BAD_Q_VALUE 102
268# define DSA_R_BN_DECODE_ERROR 108
269# define DSA_R_BN_ERROR 109
270# define DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 100
271# define DSA_R_DECODE_ERROR 104
272# define DSA_R_INVALID_DIGEST_TYPE 106
273# define DSA_R_INVALID_PARAMETERS 112
274# define DSA_R_KEY_SIZE_TOO_SMALL 111
275# define DSA_R_MISSING_PARAMETERS 101
276# define DSA_R_MODULUS_TOO_LARGE 103
277# define DSA_R_NEED_NEW_SETUP_VALUES 110
278# define DSA_R_NO_PARAMETERS_SET 107
279# define DSA_R_PARAMETER_ENCODING_ERROR 105
280# define DSA_R_Q_NOT_PRIME 113
6d311938 281
3c27208f 282# ifdef __cplusplus
d02b48c6 283}
3c27208f
RS
284# endif
285# endif
286
d02b48c6 287#endif