Go API for GmSSL

This commit is contained in:
Zhi Guan
2017-05-04 20:51:53 +08:00
parent 36b883e23d
commit b3ef950ce2
15 changed files with 478 additions and 0 deletions

9
go/build.go Executable file
View File

@@ -0,0 +1,9 @@
/* +build cgo */
package gmssl
/*
#cgo darwin CFLAGS: -I/usr/local/include
#cgo darwin LDFLAGS: -L/usr/local/lib -lcrypto
*/
import "C"

2
go/certificate.go Normal file
View File

@@ -0,0 +1,2 @@
/* +build cgo */
package gmssl

121
go/cipher.go Normal file
View File

@@ -0,0 +1,121 @@
/* +build cgo */
package gmssl
/*
#include <openssl/evp.h>
*/
import "C"
import (
"errors"
"fmt"
"runtime"
"unsafe"
)
func GetCiphers(aliases bool) []string {
return []string{"sms4-cbc", "aes-128-cbc", "aes-256-cbc"}
}
func GetCipherKeyLength(name string) (int, error) {
cname := C.CString(name)
defer C.free(unsafe.Pointer(cname))
cipher := C.EVP_get_cipherbyname(cname)
if cipher == nil {
return 0, errors.New("Invalid cipher name")
}
return int(C.EVP_CIPHER_key_length(cipher)), nil
}
func GetCipherBlockSize(name string) (int, error) {
cname := C.CString(name)
defer C.free(unsafe.Pointer(cname))
cipher := C.EVP_get_cipherbyname(cname)
if cipher == nil {
return 0, errors.New("Invalid cipher")
}
return int(C.EVP_CIPHER_block_size(cipher)), nil
}
func GetCipherIVLength(name string) (int, error) {
cname := C.CString(name)
defer C.free(unsafe.Pointer(cname))
cipher := C.EVP_get_cipherbyname(cname)
if cipher == nil {
return 0, errors.New("Invalid cipher")
}
return int(C.EVP_CIPHER_iv_length(cipher)), nil
}
type CipherContext struct {
ctx *C.EVP_CIPHER_CTX
}
func NewCipherContext(name string, args map[string]string, key, iv []byte, encrypt bool) (
*CipherContext, error) {
cname := C.CString(name)
defer C.free(unsafe.Pointer(cname))
cipher := C.EVP_get_cipherbyname(cname)
if cipher == nil {
return nil, fmt.Errorf("shit")
}
if key == nil {
return nil, errors.New("No key")
}
if len(key) != int(C.EVP_CIPHER_key_length(cipher)) {
return nil, errors.New("Invalid key length")
}
if 0 != int(C.EVP_CIPHER_iv_length(cipher)) {
if iv == nil {
return nil, errors.New("No IV")
}
if len(iv) != int(C.EVP_CIPHER_iv_length(cipher)) {
return nil, errors.New("Invalid IV")
}
}
ctx := C.EVP_CIPHER_CTX_new()
if ctx == nil {
return nil, fmt.Errorf("shit")
}
ret := &CipherContext{ctx}
runtime.SetFinalizer(ret, func(ret *CipherContext) {
C.EVP_CIPHER_CTX_free(ret.ctx)
})
enc := 1
if encrypt == false {
enc = 0
}
if 1 != C.EVP_CipherInit(ctx, cipher, (*C.uchar)(&key[0]),
(*C.uchar)(&iv[0]), C.int(enc)) {
return nil, fmt.Errorf("shit")
}
return ret, nil
}
func (ctx *CipherContext) Update(in []byte) ([]byte, error) {
outbuf := make([]byte, len(in)+int(C.EVP_CIPHER_CTX_block_size(ctx.ctx)))
outlen := C.int(len(outbuf))
if 1 != C.EVP_CipherUpdate(ctx.ctx, (*C.uchar)(&outbuf[0]), &outlen,
(*C.uchar)(&in[0]), C.int(len(in))) {
return nil, fmt.Errorf("failed to decrypt")
}
return outbuf[:outlen], nil
}
func (ctx *CipherContext) Final() ([]byte, error) {
outbuf := make([]byte, int(C.EVP_CIPHER_CTX_block_size(ctx.ctx)))
outlen := C.int(len(outbuf))
if 1 != C.EVP_CipherFinal(ctx.ctx, (*C.uchar)(&outbuf[0]), &outlen) {
return nil, fmt.Errorf("failed to decrypt")
}
return outbuf[:outlen], nil
}

2
go/cms.go Normal file
View File

@@ -0,0 +1,2 @@
/* +build cgo */
package gmssl

77
go/digest.go Normal file
View File

@@ -0,0 +1,77 @@
/* +build cgo */
package gmssl
/*
#include <openssl/evp.h>
*/
import "C"
import (
"errors"
"fmt"
"runtime"
"unsafe"
)
func GetDigests(aliases bool) []string {
return []string{"sm3", "sha1", "sha256"}
}
func GetDigestLength(name string) (int, error) {
cname := C.CString(name)
defer C.free(unsafe.Pointer(cname))
md := C.EVP_get_digestbyname(cname)
if md == nil {
return 0, errors.New("Invalid digest name")
}
return int(C.EVP_MD_size(md)), nil
}
type DigestContext struct {
ctx *C.EVP_MD_CTX
}
func NewDigestContext(name string, args map[string]string) (*DigestContext, error) {
cname := C.CString(name)
defer C.free(unsafe.Pointer(cname))
md := C.EVP_get_digestbyname(cname)
if md == nil {
return nil, fmt.Errorf("shit")
}
ctx := C.EVP_MD_CTX_new()
if ctx == nil {
return nil, fmt.Errorf("shit")
}
ret := &DigestContext{ctx}
runtime.SetFinalizer(ret, func(ret *DigestContext) {
C.EVP_MD_CTX_free(ret.ctx)
})
if 1 != C.EVP_DigestInit(ctx, md) {
return nil, fmt.Errorf("shit")
}
return ret, nil
}
func (ctx *DigestContext) Update(data []byte) error {
if len(data) == 0 {
return nil
}
if 1 != C.EVP_DigestUpdate(ctx.ctx, unsafe.Pointer(&data[0]), C.size_t(len(data))) {
errors.New("hello")
}
return nil
}
func (ctx *DigestContext) Final() ([]byte, error) {
outbuf := make([]byte, 64)
outlen := C.uint(len(outbuf))
if 1 != C.EVP_DigestFinal(ctx.ctx, (*C.uchar)(unsafe.Pointer(&outbuf[0])), &outlen) {
return nil, errors.New("error")
}
return outbuf[:outlen], nil
}

2
go/engine.go Normal file
View File

@@ -0,0 +1,2 @@
/* +build cgo */
package gmssl

2
go/ibc.go Normal file
View File

@@ -0,0 +1,2 @@
/* +build cgo */
package gmssl

2
go/kdf.go Normal file
View File

@@ -0,0 +1,2 @@
/* +build cgo */
package gmssl

76
go/mac.go Normal file
View File

@@ -0,0 +1,76 @@
/* +build cgo */
package gmssl
/*
#include <openssl/hmac.h>
#include <openssl/cmac.h>
*/
import "C"
import (
"errors"
"fmt"
"runtime"
"unsafe"
)
func GetMacs(aliases bool) []string {
return []string{"hello", "world"}
}
func GetMacKeyLength(name string) (int, error) {
return 0, nil
}
func GetMacLength(name string) (int, error) {
return 0, nil
}
type MACContext struct {
hctx *C.HMAC_CTX
}
func NewMACContext(name string, args map[string]string, key []byte) (*MACContext, error) {
cname := C.CString(name)
defer C.free(unsafe.Pointer(cname))
md := C.EVP_get_digestbyname(cname)
if md == nil {
return nil, fmt.Errorf("shit")
}
ctx := C.HMAC_CTX_new()
if ctx == nil {
return nil, fmt.Errorf("shit")
}
ret := &MACContext{ctx}
runtime.SetFinalizer(ret, func(ret *MACContext) {
C.HMAC_CTX_free(ret.hctx)
})
if 1 != C.HMAC_Init_ex(ctx, unsafe.Pointer(&key[0]), C.int(len(key)), md, nil) {
return nil, fmt.Errorf("shit")
}
return ret, nil
}
func (ctx *MACContext) Update(data []byte) error {
if len(data) == 0 {
return nil
}
if 1 != C.HMAC_Update(ctx.hctx, (*C.uchar)(unsafe.Pointer(&data[0])), C.size_t(len(data))) {
return errors.New("hello")
}
return nil
}
func (ctx *MACContext) Final() ([]byte, error) {
outbuf := make([]byte, 64)
outlen := C.uint(len(outbuf))
if 1 != C.HMAC_Final(ctx.hctx, (*C.uchar)(unsafe.Pointer(&outbuf[0])), &outlen) {
return nil, errors.New("error")
}
return outbuf[:outlen], nil
}

2
go/ocsp.go Normal file
View File

@@ -0,0 +1,2 @@
/* +build cgo */
package gmssl

2
go/otp.go Normal file
View File

@@ -0,0 +1,2 @@
/* +build cgo */
package gmssl

134
go/pkey.go Normal file
View File

@@ -0,0 +1,134 @@
/* +build cgo */
package gmssl
/*
#include <openssl/evp.h>
*/
import "C"
import (
"errors"
)
func GetPublicKeyTypes(aliases bool) []string {
return []string{"RSA", "DH", "DSA"}
}
func GetSignatureSchemes(publicKeyType string, aliases bool) []string {
return []string{"RSA", "DSA", "ECDSA", "SM2"}
}
func GetPublicKeyEncryptions(publicKeyType string, aliases bool) []string {
return []string{"RSA", "ECIES", "SM2"}
}
func GetKeyExchanges(publicKeyType string, aliases bool) []string {
return []string{"DH", "ECDH", "SM2"}
}
type PublicKey struct {
pkey *C.EVP_PKEY
}
type PrivateKey struct {
pkey *C.EVP_PKEY
}
func GenerateKeyPair(publicKeyType string, args map[string]string, bits int) (*PublicKey, *PrivateKey, error) {
return nil, nil, errors.New("Not implemented")
}
func LoadPublicKey(publicKeyType string, args map[string]string, data []byte) (*PublicKey, error) {
return nil, errors.New("Not implemented")
}
func LoadPrivateKey(publicKeyType string, args map[string]string, data []byte) (*PrivateKey, error) {
return nil, errors.New("Not implemented")
}
func (pkey *PublicKey) Save(args map[string]string) ([]byte, error) {
return nil, errors.New("Not implemented")
}
func (pkey *PrivateKey) Save(args map[string]string) ([]byte, error) {
return nil, errors.New("Not implemented")
}
func (pkey *PublicKey) GetAttributes(args map[string]string) (map[string]string, error) {
return nil, errors.New("Not implemented")
}
func (pkey *PrivateKey) GetAttributes(args map[string]string) (map[string]string, error) {
return nil, errors.New("Not implemented")
}
func (pkey *PublicKey) Encrypt(scheme string, args map[string]string, in []byte) ([]byte, error) {
ctx := C.EVP_PKEY_CTX_new(pkey.pkey, nil)
if ctx == nil {
return nil, errors.New("Failure")
}
if 1 != C.EVP_PKEY_encrypt_init(ctx) {
return nil, errors.New("Failurew")
}
outbuf := make([]byte, len(in) + 1024)
outlen := C.size_t(len(outbuf))
if 1 != C.EVP_PKEY_encrypt(ctx, (*C.uchar)(&outbuf[0]), &outlen,
(*C.uchar)(&in[0]), C.size_t(len(in))) {
return nil, errors.New("Failurew")
}
return outbuf[:outlen], nil
}
func (pkey *PrivateKey) Decrypt(scheme string, args map[string]string, in []byte) ([]byte, error) {
ctx := C.EVP_PKEY_CTX_new(pkey.pkey, nil)
if ctx == nil {
return nil, errors.New("Failure")
}
if 1 != C.EVP_PKEY_decrypt_init(ctx) {
return nil, errors.New("Failure")
}
outbuf := make([]byte, len(in))
outlen := C.size_t(len(outbuf))
if 1 != C.EVP_PKEY_decrypt(ctx, (*C.uchar)(&outbuf[0]), &outlen,
(*C.uchar)(&in[0]), C.size_t(len(in))) {
return nil, errors.New("Failure")
}
return outbuf[:outlen], nil
}
func (pkey *PrivateKey) Sign(scheme string, args map[string]string, data []byte) ([]byte, error) {
ctx := C.EVP_PKEY_CTX_new(pkey.pkey, nil)
if ctx == nil {
return nil, errors.New("Failure")
}
if 1 != C.EVP_PKEY_sign_init(ctx) {
return nil, errors.New("Failure")
}
outbuf := make([]byte, C.EVP_PKEY_size(pkey.pkey))
outlen := C.size_t(len(outbuf))
if 1 != C.EVP_PKEY_sign(ctx, (*C.uchar)(&outbuf[0]), &outlen,
(*C.uchar)(&data[0]), C.size_t(len(data))) {
return nil, errors.New("Failure")
}
return outbuf[:outlen], nil
}
func (pkey *PublicKey) Verify(scheme string, args map[string]string, data, signature []byte) error {
ctx := C.EVP_PKEY_CTX_new(pkey.pkey, nil)
if ctx == nil {
return errors.New("Failure")
}
if 1 != C.EVP_PKEY_sign_init(ctx) {
return errors.New("Failure")
}
ret := C.EVP_PKEY_verify(ctx, (*C.uchar)(&signature[0]), C.size_t(len(signature)),
(*C.uchar)(&data[0]), C.size_t(len(data)))
if ret != 1 {
return errors.New("Failure")
}
return nil
}
func (pkey *PrivateKey) DeriveKey(scheme string, args map[string]string, publicKey PublicKey) ([]byte, error) {
return nil, errors.New("Not implemented")
}

26
go/rand.go Normal file
View File

@@ -0,0 +1,26 @@
/* +build cgo */
package gmssl
/*
#include <openssl/rand.h>
*/
import "C"
import (
"errors"
"unsafe"
)
func SeedRandom(seed []byte) error {
C.RAND_seed(unsafe.Pointer(&seed[0]), C.int(len(seed)))
return nil
}
func GenerateRandom(length int) ([]byte, error) {
outbuf := make([]byte, length)
if 1 != C.RAND_bytes((*C.uchar)(&outbuf[0]), C.int(length)) {
return nil, errors.New("GmSSL Failure")
}
return outbuf[:length], nil
}

2
go/ssl.go Normal file
View File

@@ -0,0 +1,2 @@
/* +build cgo */
package gmssl

19
go/version.go Normal file
View File

@@ -0,0 +1,19 @@
/* +build cgo */
package gmssl
/*
#include <openssl/crypto.h>
*/
import "C"
func GetVersion() []string {
version := []string{
C.GoString(C.OpenSSL_version(C.OPENSSL_VERSION)),
C.GoString(C.OpenSSL_version(C.OPENSSL_BUILT_ON)),
C.GoString(C.OpenSSL_version(C.OPENSSL_CFLAGS)),
C.GoString(C.OpenSSL_version(C.OPENSSL_PLATFORM)),
C.GoString(C.OpenSSL_version(C.OPENSSL_DIR)),
C.GoString(C.OpenSSL_version(C.OPENSSL_ENGINES_DIR)),
}
return version
}