2
0

sm2.h 2.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182
  1. /*
  2. * Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved.
  3. * Copyright 2017 Ribose Inc. All Rights Reserved.
  4. * Ported from Ribose contributions from Botan.
  5. *
  6. * Licensed under the OpenSSL license (the "License"). You may not use
  7. * this file except in compliance with the License. You can obtain a copy
  8. * in the file LICENSE in the source distribution or at
  9. * https://www.openssl.org/source/license.html
  10. */
  11. #ifndef HEADER_SM2_H
  12. # define HEADER_SM2_H
  13. # include <openssl/opensslconf.h>
  14. # ifndef OPENSSL_NO_SM2
  15. # ifdef __cplusplus
  16. extern "C" {
  17. # endif
  18. # include <openssl/ec.h>
  19. /* The default user id as specified in GM/T 0009-2012 */
  20. # define SM2_DEFAULT_USERID "1234567812345678"
  21. int sm2_compute_userid_digest(uint8_t *out,
  22. const EVP_MD *digest,
  23. const char *user_id, const EC_KEY *key);
  24. /*
  25. * SM2 signature operation. Computes ZA (user id digest) and then signs
  26. * H(ZA || msg) using SM2
  27. */
  28. ECDSA_SIG *sm2_do_sign(const EC_KEY *key,
  29. const EVP_MD *digest,
  30. const char *user_id, const uint8_t *msg, size_t msg_len);
  31. int sm2_do_verify(const EC_KEY *key,
  32. const EVP_MD *digest,
  33. const ECDSA_SIG *signature,
  34. const char *user_id, const uint8_t *msg, size_t msg_len);
  35. /*
  36. * SM2 signature generation.
  37. */
  38. int sm2_sign(const unsigned char *dgst, int dgstlen,
  39. unsigned char *sig, unsigned int *siglen, EC_KEY *eckey);
  40. /*
  41. * SM2 signature verification.
  42. */
  43. int sm2_verify(const unsigned char *dgst, int dgstlen,
  44. const unsigned char *sig, int siglen, EC_KEY *eckey);
  45. /*
  46. * SM2 encryption
  47. */
  48. int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
  49. size_t *ct_size);
  50. int sm2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
  51. size_t *pt_size);
  52. int sm2_encrypt(const EC_KEY *key,
  53. const EVP_MD *digest,
  54. const uint8_t *msg,
  55. size_t msg_len,
  56. uint8_t *ciphertext_buf, size_t *ciphertext_len);
  57. int sm2_decrypt(const EC_KEY *key,
  58. const EVP_MD *digest,
  59. const uint8_t *ciphertext,
  60. size_t ciphertext_len, uint8_t *ptext_buf, size_t *ptext_len);
  61. # ifdef __cplusplus
  62. }
  63. # endif
  64. # endif /* OPENSSL_NO_SM2 */
  65. #endif