table of contents
EVP_PKEY_DERIVE(3) | Library Functions Manual | EVP_PKEY_DERIVE(3) |
NAME¶
EVP_PKEY_derive_init
,
EVP_PKEY_derive_set_peer
,
EVP_PKEY_CTX_get0_peerkey
,
EVP_PKEY_derive
— derive
public key algorithm shared secret
SYNOPSIS¶
#include
<openssl/evp.h>
int
EVP_PKEY_derive_init
(EVP_PKEY_CTX
*ctx);
int
EVP_PKEY_derive_set_peer
(EVP_PKEY_CTX
*ctx, EVP_PKEY *peerkey);
EVP_PKEY *
EVP_PKEY_CTX_get0_peerkey
(EVP_PKEY_CTX
*ctx);
int
EVP_PKEY_derive
(EVP_PKEY_CTX
*ctx, unsigned char *key, size_t
*keylen);
DESCRIPTION¶
EVP_PKEY_derive_init
()
initializes the public key algorithm context ctx for
shared secret derivation using the EVP_PKEY object
already stored in ctx. The library provides built-in
support for keys with an EVP_PKEY_base_id(3) of
EVP_PKEY_DH
, EVP_PKEY_EC
,
EVP_PKEY_HKDF
, and
EVP_PKEY_X25519
.
After the call to
EVP_PKEY_derive_init
(),
algorithm specific control operations can optionally be performed to set any
appropriate parameters for the operation.
EVP_PKEY_derive_set_peer
()
configures the ctx, which already needs to be
initialized with EVP_PKEY_derive_init
(),
EVP_PKEY_encrypt_init(3), or
EVP_PKEY_decrypt_init(3), to use the
peerkey, which is normally a public key. In case of
success, the reference count of the peerkey is
incremented by one. Consequently, the caller needs to call
EVP_PKEY_free(3) on the peerkey when
the caller no longer needs it, even if it is still in use by
ctx.
EVP_PKEY_derive
()
derives a shared secret using ctx. If
key is NULL
, then the maximum
size of the output buffer is written to the keylen
parameter. If key is not NULL
then before the call the keylen parameter should
contain the length of the key buffer. If the call is
successful, the shared secret is written to key and
the amount of data written to keylen.
The function
EVP_PKEY_derive
()
can be called more than once on the same context if several operations are
performed using the same parameters.
RETURN VALUES¶
EVP_PKEY_derive_init
(),
EVP_PKEY_derive_set_peer
(), and
EVP_PKEY_derive
() return 1 for success and 0 or a
negative value for failure. In particular, a return value of -2 indicates
the operation is not supported by the public key algorithm.
For EVP_PKEY_derive_set_peer
(), a return
value of -1 can for example occur if ctx is not
properly initialized, does not contain an EVP_PKEY
that can be retrieved with EVP_PKEY_CTX_get0_pkey(3), the
EVP_PKEY_id(3) of both keys mismatch, or
EVP_PKEY_cmp_parameters(3) reports mismatching key
parameters.
EVP_PKEY_derive
() fails with a return
value of -1 for example if ctx has not been
successfully initialized with
EVP_PKEY_derive_init
().
EVP_PKEY_CTX_get0_peerkey
() returns an
internal pointer to the peerkey used by
ctx without incrementing its reference count.
EXAMPLES¶
Derive shared secret (for example DH or EC keys):
#include <openssl/evp.h> #include <openssl/rsa.h> EVP_PKEY_CTX *ctx; unsigned char *skey; size_t skeylen; EVP_PKEY *pkey, *peerkey; /* Assumes that pkey and peerkey have already been set up. */ ctx = EVP_PKEY_CTX_new(pkey, NULL); if (!ctx) /* Error occurred */ if (EVP_PKEY_derive_init(ctx) <= 0) /* Error */ if (EVP_PKEY_derive_set_peer(ctx, peerkey) <= 0) /* Error */ /* Determine buffer length */ if (EVP_PKEY_derive(ctx, NULL, &skeylen) <= 0) /* Error */ skey = malloc(skeylen); if (!skey) /* malloc failure */ if (EVP_PKEY_derive(ctx, skey, &skeylen) <= 0) /* Error */ /* Shared secret is skey bytes written to buffer skey */
SEE ALSO¶
EVP_PKEY_CTX_new(3), EVP_PKEY_decrypt(3), EVP_PKEY_encrypt(3), EVP_PKEY_meth_set_derive(3), EVP_PKEY_sign(3), EVP_PKEY_verify(3), EVP_PKEY_verify_recover(3), X25519(3)
HISTORY¶
EVP_PKEY_derive_init
(),
EVP_PKEY_derive_set_peer
(),
EVP_PKEY_CTX_get0_peerkey
(), and
EVP_PKEY_derive
() first appeared in OpenSSL 1.0.0
and have been available since OpenBSD 4.9.
July 21, 2024 | Linux 6.4.0-150600.23.25-default |