mirror of
https://github.com/guanzhi/GmSSL.git
synced 2026-05-11 19:06:27 +08:00
Update SM9
This commit is contained in:
107
src/sm9_key.c
107
src/sm9_key.c
@@ -54,116 +54,99 @@
|
||||
#include <gmssl/error.h>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
// generate h1 in [1, n-1]
|
||||
int sm9_hash1(sm9_bn_t h1, const char *id, size_t idlen, uint8_t hid)
|
||||
{
|
||||
sm9_fn_t h;
|
||||
SM3_CTX ctx1;
|
||||
SM3_CTX ctx2;
|
||||
|
||||
SM3_CTX ctx;
|
||||
uint8_t prefix[1] = {0x01};
|
||||
uint8_t ct1[4] = {0x00, 0x00, 0x00, 0x01};
|
||||
uint8_t ct2[4] = {0x00, 0x00, 0x00, 0x02};
|
||||
uint8_t buf[64];
|
||||
uint8_t Ha[64];
|
||||
|
||||
sm3_init(&ctx1);
|
||||
sm3_update(&ctx1, prefix, sizeof(prefix));
|
||||
sm3_update(&ctx1, (uint8_t *)id, idlen);
|
||||
sm3_update(&ctx1, &hid, 1);
|
||||
ctx2 = ctx1;
|
||||
sm3_update(&ctx1, ct1, sizeof(ct1));
|
||||
sm3_update(&ctx2, ct2, sizeof(ct2));
|
||||
sm3_finish(&ctx1, buf);
|
||||
sm3_finish(&ctx2, buf + 32);
|
||||
sm3_init(&ctx);
|
||||
sm3_update(&ctx, prefix, sizeof(prefix));
|
||||
sm3_update(&ctx, (uint8_t *)id, idlen);
|
||||
sm3_update(&ctx, &hid, 1);
|
||||
sm3_update(&ctx, ct1, sizeof(ct1));
|
||||
sm3_finish(&ctx, Ha);
|
||||
|
||||
// 这个buflen == 64,我们要将长为40的部分取出来,模 N-1 再加1
|
||||
return -1;
|
||||
sm3_init(&ctx);
|
||||
sm3_update(&ctx, prefix, sizeof(prefix));
|
||||
sm3_update(&ctx, (uint8_t *)id, idlen);
|
||||
sm3_update(&ctx, &hid, 1);
|
||||
sm3_update(&ctx, ct2, sizeof(ct2));
|
||||
sm3_finish(&ctx, Ha + 32);
|
||||
|
||||
sm9_fn_from_hash(h1, Ha);
|
||||
return 1;
|
||||
}
|
||||
|
||||
void sm9_fn_add(sm9_fn_t r, const sm9_fn_t a, const sm9_fn_t b)
|
||||
{
|
||||
}
|
||||
|
||||
void sm9_fn_sub(sm9_fn_t r, const sm9_fn_t a, const sm9_fn_t b)
|
||||
{
|
||||
}
|
||||
|
||||
void sm9_fn_mul(sm9_fn_t r, const sm9_fn_t a, const sm9_fn_t b)
|
||||
{
|
||||
}
|
||||
|
||||
void sm9_fn_inv(sm9_fn_t r, const sm9_fn_t a)
|
||||
{
|
||||
}
|
||||
|
||||
int sm9_fn_is_zero(const sm9_fn_t a)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
int sm9_sign_master_key_generate(SM9_SIGN_MASTER_KEY *master)
|
||||
int sm9_sign_master_key_generate(SM9_SIGN_MASTER_KEY *msk)
|
||||
{
|
||||
// k = rand(1, n-1)
|
||||
//sm9_bn_rand_range(master->ks, SM9_N);
|
||||
sm9_fn_rand(msk->ks);
|
||||
|
||||
// Ppubs = k * P2 in E'(F_p^2)
|
||||
sm9_twist_point_mul_G(&master->Ppubs, master->ks);
|
||||
sm9_twist_point_mul_generator(&msk->Ppubs, msk->ks);
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
int sm9_enc_master_key_generate(SM9_ENC_MASTER_KEY *master)
|
||||
int sm9_enc_master_key_generate(SM9_ENC_MASTER_KEY *msk)
|
||||
{
|
||||
// k = rand(1, n-1)
|
||||
//sm9_bn_rand_range(master->ke, SM9_N);
|
||||
sm9_fn_rand(msk->ke);
|
||||
|
||||
// Ppube = ke * P1 in E(F_p)
|
||||
sm9_point_mul_generator(&master->Ppube, master->ke);
|
||||
sm9_point_mul_generator(&msk->Ppube, msk->ke);
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
int sm9_sign_master_key_extract_key(SM9_SIGN_MASTER_KEY *master, const char *id, size_t idlen, SM9_SIGN_KEY *key)
|
||||
int sm9_sign_master_key_extract_key(SM9_SIGN_MASTER_KEY *msk, const char *id, size_t idlen, SM9_SIGN_KEY *key)
|
||||
{
|
||||
sm9_fn_t t;
|
||||
|
||||
// t1 = H1(ID || hid, N) + ks
|
||||
sm9_hash1(t, id, idlen, SM9_HID_SIGN);
|
||||
sm9_fn_add(t, t, master->ks);
|
||||
sm9_fn_add(t, t, msk->ks);
|
||||
if (sm9_fn_is_zero(t)) {
|
||||
// 这是一个严重问题,意味着整个msk都需要作废了
|
||||
error_print();
|
||||
return -1;
|
||||
}
|
||||
|
||||
// t2 = ks * t1^-1
|
||||
sm9_fn_inv(t, t);
|
||||
sm9_fn_mul(t, t, master->ks);
|
||||
sm9_fn_mul(t, t, msk->ks);
|
||||
|
||||
// ds = t2 * P1
|
||||
sm9_point_mul_generator(&key->ds, t);
|
||||
key->Ppubs = msk->Ppubs;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
int sm9_enc_master_key_extract_key(SM9_ENC_MASTER_KEY *master, const char *id, size_t idlen,
|
||||
int sm9_enc_master_key_extract_key(SM9_ENC_MASTER_KEY *msk, const char *id, size_t idlen,
|
||||
SM9_ENC_KEY *key)
|
||||
{
|
||||
sm9_fn_t t;
|
||||
|
||||
// t1 = H1(ID || hid, N) + ke
|
||||
sm9_hash1(t, id, idlen, SM9_HID_ENC);
|
||||
sm9_fn_add(t, t, master->ke);
|
||||
sm9_fn_add(t, t, msk->ke);
|
||||
if (sm9_fn_is_zero(t)) {
|
||||
error_print();
|
||||
return -1;
|
||||
}
|
||||
|
||||
// t2 = ke * t1^-1
|
||||
sm9_fn_inv(t, t);
|
||||
sm9_fn_mul(t, t, master->ke);
|
||||
sm9_twist_point_mul_G(&key->de, t);
|
||||
sm9_fn_mul(t, t, msk->ke);
|
||||
|
||||
// de = t2 * P2
|
||||
sm9_twist_point_mul_generator(&key->de, t);
|
||||
key->Ppube = msk->Ppube;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user