xref: /freebsd/secure/lib/libcrypto/man/man3/ASN1_item_sign.3 (revision 535af610a4fdace6d50960c0ad9be0597eea7a1b)
Automatically generated by Pod::Man 4.14 (Pod::Simple 3.40)

Standard preamble:
========================================================================
..
..
.. Set up some character translations and predefined strings. \*(-- will
give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
double quote, and \*(R" will give a right double quote. \*(C+ will
give a nicer C++. Capital omega is used to do unbreakable dashes and
therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
nothing in troff, for use with C<>.
.tr \(*W- . ds -- \(*W- . ds PI pi . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch . ds L" "" . ds R" "" . ds C` "" . ds C' "" 'br\} . ds -- \|\(em\| . ds PI \(*p . ds L" `` . ds R" '' . ds C` . ds C' 'br\}
Escape single quotes in literal strings from groff's Unicode transform.

If the F register is >0, we'll generate index entries on stderr for
titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
entries marked with X<> in POD. Of course, you'll have to process the
output yourself in some meaningful fashion.

Avoid warning from groff about undefined register 'F'.
.. .nr rF 0 . if \nF \{\ . de IX . tm Index:\\$1\t\\n%\t"\\$2" .. . if !\nF==2 \{\ . nr % 0 . nr F 2 . \} . \} .\} .rr rF
Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
Fear. Run. Save yourself. No user-serviceable parts.
. \" fudge factors for nroff and troff . ds #H 0 . ds #V .8m . ds #F .3m . ds #[ \f1 . ds #] .\} . ds #H ((1u-(\\\\n(.fu%2u))*.13m) . ds #V .6m . ds #F 0 . ds #[ \& . ds #] \& .\} . \" simple accents for nroff and troff . ds ' \& . ds ` \& . ds ^ \& . ds , \& . ds ~ ~ . ds / .\} . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u' . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u' . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u' . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u' .\} . \" troff and (daisy-wheel) nroff accents . \" corrections for vroff . \" for low resolution devices (crt and lpr) \{\ . ds : e . ds 8 ss . ds o a . ds d- d\h'-1'\(ga . ds D- D\h'-1'\(hy . ds th \o'bp' . ds Th \o'LP' . ds ae ae . ds Ae AE .\} ========================================================================

Title "ASN1_ITEM_SIGN 3"
ASN1_ITEM_SIGN 3 "2023-08-01" "3.0.10" "OpenSSL"
For nroff, turn off justification. Always turn off hyphenation; it makes
way too many mistakes in technical documents.
"NAME"
ASN1_item_sign, ASN1_item_sign_ex, ASN1_item_sign_ctx, ASN1_item_verify, ASN1_item_verify_ex, ASN1_item_verify_ctx - ASN1 sign and verify
"SYNOPSIS"
Header "SYNOPSIS" .Vb 1 #include <openssl/x509.h> \& int ASN1_item_sign_ex(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, const void *data, const ASN1_OCTET_STRING *id, EVP_PKEY *pkey, const EVP_MD *md, OSSL_LIB_CTX *libctx, const char *propq); \& int ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, const void *data, EVP_PKEY *pkey, const EVP_MD *md); \& int ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, const void *data, EVP_MD_CTX *ctx); \& int ASN1_item_verify_ex(const ASN1_ITEM *it, const X509_ALGOR *alg, const ASN1_BIT_STRING *signature, const void *data, const ASN1_OCTET_STRING *id, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, const char *propq); \& int ASN1_item_verify(const ASN1_ITEM *it, const X509_ALGOR *alg, const ASN1_BIT_STRING *signature, const void *data, EVP_PKEY *pkey); \& int ASN1_item_verify_ctx(const ASN1_ITEM *it, const X509_ALGOR *alg, const ASN1_BIT_STRING *signature, const void *data, EVP_MD_CTX *ctx); .Ve
"DESCRIPTION"
Header "DESCRIPTION" \fBASN1_item_sign_ex() is used to sign arbitrary \s-1ASN1\s0 data using a data object \fIdata, the \s-1ASN.1\s0 structure it, private key pkey and message digest md. The data that is signed is formed by taking the data object in data and converting it to der format using the \s-1ASN.1\s0 structure it. The data that will be signed, and a structure containing the signature may both have a copy of the X509_ALGOR. The ASN1_item_sign_ex() function will write the correct X509_ALGOR to the structs based on the algorithms and parameters that have been set up. If one of algor1 or algor2 points to the \fBX509_ALGOR of the data to be signed, then that X509_ALGOR will first be written before the signature is generated. Examples of valid values that can be used by the \s-1ASN.1\s0 structure it are ASN1_ITEM_rptr(X509_CINF), ASN1_ITEM_rptr(X509_REQ_INFO) and ASN1_ITEM_rptr(X509_CRL_INFO). The \s-1OSSL_LIB_CTX\s0 specified in libctx and the property query string specified in props are used when searching for algorithms in providers. The generated signature is set into signature. The optional parameter id can be \s-1NULL,\s0 but can be set for special key types. See EVP_PKEY_CTX_set1_id() for further info. The output parameters <algor1> and \fIalgor2 are ignored if they are \s-1NULL.\s0

\fBASN1_item_sign() is similar to ASN1_item_sign_ex() but uses default values of \s-1NULL\s0 for the id, libctx and propq.

\fBASN1_item_sign_ctx() is similar to ASN1_item_sign() but uses the parameters contained in digest context ctx.

\fBASN1_item_verify_ex() is used to verify the signature signature of internal data data using the public key pkey and algorithm identifier alg. The data that is verified is formed by taking the data object in data and converting it to der format using the \s-1ASN.1\s0 structure it. The \s-1OSSL_LIB_CTX\s0 specified in libctx and the property query string specified in props are used when searching for algorithms in providers. The optional parameter id can be \s-1NULL,\s0 but can be set for special key types. See EVP_PKEY_CTX_set1_id() for further info.

\fBASN1_item_verify() is similar to ASN1_item_verify_ex() but uses default values of \s-1NULL\s0 for the id, libctx and propq.

\fBASN1_item_verify_ctx() is similar to ASN1_item_verify() but uses the parameters contained in digest context ctx.

"RETURN VALUES"
Header "RETURN VALUES" All sign functions return the size of the signature in bytes for success and zero for failure.

All verify functions return 1 if the signature is valid and 0 if the signature check fails. If the signature could not be checked at all because it was ill-formed or some other error occurred then -1 is returned.

"EXAMPLES"
Header "EXAMPLES" In the following example a 'MyObject' object is signed using the key contained in an \s-1EVP_MD_CTX.\s0 The signature is written to MyObject.signature. The object is then output in \s-1DER\s0 format and then loaded back in and verified.

.Vb 2 #include <openssl/x509.h> #include <openssl/asn1t.h> \& /* An object used to store the ASN1 data fields that will be signed */ typedef struct MySignInfoObject_st { ASN1_INTEGER *version; X509_ALGOR sig_alg; } MySignInfoObject; \& DECLARE_ASN1_FUNCTIONS(MySignInfoObject) /* * A higher level object containing the ASN1 fields, signature alg and * output signature. */ typedef struct MyObject_st { MySignInfoObject info; X509_ALGOR sig_alg; ASN1_BIT_STRING *signature; } MyObject; \& DECLARE_ASN1_FUNCTIONS(MyObject) \& /* The ASN1 definition of MySignInfoObject */ ASN1_SEQUENCE_cb(MySignInfoObject, NULL) = { ASN1_SIMPLE(MySignInfoObject, version, ASN1_INTEGER) ASN1_EMBED(MySignInfoObject, sig_alg, X509_ALGOR), } ASN1_SEQUENCE_END_cb(MySignInfoObject, MySignInfoObject) \& /* new, free, d2i & i2d functions for MySignInfoObject */ IMPLEMENT_ASN1_FUNCTIONS(MySignInfoObject) \& /* The ASN1 definition of MyObject */ ASN1_SEQUENCE_cb(MyObject, NULL) = { ASN1_EMBED(MyObject, info, MySignInfoObject), ASN1_EMBED(MyObject, sig_alg, X509_ALGOR), ASN1_SIMPLE(MyObject, signature, ASN1_BIT_STRING) } ASN1_SEQUENCE_END_cb(MyObject, MyObject) \& /* new, free, d2i & i2d functions for MyObject */ IMPLEMENT_ASN1_FUNCTIONS(MyObject) \& int test_asn1_item_sign_verify(const char *mdname, EVP_PKEY *pkey, long version) { int ret = 0; unsigned char *obj_der = NULL; const unsigned char *p = NULL; MyObject *obj = NULL, *loaded_obj = NULL; const ASN1_ITEM *it = ASN1_ITEM_rptr(MySignInfoObject); EVP_MD_CTX *sctx = NULL, *vctx = NULL; int len; \& /* Create MyObject and set its version */ obj = MyObject_new(); if (obj == NULL) goto err; if (!ASN1_INTEGER_set(obj->info.version, version)) goto err; \& /* Set the key and digest used for signing */ sctx = EVP_MD_CTX_new(); if (sctx == NULL || !EVP_DigestSignInit_ex(sctx, NULL, mdname, NULL, NULL, pkey)) goto err; \& /* * it contains the mapping between ASN.1 data and an object MySignInfoObject * obj->info is the \*(AqMySignInfoObject\*(Aq object that will be * converted into DER data and then signed. * obj->signature will contain the output signature. * obj->sig_alg is filled with the private key\*(Aqs signing algorithm id. * obj->info.sig_alg is another copy of the signing algorithm id that sits * within MyObject. */ len = ASN1_item_sign_ctx(it, &obj->sig_alg, &obj->info.sig_alg, obj->signature, &obj->info, sctx); if (len <= 0 || X509_ALGOR_cmp(&obj->sig_alg, &obj->info.sig_alg) != 0) goto err; \& /* Output MyObject in der form */ len = i2d_MyObject(obj, &obj_der); if (len <= 0) goto err; \& /* Set the key and digest used for verifying */ vctx = EVP_MD_CTX_new(); if (vctx == NULL || !EVP_DigestVerifyInit_ex(vctx, NULL, mdname, NULL, NULL, pkey)) goto err; \& /* Load the der data back into an object */ p = obj_der; loaded_obj = d2i_MyObject(NULL, &p, len); if (loaded_obj == NULL) goto err; /* Verify the loaded object */ ret = ASN1_item_verify_ctx(it, &loaded_obj->sig_alg, loaded_obj->signature, &loaded_obj->info, vctx); err: OPENSSL_free(obj_der); MyObject_free(loaded_obj); MyObject_free(obj); EVP_MD_CTX_free(sctx); EVP_MD_CTX_free(vctx); return ret; } .Ve

"SEE ALSO"
Header "SEE ALSO" \fBX509_sign\|(3), \fBX509_verify\|(3)
"HISTORY"
Header "HISTORY" \fBASN1_item_sign_ex() and ASN1_item_verify_ex() were added in OpenSSL 3.0.
"COPYRIGHT"
Header "COPYRIGHT" Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved.

Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use this file except in compliance with the License. You can obtain a copy in the file \s-1LICENSE\s0 in the source distribution or at <https://www.openssl.org/source/license.html>.