mbedtls_util.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337
  1. #include "stm32f10x.h"
  2. #include "mbedtls_util.h"
  3. #include <string.h>
  4. #include "mbedtls/sha1.h"
  5. #include "mbedtls/sha256.h"
  6. #include "mbedtls/aes.h"
  7. #include "mbedtls/cipher.h"
  8. #include "mbedtls/base64.h"
  9. #include "sys.h"
  10. #include <stdio.h>
  11. #include "AT.h"
  12. #define KEY_IOPAD_SIZE 64
  13. #define SHA1_DIGEST_SIZE 20
  14. #define SHA256_DIGEST_SIZE 32
  15. #define AES_LEN_SIZE 256
  16. #define AES_BLOCK_SIZE 16
  17. //unsigned char buffer[AES_LEN_SIZE*2]={0};
  18. static char plaintextdata[AES_LEN_SIZE]= {0};
  19. /**
  20. * 填充源码,返回填充后的数据长度
  21. */
  22. //static int fillAESPKCS7Data(char* data)
  23. //{
  24. // int left= 0;
  25. // int len = strlen(data);
  26. // if(len%AES_BLOCK_SIZE != 0)
  27. // {
  28. // left = AES_BLOCK_SIZE-strlen(data)%AES_BLOCK_SIZE;
  29. //
  30. // }
  31. // else
  32. // {
  33. // left = AES_BLOCK_SIZE;
  34. // }
  35. // memset(data+strlen(data),left,left);
  36. // len+=left;
  37. // return len;
  38. //}
  39. static int fillAESPKCS7DataWithLength(uint8_t * data, uint16_t data_length)
  40. {
  41. int left= 0;
  42. int len = data_length;
  43. if(len%AES_BLOCK_SIZE != 0)
  44. {
  45. left = AES_BLOCK_SIZE - data_length%AES_BLOCK_SIZE;
  46. }
  47. else
  48. {
  49. left = AES_BLOCK_SIZE;
  50. }
  51. memset(data + data_length, left, left);
  52. len += left;
  53. return len;
  54. }
  55. /**
  56. * 去除源码无效数据
  57. */
  58. static void cutAESPKCS7Data(char* data)
  59. {
  60. int i= 0;
  61. int size = strlen(data);
  62. for(i=size-1;data[i]>0&&data[i]<AES_BLOCK_SIZE;i--)
  63. {
  64. data[i]=0;
  65. }
  66. }
  67. void utils_hmac_sha1_str(const char *msg, int msg_len, char *digest, const char *key, int key_len)
  68. {
  69. //对函数参数判空
  70. if((NULL == msg) || (NULL == digest) || (NULL == key)) {
  71. return;
  72. }
  73. //限制密钥长度
  74. if(key_len > KEY_IOPAD_SIZE) {
  75. return;
  76. }
  77. //hmac sha1加密处理
  78. mbedtls_sha1_context context;
  79. unsigned char k_ipad[KEY_IOPAD_SIZE]; /* inner padding - key XORd with ipad */
  80. unsigned char k_opad[KEY_IOPAD_SIZE]; /* outer padding - key XORd with opad */
  81. unsigned char out[SHA1_DIGEST_SIZE];
  82. int i;
  83. /* start out by storing key in pads */
  84. memset(k_ipad, 0, sizeof(k_ipad));
  85. memset(k_opad, 0, sizeof(k_opad));
  86. memcpy(k_ipad, key, key_len);
  87. memcpy(k_opad, key, key_len);
  88. /* XOR key with ipad and opad values */
  89. for (i = 0; i < KEY_IOPAD_SIZE; i++) {
  90. k_ipad[i] ^= 0x36;
  91. k_opad[i] ^= 0x5c;
  92. }
  93. /* perform inner MD5 */
  94. mbedtls_sha1_init(&context); /* init context for 1st pass */
  95. mbedtls_sha1_starts(&context); /* setup context for 1st pass */
  96. mbedtls_sha1_update(&context, k_ipad, KEY_IOPAD_SIZE); /* start with inner pad */
  97. mbedtls_sha1_update(&context, (unsigned char *) msg, msg_len); /* then text of datagram */
  98. mbedtls_sha1_finish(&context, out); /* finish up 1st pass */
  99. /* perform outer MD5 */
  100. mbedtls_sha1_init(&context); /* init context for 2nd pass */
  101. mbedtls_sha1_starts(&context); /* setup context for 2nd pass */
  102. mbedtls_sha1_update(&context, k_opad, KEY_IOPAD_SIZE); /* start with outer pad */
  103. mbedtls_sha1_update(&context, out, SHA1_DIGEST_SIZE); /* then results of 1st hash */
  104. mbedtls_sha1_finish(&context, out); /* finish up 2nd pass */
  105. //加密后的数据16进制输出
  106. byteToHexStr(out,digest,SHA1_DIGEST_SIZE);
  107. mbedtls_sha1_free(&context);
  108. }
  109. //static char testhexdata[512] ={0};
  110. void utils_sha256(const char *msg, int msg_len, char * digest)
  111. {
  112. //hmac sha1加密处理
  113. mbedtls_sha256_context context;
  114. // memset(testhexdata, 0, sizeof(testhexdata));
  115. /* perform inner MD5 */
  116. mbedtls_sha256_init(&context); /* init context for 1st pass */
  117. mbedtls_sha256_starts(&context,0); /* setup context for 1st pass */
  118. mbedtls_sha256_update(&context, (unsigned char *) msg, msg_len); /* then text of datagram */
  119. mbedtls_sha256_finish(&context, (unsigned char *) digest); /* finish up 1st pass */
  120. mbedtls_sha256_free(&context);
  121. // byteToHexStr((const unsigned char *)digest,testhexdata, strlen((char * )digest));
  122. // Log_Printf_Debug("数据报文msg:%s,%d\r\n", msg,msg_len);
  123. // Log_Printf_Debug("数据报文digest:%s\r\n", testhexdata);
  124. }
  125. //void utils_sha256_str(const char *msg, int msg_len, char *digest)
  126. //{
  127. // //hmac sha1加密处理
  128. // //mbedtls_sha256_context context;
  129. // unsigned char out[SHA256_DIGEST_SIZE];
  130. //
  131. // utils_sha256(msg,msg_len, (char * )out);
  132. //
  133. // //加密后的数据16进制输出
  134. // byteToHexStr(out,digest,SHA256_DIGEST_SIZE);
  135. //
  136. //}
  137. /**
  138. *AES CBC加密 , plaintext:源数据,ciphertext:加密数据, 返回加密长度
  139. */
  140. char iv_use[16] = {0};
  141. //int utils_aes128_cbc_enc(uint8_t * aes_key, char *iv, char *plaintext, char *ciphertext)
  142. //{
  143. //
  144. // memset(testhexdata, 0, sizeof(testhexdata));
  145. // byteToHexStr((const unsigned char *)aes_key,testhexdata, 16);
  146. // Log_Printf_Debug("数据报文aes_key:%s,iv:%s\r\n", testhexdata,iv);
  147. // memset(testhexdata, 0, sizeof(testhexdata));
  148. // memset(plaintextdata, 0, sizeof(plaintextdata));
  149. // mbedtls_aes_context aes_ctx;
  150. // if(strlen(plaintext)+16 > AES_LEN_SIZE) return 0;
  151. // memset(iv_use,0,sizeof(iv_use));
  152. // memcpy(iv_use,iv,16);
  153. // memcpy(plaintextdata,(const char *)plaintext,strlen(plaintext));
  154. // byteToHexStr((const unsigned char *)plaintextdata,testhexdata, strlen((char * )plaintextdata));
  155. // Log_Printf_Debug("数据报文加密数据plaintextdata:%s\r\n", testhexdata);
  156. //// int len = fillAESPKCS7Data(plaintextdata);
  157. // int len = fillAESPKCS7DataWithLength((uint8_t *)plaintextdata, strlen((char * )plaintextdata));
  158. // memset(testhexdata, 0, sizeof(testhexdata));
  159. // byteToHexStr((const unsigned char *)plaintextdata,testhexdata, len);
  160. // Log_Printf_Debug("数据报文加密数据填充后plaintextdata:%s\r\n", testhexdata);
  161. //
  162. // mbedtls_aes_init(&aes_ctx);
  163. // //setkey_dec
  164. // mbedtls_aes_setkey_enc(&aes_ctx, aes_key, 128);
  165. // mbedtls_aes_crypt_cbc(&aes_ctx, MBEDTLS_AES_ENCRYPT, len, (unsigned char * )iv_use, (unsigned char * )plaintextdata, (unsigned char * )ciphertext);
  166. // byteToHexStr((const unsigned char *)ciphertext,testhexdata, len);
  167. // Log_Printf_Debug("数据报文加密数据后ciphertext:%s,ciphertext:%d,testhexdata:%d,len2:%d\r\n", testhexdata,strlen((char * )ciphertext),strlen(testhexdata),len);
  168. //
  169. //
  170. // mbedtls_aes_free(&aes_ctx);
  171. // return len; //OK
  172. //}
  173. int utils_aes128_cbc_enc_with_length(uint8_t *aes_key, char *iv, uint8_t * plaintext, uint16_t plaintext_length, uint8_t * ciphertext)
  174. {
  175. memset(plaintextdata, 0, sizeof(plaintextdata));
  176. mbedtls_aes_context aes_ctx;
  177. if(plaintext_length + 16 > AES_LEN_SIZE) return -1;
  178. memset(iv_use,0,sizeof(iv_use));
  179. memcpy(iv_use,iv,16);
  180. memcpy(plaintextdata, (const char *)plaintext, plaintext_length);
  181. int len = fillAESPKCS7DataWithLength((uint8_t *)plaintextdata, plaintext_length);
  182. mbedtls_aes_init(&aes_ctx);
  183. //setkey_dec
  184. mbedtls_aes_setkey_enc(&aes_ctx, (unsigned char * )aes_key, 128);
  185. mbedtls_aes_crypt_cbc(&aes_ctx, MBEDTLS_AES_ENCRYPT, len, (unsigned char * )iv_use, (unsigned char * )plaintextdata, (unsigned char * )ciphertext);
  186. mbedtls_aes_free(&aes_ctx);
  187. return len; //OK
  188. }
  189. /**
  190. *AES ECB加密 , src:源数据,dataLen:数据长度,ciphertext:加密数据, 返回加密长度
  191. */
  192. int utils_aes128_ECB_base64_enc_with_length(char *aes_key, uint8_t * plaintext)
  193. {
  194. int times=0;
  195. memset(plaintextdata, 0, sizeof(plaintextdata));
  196. mbedtls_aes_context aes_ctx;
  197. if(strlen((const char *)plaintext) + 16 > AES_LEN_SIZE) return -1;
  198. memcpy(plaintextdata, plaintext, strlen((const char *)plaintext));
  199. int len = fillAESPKCS7DataWithLength((uint8_t *)plaintextdata, strlen((const char *)plaintext));
  200. mbedtls_aes_init(&aes_ctx);
  201. //setkey_dec
  202. mbedtls_aes_setkey_enc(&aes_ctx, (unsigned char * )aes_key, 128);
  203. while(times*AES_BLOCK_SIZE<len){
  204. mbedtls_aes_crypt_ecb(&aes_ctx, MBEDTLS_AES_ENCRYPT, (unsigned char * )plaintextdata+times*AES_BLOCK_SIZE, (unsigned char * )plaintext+times*AES_BLOCK_SIZE);
  205. ++times;
  206. }
  207. mbedtls_aes_free(&aes_ctx);
  208. return len;
  209. }
  210. /**
  211. *AES ECB解密, src:源数据,dataLen:数据长度,ciphertext:加密数据
  212. */
  213. int utils_aes128_ECB_base64_dec(char *aes_key, uint8_t * plaintext, uint16_t recvdata_length)
  214. {
  215. int times=0;
  216. memset(plaintextdata, 0, sizeof(plaintextdata));
  217. mbedtls_aes_context aes_ctx;
  218. if(strlen((const char *)plaintext) + 16 > AES_LEN_SIZE) return -1;
  219. memcpy(plaintextdata, plaintext, strlen((const char *)plaintext));
  220. mbedtls_aes_init(&aes_ctx);
  221. //setkey_dec
  222. mbedtls_aes_setkey_dec(&aes_ctx, (unsigned char * )aes_key, 128);
  223. while(times*AES_BLOCK_SIZE<recvdata_length){
  224. mbedtls_aes_crypt_ecb(&aes_ctx, MBEDTLS_AES_DECRYPT, (unsigned char * )plaintextdata+times*AES_BLOCK_SIZE, (unsigned char * )plaintext+times*AES_BLOCK_SIZE);
  225. ++times;
  226. }
  227. cutAESPKCS7Data((char *)plaintext);
  228. mbedtls_aes_free(&aes_ctx);
  229. return strlen((const char *)plaintext);
  230. }
  231. /**
  232. *AES CBC解密 ciphertext:加密数据, len:加密数据长度,plaintext:解密到的数据
  233. */
  234. int utils_aes128_cbc_dec(uint8_t *aes_key, char *iv, char *ciphertext, int len, char *plaintext)
  235. {
  236. char iv_use[16] = {0};
  237. mbedtls_aes_context aes_ctx;
  238. if(len%16&&len>AES_LEN_SIZE) return 0;
  239. memcpy(iv_use,iv,16);
  240. mbedtls_aes_init(&aes_ctx);
  241. //setkey_dec
  242. mbedtls_aes_setkey_dec(&aes_ctx, aes_key, 128);
  243. mbedtls_aes_crypt_cbc(&aes_ctx, MBEDTLS_AES_DECRYPT, len, (unsigned char * )iv_use, (unsigned char * )ciphertext, (unsigned char * )plaintext);
  244. cutAESPKCS7Data((char *)plaintext);
  245. mbedtls_aes_free(&aes_ctx);
  246. return strlen(plaintext); //OK
  247. }
  248. ///**
  249. //*AES CBC加密 , src:源数据,dataLen:数据长度,ciphertext:加密数据, 返回加密长度
  250. //*/
  251. //int utils_aes128_cbc_base64_enc(char *aes_key, char *iv, uint8_t *src,int dataLen, char *ciphertext)
  252. //{
  253. // size_t len;
  254. //
  255. // memset(buffer, 0, sizeof(buffer));
  256. // if(dataLen+16 > AES_LEN_SIZE) return 0;
  257. //
  258. // int ret = mbedtls_base64_encode( buffer, sizeof( buffer ), &len, src, dataLen );
  259. // printf("base64_encode:%s\r\n",buffer);
  260. // if(ret)
  261. // {
  262. // printf("base64 encode err:%d",ret);
  263. // return 0;
  264. // }
  265. // return utils_aes128_cbc_enc(aes_key,iv,(char * )buffer,ciphertext);
  266. //
  267. //}
  268. ///**
  269. //*AES CBC解密 ciphertext:加密数据, len:加密数据长度,plaintext:解密到的数据
  270. //*/
  271. //int utils_aes128_cbc_base64_dec(char *aes_key, char *iv, char *ciphertext, int dataLen, char *plaintext,int plainLen)
  272. //{
  273. // size_t len = 0;
  274. // memset(buffer, '\0', sizeof(buffer));
  275. // int retlen = utils_aes128_cbc_dec(aes_key,iv,ciphertext,dataLen,(char * )buffer);
  276. // if(retlen)
  277. // {
  278. // printf("base64_encode2:%s\r\n",buffer);
  279. // int ret = mbedtls_base64_decode((unsigned char * )plaintext, plainLen, &len, buffer, retlen);
  280. // if(ret)
  281. // {
  282. // printf("base64 decode err:%d,%d",ret,retlen);
  283. // len = 0;
  284. // }
  285. // }
  286. // return len;
  287. //}