Mbedtls_Util.c 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236
  1. #include "stm32f10x.h"
  2. #include "Mbedtls_Util.h"
  3. #include <string.h>
  4. #include <stdio.h>
  5. #include "mbedtls/sha1.h"
  6. #include "mbedtls/sha256.h"
  7. #include "mbedtls/aes.h"
  8. #include "mbedtls/cipher.h"
  9. #include "mbedtls/base64.h"
  10. #include "Common_Util.h"
  11. #define KEY_IOPAD_SIZE 64
  12. #define SHA1_DIGEST_SIZE 20
  13. #define SHA256_DIGEST_SIZE 32
  14. #define AES_LEN_SIZE 256
  15. #define AES_BLOCK_SIZE 16
  16. //unsigned char buffer[AES_LEN_SIZE*2]={0};
  17. static char plaintextdata[AES_LEN_SIZE]= {0};
  18. /**
  19. * 填充源码,返回填充后的数据长度
  20. */
  21. //static int fillAESPKCS7Data(char* data)
  22. //{
  23. // int left= 0;
  24. // int len = strlen(data);
  25. // if(len%AES_BLOCK_SIZE != 0)
  26. // {
  27. // left = AES_BLOCK_SIZE-strlen(data)%AES_BLOCK_SIZE;
  28. //
  29. // }
  30. // else
  31. // {
  32. // left = AES_BLOCK_SIZE;
  33. // }
  34. // memset(data+strlen(data),left,left);
  35. // len+=left;
  36. // return len;
  37. //}
  38. static int fillAESPKCS7DataWithLength(uint8_t * data, uint16_t data_length)
  39. {
  40. int left= 0;
  41. int len = data_length;
  42. if(len%AES_BLOCK_SIZE != 0)
  43. {
  44. left = AES_BLOCK_SIZE - data_length%AES_BLOCK_SIZE;
  45. }
  46. else
  47. {
  48. left = AES_BLOCK_SIZE;
  49. }
  50. memset(data + data_length, left, left);
  51. len += left;
  52. return len;
  53. }
  54. /**
  55. * 去除源码无效数据
  56. */
  57. static void cutAESPKCS7Data(char* data)
  58. {
  59. int i= 0;
  60. int size = strlen(data);
  61. for(i=size-1;data[i]>0&&data[i]<AES_BLOCK_SIZE;i--)
  62. {
  63. data[i]=0;
  64. }
  65. }
  66. void utils_hmac_sha1_str(const char *msg, int msg_len, char *digest, const char *key, int key_len)
  67. {
  68. //对函数参数判空
  69. if((NULL == msg) || (NULL == digest) || (NULL == key)) {
  70. return;
  71. }
  72. //限制密钥长度
  73. if(key_len > KEY_IOPAD_SIZE) {
  74. return;
  75. }
  76. //hmac sha1加密处理
  77. mbedtls_sha1_context context;
  78. unsigned char k_ipad[KEY_IOPAD_SIZE]; /* inner padding - key XORd with ipad */
  79. unsigned char k_opad[KEY_IOPAD_SIZE]; /* outer padding - key XORd with opad */
  80. unsigned char out[SHA1_DIGEST_SIZE];
  81. int i;
  82. /* start out by storing key in pads */
  83. memset(k_ipad, 0, sizeof(k_ipad));
  84. memset(k_opad, 0, sizeof(k_opad));
  85. memcpy(k_ipad, key, key_len);
  86. memcpy(k_opad, key, key_len);
  87. /* XOR key with ipad and opad values */
  88. for (i = 0; i < KEY_IOPAD_SIZE; i++) {
  89. k_ipad[i] ^= 0x36;
  90. k_opad[i] ^= 0x5c;
  91. }
  92. /* perform inner MD5 */
  93. mbedtls_sha1_init(&context); /* init context for 1st pass */
  94. mbedtls_sha1_starts(&context); /* setup context for 1st pass */
  95. mbedtls_sha1_update(&context, k_ipad, KEY_IOPAD_SIZE); /* start with inner pad */
  96. mbedtls_sha1_update(&context, (unsigned char *) msg, msg_len); /* then text of datagram */
  97. mbedtls_sha1_finish(&context, out); /* finish up 1st pass */
  98. /* perform outer MD5 */
  99. mbedtls_sha1_init(&context); /* init context for 2nd pass */
  100. mbedtls_sha1_starts(&context); /* setup context for 2nd pass */
  101. mbedtls_sha1_update(&context, k_opad, KEY_IOPAD_SIZE); /* start with outer pad */
  102. mbedtls_sha1_update(&context, out, SHA1_DIGEST_SIZE); /* then results of 1st hash */
  103. mbedtls_sha1_finish(&context, out); /* finish up 2nd pass */
  104. //加密后的数据16进制输出
  105. byteToHexStr(out,digest,SHA1_DIGEST_SIZE);
  106. mbedtls_sha1_free(&context);
  107. }
  108. //static char testhexdata[512] ={0};
  109. void utils_sha256(const char *msg, int msg_len, char * digest)
  110. {
  111. //hmac sha1加密处理
  112. mbedtls_sha256_context context;
  113. // memset(testhexdata, 0, sizeof(testhexdata));
  114. /* perform inner MD5 */
  115. mbedtls_sha256_init(&context); /* init context for 1st pass */
  116. mbedtls_sha256_starts(&context,0); /* setup context for 1st pass */
  117. mbedtls_sha256_update(&context, (unsigned char *) msg, msg_len); /* then text of datagram */
  118. mbedtls_sha256_finish(&context, (unsigned char *) digest); /* finish up 1st pass */
  119. mbedtls_sha256_free(&context);
  120. // byteToHexStr((const unsigned char *)digest,testhexdata, strlen((char * )digest));
  121. // Log_Printf_Debug("数据报文msg:%s,%d\r\n", msg,msg_len);
  122. // Log_Printf_Debug("数据报文digest:%s\r\n", testhexdata);
  123. }
  124. char iv_use[16] = {0};
  125. int utils_aes128_cbc_enc_with_length(uint8_t *aes_key, char *iv, uint8_t * plaintext, uint16_t plaintext_length, uint8_t * ciphertext)
  126. {
  127. memset(plaintextdata, 0, sizeof(plaintextdata));
  128. mbedtls_aes_context aes_ctx;
  129. if(plaintext_length + 16 > AES_LEN_SIZE) return -1;
  130. memset(iv_use,0,sizeof(iv_use));
  131. memcpy(iv_use,iv,16);
  132. memcpy(plaintextdata, (const char *)plaintext, plaintext_length);
  133. int len = fillAESPKCS7DataWithLength((uint8_t *)plaintextdata, plaintext_length);
  134. mbedtls_aes_init(&aes_ctx);
  135. //setkey_dec
  136. mbedtls_aes_setkey_enc(&aes_ctx, (unsigned char * )aes_key, 128);
  137. mbedtls_aes_crypt_cbc(&aes_ctx, MBEDTLS_AES_ENCRYPT, len, (unsigned char * )iv_use, (unsigned char * )plaintextdata, (unsigned char * )ciphertext);
  138. mbedtls_aes_free(&aes_ctx);
  139. return len; //OK
  140. }
  141. /**
  142. *AES ECB加密 , src:源数据,dataLen:数据长度,ciphertext:加密数据, 返回加密长度
  143. */
  144. int utils_aes128_ECB_base64_enc_with_length(char *aes_key, uint8_t * plaintext)
  145. {
  146. int times=0;
  147. memset(plaintextdata, 0, sizeof(plaintextdata));
  148. mbedtls_aes_context aes_ctx;
  149. if(strlen((const char *)plaintext) + 16 > AES_LEN_SIZE) return -1;
  150. memcpy(plaintextdata, plaintext, strlen((const char *)plaintext));
  151. int len = fillAESPKCS7DataWithLength((uint8_t *)plaintextdata, strlen((const char *)plaintext));
  152. mbedtls_aes_init(&aes_ctx);
  153. //setkey_dec
  154. mbedtls_aes_setkey_enc(&aes_ctx, (unsigned char * )aes_key, 128);
  155. while(times*AES_BLOCK_SIZE<len){
  156. mbedtls_aes_crypt_ecb(&aes_ctx, MBEDTLS_AES_ENCRYPT, (unsigned char * )plaintextdata+times*AES_BLOCK_SIZE, (unsigned char * )plaintext+times*AES_BLOCK_SIZE);
  157. ++times;
  158. }
  159. mbedtls_aes_free(&aes_ctx);
  160. return len;
  161. }
  162. /**
  163. *AES ECB解密, src:源数据,dataLen:数据长度,ciphertext:加密数据
  164. */
  165. int utils_aes128_ECB_base64_dec(char *aes_key, uint8_t * plaintext, uint16_t recvdata_length)
  166. {
  167. int times=0;
  168. memset(plaintextdata, 0, sizeof(plaintextdata));
  169. mbedtls_aes_context aes_ctx;
  170. if(strlen((const char *)plaintext) + 16 > AES_LEN_SIZE) return -1;
  171. memcpy(plaintextdata, plaintext, recvdata_length);
  172. mbedtls_aes_init(&aes_ctx);
  173. //setkey_dec
  174. mbedtls_aes_setkey_dec(&aes_ctx, (unsigned char * )aes_key, 128);
  175. while(times*AES_BLOCK_SIZE<recvdata_length){
  176. mbedtls_aes_crypt_ecb(&aes_ctx, MBEDTLS_AES_DECRYPT, (unsigned char * )plaintextdata+times*AES_BLOCK_SIZE, (unsigned char * )plaintext+times*AES_BLOCK_SIZE);
  177. ++times;
  178. }
  179. cutAESPKCS7Data((char *)plaintext);
  180. mbedtls_aes_free(&aes_ctx);
  181. return strlen((const char *)plaintext);
  182. }
  183. /**
  184. *AES CBC解密 ciphertext:加密数据, len:加密数据长度,plaintext:解密到的数据
  185. */
  186. int utils_aes128_cbc_dec(uint8_t *aes_key, char *iv, char *ciphertext, int len, char *plaintext)
  187. {
  188. char iv_use[16] = {0};
  189. mbedtls_aes_context aes_ctx;
  190. if(len%16&&len>AES_LEN_SIZE) return 0;
  191. memcpy(iv_use,iv,16);
  192. mbedtls_aes_init(&aes_ctx);
  193. //setkey_dec
  194. mbedtls_aes_setkey_dec(&aes_ctx, aes_key, 128);
  195. mbedtls_aes_crypt_cbc(&aes_ctx, MBEDTLS_AES_DECRYPT, len, (unsigned char * )iv_use, (unsigned char * )ciphertext, (unsigned char * )plaintext);
  196. cutAESPKCS7Data((char *)plaintext);
  197. mbedtls_aes_free(&aes_ctx);
  198. return strlen(plaintext); //OK
  199. }