简体中文 | English
Welcome to visit the openHiTLS Code Repository, which is under the openHiTLS community: https://openhitls.net. openHiTLS aims to provide highly efficient and agile open-source SDKs for Cryptography and Transport Layer Security in all scenarios. openHiTLS is developing and supports some common standard cryptographic algorithms, (D)TLS, (D)TLCP protocols currently. More features are to be planned.
The architecture of openHiTLS is highly modular, and openHiTLS can be configured in modules and features. The RAM/ROM footprint depends on the features selected. It provides the optimal performance optimization for cryptographic algorithms. Currently, 5 components and cryptographic algorithms are configured, ISO19790 certified, and the performance optimization of ShangMi cryptographic algorithms on ARM, x86 is ready. More architectures and features are to be planned.
- Protocols:
- TLS: Support TLS1.3, TLS1.3-Hybrid-Key-Exchange, TLS-Provider, TLS-Multi-KeyShare, TLS-Custom-Extension, TLCP, DTLCP, TLS1.2, DTLS1.2.
- Authentication: Support Privacy Pass token, HOTP, TOTP, SPAKE2+.
- Algorithms:
- Post-quantum algorithms: ML-DSA, ML-KEM, SLH-DSA, XMSS, Classic McEliece, FrodoKEM.
- Symmetric algorithms: AES, SM4, Chacha20, and various symmetric encryption modes.
- Traditional asymmetric algorithms: RSA, RSA-Bind, DSA, ECDSA, EDDSA, ECDH, DH, SM2, SM9, Paillier, ElGamal.
- Random: DRBG, DRBG-GM.
- Key derivation: HKDF, SCRYPT, PBKDF2.
- Hash: SHA series, MD5, SM3.
- Message authentication code: HMAC, CMAC.
- Others: HPKE.
- PKI:
- Post-quantum capabilities: Support XMSS, ML-DSA, ML-KEM, SLH-DSA certificate capabilities, ML-DSA CMS SignedData capability.
- Traditional certificate capabilities: Support X509 parsing and verification, CRL parsing and verification, CSR request generation, certificate chain generation, partial/full certificate chain validation
- PKCS7, PKCS8, PKCS12, etc.
- Command line: Support basic commands, random numbers, encryption and decryption, key and parameter management, certificates and so on.
- Highly modular features, support trimming features as required.
- Algorithm performance optimization based on ARMv8, ARMv7, x86_64 CPU.
- Support for maintainability and testability based on logging and error stack functionality.
Currently, openHiTLS has 5 components. The BSL component will be used with other components.
- BSL is short for Base Support Layer, which provides the base C standard enhanced functions and OS adapter. It will be used with other modules.
- Crypto provides the full cryptographic functions with high performance. It will be used by tls, and can also be used with bsl.
- TLS is short for Transport Layer Security, which covers TLS1.3 and previous TLS versions. It will be used with crypto, bsl and other third-party cryptographic components or PKI libraries.
- PKI component provides functions such as certificate and CRL parsing, certificate and CRL validation, as well as certificate request and generation.
- Auth authentication component provides authentication functions. Currently, it provides Privacy Pass token, TOTP/HOTP, SPAKE2+.
git clone https://gitcode.com/openhitls/openhitls.git
cd openhitls
mkdir -p build && cd build
cmake .. && make && make installSource code mirroring of the official releases is pending for planning.
The official source code repository is located at https://gitcode.com/openhitls. A local copy of the git repository can be obtained by cloning it using:
git clone https://gitcode.com/openhitls/openhitls.git
If you are going to contribute, you need to fork the openhitls repository on gitcode and clone your public fork instead:
git clone https://gitcode.com/"your gitcode name"/openhitls.git
This document is designed to improve the learning efficiency of developers and contributors on openHiTLS. Refer to the docs.
The major steps in Linux are as follows. Refer to build & install The major steps in Linux:
Step 1 (Prepare the build directory):
cd openhitls && mkdir -p ./build && cd ./buildStep 2 (Configure, choose as needed):
- Default build (all features enabled, builds static libraries and shared libraries):
cmake ..- Full build using preset:
cmake .. -DHITLS_BUILD_PROFILE=full- Manual feature selection:
cmake .. -DHITLS_BUILD_PROFILE=none -DHITLS_CRYPTO_SHA256=ON- Enable assembly optimizations (auto-detect platform type):
cmake .. -DHITLS_ASM=ON- Full build with x86_64 assembly optimizations:
cmake .. -DHITLS_BUILD_PROFILE=full -DHITLS_ASM_X8664=ON- Build the command line tool:
cmake .. -DHITLS_BUILD_EXE=ON- Bundle all modules into a single library:
cmake .. -DHITLS_BUNDLE_LIB=ONMore options are described in Build Installation Guide
Step 3 (Build and install):
make && make installIf you plan to contribute to the openHiTLS community, please visit the link CLA Signing to complete CLA signing.