[openssl] master update

Matt Caswell matt at openssl.org
Mon Aug 5 13:37:45 UTC 2019


The branch master has been updated
       via  59972370e391d6f6314cee26529cbda41eb0a198 (commit)
      from  decdb980de7668214e8052c61704ba9f6b3583c5 (commit)


- Log -----------------------------------------------------------------
commit 59972370e391d6f6314cee26529cbda41eb0a198
Author: Matt Caswell <matt at openssl.org>
Date:   Mon Jul 29 10:24:44 2019 +0100

    Documentation for the provider Key Exchange operation
    
    Reviewed-by: Paul Dale <paul.dale at oracle.com>
    (Merged from https://github.com/openssl/openssl/pull/9506)

-----------------------------------------------------------------------

Summary of changes:
 doc/man7/provider-keyexch.pod       | 179 ++++++++++++++++++++++++++++++++++++
 include/openssl/core_numbers.h      |   4 +-
 providers/common/exchange/dh_exch.c |  12 +--
 3 files changed, 187 insertions(+), 8 deletions(-)
 create mode 100644 doc/man7/provider-keyexch.pod

diff --git a/doc/man7/provider-keyexch.pod b/doc/man7/provider-keyexch.pod
new file mode 100644
index 0000000000..875d6e267e
--- /dev/null
+++ b/doc/man7/provider-keyexch.pod
@@ -0,0 +1,179 @@
+=pod
+
+=head1 NAME
+
+provider-keyexch - The keyexch library E<lt>-E<gt> provider functions
+
+=head1 SYNOPSIS
+
+=for comment multiple includes
+
+ #include <openssl/core_numbers.h>
+ #include <openssl/core_names.h>
+
+ /*
+  * None of these are actual functions, but are displayed like this for
+  * the function signatures for functions that are offered as function
+  * pointers in OSSL_DISPATCH arrays.
+  */
+
+ /* Context management */
+ void *OP_keyexch_newctx(void *provctx);
+ void OP_keyexch_freectx(void *ctx);
+ void *OP_keyexch_dupctx(void *ctx);
+
+ /* Shared secret derivation */
+ int OP_keyexch_init(void *ctx, void *provkey);
+ int OP_keyexch_set_peer(void *ctx, void *provkey);
+ int OP_keyexch_derive(void *ctx, unsigned char *secret, size_t *secretlen,
+                       size_t outlen);
+
+ /* Key Exchange parameters */
+ int OP_keyexch_set_params(void *ctx, const OSSL_PARAM params[]);
+
+
+=head1 DESCRIPTION
+
+This documentation is primarily aimed at provider authors. See L<provider(7)>
+for further information.
+
+The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key
+exchange algorithms and make them available to applications via the API
+functions L<EVP_PKEY_derive_init_ex(3)>, and L<EVP_PKEY_derive(3)> (as well as
+other related functions).
+
+All "functions" mentioned here are passed as function pointers between
+F<libcrypto> and the provider in B<OSSL_DISPATCH> arrays via
+B<OSSL_ALGORITHM> arrays that are returned by the provider's
+provider_query_operation() function
+(see L<provider-base(7)/Provider Functions>).
+
+All these "functions" have a corresponding function type definition
+named B<OSSL_{name}_fn>, and a helper function to retrieve the
+function pointer from an B<OSSL_DISPATCH> element named
+B<OSSL_get_{name}>.
+For example, the "function" OP_keyexch_newctx() has these:
+
+ typedef void *(OSSL_OP_keyexch_newctx_fn)(void *provctx);
+ static ossl_inline OSSL_OP_keyexch_newctx_fn
+     OSSL_get_OP_keyexch_newctx(const OSSL_DISPATCH *opf);
+
+B<OSSL_DISPATCH> arrays are indexed by numbers that are provided as
+macros in L<openssl-core_numbers.h(7)>, as follows:
+
+ OP_keyexch_newctx           OSSL_FUNC_KEYEXCH_NEWCTX
+ OP_keyexch_freectx          OSSL_FUNC_KEYEXCH_FREECTX
+ OP_keyexch_dupctx           OSSL_FUNC_KEYEXCH_DUPCTX
+
+ OP_keyexch_init             OSSL_FUNC_KEYEXCH_INIT
+ OP_keyexch_set_peer         OSSL_FUNC_KEYEXCH_SET_PEER
+ OP_keyexch_derive           OSSL_FUNC_KEYEXCH_DERIVE
+
+ OP_keyexch_set_params       OSSL_FUNC_KEYEXCH_SET_PARAMS
+
+A key exchange algorithm implementation may not implement all of these functions.
+In order to be a consistent set of functions a provider must implement
+OP_keyexch_newctx, OP_keyexch_freectx, OP_keyexch_init and OP_keyexch_derive.
+All other functions are optional.
+
+A key exchange algorithm must also implement some mechanism for generating,
+loading or importing keys via the key management (OSSL_OP_KEYMGMT) operation.
+See L<provider-keymgmt(7)> for further details.
+
+=head2 Context Management Functions
+
+OP_keyexch_newctx() should create and return a pointer to a provider side
+structure for holding context information during a key exchange operation.
+A pointer to this context will be passed back in a number of the other key
+exchange operation function calls.
+The paramater B<provctx> is the provider context generated during provider
+initialisation (see L<provider(3)>).
+
+OP_keyexch_freectx() is passed a pointer to the provider side key exchange
+context in the B<ctx> parameter.
+This function should free any resources associated with that context.
+
+OP_keyexch_dupctx() should duplicate the provider side key exchange context in
+the B<ctx> parameter and return the duplicate copy.
+
+=head2 Shared Secret Derivation Functions
+
+OP_keyexch_init() initialises a key exchange operation given a provider side key
+exchange context in the B<ctx> paramter, and a pointer to a provider key object
+in the B<provkey> parameter. The key object should have been previously
+generated, loaded or imported into the provider using the key management
+(OSSL_OP_KEYMGMT) operation (see provider-keymgmt(7)>.
+
+OP_keyexch_set_peer() is called to supply the peer's public key (in the
+B<provkey> parameter) to be used when deriving the shared secret.
+It is also passed a previously initialised key exchange context in the B<ctx>
+parameter.
+The key object should have been previously generated, loaded or imported into
+the provider using the key management (OSSL_OP_KEYMGMT) operation (see
+provider-keymgmt(7)>.
+
+OP_keyexch_derive() performs the actual key exchange itself by deriving a shared
+secret.
+A previously initialised key exchange context is passed in the B<ctx>
+parameter.
+The derived secret should be written to the location B<secret> which should not
+exceed B<outlen> bytes.
+The length of the shared secret should be written to B<*secretlen>.
+If B<secret> is NULL then the maximum length of the shared secret should be
+written to B<*secretlen>.
+
+=head2 Key Exchange Parameters
+
+See L<OSSL_PARAM(3)> for further details on the parameters structure used by
+the OP_keyexch_set_params() function.
+
+OP_keyexch_set_params() sets key exchange parameters associated with the given
+provider side key exchange context B<ctx> to B<params>.
+Any parameter settings are additional to any that were previously set.
+
+Parameters currently recognised by built-in key exchange algorithms are as
+follows.
+Not all parameters are relevant to, or are understood by all key exchange
+algorithms:
+
+=over 4
+
+=item B<OSSL_EXCHANGE_PARAM_PAD> (int)
+
+Sets the padding mode for the associated key exchange ctx.
+Setting a value of 1 will turn padding on.
+Setting a vlue of 0 will turn padding off.
+If padding is off then the derived shared secret may be smaller than the largest
+possible secret size.
+If padding is on then the derived shared secret will have its first bytes filled
+with 0s where necessary to make the shared secret the same size as the largest
+possible secret size.
+
+=back
+
+=head1 RETURN VALUES
+
+OP_keyexch_newctx() and OP_keyexch_dupctx() should return the newly created
+provider side key exchange context, or NULL on failure.
+
+OP_keyexch_init(), OP_keyexch_set_peer(), OP_keyexch_derive() and
+OP_keyexch_set_params() should return 1 for success or 0 on error.
+
+=head1 SEE ALSO
+
+L<provider(7)>
+
+=head1 HISTORY
+
+The provider KEYEXCH interface was introduced in OpenSSL 3.0.
+
+=head1 COPYRIGHT
+
+Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
+
+Licensed under the Apache License 2.0 (the "License").  You may not use
+this file except in compliance with the License.  You can obtain a copy
+in the file LICENSE in the source distribution or at
+L<https://www.openssl.org/source/license.html>.
+
+=cut
diff --git a/include/openssl/core_numbers.h b/include/openssl/core_numbers.h
index 0bbe92709c..f4c4a61ada 100644
--- a/include/openssl/core_numbers.h
+++ b/include/openssl/core_numbers.h
@@ -302,8 +302,8 @@ OSSL_CORE_MAKE_FUNC(const OSSL_PARAM *, OP_keymgmt_exportkey_types, (void))
 
 OSSL_CORE_MAKE_FUNC(void *, OP_keyexch_newctx, (void *provctx))
 OSSL_CORE_MAKE_FUNC(int, OP_keyexch_init, (void *ctx, void *provkey))
-OSSL_CORE_MAKE_FUNC(int, OP_keyexch_derive, (void *ctx,  unsigned char *key,
-                                             size_t *keylen, size_t outlen))
+OSSL_CORE_MAKE_FUNC(int, OP_keyexch_derive, (void *ctx,  unsigned char *secret,
+                                             size_t *secretlen, size_t outlen))
 OSSL_CORE_MAKE_FUNC(int, OP_keyexch_set_peer, (void *ctx, void *provkey))
 OSSL_CORE_MAKE_FUNC(void, OP_keyexch_freectx, (void *ctx))
 OSSL_CORE_MAKE_FUNC(void *, OP_keyexch_dupctx, (void *ctx))
diff --git a/providers/common/exchange/dh_exch.c b/providers/common/exchange/dh_exch.c
index 62041daab3..69980d8e97 100644
--- a/providers/common/exchange/dh_exch.c
+++ b/providers/common/exchange/dh_exch.c
@@ -60,7 +60,7 @@ static int dh_set_peer(void *vpdhctx, void *vdh)
     return 1;
 }
 
-static int dh_derive(void *vpdhctx, unsigned char *key, size_t *keylen,
+static int dh_derive(void *vpdhctx, unsigned char *secret, size_t *secretlen,
                      size_t outlen)
 {
     PROV_DH_CTX *pdhctx = (PROV_DH_CTX *)vpdhctx;
@@ -73,20 +73,20 @@ static int dh_derive(void *vpdhctx, unsigned char *key, size_t *keylen,
         return 0;
 
     dhsize = (size_t)DH_size(pdhctx->dh);
-    if (key == NULL) {
-        *keylen = dhsize;
+    if (secret == NULL) {
+        *secretlen = dhsize;
         return 1;
     }
     if (outlen < dhsize)
         return 0;
 
     DH_get0_key(pdhctx->dhpeer, &pub_key, NULL);
-    ret = (pdhctx->pad) ? DH_compute_key_padded(key, pub_key, pdhctx->dh)
-                        : DH_compute_key(key, pub_key, pdhctx->dh);
+    ret = (pdhctx->pad) ? DH_compute_key_padded(secret, pub_key, pdhctx->dh)
+                        : DH_compute_key(secret, pub_key, pdhctx->dh);
     if (ret <= 0)
         return 0;
 
-    *keylen = ret;
+    *secretlen = ret;
     return 1;
 }
 


More information about the openssl-commits mailing list