openssl3.2 - 官方demo学习 - mac - cmac-aes256.c

文章目录

    • [openssl3.2 - 官方demo学习 - mac - cmac-aes256.c](#openssl3.2 - 官方demo学习 - mac - cmac-aes256.c)
    • 概述
    • 笔记
    • END

openssl3.2 - 官方demo学习 - mac - cmac-aes256.c

概述

指定加密算法(e.g. AES-256-CBC), 对明文生成MAC数据

笔记

c 复制代码
/*!
\file cmac-aes256.c
\note openssl3.2 - 官方demo学习 - mac - cmac-aes256.c
指定加密算法(e.g. AES-256-CBC), 对明文生成MAC数据
*/

/*-
 * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved.
 *
 * Licensed under the Apache License 2.0 (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
 */

 /*
  * Example of using EVP_MAC_ methods to calculate
  * a CMAC of static buffers
  */

#include <string.h>
#include <stdio.h>
#include <openssl/crypto.h>
#include <openssl/core_names.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#include <openssl/cmac.h>
#include <openssl/params.h>

#include "my_openSSL_lib.h"

  /*
   * Hard coding the key into an application is very bad.
   * It is done here solely for educational purposes.
   */
static unsigned char key[] = {
	0x6c, 0xde, 0x14, 0xf5, 0xd5, 0x2a, 0x4a, 0xdf,
	0x12, 0x39, 0x1e, 0xbf, 0x36, 0xf9, 0x6a, 0x46,
	0x48, 0xd0, 0xb6, 0x51, 0x89, 0xfc, 0x24, 0x85,
	0xa8, 0x8d, 0xdf, 0x7e, 0x80, 0x14, 0xc8, 0xce,
};

static const unsigned char data[] =
"To be, or not to be, that is the question,\n"
"Whether tis nobler in the minde to suffer\n"
"The ſlings and arrowes of outragious fortune,\n"
"Or to take Armes again in a sea of troubles,\n"
"And by opposing, end them, to die to sleep;\n"
"No more, and by a sleep, to say we end\n"
"The heart-ache, and the thousand natural shocks\n"
"That flesh is heir to? tis a consumation\n"
"Devoutly to be wished. To die to sleep,\n"
"To sleepe, perchance to dreame, Aye, there's the rub,\n"
"For in that sleep of death what dreams may come\n"
"When we haue shuffled off this mortal coil\n"
"Must give us pause. There's the respect\n"
"That makes calamity of so long life:\n"
"For who would bear the Ships and Scorns of time,\n"
"The oppressor's wrong, the proud man's Contumely,\n"
"The pangs of dispised love, the Law's delay,\n"
;

/* The known value of the CMAC/AES256 MAC of the above soliloqy */
static const unsigned char expected_output[] = {
	0x67, 0x92, 0x32, 0x23, 0x50, 0x3d, 0xc5, 0xba,
	0x78, 0xd4, 0x6d, 0x63, 0xf2, 0x2b, 0xe9, 0x56,
};

/*
 * A property query used for selecting the MAC implementation.
 */
static const char* propq = NULL;

int main(void)
{
	int ret = EXIT_FAILURE;
	OSSL_LIB_CTX* _ossl_lib_ctx = NULL;
	EVP_MAC* _evp_mac = NULL;
	EVP_MAC_CTX* _evp_mac_ctx = NULL;
	unsigned char* out = NULL;
	size_t out_len = 0;
	OSSL_PARAM _ossl_param_ary[4], * p_ossl_param = _ossl_param_ary;
	char cipher_name[] = "AES-256-CBC";

	_ossl_lib_ctx = OSSL_LIB_CTX_new();
	if (_ossl_lib_ctx == NULL) {
		fprintf(stderr, "OSSL_LIB_CTX_new() returned NULL\n");
		goto end;
	}

	/* Fetch the CMAC implementation */
	_evp_mac = EVP_MAC_fetch(_ossl_lib_ctx, "CMAC", propq);
	if (_evp_mac == NULL) {
		fprintf(stderr, "EVP_MAC_fetch() returned NULL\n");
		goto end;
	}

	/* Create a context for the CMAC operation */
	_evp_mac_ctx = EVP_MAC_CTX_new(_evp_mac);
	if (_evp_mac_ctx == NULL) {
		fprintf(stderr, "EVP_MAC_CTX_new() returned NULL\n");
		goto end;
	}

	/* The underlying cipher to be used */
	*p_ossl_param++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_CIPHER, cipher_name,
		sizeof(cipher_name));
	*p_ossl_param = OSSL_PARAM_construct_end();

	/* Initialise the CMAC operation */
	if (!EVP_MAC_init(_evp_mac_ctx, key, sizeof(key), _ossl_param_ary)) {
		fprintf(stderr, "EVP_MAC_init() failed\n");
		goto end;
	}

	/* Make one or more calls to process the data to be authenticated */
	if (!EVP_MAC_update(_evp_mac_ctx, data, sizeof(data))) {
		fprintf(stderr, "EVP_MAC_update() failed\n");
		goto end;
	}

	/* Make a call to the final with a NULL buffer to get the length of the MAC */
	if (!EVP_MAC_final(_evp_mac_ctx, NULL, &out_len, 0)) {
		fprintf(stderr, "EVP_MAC_final() failed\n");
		goto end;
	}
	out = OPENSSL_malloc(out_len);
	if (out == NULL) {
		fprintf(stderr, "malloc failed\n");
		goto end;
	}
	/* Make one call to the final to get the MAC */
	if (!EVP_MAC_final(_evp_mac_ctx, out, &out_len, out_len)) {
		fprintf(stderr, "EVP_MAC_final() failed\n");
		goto end;
	}

	printf("Generated MAC:\n");
	BIO_dump_indent_fp(stdout, out, (int)out_len, 2);
	putchar('\n');

	if (out_len != (size_t)sizeof(expected_output)) {
		fprintf(stderr, "Generated MAC has an unexpected length\n");
		goto end;
	}

	if (CRYPTO_memcmp(expected_output, out, sizeof(expected_output)) != 0) {
		fprintf(stderr, "Generated MAC does not match expected value\n");
		goto end;
	}

	ret = EXIT_SUCCESS;
end:
	if (ret != EXIT_SUCCESS)
		ERR_print_errors_fp(stderr);
	/* OpenSSL free functions will ignore NULL arguments */
	OPENSSL_free(out);
	EVP_MAC_CTX_free(_evp_mac_ctx);
	EVP_MAC_free(_evp_mac);
	OSSL_LIB_CTX_free(_ossl_lib_ctx);
	return ret;
}

END

相关推荐
赖small强7 天前
【ZeroRange WebRTC】OpenSSL 与 WebRTC:原理、集成与实践指南
webrtc·openssl·x.509·证书验证·tls/dtls
openHiTLS密码开源社区10 天前
密码学系统的核心防护:FUZZ测试(模糊测试)技术原理与行业实践
openssl·fuzz测试·模糊测试·形式化验证·openhitls
coder4_1 个月前
OpenSSL 加密算法与证书管理全解析:从基础到私有 CA 实战
https·openssl·ssl/tls·加密算法·ca证书
王小义笔记2 个月前
windows电脑如何执行openssl rand命令
windows·openssl
Humbunklung2 个月前
VC++ 使用OpenSSL创建RSA密钥PEM文件
开发语言·c++·openssl
深耕AI3 个月前
Win64OpenSSL-3_5_2.exe【安装步骤】
openssl
看那山瞧那水3 个月前
DELPHI 利用OpenSSL实现加解密,证书(X.509)等功能
delphi·openssl
洋哥网络科技3 个月前
openssl升级
openssl
Lazy Dave3 个月前
gmssl私钥文件格式
网络安全·ssl·openssl
沉在嵌入式的鱼4 个月前
RK3588移植Openssl库
linux·rk3588·openssl