]> git.ipfire.org Git - thirdparty/openssl.git/blob - include/openssl/sm2.h
Update copyright year
[thirdparty/openssl.git] / include / openssl / sm2.h
1 /*
2 * Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved.
3 * Copyright 2017 Ribose Inc. All Rights Reserved.
4 * Ported from Ribose contributions from Botan.
5 *
6 * Licensed under the OpenSSL license (the "License"). You may not use
7 * this file except in compliance with the License. You can obtain a copy
8 * in the file LICENSE in the source distribution or at
9 * https://www.openssl.org/source/license.html
10 */
11
12 #ifndef HEADER_SM2_H
13 # define HEADER_SM2_H
14 # include <openssl/opensslconf.h>
15
16 # ifndef OPENSSL_NO_SM2
17
18 # ifdef __cplusplus
19 extern "C" {
20 # endif
21
22 # include <openssl/ec.h>
23
24 /* The default user id as specified in GM/T 0009-2012 */
25 # define SM2_DEFAULT_USERID "1234567812345678"
26
27 int SM2_compute_userid_digest(uint8_t *out,
28 const EVP_MD *digest,
29 const char *user_id, const EC_KEY *key);
30
31 /*
32 * SM2 signature operation. Computes ZA (user id digest) and then signs
33 * H(ZA || msg) using SM2
34 */
35 ECDSA_SIG *SM2_do_sign(const EC_KEY *key,
36 const EVP_MD *digest,
37 const char *user_id, const uint8_t *msg, size_t msg_len);
38
39 int SM2_do_verify(const EC_KEY *key,
40 const EVP_MD *digest,
41 const ECDSA_SIG *signature,
42 const char *user_id, const uint8_t *msg, size_t msg_len);
43
44 /*
45 * SM2 signature generation. Assumes input is an SM3 digest
46 */
47 int SM2_sign(int type, const unsigned char *dgst, int dgstlen,
48 unsigned char *sig, unsigned int *siglen, EC_KEY *eckey);
49
50 /*
51 * SM2 signature verification. Assumes input is an SM3 digest
52 */
53 int SM2_verify(int type, const unsigned char *dgst, int dgstlen,
54 const unsigned char *sig, int siglen, EC_KEY *eckey);
55
56
57 /*
58 * SM2 encryption
59 */
60 size_t SM2_ciphertext_size(const EC_KEY *key,
61 const EVP_MD *digest,
62 size_t msg_len);
63
64 size_t SM2_plaintext_size(const EC_KEY *key,
65 const EVP_MD *digest,
66 size_t msg_len);
67
68 int SM2_encrypt(const EC_KEY *key,
69 const EVP_MD *digest,
70 const uint8_t *msg,
71 size_t msg_len,
72 uint8_t *ciphertext_buf, size_t *ciphertext_len);
73
74 int SM2_decrypt(const EC_KEY *key,
75 const EVP_MD *digest,
76 const uint8_t *ciphertext,
77 size_t ciphertext_len, uint8_t *ptext_buf, size_t *ptext_len);
78
79 int ERR_load_SM2_strings(void);
80
81 # ifdef __cplusplus
82 }
83 # endif
84
85 # endif /* OPENSSL_NO_SM2 */
86 #endif