mirror of
https://github.com/guanzhi/GmSSL.git
synced 2026-05-06 16:36:16 +08:00
Rewrite TLS 1.2 as a state machine
This commit is contained in:
@@ -19,11 +19,11 @@
|
||||
#include <gmssl/oid.h>
|
||||
#include <gmssl/asn1.h>
|
||||
#include <gmssl/sm2.h>
|
||||
#include <gmssl/secp256r1_key.h>
|
||||
#include <gmssl/ecdsa.h>
|
||||
#include <gmssl/lms.h>
|
||||
#include <gmssl/xmss.h>
|
||||
#include <gmssl/sphincs.h>
|
||||
#include <gmssl/secp256r1_key.h>
|
||||
|
||||
|
||||
#ifdef __cplusplus
|
||||
@@ -31,18 +31,6 @@ extern "C" {
|
||||
#endif
|
||||
|
||||
|
||||
/*
|
||||
Supported public key type OIDs
|
||||
* OID_ec_public_key
|
||||
* OID_rsa_encryption
|
||||
* OID_lms_hashsig
|
||||
* OID_hss_lms_hashsig
|
||||
* OID_xmss_hashsig
|
||||
* OID_xmssmt_hashsig
|
||||
* OID_sphincs_hashsig
|
||||
|
||||
|
||||
*/
|
||||
typedef struct {
|
||||
int algor;
|
||||
int algor_param;
|
||||
@@ -55,67 +43,115 @@ typedef struct {
|
||||
SPHINCS_KEY sphincs_key;
|
||||
SECP256R1_KEY secp256r1_key;
|
||||
} u;
|
||||
const char *signer_id;
|
||||
size_t signer_idlen;
|
||||
} X509_KEY;
|
||||
|
||||
|
||||
int x509_key_set_sm2_key(X509_KEY *x509_key, const SM2_KEY *sm2_key);
|
||||
int x509_key_set_secp256r1_key(X509_KEY *x509_key, const SECP256R1_KEY *secp256r1_key);
|
||||
int x509_key_set_lms_key(X509_KEY *x509_key, const LMS_KEY *lms_key);
|
||||
int x509_key_set_hss_key(X509_KEY *x509_key, const HSS_KEY *hss_key);
|
||||
int x509_key_set_xmss_key(X509_KEY *x509_key, const XMSS_KEY *xmss_key);
|
||||
int x509_key_set_xmssmt_key(X509_KEY *x509_key, const XMSSMT_KEY *xmssmt_key);
|
||||
int x509_key_set_sphincs_key(X509_KEY *x509_key, const SPHINCS_KEY *sphincs_key);
|
||||
int x509_key_set_secp256r1_key(X509_KEY *x509_key, const SECP256R1_KEY *secp256r1_key);
|
||||
|
||||
// hss_key_generate need lms_types[] as input, encode lms_types[] into (int)algor_param
|
||||
int x509_algor_param_from_lms_types(int *algor_param, const int *lms_types, size_t num);
|
||||
int x509_algor_param_to_lms_types(int algor_param, int lms_types[5], size_t *num);
|
||||
|
||||
/*
|
||||
algor: algor_param:
|
||||
-------------------------------------------------------------------------
|
||||
OID_ec_public_key OID_sm2 or OID_secp256r1
|
||||
OID_lms_hashsig lms_type
|
||||
OID_hss_lms_hashsig x509_algor_param_from_lms_types(lms_types[])
|
||||
OID_xmsss_hashsig xmss_type
|
||||
OID_xmsssmt_hashsig xmssmt_type
|
||||
OID_sphincs_hashsig OID_undef
|
||||
*/
|
||||
int x509_key_generate(X509_KEY *key, int algor, int algor_param);
|
||||
int x509_private_key_from_file(X509_KEY *key, int algor, const char *pass, FILE *fp);
|
||||
int x509_public_key_digest(const X509_KEY *key, uint8_t dgst[32]);
|
||||
int x509_public_key_equ(const X509_KEY *key, const X509_KEY *pub);
|
||||
int x509_public_key_equ(const X509_KEY *key, const X509_KEY *pub);
|
||||
void x509_key_cleanup(X509_KEY *key);
|
||||
|
||||
|
||||
/*
|
||||
SubjectPublicKeyInfo ::= SEQUENCE {
|
||||
algorithm AlgorithmIdentifier,
|
||||
subjectPublicKey BIT STRING }
|
||||
// SM2_PUBLIC_KEY_SIZE = 65
|
||||
// LMS_PUBLIC_KEY_SIZE = 56
|
||||
// HSS_PUBLIC_KEY_SIZE = 60
|
||||
// XMSS_PUBLIC_KEY_SIZE = 68
|
||||
// XMSSMT_PUBLIC_KEY_SIZE = 68
|
||||
// SPHINCS_PUBLIC_KEY_SIZE = 32
|
||||
// SECP256R1_PUBLIC_KEY_SIZE = 65
|
||||
#define X509_PUBLIC_KEY_MAX_SIZE 68
|
||||
int x509_public_key_to_bytes(const X509_KEY *key, uint8_t **out, size_t *outlen);
|
||||
int x509_public_key_digest(const X509_KEY *key, uint8_t dgst[32]);
|
||||
int x509_public_key_equ(const X509_KEY *key, const X509_KEY *pub);
|
||||
int x509_public_key_print(FILE *fp, int fmt, int ind, const char *label, const X509_KEY *key);
|
||||
int x509_private_key_print(FILE *fp, int fmt, int ind, const char *label, const X509_KEY *key);
|
||||
|
||||
algorithm.algorithm = OID_ec_public_key;
|
||||
algorithm.parameters = OID_sm2;
|
||||
subjectPublicKey = ECPoint
|
||||
*/
|
||||
// X.509 SubjectPublicKeyInfo
|
||||
int x509_public_key_info_to_der(const X509_KEY *key, uint8_t **out, size_t *outlen);
|
||||
int x509_public_key_info_from_der(X509_KEY *key, const uint8_t **in, size_t *inlen);
|
||||
int x509_public_key_info_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
|
||||
int x509_private_key_print(FILE *fp, int fmt, int ind, const char *label, const X509_KEY *key);
|
||||
int x509_public_key_print(FILE *fp, int fmt, int ind, const char *label, const X509_KEY *key);
|
||||
|
||||
// ECPrivateKey when key->algor == OID_ec_public_key
|
||||
int ec_private_key_to_der(const X509_KEY *key, int encode_params, int encode_pubkey, uint8_t **out, size_t *outlen);
|
||||
int ec_private_key_from_der(X509_KEY *key, int opt_curve, const uint8_t **in, size_t *inlen);
|
||||
|
||||
// 没有打印的函数!
|
||||
|
||||
// PKCS #8 PrivateKeyInfo
|
||||
// PrivateKeyInfo.algor.parameters has the named_curve
|
||||
// so omit the optional ECPrivateKey params(named_curve) a nd omit the public_key
|
||||
#define X509_ENCODE_EC_PRIVATE_KEY_PARAMS 1
|
||||
#define X509_ENCODE_EC_PRIVATE_KEY_PUBKEY 1
|
||||
int x509_private_key_info_to_der(const X509_KEY *key, uint8_t **out, size_t *outlen);
|
||||
int x509_private_key_info_from_der(X509_KEY *key, const uint8_t **attrs, size_t *attrslen,
|
||||
const uint8_t **in, size_t *inlen);
|
||||
// 没有打印的函数
|
||||
|
||||
// PKCS #8 EncryptedPrivateKeyInfo
|
||||
#define PKCS8_ENCED_PRIVATE_KEY_INFO_ITER 65536
|
||||
int x509_private_key_info_encrypt_to_der(const X509_KEY *x509_key, const char *pass,
|
||||
uint8_t **out, size_t *outlen);
|
||||
int x509_private_key_info_decrypt_from_der(X509_KEY *x509_key,
|
||||
const uint8_t **attrs, size_t *attrs_len,
|
||||
const char *pass, const uint8_t **in, size_t *inlen);
|
||||
|
||||
// require stdio
|
||||
int x509_private_key_info_encrypt_to_pem(const X509_KEY *key, const char *pass, FILE *fp);
|
||||
int x509_private_key_info_decrypt_from_pem(X509_KEY *key, const uint8_t **attrs, size_t *attrslen, const char *pass, FILE *fp);
|
||||
|
||||
|
||||
typedef union {
|
||||
SM2_POINT sm2;
|
||||
HSS_PUBLIC_KEY hss;
|
||||
XMSS_PUBLIC_KEY xmss;
|
||||
XMSSMT_PUBLIC_KEY xmssmt;
|
||||
} X509_PUBLIC_KEY;
|
||||
|
||||
#define X509_PUBLIC_KEY_MAX_SIZE sizeof(X509_PUBLIC_KEY)
|
||||
// SM2_SIGNATURE_MAX_SIZE = 72
|
||||
// LMS_SIGNATURE_MAX_SIZE = 1932
|
||||
// HSS_SIGNATURE_MAX_SIZE = ?
|
||||
// XMSS_SIGNATURE_MAX_SIZE = 2820
|
||||
// XMSSMT_SIGNATURE_MAX_SIZE >= 27688 ?
|
||||
// SPHINCS_SIGNATURE_SIZE = ?
|
||||
// ECDSA_SIGNATURE_MAX_SIZE = 72
|
||||
|
||||
typedef union {
|
||||
uint8_t sm2_sig[SM2_MAX_SIGNATURE_SIZE];
|
||||
LMS_SIGNATURE lms_sig;
|
||||
HSS_SIGNATURE hss_sig;
|
||||
XMSS_SIGNATURE xmss_sig;
|
||||
XMSSMT_SIGNATURE xmssmt_sig;
|
||||
SPHINCS_SIGNATURE sphincs_sig;
|
||||
uint8_t ecdsa_sig[SM2_MAX_SIGNATURE_SIZE];
|
||||
} X509_SIGNATURE;
|
||||
|
||||
// FIXME: give sizeof to a number
|
||||
#define X509_SIGNATURE_MAX_SIZE sizeof(X509_SIGNATURE)
|
||||
|
||||
typedef struct {
|
||||
union {
|
||||
SM2_SIGN_CTX sm2_sign_ctx;
|
||||
ECDSA_SIGN_CTX ecdsa_sign_ctx;
|
||||
SM2_VERIFY_CTX sm2_verify_ctx;
|
||||
HSS_SIGN_CTX hss_sign_ctx;
|
||||
XMSS_SIGN_CTX xmss_sign_ctx;
|
||||
XMSSMT_SIGN_CTX xmssmt_sign_ctx;
|
||||
SPHINCS_SIGN_CTX sphincs_sign_ctx;
|
||||
ECDSA_SIGN_CTX ecdsa_sign_ctx;
|
||||
} u;
|
||||
int sign_algor;
|
||||
uint8_t sig[X509_SIGNATURE_MAX_SIZE];
|
||||
@@ -123,19 +159,37 @@ typedef struct {
|
||||
} X509_SIGN_CTX;
|
||||
|
||||
|
||||
/*
|
||||
algor:
|
||||
OID_sm2sign_with_sm3
|
||||
OID_ecdss_with_sha256
|
||||
OID_lms_hashsig
|
||||
OID_hss_lms_hashsig
|
||||
OID_xmss_hashsig
|
||||
OID_xmssmt_hashsig
|
||||
OID_sphincs_hashsig
|
||||
*/
|
||||
int x509_key_get_sign_algor(const X509_KEY *key, int *algor);
|
||||
int x509_key_get_signature_size(const X509_KEY *key, size_t *siglen);
|
||||
|
||||
int x509_sign_init(X509_SIGN_CTX *ctx, X509_KEY *key, const char *signer_id, size_t signer_idlen);
|
||||
// args, argslen:
|
||||
// sm2 SM2_DEFAULT_ID, SM2_DEFAULT_ID_LENGTH
|
||||
// TLS13_SM2_ID, TLS13_SM2_ID_LENGTH
|
||||
// sphincs optiona_random, 16
|
||||
int x509_sign_init(X509_SIGN_CTX *ctx, X509_KEY *key, const void *args, size_t argslen);
|
||||
int x509_sign_update(X509_SIGN_CTX *ctx, const uint8_t *data, size_t datalen);
|
||||
int x509_sign_finish(X509_SIGN_CTX *ctx, uint8_t *sig, size_t *siglen);
|
||||
int x509_verify_init(X509_SIGN_CTX *ctx, const X509_KEY *key,
|
||||
const char *signer_id, size_t signer_idlen, // 这里可能要去掉这个功能
|
||||
int x509_verify_init(X509_SIGN_CTX *ctx, const X509_KEY *key, const void *args, size_t argslen,
|
||||
const uint8_t *sig, size_t siglen);
|
||||
int x509_verify_update(X509_SIGN_CTX *ctx, const uint8_t *data, size_t datalen);
|
||||
int x509_verify_finish(X509_SIGN_CTX *ctx);
|
||||
void x509_sign_ctx_cleanup(X509_SIGN_CTX *ctx);
|
||||
|
||||
|
||||
// ECDH for key->algor == OID_ec_public_key
|
||||
int x509_key_do_exchange(const X509_KEY *key, const X509_KEY *peer_pub, uint8_t *out, size_t *outlen);
|
||||
int x509_key_exchange(const X509_KEY *key, const uint8_t *peer_pub, size_t peer_publen, uint8_t *out, size_t *outlen);
|
||||
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user