我制作了一个简单的文件加密器/解密器。它采用模式和文件作为参数进行操作。加密时,它会生成随机字符串并使用该字符串对文件进行加密。解密文件时,会提示用户输入密码,并在解密时使用该密码。
我的问题是,即使我仔细地将相同的密钥写入输入,但在解密时我会得到乱码而不是明文。
我跟踪密码的问题,因为当我使用像
这样的常量密码时,一切都完美无缺#include <string.h>
#include <stdio.h>
#include <stdlib.h>
#include <openssl/evp.h>
#include <openssl/aes.h>
#include <time.h>
#include <errno.h>
#ifndef TRUE
#define TRUE 1
#endif
#ifndef FALSE
#define FALSE 0
#endif
/* Encrypt or decrypt, depending on flag 'should_encrypt' */
void en_de_crypt(int should_encrypt, FILE *ifp, FILE *ofp, unsigned char *ckey, unsigned char *ivec) {
const unsigned BUFSIZE=4096;
unsigned char *read_buf = malloc(BUFSIZE);
unsigned char *cipher_buf;
unsigned blocksize;
int out_len;
EVP_CIPHER_CTX ctx;
EVP_CipherInit(&ctx, EVP_aes_256_cbc(), ckey, ivec, should_encrypt);
blocksize = EVP_CIPHER_CTX_block_size(&ctx);
cipher_buf = malloc(BUFSIZE + blocksize);
while (1) {
// Read in data in blocks until EOF. Update the ciphering with each read.
int numRead = fread(read_buf, sizeof(unsigned char), BUFSIZE, ifp);
EVP_CipherUpdate(&ctx, cipher_buf, &out_len, read_buf, numRead);
fwrite(cipher_buf, sizeof(unsigned char), out_len, ofp);
if (numRead < BUFSIZE) { // EOF
break;
}
}
// Now cipher the final block and write it out.
EVP_CipherFinal(&ctx, cipher_buf, &out_len);
fwrite(cipher_buf, sizeof(unsigned char), out_len, ofp);
// Free memory
free(cipher_buf);
free(read_buf);
}
int rand_string(char *str, size_t size)
{
size_t n;
const char charset[] = "ABCDEFGHIJKLMNOPQRSTUWVXYZO1234567890";
for (n = 0; n < size; n++) {
int key = rand() % (int) (sizeof charset - 1);
str[n] = charset[key];
}
str[size] = '\0';
return 0;
}
void copyfile(FILE* from, FILE* to)
{
fseek(from, 0, SEEK_END);
long filesize = ftell(from);
fseek(from, 0, SEEK_SET);
char b[2];
long a;
for(a=0; a<filesize; a++)
{
fread(b, 1, 1, from);
fwrite(b, 1, 1, to);
}
}
int main(int argc, char *argv[]) {
if (argc != 3) { printf("usage: %s mode file\n", argv[0]); return 0; }
unsigned char ivec[] = "dontusethisinput";
FILE *fIN, *fOUT;
if (!strcmp(argv[1],"e"))
{
srand(time(NULL)); /* seed random */
char passkey[6];
rand_string(passkey,5); /* generate random password */
if((fIN = fopen(argv[2], "rb")) == NULL){ printf("ERROR: %s\n", strerror(errno)); return 0; }
fOUT = fopen("tempfile", "wb+");
en_de_crypt(TRUE, fIN, fOUT, (unsigned char*)passkey, ivec); /* encrypt the file */
fclose(fIN);
fclose(fOUT);
if((fIN = fopen(argv[2], "wb+")) == NULL){ printf("ERROR: %s\n", strerror(errno)); return 0; }
fOUT = fopen("tempfile", "rb");
copyfile(fOUT, fIN); /* replace the file with encrypted one */
fclose(fIN);
fclose(fOUT);
printf("file encrypted with key [%s]\n", passkey);
}
else if(!strcmp(argv[1],"d"))
{
char key[6];
printf("Password: ");
fgets(key, 6, stdin); /* prompt for the key */
key[5] = '\0';
if((fIN = fopen(argv[2], "rb")) == NULL){ printf("ERROR: %s\n", strerror(errno)); return 0; }
fOUT = fopen("tempfile", "wb+");
en_de_crypt(FALSE, fIN, fOUT, (unsigned char*)key, ivec); /* decrypt the file */
fclose(fIN);
fclose(fOUT);
if((fIN = fopen(argv[2], "wb+")) == NULL){ printf("ERROR: %s\n", strerror(errno)); return 0; }
fOUT = fopen("tempfile", "rb");
copyfile(fOUT, fIN); /* replace the file with decrypted one */
fclose(fIN);
fclose(fOUT);
printf("file decrypted with key [%s]\n",key);
}
else { printf("invalid mode\n"); return 0; }
remove("tempfile");
return 0;
}
并将其用于加密和解密。
是什么让我的钥匙与众不同?
非常感谢James K Polk加密/解密代码!
start javaw [args]
答案 0 :(得分:2)
我跟踪了密码的问题,因为一切正常 当我使用像
这样的常量密码时,完美无瑕
unsigned char constkey[] = "asd123";
并将其用于加密 和解密。
AES 不使用它使用的密码(二进制)密钥。对于 AES-256 ,它需要 256位长密钥。由于OpenSSL会将您的constkey视为 256位密钥,因此它将超出您提供的内容,并在密钥末尾添加一些随机数据(如果您幸运,可以避免任何访问冲突)
如果你在同一个程序中执行此操作,那么在加密和解密时密钥中的相同随机数据都会正确结束 - 并且所有似乎都很好。
尝试使用正确的密钥长度。