• 实验二 OpenSSL API使用


    实验二 OpenSSL API使用

    任务详情

    参考 https://blog.csdn.net/bruce135lee/article/details/81811403 调用OpenSSL API
    0 推荐在openEuler中实现 ,参考https://www.cnblogs.com/rocedu/p/6012545.html第三节
    1 提交相关代码码云(或github)链接
    2 提交不少于6张编译测试过程截图
    3 至少包含SM4,SM3的测试
    

    完成过程

    1.测试SM4-ECB电子密码本模式, 选取AES-128-ECB作为参考

    #include <stddef.h>
    #include <stdio.h>
    #include <stdlib.h>
    #include <string.h>
    #include "openssl/err.h"
    #include "openssl/evp.h"
     
    /* Before OpenSSL 1.1.1-pre1, we did not have EVP_sm4_ecb() */
    #if defined(OPENSSL_VERSION_NUMBER) \
        && OPENSSL_VERSION_NUMBER < 0x10101001L
    static const EVP_CIPHER *(*EVP_sm4_ecb)()=EVP_aes_128_ecb;
    #endif
     
    typedef struct {
        const unsigned char *in_data;
        size_t in_data_len;
        int in_data_is_already_padded;
        const unsigned char *in_ivec;
        const unsigned char *in_key;
        size_t in_key_len;
    } test_case_t;
     
     
    void test_encrypt_with_cipher(const test_case_t *in, const EVP_CIPHER *cipher)
    {
        unsigned char *out_buf = NULL;
        int out_len;
        int out_padding_len;
        EVP_CIPHER_CTX *ctx;
     
        ctx = EVP_CIPHER_CTX_new();
        EVP_EncryptInit_ex(ctx, cipher, NULL, in->in_key, in->in_ivec);
     
        if (in->in_data_is_already_padded)
        {
            /* Check whether the input data is already padded.
            And its length must be an integral multiple of the cipher's block size. */
            const size_t bs = EVP_CIPHER_block_size(cipher);
            if (in->in_data_len % bs != 0)
            {
                printf("ERROR-1: data length=%d which is not added yet; block size=%d\n", (int) in->in_data_len, (int) bs);
                /* Warning: Remember to do some clean-ups */
                EVP_CIPHER_CTX_free(ctx);
                return;
            }
            /* Disable the implicit PKCS#7 padding defined in EVP_CIPHER */
            EVP_CIPHER_CTX_set_padding(ctx, 0);
        }
     
        out_buf = (unsigned char *) malloc(((in->in_data_len>>4)+1) << 4);
        out_len = 0;
        EVP_EncryptUpdate(ctx, out_buf, &out_len, in->in_data, in->in_data_len);
        if (1)
        {
            printf("Debug: out_len=%d\n", out_len);
        }
     
        out_padding_len = 0;
        EVP_EncryptFinal_ex(ctx, out_buf+out_len, &out_padding_len);
        if (1)
        {
            printf("Debug: out_padding_len=%d\n", out_padding_len);
        }
     
        EVP_CIPHER_CTX_free(ctx);
        if (1)
        {
            int i;
            int len;
            len = out_len + out_padding_len;
            for (i=0; i<len; i++)
            {
                printf("%02x ", out_buf[i]);
            }
            printf("\n");
        }
     
        if (out_buf)
        {
            free(out_buf);
            out_buf = NULL;
        }
    }
     
    void main()
    {
        int have_sm4 = (OPENSSL_VERSION_NUMBER >= 0x10101001L);
        int have_aes = 1;
        const unsigned char data[]=
        {
            0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
            0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10,
        };
        unsigned char ivec[EVP_MAX_IV_LENGTH]; ///< IV 向量
        const unsigned char key1[16] = ///< key_data, 密钥内容, 至少16字节
        {
            0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
            0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10,
        };
        test_case_t tc;
     
        tc.in_data = data;
        tc.in_data_len = sizeof(data);
        tc.in_data_is_already_padded = (tc.in_data_len % 16)==0; // Hard coded 16 as the cipher's block size
        tc.in_key = key1;
        tc.in_key_len = sizeof(key1);
        memset(ivec, 0x00, EVP_MAX_IV_LENGTH);
        tc.in_ivec = ivec;
     
    #if defined(OPENSSL_NO_SM4)
        have_sm4 = 0;
    #endif
        if (have_sm4)
        {
            printf("[1]\n");
            printf("Debug: EVP_sm4_ecb() test\n");
            test_encrypt_with_cipher(&tc, EVP_sm4_ecb());
        }
    #if defined(OPENSSL_NO_AES)
        have_aes = 0;
    #endif
        if (have_aes)
        {
            printf("[2]\n");
            printf("Debug: EVP_aes_128_ecb() test\n");
            test_encrypt_with_cipher(&tc, EVP_aes_128_ecb());
        }
    }
    

    编译代码:gcc -o main main.c -I /root/rocopenssl/include -L /root/rocopenssl/lib -lcrypto

    image-20211111132347074

    2.CBC模式

    image-20211111134524402

    3.CFB模式

    image-20211111134730978

    4.OFB工作模式

    image-20211111143224019

    5.ctr工作模式

    image-20211111143400026

    6.测试sm3

    image-20211111143009896

    代码链接:

    https://gitee.com/sister_ben/raspberry-pie/tree/master/openssl/test2

  • 相关阅读:
    数据结构>图的应用(拓扑排序,关键路径) 小强斋
    数据结构>图的最短路径 小强斋
    数据结构>图的连通性和最小生成树 小强斋
    mysql查看表的存储引擎等相关信息
    java.util.TaskQueue的最小堆排序算法的应用
    jetty源码阅读总结1
    lucene3.6.0的高亮显示
    log4j MDC NDC应用场景
    velocity自定义标签和指令
    jetty关于http状态码处理的一个很有用的类
  • 原文地址:https://www.cnblogs.com/sisterben/p/15539873.html
Copyright © 2020-2023  润新知