API Reference
All functions are declared in the header wvds_crypto.h.
Request Builder
wvds_build_aes_encrypt_request
int wvds_build_aes_encrypt_request( uint8_t* buffer, // [out] Destination buffer size_t* buffer_len, // [in/out] Buffer size / actual length uint32_t key_id, // Key-ID const void* aad, // Additional Authenticated Data size_t aad_len, // AAD length const void* plaintext, // Data to encrypt size_t pt_len // Plaintext length );
| Return | Description |
| 0 | Success |
| -1 | Buffer too small |
| -2 | Payload too large (> 64 KB) |
wvds_build_aes_decrypt_request
int wvds_build_aes_decrypt_request( uint8_t* buffer, size_t* buffer_len, uint32_t key_id, const uint8_t nonce[12], const uint8_t tag[16], const void* aad, size_t aad_len, const void* ciphertext, size_t ct_len );
wvds_build_mldsa_sign_request
int wvds_build_mldsa_sign_request( uint8_t* buffer, size_t* buffer_len, uint32_t key_id, // Private Key ID const void* message, size_t msg_len );
wvds_build_mldsa_verify_request
int wvds_build_mldsa_verify_request( uint8_t* buffer, size_t* buffer_len, uint32_t key_id, // Public Key ID const void* message, size_t msg_len, const void* signature, size_t sig_len );
wvds_build_mlkem_keygen_request
int wvds_build_mlkem_keygen_request( uint8_t* buffer, size_t* buffer_len, uint32_t key_id // ID for new key pair );
wvds_build_mlkem_encaps_request
int wvds_build_mlkem_encaps_request( uint8_t* buffer, size_t* buffer_len, const void* public_key, size_t pk_len );
wvds_build_mlkem_decaps_request
int wvds_build_mlkem_decaps_request( uint8_t* buffer, size_t* buffer_len, uint32_t key_id, // Private Key ID const void* ciphertext, size_t ct_len );
Response Parser
wvds_parse_aes_encrypt_response
int wvds_parse_aes_encrypt_response( const uint8_t* response, size_t response_len, uint8_t nonce[12], // [out] Generated nonce uint8_t tag[16], // [out] Authentication Tag uint8_t* ciphertext, // [out] Ciphertext size_t* ct_len // [out] Ciphertext length );
| Return | Description |
| 0 | Success |
| >0 | Status Code (see Protocol) |
| -1 | Response invalid |
wvds_parse_aes_decrypt_response
int wvds_parse_aes_decrypt_response( const uint8_t* response, size_t response_len, uint8_t* plaintext, // [out] Decrypted plaintext size_t* pt_len // [out] Plaintext length );
Return 6 = DECRYPTION_FAILED
The data was tampered with or wrong key/AAD was used!
wvds_parse_mldsa_sign_response
int wvds_parse_mldsa_sign_response( const uint8_t* response, size_t response_len, uint8_t* signature, // [out] Signature (min 4096 bytes) size_t* sig_len // [out] Signature length );
wvds_parse_mldsa_verify_response
int wvds_parse_mldsa_verify_response( const uint8_t* response, size_t response_len, int* valid // [out] 1 = valid, 0 = invalid );
wvds_parse_mlkem_keygen_response
int wvds_parse_mlkem_keygen_response( const uint8_t* response, size_t response_len, uint8_t* public_key, // [out] Public Key (min 2048 bytes) size_t* pk_len // [out] Public Key length );
wvds_parse_mlkem_encaps_response
int wvds_parse_mlkem_encaps_response( const uint8_t* response, size_t response_len, uint8_t* ciphertext, // [out] Ciphertext (min 2048 bytes) size_t* ct_len, // [out] Ciphertext length uint8_t shared_secret[32] // [out] Shared Secret );
wvds_parse_mlkem_decaps_response
int wvds_parse_mlkem_decaps_response( const uint8_t* response, size_t response_len, uint8_t shared_secret[32] // [out] Shared Secret );
Utility Functions
wvds_get_error_code
int wvds_get_error_code( const uint8_t* response, size_t response_len );
Extracts the status code from any response.
| Return | Description |
| 0 | Success |
| 1-9 | Error code (see Protocol) |
| -1 | Response invalid |
wvds_error_to_string
const char* wvds_error_to_string(int error_code);
| Code | String |
| 0 | „Success“ |
| 1 | „Invalid header“ |
| 2 | „Invalid request type“ |
| 3 | „Invalid payload“ |
| 4 | „Key not found“ |
| 5 | „Crypto error“ |
| 6 | „Decryption failed“ |
| 7 | „Rate limited“ |
| 8 | „Nonce reuse detected“ |
| 9 | „Payload too large“ |
Constants
// Request Types #define WVDS_REQ_AES_ENCRYPT 0x01 #define WVDS_REQ_AES_DECRYPT 0x02 #define WVDS_REQ_MLDSA_SIGN 0x10 #define WVDS_REQ_MLDSA_VERIFY 0x11 #define WVDS_REQ_MLKEM_KEYGEN 0x20 #define WVDS_REQ_MLKEM_ENCAPS 0x21 #define WVDS_REQ_MLKEM_DECAPS 0x22 // Sizes #define WVDS_AES_NONCE_SIZE 12 #define WVDS_AES_TAG_SIZE 16 #define WVDS_AES_KEY_SIZE 32 #define WVDS_MLDSA65_SIG_SIZE 3293 #define WVDS_MLDSA65_PK_SIZE 1952 #define WVDS_MLKEM768_PK_SIZE 1184 #define WVDS_MLKEM768_CT_SIZE 1088 #define WVDS_SHARED_SECRET_SIZE 32 // Limits #define WVDS_MAX_PAYLOAD_SIZE 65536 #define WVDS_HEADER_SIZE 8
Zuletzt geändert: on 2026/01/29 at 09:52 PM