ocrypto_curve25519.h 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117
  1. /**
  2. * Copyright (c) 2019 - 2020, Nordic Semiconductor ASA
  3. *
  4. * All rights reserved.
  5. *
  6. * Redistribution and use in source and binary forms, with or without modification,
  7. * are permitted provided that the following conditions are met:
  8. *
  9. * 1. Redistributions of source code must retain the above copyright notice, this
  10. * list of conditions and the following disclaimer.
  11. *
  12. * 2. Redistributions in binary form, except as embedded into a Nordic
  13. * Semiconductor ASA integrated circuit in a product or a software update for
  14. * such product, must reproduce the above copyright notice, this list of
  15. * conditions and the following disclaimer in the documentation and/or other
  16. * materials provided with the distribution.
  17. *
  18. * 3. Neither the name of Nordic Semiconductor ASA nor the names of its
  19. * contributors may be used to endorse or promote products derived from this
  20. * software without specific prior written permission.
  21. *
  22. * 4. This software, with or without modification, must only be used with a
  23. * Nordic Semiconductor ASA integrated circuit.
  24. *
  25. * 5. Any software provided in binary form under this license must not be reverse
  26. * engineered, decompiled, modified and/or disassembled.
  27. *
  28. * THIS SOFTWARE IS PROVIDED BY NORDIC SEMICONDUCTOR ASA "AS IS" AND ANY EXPRESS
  29. * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
  30. * OF MERCHANTABILITY, NONINFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE ARE
  31. * DISCLAIMED. IN NO EVENT SHALL NORDIC SEMICONDUCTOR ASA OR CONTRIBUTORS BE
  32. * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  33. * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
  34. * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  35. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  36. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
  37. * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  38. *
  39. */
  40. /**@file
  41. * @defgroup nrf_oberon_curve25519 ECC Curve25519 low-level APIs
  42. * @ingroup nrf_oberon
  43. * @{
  44. * @brief Type declarations and APIs for low-level elliptic curve point operations
  45. * based on Curve25519.
  46. *
  47. * Curve25519 is an elliptic curve offering 128 bits of security. It is designed
  48. * for use in the Elliptic Curve Diffie-Hellman (ECDH) key agreement scheme.
  49. *
  50. * @see [RFC 7748 - Elliptic Curves for Security](https://tools.ietf.org/html/rfc7748)
  51. * @see [Curve25519: high-speed elliptic-curve cryptography](http://cr.yp.to/ecdh.html)
  52. */
  53. #ifndef OCRYPTO_CURVE25519_H
  54. #define OCRYPTO_CURVE25519_H
  55. #include <stdint.h>
  56. #ifdef __cplusplus
  57. extern "C" {
  58. #endif
  59. /**
  60. * Length of a scalar.
  61. */
  62. #define ocrypto_curve25519_SCALAR_BYTES (32)
  63. /**
  64. * Length of a curve point.
  65. */
  66. #define ocrypto_curve25519_BYTES (32)
  67. /**
  68. * Curve25519 scalar multiplication `r = n * basePoint`.
  69. *
  70. * Given a secret key @p n, the corresponding Curve25519 public key is computed
  71. * and put into @p r.
  72. *
  73. * The inverse of this function is difficult to compute.
  74. *
  75. * @param[out] r Resulting curve point.
  76. * @param[in] n Scalar factor.
  77. *
  78. * @remark @p r and @p n can point to the same address.
  79. */
  80. void ocrypto_curve25519_scalarmult_base(
  81. uint8_t r[ocrypto_curve25519_BYTES],
  82. const uint8_t n[ocrypto_curve25519_SCALAR_BYTES]);
  83. /**
  84. * Curve25519 scalar multiplication `r = n * p`.
  85. *
  86. * A shared secret is computed from the local secret key @p n and another
  87. * party's public key @p p and put into @p r. The same shared secret is
  88. * generated when the other party combines its private key with the local public
  89. * key.
  90. *
  91. * @param[out] r Resulting curve point.
  92. * @param[in] n Scalar factor.
  93. * @param[in] p Point factor.
  94. *
  95. * @remark @p r and @p n can point to the same address.
  96. */
  97. void ocrypto_curve25519_scalarmult(
  98. uint8_t r[ocrypto_curve25519_BYTES],
  99. const uint8_t n[ocrypto_curve25519_SCALAR_BYTES],
  100. const uint8_t p[ocrypto_curve25519_BYTES]);
  101. #ifdef __cplusplus
  102. }
  103. #endif
  104. #endif /* #ifndef OCRYPTO_CURVE25519_H */
  105. /** @} */