1 | /* |
2 | * Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved. |
3 | * Copyright 2017 Ribose Inc. All Rights Reserved. |
4 | * Ported from Ribose contributions from Botan. |
5 | * |
6 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
7 | * this file except in compliance with the License. You can obtain a copy |
8 | * in the file LICENSE in the source distribution or at |
9 | * https://www.openssl.org/source/license.html |
10 | */ |
11 | |
12 | #ifndef OSSL_CRYPTO_SM2_H |
13 | # define OSSL_CRYPTO_SM2_H |
14 | # include <openssl/opensslconf.h> |
15 | |
16 | # ifndef OPENSSL_NO_SM2 |
17 | |
18 | # include <openssl/ec.h> |
19 | |
20 | /* The default user id as specified in GM/T 0009-2012 */ |
21 | # define SM2_DEFAULT_USERID "1234567812345678" |
22 | |
23 | int sm2_compute_z_digest(uint8_t *out, |
24 | const EVP_MD *digest, |
25 | const uint8_t *id, |
26 | const size_t id_len, |
27 | const EC_KEY *key); |
28 | |
29 | /* |
30 | * SM2 signature operation. Computes Z and then signs H(Z || msg) using SM2 |
31 | */ |
32 | ECDSA_SIG *sm2_do_sign(const EC_KEY *key, |
33 | const EVP_MD *digest, |
34 | const uint8_t *id, |
35 | const size_t id_len, |
36 | const uint8_t *msg, size_t msg_len); |
37 | |
38 | int sm2_do_verify(const EC_KEY *key, |
39 | const EVP_MD *digest, |
40 | const ECDSA_SIG *signature, |
41 | const uint8_t *id, |
42 | const size_t id_len, |
43 | const uint8_t *msg, size_t msg_len); |
44 | |
45 | /* |
46 | * SM2 signature generation. |
47 | */ |
48 | int sm2_sign(const unsigned char *dgst, int dgstlen, |
49 | unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); |
50 | |
51 | /* |
52 | * SM2 signature verification. |
53 | */ |
54 | int sm2_verify(const unsigned char *dgst, int dgstlen, |
55 | const unsigned char *sig, int siglen, EC_KEY *eckey); |
56 | |
57 | /* |
58 | * SM2 encryption |
59 | */ |
60 | int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, |
61 | size_t *ct_size); |
62 | |
63 | int sm2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, |
64 | size_t *pt_size); |
65 | |
66 | int sm2_encrypt(const EC_KEY *key, |
67 | const EVP_MD *digest, |
68 | const uint8_t *msg, |
69 | size_t msg_len, |
70 | uint8_t *ciphertext_buf, size_t *ciphertext_len); |
71 | |
72 | int sm2_decrypt(const EC_KEY *key, |
73 | const EVP_MD *digest, |
74 | const uint8_t *ciphertext, |
75 | size_t ciphertext_len, uint8_t *ptext_buf, size_t *ptext_len); |
76 | |
77 | # endif /* OPENSSL_NO_SM2 */ |
78 | #endif |
79 | |