-
Notifications
You must be signed in to change notification settings - Fork 0
/
daps_h2_gq.h
62 lines (50 loc) · 2.48 KB
/
daps_h2_gq.h
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
/********************************************************************************************
* DAPS: double-authentication preventing signatures
*
* Based on the paper:
* Mihir Bellare, Bertram Poettering, and Douglas Stebila.
* Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.
* IACR Cryptology ePrint Archive, Report 2016/1016. October, 2016.
* https://eprint.iacr.org/2016/1016
*
* Software originally developed by Douglas Stebila.
*
* Released into the public domain; see LICENSE.txt for details.
********************************************************************************************/
/** \file daps_h2_gq.h
* Interface for H2[GQ] DAPS scheme.
*/
#ifndef _DAPS_H2_GQ_H
#define _DAPS_H2_GQ_H
#include <openssl/bn.h>
#include <openssl/rsa.h>
#include "id_gq.h"
typedef struct DAPS_H2_GQ_vk_st DAPS_H2_GQ_VK;
struct DAPS_H2_GQ_vk_st {
ID_GQ_PK *ipk;
unsigned char *TDK;
int TDK_length;
};
typedef struct DAPS_H2_GQ_sk_st DAPS_H2_GQ_SK;
struct DAPS_H2_GQ_sk_st {
ID_GQ_SK *isk;
ID_GQ_TDK *itdk;
};
typedef struct DAPS_H2_GQ_sig_st DAPS_H2_GQ_SIG;
struct DAPS_H2_GQ_sig_st {
ID_GQ_RESP *resp;
unsigned char *s;
int s_length;
};
void DAPS_H2_GQ_VK_free(DAPS_H2_GQ_VK *vk);
void DAPS_H2_GQ_SK_free(DAPS_H2_GQ_SK *sk);
void DAPS_H2_GQ_SIG_free(DAPS_H2_GQ_SIG *sig);
void DAPS_H2_GQ_VK_print_fp(FILE *fp, const DAPS_H2_GQ_VK *vk);
void DAPS_H2_GQ_SK_print_fp(FILE *fp, const DAPS_H2_GQ_SK *sk);
void DAPS_H2_GQ_SIG_print_fp(FILE *fp, const DAPS_H2_GQ_SIG *sig);
int DAPS_H2_GQ_keygen(DAPS_H2_GQ_VK **vk, DAPS_H2_GQ_SK **sk, const int bits, const int chlen, BN_CTX *bn_ctx);
int DAPS_H2_GQ_sign(const DAPS_H2_GQ_VK *vk, const DAPS_H2_GQ_SK *sk, const int hashlen, const unsigned char *msg_subj, const int msg_subj_length, const unsigned char *msg_body, const int msg_body_length, DAPS_H2_GQ_SIG **sig, BN_CTX *bn_ctx);
int DAPS_H2_GQ_verify(const DAPS_H2_GQ_VK *vk, const int hashlen, const unsigned char *msg_subj, const int msg_subj_length, const unsigned char *msg_body, const int msg_body_length, const DAPS_H2_GQ_SIG *sig, BN_CTX *bn_ctx);
int DAPS_H2_GQ_extract(const DAPS_H2_GQ_VK *vk, const int hashlen, const unsigned char *msg_subj, const int msg_subj_length, const unsigned char *msg_body1, const int msg_body1_length, const DAPS_H2_GQ_SIG *sig1, const unsigned char *msg_body2, const int msg_body2_length, const DAPS_H2_GQ_SIG *sig2, DAPS_H2_GQ_SK **sk, BN_CTX *bn_ctx);
int DAPS_H2_GQ_test(int keylen, int hashlen, int print);
#endif