mbedtls_util.c 9.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328
  1. #include "stm32f10x.h"
  2. #include "mbedtls_util.h"
  3. #include <string.h>
  4. #include "mbedtls/sha1.h"
  5. #include "mbedtls/sha256.h"
  6. #include "mbedtls/aes.h"
  7. #include "mbedtls/cipher.h"
  8. #include "mbedtls/base64.h"
  9. #include "sys.h"
  10. #include <stdio.h>
  11. #define KEY_IOPAD_SIZE 64
  12. #define SHA1_DIGEST_SIZE 20
  13. #define SHA256_DIGEST_SIZE 32
  14. #define AES_LEN_SIZE 256
  15. #define AES_BLOCK_SIZE 16
  16. //unsigned char buffer[AES_LEN_SIZE*2]={0};
  17. char plaintextdata[AES_LEN_SIZE]= {0};
  18. /**
  19. * 填充源码,返回填充后的数据长度
  20. */
  21. static int fillAESPKCS7Data(char* data)
  22. {
  23. int left= 0;
  24. int len = strlen(data);
  25. if(len%AES_BLOCK_SIZE != 0)
  26. {
  27. left = AES_BLOCK_SIZE-strlen(data)%AES_BLOCK_SIZE;
  28. }
  29. else
  30. {
  31. left = AES_BLOCK_SIZE;
  32. }
  33. memset(data+strlen(data),left,left);
  34. len+=left;
  35. return len;
  36. }
  37. static int fillAESPKCS7DataWithLength(uint8_t * data, uint16_t data_length)
  38. {
  39. int left= 0;
  40. int len = data_length;
  41. if(len%AES_BLOCK_SIZE != 0)
  42. {
  43. left = AES_BLOCK_SIZE - data_length%AES_BLOCK_SIZE;
  44. }
  45. else
  46. {
  47. left = AES_BLOCK_SIZE;
  48. }
  49. memset(data + data_length, left, left);
  50. len += left;
  51. return len;
  52. }
  53. /**
  54. * 填充源码,返回填充后的数据长度
  55. */
  56. static int fillSrcData(char* data)
  57. {
  58. int left= 0;
  59. int len = strlen(data);
  60. if(len%AES_BLOCK_SIZE != 0)
  61. {
  62. left = AES_BLOCK_SIZE-strlen(data)%AES_BLOCK_SIZE;
  63. memset(data+strlen(data),left,left);
  64. len+=left;
  65. }
  66. return len;
  67. }
  68. /**
  69. * 去除源码无效数据
  70. */
  71. static void cutAESPKCS7Data(char* data)
  72. {
  73. int i= 0;
  74. int size = strlen(data);
  75. for(i=size-1;data[i]>0&&data[i]<AES_BLOCK_SIZE;i--)
  76. {
  77. data[i]=0;
  78. }
  79. }
  80. void utils_hmac_sha1_str(const char *msg, int msg_len, char *digest, const char *key, int key_len)
  81. {
  82. //对函数参数判空
  83. if((NULL == msg) || (NULL == digest) || (NULL == key)) {
  84. return;
  85. }
  86. //限制密钥长度
  87. if(key_len > KEY_IOPAD_SIZE) {
  88. return;
  89. }
  90. //hmac sha1加密处理
  91. mbedtls_sha1_context context;
  92. unsigned char k_ipad[KEY_IOPAD_SIZE]; /* inner padding - key XORd with ipad */
  93. unsigned char k_opad[KEY_IOPAD_SIZE]; /* outer padding - key XORd with opad */
  94. unsigned char out[SHA1_DIGEST_SIZE];
  95. int i;
  96. /* start out by storing key in pads */
  97. memset(k_ipad, 0, sizeof(k_ipad));
  98. memset(k_opad, 0, sizeof(k_opad));
  99. memcpy(k_ipad, key, key_len);
  100. memcpy(k_opad, key, key_len);
  101. /* XOR key with ipad and opad values */
  102. for (i = 0; i < KEY_IOPAD_SIZE; i++) {
  103. k_ipad[i] ^= 0x36;
  104. k_opad[i] ^= 0x5c;
  105. }
  106. /* perform inner MD5 */
  107. mbedtls_sha1_init(&context); /* init context for 1st pass */
  108. mbedtls_sha1_starts(&context); /* setup context for 1st pass */
  109. mbedtls_sha1_update(&context, k_ipad, KEY_IOPAD_SIZE); /* start with inner pad */
  110. mbedtls_sha1_update(&context, (unsigned char *) msg, msg_len); /* then text of datagram */
  111. mbedtls_sha1_finish(&context, out); /* finish up 1st pass */
  112. /* perform outer MD5 */
  113. mbedtls_sha1_init(&context); /* init context for 2nd pass */
  114. mbedtls_sha1_starts(&context); /* setup context for 2nd pass */
  115. mbedtls_sha1_update(&context, k_opad, KEY_IOPAD_SIZE); /* start with outer pad */
  116. mbedtls_sha1_update(&context, out, SHA1_DIGEST_SIZE); /* then results of 1st hash */
  117. mbedtls_sha1_finish(&context, out); /* finish up 2nd pass */
  118. //加密后的数据16进制输出
  119. byteToHexStr(out,digest,SHA1_DIGEST_SIZE);
  120. }
  121. void utils_sha256(const char *msg, int msg_len, char * digest)
  122. {
  123. //hmac sha1加密处理
  124. mbedtls_sha256_context context;
  125. /* perform inner MD5 */
  126. mbedtls_sha256_init(&context); /* init context for 1st pass */
  127. mbedtls_sha256_starts(&context,0); /* setup context for 1st pass */
  128. mbedtls_sha256_update(&context, (unsigned char *) msg, msg_len); /* then text of datagram */
  129. mbedtls_sha256_finish(&context, (unsigned char *) digest); /* finish up 1st pass */
  130. }
  131. void utils_sha256_str(const char *msg, int msg_len, char *digest)
  132. {
  133. //hmac sha1加密处理
  134. //mbedtls_sha256_context context;
  135. unsigned char out[SHA256_DIGEST_SIZE];
  136. utils_sha256(msg,msg_len, (char * )out);
  137. //加密后的数据16进制输出
  138. byteToHexStr(out,digest,SHA256_DIGEST_SIZE);
  139. }
  140. /**
  141. *AES CBC加密 , plaintext:源数据,ciphertext:加密数据, 返回加密长度
  142. */
  143. int utils_aes128_cbc_enc(char *aes_key, char *iv, char *plaintext, char *ciphertext)
  144. {
  145. char iv_use[16] = {0};
  146. memset(plaintextdata, '\0', sizeof(plaintextdata));
  147. mbedtls_aes_context aes_ctx;
  148. if(strlen(plaintext)+16 > AES_LEN_SIZE) return 0;
  149. memcpy(iv_use,iv,16);
  150. memcpy(plaintextdata,(const char *)plaintext,strlen(plaintext));
  151. int len = fillAESPKCS7Data(plaintextdata);
  152. mbedtls_aes_init(&aes_ctx);
  153. //setkey_dec
  154. mbedtls_aes_setkey_enc(&aes_ctx, (unsigned char * )aes_key, 128);
  155. mbedtls_aes_crypt_cbc(&aes_ctx, MBEDTLS_AES_ENCRYPT, len, (unsigned char * )iv_use, (unsigned char * )plaintextdata, (unsigned char * )ciphertext);
  156. mbedtls_aes_free(&aes_ctx);
  157. return len; //OK
  158. }
  159. int utils_aes128_cbc_enc_with_length(char *aes_key, char *iv, uint8_t * plaintext, uint16_t plaintext_length, uint8_t * ciphertext)
  160. {
  161. char iv_use[16] = {0};
  162. memset(plaintextdata, '\0', sizeof(plaintextdata));
  163. mbedtls_aes_context aes_ctx;
  164. if(plaintext_length + 16 > AES_LEN_SIZE) return -1;
  165. memcpy(iv_use,iv,16);
  166. memcpy(plaintextdata, (const char *)plaintext, plaintext_length);
  167. int len = fillAESPKCS7DataWithLength((uint8_t *)plaintextdata, plaintext_length);
  168. mbedtls_aes_init(&aes_ctx);
  169. //setkey_dec
  170. mbedtls_aes_setkey_enc(&aes_ctx, (unsigned char * )aes_key, 128);
  171. mbedtls_aes_crypt_cbc(&aes_ctx, MBEDTLS_AES_ENCRYPT, len, (unsigned char * )iv_use, (unsigned char * )plaintextdata, (unsigned char * )ciphertext);
  172. mbedtls_aes_free(&aes_ctx);
  173. return len; //OK
  174. }
  175. /**
  176. *AES ECB加密 , src:源数据,dataLen:数据长度,ciphertext:加密数据, 返回加密长度
  177. */
  178. int utils_aes128_ECB_base64_enc_with_length(char *aes_key, uint8_t * plaintext)
  179. {
  180. int times=0;
  181. memset(plaintextdata, 0, sizeof(plaintextdata));
  182. mbedtls_aes_context aes_ctx;
  183. if(strlen((const char *)plaintext) + 16 > AES_LEN_SIZE) return -1;
  184. memcpy(plaintextdata, plaintext, strlen((const char *)plaintext));
  185. int len = fillSrcData(plaintextdata);
  186. mbedtls_aes_init(&aes_ctx);
  187. //setkey_dec
  188. mbedtls_aes_setkey_enc(&aes_ctx, (unsigned char * )aes_key, 128);
  189. while(times*AES_BLOCK_SIZE<len){
  190. mbedtls_aes_crypt_ecb(&aes_ctx, MBEDTLS_AES_ENCRYPT, (unsigned char * )plaintextdata+times*AES_BLOCK_SIZE, (unsigned char * )plaintext+times*AES_BLOCK_SIZE);
  191. ++times;
  192. }
  193. mbedtls_aes_free(&aes_ctx);
  194. return len;
  195. }
  196. /**
  197. *AES ECB解密, src:源数据,dataLen:数据长度,ciphertext:加密数据
  198. */
  199. int utils_aes128_ECB_base64_dec(char *aes_key, uint8_t * plaintext, uint16_t recvdata_length)
  200. {
  201. int times=0;
  202. memset(plaintextdata, '\0', sizeof(plaintextdata));
  203. mbedtls_aes_context aes_ctx;
  204. if(strlen((const char *)plaintext) + 16 > AES_LEN_SIZE) return -1;
  205. memcpy(plaintextdata, plaintext, strlen((const char *)plaintext));
  206. mbedtls_aes_init(&aes_ctx);
  207. //setkey_dec
  208. mbedtls_aes_setkey_dec(&aes_ctx, (unsigned char * )aes_key, 128);
  209. while(times*AES_BLOCK_SIZE<recvdata_length){
  210. mbedtls_aes_crypt_ecb(&aes_ctx, MBEDTLS_AES_DECRYPT, (unsigned char * )plaintextdata+times*AES_BLOCK_SIZE, (unsigned char * )plaintext+times*AES_BLOCK_SIZE);
  211. ++times;
  212. }
  213. cutAESPKCS7Data((char *)plaintext);
  214. mbedtls_aes_free(&aes_ctx);
  215. return strlen((const char *)plaintext);
  216. }
  217. /**
  218. *AES CBC解密 ciphertext:加密数据, len:加密数据长度,plaintext:解密到的数据
  219. */
  220. int utils_aes128_cbc_dec(char *aes_key, char *iv, char *ciphertext, int len, char *plaintext)
  221. {
  222. char iv_use[16] = {0};
  223. mbedtls_aes_context aes_ctx;
  224. if(len%16&&len>AES_LEN_SIZE) return 0;
  225. memcpy(iv_use,iv,16);
  226. mbedtls_aes_init(&aes_ctx);
  227. //setkey_dec
  228. mbedtls_aes_setkey_dec(&aes_ctx, (unsigned char * )aes_key, 128);
  229. mbedtls_aes_crypt_cbc(&aes_ctx, MBEDTLS_AES_DECRYPT, len, (unsigned char * )iv_use, (unsigned char * )ciphertext, (unsigned char * )plaintext);
  230. cutAESPKCS7Data((char *)plaintext);
  231. mbedtls_aes_free(&aes_ctx);
  232. return strlen(plaintext); //OK
  233. }
  234. ///**
  235. //*AES CBC加密 , src:源数据,dataLen:数据长度,ciphertext:加密数据, 返回加密长度
  236. //*/
  237. //int utils_aes128_cbc_base64_enc(char *aes_key, char *iv, uint8_t *src,int dataLen, char *ciphertext)
  238. //{
  239. // size_t len;
  240. //
  241. // memset(buffer, 0, sizeof(buffer));
  242. // if(dataLen+16 > AES_LEN_SIZE) return 0;
  243. //
  244. // int ret = mbedtls_base64_encode( buffer, sizeof( buffer ), &len, src, dataLen );
  245. // printf("base64_encode:%s\r\n",buffer);
  246. // if(ret)
  247. // {
  248. // printf("base64 encode err:%d",ret);
  249. // return 0;
  250. // }
  251. // return utils_aes128_cbc_enc(aes_key,iv,(char * )buffer,ciphertext);
  252. //
  253. //}
  254. ///**
  255. //*AES CBC解密 ciphertext:加密数据, len:加密数据长度,plaintext:解密到的数据
  256. //*/
  257. //int utils_aes128_cbc_base64_dec(char *aes_key, char *iv, char *ciphertext, int dataLen, char *plaintext,int plainLen)
  258. //{
  259. // size_t len = 0;
  260. // memset(buffer, '\0', sizeof(buffer));
  261. // int retlen = utils_aes128_cbc_dec(aes_key,iv,ciphertext,dataLen,(char * )buffer);
  262. // if(retlen)
  263. // {
  264. // printf("base64_encode2:%s\r\n",buffer);
  265. // int ret = mbedtls_base64_decode((unsigned char * )plaintext, plainLen, &len, buffer, retlen);
  266. // if(ret)
  267. // {
  268. // printf("base64 decode err:%d,%d",ret,retlen);
  269. // len = 0;
  270. // }
  271. // }
  272. // return len;
  273. //}