Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 1 | /* |
Matt Caswell | b0edda1 | 2018-03-20 13:00:17 +0000 | [diff] [blame] | 2 | * Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved. |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 3 | * Copyright 2017 Ribose Inc. All Rights Reserved. |
| 4 | * Ported from Ribose contributions from Botan. |
| 5 | * |
| 6 | * Licensed under the OpenSSL license (the "License"). You may not use |
| 7 | * this file except in compliance with the License. You can obtain a copy |
| 8 | * in the file LICENSE in the source distribution or at |
| 9 | * https://www.openssl.org/source/license.html |
| 10 | */ |
| 11 | |
| 12 | #ifndef HEADER_SM2_H |
| 13 | # define HEADER_SM2_H |
Matt Caswell | 1bf2cc2 | 2018-03-19 16:17:58 +0000 | [diff] [blame] | 14 | # include <openssl/opensslconf.h> |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 15 | |
Matt Caswell | 1bf2cc2 | 2018-03-19 16:17:58 +0000 | [diff] [blame] | 16 | # ifndef OPENSSL_NO_SM2 |
| 17 | |
| 18 | # include <openssl/ec.h> |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 19 | |
| 20 | /* The default user id as specified in GM/T 0009-2012 */ |
Matt Caswell | 1bf2cc2 | 2018-03-19 16:17:58 +0000 | [diff] [blame] | 21 | # define SM2_DEFAULT_USERID "1234567812345678" |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 22 | |
Paul Yang | 00433ba | 2018-09-04 01:24:55 +0800 | [diff] [blame^] | 23 | int sm2_compute_userid_digest(uint8_t *out, |
| 24 | const EVP_MD *digest, |
| 25 | const uint8_t *id, |
| 26 | const size_t id_len, |
| 27 | const EC_KEY *key); |
| 28 | |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 29 | /* |
| 30 | * SM2 signature operation. Computes ZA (user id digest) and then signs |
| 31 | * H(ZA || msg) using SM2 |
| 32 | */ |
Matt Caswell | 2167239 | 2018-05-31 15:53:30 +0100 | [diff] [blame] | 33 | ECDSA_SIG *sm2_do_sign(const EC_KEY *key, |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 34 | const EVP_MD *digest, |
Paul Yang | 00433ba | 2018-09-04 01:24:55 +0800 | [diff] [blame^] | 35 | const uint8_t *id, |
| 36 | const size_t id_len, |
| 37 | const uint8_t *msg, size_t msg_len); |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 38 | |
Matt Caswell | 2167239 | 2018-05-31 15:53:30 +0100 | [diff] [blame] | 39 | int sm2_do_verify(const EC_KEY *key, |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 40 | const EVP_MD *digest, |
| 41 | const ECDSA_SIG *signature, |
Paul Yang | 00433ba | 2018-09-04 01:24:55 +0800 | [diff] [blame^] | 42 | const uint8_t *id, |
| 43 | const size_t id_len, |
| 44 | const uint8_t *msg, size_t msg_len); |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 45 | |
| 46 | /* |
Jack Lloyd | ddb634f | 2018-06-18 15:51:56 -0400 | [diff] [blame] | 47 | * SM2 signature generation. |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 48 | */ |
Jack Lloyd | ddb634f | 2018-06-18 15:51:56 -0400 | [diff] [blame] | 49 | int sm2_sign(const unsigned char *dgst, int dgstlen, |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 50 | unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); |
| 51 | |
| 52 | /* |
Jack Lloyd | ddb634f | 2018-06-18 15:51:56 -0400 | [diff] [blame] | 53 | * SM2 signature verification. |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 54 | */ |
Jack Lloyd | ddb634f | 2018-06-18 15:51:56 -0400 | [diff] [blame] | 55 | int sm2_verify(const unsigned char *dgst, int dgstlen, |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 56 | const unsigned char *sig, int siglen, EC_KEY *eckey); |
| 57 | |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 58 | /* |
| 59 | * SM2 encryption |
| 60 | */ |
Matt Caswell | 2167239 | 2018-05-31 15:53:30 +0100 | [diff] [blame] | 61 | int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, |
Matt Caswell | e14d6cf | 2018-05-31 13:49:47 +0100 | [diff] [blame] | 62 | size_t *ct_size); |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 63 | |
Matt Caswell | 2167239 | 2018-05-31 15:53:30 +0100 | [diff] [blame] | 64 | int sm2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, |
Matt Caswell | e14d6cf | 2018-05-31 13:49:47 +0100 | [diff] [blame] | 65 | size_t *pt_size); |
Jack Lloyd | 4e66475 | 2018-02-09 12:21:56 -0500 | [diff] [blame] | 66 | |
Matt Caswell | 2167239 | 2018-05-31 15:53:30 +0100 | [diff] [blame] | 67 | int sm2_encrypt(const EC_KEY *key, |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 68 | const EVP_MD *digest, |
| 69 | const uint8_t *msg, |
| 70 | size_t msg_len, |
| 71 | uint8_t *ciphertext_buf, size_t *ciphertext_len); |
| 72 | |
Matt Caswell | 2167239 | 2018-05-31 15:53:30 +0100 | [diff] [blame] | 73 | int sm2_decrypt(const EC_KEY *key, |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 74 | const EVP_MD *digest, |
| 75 | const uint8_t *ciphertext, |
| 76 | size_t ciphertext_len, uint8_t *ptext_buf, size_t *ptext_len); |
| 77 | |
Matt Caswell | 1bf2cc2 | 2018-03-19 16:17:58 +0000 | [diff] [blame] | 78 | # endif /* OPENSSL_NO_SM2 */ |
Jack Lloyd | 3d328a4 | 2018-01-24 11:56:02 -0500 | [diff] [blame] | 79 | #endif |