2018-01-24 16:56:02 +00:00
|
|
|
/*
|
2018-03-20 13:00:17 +00:00
|
|
|
* Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2018-01-24 16:56:02 +00:00
|
|
|
* Copyright 2017 Ribose Inc. All Rights Reserved.
|
|
|
|
* Ported from Ribose contributions from Botan.
|
|
|
|
*
|
2018-12-06 12:12:35 +00:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2018-01-24 16:56:02 +00:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef HEADER_SM2_H
|
|
|
|
# define HEADER_SM2_H
|
2018-03-19 16:17:58 +00:00
|
|
|
# include <openssl/opensslconf.h>
|
2018-01-24 16:56:02 +00:00
|
|
|
|
2018-03-19 16:17:58 +00:00
|
|
|
# ifndef OPENSSL_NO_SM2
|
|
|
|
|
|
|
|
# include <openssl/ec.h>
|
2018-01-24 16:56:02 +00:00
|
|
|
|
|
|
|
/* The default user id as specified in GM/T 0009-2012 */
|
2018-03-19 16:17:58 +00:00
|
|
|
# define SM2_DEFAULT_USERID "1234567812345678"
|
2018-01-24 16:56:02 +00:00
|
|
|
|
2018-09-04 09:21:10 +00:00
|
|
|
int sm2_compute_z_digest(uint8_t *out,
|
|
|
|
const EVP_MD *digest,
|
|
|
|
const uint8_t *id,
|
|
|
|
const size_t id_len,
|
|
|
|
const EC_KEY *key);
|
2018-09-03 17:24:55 +00:00
|
|
|
|
2018-01-24 16:56:02 +00:00
|
|
|
/*
|
2018-09-04 09:21:10 +00:00
|
|
|
* SM2 signature operation. Computes Z and then signs H(Z || msg) using SM2
|
2018-01-24 16:56:02 +00:00
|
|
|
*/
|
2018-05-31 14:53:30 +00:00
|
|
|
ECDSA_SIG *sm2_do_sign(const EC_KEY *key,
|
2018-01-24 16:56:02 +00:00
|
|
|
const EVP_MD *digest,
|
2018-09-03 17:24:55 +00:00
|
|
|
const uint8_t *id,
|
|
|
|
const size_t id_len,
|
|
|
|
const uint8_t *msg, size_t msg_len);
|
2018-01-24 16:56:02 +00:00
|
|
|
|
2018-05-31 14:53:30 +00:00
|
|
|
int sm2_do_verify(const EC_KEY *key,
|
2018-01-24 16:56:02 +00:00
|
|
|
const EVP_MD *digest,
|
|
|
|
const ECDSA_SIG *signature,
|
2018-09-03 17:24:55 +00:00
|
|
|
const uint8_t *id,
|
|
|
|
const size_t id_len,
|
|
|
|
const uint8_t *msg, size_t msg_len);
|
2018-01-24 16:56:02 +00:00
|
|
|
|
|
|
|
/*
|
2018-06-18 19:51:56 +00:00
|
|
|
* SM2 signature generation.
|
2018-01-24 16:56:02 +00:00
|
|
|
*/
|
2018-06-18 19:51:56 +00:00
|
|
|
int sm2_sign(const unsigned char *dgst, int dgstlen,
|
2018-01-24 16:56:02 +00:00
|
|
|
unsigned char *sig, unsigned int *siglen, EC_KEY *eckey);
|
|
|
|
|
|
|
|
/*
|
2018-06-18 19:51:56 +00:00
|
|
|
* SM2 signature verification.
|
2018-01-24 16:56:02 +00:00
|
|
|
*/
|
2018-06-18 19:51:56 +00:00
|
|
|
int sm2_verify(const unsigned char *dgst, int dgstlen,
|
2018-01-24 16:56:02 +00:00
|
|
|
const unsigned char *sig, int siglen, EC_KEY *eckey);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* SM2 encryption
|
|
|
|
*/
|
2018-05-31 14:53:30 +00:00
|
|
|
int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
|
2018-05-31 12:49:47 +00:00
|
|
|
size_t *ct_size);
|
2018-01-24 16:56:02 +00:00
|
|
|
|
2018-05-31 14:53:30 +00:00
|
|
|
int sm2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
|
2018-05-31 12:49:47 +00:00
|
|
|
size_t *pt_size);
|
2018-02-09 17:21:56 +00:00
|
|
|
|
2018-05-31 14:53:30 +00:00
|
|
|
int sm2_encrypt(const EC_KEY *key,
|
2018-01-24 16:56:02 +00:00
|
|
|
const EVP_MD *digest,
|
|
|
|
const uint8_t *msg,
|
|
|
|
size_t msg_len,
|
|
|
|
uint8_t *ciphertext_buf, size_t *ciphertext_len);
|
|
|
|
|
2018-05-31 14:53:30 +00:00
|
|
|
int sm2_decrypt(const EC_KEY *key,
|
2018-01-24 16:56:02 +00:00
|
|
|
const EVP_MD *digest,
|
|
|
|
const uint8_t *ciphertext,
|
|
|
|
size_t ciphertext_len, uint8_t *ptext_buf, size_t *ptext_len);
|
|
|
|
|
2018-03-19 16:17:58 +00:00
|
|
|
# endif /* OPENSSL_NO_SM2 */
|
2018-01-24 16:56:02 +00:00
|
|
|
#endif
|