====== NativeCryptoProvider ======
**Namespace:** ''WvdS.System.Security.Cryptography.Providers''
P/Invoke-bazirani kripto-provider za serverske i desktop aplikacije. Komunicira izravno s OpenSSL 3.6 putem Platform Invocation Services.
===== Pregled =====
''NativeCryptoProvider'' je standardni provider za:
* Blazor Server
* ASP.NET Core
* Desktop aplikacije (Windows, Linux, macOS)
* Konzolne aplikacije
* Windows Services / Linux Daemons
===== Svojstva =====
^ Svojstvo ^ Tip ^ Opis ^
| ''Name'' | string | ''%%"Native (P/Invoke)"%%'' |
| ''IsAvailable'' | bool | ''true'' ako je OpenSSL 3.6 dostupan |
===== Inicijalizacija =====
using WvdS.System.Security.Cryptography.Providers;
// Stvaranje providera
var provider = new NativeCryptoProvider();
// Inicijalizacija (učitava OpenSSL)
await provider.InitializeAsync();
// Provjera dostupnosti
if (provider.IsAvailable)
{
Console.WriteLine($"Provider: {provider.Name}");
Console.WriteLine($"OpenSSL: {provider.GetOpenSslVersion()}");
}
===== ML-DSA Operacije =====
==== GenerateMlDsaKeyPairAsync ====
Generira ML-DSA par ključeva.
var (publicKey, privateKey) = await provider.GenerateMlDsaKeyPairAsync("ML-DSA-65");
// Podržani algoritmi:
// - "ML-DSA-44" (NIST Level 1)
// - "ML-DSA-65" (NIST Level 3, preporučeno)
// - "ML-DSA-87" (NIST Level 5)
==== SignMlDsaAsync ====
Potpisuje podatke s ML-DSA.
byte[] data = Encoding.UTF8.GetBytes("Važni podaci");
byte[] signature = await provider.SignMlDsaAsync(data, privateKey);
==== VerifyMlDsaAsync ====
Verificira ML-DSA potpis.
bool isValid = await provider.VerifyMlDsaAsync(data, signature, publicKey);
===== ML-KEM Operacije =====
==== GenerateMlKemKeyPairAsync ====
Generira ML-KEM par ključeva.
var (publicKey, privateKey) = await provider.GenerateMlKemKeyPairAsync("ML-KEM-768");
// Podržani algoritmi:
// - "ML-KEM-512" (NIST Level 1)
// - "ML-KEM-768" (NIST Level 3, preporučeno)
// - "ML-KEM-1024" (NIST Level 5)
==== EncapsulateAsync ====
Enkapsulira dijeljenu tajnu s javnim ključem.
var (sharedSecret, ciphertext) = await provider.EncapsulateAsync(recipientPublicKey);
// sharedSecret: 32 bajta simetričnog ključa
// ciphertext: Šalje se primatelju
==== DecapsulateAsync ====
Dekapsulira dijeljenu tajnu.
byte[] sharedSecret = await provider.DecapsulateAsync(ciphertext, privateKey);
===== Operacije s certifikatima =====
==== CreateEphemeralCertificateAsync ====
Stvara kratkotrajni ML-DSA certifikat.
var (pubKey, privKey) = await provider.GenerateMlDsaKeyPairAsync();
byte[] certBytes = await provider.CreateEphemeralCertificateAsync(
"CN=Ephemeral Test",
TimeSpan.FromHours(24),
privKey);
var cert = new X509Certificate2(certBytes);
==== SignCertificateAsync ====
Potpisuje TBS podatke certifikata s ML-DSA.
byte[] tbsCertificate = GetTbsCertificate();
byte[] signedCert = await provider.SignCertificateAsync(tbsCertificate, privateKey);
===== Pregled metoda =====
^ Metoda ^ Parametri ^ Povratna vrijednost ^
| ''InitializeAsync()'' | - | Task |
| ''GetOpenSslVersion()'' | - | string |
| ''GenerateMlDsaKeyPairAsync'' | string algorithm | Task<(byte[], byte[])> |
| ''SignMlDsaAsync'' | byte[] data, byte[] privateKey | Task |
| ''VerifyMlDsaAsync'' | byte[] data, byte[] signature, byte[] publicKey | Task |
| ''GenerateMlKemKeyPairAsync'' | string algorithm | Task<(byte[], byte[])> |
| ''EncapsulateAsync'' | byte[] publicKey | Task<(byte[], byte[])> |
| ''DecapsulateAsync'' | byte[] ciphertext, byte[] privateKey | Task |
| ''CreateEphemeralCertificateAsync'' | string subject, TimeSpan validity, byte[] privateKey | Task |
| ''SignCertificateAsync'' | byte[] tbsCertificate, byte[] privateKey | Task |
===== Konfiguracija OpenSSL putanje =====
// Prije InitializeAsync() postaviti putanju
CryptoConfig.OpenSslPath = @"C:\OpenSSL\bin";
var provider = new NativeCryptoProvider();
await provider.InitializeAsync();
**Standardne putanje pretraživanja:**
^ Operacijski sustav ^ Putanje ^
| Windows | ''%%.\%%'', ''%%C:\OpenSSL\bin%%'', ''%%PATH%%'' |
| Linux | ''%%/usr/local/lib64%%'', ''%%/usr/lib/x86_64-linux-gnu%%'' |
| macOS | ''%%/opt/homebrew/lib%%'', ''%%/usr/local/lib%%'' |
===== Napomene o performansama =====
**P/Invoke Performanse:**
* Sinkrono izvršavanje u nativnom kodu
* Task-wrapper za API konzistenciju s WasmCryptoProvider
* Minimalni overhead kroz izravan pristup memoriji
* Thread-safe putem OpenSSL-ove interne sinkronizacije
===== Potpuni primjer =====
using WvdS.System.Security.Cryptography.Providers;
// 1. Inicijalizacija providera
var provider = new NativeCryptoProvider();
await provider.InitializeAsync();
Console.WriteLine($"OpenSSL: {provider.GetOpenSslVersion()}");
// 2. ML-KEM Key Exchange
var (alicePublic, alicePrivate) = await provider.GenerateMlKemKeyPairAsync();
var (bobPublic, bobPrivate) = await provider.GenerateMlKemKeyPairAsync();
// Alice enkapsulira za Boba
var (aliceSecret, ciphertext) = await provider.EncapsulateAsync(bobPublic);
// Bob dekapsulira
var bobSecret = await provider.DecapsulateAsync(ciphertext, bobPrivate);
// Dijeljene tajne su identične
Console.WriteLine($"Keys match: {aliceSecret.SequenceEqual(bobSecret)}");
// 3. ML-DSA Potpis
var (sigPubKey, sigPrivKey) = await provider.GenerateMlDsaKeyPairAsync();
byte[] message = Encoding.UTF8.GetBytes("Važna poruka");
byte[] signature = await provider.SignMlDsaAsync(message, sigPrivKey);
bool isValid = await provider.VerifyMlDsaAsync(message, signature, sigPubKey);
Console.WriteLine($"Signature valid: {isValid}");
===== Sigurnosne napomene =====
* Zahtijeva OpenSSL 3.6.0 ili noviji s PQ algoritmima
* Privatni ključevi se drže u procesnoj memoriji
* Po završetku aplikacije ključevi se ne brišu automatski
* Za najvišu sigurnost: Ključeve eksplicitno obrisati s ''CryptographicOperations.ZeroMemory''
===== Vidi također =====
* [[.:start|Providers Namespace]]
* [[.:icryptoprovider|ICryptoProvider]]
* [[.:wasmcryptoprovider|WasmCryptoProvider]]
* [[.:cryptoproviderfactory|CryptoProviderFactory]]
* [[..:interop:opensslinterop|OpenSslInterop]]
----
//Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional//