fork of https://github.com/oxigraph/rocksdb and https://github.com/facebook/rocksdb for nextgraph and oxigraph
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
155 lines
8.0 KiB
155 lines
8.0 KiB
1 year ago
|
/*******************************************************************************
|
||
|
* Copyright (C) 2021 Intel Corporation
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the 'License');
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing,
|
||
|
* software distributed under the License is distributed on an 'AS IS' BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions
|
||
|
* and limitations under the License.
|
||
|
*
|
||
|
*******************************************************************************/
|
||
|
|
||
|
#ifndef EC_SM2_H
|
||
|
#define EC_SM2_H
|
||
|
|
||
|
#include <crypto_mb/defs.h>
|
||
|
#include <crypto_mb/status.h>
|
||
|
|
||
|
#ifndef BN_OPENSSL_DISABLE
|
||
|
#include <openssl/bn.h>
|
||
|
#include <openssl/ec.h>
|
||
|
#endif // BN_OPENSSL_DISABLE
|
||
|
|
||
|
/*
|
||
|
// Computes public key
|
||
|
// pa_pubx[] array of pointers to the public keys X-coordinates
|
||
|
// pa_puby[] array of pointers to the public keys Y-coordinates
|
||
|
// pa_pubz[] array of pointers to the public keys Z-coordinates (or NULL, if affine coordinate requested)
|
||
|
// pa_skey[] array of pointers to the private keys
|
||
|
// pBuffer pointer to the scratch buffer
|
||
|
*/
|
||
|
EXTERN_C mbx_status mbx_sm2_ecpublic_key_mb8(int64u* pa_pubx[8],
|
||
|
int64u* pa_puby[8],
|
||
|
int64u* pa_pubz[8],
|
||
|
const int64u* const pa_skey[8],
|
||
|
int8u* pBuffer);
|
||
|
|
||
|
/*
|
||
|
// Computes shared key
|
||
|
// pa_shared_key[] array of pointers to the shared keys
|
||
|
// pa_skey[] array of pointers to the own (ephemeral) private keys
|
||
|
// pa_pubx[] array of pointers to the party's public keys X-coordinates
|
||
|
// pa_puby[] array of pointers to the party's public keys Y-coordinates
|
||
|
// pa_pubz[] array of pointers to the party's public keys Z-coordinates (or NULL, if affine coordinate requested)
|
||
|
// pBuffer pointer to the scratch buffer
|
||
|
//
|
||
|
// Note:
|
||
|
// This function implements ECDHE over SM2 curve according to IEEE 1363-2000 standard.
|
||
|
*/
|
||
|
EXTERN_C mbx_status mbx_sm2_ecdh_mb8(int8u* pa_shared_key[8],
|
||
|
const int64u* const pa_skey[8],
|
||
|
const int64u* const pa_pubx[8],
|
||
|
const int64u* const pa_puby[8],
|
||
|
const int64u* const pa_pubz[8],
|
||
|
int8u* pBuffer);
|
||
|
|
||
|
/*
|
||
|
// Computes SM2 ECDSA signature
|
||
|
// pa_sign_r[] array of pointers to the computed r-components of the signatures
|
||
|
// pa_sign_s[] array of pointers to the computed s-components of the signatures
|
||
|
// pa_user_id[] array of pointers to the users ID
|
||
|
// user_id_len[] array of users ID length
|
||
|
// pa_msg[] array of pointers to the messages are being signed
|
||
|
// msg_len[] array of messages length
|
||
|
// pa_eph_skey[] array of pointers to the signer's ephemeral private keys
|
||
|
// pa_reg_skey[] array of pointers to the signer's regular private keys
|
||
|
// pa_pubx[] array of pointers to the party's public keys X-coordinates
|
||
|
// pa_puby[] array of pointers to the party's public keys Y-coordinates
|
||
|
// pa_pubz[] array of pointers to the party's public keys Z-coordinates (or NULL, if affine coordinate requested)
|
||
|
// pBuffer pointer to the scratch buffer
|
||
|
*/
|
||
|
EXTERN_C mbx_status mbx_sm2_ecdsa_sign_mb8(int8u* pa_sign_r[8],
|
||
|
int8u* pa_sign_s[8],
|
||
|
const int8u* const pa_user_id[8],
|
||
|
const int user_id_len[8],
|
||
|
const int8u* const pa_msg[8],
|
||
|
const int msg_len[8],
|
||
|
const int64u* const pa_eph_skey[8],
|
||
|
const int64u* const pa_reg_skey[8],
|
||
|
const int64u* const pa_pubx[8],
|
||
|
const int64u* const pa_puby[8],
|
||
|
const int64u* const pa_pubz[8],
|
||
|
int8u* pBuffer);
|
||
|
|
||
|
/*
|
||
|
// Verifies SM2 ECDSA signature
|
||
|
// pa_sign_r[] array of pointers to the computed r-components of the signatures
|
||
|
// pa_sign_s[] array of pointers to the computed s-components of the signatures
|
||
|
// pa_user_id[] array of pointers to the users ID
|
||
|
// user_id_len[] array of users ID length
|
||
|
// pa_msg[] array of pointers to the messages are being signed
|
||
|
// msg_len[] array of messages length
|
||
|
// pa_pubx[] array of pointers to the signer's public keys X-coordinates
|
||
|
// pa_puby[] array of pointers to the signer's public keys Y-coordinates
|
||
|
// pa_pubz[] array of pointers to the signer's public keys Z-coordinates (or NULL, if affine coordinate requested)
|
||
|
// pBuffer pointer to the scratch buffer
|
||
|
*/
|
||
|
EXTERN_C mbx_status mbx_sm2_ecdsa_verify_mb8(const int8u* const pa_sign_r[8],
|
||
|
const int8u* const pa_sign_s[8],
|
||
|
const int8u* const pa_user_id[8],
|
||
|
const int user_id_len[8],
|
||
|
const int8u* const pa_msg[8],
|
||
|
const int msg_len[8],
|
||
|
const int64u* const pa_pubx[8],
|
||
|
const int64u* const pa_puby[8],
|
||
|
const int64u* const pa_pubz[8],
|
||
|
int8u* pBuffer);
|
||
|
|
||
|
/*
|
||
|
// OpenSSL's specific similar APIs
|
||
|
*/
|
||
|
#ifndef BN_OPENSSL_DISABLE
|
||
|
EXTERN_C mbx_status mbx_sm2_ecpublic_key_ssl_mb8(BIGNUM* pa_pubx[8],
|
||
|
BIGNUM* pa_puby[8],
|
||
|
BIGNUM* pa_pubz[8],
|
||
|
const BIGNUM* const pa_skey[8],
|
||
|
int8u* pBuffer);
|
||
|
|
||
|
EXTERN_C mbx_status mbx_sm2_ecdh_ssl_mb8(int8u* pa_shared_key[8],
|
||
|
const BIGNUM* const pa_skey[8],
|
||
|
const BIGNUM* const pa_pubx[8],
|
||
|
const BIGNUM* const pa_puby[8],
|
||
|
const BIGNUM* const pa_pubz[8],
|
||
|
int8u* pBuffer);
|
||
|
|
||
|
EXTERN_C mbx_status mbx_sm2_ecdsa_sign_ssl_mb8(int8u* pa_sign_r[8],
|
||
|
int8u* pa_sign_s[8],
|
||
|
const int8u* const pa_user_id[8],
|
||
|
const int user_id_len[8],
|
||
|
const int8u* const pa_msg[8],
|
||
|
const int msg_len[8],
|
||
|
const BIGNUM* const pa_eph_skey[8],
|
||
|
const BIGNUM* const pa_reg_skey[8],
|
||
|
const BIGNUM* const pa_pubx[8],
|
||
|
const BIGNUM* const pa_puby[8],
|
||
|
const BIGNUM* const pa_pubz[8],
|
||
|
int8u* pBuffer);
|
||
|
|
||
|
EXTERN_C mbx_status mbx_sm2_ecdsa_verify_ssl_mb8(const ECDSA_SIG* const pa_sig[8],
|
||
|
const int8u* const pa_user_id[8],
|
||
|
const int user_id_len[8],
|
||
|
const int8u* const pa_msg[8],
|
||
|
const int msg_len[8],
|
||
|
const BIGNUM* const pa_pubx[8],
|
||
|
const BIGNUM* const pa_puby[8],
|
||
|
const BIGNUM* const pa_pubz[8],
|
||
|
int8u* pBuffer);
|
||
|
#endif // BN_OPENSSL_DISABLE
|
||
|
#endif /* EC_SM2_H */
|