




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、C代碼使openssl庫實(shí)現(xiàn)AES-128-CBC-PKCS5padding加密解密剛剛幫伙伴實(shí)現(xiàn)了這個(gè)(已經(jīng)和java對接正常),貌似上沒有好的C實(shí)現(xiàn),#include #include #include #include #include char * base64Encode(const char *buffer, int length, int newLine); char * base64Decode(char *input, int length, int newLine);void handleOpenSSLErrors(void)unsigned long errCode;pr
2、intf(An error occurredn); while(errCode = ERR_get_error() char *err = ERR_error_string(errCode, NULL); printf(%sn, err);/abort();/* AES_CBC_PKCS5_BASE64_Encrypt* 參:* src:明* srcLen:明長度* key:密鑰 長度只能是16/24/32字節(jié) 否則OPENSSL會對key進(jìn)截取或PKCS0填充* keyLen:密鑰長度* outLen:密base64后長度* 返回值: 密base64后的字符串,使后請free/todo:EV
3、P_EncryptInit_ex(ctx, EVP_aes_128_cbc() .中的EVP_aes_128_cbc 前硬編碼后續(xù)可以優(yōu)化*/#define AES_BLOCK_SIZE 16unsigned char *AES_CBC_PKCS5_BASE64_Encrypt(unsigned char *src, int srcLen, unsigned char *key, int keyLen, int*outLen, unsigned char *iv)EVP_CIPHER_CTX *ctx = NULL;char * res = NULL; int blockCount = 0;i
4、nt quotient = srcLen / AES_BLOCK_SIZE; int mod = srcLen % AES_BLOCK_SIZE; blockCount = quotient + 1;int padding = AES_BLOCK_SIZE - mod;char *in = (char *)malloc(AES_BLOCK_SIZE*blockCount); memset(in, padding, AES_BLOCK_SIZE*blockCount); memcpy(in, src, srcLen);/outchar *out = (char *)malloc(AES_BLOC
5、K_SIZE*blockCount); memset(out, 0x00, AES_BLOCK_SIZE*blockCount);*outLen = AES_BLOCK_SIZE*blockCount;do if(!(ctx = EVP_CIPHER_CTX_new() handleOpenSSLErrors();break;if(1 != EVP_EncryptInit_ex(ctx, EVP_aes_128_cbc(), NULL, key, iv) handleOpenSSLErrors();break;if(1 != EVP_EncryptUpdate(ctx, (unsigned c
6、har*)out, outLen, in, AES_BLOCK_SIZE*blockCount) handleOpenSSLErrors();break;res = base64Encode(out, *outLen, 0);while(0);free(in); free(out);if (ctx != NULL) EVP_CIPHER_CTX_free(ctx);return (unsigned char*)res;/* AES_CBC_PKCS5_Decrypt* 參:* src:base64編碼后的密* srcLen:密長度* key:密鑰 長度只能是16/24/32字節(jié) 否則OPENS
7、SL會對key進(jìn)截取或PKCS0填充* keyLen:密鑰長度* outLen:明長度* 返回值: 明 需要free*/unsigned char *AES_CBC_PKCS5_BASE64_Decrypt(unsigned char *src, int srcLen, unsigned char *key, int keyLen, int*outLen, unsigned char *iv)EVP_CIPHER_CTX *ctx = NULL;char *in = base64Decode(src, srcLen, 0); char *out = (char*)malloc(srcLen);
8、do /* Create and initialise the context */ if(!(ctx = EVP_CIPHER_CTX_new() handleOpenSSLErrors(); break;/* Initialise the encryption operation. IMPORTANT - ensure you use a key* and IV size appropriate for your cipher* In this example we are using 256 bit AES (i.e. a 256 bit key). The* IV size for *
9、most* modes is the same as the block size. For AES this* is 128 bits */if(1 != EVP_DecryptInit_ex(ctx, EVP_aes_128_cbc(), NULL, key, iv) handleOpenSSLErrors();break;if(1 != EVP_DecryptUpdate(ctx, out, outLen, in, srcLen*3/4) handleOpenSSLErrors();break;while(0);free(in);if (ctx != NULL) EVP_CIPHER_C
10、TX_free(ctx);/PKCS5 UNPADDINGint unpadding = out*outLen - 1;*outLen = *outLen - unpadding; out*outLen = 0;return (unsigned char*)out;int main(int argc, char *argv)int outLen = 0;char *res = AES_CBC_PKCS5_BASE64_Encrypt(argv1, strlen(argv1), 7854156156611111, 16, &outLen, 0000000000000000);printf(the
11、 result%srn, res);char *res2 = AES_CBC_PKCS5_BASE64_Decrypt(res, strlen(res), 7854156156611111, 16, &outLen, 0000000000000000);printf(the org%s rn, res2);/ base64 編 碼char * base64Encode(const char *buffer, int length, int newLine)BIO *bmem = NULL; BIO *b64 = NULL;BUF_MEM *bptr;b64 = BIO_new(BIO_f_ba
12、se64(); if (!newLine) BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);bmem = BIO_new(BIO_s_mem(); b64 = BIO_push(b64, bmem); BIO_write(b64, buffer, length); BIO_flush(b64); BIO_get_mem_ptr(b64, &bptr); BIO_set_close(b64, BIO_NOCLOSE);char *buff = (char *)malloc(bptr-length + 1); memcpy(buff, bptr-data, b
13、ptr-length); buffbptr-length = 0;BIO_free_all(b64);return buff;/ base64 解 碼char * base64Decode(char *input, int length, int newLine)BIO *b64 = NULL;BIO *bmem = NULL;char *buffer = (char *)malloc(length); memset(buffer, 0, length);b64 = BIO_new(BIO_f_base64(); if (!newLine) BIO_set_flags(b64, BIO_FLA
14、GS_BASE64_NO_NL);bmem = BIO_new_mem_buf(input, length); bmem = BIO_push(b64, bmem); BIO_read(bmem, buffer, length); BIO_free_all(bmem);return buffer;同時(shí)貼下java的版本:import javax.crypto.Cipher;import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec;import java.util.Base64; public
15、 class Main public static String encrypt(String key, String initVector, String value) try IvParameterSpec iv = new IvParameterSpec(initVector.getBytes(UTF-8); SecretKeySpec skeySpec = new SecretKeySpec(key.getBytes(UTF-8), AES);Cipher cipher = Cipher.getInstance(AES/CBC/PKCS5PADDING); cipher.init(Ci
16、pher.ENCRYPT_MODE, skeySpec, iv);byte encrypted = cipher.doFinal(value.getBytes();System.out.println(encrypted string: + Base64.getEncoder().encodeToString(encrypted);return Base64.getEncoder().encodeToString(encrypted); catch (Exception ex) ex.printStackTrace();return null;public static String decr
17、ypt(String key, String initVector, String encrypted) try IvParameterSpec iv = new IvParameterSpec(initVector.getBytes(UTF-8); SecretKeySpec skeySpec = new SecretKeySpec(key.getBytes(UTF-8), AES);Cipher cipher = Cipher.getInstance(AES/CBC/PKCS5PADDING); cipher.init(Cipher.DECRYPT_MODE, skeySpec, iv);
18、byte original = cipher.doFinal(Base64.getDecoder().decode(encrypted); return new String(original); catch (Exception ex) ex.printStackTrace();return null;public static void main(String args) String key = 7854156156611111;String initVector = 0000000000000000; / 16 bytes IVSystem.out.println(decrypt(ke
19、y, initVector, encrypt(key, initVector, test1111111111111111111111111111111111111111111111111111111111lkjflajfldkjasldfkjalhzlclz1xxxxxxxxxxxx golang的版本:package main import (bytes crypto/aes crypto/cipher encoding/base64 fmt)const (key = 7854156156611111iv = 0000000000000000)func main() str := test1
20、234es, _ := AesEncrypt(str, byte(key) fmt.Println(es)ds, _ := AesDecrypt(es, byte(key) fmt.Println(string(ds)func AesEncrypt(encodeStr string, key byte) (string, error) encodeBytes := byte(encodeStr)/根據(jù)key 成密block, err := aes.NewCipher(key) if err != nil return , errblockSize := block.BlockSize()encodeBytes = PKCS5Padding(encodeBytes, blockSize)blockMode := cipher.NewCBCEncrypter(block, byte(iv) crypted := make(byte, len(encodeBytes) blockMode.CryptBlocks(crypted, encodeBytes)return base64.StdEncoding.EncodeToString(crypted), nilfunc PKCS5Padding(ciphertext byte, blockSi
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 用發(fā)帶打造出時(shí)尚優(yōu)雅的發(fā)型
- 綠色施工對施工企業(yè)競爭力的影響
- 幸福的元旦故事時(shí)間
- 新春的祝福與希望
- 土木工程項(xiàng)目的BIM項(xiàng)目管理實(shí)踐
- 房地產(chǎn)項(xiàng)目戰(zhàn)略規(guī)劃方法
- 兒童普通疾病護(hù)理常識
- 地漏處防水坡度潑水試驗(yàn)技術(shù)解析
- 保險(xiǎn)公司晚宴策劃方案
- 保險(xiǎn)公司節(jié)日活動方案
- 2025春國開《金融基礎(chǔ)》形考任務(wù)1-5答案
- 2025年南郵面試試題及答案
- 第五講鑄牢中華民族共同體意識-2024年形勢與政策
- JT-T-1064-2016橋梁阻尼減震多向變位梳齒板伸縮裝置
- GB/T 13912-2020金屬覆蓋層鋼鐵制件熱浸鍍鋅層技術(shù)要求及試驗(yàn)方法
- (高清版)建筑防護(hù)欄桿技術(shù)標(biāo)準(zhǔn)JGJ_T 470-2019
- 整車數(shù)據(jù)展示,汽車設(shè)計(jì)資料
- 加芯攪拌樁技術(shù)規(guī)程 YB-2007
- 中華口腔醫(yī)學(xué)會修復(fù)專委會??茣T入會申請表
- 高支模專項(xiàng)施工方案(專家論證通過
- 電力電纜尼龍12護(hù)套擠制工藝的探討
評論
0/150
提交評論