====== NativeCryptoProvider ======
**Namespace:** ''WvdS.System.Security.Cryptography.Providers''
P/Invoke-based crypto provider for server and desktop applications. Communicates directly with OpenSSL 3.6 via Platform Invocation Services.
===== Overview =====
The ''NativeCryptoProvider'' is the default provider for:
* Blazor Server
* ASP.NET Core
* Desktop applications (Windows, Linux, macOS)
* Console applications
* Windows Services / Linux Daemons
===== Properties =====
^ Property ^ Type ^ Description ^
| ''Name'' | string | ''%%"Native (P/Invoke)"%%'' |
| ''IsAvailable'' | bool | ''true'' if OpenSSL 3.6 is reachable |
===== Initialization =====
using WvdS.System.Security.Cryptography.Providers;
// Create provider
var provider = new NativeCryptoProvider();
// Initialize (loads OpenSSL)
await provider.InitializeAsync();
// Check if available
if (provider.IsAvailable)
{
Console.WriteLine($"Provider: {provider.Name}");
Console.WriteLine($"OpenSSL: {provider.GetOpenSslVersion()}");
}
===== ML-DSA Operations =====
==== GenerateMlDsaKeyPairAsync ====
Generates an ML-DSA key pair.
var (publicKey, privateKey) = await provider.GenerateMlDsaKeyPairAsync("ML-DSA-65");
// Supported algorithms:
// - "ML-DSA-44" (NIST Level 1)
// - "ML-DSA-65" (NIST Level 3, recommended)
// - "ML-DSA-87" (NIST Level 5)
==== SignMlDsaAsync / VerifyMlDsaAsync ====
byte[] data = Encoding.UTF8.GetBytes("Important data");
byte[] signature = await provider.SignMlDsaAsync(data, privateKey);
bool isValid = await provider.VerifyMlDsaAsync(data, signature, publicKey);
===== ML-KEM Operations =====
==== GenerateMlKemKeyPairAsync ====
var (publicKey, privateKey) = await provider.GenerateMlKemKeyPairAsync("ML-KEM-768");
// Supported algorithms:
// - "ML-KEM-512" (NIST Level 1)
// - "ML-KEM-768" (NIST Level 3, recommended)
// - "ML-KEM-1024" (NIST Level 5)
==== EncapsulateAsync / DecapsulateAsync ====
var (sharedSecret, ciphertext) = await provider.EncapsulateAsync(recipientPublicKey);
byte[] sharedSecret = await provider.DecapsulateAsync(ciphertext, privateKey);
===== Method Overview =====
^ Method ^ Parameters ^ Return ^
| ''InitializeAsync()'' | - | Task |
| ''GetOpenSslVersion()'' | - | string |
| ''GenerateMlDsaKeyPairAsync'' | string algorithm | Task<(byte[], byte[])> |
| ''SignMlDsaAsync'' | byte[] data, byte[] privateKey | Task |
| ''VerifyMlDsaAsync'' | byte[] data, byte[] signature, byte[] publicKey | Task |
| ''GenerateMlKemKeyPairAsync'' | string algorithm | Task<(byte[], byte[])> |
| ''EncapsulateAsync'' | byte[] publicKey | Task<(byte[], byte[])> |
| ''DecapsulateAsync'' | byte[] ciphertext, byte[] privateKey | Task |
| ''CreateEphemeralCertificateAsync'' | string subject, TimeSpan validity, byte[] privateKey | Task |
| ''SignCertificateAsync'' | byte[] tbsCertificate, byte[] privateKey | Task |
===== OpenSSL Path Configuration =====
// Set path before InitializeAsync()
CryptoConfig.OpenSslPath = @"C:\OpenSSL\bin";
var provider = new NativeCryptoProvider();
await provider.InitializeAsync();
**Default search paths:**
^ Operating System ^ Paths ^
| Windows | ''%%.\%%'', ''%%C:\OpenSSL\bin%%'', ''%%PATH%%'' |
| Linux | ''%%/usr/local/lib64%%'', ''%%/usr/lib/x86_64-linux-gnu%%'' |
| macOS | ''%%/opt/homebrew/lib%%'', ''%%/usr/local/lib%%'' |
===== Security Notes =====
* Requires OpenSSL 3.6.0 or higher with PQ algorithms
* Private keys are held in process memory
* For highest security: Explicitly clear keys with ''CryptographicOperations.ZeroMemory''
===== See Also =====
* [[.:start|Providers Namespace]]
* [[.:icryptoprovider|ICryptoProvider]]
* [[.:wasmcryptoprovider|WasmCryptoProvider]]
----
//Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional//