基于openssl的sm4加密,加密数据,验证OK

  1. 基于openssl的sm4加密,加密数据,验证OK

  2. 目前还没实现解密功能

  3. 代码地址

    https://gitee.com/zhengjunqiang/learn.git

  4. 加解密注意事项:

    1. 加密和解密数据长度如果是加密块长度的整数倍,可以不设置填充
    2. 设置不填充必须在EVP_DecryptInit_ex之后,update之前
  5. 非填充模式加解密验证:

    root@ubuntu:/work2/learn/openssl/sm4# ./sm4_en_de

    加密之前数据 32

    a5 23 45 67 89 ab cd ef fe dc ba 98 76 54 32 ff 5a 23 45 67 89 ab cd ef fe dc ba 98 76 54 32 ff

    bs 16

    加密之后数据 32

    3f 4c 87 89 94 92 e7 ba f2 9f fc fb e9 6d 41 6c d1 19 9c 75 71 3b 61 6c b7 27 8d 13 40 33 ab 6f

    解密数据:32

    a5 23 45 67 89 ab cd ef fe dc ba 98 76 54 32 ff 5a 23 45 67 89 ab cd ef fe dc ba 98 76 54 32 ff

    解密之后数据 32

    a5 23 45 67 89 ab cd ef fe dc ba 98 76 54 32 ff 5a 23 45 67 89 ab cd ef fe dc ba 98 76 54 32 ff

c 复制代码
// 编译: gcc -g sm4_en_de.c -o sm4_en_de -L/usr/lib -lssl -lcrypto
// 加密之后数据:2677F46B09C122CC975533105BD4A22AF6125F7275CE552C3A2BBCF533DE8A3B
/** 文件名: main.c */
#include <stddef.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "openssl/err.h"
#include "openssl/evp.h"

typedef struct
{
	const unsigned char *in_data;
	size_t in_data_len;
	int in_data_is_already_padded;
	const unsigned char *in_ivec;
	const unsigned char *in_key;
	size_t in_key_len;
} test_case_t;

void handleErrors(void)
{
    ERR_print_errors_fp(stderr);
    abort();
}

int test_decrypt_with_cipher(unsigned char *ciphertext, int ciphertext_len, unsigned char *key,
							  unsigned char *iv, unsigned char *plaintext)
{
	EVP_CIPHER_CTX *ctx;
	int len;
	int plaintext_len;
	int i;
	int count;

	/* Create and initialise the context */
	if (!(ctx = EVP_CIPHER_CTX_new())) {
		handleErrors();
	}
	/*
     * Initialise the decryption operation. IMPORTANT - ensure you use a key
     * and IV size appropriate for your cipher
     * In this example we are using 256 bit AES (i.e. a 256 bit key). The
     * IV size for *most* modes is the same as the block size. For AES this
     * is 128 bits
     */

	// EVP_CIPHER_CTX_set_padding(ctx, 0);

	if (1 != EVP_DecryptInit_ex(ctx, EVP_sm4_cbc(), NULL, key, iv)) {
		handleErrors();
	}
	/*
     * Provide the message to be decrypted, and obtain the plaintext output.
     * EVP_DecryptUpdate can be called multiple times if necessary.
     */
	EVP_CIPHER_CTX_set_padding(ctx, 0);
	// 解密数据只能按照向量的整数倍进行,这里向量的长度是16
	if (1 != EVP_DecryptUpdate(ctx, plaintext, &len, ciphertext, ciphertext_len)) {
		handleErrors();
	}

	printf("解密数据:%d\n",len);
	for (i = 0;i < 32;i++) {
		printf("%02x ",*(plaintext + i));
	}
	printf("\n");
	plaintext_len = len;

	EVP_CIPHER_CTX_free(ctx);

	return plaintext_len;
}

void test_encrypt_with_cipher(const test_case_t *in, const EVP_CIPHER *cipher, char *buf, int *len)
{
	unsigned char *out_buf = buf;
	int out_len;
	int out_padding_len;
	int i;
	EVP_CIPHER_CTX *ctx;

	ctx = EVP_CIPHER_CTX_new();
	EVP_EncryptInit_ex(ctx, cipher, NULL, in->in_key, in->in_ivec);

	//当填充之后会调用该函数
	if (in->in_data_is_already_padded)
	{
		/* Check whether the input data is already padded.
		And its length must be an integral multiple of the cipher's block size. */
		const size_t bs = EVP_CIPHER_block_size(cipher);
		printf("bs %d\n",bs);
		if (in->in_data_len % bs != 0)
		{
			printf("ERROR-1: data length=%d which is not added yet; block size=%d\n", (int)in->in_data_len, (int)bs);
			/* Warning: Remember to do some clean-ups */
			EVP_CIPHER_CTX_free(ctx);
			return;
		}
		/* Disable the implicit PKCS#7 padding defined in EVP_CIPHER */
		EVP_CIPHER_CTX_set_padding(ctx, 0);
	}

	out_len = 0;
	EVP_EncryptUpdate(ctx, out_buf, &out_len, in->in_data, in->in_data_len);
	out_padding_len = 0;
	EVP_EncryptFinal_ex(ctx, out_buf + out_len, &out_padding_len);

	EVP_CIPHER_CTX_free(ctx);
	*len = out_len + out_padding_len;
}

void main()
{
	unsigned char buf[5000];
	unsigned char buf_2[5000];
	int  len;
	int  i;
	const unsigned char data[] =
		{
			0xa5, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF,
			0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0xff,
			0x5a, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF,
			0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0xff
		};
	// 上面data 明文对应的密文
	const unsigned char data_c[] =
		{
			0x26, 0x77, 0xf4, 0x6b, 0x09, 0xc1, 0x22, 0xcc, 
			0x97, 0x55, 0x33, 0x10, 0x5b, 0xd4, 0xa2, 0x2a,
			0xf6, 0x12, 0x5f, 0x72, 0x75, 0xce, 0x55, 0x2c,
			0x3a, 0x2b, 0xbc, 0xf5, 0x33, 0xde, 0x8a, 0x3b,
		};
	unsigned char ivec[EVP_MAX_IV_LENGTH] =
		{
			0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF,
			0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10
		};

	const unsigned char key1[16] = ///< key_data, 密钥内容, 至少16字节
		{
			0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF,
			0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10
		};

	test_case_t tc;

	tc.in_data = data;
	tc.in_data_len = sizeof(data);
	tc.in_data_is_already_padded = (tc.in_data_len % 16) == 0; // Hard coded 16 as the cipher's block size
	tc.in_key = key1;
	tc.in_key_len = sizeof(key1);
	tc.in_ivec = ivec;

	printf("加密之前数据 %d\n",sizeof(data));
	for (i = 0;i < sizeof(data);i++) {
		printf("%02x ",data[i]);
	}
	printf("\n");

	memset(buf, 0 ,sizeof(buf));
	test_encrypt_with_cipher(&tc, EVP_sm4_cbc(),buf,&len);
	printf("加密之后数据 %d\n", len);
	for (i = 0;i < len;i++) {
		printf("%02x ",*(buf + i));
	}
	printf("\n");

	memset(buf_2, 0 ,sizeof(buf_2));
	len = test_decrypt_with_cipher(buf, 32, key1, ivec, buf_2);
	printf("解密之后数据 %d \n", len);
	for (i = 0;i < len;i++) {
		printf("%02x ",*(buf_2 + i));
	}
	printf("\n");
}
复制代码
相关推荐
少年攻城狮4 小时前
阿里云系列---【申请域名并绑定到主机ip】
linux·服务器·tcp/ip·阿里云·云计算
汤愈韬4 小时前
hcip-security_防火墙高可靠技术4—双机热备结合NAT
网络·网络协议·网络安全·security
中科三方4 小时前
域名解析修改后,用户仍访问旧IP?原因排查与高效解决指南
网络协议·tcp/ip·php
BIG_PEI4 小时前
如何判断Linux服务器上是否安装了rabbitmq
linux·服务器·rabbitmq
陳10304 小时前
Linux:System V 消息队列与信号量
linux·运维·服务器
辣椒思密达4 小时前
大规模数据采集如何稳定使用海外住宅IP?3种实战方法
网络·网络协议·tcp/ip
Shota Kishi4 小时前
ERPC 平台全面支持 16 种语言 — 以母语使用 Solana RPC 官方网站与 Dashboard
网络·网络协议·rpc
日取其半万世不竭4 小时前
auditd:Linux 系统审计日志,记录谁动了你的服务器
linux·服务器·github
zincsweet4 小时前
进程管理:创建、终止、等待、替换
linux
鹏大师运维4 小时前
信创数据库开发--SQLark这款工具支持麒麟、统信
linux·数据库·数据库开发·麒麟·统信·sqlark·桌面操作系统