forked from studyzy/gmcrypto
-
Notifications
You must be signed in to change notification settings - Fork 0
/
crypto.go
165 lines (153 loc) · 5.51 KB
/
crypto.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
package gmcrypto
import (
"crypto"
"hash"
"strconv"
)
// Hash2 identifies a cryptographic hash function that is implemented in another
// package.
type Hash2 uint
func NewHash2(h crypto.Hash) Hash2 {
return Hash2(h)
}
func (h Hash2) ToHash() crypto.Hash {
return crypto.Hash(h)
}
// HashFunc simply returns the value of h so that Hash2 implements SignerOpts.
func (h Hash2) HashFunc() Hash2 {
return h
}
const (
MD4 Hash2 = 1 + iota // import golang.org/x/crypto/md4
MD5 // import crypto/md5
SHA1 // import crypto/sha1
SHA224 // import crypto/sha256
SHA256 // import crypto/sha256
SHA384 // import crypto/sha512
SHA512 // import crypto/sha512
MD5SHA1 // no implementation; MD5+SHA1 used for TLS RSA
RIPEMD160 // import golang.org/x/crypto/ripemd160
SHA3_224 // import golang.org/x/crypto/sha3
SHA3_256 // import golang.org/x/crypto/sha3
SHA3_384 // import golang.org/x/crypto/sha3
SHA3_512 // import golang.org/x/crypto/sha3
SHA512_224 // import crypto/sha512
SHA512_256 // import crypto/sha512
BLAKE2s_256 // import golang.org/x/crypto/blake2s
BLAKE2b_256 // import golang.org/x/crypto/blake2b
BLAKE2b_384 // import golang.org/x/crypto/blake2b
BLAKE2b_512 // import golang.org/x/crypto/blake2b
SM3 // import github.com/studyzy/gmcrypto/sm3
maxHash
)
var digestSizes = []uint8{
MD4: 16,
MD5: 16,
SHA1: 20,
SHA224: 28,
SHA256: 32,
SHA384: 48,
SHA512: 64,
SHA512_224: 28,
SHA512_256: 32,
SHA3_224: 28,
SHA3_256: 32,
SHA3_384: 48,
SHA3_512: 64,
MD5SHA1: 36,
RIPEMD160: 20,
BLAKE2s_256: 32,
BLAKE2b_256: 32,
BLAKE2b_384: 48,
BLAKE2b_512: 64,
SM3: 32,
}
// Size returns the length, in bytes, of a digest resulting from the given hash
// function. It doesn't require that the hash function in question be linked
// into the program.
func (h Hash2) Size() int {
if h > 0 && h < maxHash {
return int(digestSizes[h])
}
panic("crypto: Size of unknown hash function")
}
var hashes = make([]func() hash.Hash, maxHash)
// New returns a new hash.Hash calculating the given hash function. New panics
// if the hash function is not linked into the binary.
func (h Hash2) New() hash.Hash {
if h > 0 && h < maxHash {
f := hashes[h]
if f != nil {
return f()
} else {
return crypto.Hash(h).New()
}
}
panic("crypto: requested hash function #" + strconv.Itoa(int(h)) + " is unavailable")
}
// Available reports whether the given hash function is linked into the binary.
func (h Hash2) Available() bool {
return h < maxHash && (hashes[h] != nil || crypto.Hash(h).Available())
}
// RegisterHash registers a function that returns a new instance of the given
// hash function. This is intended to be called from the init function in
// packages that implement hash functions.
func RegisterHash(h Hash2, f func() hash.Hash) {
if h >= maxHash {
panic("crypto: RegisterHash of unknown hash function")
}
hashes[h] = f
}
//
//// PublicKey represents a public key using an unspecified algorithm.
//type PublicKey interface{}
//
//// PrivateKey represents a private key using an unspecified algorithm.
//type PrivateKey interface{}
//
//// Signer is an interface for an opaque private key that can be used for
//// signing operations. For example, an RSA key kept in a hardware module.
//type Signer interface {
// // Public returns the public key corresponding to the opaque,
// // private key.
// Public() PublicKey
//
// // Sign signs digest with the private key, possibly using entropy from
// // rand. For an RSA key, the resulting signature should be either a
// // PKCS#1 v1.5 or PSS signature (as indicated by opts). For an (EC)DSA
// // key, it should be a DER-serialised, ASN.1 signature structure.
// //
// // Hash2 implements the SignerOpts interface and, in most cases, one can
// // simply pass in the hash function used as opts. Sign may also attempt
// // to type assert opts to other types in order to obtain algorithm
// // specific values. See the documentation in each package for details.
// //
// // Note that when a signature of a hash of a larger message is needed,
// // the caller is responsible for hashing the larger message and passing
// // the hash (as digest) and the hash function (as opts) to Sign.
// Sign(rand io.Reader, digest []byte, opts SignerOpts) (signature []byte, err error)
//}
//
//// SignerOpts contains options for signing with a Signer.
//type SignerOpts interface {
// // HashFunc returns an identifier for the hash function used to produce
// // the message passed to Signer.Sign, or else zero to indicate that no
// // hashing was done.
// HashFunc() Hash2
//}
//
//// Decrypter is an interface for an opaque private key that can be used for
//// asymmetric decryption operations. An example would be an RSA key
//// kept in a hardware module.
//type Decrypter interface {
// // Public returns the public key corresponding to the opaque,
// // private key.
// Public() PublicKey
//
// // Decrypt decrypts msg. The opts argument should be appropriate for
// // the primitive used. See the documentation in each implementation for
// // details.
// Decrypt(rand io.Reader, msg []byte, opts DecrypterOpts) (plaintext []byte, err error)
//}
//
//type DecrypterOpts interface{}