SkillAgentSearch skills...

OpenHiTLS

openhitls

Install / Use

/learn @openHiTLS/OpenHiTLS
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

简体中文 | English

openHiTLS

Welcome to visit the openHiTLS Code Repository, which is under the openHiTLS community: https://openhitls.net. openHiTLS aims to provide highly efficient and agile open-source SDKs for Cryptography and Transport Layer Security in all scenarios. openHiTLS is developing and supports some common standard cryptographic algorithms, (D)TLS, (D)TLCP protocols currently. More features are to be planned.

Overview

The architecture of openHiTLS is highly modular, and openHiTLS can be configured in modules and features. The RAM/ROM footprint depends on the features selected. It provides the optimal performance optimization for cryptographic algorithms. Currently, 5 components and cryptographic algorithms are configured, ISO19790 certified, and the performance optimization of ShangMi cryptographic algorithms on ARM, x86 is ready. More architectures and features are to be planned.

Feature Introduction

Functional Features

  • Protocols:
    • TLS: Support TLS1.3, TLS1.3-Hybrid-Key-Exchange, TLS-Provider, TLS-Multi-KeyShare, TLS-Custom-Extension, TLCP, DTLCP, TLS1.2, DTLS1.2.
    • Authentication: Support Privacy Pass token, HOTP, TOTP, SPAKE2+.
  • Algorithms:
    • Post-quantum algorithms: ML-DSA, ML-KEM, SLH-DSA, XMSS, Classic McEliece, FrodoKEM.
    • Symmetric algorithms: AES, SM4, Chacha20, and various symmetric encryption modes.
    • Traditional asymmetric algorithms: RSA, RSA-Bind, DSA, ECDSA, EDDSA, ECDH, DH, SM2, SM9, Paillier, ElGamal.
    • Random: DRBG, DRBG-GM.
    • Key derivation: HKDF, SCRYPT, PBKDF2.
    • Hash: SHA series, MD5, SM3.
    • Message authentication code: HMAC, CMAC.
    • Others: HPKE.
  • PKI:
    • Post-quantum capabilities: Support XMSS, ML-DSA, ML-KEM, SLH-DSA certificate capabilities, ML-DSA CMS SignedData capability.
    • Traditional certificate capabilities: Support X509 parsing and verification, CRL parsing and verification, CSR request generation, certificate chain generation, partial/full certificate chain validation
    • PKCS7, PKCS8, PKCS12, etc.
  • Command line: Support basic commands, random numbers, encryption and decryption, key and parameter management, certificates and so on.

DFX Features

  • Highly modular features, support trimming features as required.
  • Algorithm performance optimization based on ARMv8, ARMv7, x86_64 CPU.
  • Support for maintainability and testability based on logging and error stack functionality.

Component Introduction

Currently, openHiTLS has 5 components. The BSL component will be used with other components.

  • BSL is short for Base Support Layer, which provides the base C standard enhanced functions and OS adapter. It will be used with other modules.
  • Crypto provides the full cryptographic functions with high performance. It will be used by tls, and can also be used with bsl.
  • TLS is short for Transport Layer Security, which covers TLS1.3 and previous TLS versions. It will be used with crypto, bsl and other third-party cryptographic components or PKI libraries.
  • PKI component provides functions such as certificate and CRL parsing, certificate and CRL validation, as well as certificate request and generation.
  • Auth authentication component provides authentication functions. Currently, it provides Privacy Pass token, TOTP/HOTP, SPAKE2+.

Development

Dependency Preparation

openHiTLS depends on Secure C (libboundscheck), which is now built automatically by the CMake build system, requiring no additional scripts.

Quick Start (Recommended):

# Clone with submodules to get source code and dependencies in one step
git clone --recurse-submodules https://gitcode.com/openhitls/openhitls.git
cd openhitls
mkdir -p build && cd build
cmake .. && make && make install

Alternative Methods:

  1. Already cloned but submodule not initialized:

    git submodule update --init platform/Secure_C
    mkdir -p build && cd build
    cmake .. && make && make install
    
  2. Manual clone of dependency (without submodules):

    git clone https://gitcode.com/openhitls/openhitls.git
    cd openhitls
    git clone https://gitee.com/openeuler/libboundscheck platform/Secure_C
    mkdir -p build && cd build
    cmake .. && make && make install
    

For Application Developers

Source code mirroring of the official releases is pending for planning.

The official source code repository is located at https://gitcode.com/openhitls. A local copy of the git repository can be obtained by cloning it using:

git clone https://gitcode.com/openhitls/openhitls.git

If you are going to contribute, you need to fork the openhitls repository on gitcode and clone your public fork instead:

git clone https://gitcode.com/"your gitcode name"/openhitls.git

Document

This document is designed to improve the learning efficiency of developers and contributors on openHiTLS. Refer to the docs.

Build and Installation

The major steps in Linux are as follows. Refer to build & install The major steps in Linux:

Step 1 (Prepare the build directory):

cd openhitls && mkdir -p ./build && cd ./build

Step 2 (Configure, choose as needed):

  • Default build (all features enabled, builds static libraries and shared libraries):
cmake ..
  • Full build using preset:
cmake .. -DHITLS_BUILD_PROFILE=full
  • Enable assembly optimizations (auto-detect platform type):
cmake .. -DHITLS_ASM=ON
  • Full build with x86_64 assembly optimizations:
cmake .. -DHITLS_BUILD_PROFILE=full -DHITLS_ASM_X8664=ON
  • Build the command line tool:
cmake .. -DHITLS_BUILD_EXE=ON
  • Bundle all modules into a single library:
cmake .. -DHITLS_BUNDLE_LIB=ON

More options are described in Build Installation Guide

Step 3 (Build and install):

make && make install

Contribution

If you plan to contribute to the openHiTLS community, please visit the link CLA Signing to complete CLA signing.

View on GitHub
GitHub Stars88
CategoryDevelopment
Updated3h ago
Forks39

Languages

C

Security Score

95/100

Audited on Apr 7, 2026

No findings