1 .\" Copyright (c) 2018-2022 Yubico AB. All rights reserved.
3 .\" Redistribution and use in source and binary forms, with or without
4 .\" modification, are permitted provided that the following conditions are
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in
11 .\" the documentation and/or other materials provided with the
14 .\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
15 .\" "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
16 .\" LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
17 .\" A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
18 .\" HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
19 .\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
20 .\" LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
24 .\" OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 .\" SPDX-License-Identifier: BSD-2-Clause
28 .Dd $Mdocdate: July 15 2022 $
34 .Nm es256_pk_from_EC_KEY ,
35 .Nm es256_pk_from_EVP_PKEY ,
36 .Nm es256_pk_from_ptr ,
37 .Nm es256_pk_to_EVP_PKEY
38 .Nd FIDO2 COSE ES256 API
43 .Fn es256_pk_new "void"
45 .Fn es256_pk_free "es256_pk_t **pkp"
47 .Fn es256_pk_from_EC_KEY "es256_pk_t *pk" "const EC_KEY *ec"
49 .Fn es256_pk_from_EVP_PKEY "es256_pk_t *pk" "const EVP_PKEY *pkey"
51 .Fn es256_pk_from_ptr "es256_pk_t *pk" "const void *ptr" "size_t len"
53 .Fn es256_pk_to_EVP_PKEY "const es256_pk_t *pk"
55 ES256 is the name given in the CBOR Object Signing and Encryption
56 (COSE) RFC to ECDSA over P-256 with SHA-256.
59 is an auxiliary API with routines to convert between the different
60 ECDSA public key types used in
67 ES256 public keys are abstracted by the
73 function returns a pointer to a newly allocated, empty
76 If memory cannot be allocated, NULL is returned.
80 function releases the memory backing
84 must have been previously allocated by
93 may be NULL, in which case
98 .Fn es256_pk_from_EC_KEY
108 .Fn es256_pk_from_EVP_PKEY
118 .Fn es256_pk_from_ptr
130 pointer may point to an uncompressed point, or to the
131 concatenation of the x and y coordinates.
137 .Fn es256_pk_to_EVP_PKEY
142 type with a reference count of 1.
143 No internal references to the returned pointer are kept.
145 .Fn es256_pk_to_EVP_PKEY
149 .Fn es256_pk_from_EC_KEY ,
150 .Fn es256_pk_from_EVP_PKEY ,
152 .Fn es256_pk_from_ptr
156 On error, a different error code defined in
162 .Xr fido_assert_verify 3 ,
163 .Xr fido_cred_pubkey_ptr 3 ,