C代碼使用openssl庫實(shí)現(xiàn)AES-128-CBC-PKCS5padding加密解密_第1頁
C代碼使用openssl庫實(shí)現(xiàn)AES-128-CBC-PKCS5padding加密解密_第2頁
C代碼使用openssl庫實(shí)現(xiàn)AES-128-CBC-PKCS5padding加密解密_第3頁
C代碼使用openssl庫實(shí)現(xiàn)AES-128-CBC-PKCS5padding加密解密_第4頁
C代碼使用openssl庫實(shí)現(xiàn)AES-128-CBC-PKCS5padding加密解密_第5頁
已閱讀5頁,還剩1頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1、C代碼使openssl庫實(shí)現(xiàn)AES-128-CBC-PKCS5padding加密解密剛剛幫伙伴實(shí)現(xiàn)了這個(gè)(已經(jīng)和java對接正常),貌似上沒有好的C實(shí)現(xiàn),#include #include #include #include #include char * base64Encode(const char *buffer, int length, int newLine); char * base64Decode(char *input, int length, int newLine);void handleOpenSSLErrors(void)unsigned long errCode;pr

2、intf(An error occurredn); while(errCode = ERR_get_error() char *err = ERR_error_string(errCode, NULL); printf(%sn, err);/abort();/* AES_CBC_PKCS5_BASE64_Encrypt* 參:* src:明* srcLen:明長度* key:密鑰 長度只能是16/24/32字節(jié) 否則OPENSSL會(huì)對key進(jìn)截取或PKCS0填充* keyLen:密鑰長度* outLen:密base64后長度* 返回值: 密base64后的字符串,使后請free/todo:EV

3、P_EncryptInit_ex(ctx, EVP_aes_128_cbc() .中的EVP_aes_128_cbc 前硬編碼后續(xù)可以優(yōu)化*/#define AES_BLOCK_SIZE 16unsigned char *AES_CBC_PKCS5_BASE64_Encrypt(unsigned char *src, int srcLen, unsigned char *key, int keyLen, int*outLen, unsigned char *iv)EVP_CIPHER_CTX *ctx = NULL;char * res = NULL; int blockCount = 0;i

4、nt quotient = srcLen / AES_BLOCK_SIZE; int mod = srcLen % AES_BLOCK_SIZE; blockCount = quotient + 1;int padding = AES_BLOCK_SIZE - mod;char *in = (char *)malloc(AES_BLOCK_SIZE*blockCount); memset(in, padding, AES_BLOCK_SIZE*blockCount); memcpy(in, src, srcLen);/outchar *out = (char *)malloc(AES_BLOC

5、K_SIZE*blockCount); memset(out, 0x00, AES_BLOCK_SIZE*blockCount);*outLen = AES_BLOCK_SIZE*blockCount;do if(!(ctx = EVP_CIPHER_CTX_new() handleOpenSSLErrors();break;if(1 != EVP_EncryptInit_ex(ctx, EVP_aes_128_cbc(), NULL, key, iv) handleOpenSSLErrors();break;if(1 != EVP_EncryptUpdate(ctx, (unsigned c

6、har*)out, outLen, in, AES_BLOCK_SIZE*blockCount) handleOpenSSLErrors();break;res = base64Encode(out, *outLen, 0);while(0);free(in); free(out);if (ctx != NULL) EVP_CIPHER_CTX_free(ctx);return (unsigned char*)res;/* AES_CBC_PKCS5_Decrypt* 參:* src:base64編碼后的密* srcLen:密長度* key:密鑰 長度只能是16/24/32字節(jié) 否則OPENS

7、SL會(huì)對key進(jìn)截取或PKCS0填充* keyLen:密鑰長度* outLen:明長度* 返回值: 明 需要free*/unsigned char *AES_CBC_PKCS5_BASE64_Decrypt(unsigned char *src, int srcLen, unsigned char *key, int keyLen, int*outLen, unsigned char *iv)EVP_CIPHER_CTX *ctx = NULL;char *in = base64Decode(src, srcLen, 0); char *out = (char*)malloc(srcLen);

8、do /* Create and initialise the context */ if(!(ctx = EVP_CIPHER_CTX_new() handleOpenSSLErrors(); break;/* Initialise the encryption operation. IMPORTANT - ensure you use a key* and IV size appropriate for your cipher* In this example we are using 256 bit AES (i.e. a 256 bit key). The* IV size for *

9、most* modes is the same as the block size. For AES this* is 128 bits */if(1 != EVP_DecryptInit_ex(ctx, EVP_aes_128_cbc(), NULL, key, iv) handleOpenSSLErrors();break;if(1 != EVP_DecryptUpdate(ctx, out, outLen, in, srcLen*3/4) handleOpenSSLErrors();break;while(0);free(in);if (ctx != NULL) EVP_CIPHER_C

10、TX_free(ctx);/PKCS5 UNPADDINGint unpadding = out*outLen - 1;*outLen = *outLen - unpadding; out*outLen = 0;return (unsigned char*)out;int main(int argc, char *argv)int outLen = 0;char *res = AES_CBC_PKCS5_BASE64_Encrypt(argv1, strlen(argv1), 7854156156611111, 16, &outLen, 0000000000000000);printf(the

11、 result%srn, res);char *res2 = AES_CBC_PKCS5_BASE64_Decrypt(res, strlen(res), 7854156156611111, 16, &outLen, 0000000000000000);printf(the org%s rn, res2);/ base64 編 碼char * base64Encode(const char *buffer, int length, int newLine)BIO *bmem = NULL; BIO *b64 = NULL;BUF_MEM *bptr;b64 = BIO_new(BIO_f_ba

12、se64(); if (!newLine) BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);bmem = BIO_new(BIO_s_mem(); b64 = BIO_push(b64, bmem); BIO_write(b64, buffer, length); BIO_flush(b64); BIO_get_mem_ptr(b64, &bptr); BIO_set_close(b64, BIO_NOCLOSE);char *buff = (char *)malloc(bptr-length + 1); memcpy(buff, bptr-data, b

13、ptr-length); buffbptr-length = 0;BIO_free_all(b64);return buff;/ base64 解 碼char * base64Decode(char *input, int length, int newLine)BIO *b64 = NULL;BIO *bmem = NULL;char *buffer = (char *)malloc(length); memset(buffer, 0, length);b64 = BIO_new(BIO_f_base64(); if (!newLine) BIO_set_flags(b64, BIO_FLA

14、GS_BASE64_NO_NL);bmem = BIO_new_mem_buf(input, length); bmem = BIO_push(b64, bmem); BIO_read(bmem, buffer, length); BIO_free_all(bmem);return buffer;同時(shí)貼下java的版本:import javax.crypto.Cipher;import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec;import java.util.Base64; public

15、 class Main public static String encrypt(String key, String initVector, String value) try IvParameterSpec iv = new IvParameterSpec(initVector.getBytes(UTF-8); SecretKeySpec skeySpec = new SecretKeySpec(key.getBytes(UTF-8), AES);Cipher cipher = Cipher.getInstance(AES/CBC/PKCS5PADDING); cipher.init(Ci

16、pher.ENCRYPT_MODE, skeySpec, iv);byte encrypted = cipher.doFinal(value.getBytes();System.out.println(encrypted string: + Base64.getEncoder().encodeToString(encrypted);return Base64.getEncoder().encodeToString(encrypted); catch (Exception ex) ex.printStackTrace();return null;public static String decr

17、ypt(String key, String initVector, String encrypted) try IvParameterSpec iv = new IvParameterSpec(initVector.getBytes(UTF-8); SecretKeySpec skeySpec = new SecretKeySpec(key.getBytes(UTF-8), AES);Cipher cipher = Cipher.getInstance(AES/CBC/PKCS5PADDING); cipher.init(Cipher.DECRYPT_MODE, skeySpec, iv);

18、byte original = cipher.doFinal(Base64.getDecoder().decode(encrypted); return new String(original); catch (Exception ex) ex.printStackTrace();return null;public static void main(String args) String key = 7854156156611111;String initVector = 0000000000000000; / 16 bytes IVSystem.out.println(decrypt(ke

19、y, initVector, encrypt(key, initVector, test1111111111111111111111111111111111111111111111111111111111lkjflajfldkjasldfkjalhzlclz1xxxxxxxxxxxx golang的版本:package main import (bytes crypto/aes crypto/cipher encoding/base64 fmt)const (key = 7854156156611111iv = 0000000000000000)func main() str := test1

20、234es, _ := AesEncrypt(str, byte(key) fmt.Println(es)ds, _ := AesDecrypt(es, byte(key) fmt.Println(string(ds)func AesEncrypt(encodeStr string, key byte) (string, error) encodeBytes := byte(encodeStr)/根據(jù)key 成密block, err := aes.NewCipher(key) if err != nil return , errblockSize := block.BlockSize()encodeBytes = PKCS5Padding(encodeBytes, blockSize)blockMode := cipher.NewCBCEncrypter(block, byte(iv) crypted := make(byte, len(encodeBytes) blockMode.CryptBlocks(crypted, encodeBytes)return base64.StdEncoding.EncodeToString(crypted), nilfunc PKCS5Padding(ciphertext byte, blockSi

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論