Files
ANSLibs/chilkat/include/CkEcc.h

304 lines
12 KiB
C++

// CkEcc.h: interface for the CkEcc class.
//
//////////////////////////////////////////////////////////////////////
// This header is generated for Chilkat 11.3.0
#define _CkVersion 11.3.0
#ifndef _CkEcc_H
#define _CkEcc_H
#include "chilkatDefs.h"
#include "CkString.h"
#include "CkMultiByteBase.h"
class CkPrivateKey;
class CkPrng;
class CkPublicKey;
class CkBinData;
class CkCert;
#if !defined(__sun__) && !defined(__sun)
#pragma pack (push, 8)
#endif
#undef Copy
// CLASS: CkEcc
class CK_VISIBLE_PUBLIC CkEcc : public CkMultiByteBase
{
private:
// Don't allow assignment or copying these objects.
CkEcc(const CkEcc &);
CkEcc &operator=(const CkEcc &);
public:
CkEcc(void);
virtual ~CkEcc(void);
static CkEcc *createNew(void);
static CkEcc *createNew2(int progLang);
void CK_VISIBLE_PRIVATE inject(void *impl);
// May be called when finished with the object to free/dispose of any
// internal resources held by the object.
void dispose(void);
// BEGIN PUBLIC INTERFACE
// ----------------------
// Properties
// ----------------------
// If true, the ECDSA signatures produced by this object will use ASN.1 format.
// Otherwise the ECDSA signature will be a concatenation of the two raw byte arrays
// for r and s.
//
// ECDSA signatures have two equal sized parts, r and s. There are two common
// formats for encoding the signature:
//
// (a) Concatenating the raw byte array of r and s
// (b) Encoding both into a structured ASN.1 / DER sequence.
//
// The default value of this property is true, which is to use ASN.1, which is
// the behavior of earlier versions of Chilkat before this property was added.
bool get_AsnFormat(void);
// If true, the ECDSA signatures produced by this object will use ASN.1 format.
// Otherwise the ECDSA signature will be a concatenation of the two raw byte arrays
// for r and s.
//
// ECDSA signatures have two equal sized parts, r and s. There are two common
// formats for encoding the signature:
//
// (a) Concatenating the raw byte array of r and s
// (b) Encoding both into a structured ASN.1 / DER sequence.
//
// The default value of this property is true, which is to use ASN.1, which is
// the behavior of earlier versions of Chilkat before this property was added.
void put_AsnFormat(bool newVal);
// ----------------------
// Methods
// ----------------------
// This method is deprecated. Applications should instead call GenKey .
//
// Generates an ECDSA private key. The curveName specifies the curve name which
// determines the key size. The prng provides a source for generating the random
// private key.
//
// The following curve names are accepted:
// * secp256r1 (also known as P-256 and prime256v1)
// * secp384r1 (also known as P-384)
// * secp521r1 (also known as P-521)
// * secp256k1 (This is the curve used for Bitcoin)
// * secp192r1
// * secp224r1
// * brainpoolP160r1
// * brainpoolP192r1
// * brainpoolP192r1
// * brainpoolP224r1
// * brainpoolP256r1
// * brainpoolP320r1
// * brainpoolP384r1
// * brainpoolP512r1
//
// The caller is responsible for deleting the object returned by this method.
CkPrivateKey *GenEccKey(const char *curveName, CkPrng &prng);
// This method is deprecated. Applications should instead call GenKey2 .
//
// Generates an ECDSA private key using a specified value for K. The curveName specifies
// the curve name which determines the key size. The encodedK is the encoded value of
// the private key. The encoding is the encoding used for encodedK, which can be hex ,
// base64 , decimal , etc.
//
// Note: This method is typically used for testing -- such as when the same private
// key is desired to produce results identical from run to run.
//
// The following curve names are accepted:
// * secp256r1 (also known as P-256 and prime256v1)
// * secp384r1 (also known as P-384)
// * secp521r1 (also known as P-521)
// * secp256k1 (This is the curve used for Bitcoin)
// * secp192r1
// * secp224r1
// * brainpoolP160r1
// * brainpoolP192r1
// * brainpoolP192r1
// * brainpoolP224r1
// * brainpoolP256r1
// * brainpoolP320r1
// * brainpoolP384r1
// * brainpoolP512r1
//
// The caller is responsible for deleting the object returned by this method.
CkPrivateKey *GenEccKey2(const char *curveName, const char *encodedK, const char *encoding);
// Generates an ECDSA private key to privKey. The curveName specifies the curve name which
// determines the key size. The prng provides a source for generating the random
// private key.
//
// The following curve names are accepted:
// * secp256r1 (also known as P-256 and prime256v1)
// * secp384r1 (also known as P-384)
// * secp521r1 (also known as P-521)
// * secp256k1 (This is the curve used for Bitcoin)
// * secp192r1
// * secp224r1
// * brainpoolP160r1
// * brainpoolP192r1
// * brainpoolP192r1
// * brainpoolP224r1
// * brainpoolP256r1
// * brainpoolP320r1
// * brainpoolP384r1
// * brainpoolP512r1
//
bool GenKey(const char *curveName, CkPrng &prng, CkPrivateKey &privKey);
// Generates an ECDSA private key in privKey using a specified value for K. The curveName
// specifies the curve name which determines the key size. The encodedK is the encoded
// value of the private key. The encoding is the encoding used for encodedK, which can be
// hex , base64 , decimal , etc.
//
// Note: This method is typically used for testing -- such as when the same private
// key is desired to produce results identical from run to run.
//
// The following curve names are accepted:
// * secp256r1 (also known as P-256 and prime256v1)
// * secp384r1 (also known as P-384)
// * secp521r1 (also known as P-521)
// * secp256k1 (This is the curve used for Bitcoin)
// * secp192r1
// * secp224r1
// * brainpoolP160r1
// * brainpoolP192r1
// * brainpoolP192r1
// * brainpoolP224r1
// * brainpoolP256r1
// * brainpoolP320r1
// * brainpoolP384r1
// * brainpoolP512r1
//
bool GenKey2(const char *curveName, const char *encodedK, const char *encoding, CkPrivateKey &privKey);
// Computes a shared secret given a private and public key. For example, Alice and
// Bob can compute the identical shared secret by doing the following: Alice sends
// Bob her public key, and Bob calls SharedSecretENC with his private key and
// Alice's public key. Bob sends Alice his public key, and Alice calls
// SharedSecretENC with her private key and Bob's public key. Both calls to
// SharedSecretENC will produce the same result. The resulting bytes are returned
// in encoded string form (hex, base64, etc) as specified by encoding.
//
// Note: The private and public keys must both be keys on the same ECDSA curve.
//
bool SharedSecretENC(CkPrivateKey &privKey, CkPublicKey &pubKey, const char *encoding, CkString &outStr);
// Computes a shared secret given a private and public key. For example, Alice and
// Bob can compute the identical shared secret by doing the following: Alice sends
// Bob her public key, and Bob calls SharedSecretENC with his private key and
// Alice's public key. Bob sends Alice his public key, and Alice calls
// SharedSecretENC with her private key and Bob's public key. Both calls to
// SharedSecretENC will produce the same result. The resulting bytes are returned
// in encoded string form (hex, base64, etc) as specified by encoding.
//
// Note: The private and public keys must both be keys on the same ECDSA curve.
//
const char *sharedSecretENC(CkPrivateKey &privKey, CkPublicKey &pubKey, const char *encoding);
// This method is the same as SignHashENC, except the actual data to be signed and
// the name of the hash algorithm is passed in. The following hash algorithms are
// supported: sha256, sha384, and sha512.
bool SignBd(CkBinData &bdData, const char *hashAlg, const char *encoding, CkPrivateKey &privKey, CkPrng &prng, CkString &outStr);
// This method is the same as SignHashENC, except the actual data to be signed and
// the name of the hash algorithm is passed in. The following hash algorithms are
// supported: sha256, sha384, and sha512.
const char *signBd(CkBinData &bdData, const char *hashAlg, const char *encoding, CkPrivateKey &privKey, CkPrng &prng);
// Same as SignBd, but instead uses the private key of a certificate (assuming the
// cert's private key is ECDSA).
bool SignBdUsingCert(CkBinData &bdData, const char *hashAlg, const char *encoding, CkCert &cert, CkString &outStr);
// Same as SignBd, but instead uses the private key of a certificate (assuming the
// cert's private key is ECDSA).
const char *signBdUsingCert(CkBinData &bdData, const char *hashAlg, const char *encoding, CkCert &cert);
// Computes an ECDSA signature on a hash. ECDSA signatures are computed and
// verified on the hashes of data (such as SHA1, SHA256, etc.). The hash of the
// data is passed in encodedHash. The encoding, such as base64 , hex , etc. is passed in
// encoding. The ECDSA private key is passed in the 3rd argument (privkey). Given that
// creating an ECDSA signature involves the generation of random numbers, a PRNG is
// passed in the 4th argument (prng). The signature is returned as an encoded
// string using the encoding specified by the encoding argument.
bool SignHashENC(const char *encodedHash, const char *encoding, CkPrivateKey &privkey, CkPrng &prng, CkString &outStr);
// Computes an ECDSA signature on a hash. ECDSA signatures are computed and
// verified on the hashes of data (such as SHA1, SHA256, etc.). The hash of the
// data is passed in encodedHash. The encoding, such as base64 , hex , etc. is passed in
// encoding. The ECDSA private key is passed in the 3rd argument (privkey). Given that
// creating an ECDSA signature involves the generation of random numbers, a PRNG is
// passed in the 4th argument (prng). The signature is returned as an encoded
// string using the encoding specified by the encoding argument.
const char *signHashENC(const char *encodedHash, const char *encoding, CkPrivateKey &privkey, CkPrng &prng);
// Computes an ECDSA signature on a hash. ECDSA signatures are computed and
// verified on the hashes of data (such as SHA1, SHA256, etc.). The hash of the
// data is passed in encodedHash. The encoding, such as base64 , hex , etc. is passed in
// encoding. The certificate having a private key is passed in cert. The signature is
// returned as an encoded string using the encoding specified by the encoding argument.
bool SignHashUsingCert(const char *encodedHash, const char *encoding, CkCert &cert, CkString &outStr);
// Computes an ECDSA signature on a hash. ECDSA signatures are computed and
// verified on the hashes of data (such as SHA1, SHA256, etc.). The hash of the
// data is passed in encodedHash. The encoding, such as base64 , hex , etc. is passed in
// encoding. The certificate having a private key is passed in cert. The signature is
// returned as an encoded string using the encoding specified by the encoding argument.
const char *signHashUsingCert(const char *encodedHash, const char *encoding, CkCert &cert);
// This method is the same as VerifyHashENC, except the actual data to be verified
// and the name of the hash algorithm is passed in. The following hash algorithms
// are supported: sha256, sha384, and sha512.
int VerifyBd(CkBinData &bdData, const char *hashAlg, const char *encodedSig, const char *encoding, CkPublicKey &pubkey);
// Verifies an ECDSA signature. ECDSA signatures are computed and verified on the
// hashes of data (such as SHA1, SHA256, etc.). The hash of the data is passed in
// encodedHash. The encoded signature is passed in encodedSig. The encoding of both the hash and
// signature, such as base64 , hex , etc. is passed in encoding. The ECDSA public key
// is passed in the last argument (pubkey).
//
// The method returns 1 for a valid signature, 0 for an invalid signature, and -1
// for any other failure.
//
int VerifyHashENC(const char *encodedHash, const char *encodedSig, const char *encoding, CkPublicKey &pubkey);
// END PUBLIC INTERFACE
};
#if !defined(__sun__) && !defined(__sun)
#pragma pack (pop)
#endif
#endif