mbedtls_util.c 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221
  1. #include "stm32f10x.h"
  2. #include "mbedtls_util.h"
  3. #include <string.h>
  4. #include "mbedtls/sha1.h"
  5. #include "mbedtls/sha256.h"
  6. #include "mbedtls/aes.h"
  7. #include "mbedtls/cipher.h"
  8. #include "mbedtls/base64.h"
  9. #include "sys.h"
  10. #include <stdio.h>
  11. #define KEY_IOPAD_SIZE 64
  12. #define SHA1_DIGEST_SIZE 20
  13. #define SHA256_DIGEST_SIZE 32
  14. #define AES_LEN_SIZE 256
  15. #define AES_BLOCK_SIZE 16
  16. /**
  17. * 填充源码,返回填充后的数据长度
  18. */
  19. static int fillAESPKCS7Data(char* data)
  20. {
  21. int left= 0;
  22. int len = strlen(data);
  23. if(len%AES_BLOCK_SIZE != 0)
  24. {
  25. left = AES_BLOCK_SIZE-strlen(data)%AES_BLOCK_SIZE;
  26. }
  27. else
  28. {
  29. left = AES_BLOCK_SIZE;
  30. }
  31. memset(data+strlen(data),left,left);
  32. len+=left;
  33. return len;
  34. }
  35. /**
  36. * 去除源码无效数据
  37. */
  38. static void cutAESPKCS7Data(char* data)
  39. {
  40. int i= 0;
  41. int size = strlen(data);
  42. for(i=size-1;data[i]>0&&data[i]<AES_BLOCK_SIZE;i--)
  43. {
  44. data[i]=0;
  45. }
  46. }
  47. void utils_hmac_sha1_str(const char *msg, int msg_len, char *digest, const char *key, int key_len)
  48. {
  49. //对函数参数判空
  50. if((NULL == msg) || (NULL == digest) || (NULL == key)) {
  51. return;
  52. }
  53. //限制密钥长度
  54. if(key_len > KEY_IOPAD_SIZE) {
  55. return;
  56. }
  57. //hmac sha1加密处理
  58. mbedtls_sha1_context context;
  59. unsigned char k_ipad[KEY_IOPAD_SIZE]; /* inner padding - key XORd with ipad */
  60. unsigned char k_opad[KEY_IOPAD_SIZE]; /* outer padding - key XORd with opad */
  61. unsigned char out[SHA1_DIGEST_SIZE];
  62. int i;
  63. /* start out by storing key in pads */
  64. memset(k_ipad, 0, sizeof(k_ipad));
  65. memset(k_opad, 0, sizeof(k_opad));
  66. memcpy(k_ipad, key, key_len);
  67. memcpy(k_opad, key, key_len);
  68. /* XOR key with ipad and opad values */
  69. for (i = 0; i < KEY_IOPAD_SIZE; i++) {
  70. k_ipad[i] ^= 0x36;
  71. k_opad[i] ^= 0x5c;
  72. }
  73. /* perform inner MD5 */
  74. mbedtls_sha1_init(&context); /* init context for 1st pass */
  75. mbedtls_sha1_starts(&context); /* setup context for 1st pass */
  76. mbedtls_sha1_update(&context, k_ipad, KEY_IOPAD_SIZE); /* start with inner pad */
  77. mbedtls_sha1_update(&context, (unsigned char *) msg, msg_len); /* then text of datagram */
  78. mbedtls_sha1_finish(&context, out); /* finish up 1st pass */
  79. /* perform outer MD5 */
  80. mbedtls_sha1_init(&context); /* init context for 2nd pass */
  81. mbedtls_sha1_starts(&context); /* setup context for 2nd pass */
  82. mbedtls_sha1_update(&context, k_opad, KEY_IOPAD_SIZE); /* start with outer pad */
  83. mbedtls_sha1_update(&context, out, SHA1_DIGEST_SIZE); /* then results of 1st hash */
  84. mbedtls_sha1_finish(&context, out); /* finish up 2nd pass */
  85. //加密后的数据16进制输出
  86. byteToHexStr(out,digest,SHA1_DIGEST_SIZE);
  87. }
  88. void utils_sha256(const char *msg, int msg_len, char *digest)
  89. {
  90. //hmac sha1加密处理
  91. mbedtls_sha256_context context;
  92. /* perform inner MD5 */
  93. mbedtls_sha256_init(&context); /* init context for 1st pass */
  94. mbedtls_sha256_starts(&context,0); /* setup context for 1st pass */
  95. mbedtls_sha256_update(&context, (unsigned char *) msg, msg_len); /* then text of datagram */
  96. mbedtls_sha256_finish(&context, digest); /* finish up 1st pass */
  97. }
  98. void utils_sha256_str(const char *msg, int msg_len, char *digest)
  99. {
  100. //hmac sha1加密处理
  101. mbedtls_sha256_context context;
  102. unsigned char out[SHA256_DIGEST_SIZE];
  103. utils_sha256(msg,msg_len,out);
  104. //加密后的数据16进制输出
  105. byteToHexStr(out,digest,SHA256_DIGEST_SIZE);
  106. }
  107. /**
  108. *AES CBC加密 , plaintext:源数据,ciphertext:加密数据, 返回加密长度
  109. */
  110. int utils_aes128_cbc_enc(char *aes_key, char *iv, char *plaintext, char *ciphertext)
  111. {
  112. int i;
  113. char iv_use[16] = {0};
  114. char data[AES_LEN_SIZE]= {0};
  115. mbedtls_aes_context aes_ctx;
  116. if(strlen(plaintext)+16 > AES_LEN_SIZE) return 0;
  117. memcpy(iv_use,iv,16);
  118. memcpy(data,plaintext,strlen(plaintext));
  119. int len = fillAESPKCS7Data(data);
  120. mbedtls_aes_init(&aes_ctx);
  121. //setkey_dec
  122. mbedtls_aes_setkey_enc(&aes_ctx, aes_key, 128);
  123. mbedtls_aes_crypt_cbc(&aes_ctx, MBEDTLS_AES_ENCRYPT, len, iv_use, data, ciphertext);
  124. mbedtls_aes_free(&aes_ctx);
  125. return len; //OK
  126. }
  127. /**
  128. *AES CBC解密 ciphertext:加密数据, len:加密数据长度,plaintext:解密到的数据
  129. */
  130. int utils_aes128_cbc_dec(char *aes_key, char *iv, char *ciphertext, int len, char *plaintext)
  131. {
  132. int i;
  133. char iv_use[16] = {0};
  134. mbedtls_aes_context aes_ctx;
  135. if(len%16&&len>AES_LEN_SIZE) return 0;
  136. memcpy(iv_use,iv,16);
  137. mbedtls_aes_init(&aes_ctx);
  138. //setkey_dec
  139. mbedtls_aes_setkey_dec(&aes_ctx, aes_key, 128);
  140. mbedtls_aes_crypt_cbc(&aes_ctx, MBEDTLS_AES_DECRYPT, len, iv_use, ciphertext, plaintext);
  141. cutAESPKCS7Data(plaintext);
  142. mbedtls_aes_free(&aes_ctx);
  143. return strlen(plaintext); //OK
  144. }
  145. /**
  146. *AES CBC加密 , src:源数据,dataLen:数据长度,ciphertext:加密数据, 返回加密长度
  147. */
  148. int utils_aes128_cbc_base64_enc(char *aes_key, char *iv, uint8_t *src,int dataLen, char *ciphertext)
  149. {
  150. size_t len;
  151. unsigned char buffer[AES_LEN_SIZE*2]={0};
  152. if(dataLen+16 > AES_LEN_SIZE) return 0;
  153. int ret = mbedtls_base64_encode( buffer, sizeof( buffer ), &len, src, dataLen );
  154. printf("base64_encode:%s\r\n",buffer);
  155. if(ret)
  156. {
  157. printf("base64 encode err:%d",ret);
  158. return 0;
  159. }
  160. return utils_aes128_cbc_enc(aes_key,iv,buffer,ciphertext);
  161. }
  162. /**
  163. *AES CBC解密 ciphertext:加密数据, len:加密数据长度,plaintext:解密到的数据
  164. */
  165. int utils_aes128_cbc_base64_dec(char *aes_key, char *iv, char *ciphertext, int dataLen, char *plaintext,int plainLen)
  166. {
  167. size_t len = 0;
  168. unsigned char buffer[AES_LEN_SIZE*2]={0};
  169. int retlen = utils_aes128_cbc_dec(aes_key,iv,ciphertext,dataLen,buffer);
  170. if(retlen)
  171. {
  172. printf("base64_encode2:%s\r\n",buffer);
  173. int ret = mbedtls_base64_decode( plaintext, plainLen, &len, buffer, retlen);
  174. if(ret)
  175. {
  176. printf("base64 decode err:%d,%d",ret,retlen);
  177. len = 0;
  178. }
  179. }
  180. return len;
  181. }