• OpenSSL API使用


    OpenSSL API使用

    配置LD_LIBRARY_PATH并检查openssl可执行程序版本号

    检查 SM3 哈希校验和

    检查椭圆曲线是否包含SM2

    检查对称算法

    SM4-自测试数据

    /** 文件名: https://github.com/liuqun/openssl-sm4-demo/blob/cmake/src/main.c */
    #include <stddef.h>
    #include <stdio.h>
    #include <stdlib.h>
    #include <string.h>
    #include "openssl/err.h"
    #include "openssl/evp.h"
     
    /* Before OpenSSL 1.1.1-pre1, we did not have EVP_sm4_ecb() */
    #if defined(OPENSSL_VERSION_NUMBER) \
        && OPENSSL_VERSION_NUMBER < 0x10101001L
    static const EVP_CIPHER *(*EVP_sm4_ecb)()=EVP_aes_128_ecb;
    #endif
     
    typedef struct {
        const unsigned char *in_data;
        size_t in_data_len;
        int in_data_is_already_padded;
        const unsigned char *in_ivec;
        const unsigned char *in_key;
        size_t in_key_len;
    } test_case_t;
     
     
    void test_encrypt_with_cipher(const test_case_t *in, const EVP_CIPHER *cipher)
    {
        unsigned char *out_buf = NULL;
        int out_len;
        int out_padding_len;
        EVP_CIPHER_CTX *ctx;
     
        ctx = EVP_CIPHER_CTX_new();
        EVP_EncryptInit_ex(ctx, cipher, NULL, in->in_key, in->in_ivec);
     
        if (in->in_data_is_already_padded)
        {
            /* Check whether the input data is already padded.
            And its length must be an integral multiple of the cipher's block size. */
            const size_t bs = EVP_CIPHER_block_size(cipher);
            if (in->in_data_len % bs != 0)
            {
                printf("ERROR-1: data length=%d which is not added yet; block size=%d\n", (int) in->in_data_len, (int) bs);
                /* Warning: Remember to do some clean-ups */
                EVP_CIPHER_CTX_free(ctx);
                return;
            }
            /* Disable the implicit PKCS#7 padding defined in EVP_CIPHER */
            EVP_CIPHER_CTX_set_padding(ctx, 0);
        }
     
        out_buf = (unsigned char *) malloc(((in->in_data_len>>4)+1) << 4);
        out_len = 0;
        EVP_EncryptUpdate(ctx, out_buf, &out_len, in->in_data, in->in_data_len);
        if (1)
        {
            printf("Debug: out_len=%d\n", out_len);
        }
     
        out_padding_len = 0;
        EVP_EncryptFinal_ex(ctx, out_buf+out_len, &out_padding_len);
        if (1)
        {
            printf("Debug: out_padding_len=%d\n", out_padding_len);
        }
     
        EVP_CIPHER_CTX_free(ctx);
        if (1)
        {
            int i;
            int len;
            len = out_len + out_padding_len;
            for (i=0; i<len; i++)
            {
                printf("%02x ", out_buf[i]);
            }
            printf("\n");
        }
     
        if (out_buf)
        {
            free(out_buf);
            out_buf = NULL;
        }
    }
     
    void main()
    {
        int have_sm4 = (OPENSSL_VERSION_NUMBER >= 0x10101001L);
        int have_aes = 1;
        const unsigned char data[]=
        {
            0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
            0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10,
        };
        unsigned char ivec[EVP_MAX_IV_LENGTH]; ///< IV 向量
        const unsigned char key1[16] = ///< key_data, 密钥内容, 至少16字节
        {
            0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
            0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10,
        };
        test_case_t tc;
     
        tc.in_data = data;
        tc.in_data_len = sizeof(data);
        tc.in_data_is_already_padded = (tc.in_data_len % 16)==0; // Hard coded 16 as the cipher's block size
        tc.in_key = key1;
        tc.in_key_len = sizeof(key1);
        memset(ivec, 0x00, EVP_MAX_IV_LENGTH);
        tc.in_ivec = ivec;
     
    #if defined(OPENSSL_NO_SM4)
        have_sm4 = 0;
    #endif
        if (have_sm4)
        {
            printf("[1]\n");
            printf("Debug: EVP_sm4_ecb() test\n");
            test_encrypt_with_cipher(&tc, EVP_sm4_ecb());
        }
    #if defined(OPENSSL_NO_AES)
        have_aes = 0;
    #endif
        if (have_aes)
        {
            printf("[2]\n");
            printf("Debug: EVP_aes_128_ecb() test\n");
            test_encrypt_with_cipher(&tc, EVP_aes_128_ecb());
        }
    }
    

    sm3自测

    #include <stdio.h>
    #include <string.h>
    #include <openssl/evp.h>
    #include <openssl/err.h>
    
    
    void tDigest(){
    	unsigned char md_value[EVP_MAX_MD_SIZE];
    	unsigned int md_len;
    	EVP_MD_CTX *mdctx;
    	mdctx = EVP_MD_CTX_new();
    	char msg1[] = "20201327";
    	char msg2[] = "I am ljm!";
    	
    	EVP_MD_CTX_init(mdctx);
    	EVP_DigestInit_ex(mdctx, EVP_sm3(), NULL);
    	EVP_DigestUpdate(mdctx, msg1, strlen(msg1));
    	EVP_DigestUpdate(mdctx, msg2, strlen(msg2));
    	EVP_DigestFinal_ex(mdctx, md_value, &md_len);
    	EVP_MD_CTX_destroy(mdctx);
    
    	printf("Debug:Message1\n%s \nand Message2\n%s \ndigest to:\n",msg1, msg2);
    	for(int i = 0; i<md_len; i++){
    
    		printf("0x%02x ", md_value[i]);
    	}
    	printf("\n");
    }
    
    int main(){
    
    	OpenSSL_add_all_algorithms();
    	tDigest();
    	return 0;
    }
    
    
    
    

    sm3测试

    //sm3.c
    #include "sm3.h"
    #include <string.h>
    #include <stdio.h>
    
    /*
     * 32-bit integer manipulation macros (big endian)
     */
    #ifndef GET_ULONG_BE
    #define GET_ULONG_BE(n,b,i)                             \
    {                                                       \
        (n) = ( (unsigned long) (b)[(i)    ] << 24 )        \
            | ( (unsigned long) (b)[(i) + 1] << 16 )        \
            | ( (unsigned long) (b)[(i) + 2] <<  8 )        \
            | ( (unsigned long) (b)[(i) + 3]       );       \
    }
    #endif
    
    #ifndef PUT_ULONG_BE
    #define PUT_ULONG_BE(n,b,i)                             \
    {                                                       \
        (b)[(i)    ] = (unsigned char) ( (n) >> 24 );       \
        (b)[(i) + 1] = (unsigned char) ( (n) >> 16 );       \
        (b)[(i) + 2] = (unsigned char) ( (n) >>  8 );       \
        (b)[(i) + 3] = (unsigned char) ( (n)       );       \
    }
    #endif
    
    /*
     * SM3 context setup
     */
    void sm3_starts( sm3_context *ctx )
    {
        ctx->total[0] = 0;
        ctx->total[1] = 0;
    
        ctx->state[0] = 0x7380166F;
        ctx->state[1] = 0x4914B2B9;
        ctx->state[2] = 0x172442D7;
        ctx->state[3] = 0xDA8A0600;
        ctx->state[4] = 0xA96F30BC;
        ctx->state[5] = 0x163138AA;
        ctx->state[6] = 0xE38DEE4D;
        ctx->state[7] = 0xB0FB0E4E;
    
    }
    
    static void sm3_process( sm3_context *ctx, unsigned char data[64] )
    {
        unsigned long SS1, SS2, TT1, TT2, W[68],W1[64];
        unsigned long A, B, C, D, E, F, G, H;
    	unsigned long T[64];
    	unsigned long Temp1,Temp2,Temp3,Temp4,Temp5;
    	int j;
    #ifdef _DEBUG
    	int i;
    #endif
    
    // 	for(j=0; j < 68; j++)
    // 		W[j] = 0;
    // 	for(j=0; j < 64; j++)
    // 		W1[j] = 0;
    	
    	for(j = 0; j < 16; j++)
    		T[j] = 0x79CC4519;
    	for(j =16; j < 64; j++)
    		T[j] = 0x7A879D8A;
    
        GET_ULONG_BE( W[ 0], data,  0 );
        GET_ULONG_BE( W[ 1], data,  4 );
        GET_ULONG_BE( W[ 2], data,  8 );
        GET_ULONG_BE( W[ 3], data, 12 );
        GET_ULONG_BE( W[ 4], data, 16 );
        GET_ULONG_BE( W[ 5], data, 20 );
        GET_ULONG_BE( W[ 6], data, 24 );
        GET_ULONG_BE( W[ 7], data, 28 );
        GET_ULONG_BE( W[ 8], data, 32 );
        GET_ULONG_BE( W[ 9], data, 36 );
        GET_ULONG_BE( W[10], data, 40 );
        GET_ULONG_BE( W[11], data, 44 );
        GET_ULONG_BE( W[12], data, 48 );
        GET_ULONG_BE( W[13], data, 52 );
        GET_ULONG_BE( W[14], data, 56 );
        GET_ULONG_BE( W[15], data, 60 );
    
    #ifdef _DEBUG 
    	printf("Message with padding:\n");
    	for(i=0; i< 8; i++)
    		printf("%08x ",W[i]);
    	printf("\n");
    	for(i=8; i< 16; i++)
    		printf("%08x ",W[i]);
    	printf("\n");
    #endif
    
    #define FF0(x,y,z) ( (x) ^ (y) ^ (z)) 
    #define FF1(x,y,z) (((x) & (y)) | ( (x) & (z)) | ( (y) & (z)))
    
    #define GG0(x,y,z) ( (x) ^ (y) ^ (z)) 
    #define GG1(x,y,z) (((x) & (y)) | ( (~(x)) & (z)) )
    
    
    #define  SHL(x,n) (((x) & 0xFFFFFFFF) << n)
    #define ROTL(x,n) (SHL((x),n) | ((x) >> (32 - n)))
    
    #define P0(x) ((x) ^  ROTL((x),9) ^ ROTL((x),17)) 
    #define P1(x) ((x) ^  ROTL((x),15) ^ ROTL((x),23)) 
    
    	for(j = 16; j < 68; j++ )
    	{
    		//W[j] = P1( W[j-16] ^ W[j-9] ^ ROTL(W[j-3],15)) ^ ROTL(W[j - 13],7 ) ^ W[j-6];
    		//Why thd release's result is different with the debug's ?
    		//Below is okay. Interesting, Perhaps VC6 has a bug of Optimizaiton.
    		
    		Temp1 = W[j-16] ^ W[j-9];
    		Temp2 = ROTL(W[j-3],15);
    		Temp3 = Temp1 ^ Temp2;
    		Temp4 = P1(Temp3);
    		Temp5 =  ROTL(W[j - 13],7 ) ^ W[j-6];
    		W[j] = Temp4 ^ Temp5;
    	}
    
    #ifdef _DEBUG 
    	printf("Expanding message W0-67:\n");
    	for(i=0; i<68; i++)
    	{
    		printf("%08x ",W[i]);
    		if(((i+1) % 8) == 0) printf("\n");
    	}
    	printf("\n");
    #endif
    
    	for(j =  0; j < 64; j++)
    	{
            W1[j] = W[j] ^ W[j+4];
    	}
    
    #ifdef _DEBUG 
    	printf("Expanding message W'0-63:\n");
    	for(i=0; i<64; i++)
    	{
    		printf("%08x ",W1[i]);
    		if(((i+1) % 8) == 0) printf("\n");
    	}
    	printf("\n");
    #endif
    
        A = ctx->state[0];
        B = ctx->state[1];
        C = ctx->state[2];
        D = ctx->state[3];
        E = ctx->state[4];
        F = ctx->state[5];
        G = ctx->state[6];
        H = ctx->state[7];
    #ifdef _DEBUG       
    	printf("j     A       B        C         D         E        F        G       H\n");
    	printf("   %08x %08x %08x %08x %08x %08x %08x %08x\n",A,B,C,D,E,F,G,H);
    #endif
    
    	for(j =0; j < 16; j++)
    	{
    		SS1 = ROTL((ROTL(A,12) + E + ROTL(T[j],j)), 7); 
    		SS2 = SS1 ^ ROTL(A,12);
    		TT1 = FF0(A,B,C) + D + SS2 + W1[j];
    		TT2 = GG0(E,F,G) + H + SS1 + W[j];
    		D = C;
    		C = ROTL(B,9);
    		B = A;
    		A = TT1;
    		H = G;
    		G = ROTL(F,19);
    		F = E;
    		E = P0(TT2);
    #ifdef _DEBUG 
    		printf("%02d %08x %08x %08x %08x %08x %08x %08x %08x\n",j,A,B,C,D,E,F,G,H);
    #endif
    	}
    	
    	for(j =16; j < 64; j++)
    	{
    		SS1 = ROTL((ROTL(A,12) + E + ROTL(T[j],j)), 7); 
    		SS2 = SS1 ^ ROTL(A,12);
    		TT1 = FF1(A,B,C) + D + SS2 + W1[j];
    		TT2 = GG1(E,F,G) + H + SS1 + W[j];
    		D = C;
    		C = ROTL(B,9);
    		B = A;
    		A = TT1;
    		H = G;
    		G = ROTL(F,19);
    		F = E;
    		E = P0(TT2);
    #ifdef _DEBUG 
    		printf("%02d %08x %08x %08x %08x %08x %08x %08x %08x\n",j,A,B,C,D,E,F,G,H);
    #endif	
    	}
    
        ctx->state[0] ^= A;
        ctx->state[1] ^= B;
        ctx->state[2] ^= C;
        ctx->state[3] ^= D;
        ctx->state[4] ^= E;
        ctx->state[5] ^= F;
        ctx->state[6] ^= G;
        ctx->state[7] ^= H;
    #ifdef _DEBUG 
    	   printf("   %08x %08x %08x %08x %08x %08x %08x %08x\n",ctx->state[0],ctx->state[1],ctx->state[2],
    		                          ctx->state[3],ctx->state[4],ctx->state[5],ctx->state[6],ctx->state[7]);
    #endif
    }
    
    /*
     * SM3 process buffer
     */
    void sm3_update( sm3_context *ctx, unsigned char *input, int ilen )
    {
        int fill;
        unsigned long left;
    
        if( ilen <= 0 )
            return;
    
        left = ctx->total[0] & 0x3F;
        fill = 64 - left;
    
        ctx->total[0] += ilen;
        ctx->total[0] &= 0xFFFFFFFF;
    
        if( ctx->total[0] < (unsigned long) ilen )
            ctx->total[1]++;
    
        if( left && ilen >= fill )
        {
            memcpy( (void *) (ctx->buffer + left),
                    (void *) input, fill );
            sm3_process( ctx, ctx->buffer );
            input += fill;
            ilen  -= fill;
            left = 0;
        }
    
        while( ilen >= 64 )
        {
            sm3_process( ctx, input );
            input += 64;
            ilen  -= 64;
        }
    
        if( ilen > 0 )
        {
            memcpy( (void *) (ctx->buffer + left),
                    (void *) input, ilen );
        }
    }
    
    static const unsigned char sm3_padding[64] =
    {
     0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
        0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
        0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
        0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
    };
    
    /*
     * SM3 final digest
     */
    void sm3_finish( sm3_context *ctx, unsigned char output[32] )
    {
        unsigned long last, padn;
        unsigned long high, low;
        unsigned char msglen[8];
    
        high = ( ctx->total[0] >> 29 )
             | ( ctx->total[1] <<  3 );
        low  = ( ctx->total[0] <<  3 );
    
        PUT_ULONG_BE( high, msglen, 0 );
        PUT_ULONG_BE( low,  msglen, 4 );
    
        last = ctx->total[0] & 0x3F;
        padn = ( last < 56 ) ? ( 56 - last ) : ( 120 - last );
    
        sm3_update( ctx, (unsigned char *) sm3_padding, padn );
        sm3_update( ctx, msglen, 8 );
    
        PUT_ULONG_BE( ctx->state[0], output,  0 );
        PUT_ULONG_BE( ctx->state[1], output,  4 );
        PUT_ULONG_BE( ctx->state[2], output,  8 );
        PUT_ULONG_BE( ctx->state[3], output, 12 );
        PUT_ULONG_BE( ctx->state[4], output, 16 );
        PUT_ULONG_BE( ctx->state[5], output, 20 );
        PUT_ULONG_BE( ctx->state[6], output, 24 );
        PUT_ULONG_BE( ctx->state[7], output, 28 );
    }
    
    /*
     * output = SM3( input buffer )
     */
    void sm3( unsigned char *input, int ilen,
               unsigned char output[32] )
    {
        sm3_context ctx;
    
        sm3_starts( &ctx );
        sm3_update( &ctx, input, ilen );
        sm3_finish( &ctx, output );
    
        memset( &ctx, 0, sizeof( sm3_context ) );
    }
    
    /*
     * output = SM3( file contents )
     */
    int sm3_file( char *path, unsigned char output[32] )
    {
        FILE *f;
        size_t n;
        sm3_context ctx;
        unsigned char buf[1024];
    
        if( ( f = fopen( path, "rb" ) ) == NULL )
            return( 1 );
    
        sm3_starts( &ctx );
    
        while( ( n = fread( buf, 1, sizeof( buf ), f ) ) > 0 )
            sm3_update( &ctx, buf, (int) n );
    
        sm3_finish( &ctx, output );
    
        memset( &ctx, 0, sizeof( sm3_context ) );
    
        if( ferror( f ) != 0 )
        {
            fclose( f );
            return( 2 );
        }
    
        fclose( f );
        return( 0 );
    }
    
    /*
     * SM3 HMAC context setup
     */
    void sm3_hmac_starts( sm3_context *ctx, unsigned char *key, int keylen )
    {
        int i;
        unsigned char sum[32];
    
        if( keylen > 64 )
        {
            sm3( key, keylen, sum );
            keylen = 32;
    		//keylen = ( is224 ) ? 28 : 32;
            key = sum;
        }
    
        memset( ctx->ipad, 0x36, 64 );
        memset( ctx->opad, 0x5C, 64 );
    
        for( i = 0; i < keylen; i++ )
        {
            ctx->ipad[i] = (unsigned char)( ctx->ipad[i] ^ key[i] );
            ctx->opad[i] = (unsigned char)( ctx->opad[i] ^ key[i] );
        }
    
        sm3_starts( ctx);
        sm3_update( ctx, ctx->ipad, 64 );
    
        memset( sum, 0, sizeof( sum ) );
    }
    
    /*
     * SM3 HMAC process buffer
     */
    void sm3_hmac_update( sm3_context *ctx, unsigned char *input, int ilen )
    {
        sm3_update( ctx, input, ilen );
    }
    
    /*
     * SM3 HMAC final digest
     */
    void sm3_hmac_finish( sm3_context *ctx, unsigned char output[32] )
    {
        int hlen;
        unsigned char tmpbuf[32];
    
        //is224 = ctx->is224;
        hlen =  32;
    
        sm3_finish( ctx, tmpbuf );
        sm3_starts( ctx );
        sm3_update( ctx, ctx->opad, 64 );
        sm3_update( ctx, tmpbuf, hlen );
        sm3_finish( ctx, output );
    
        memset( tmpbuf, 0, sizeof( tmpbuf ) );
    }
    
    /*
     * output = HMAC-SM#( hmac key, input buffer )
     */
    void sm3_hmac( unsigned char *key, int keylen,
                    unsigned char *input, int ilen,
                    unsigned char output[32] )
    {
        sm3_context ctx;
    
        sm3_hmac_starts( &ctx, key, keylen);
        sm3_hmac_update( &ctx, input, ilen );
        sm3_hmac_finish( &ctx, output );
    
        memset( &ctx, 0, sizeof( sm3_context ) );
    }
    
    //sm3test.c
    #include <string.h>
    #include <stdio.h>
    #include "sm3.h"
    
    int main( int argc, char *argv[] )
    {
    	unsigned char *input = "abc";
    	int ilen = 3;
    	unsigned char output[32];
    	int i;
    	sm3_context ctx;
    
    	printf("Message:\n");
    	printf("%s\n",input);
    
    	sm3(input, ilen, output);
    	printf("Hash:\n   ");
    	for(i=0; i<32; i++)
    	{
    		printf("%02x",output[i]);
    		if (((i+1) % 4 ) == 0) printf(" ");
    	} 
    	printf("\n");
    
    	printf("Message:\n");
    	for(i=0; i < 16; i++)
    		printf("1327");
    	printf("\n");
    
        sm3_starts( &ctx );
    	for(i=0; i < 16; i++)
    		sm3_update( &ctx, "1327", 4 );
        sm3_finish( &ctx, output );
        memset( &ctx, 0, sizeof( sm3_context ) );
    	
    	printf("Hash:\n   ");
    	for(i=0; i<32; i++)
    	{
    		printf("%02x",output[i]);
    		if (((i+1) % 4 ) == 0) printf(" ");
    	}   
    	printf("\n");
        //getch();	//VS2008 
    }
    
    
    //sm3.h
    /**
     * \file sm3.h
     * thanks to Xyssl
     * SM3 standards:http://www.oscca.gov.cn/News/201012/News_1199.htm
     * author:goldboar
     * email:goldboar@163.com
     * 2011-10-26
     */
    #ifndef XYSSL_SM3_H
    #define XYSSL_SM3_H
    
    
    /**
     * \brief          SM3 context structure
     */
    typedef struct
    {
        unsigned long total[2];     /*!< number of bytes processed  */
        unsigned long state[8];     /*!< intermediate digest state  */
        unsigned char buffer[64];   /*!< data block being processed */
    
        unsigned char ipad[64];     /*!< HMAC: inner padding        */
        unsigned char opad[64];     /*!< HMAC: outer padding        */
    
    }
    sm3_context;
    
    #ifdef __cplusplus
    extern "C" {
    #endif
    
    /**
     * \brief          SM3 context setup
     *
     * \param ctx      context to be initialized
     */
    void sm3_starts( sm3_context *ctx );
    
    /**
     * \brief          SM3 process buffer
     *
     * \param ctx      SM3 context
     * \param input    buffer holding the  data
     * \param ilen     length of the input data
     */
    void sm3_update( sm3_context *ctx, unsigned char *input, int ilen );
    
    /**
     * \brief          SM3 final digest
     *
     * \param ctx      SM3 context
     */
    void sm3_finish( sm3_context *ctx, unsigned char output[32] );
    
    /**
     * \brief          Output = SM3( input buffer )
     *
     * \param input    buffer holding the  data
     * \param ilen     length of the input data
     * \param output   SM3 checksum result
     */
    void sm3( unsigned char *input, int ilen,
               unsigned char output[32]);
    
    /**
     * \brief          Output = SM3( file contents )
     *
     * \param path     input file name
     * \param output   SM3 checksum result
     *
     * \return         0 if successful, 1 if fopen failed,
     *                 or 2 if fread failed
     */
    int sm3_file( char *path, unsigned char output[32] );
    
    /**
     * \brief          SM3 HMAC context setup
     *
     * \param ctx      HMAC context to be initialized
     * \param key      HMAC secret key
     * \param keylen   length of the HMAC key
     */
    void sm3_hmac_starts( sm3_context *ctx, unsigned char *key, int keylen);
    
    /**
     * \brief          SM3 HMAC process buffer
     *
     * \param ctx      HMAC context
     * \param input    buffer holding the  data
     * \param ilen     length of the input data
     */
    void sm3_hmac_update( sm3_context *ctx, unsigned char *input, int ilen );
    
    /**
     * \brief          SM3 HMAC final digest
     *
     * \param ctx      HMAC context
     * \param output   SM3 HMAC checksum result
     */
    void sm3_hmac_finish( sm3_context *ctx, unsigned char output[32] );
    
    /**
     * \brief          Output = HMAC-SM3( hmac key, input buffer )
     *
     * \param key      HMAC secret key
     * \param keylen   length of the HMAC key
     * \param input    buffer holding the  data
     * \param ilen     length of the input data
     * \param output   HMAC-SM3 result
     */
    void sm3_hmac( unsigned char *key, int keylen,
                    unsigned char *input, int ilen,
                    unsigned char output[32] );
    
    
    #ifdef __cplusplus
    }
    #endif
    
    #endif /* sm3.h */
    
    

    sm3直接加密文件

  • 相关阅读:
    第十五周作业
    第十四周作业
    第十三周
    第十二周作业
    第二次考试
    太强了,大佬开源的算法小抄彻底火了
    npm--npm 全局安装路径的修改和环境变量的配置
    239
    238
    学术类论文查看--AMiner
  • 原文地址:https://www.cnblogs.com/yycyhyhf/p/16828248.html
Copyright © 2020-2023  润新知