OpenSSL-SM2
- 在openEuler(推荐)或Ubuntu或Windows(不推荐)中完成下面任务
- 编译运行https://github.com/greendow/SM2-signature-creation-and-verification 中的代码,提交运行结果与截图,(7‘)
- 编译运行https://github.com/greendow/SM2-encrypt-and-decrypt 中的代码提交运行结果与截图(8’)
- 用OpenSSL EVP函数完成上述签名验签和加密解密两个功能,提交代码和运行结果截图。(15‘)
SM2-signature-creation-and-verification
编译
| gcc -o sm2_sign *.c -I. -lcrypto |
运行

SM2-encrypt-and-decrypt
编译
| gcc -o mysm2 *.c -I. -lcrypto |
运行


OpenSSL EVP函数
sm2_enc_dec.c
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <openssl/ec.h> |
| #include <openssl/evp.h> |
| |
| int main(void) { |
| int ret = -1, i; |
| EVP_PKEY_CTX *pctx = NULL, *ectx = NULL; |
| EVP_PKEY *pkey = NULL; |
| unsigned char message[16] = "2020121220201212"; |
| size_t message_len = sizeof(message); |
| unsigned char *ciphertext = NULL, *plaintext = NULL; |
| size_t ciphertext_len, plaintext_len; |
| EC_KEY *key_pair = NULL; |
| const BIGNUM *priv_key = NULL; |
| char *priv_key_str = NULL; |
| |
| const EC_GROUP *group = NULL; |
| const EC_POINT *pub_key = NULL; |
| BN_CTX *ctx = NULL; |
| BIGNUM *x_coordinate = NULL, *y_coordinate = NULL; |
| char *x_coordinate_str = NULL, *y_coordinate_str = NULL; |
| |
| |
| if ( !(pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_EC, NULL)) ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_paramgen_init(pctx)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_CTX_set_ec_paramgen_curve_nid(pctx, NID_sm2)) <= 0 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_keygen_init(pctx)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_keygen(pctx, &pkey)) != 1 ) { |
| goto clean_up; |
| } |
| |
| |
| if ( !(key_pair = EVP_PKEY_get0_EC_KEY(pkey)) ) { |
| goto clean_up; |
| } |
| |
| if ( !(priv_key = EC_KEY_get0_private_key(key_pair)) ) { |
| goto clean_up; |
| } |
| |
| if ( !(priv_key_str = BN_bn2hex(priv_key)) ) { |
| goto clean_up; |
| } |
| printf("SM2 private key (in hex form):\n"); |
| printf("%s\n\n", priv_key_str); |
| |
| if ( !(pub_key = EC_KEY_get0_public_key(key_pair)) ) { |
| goto clean_up; |
| } |
| |
| if ( !(group = EC_KEY_get0_group(key_pair)) ) { |
| goto clean_up; |
| } |
| |
| if ( !(ctx = BN_CTX_new()) ) { |
| goto clean_up; |
| } |
| BN_CTX_start(ctx); |
| x_coordinate = BN_CTX_get(ctx); |
| y_coordinate = BN_CTX_get(ctx); |
| if ( !(y_coordinate) ) { |
| goto clean_up; |
| } |
| if ( !(EC_POINT_get_affine_coordinates(group, pub_key, x_coordinate, y_coordinate, ctx)) ) { |
| goto clean_up; |
| } |
| if ( !(x_coordinate_str = BN_bn2hex(x_coordinate)) ) { |
| goto clean_up; |
| } |
| printf("x coordinate in SM2 public key (in hex form):\n"); |
| printf("%s\n\n", x_coordinate_str); |
| |
| if ( !(y_coordinate_str = BN_bn2hex(y_coordinate)) ) { |
| goto clean_up; |
| } |
| printf("y coordinate in SM2 public key (in hex form):\n"); |
| printf("%s\n\n", y_coordinate_str); |
| |
| |
| if ( (EVP_PKEY_set_alias_type(pkey, EVP_PKEY_SM2)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( !(ectx = EVP_PKEY_CTX_new(pkey, NULL)) ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_encrypt_init(ectx)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_encrypt(ectx, NULL, &ciphertext_len, message, message_len)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( !(ciphertext = (unsigned char *)malloc(ciphertext_len)) ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_encrypt(ectx, ciphertext, &ciphertext_len, message, message_len)) != 1 ) { |
| goto clean_up; |
| } |
| |
| printf("Message length: %ld bytes.\n", message_len); |
| printf("Message:\n"); |
| for (i = 0; i < (int)message_len; i++) { |
| printf("0x%x ", message[i]); |
| } |
| printf("\n\n"); |
| |
| printf("Ciphertext length: %ld bytes.\n", ciphertext_len); |
| printf("Ciphertext (ASN.1 encode):\n"); |
| for (i = 0; i < (int)ciphertext_len; i++) { |
| printf("0x%x ", ciphertext[i]); |
| } |
| printf("\n\n"); |
| |
| |
| if ( (EVP_PKEY_decrypt_init(ectx)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_decrypt(ectx, NULL, &plaintext_len, ciphertext, ciphertext_len)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( !(plaintext = (unsigned char *)malloc(plaintext_len)) ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_decrypt(ectx, plaintext, &plaintext_len, ciphertext, ciphertext_len)) != 1 ) { |
| goto clean_up; |
| } |
| |
| printf("Decrypted plaintext length: %ld bytes.\n", plaintext_len); |
| printf("Decrypted plaintext:\n"); |
| for (i = 0; i < (int)plaintext_len; i++) { |
| printf("0x%x ", plaintext[i]); |
| } |
| printf("\n\n"); |
| |
| if ( plaintext_len != message_len ) { |
| printf("Decrypted data length error!\n"); |
| goto clean_up; |
| } |
| |
| if ( memcmp(plaintext, message, message_len) ) { |
| printf("Decrypt data failed!\n"); |
| goto clean_up; |
| } else { |
| printf("Encrypt and decrypt data succeeded!\n"); |
| } |
| |
| ret = 0; |
| clean_up: |
| if (pctx) { |
| EVP_PKEY_CTX_free(pctx); |
| } |
| |
| if (pkey) { |
| EVP_PKEY_free(pkey); |
| } |
| |
| if (priv_key_str) { |
| OPENSSL_free(priv_key_str); |
| } |
| |
| if (ctx) { |
| BN_CTX_end(ctx); |
| BN_CTX_free(ctx); |
| } |
| |
| if (x_coordinate_str) { |
| OPENSSL_free(x_coordinate_str); |
| } |
| |
| if (y_coordinate_str) { |
| OPENSSL_free(y_coordinate_str); |
| } |
| |
| if (ectx) { |
| EVP_PKEY_CTX_free(ectx); |
| } |
| |
| if (ciphertext) { |
| free(ciphertext); |
| } |
| |
| if (plaintext) { |
| free(plaintext); |
| } |
| |
| return 0; |
| } |

sm2_sign.c
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <openssl/ec.h> |
| #include <openssl/evp.h> |
| |
| int main(void) { |
| int ret = -1, i; |
| EVP_PKEY_CTX* pctx = NULL, * sctx = NULL; |
| EVP_PKEY* pkey = NULL; |
| EVP_MD_CTX* md_ctx = NULL, * md_ctx_verify = NULL; |
| unsigned char message[16] = "2020121220201212"; |
| size_t message_len = sizeof(message); |
| unsigned char* sig = NULL; |
| size_t sig_len; |
| unsigned char sm2_id[] = { 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, |
| 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38 |
| }; |
| unsigned int sm2_id_len = sizeof(sm2_id); |
| EC_KEY* key_pair = NULL; |
| const BIGNUM* priv_key = NULL; |
| char* priv_key_str = NULL; |
| |
| const EC_GROUP* group = NULL; |
| const EC_POINT* pub_key = NULL; |
| BN_CTX* ctx = NULL; |
| BIGNUM* x_coordinate = NULL, * y_coordinate = NULL; |
| char* x_coordinate_str = NULL, * y_coordinate_str = NULL; |
| |
| |
| if ( !(pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_EC, NULL)) ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_paramgen_init(pctx)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_CTX_set_ec_paramgen_curve_nid(pctx, NID_sm2)) <= 0 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_keygen_init(pctx)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_PKEY_keygen(pctx, &pkey)) != 1 ) { |
| goto clean_up; |
| } |
| |
| |
| if ( !(key_pair = EVP_PKEY_get0_EC_KEY(pkey)) ) { |
| goto clean_up; |
| } |
| |
| if ( !(priv_key = EC_KEY_get0_private_key(key_pair)) ) { |
| goto clean_up; |
| } |
| |
| if ( !(priv_key_str = BN_bn2hex(priv_key)) ) { |
| goto clean_up; |
| } |
| printf("SM2 private key (in hex form):\n"); |
| printf("%s\n\n", priv_key_str); |
| |
| if ( !(pub_key = EC_KEY_get0_public_key(key_pair)) ) { |
| goto clean_up; |
| } |
| |
| if ( !(group = EC_KEY_get0_group(key_pair)) ) { |
| goto clean_up; |
| } |
| |
| if ( !(ctx = BN_CTX_new()) ) { |
| goto clean_up; |
| } |
| BN_CTX_start(ctx); |
| x_coordinate = BN_CTX_get(ctx); |
| y_coordinate = BN_CTX_get(ctx); |
| if ( !(y_coordinate) ) { |
| goto clean_up; |
| } |
| if ( !(EC_POINT_get_affine_coordinates(group, pub_key, x_coordinate, y_coordinate, ctx)) ) { |
| goto clean_up; |
| } |
| if ( !(x_coordinate_str = BN_bn2hex(x_coordinate)) ) { |
| goto clean_up; |
| } |
| printf("x coordinate in SM2 public key (in hex form):\n"); |
| printf("%s\n\n", x_coordinate_str); |
| |
| if ( !(y_coordinate_str = BN_bn2hex(y_coordinate)) ) { |
| goto clean_up; |
| } |
| printf("y coordinate in SM2 public key (in hex form):\n"); |
| printf("%s\n\n", y_coordinate_str); |
| |
| |
| if ( (EVP_PKEY_set_alias_type(pkey, EVP_PKEY_SM2)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( !(md_ctx = EVP_MD_CTX_new()) ) { |
| goto clean_up; |
| } |
| |
| if ( !(sctx = EVP_PKEY_CTX_new(pkey, NULL)) ) { |
| goto clean_up; |
| } |
| |
| if ( EVP_PKEY_CTX_set1_id(sctx, sm2_id, sm2_id_len) <= 0 ) { |
| goto clean_up; |
| } |
| |
| EVP_MD_CTX_set_pkey_ctx(md_ctx, sctx); |
| |
| if ( (EVP_DigestSignInit(md_ctx, NULL, EVP_sm3(), NULL, pkey)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_DigestSignUpdate(md_ctx, message, message_len)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_DigestSignFinal(md_ctx, NULL, &sig_len)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( !(sig = (unsigned char*)malloc(sig_len)) ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_DigestSignFinal(md_ctx, sig, &sig_len)) != 1 ) { |
| goto clean_up; |
| } |
| |
| printf("Message length: %ld bytes.\n", message_len); |
| printf("Message:\n"); |
| for (i = 0; i < (int)message_len; i++) { |
| printf("0x%x ", message[i]); |
| } |
| printf("\n\n"); |
| |
| printf("SM2 signature length: %ld bytes.\n", sig_len); |
| printf("SM2 signature (ASN.1 encode):\n"); |
| for (i = 0; i < (int)sig_len; i++) { |
| printf("0x%x ", sig[i]); |
| } |
| printf("\n\n"); |
| |
| |
| if ( !(md_ctx_verify = EVP_MD_CTX_new()) ) { |
| goto clean_up; |
| } |
| |
| EVP_MD_CTX_set_pkey_ctx(md_ctx_verify, sctx); |
| |
| if ( (EVP_DigestVerifyInit(md_ctx_verify, NULL, EVP_sm3(), NULL, pkey)) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_DigestVerifyUpdate(md_ctx_verify, message, sizeof(message))) != 1 ) { |
| goto clean_up; |
| } |
| |
| if ( (EVP_DigestVerifyFinal(md_ctx_verify, sig, sig_len)) != 1 ) { |
| printf("Verify SM2 signature failed!\n"); |
| goto clean_up; |
| } else { |
| printf("Verify SM2 signature succeeded!\n"); |
| } |
| |
| ret = 0; |
| clean_up: |
| if (pctx) { |
| EVP_PKEY_CTX_free(pctx); |
| } |
| |
| if (pkey) { |
| EVP_PKEY_free(pkey); |
| } |
| |
| if (priv_key_str) { |
| OPENSSL_free(priv_key_str); |
| } |
| |
| if (ctx) { |
| BN_CTX_end(ctx); |
| BN_CTX_free(ctx); |
| } |
| |
| if (x_coordinate_str) { |
| OPENSSL_free(x_coordinate_str); |
| } |
| |
| if (y_coordinate_str) { |
| OPENSSL_free(y_coordinate_str); |
| } |
| |
| if (md_ctx) { |
| EVP_MD_CTX_free(md_ctx); |
| } |
| |
| if (sctx) { |
| EVP_PKEY_CTX_free(sctx); |
| } |
| |
| if (sig) { |
| free(sig); |
| } |
| |
| if (md_ctx_verify) { |
| EVP_MD_CTX_free(md_ctx_verify); |
| } |
| return 0; |
| } |

【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 10年+ .NET Coder 心语 ── 封装的思维:从隐藏、稳定开始理解其本质意义
· 地球OL攻略 —— 某应届生求职总结
· 周边上新:园子的第一款马克杯温暖上架
· Open-Sora 2.0 重磅开源!
· 提示词工程——AI应用必不可少的技术