openssl3.2 - 官方demo学习 - mac - hmac-sha512.c

文章目录

    • [openssl3.2 - 官方demo学习 - mac - hmac-sha512.c](#openssl3.2 - 官方demo学习 - mac - hmac-sha512.c)
    • 概述
    • 笔记
    • END

openssl3.2 - 官方demo学习 - mac - hmac-sha512.c

概述

MAC算法为HMAC, 设置参数(摘要算法为SHA3-512), 用key初始化, 对明文做MAC数据.

笔记

c 复制代码
/*!
\file hmac-sha512.c
\note
openssl3.2 - 官方demo学习 - mac - hmac-sha512.c
MAC算法为HMAC, 设置参数(摘要算法为SHA3-512), 用key初始化, 对明文做MAC数据.
*/

/*-
 * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved.
 *
 * Licensed under the Apache License 2.0 (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
 */

 /*
  * Example of using EVP_MAC_ methods to calculate
  * a HMAC of static buffers
  */

#include <string.h>
#include <stdio.h>
#include <openssl/crypto.h>
#include <openssl/core_names.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#include <openssl/hmac.h>
#include <openssl/params.h>

#include "my_openSSL_lib.h"

  /*
   * Hard coding the key into an application is very bad.
   * It is done here solely for educational purposes.
   */
static unsigned char key[] = {
	0x25, 0xfd, 0x12, 0x99, 0xdf, 0xad, 0x1a, 0x03,
	0x0a, 0x81, 0x3c, 0x2d, 0xcc, 0x05, 0xd1, 0x5c,
	0x17, 0x7a, 0x36, 0x73, 0x17, 0xef, 0x41, 0x75,
	0x71, 0x18, 0xe0, 0x1a, 0xda, 0x99, 0xc3, 0x61,
	0x38, 0xb5, 0xb1, 0xe0, 0x82, 0x2c, 0x70, 0xa4,
	0xc0, 0x8e, 0x5e, 0xf9, 0x93, 0x9f, 0xcf, 0xf7,
	0x32, 0x4d, 0x0c, 0xbd, 0x31, 0x12, 0x0f, 0x9a,
	0x15, 0xee, 0x82, 0xdb, 0x8d, 0x29, 0x54, 0x14,
};

static const unsigned char data[] =
"To be, or not to be, that is the question,\n"
"Whether tis nobler in the minde to suffer\n"
"The ſlings and arrowes of outragious fortune,\n"
"Or to take Armes again in a sea of troubles,\n"
"And by opposing, end them, to die to sleep;\n"
"No more, and by a sleep, to say we end\n"
"The heart-ache, and the thousand natural shocks\n"
"That flesh is heir to? tis a consumation\n"
"Devoutly to be wished. To die to sleep,\n"
"To sleepe, perchance to dreame, Aye, there's the rub,\n"
"For in that sleep of death what dreams may come\n"
"When we haue shuffled off this mortal coil\n"
"Must give us pause. There's the respect\n"
"That makes calamity of so long life:\n"
"For who would bear the Ships and Scorns of time,\n"
"The oppressor's wrong, the proud man's Contumely,\n"
"The pangs of dispised love, the Law's delay,\n"
;

/* The known value of the HMAC/SHA3-512 MAC of the above soliloqy */
static const unsigned char expected_output[] = {
	0x3b, 0x77, 0x5f, 0xf1, 0x4f, 0x9e, 0xb9, 0x23,
	0x8f, 0xdc, 0xa0, 0x68, 0x15, 0x7b, 0x8a, 0xf1,
	0x96, 0x23, 0xaa, 0x3c, 0x1f, 0xe9, 0xdc, 0x89,
	0x11, 0x7d, 0x58, 0x07, 0xe7, 0x96, 0x17, 0xe3,
	0x44, 0x8b, 0x03, 0x37, 0x91, 0xc0, 0x6e, 0x06,
	0x7c, 0x54, 0xe4, 0xa4, 0xcc, 0xd5, 0x16, 0xbb,
	0x5e, 0x4d, 0x64, 0x7d, 0x88, 0x23, 0xc9, 0xb7,
	0x25, 0xda, 0xbe, 0x4b, 0xe4, 0xd5, 0x34, 0x30,
};

/*
 * A property query used for selecting the MAC implementation.
 */
static const char* propq = NULL;

int main(void)
{
	int ret = EXIT_FAILURE;
	OSSL_LIB_CTX* _ossl_lib_ctx = NULL;
	EVP_MAC* _evp_mac = NULL;
	EVP_MAC_CTX* _evp_mac_ctx = NULL;
	EVP_MD_CTX* _evp_md_ctx = NULL;
	unsigned char* out = NULL;
	size_t out_len = 0;
	OSSL_PARAM params[4], * p = params;
	char digest_name[] = "SHA3-512";

	_ossl_lib_ctx = OSSL_LIB_CTX_new();
	if (_ossl_lib_ctx == NULL) {
		fprintf(stderr, "OSSL_LIB_CTX_new() returned NULL\n");
		goto end;
	}

	/* Fetch the HMAC implementation */
	_evp_mac = EVP_MAC_fetch(_ossl_lib_ctx, "HMAC", propq);
	if (_evp_mac == NULL) {
		fprintf(stderr, "EVP_MAC_fetch() returned NULL\n");
		goto end;
	}

	/* Create a context for the HMAC operation */
	_evp_mac_ctx = EVP_MAC_CTX_new(_evp_mac);
	if (_evp_mac_ctx == NULL) {
		fprintf(stderr, "EVP_MAC_CTX_new() returned NULL\n");
		goto end;
	}

	/* The underlying digest to be used */
	*p++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, digest_name,
		sizeof(digest_name));
	*p = OSSL_PARAM_construct_end();

	/* Initialise the HMAC operation */
	if (!EVP_MAC_init(_evp_mac_ctx, key, sizeof(key), params)) {
		fprintf(stderr, "EVP_MAC_init() failed\n");
		goto end;
	}

	/* Make one or more calls to process the data to be authenticated */
	if (!EVP_MAC_update(_evp_mac_ctx, data, sizeof(data))) {
		fprintf(stderr, "EVP_MAC_update() failed\n");
		goto end;
	}

	/* Make a call to the final with a NULL buffer to get the length of the MAC */
	if (!EVP_MAC_final(_evp_mac_ctx, NULL, &out_len, 0)) {
		fprintf(stderr, "EVP_MAC_final() failed\n");
		goto end;
	}
	out = OPENSSL_malloc(out_len);
	if (out == NULL) {
		fprintf(stderr, "malloc failed\n");
		goto end;
	}
	/* Make one call to the final to get the MAC */
	if (!EVP_MAC_final(_evp_mac_ctx, out, &out_len, out_len)) {
		fprintf(stderr, "EVP_MAC_final() failed\n");
		goto end;
	}

	printf("Generated MAC:\n");
	BIO_dump_indent_fp(stdout, out, (int)out_len, 2);
	putchar('\n');

	if (out_len != sizeof(expected_output)) {
		fprintf(stderr, "Generated MAC has an unexpected length\n");
		goto end;
	}

	if (CRYPTO_memcmp(expected_output, out, sizeof(expected_output)) != 0) {
		fprintf(stderr, "Generated MAC does not match expected value\n");
		goto end;
	}

	ret = EXIT_SUCCESS;
end:
	if (ret != EXIT_SUCCESS)
		ERR_print_errors_fp(stderr);
	/* OpenSSL free functions will ignore NULL arguments */
	OPENSSL_free(out);
	EVP_MD_CTX_free(_evp_md_ctx);
	EVP_MAC_CTX_free(_evp_mac_ctx);
	EVP_MAC_free(_evp_mac);
	OSSL_LIB_CTX_free(_ossl_lib_ctx);
	return ret;
}

END

相关推荐
沉在嵌入式的鱼7 天前
RK3588移植Openssl库
linux·rk3588·openssl
黑屋里的马10 天前
ssl相关命令生成证书
服务器·网络·ssl·openssl·gmssl
fangeqin23 天前
ubuntu源码安装python3.13遇到Could not build the ssl module!解决方法
linux·python·ubuntu·openssl
API开发1 个月前
苹果芯片macOS安装版Homebrew(亲测) ,一键安装node、python、vscode等,比绿色软件还干净、无污染
vscode·python·docker·nodejs·openssl·brew·homebrew
码农不惑1 个月前
Rust使用tokio(二)HTTPS相关
https·rust·web·openssl
liulilittle1 个月前
通过高级处理器硬件指令集AES-NI实现AES-256-CFB算法并通过OPENSSL加密验证算法正确性。
linux·服务器·c++·算法·安全·加密·openssl
liulilittle2 个月前
OpenSSL 的 AES-NI 支持机制
linux·运维·服务器·算法·加密·openssl·解密
liulilittle2 个月前
通过高级处理器硬件指令集AES-NI实现AES-256-CFB算法。
linux·服务器·c++·算法·安全·加密·openssl
花花少年2 个月前
Ubuntu系统下交叉编译openssl
openssl·交叉编译
什么名字都被用了2 个月前
编译openssl源码
c++·openssl