ocrypto_ed25519.h 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135
  1. /**
  2. * Copyright (c) 2019 - 2020, Nordic Semiconductor ASA
  3. *
  4. * All rights reserved.
  5. *
  6. * Redistribution and use in source and binary forms, with or without modification,
  7. * are permitted provided that the following conditions are met:
  8. *
  9. * 1. Redistributions of source code must retain the above copyright notice, this
  10. * list of conditions and the following disclaimer.
  11. *
  12. * 2. Redistributions in binary form, except as embedded into a Nordic
  13. * Semiconductor ASA integrated circuit in a product or a software update for
  14. * such product, must reproduce the above copyright notice, this list of
  15. * conditions and the following disclaimer in the documentation and/or other
  16. * materials provided with the distribution.
  17. *
  18. * 3. Neither the name of Nordic Semiconductor ASA nor the names of its
  19. * contributors may be used to endorse or promote products derived from this
  20. * software without specific prior written permission.
  21. *
  22. * 4. This software, with or without modification, must only be used with a
  23. * Nordic Semiconductor ASA integrated circuit.
  24. *
  25. * 5. Any software provided in binary form under this license must not be reverse
  26. * engineered, decompiled, modified and/or disassembled.
  27. *
  28. * THIS SOFTWARE IS PROVIDED BY NORDIC SEMICONDUCTOR ASA "AS IS" AND ANY EXPRESS
  29. * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
  30. * OF MERCHANTABILITY, NONINFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE ARE
  31. * DISCLAIMED. IN NO EVENT SHALL NORDIC SEMICONDUCTOR ASA OR CONTRIBUTORS BE
  32. * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  33. * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
  34. * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  35. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  36. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
  37. * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  38. *
  39. */
  40. /**@file
  41. * @defgroup nrf_oberon_ed25519 Ed25519 APIs
  42. * @ingroup nrf_oberon
  43. * @{
  44. * @brief Type declarations and APIs for the Ed25519 algorithm.
  45. *
  46. * Ed25519 is a specific implementation of EdDSA, a digital signature scheme.
  47. * EdDSA is based on Twisted Edwards curves and is designed to be faster than
  48. * existing digital signature schemes without sacrificing security. It was
  49. * developed by Daniel J. Bernstein, et al. Ed25519 is intended to provide
  50. * attack resistance comparable to quality 128-bit symmetric ciphers.
  51. *
  52. * @see [Ed25519: high-speed high-security signatures](https://ed25519.cr.yp.to)
  53. */
  54. #ifndef OCRYPTO_ED25519_H
  55. #define OCRYPTO_ED25519_H
  56. #include <stddef.h>
  57. #include <stdint.h>
  58. #ifdef __cplusplus
  59. extern "C" {
  60. #endif
  61. /**
  62. * Length of a public key.
  63. */
  64. #define ocrypto_ed25519_PUBLIC_KEY_BYTES (32)
  65. /**
  66. * Length of a secret key.
  67. */
  68. #define ocrypto_ed25519_SECRET_KEY_BYTES (32)
  69. /**
  70. * Length of a signature.
  71. */
  72. #define ocrypto_ed25519_BYTES (64)
  73. /**
  74. * Ed25519 signature key pair generation.
  75. *
  76. * Given a secret key @p sk, the corresponding public key is computed and put
  77. * into @p pk. The key pair can then be used to sign and verify message signatures.
  78. *
  79. * @param[out] pk Generated public key.
  80. * @param sk Secret key. Must be pre-filled with random data.
  81. */
  82. void ocrypto_ed25519_public_key(uint8_t pk[ocrypto_ed25519_PUBLIC_KEY_BYTES],
  83. const uint8_t sk[ocrypto_ed25519_SECRET_KEY_BYTES]);
  84. /**
  85. * Ed25519 signature generate.
  86. *
  87. * The message @p m is signed using the secret key @p sk and the corresponding
  88. * public key @p pk. The signature is put into @p sig.
  89. *
  90. * @param[out] sig Generated signature.
  91. * @param m Input message.
  92. * @param m_len Length of @p m.
  93. * @param sk Secret key.
  94. * @param pk Public key.
  95. */
  96. void ocrypto_ed25519_sign(uint8_t sig[ocrypto_ed25519_BYTES],
  97. const uint8_t *m, size_t m_len,
  98. const uint8_t sk[ocrypto_ed25519_SECRET_KEY_BYTES],
  99. const uint8_t pk[ocrypto_ed25519_PUBLIC_KEY_BYTES]);
  100. /**
  101. * Ed25519 signature verification.
  102. *
  103. * The signature @p sig of the input message @p m is verified using the signer's
  104. * public key @p pk.
  105. *
  106. * @param sig Input signature.
  107. * @param m Input message.
  108. * @param m_len Length of @p m.
  109. * @param pk Signer's public key.
  110. *
  111. * @retval 0 If the signature is valid.
  112. * @retval -1 Otherwise.
  113. */
  114. int ocrypto_ed25519_verify(const uint8_t sig[ocrypto_ed25519_BYTES],
  115. const uint8_t *m, size_t m_len,
  116. const uint8_t pk[ocrypto_ed25519_PUBLIC_KEY_BYTES]);
  117. #ifdef __cplusplus
  118. }
  119. #endif
  120. #endif /* #ifndef OCRYPTO_ED25519_H */
  121. /** @} */