diff options
author | Matt Caswell <matt@openssl.org> | 2018-05-31 15:53:30 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2018-06-04 11:59:56 +0100 |
commit | 2167239abaec5fa44072fa1194505af0b3fced89 (patch) | |
tree | 60528bbddc4973d9c660c66370f8cd9c33047642 /crypto/include | |
parent | 206521a06efe10d1eafac5b313ce42850fd75136 (diff) |
Use lowercase for internal SM2 symbols
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6386)
Diffstat (limited to 'crypto/include')
-rw-r--r-- | crypto/include/internal/sm2.h | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/crypto/include/internal/sm2.h b/crypto/include/internal/sm2.h index 91420a520c..e0e2d756d5 100644 --- a/crypto/include/internal/sm2.h +++ b/crypto/include/internal/sm2.h @@ -24,7 +24,7 @@ extern "C" { /* The default user id as specified in GM/T 0009-2012 */ # define SM2_DEFAULT_USERID "1234567812345678" -int SM2_compute_userid_digest(uint8_t *out, +int sm2_compute_userid_digest(uint8_t *out, const EVP_MD *digest, const char *user_id, const EC_KEY *key); @@ -32,11 +32,11 @@ int SM2_compute_userid_digest(uint8_t *out, * SM2 signature operation. Computes ZA (user id digest) and then signs * H(ZA || msg) using SM2 */ -ECDSA_SIG *SM2_do_sign(const EC_KEY *key, +ECDSA_SIG *sm2_do_sign(const EC_KEY *key, const EVP_MD *digest, const char *user_id, const uint8_t *msg, size_t msg_len); -int SM2_do_verify(const EC_KEY *key, +int sm2_do_verify(const EC_KEY *key, const EVP_MD *digest, const ECDSA_SIG *signature, const char *user_id, const uint8_t *msg, size_t msg_len); @@ -44,32 +44,32 @@ int SM2_do_verify(const EC_KEY *key, /* * SM2 signature generation. Assumes input is an SM3 digest */ -int SM2_sign(int type, const unsigned char *dgst, int dgstlen, +int sm2_sign(int type, const unsigned char *dgst, int dgstlen, unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); /* * SM2 signature verification. Assumes input is an SM3 digest */ -int SM2_verify(int type, const unsigned char *dgst, int dgstlen, +int sm2_verify(int type, const unsigned char *dgst, int dgstlen, const unsigned char *sig, int siglen, EC_KEY *eckey); /* * SM2 encryption */ -int SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, +int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, size_t *ct_size); -int SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, +int sm2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, size_t *pt_size); -int SM2_encrypt(const EC_KEY *key, +int sm2_encrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *msg, size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len); -int SM2_decrypt(const EC_KEY *key, +int sm2_decrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *ciphertext, size_t ciphertext_len, uint8_t *ptext_buf, size_t *ptext_len); |