luat_crypto_air101.c 9.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327
  1. #include "string.h"
  2. #include "wm_include.h"
  3. #include "wm_crypto_hard.h"
  4. #include "aes.h"
  5. #include "luat_base.h"
  6. #include "luat_crypto.h"
  7. #define LUAT_LOG_TAG "crypto"
  8. #include "luat_log.h"
  9. //#include "mbedtls/sha1.h"
  10. #include "mbedtls/sha256.h"
  11. #include "mbedtls/sha512.h"
  12. //#include "mbedtls/md5.h"
  13. void luat_crypto_HmacSha1(const unsigned char *input, int ilen, unsigned char *output,const unsigned char *key, int keylen);
  14. void luat_crypto_HmacSha256(const unsigned char *input, int ilen, unsigned char *output,const unsigned char *key, int keylen);
  15. void luat_crypto_HmacSha512(const unsigned char *input, int ilen, unsigned char *output,const unsigned char *key, int keylen);
  16. void luat_crypto_HmacMd5(const unsigned char *input, int ilen, unsigned char *output,const unsigned char *key, int keylen);
  17. int luat_crypto_md5_simple(const char* str, size_t str_size, void* out_ptr) {
  18. psDigestContext_t ctx;
  19. tls_crypto_md5_init(&ctx);
  20. tls_crypto_md5_update(&ctx, (const unsigned char *)str, str_size);
  21. tls_crypto_md5_final(&ctx, (unsigned char *)out_ptr);
  22. return 0;
  23. }
  24. int luat_crypto_sha1_simple(const char* str, size_t str_size, void* out_ptr) {
  25. psDigestContext_t ctx;
  26. tls_crypto_sha1_init(&ctx);
  27. tls_crypto_sha1_update(&ctx, (const unsigned char *)str, str_size);
  28. tls_crypto_sha1_final(&ctx, (unsigned char *)out_ptr);
  29. return 0;
  30. }
  31. int luat_crypto_sha256_simple(const char* str, size_t str_size, void* out_ptr) {
  32. mbedtls_sha256_context ctx;
  33. mbedtls_sha256_init(&ctx);
  34. mbedtls_sha256_starts(&ctx, 0);
  35. mbedtls_sha256_update(&ctx, (const unsigned char *)str, str_size);
  36. mbedtls_sha256_finish(&ctx, (unsigned char *)out_ptr);
  37. mbedtls_sha256_free(&ctx);
  38. return 0;
  39. }
  40. int luat_crypto_sha512_simple(const char* str, size_t str_size, void* out_ptr) {
  41. mbedtls_sha512_context ctx;
  42. mbedtls_sha512_init(&ctx);
  43. mbedtls_sha512_starts(&ctx, 0);
  44. mbedtls_sha512_update(&ctx, (const unsigned char *)str, str_size);
  45. mbedtls_sha512_finish(&ctx, (unsigned char *)out_ptr);
  46. mbedtls_sha512_free(&ctx);
  47. return 0;
  48. }
  49. int luat_crypto_hmac_md5_simple(const char* str, size_t str_size, const char* mac, size_t mac_size, void* out_ptr) {
  50. luat_crypto_HmacMd5((const unsigned char *)str, str_size, (unsigned char *)out_ptr, (const unsigned char *)mac, mac_size);
  51. return 0;
  52. }
  53. int luat_crypto_hmac_sha1_simple(const char* str, size_t str_size, const char* mac, size_t mac_size, void* out_ptr) {
  54. luat_crypto_HmacSha1((const unsigned char *)str, str_size, (unsigned char *)out_ptr, (const unsigned char *)mac, mac_size);
  55. return 0;
  56. }
  57. int luat_crypto_hmac_sha256_simple(const char* str, size_t str_size, const char* mac, size_t mac_size, void* out_ptr) {
  58. luat_crypto_HmacSha256((const unsigned char *)str, str_size, (unsigned char *)out_ptr, (const unsigned char *)mac, mac_size);
  59. return 0;
  60. }
  61. int luat_crypto_hmac_sha512_simple(const char* str, size_t str_size, const char* mac, size_t mac_size, void* out_ptr) {
  62. luat_crypto_HmacSha512((const unsigned char *)str, str_size, (unsigned char *)out_ptr, (const unsigned char *)mac, mac_size);
  63. return 0;
  64. }
  65. ///----------------------------
  66. #define ALI_SHA1_KEY_IOPAD_SIZE (64)
  67. #define ALI_SHA1_DIGEST_SIZE (20)
  68. #define ALI_SHA256_KEY_IOPAD_SIZE (64)
  69. #define ALI_SHA256_DIGEST_SIZE (32)
  70. #define ALI_SHA512_KEY_IOPAD_SIZE (128)
  71. #define ALI_SHA512_DIGEST_SIZE (64)
  72. #define ALI_MD5_KEY_IOPAD_SIZE (64)
  73. #define ALI_MD5_DIGEST_SIZE (16)
  74. // char atHb2Hex(unsigned char hb)
  75. // {
  76. // hb = hb&0xF;
  77. // return (char)(hb<10 ? '0'+hb : hb-10+'a');
  78. // }
  79. /*
  80. * output = SHA-1( input buffer )
  81. */
  82. void luat_crypto_HmacSha1(const unsigned char *input, int ilen, unsigned char *output,const unsigned char *key, int keylen)
  83. {
  84. int i;
  85. psDigestContext_t ctx;
  86. unsigned char k_ipad[ALI_SHA1_KEY_IOPAD_SIZE] = {0};
  87. unsigned char k_opad[ALI_SHA1_KEY_IOPAD_SIZE] = {0};
  88. unsigned char tempbuf[ALI_SHA1_DIGEST_SIZE];
  89. memset(k_ipad, 0x36, ALI_SHA1_KEY_IOPAD_SIZE);
  90. memset(k_opad, 0x5C, ALI_SHA1_KEY_IOPAD_SIZE);
  91. for(i=0; i<keylen; i++)
  92. {
  93. if(i>=ALI_SHA1_KEY_IOPAD_SIZE)
  94. {
  95. break;
  96. }
  97. k_ipad[i] ^=key[i];
  98. k_opad[i] ^=key[i];
  99. }
  100. tls_crypto_sha1_init(&ctx);
  101. tls_crypto_sha1_update(&ctx, k_ipad, ALI_SHA1_KEY_IOPAD_SIZE);
  102. tls_crypto_sha1_update(&ctx, input, ilen);
  103. tls_crypto_sha1_final(&ctx, tempbuf);
  104. tls_crypto_sha1_init(&ctx);
  105. tls_crypto_sha1_update(&ctx, k_opad, ALI_SHA1_KEY_IOPAD_SIZE);
  106. tls_crypto_sha1_update(&ctx, tempbuf, ALI_SHA1_DIGEST_SIZE);
  107. tls_crypto_sha1_final(&ctx, tempbuf);
  108. memcpy(output, tempbuf, ALI_SHA1_DIGEST_SIZE);
  109. }
  110. /*
  111. * output = SHA-256( input buffer )
  112. */
  113. void luat_crypto_HmacSha256(const unsigned char *input, int ilen, unsigned char *output,const unsigned char *key, int keylen)
  114. {
  115. int i;
  116. mbedtls_sha256_context ctx;
  117. unsigned char k_ipad[ALI_SHA256_KEY_IOPAD_SIZE] = {0};
  118. unsigned char k_opad[ALI_SHA256_KEY_IOPAD_SIZE] = {0};
  119. memset(k_ipad, 0x36, 64);
  120. memset(k_opad, 0x5C, 64);
  121. if ((NULL == input) || (NULL == key) || (NULL == output)) {
  122. return;
  123. }
  124. if (keylen > ALI_SHA256_KEY_IOPAD_SIZE) {
  125. return;
  126. }
  127. for(i=0; i<keylen; i++)
  128. {
  129. if(i>=ALI_SHA256_KEY_IOPAD_SIZE)
  130. {
  131. break;
  132. }
  133. k_ipad[i] ^=key[i];
  134. k_opad[i] ^=key[i];
  135. }
  136. mbedtls_sha256_init(&ctx);
  137. mbedtls_sha256_starts(&ctx, 0);
  138. mbedtls_sha256_update(&ctx, k_ipad, ALI_SHA256_KEY_IOPAD_SIZE);
  139. mbedtls_sha256_update(&ctx, input, ilen);
  140. mbedtls_sha256_finish(&ctx, output);
  141. mbedtls_sha256_starts(&ctx, 0);
  142. mbedtls_sha256_update(&ctx, k_opad, ALI_SHA256_KEY_IOPAD_SIZE);
  143. mbedtls_sha256_update(&ctx, output, ALI_SHA256_DIGEST_SIZE);
  144. mbedtls_sha256_finish(&ctx, output);
  145. mbedtls_sha256_free(&ctx);
  146. }
  147. /*
  148. * output = SHA-512( input buffer )
  149. */
  150. void luat_crypto_HmacSha512(const unsigned char *input, int ilen, unsigned char *output,const unsigned char *key, int keylen)
  151. {
  152. int i;
  153. mbedtls_sha512_context ctx;
  154. unsigned char k_ipad[ALI_SHA512_KEY_IOPAD_SIZE] = {0};
  155. unsigned char k_opad[ALI_SHA512_KEY_IOPAD_SIZE] = {0};
  156. memset(k_ipad, 0x36, ALI_SHA512_KEY_IOPAD_SIZE);
  157. memset(k_opad, 0x5C, ALI_SHA512_KEY_IOPAD_SIZE);
  158. if ((NULL == input) || (NULL == key) || (NULL == output)) {
  159. return;
  160. }
  161. if (keylen > ALI_SHA512_KEY_IOPAD_SIZE) {
  162. return;
  163. }
  164. for(i=0; i<keylen; i++)
  165. {
  166. if(i>=ALI_SHA512_KEY_IOPAD_SIZE)
  167. {
  168. break;
  169. }
  170. k_ipad[i] ^=key[i];
  171. k_opad[i] ^=key[i];
  172. }
  173. mbedtls_sha512_init(&ctx);
  174. mbedtls_sha512_starts(&ctx, 0);
  175. mbedtls_sha512_update(&ctx, k_ipad, ALI_SHA512_KEY_IOPAD_SIZE);
  176. mbedtls_sha512_update(&ctx, input, ilen);
  177. mbedtls_sha512_finish(&ctx, output);
  178. mbedtls_sha512_starts(&ctx, 0);
  179. mbedtls_sha512_update(&ctx, k_opad, ALI_SHA512_KEY_IOPAD_SIZE);
  180. mbedtls_sha512_update(&ctx, output, ALI_SHA512_DIGEST_SIZE);
  181. mbedtls_sha512_finish(&ctx, output);
  182. mbedtls_sha512_free(&ctx);
  183. }
  184. /*
  185. * output = MD-5( input buffer )
  186. */
  187. void luat_crypto_HmacMd5(const unsigned char *input, int ilen, unsigned char *output,const unsigned char *key, int keylen)
  188. {
  189. int i;
  190. psDigestContext_t ctx;
  191. unsigned char k_ipad[ALI_MD5_KEY_IOPAD_SIZE] = {0};
  192. unsigned char k_opad[ALI_MD5_KEY_IOPAD_SIZE] = {0};
  193. unsigned char tempbuf[ALI_MD5_DIGEST_SIZE];
  194. memset(k_ipad, 0x36, ALI_MD5_KEY_IOPAD_SIZE);
  195. memset(k_opad, 0x5C, ALI_MD5_KEY_IOPAD_SIZE);
  196. for(i=0; i<keylen; i++)
  197. {
  198. if(i>=ALI_MD5_KEY_IOPAD_SIZE)
  199. {
  200. break;
  201. }
  202. k_ipad[i] ^=key[i];
  203. k_opad[i] ^=key[i];
  204. }
  205. tls_crypto_md5_init(&ctx);
  206. tls_crypto_md5_update(&ctx, k_ipad, ALI_MD5_KEY_IOPAD_SIZE);
  207. tls_crypto_md5_update(&ctx, input, ilen);
  208. tls_crypto_md5_final(&ctx, tempbuf);
  209. tls_crypto_md5_init(&ctx);
  210. tls_crypto_md5_update(&ctx, k_opad, ALI_MD5_KEY_IOPAD_SIZE);
  211. tls_crypto_md5_update(&ctx, tempbuf, ALI_MD5_DIGEST_SIZE);
  212. tls_crypto_md5_final(&ctx, tempbuf);
  213. memcpy(output, tempbuf, ALI_MD5_DIGEST_SIZE);
  214. }
  215. int l_crypto_cipher_xxx(lua_State *L, uint8_t flags) {
  216. int ret = -1;
  217. size_t cipher_size = 0;
  218. size_t pad_size = 0;
  219. size_t str_size = 0;
  220. size_t key_size = 0;
  221. size_t iv_size = 0;
  222. const char* cipher = luaL_optlstring(L, 1, "AES-128-ECB", &cipher_size);
  223. const char* pad = luaL_optlstring(L, 2, "PKCS7", &pad_size);
  224. const char* str = luaL_checklstring(L, 3, &str_size);
  225. const char* key = luaL_checklstring(L, 4, &key_size);
  226. const char* iv = luaL_optlstring(L, 5, "", &iv_size);
  227. luaL_Buffer buff;
  228. if (!strcmp("AES-128-CBC", cipher)) {
  229. luaL_buffinitsize(L, &buff, str_size);
  230. memcpy(buff.b, str, str_size);
  231. if (flags) {
  232. ret = aes_128_cbc_encrypt((const u8*)key, (const u8*)iv, (u8*)buff.b, str_size);
  233. }
  234. else {
  235. ret = aes_128_cbc_decrypt((const u8*)key, (const u8*)iv, (u8*)buff.b, str_size);
  236. }
  237. if (ret == 0) {
  238. luaL_pushresultsize(&buff, str_size);
  239. return 1;
  240. }
  241. }
  242. else if(!strcmp("DES-ECB", cipher)){
  243. unsigned char output[1024] = {0};
  244. psCipherContext_t ctx;
  245. tls_crypto_des_init(&ctx, iv, key, key_size, CRYPTO_MODE_ECB);
  246. if (flags) {
  247. ret = tls_crypto_des_encrypt_decrypt(&ctx, str, output, str_size, CRYPTO_WAY_ENCRYPT);
  248. }
  249. else {
  250. ret = tls_crypto_des_encrypt_decrypt(&ctx, str, output, str_size, CRYPTO_WAY_DECRYPT);
  251. }
  252. if (ret == 0) {
  253. lua_pushstring(L, output);
  254. return 1;
  255. }
  256. }
  257. lua_pushstring(L, "");
  258. return 1;
  259. }
  260. #include "wm_crypto_hard.h"
  261. static char trng_init = 0;
  262. int luat_crypto_trng(char* buff, size_t len) {
  263. if (trng_init == 0) {
  264. trng_init = 1;
  265. tls_crypto_random_init(0, CRYPTO_RNG_SWITCH_32);
  266. }
  267. tls_crypto_random_bytes_range(buff, len, 256);
  268. return 0;
  269. }