Overhaul `math' representation machinery.
[u/mdw/catacomb] / pub / dsa.h
CommitLineData
8b810a45 1/* -*-c-*-
2 *
8b810a45 3 * Digital Signature Algorithm
4 *
5 * (c) 1999 Straylight/Edgeware
6 */
7
45c0fd36 8/*----- Licensing notice --------------------------------------------------*
8b810a45 9 *
10 * This file is part of Catacomb.
11 *
12 * Catacomb is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU Library General Public License as
14 * published by the Free Software Foundation; either version 2 of the
15 * License, or (at your option) any later version.
45c0fd36 16 *
8b810a45 17 * Catacomb is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU Library General Public License for more details.
45c0fd36 21 *
8b810a45 22 * You should have received a copy of the GNU Library General Public
23 * License along with Catacomb; if not, write to the Free
24 * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
25 * MA 02111-1307, USA.
26 */
27
b3f05084 28#ifndef CATACOMB_DSA_H
29#define CATACOMB_DSA_H
8b810a45 30
31#ifdef __cplusplus
32 extern "C" {
33#endif
34
35/*----- Notes on the Digital Signature Algorithm --------------------------*
36 *
37 * The Digital Signature Algorithm was designed by the NSA for US Government
38 * use. It's defined in FIPS 186-1. Whether it's covered by patents is
39 * under dispute, although it looks relatively clear. It produces compact
40 * signatures, and is relatively easy to compute. It seems strong, if
41 * appropriate parameters are chosen.
42 */
43
44/*----- Header files ------------------------------------------------------*/
45
827e6c99 46#ifndef CATACOMB_DH_H
47# include "dh.h"
48#endif
49
80a2ff16 50#ifndef CATACOMB_KEY_H
51# include "key.h"
52#endif
53
600127f0 54#ifndef CATACOMB_KEYCHECK_H
55# include "keycheck.h"
56#endif
57
b3f05084 58#ifndef CATACOMB_MP_H
8b810a45 59# include "mp.h"
60#endif
45c0fd36 61
b04a7659 62#ifndef CATACOMB_PGEN_H
63# include "pgen.h"
64#endif
8b810a45 65
66/*----- Data structures ---------------------------------------------------*/
67
827e6c99 68/* --- The parameters and keys are the same as for Diffie-Hellman --- */
80a2ff16 69
827e6c99 70typedef dh_param dsa_param;
71typedef dh_pub dsa_pub;
72typedef dh_priv dsa_priv;
80a2ff16 73
600127f0 74/* --- DSA key seed structure --- */
75
76typedef struct dsa_seed {
77 void *p; /* Pointer to seed material */
78 size_t sz; /* Size of seed material */
79 unsigned count; /* Iterations to find @p@ */
80} dsa_seed;
81
8b810a45 82/* --- DSA signature structure --- *
83 *
84 * This is the recommended structure for a DSA signature. The actual signing
85 * function can cope with arbitrary-sized objects given appropriate
86 * parameters, however.
87 */
88
89#define DSA_SIGLEN 20
90
91typedef struct dsa_sig {
92 octet r[DSA_SIGLEN]; /* 160-bit @r@ value */
93 octet s[DSA_SIGLEN]; /* 160-bit @s@ value */
94} dsa_sig;
95
80a2ff16 96/*----- Key fetching ------------------------------------------------------*/
97
827e6c99 98#define dsa_paramfetch dh_paramfetch
99#define dsa_pubfetch dh_pubfetch
100#define dsa_privfetch dh_privfetch
80a2ff16 101
827e6c99 102#define DSA_PARAMFETCHSZ DH_PARAMFETCHSZ
103#define DSA_PUBFETCHSZ DH_PUBFETCHSZ
104#define DSA_PRIVFETCHSZ DH_PRIVFETCHSZ
b92da8eb 105
827e6c99 106#define dsa_paramfree dh_paramfree
107#define dsa_pubfree dh_pubfree
108#define dsa_privfree dh_privfree
b92da8eb 109
b04a7659 110/*----- DSA stepper -------------------------------------------------------*/
111
112typedef struct dsa_stepctx {
113
114 /* --- To be initialized by the client --- */
115
116 grand *r; /* Random number generator */
117 mp *q; /* Force @p@ to be a multiple */
118 size_t bits; /* Number of bits in the result */
119 unsigned or; /* OR mask for low order bits */
600127f0 120 unsigned count; /* Counts the number of steps made */
121 void *seedbuf; /* Pointer to seed buffer */
b04a7659 122} dsa_stepctx;
123
124/* --- @dsa_step@ --- *
125 *
126 * The stepper chooses random integers, ensures that they are a multiple of
127 * @q@ (if specified), sets the low-order bits, and then tests for
128 * divisibility by small primes.
129 */
130
ab6ce636 131extern pgen_proc dsa_step;
b04a7659 132
8b810a45 133/*----- Functions provided ------------------------------------------------*/
134
827e6c99 135/* --- @dsa_gen@ --- *
8b810a45 136 *
137 * Arguments: @dsa_param *dp@ = where to store parameters
b04a7659 138 * @unsigned ql@ = length of @q@ in bits
139 * @unsigned pl@ = length of @p@ in bits
140 * @unsigned steps@ = number of steps to find @q@
8b810a45 141 * @const void *k@ = pointer to key material
142 * @size_t sz@ = size of key material
600127f0 143 * @dsa_seed *sd@ = optional pointer for output seed information
b04a7659 144 * @pgen_proc *event@ = event handler function
145 * @void *ectx@ = argument for event handler
8b810a45 146 *
b04a7659 147 * Returns: @PGEN_DONE@ if everything worked ok; @PGEN_ABORT@ otherwise.
8b810a45 148 *
149 * Use: Generates the DSA shared parameters from a given seed value.
b04a7659 150 * This can take quite a long time.
151 *
152 * The algorithm used is a compatible extension of the method
153 * described in the DSA standard, FIPS 186. The standard
154 * requires that %$q$% be 160 bits in size (i.e., @ql == 160@)
155 * and that the length of %$p$% be %$L = 512 + 64l$% for some
156 * %$l$%. Neither limitation applies to this implementation.
8b810a45 157 */
158
827e6c99 159extern int dsa_gen(dsa_param */*dp*/, unsigned /*ql*/, unsigned /*pl*/,
160 unsigned /*steps*/, const void */*k*/, size_t /*sz*/,
600127f0 161 dsa_seed */*sd*/, pgen_proc */*event*/, void */*ectx*/);
162
163/* --- @dsa_checkparam@ --- *
164 *
165 * Arguments: @keycheck *kc@ = keycheck state
166 * @const dsa_param *dp@ = pointer to the parameter set
167 * @const dsa_seed *ds@ = pointer to seed information
168 *
169 * Returns: Zero if all OK, or return status from function.
170 *
171 * Use: Checks a set of DSA parameters for consistency and security.
172 */
173
174extern int dsa_checkparam(keycheck */*kc*/, const dsa_param */*dp*/,
175 const dsa_seed */*ds*/);
8b810a45 176
c97fbcf9
MW
177/* --- @dsa_h2n@ --- *
178 *
179 * Arguments: @mp *d@ = destination integer
180 * @mp *r@ = order of the DSA group
181 * @const void *h@ = pointer to message hash
182 * @size_t hsz@ = size (in bytes) of the hash output
183 *
184 * Returns: Resulting integer.
185 *
186 * Use: Converts a hash to an integer in the demented way necessary
187 * for DSA/ECDSA. This is, of course, completely insane, but
188 * there you go.
189 */
190
191extern mp *dsa_h2n(mp */*d*/, mp */*r*/, const void */*h*/, size_t /*hsz*/);
192
8b810a45 193/* --- @dsa_mksig@ --- *
194 *
195 * Arguments: @const dsa_param *dp@ = pointer to DSA parameters
b3f05084 196 * @mp *a@ = secret signing key
197 * @mp *m@ = message to be signed
198 * @mp *k@ = random data
8b810a45 199 * @mp **rr, **ss@ = where to put output parameters
200 *
201 * Returns: ---
202 *
203 * Use: Computes a DSA signature of a message.
204 */
205
b3f05084 206extern void dsa_mksig(const dsa_param */*dp*/, mp */*a*/,
207 mp */*m*/, mp */*k*/,
8b810a45 208 mp **/*rr*/, mp **/*ss*/);
209
210/* --- @dsa_sign@ --- *
211 *
212 * Arguments: @dsa_param *dp@ = pointer to DSA parameters
213 * @mp *a@ = pointer to secret signing key
214 * @const void *m@ = pointer to message
215 * @size_t msz@ = size of the message
216 * @const void *k@ = secret random data for securing signature
217 * @size_t ksz@ = size of secret data
218 * @void *r@ = pointer to output space for @r@
219 * @size_t rsz@ = size of output space for @r@
220 * @void *s@ = pointer to output space for @s@
221 * @size_t ssz@ = size of output space for @s@
222 *
223 * Returns: ---
224 *
225 * Use: Signs a message, storing the results in a big-endian binary
226 * form.
227 */
228
229extern void dsa_sign(dsa_param */*dp*/, mp */*a*/,
230 const void */*m*/, size_t /*msz*/,
231 const void */*k*/, size_t /*ksz*/,
232 void */*r*/, size_t /*rsz*/,
233 void */*s*/, size_t /*ssz*/);
234
235/* --- @dsa_vrfy@ --- *
236 *
237 * Arguments: @const dsa_param *dp@ = pointer to DSA parameters
b3f05084 238 * @mp *y@ = public verification key
239 * @mp *m@ = message which was signed
240 * @mp *r, *s@ = the signature
8b810a45 241 *
242 * Returns: Zero if the signature is a forgery, nonzero if it's valid.
243 *
244 * Use: Verifies a DSA digital signature.
245 */
246
b3f05084 247extern int dsa_vrfy(const dsa_param */*dp*/, mp */*y*/,
248 mp */*m*/, mp */*r*/, mp */*s*/);
8b810a45 249
250/* --- @dsa_verify@ --- *
251 *
252 * Arguments: @const dsa_param *dp@ = pointer to DSA parameters
b3f05084 253 * @mp *y@ = public verification key
8b810a45 254 * @const void *m@ = pointer to message block
255 * @size_t msz@ = size of message block
256 * @const void *r@ = pointer to @r@ signature half
257 * @size_t rsz@ = size of @r@
258 * @const void *s@ = pointer to @s@ signature half
259 * @size_t ssz@ = size of @s@
260 *
261 * Returns: Zero if the signature is a forgery, nonzero if it's valid.
262 *
263 * Use: Verifies a DSA digital signature.
264 */
265
b3f05084 266extern int dsa_verify(const dsa_param */*dp*/, mp */*y*/,
b92da8eb 267 const void */*m*/, size_t /*msz*/,
268 const void */*r*/, size_t /*rsz*/,
269 const void */*s*/, size_t /*ssz*/);
8b810a45 270
271/*----- That's all, folks -------------------------------------------------*/
272
273#ifdef __cplusplus
274 }
275#endif
276
277#endif