]> git.ipfire.org Git - thirdparty/openssl.git/blame - include/crypto/sm2.h
Add SM2 private key range validation
[thirdparty/openssl.git] / include / crypto / sm2.h
CommitLineData
3d328a44 1/*
eec0ad10 2 * Copyright 2017-2020 The OpenSSL Project Authors. All Rights Reserved.
3d328a44
JL
3 * Copyright 2017 Ribose Inc. All Rights Reserved.
4 * Ported from Ribose contributions from Botan.
5 *
48f4ad77 6 * Licensed under the Apache License 2.0 (the "License"). You may not use
3d328a44
JL
7 * this file except in compliance with the License. You can obtain a copy
8 * in the file LICENSE in the source distribution or at
9 * https://www.openssl.org/source/license.html
10 */
11
ae4186b0
DMSP
12#ifndef OSSL_CRYPTO_SM2_H
13# define OSSL_CRYPTO_SM2_H
1bf2cc23 14# include <openssl/opensslconf.h>
3d328a44 15
1bf2cc23
MC
16# ifndef OPENSSL_NO_SM2
17
18# include <openssl/ec.h>
3d328a44 19
9e49aff2
NT
20int sm2_key_private_check(const EC_KEY *eckey);
21
3d328a44 22/* The default user id as specified in GM/T 0009-2012 */
1bf2cc23 23# define SM2_DEFAULT_USERID "1234567812345678"
3d328a44 24
4803717f
PY
25int sm2_compute_z_digest(uint8_t *out,
26 const EVP_MD *digest,
27 const uint8_t *id,
28 const size_t id_len,
29 const EC_KEY *key);
00433bad 30
3d328a44 31/*
4803717f 32 * SM2 signature operation. Computes Z and then signs H(Z || msg) using SM2
3d328a44 33 */
2167239a 34ECDSA_SIG *sm2_do_sign(const EC_KEY *key,
3d328a44 35 const EVP_MD *digest,
00433bad
PY
36 const uint8_t *id,
37 const size_t id_len,
38 const uint8_t *msg, size_t msg_len);
3d328a44 39
2167239a 40int sm2_do_verify(const EC_KEY *key,
3d328a44
JL
41 const EVP_MD *digest,
42 const ECDSA_SIG *signature,
00433bad
PY
43 const uint8_t *id,
44 const size_t id_len,
45 const uint8_t *msg, size_t msg_len);
3d328a44
JL
46
47/*
ddb634fe 48 * SM2 signature generation.
3d328a44 49 */
d0b79f86
PY
50int sm2_internal_sign(const unsigned char *dgst, int dgstlen,
51 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey);
3d328a44
JL
52
53/*
ddb634fe 54 * SM2 signature verification.
3d328a44 55 */
d0b79f86
PY
56int sm2_internal_verify(const unsigned char *dgst, int dgstlen,
57 const unsigned char *sig, int siglen, EC_KEY *eckey);
3d328a44 58
3d328a44
JL
59/*
60 * SM2 encryption
61 */
2167239a 62int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
e14d6cf6 63 size_t *ct_size);
3d328a44 64
2167239a 65int sm2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
e14d6cf6 66 size_t *pt_size);
4e664750 67
2167239a 68int sm2_encrypt(const EC_KEY *key,
3d328a44
JL
69 const EVP_MD *digest,
70 const uint8_t *msg,
71 size_t msg_len,
72 uint8_t *ciphertext_buf, size_t *ciphertext_len);
73
2167239a 74int sm2_decrypt(const EC_KEY *key,
3d328a44
JL
75 const EVP_MD *digest,
76 const uint8_t *ciphertext,
77 size_t ciphertext_len, uint8_t *ptext_buf, size_t *ptext_len);
78
d0b79f86 79const unsigned char *sm2_algorithmidentifier_encoding(int md_nid, size_t *len);
1bf2cc23 80# endif /* OPENSSL_NO_SM2 */
3d328a44 81#endif