main.lua 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138
  1. -- LuaTools需要PROJECT和VERSION这两个信息
  2. PROJECT = "gmssldemo"
  3. VERSION = "1.0.0"
  4. log.info("main", PROJECT, VERSION)
  5. -- sys库是标配
  6. _G.sys = require("sys")
  7. if wdt then
  8. --添加硬狗防止程序卡死,在支持的设备上启用这个功能
  9. wdt.init(9000)--初始化watchdog设置为9s
  10. sys.timerLoopStart(wdt.feed, 3000)--3s喂一次狗
  11. end
  12. -- Air101/Air103默认80M主频, 跑国密算法会很慢的,调整到240M
  13. if mcu and (rtos.bsp() == "AIR101" or rtos.bsp() == "AIR103" or rtos.bsp() == "AIR601" ) then
  14. mcu.setClk(240)
  15. end
  16. sys.taskInit(function()
  17. sys.wait(1000)
  18. log.info("gmssl", "start")
  19. -- SM2 , 非对称加密, 类似于RSA,但属于椭圆算法
  20. -- 就当前实现还是比较慢的
  21. if gmssl.sm2encrypt then -- 部分BSP不支持
  22. local originStr = "!!from LuatOS!!"
  23. local pkx = "ABE87C924B7ECFDEA1748A06E89003C9F7F4DC5C3563873CE2CAE46F66DE8141"
  24. local pky = "9514733D38CC026F2452A6A3A3A4DA0C28F864AFA5FE2C45E0EB6B761FBB5286"
  25. local private = "129EDC282CD2E9C1144C2E7315F926D772BC96600D2771E8BE02060313FE00D5"
  26. -- GMSSL默认格式
  27. log.info("==== SM2 默认GMSSL模式")
  28. local encodeStr = gmssl.sm2encrypt(pkx,pky,originStr)
  29. log.info("sm2默认模式", "加密后", encodeStr and string.toHex(encodeStr))
  30. if encodeStr then
  31. log.info("sm2默认模式", "解密后", gmssl.sm2decrypt(private,encodeStr))
  32. end
  33. -- 网站兼容模式 https://i.goto327.top/CryptTools/SM2.aspx
  34. -- 密文格式 C1C3C2, 新国标, 一般是这种
  35. log.info("==== SM2 网站兼容模式")
  36. local encodeStr = gmssl.sm2encrypt(pkx,pky,originStr, true)
  37. log.info("sm2网站兼容模式 C1C3C2", "加密后", encodeStr and string.toHex(encodeStr))
  38. if encodeStr then
  39. log.info("sm2网站兼容模式 C1C3C2", "解密后", gmssl.sm2decrypt(private,encodeStr, true))
  40. else
  41. log.info("解密失败")
  42. end
  43. -- 密文格式 C1C2C3, 老国标, 老的Java库通常支持这种
  44. log.info("==== SM2 网站兼容模式, 但C1C2C3")
  45. local encodeStr = gmssl.sm2encrypt(pkx,pky,originStr, true, true)
  46. log.info("sm2网站兼容模式 C1C2C3", "加密后", encodeStr and string.toHex(encodeStr))
  47. if encodeStr then
  48. log.info("sm2网站兼容模式 C1C2C3", "解密后", gmssl.sm2decrypt(private,encodeStr, true, true))
  49. else
  50. log.info("解密失败")
  51. end
  52. end
  53. -- SM3 算法, hash类
  54. if gmssl.sm3update then
  55. log.info("=== SM3测试")
  56. encodeStr = gmssl.sm3update("lqlq666lqlq946")
  57. log.info("gmssl.sm3update",string.toHex(encodeStr))
  58. end
  59. if gmssl.sm4encrypt then
  60. log.info("=== SM4测试")
  61. local passwd = "1234567890123456"
  62. local iv = "1234567890666666"
  63. -- SM4 算法, 对称加密
  64. originStr = ">>SM4 ECB ZeroPadding test<<"
  65. --加密模式:ECB;填充方式:ZeroPadding;密钥:1234567890123456;密钥长度:128 bit
  66. encodeStr = gmssl.sm4encrypt("ECB", "ZERO", originStr, passwd)
  67. log.info("sm4.ecb.zero", "加密后", string.toHex(encodeStr))
  68. log.info("sm4.ecb.zero", "解密后", gmssl.sm4decrypt("ECB","ZERO",encodeStr,passwd))
  69. originStr = ">>SM4 ECB Pkcs5Padding test<<"
  70. --加密模式:ECB;填充方式:Pkcs5Padding;密钥:1234567890123456;密钥长度:128 bit
  71. encodeStr = gmssl.sm4encrypt("ECB", "PKCS5", originStr, passwd)
  72. log.info("sm4.ecb.pks5", "加密后", string.toHex(encodeStr))
  73. log.info("sm4.ecb.pks5", "解密后", gmssl.sm4decrypt("ECB","PKCS5",encodeStr,passwd))
  74. originStr = ">>SM4 CBC Pkcs5Padding test<<"
  75. --加密模式:CBC;填充方式:Pkcs5Padding;密钥:1234567890123456;密钥长度:128 bit;偏移量:1234567890666666
  76. encodeStr = gmssl.sm4encrypt("CBC","PKCS5", originStr, passwd, iv)
  77. log.info("sm4.cbc.pks5", "加密后", string.toHex(encodeStr))
  78. log.info("sm4.cbc.pks5", "解密后", gmssl.sm4decrypt("CBC","PKCS5",encodeStr,passwd, iv))
  79. -- 完全对齐16字节的对比测试
  80. originStr = "1234567890123456"
  81. encodeStr = gmssl.sm4encrypt("ECB","PKCS7",originStr,passwd)
  82. log.info("sm4.ecb.pkcs7", encodeStr:toHex())
  83. encodeStr = gmssl.sm4encrypt("ECB","PKCS5",originStr,passwd)
  84. log.info("sm4.ecb.pkcs5", encodeStr:toHex())
  85. encodeStr = gmssl.sm4encrypt("ECB","ZERO",originStr,passwd)
  86. log.info("sm4.ecb.zero", encodeStr:toHex())
  87. encodeStr = gmssl.sm4encrypt("ECB","NONE",originStr,passwd)
  88. log.info("sm4.ecb.none", encodeStr:toHex())
  89. end
  90. -- SM2签名和验签
  91. if gmssl.sm2sign then
  92. local originStr = string.fromHex("434477813974bf58f94bcf760833c2b40f77a5fc360485b0b9ed1bd9682edb45")
  93. local pkx = "ABE87C924B7ECFDEA1748A06E89003C9F7F4DC5C3563873CE2CAE46F66DE8141"
  94. local pky = "9514733D38CC026F2452A6A3A3A4DA0C28F864AFA5FE2C45E0EB6B761FBB5286"
  95. local private = "129EDC282CD2E9C1144C2E7315F926D772BC96600D2771E8BE02060313FE00D5"
  96. -- 不带id的情况,即默认id="1234567812345678"
  97. local sig = gmssl.sm2sign(private, originStr, nil)
  98. log.info("sm2sign", sig and sig:toHex())
  99. if sig then
  100. local ret = gmssl.sm2verify(pkx, pky, originStr, nil, sig)
  101. log.info("sm2verify", ret or "false")
  102. end
  103. -- 带id的情况
  104. local id = "1234"
  105. local sig = gmssl.sm2sign(private, originStr, id)
  106. log.info("sm2sign", sig and sig:toHex())
  107. if sig then
  108. local ret = gmssl.sm2verify(pkx, pky, originStr, id, sig)
  109. log.info("sm2verify", ret or "false")
  110. end
  111. end
  112. log.info("gmssl", "ALL Done")
  113. end)
  114. -- 用户代码已结束---------------------------------------------
  115. -- 结尾总是这一句
  116. sys.run()
  117. -- sys.run()之后后面不要加任何语句!!!!!