Documentation ¶
Index ¶
- Constants
- Variables
- func ASN1Ciphertext2Plain(ciphertext []byte, opts *EncrypterOpts) ([]byte, error)
- func AdjustCiphertextSplicingOrder(ciphertext []byte, from, to ciphertextSplicingOrder) ([]byte, error)
- func Decrypt(priv *PrivateKey, ciphertext []byte) ([]byte, error)
- func Encrypt(random io.Reader, pub *ecdsa.PublicKey, msg []byte, opts *EncrypterOpts) ([]byte, error)
- func EncryptASN1(random io.Reader, pub *ecdsa.PublicKey, msg []byte) ([]byte, error)
- func GenTables()
- func IsSM2PublicKey(publicKey interface{}) bool
- func P256() elliptic.Curve
- func PlainCiphertext2ASN1(ciphertext []byte, from ciphertextSplicingOrder) ([]byte, error)
- func Sign(rand io.Reader, priv *ecdsa.PrivateKey, hash []byte) (r, s *big.Int, err error)
- func SignASN1(rand io.Reader, priv *PrivateKey, hash []byte, opts crypto.SignerOpts) ([]byte, error)
- func SignWithSM2(rand io.Reader, priv *ecdsa.PrivateKey, uid, msg []byte) (r, s *big.Int, err error)
- func Verify(pub *ecdsa.PublicKey, hash []byte, r, s *big.Int) bool
- func VerifyASN1(pub *ecdsa.PublicKey, hash, sig []byte) bool
- func VerifyASN1WithSM2(pub *ecdsa.PublicKey, uid, msg, sig []byte) bool
- func VerifyWithSM2(pub *ecdsa.PublicKey, uid, msg []byte, r, s *big.Int) bool
- type DecrypterOpts
- type EncrypterOpts
- type PrivateKey
- func (priv *PrivateKey) Decrypt(rand io.Reader, msg []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error)
- func (priv *PrivateKey) FromECPrivateKey(key *ecdsa.PrivateKey) (*PrivateKey, error)
- func (priv *PrivateKey) Sign(rand io.Reader, digest []byte, opts crypto.SignerOpts) ([]byte, error)
- func (priv *PrivateKey) SignWithSM2(rand io.Reader, uid, msg []byte) ([]byte, error)
- type SM2SignerOption
- type Signer
Constants ¶
const ( //MarshalUncompressed uncompressed mashal mode MarshalUncompressed pointMarshalMode = iota //MarshalCompressed compressed mashal mode MarshalCompressed //MarshalMixed mixed mashal mode MarshalMixed )
const ( C1C3C2 ciphertextSplicingOrder = iota C1C2C3 )
const ( ENCODING_PLAIN ciphertextEncoding = iota ENCODING_ASN1 )
Variables ¶
var ASN1DecrypterOpts = &DecrypterOpts{ENCODING_ASN1, C1C3C2}
var ASN1EncrypterOpts = &EncrypterOpts{ENCODING_ASN1, MarshalUncompressed, C1C3C2}
Functions ¶
func ASN1Ciphertext2Plain ¶ added in v0.7.0
func ASN1Ciphertext2Plain(ciphertext []byte, opts *EncrypterOpts) ([]byte, error)
ASN1Ciphertext2Plain utility method to convert ASN.1 encoding ciphertext to plain encoding format
func AdjustCiphertextSplicingOrder ¶ added in v0.7.0
func AdjustCiphertextSplicingOrder(ciphertext []byte, from, to ciphertextSplicingOrder) ([]byte, error)
AdjustCiphertextSplicingOrder utility method to change c2 c3 order
func Decrypt ¶
func Decrypt(priv *PrivateKey, ciphertext []byte) ([]byte, error)
Decrypt sm2 decrypt implementation by default DecrypterOpts{C1C3C2}
func Encrypt ¶
func Encrypt(random io.Reader, pub *ecdsa.PublicKey, msg []byte, opts *EncrypterOpts) ([]byte, error)
Encrypt sm2 encrypt implementation
func EncryptASN1 ¶ added in v0.7.0
sm2 encrypt and output ASN.1 result
func IsSM2PublicKey ¶ added in v0.4.8
func IsSM2PublicKey(publicKey interface{}) bool
IsSM2PublicKey check if given public key is a SM2 public key or not
func PlainCiphertext2ASN1 ¶ added in v0.7.0
PlainCiphertext2ASN1 utility method to convert plain encoding ciphertext to ASN.1 encoding format
func Sign ¶ added in v0.1.2
Sign signs a hash (which should be the result of hashing a larger message) using the private key, priv. If the hash is longer than the bit-length of the private key's curve order, the hash will be truncated to that length. It returns the signature as a pair of integers. The security of the private key depends on the entropy of rand. Backgroud: https://github.com/golang/go/commit/a8049f58f9e3336554da1b0a4f8ea3b9c5cd669c
func SignASN1 ¶ added in v0.4.8
func SignASN1(rand io.Reader, priv *PrivateKey, hash []byte, opts crypto.SignerOpts) ([]byte, error)
SignASN1 signs a hash (which should be the result of hashing a larger message) using the private key, priv. If the hash is longer than the bit-length of the private key's curve order, the hash will be truncated to that length. It returns the ASN.1 encoded signature. The security of the private key depends on the entropy of rand.
func SignWithSM2 ¶ added in v0.1.2
func SignWithSM2(rand io.Reader, priv *ecdsa.PrivateKey, uid, msg []byte) (r, s *big.Int, err error)
SignWithSM2 follow sm2 dsa standards for hash part
func Verify ¶ added in v0.1.2
Verify verifies the signature in r, s of hash using the public key, pub. Its return value records whether the signature is valid.
func VerifyASN1 ¶ added in v0.4.8
VerifyASN1 verifies the ASN.1 encoded signature, sig, of hash using the public key, pub. Its return value records whether the signature is valid.
func VerifyASN1WithSM2 ¶ added in v0.4.8
VerifyASN1WithSM2 verifies the signature in r, s of hash using the public key, pub. Its return value records whether the signature is valid.
Types ¶
type DecrypterOpts ¶ added in v0.6.0
type DecrypterOpts struct { CiphertextEncoding ciphertextEncoding CipherTextSplicingOrder ciphertextSplicingOrder }
DecrypterOpts decryption options
func NewPlainDecrypterOpts ¶ added in v0.7.0
func NewPlainDecrypterOpts(splicingOrder ciphertextSplicingOrder) *DecrypterOpts
type EncrypterOpts ¶ added in v0.3.0
type EncrypterOpts struct { CiphertextEncoding ciphertextEncoding PointMarshalMode pointMarshalMode CiphertextSplicingOrder ciphertextSplicingOrder }
EncrypterOpts encryption options
func NewPlainEncrypterOpts ¶ added in v0.7.0
func NewPlainEncrypterOpts(marhsalMode pointMarshalMode, splicingOrder ciphertextSplicingOrder) *EncrypterOpts
type PrivateKey ¶ added in v0.1.2
type PrivateKey struct {
ecdsa.PrivateKey
}
PrivateKey represents an ECDSA SM2 private key.
func GenerateKey ¶ added in v0.1.2
func GenerateKey(rand io.Reader) (*PrivateKey, error)
GenerateKey generates a public and private key pair.
func (*PrivateKey) Decrypt ¶ added in v0.3.0
func (priv *PrivateKey) Decrypt(rand io.Reader, msg []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error)
Decrypt decrypts msg. The opts argument should be appropriate for the primitive used.
func (*PrivateKey) FromECPrivateKey ¶ added in v0.3.0
func (priv *PrivateKey) FromECPrivateKey(key *ecdsa.PrivateKey) (*PrivateKey, error)
FromECPrivateKey convert an ecdsa private key to SM2 private key
func (*PrivateKey) Sign ¶ added in v0.1.2
func (priv *PrivateKey) Sign(rand io.Reader, digest []byte, opts crypto.SignerOpts) ([]byte, error)
Sign signs digest with priv, reading randomness from rand. The opts argument is not currently used but, in keeping with the crypto.Signer interface, should be the hash function used to digest the message.
This method implements crypto.Signer, which is an interface to support keys where the private part is kept in, for example, a hardware module. Common uses should use the Sign function in this package directly.
func (*PrivateKey) SignWithSM2 ¶ added in v0.2.2
SignWithSM2 signs uid, msg with SignWithSM2 method.
type SM2SignerOption ¶ added in v0.4.8
func NewSM2SignerOption ¶ added in v0.4.8
func NewSM2SignerOption(forceGMSign bool, uid []byte) *SM2SignerOption
NewSM2SignerOption create a SM2 specific signer option forceGMSign - if use GM specific sign logic, if yes, should pass raw message to sign uid - if forceGMSign is true, then you can pass uid, if no uid is provided, system will use default one
func (*SM2SignerOption) HashFunc ¶ added in v0.4.8
func (*SM2SignerOption) HashFunc() crypto.Hash