博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
JAVA C++ DES加解密对接,转载
阅读量:5846 次
发布时间:2019-06-18

本文共 33336 字,大约阅读时间需要 111 分钟。

转载自: http://www.cnblogs.com/WonKerr/archive/2009/11/11/DES_C_JAVA.html

 自己实现了一下,从csdn上下了一个大神从openssl里扣出来的C语言DES库和java的des库,能实现java和C对接:

java代码:

import java.security.Key;import java.security.Security;import javax.crypto.Cipher;public class DESPlus{ static String strDefaultKey = "initkey"; static Cipher encryptCipher = null; static Cipher decryptCipher = null;  static {     Security.addProvider(new com.sun.crypto.provider.SunJCE());     Key key = null;    try {      key = getKey(strDefaultKey.getBytes());      encryptCipher = Cipher.getInstance("DES");      encryptCipher.init(Cipher.ENCRYPT_MODE, key);      decryptCipher = Cipher.getInstance("DES");      decryptCipher.init(Cipher.DECRYPT_MODE, key);    }catch(Exception e){        e.printStackTrace();        }    } public DESPlus(){ } public static byte[] encrypt(byte[] arrB) throws Exception {  return encryptCipher.doFinal(arrB); } public static byte[] decrypt(byte[] arrB) throws Exception {  return decryptCipher.doFinal(arrB); } private static  Key getKey(byte[] arrBTmp) throws Exception {  byte[] arrB = new byte[8];  for (int i = 0; i < arrBTmp.length && i < arrB.length; i++) {   arrB[i] = arrBTmp[i];  }  Key key = new javax.crypto.spec.SecretKeySpec(arrB, "DES");  return key; } public static void main(String args[]) {   String str_hello = "1234567\0";   try{     byte[] buffer = str_hello.getBytes();     System.out.println(str_hello+"\n");          System.out.print("明文: ");     for(int i=0; i< buffer.length; i++)       System.out.print(Integer.toHexString(buffer[i] & 0xFF)+" ");     System.out.println("\n");     buffer = DESPlus.encrypt(buffer);     System.out.print("密文: ");     for(int i=0; i< buffer.length; i++)       System.out.print(Integer.toHexString(buffer[i] & 0xFF)+" ");     System.out.println("\n");     buffer = DESPlus.decrypt(buffer);     System.out.print("解密: ");     for(int i=0; i< buffer.length; i++)       System.out.print(Integer.toHexString(buffer[i] & 0xFF)+" ");   } catch (Exception e) {   } }}

  运行结果:

 

C: 

des.h

/** * \file des.h * *  Copyright (C) 2006-2010, Brainspark B.V. * *  This file is part of PolarSSL (http://www.polarssl.org) *  Lead Maintainer: Paul Bakker 
* * All rights reserved. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. */#ifndef POLARSSL_DES_H#define POLARSSL_DES_H#define DES_ENCRYPT 1#define DES_DECRYPT 0#define POLARSSL_ERR_DES_INVALID_INPUT_LENGTH -0x0C00/** * \brief DES context structure */typedef struct{ int mode; /*!< encrypt/decrypt */ unsigned long sk[32]; /*!< DES subkeys */}des_context;/** * \brief Triple-DES context structure */typedef struct{ int mode; /*!< encrypt/decrypt */ unsigned long sk[96]; /*!< 3DES subkeys */}des3_context;#ifdef __cplusplusextern "C" {#endif/** * \brief DES key schedule (56-bit, encryption) * * \param ctx DES context to be initialized * \param key 8-byte secret key */void des_setkey_enc( des_context *ctx, const unsigned char key[8] );/** * \brief DES key schedule (56-bit, decryption) * * \param ctx DES context to be initialized * \param key 8-byte secret key */void des_setkey_dec( des_context *ctx, const unsigned char key[8] );/** * \brief Triple-DES key schedule (112-bit, encryption) * * \param ctx 3DES context to be initialized * \param key 16-byte secret key */void des3_set2key_enc( des3_context *ctx, const unsigned char key[16] );/** * \brief Triple-DES key schedule (112-bit, decryption) * * \param ctx 3DES context to be initialized * \param key 16-byte secret key */void des3_set2key_dec( des3_context *ctx, const unsigned char key[16] );/** * \brief Triple-DES key schedule (168-bit, encryption) * * \param ctx 3DES context to be initialized * \param key 24-byte secret key */void des3_set3key_enc( des3_context *ctx, const unsigned char key[24] );/** * \brief Triple-DES key schedule (168-bit, decryption) * * \param ctx 3DES context to be initialized * \param key 24-byte secret key */void des3_set3key_dec( des3_context *ctx, const unsigned char key[24] );/** * \brief DES-ECB block encryption/decryption * * \param ctx DES context * \param input 64-bit input block * \param output 64-bit output block * * \return 0 if successful */int des_crypt_ecb( des_context *ctx, const unsigned char input[8], unsigned char output[8] );/** * \brief DES-CBC buffer encryption/decryption * * \param ctx DES context * \param mode DES_ENCRYPT or DES_DECRYPT * \param length length of the input data * \param iv initialization vector (updated after use) * \param input buffer holding the input data * \param output buffer holding the output data */int des_crypt_cbc( des_context *ctx, int mode, int length, unsigned char iv[8], const unsigned char *input, unsigned char *output );/** * \brief 3DES-ECB block encryption/decryption * * \param ctx 3DES context * \param input 64-bit input block * \param output 64-bit output block * * \return 0 if successful */int des3_crypt_ecb( des3_context *ctx, const unsigned char input[8], unsigned char output[8] );/** * \brief 3DES-CBC buffer encryption/decryption * * \param ctx 3DES context * \param mode DES_ENCRYPT or DES_DECRYPT * \param length length of the input data * \param iv initialization vector (updated after use) * \param input buffer holding the input data * \param output buffer holding the output data * * \return 0 if successful, or POLARSSL_ERR_DES_INVALID_INPUT_LENGTH */int des3_crypt_cbc( des3_context *ctx, int mode, int length, unsigned char iv[8], const unsigned char *input, unsigned char *output );/* * \brief Checkup routine * * \return 0 if successful, or 1 if the test failed */int des_self_test( int verbose );#ifdef __cplusplus}#endif#endif /* des.h */

  des.c

/* *  FIPS-46-3 compliant Triple-DES implementation * *  Copyright (C) 2006-2010, Brainspark B.V. * *  This file is part of PolarSSL (http://www.polarssl.org) *  Lead Maintainer: Paul Bakker 
* * All rights reserved. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. *//* * DES, on which TDES is based, was originally designed by Horst Feistel * at IBM in 1974, and was adopted as a standard by NIST (formerly NBS). * * http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf */#include "config.h"#if defined(POLARSSL_DES_C)#include "des.h"#include
/* * 32-bit integer manipulation macros (big endian) */#ifndef GET_ULONG_BE#define GET_ULONG_BE(n,b,i) \{ \ (n) = ( (unsigned long) (b)[(i) ] << 24 ) \ | ( (unsigned long) (b)[(i) + 1] << 16 ) \ | ( (unsigned long) (b)[(i) + 2] << 8 ) \ | ( (unsigned long) (b)[(i) + 3] ); \}#endif#ifndef PUT_ULONG_BE#define PUT_ULONG_BE(n,b,i) \{ \ (b)[(i) ] = (unsigned char) ( (n) >> 24 ); \ (b)[(i) + 1] = (unsigned char) ( (n) >> 16 ); \ (b)[(i) + 2] = (unsigned char) ( (n) >> 8 ); \ (b)[(i) + 3] = (unsigned char) ( (n) ); \}#endif/* * Expanded DES S-boxes */static const unsigned long SB1[64] ={ 0x01010400, 0x00000000, 0x00010000, 0x01010404, 0x01010004, 0x00010404, 0x00000004, 0x00010000, 0x00000400, 0x01010400, 0x01010404, 0x00000400, 0x01000404, 0x01010004, 0x01000000, 0x00000004, 0x00000404, 0x01000400, 0x01000400, 0x00010400, 0x00010400, 0x01010000, 0x01010000, 0x01000404, 0x00010004, 0x01000004, 0x01000004, 0x00010004, 0x00000000, 0x00000404, 0x00010404, 0x01000000, 0x00010000, 0x01010404, 0x00000004, 0x01010000, 0x01010400, 0x01000000, 0x01000000, 0x00000400, 0x01010004, 0x00010000, 0x00010400, 0x01000004, 0x00000400, 0x00000004, 0x01000404, 0x00010404, 0x01010404, 0x00010004, 0x01010000, 0x01000404, 0x01000004, 0x00000404, 0x00010404, 0x01010400, 0x00000404, 0x01000400, 0x01000400, 0x00000000, 0x00010004, 0x00010400, 0x00000000, 0x01010004};static const unsigned long SB2[64] ={ 0x80108020, 0x80008000, 0x00008000, 0x00108020, 0x00100000, 0x00000020, 0x80100020, 0x80008020, 0x80000020, 0x80108020, 0x80108000, 0x80000000, 0x80008000, 0x00100000, 0x00000020, 0x80100020, 0x00108000, 0x00100020, 0x80008020, 0x00000000, 0x80000000, 0x00008000, 0x00108020, 0x80100000, 0x00100020, 0x80000020, 0x00000000, 0x00108000, 0x00008020, 0x80108000, 0x80100000, 0x00008020, 0x00000000, 0x00108020, 0x80100020, 0x00100000, 0x80008020, 0x80100000, 0x80108000, 0x00008000, 0x80100000, 0x80008000, 0x00000020, 0x80108020, 0x00108020, 0x00000020, 0x00008000, 0x80000000, 0x00008020, 0x80108000, 0x00100000, 0x80000020, 0x00100020, 0x80008020, 0x80000020, 0x00100020, 0x00108000, 0x00000000, 0x80008000, 0x00008020, 0x80000000, 0x80100020, 0x80108020, 0x00108000};static const unsigned long SB3[64] ={ 0x00000208, 0x08020200, 0x00000000, 0x08020008, 0x08000200, 0x00000000, 0x00020208, 0x08000200, 0x00020008, 0x08000008, 0x08000008, 0x00020000, 0x08020208, 0x00020008, 0x08020000, 0x00000208, 0x08000000, 0x00000008, 0x08020200, 0x00000200, 0x00020200, 0x08020000, 0x08020008, 0x00020208, 0x08000208, 0x00020200, 0x00020000, 0x08000208, 0x00000008, 0x08020208, 0x00000200, 0x08000000, 0x08020200, 0x08000000, 0x00020008, 0x00000208, 0x00020000, 0x08020200, 0x08000200, 0x00000000, 0x00000200, 0x00020008, 0x08020208, 0x08000200, 0x08000008, 0x00000200, 0x00000000, 0x08020008, 0x08000208, 0x00020000, 0x08000000, 0x08020208, 0x00000008, 0x00020208, 0x00020200, 0x08000008, 0x08020000, 0x08000208, 0x00000208, 0x08020000, 0x00020208, 0x00000008, 0x08020008, 0x00020200};static const unsigned long SB4[64] ={ 0x00802001, 0x00002081, 0x00002081, 0x00000080, 0x00802080, 0x00800081, 0x00800001, 0x00002001, 0x00000000, 0x00802000, 0x00802000, 0x00802081, 0x00000081, 0x00000000, 0x00800080, 0x00800001, 0x00000001, 0x00002000, 0x00800000, 0x00802001, 0x00000080, 0x00800000, 0x00002001, 0x00002080, 0x00800081, 0x00000001, 0x00002080, 0x00800080, 0x00002000, 0x00802080, 0x00802081, 0x00000081, 0x00800080, 0x00800001, 0x00802000, 0x00802081, 0x00000081, 0x00000000, 0x00000000, 0x00802000, 0x00002080, 0x00800080, 0x00800081, 0x00000001, 0x00802001, 0x00002081, 0x00002081, 0x00000080, 0x00802081, 0x00000081, 0x00000001, 0x00002000, 0x00800001, 0x00002001, 0x00802080, 0x00800081, 0x00002001, 0x00002080, 0x00800000, 0x00802001, 0x00000080, 0x00800000, 0x00002000, 0x00802080};static const unsigned long SB5[64] ={ 0x00000100, 0x02080100, 0x02080000, 0x42000100, 0x00080000, 0x00000100, 0x40000000, 0x02080000, 0x40080100, 0x00080000, 0x02000100, 0x40080100, 0x42000100, 0x42080000, 0x00080100, 0x40000000, 0x02000000, 0x40080000, 0x40080000, 0x00000000, 0x40000100, 0x42080100, 0x42080100, 0x02000100, 0x42080000, 0x40000100, 0x00000000, 0x42000000, 0x02080100, 0x02000000, 0x42000000, 0x00080100, 0x00080000, 0x42000100, 0x00000100, 0x02000000, 0x40000000, 0x02080000, 0x42000100, 0x40080100, 0x02000100, 0x40000000, 0x42080000, 0x02080100, 0x40080100, 0x00000100, 0x02000000, 0x42080000, 0x42080100, 0x00080100, 0x42000000, 0x42080100, 0x02080000, 0x00000000, 0x40080000, 0x42000000, 0x00080100, 0x02000100, 0x40000100, 0x00080000, 0x00000000, 0x40080000, 0x02080100, 0x40000100};static const unsigned long SB6[64] ={ 0x20000010, 0x20400000, 0x00004000, 0x20404010, 0x20400000, 0x00000010, 0x20404010, 0x00400000, 0x20004000, 0x00404010, 0x00400000, 0x20000010, 0x00400010, 0x20004000, 0x20000000, 0x00004010, 0x00000000, 0x00400010, 0x20004010, 0x00004000, 0x00404000, 0x20004010, 0x00000010, 0x20400010, 0x20400010, 0x00000000, 0x00404010, 0x20404000, 0x00004010, 0x00404000, 0x20404000, 0x20000000, 0x20004000, 0x00000010, 0x20400010, 0x00404000, 0x20404010, 0x00400000, 0x00004010, 0x20000010, 0x00400000, 0x20004000, 0x20000000, 0x00004010, 0x20000010, 0x20404010, 0x00404000, 0x20400000, 0x00404010, 0x20404000, 0x00000000, 0x20400010, 0x00000010, 0x00004000, 0x20400000, 0x00404010, 0x00004000, 0x00400010, 0x20004010, 0x00000000, 0x20404000, 0x20000000, 0x00400010, 0x20004010};static const unsigned long SB7[64] ={ 0x00200000, 0x04200002, 0x04000802, 0x00000000, 0x00000800, 0x04000802, 0x00200802, 0x04200800, 0x04200802, 0x00200000, 0x00000000, 0x04000002, 0x00000002, 0x04000000, 0x04200002, 0x00000802, 0x04000800, 0x00200802, 0x00200002, 0x04000800, 0x04000002, 0x04200000, 0x04200800, 0x00200002, 0x04200000, 0x00000800, 0x00000802, 0x04200802, 0x00200800, 0x00000002, 0x04000000, 0x00200800, 0x04000000, 0x00200800, 0x00200000, 0x04000802, 0x04000802, 0x04200002, 0x04200002, 0x00000002, 0x00200002, 0x04000000, 0x04000800, 0x00200000, 0x04200800, 0x00000802, 0x00200802, 0x04200800, 0x00000802, 0x04000002, 0x04200802, 0x04200000, 0x00200800, 0x00000000, 0x00000002, 0x04200802, 0x00000000, 0x00200802, 0x04200000, 0x00000800, 0x04000002, 0x04000800, 0x00000800, 0x00200002};static const unsigned long SB8[64] ={ 0x10001040, 0x00001000, 0x00040000, 0x10041040, 0x10000000, 0x10001040, 0x00000040, 0x10000000, 0x00040040, 0x10040000, 0x10041040, 0x00041000, 0x10041000, 0x00041040, 0x00001000, 0x00000040, 0x10040000, 0x10000040, 0x10001000, 0x00001040, 0x00041000, 0x00040040, 0x10040040, 0x10041000, 0x00001040, 0x00000000, 0x00000000, 0x10040040, 0x10000040, 0x10001000, 0x00041040, 0x00040000, 0x00041040, 0x00040000, 0x10041000, 0x00001000, 0x00000040, 0x10040040, 0x00001000, 0x00041040, 0x10001000, 0x00000040, 0x10000040, 0x10040000, 0x10040040, 0x10000000, 0x00040000, 0x10001040, 0x00000000, 0x10041040, 0x00040040, 0x10000040, 0x10040000, 0x10001000, 0x10001040, 0x00000000, 0x10041040, 0x00041000, 0x00041000, 0x00001040, 0x00001040, 0x00040040, 0x10000000, 0x10041000};/* * PC1: left and right halves bit-swap */static const unsigned long LHs[16] ={ 0x00000000, 0x00000001, 0x00000100, 0x00000101, 0x00010000, 0x00010001, 0x00010100, 0x00010101, 0x01000000, 0x01000001, 0x01000100, 0x01000101, 0x01010000, 0x01010001, 0x01010100, 0x01010101};static const unsigned long RHs[16] ={ 0x00000000, 0x01000000, 0x00010000, 0x01010000, 0x00000100, 0x01000100, 0x00010100, 0x01010100, 0x00000001, 0x01000001, 0x00010001, 0x01010001, 0x00000101, 0x01000101, 0x00010101, 0x01010101,};/* * Initial Permutation macro */#define DES_IP(X,Y) \{ \ T = ((X >> 4) ^ Y) & 0x0F0F0F0F; Y ^= T; X ^= (T << 4); \ T = ((X >> 16) ^ Y) & 0x0000FFFF; Y ^= T; X ^= (T << 16); \ T = ((Y >> 2) ^ X) & 0x33333333; X ^= T; Y ^= (T << 2); \ T = ((Y >> 8) ^ X) & 0x00FF00FF; X ^= T; Y ^= (T << 8); \ Y = ((Y << 1) | (Y >> 31)) & 0xFFFFFFFF; \ T = (X ^ Y) & 0xAAAAAAAA; Y ^= T; X ^= T; \ X = ((X << 1) | (X >> 31)) & 0xFFFFFFFF; \}/* * Final Permutation macro */#define DES_FP(X,Y) \{ \ X = ((X << 31) | (X >> 1)) & 0xFFFFFFFF; \ T = (X ^ Y) & 0xAAAAAAAA; X ^= T; Y ^= T; \ Y = ((Y << 31) | (Y >> 1)) & 0xFFFFFFFF; \ T = ((Y >> 8) ^ X) & 0x00FF00FF; X ^= T; Y ^= (T << 8); \ T = ((Y >> 2) ^ X) & 0x33333333; X ^= T; Y ^= (T << 2); \ T = ((X >> 16) ^ Y) & 0x0000FFFF; Y ^= T; X ^= (T << 16); \ T = ((X >> 4) ^ Y) & 0x0F0F0F0F; Y ^= T; X ^= (T << 4); \}/* * DES round macro */#define DES_ROUND(X,Y) \{ \ T = *SK++ ^ X; \ Y ^= SB8[ (T ) & 0x3F ] ^ \ SB6[ (T >> 8) & 0x3F ] ^ \ SB4[ (T >> 16) & 0x3F ] ^ \ SB2[ (T >> 24) & 0x3F ]; \ \ T = *SK++ ^ ((X << 28) | (X >> 4)); \ Y ^= SB7[ (T ) & 0x3F ] ^ \ SB5[ (T >> 8) & 0x3F ] ^ \ SB3[ (T >> 16) & 0x3F ] ^ \ SB1[ (T >> 24) & 0x3F ]; \}#define SWAP(a,b) { unsigned long t = a; a = b; b = t; t = 0; }static void des_setkey( unsigned long SK[32], const unsigned char key[8] ){ int i; unsigned long X, Y, T; GET_ULONG_BE( X, key, 0 ); GET_ULONG_BE( Y, key, 4 ); /* * Permuted Choice 1 */ T = ((Y >> 4) ^ X) & 0x0F0F0F0F; X ^= T; Y ^= (T << 4); T = ((Y ) ^ X) & 0x10101010; X ^= T; Y ^= (T ); X = (LHs[ (X ) & 0xF] << 3) | (LHs[ (X >> 8) & 0xF ] << 2) | (LHs[ (X >> 16) & 0xF] << 1) | (LHs[ (X >> 24) & 0xF ] ) | (LHs[ (X >> 5) & 0xF] << 7) | (LHs[ (X >> 13) & 0xF ] << 6) | (LHs[ (X >> 21) & 0xF] << 5) | (LHs[ (X >> 29) & 0xF ] << 4); Y = (RHs[ (Y >> 1) & 0xF] << 3) | (RHs[ (Y >> 9) & 0xF ] << 2) | (RHs[ (Y >> 17) & 0xF] << 1) | (RHs[ (Y >> 25) & 0xF ] ) | (RHs[ (Y >> 4) & 0xF] << 7) | (RHs[ (Y >> 12) & 0xF ] << 6) | (RHs[ (Y >> 20) & 0xF] << 5) | (RHs[ (Y >> 28) & 0xF ] << 4); X &= 0x0FFFFFFF; Y &= 0x0FFFFFFF; /* * calculate subkeys */ for( i = 0; i < 16; i++ ) { if( i < 2 || i == 8 || i == 15 ) { X = ((X << 1) | (X >> 27)) & 0x0FFFFFFF; Y = ((Y << 1) | (Y >> 27)) & 0x0FFFFFFF; } else { X = ((X << 2) | (X >> 26)) & 0x0FFFFFFF; Y = ((Y << 2) | (Y >> 26)) & 0x0FFFFFFF; } *SK++ = ((X << 4) & 0x24000000) | ((X << 28) & 0x10000000) | ((X << 14) & 0x08000000) | ((X << 18) & 0x02080000) | ((X << 6) & 0x01000000) | ((X << 9) & 0x00200000) | ((X >> 1) & 0x00100000) | ((X << 10) & 0x00040000) | ((X << 2) & 0x00020000) | ((X >> 10) & 0x00010000) | ((Y >> 13) & 0x00002000) | ((Y >> 4) & 0x00001000) | ((Y << 6) & 0x00000800) | ((Y >> 1) & 0x00000400) | ((Y >> 14) & 0x00000200) | ((Y ) & 0x00000100) | ((Y >> 5) & 0x00000020) | ((Y >> 10) & 0x00000010) | ((Y >> 3) & 0x00000008) | ((Y >> 18) & 0x00000004) | ((Y >> 26) & 0x00000002) | ((Y >> 24) & 0x00000001); *SK++ = ((X << 15) & 0x20000000) | ((X << 17) & 0x10000000) | ((X << 10) & 0x08000000) | ((X << 22) & 0x04000000) | ((X >> 2) & 0x02000000) | ((X << 1) & 0x01000000) | ((X << 16) & 0x00200000) | ((X << 11) & 0x00100000) | ((X << 3) & 0x00080000) | ((X >> 6) & 0x00040000) | ((X << 15) & 0x00020000) | ((X >> 4) & 0x00010000) | ((Y >> 2) & 0x00002000) | ((Y << 8) & 0x00001000) | ((Y >> 14) & 0x00000808) | ((Y >> 9) & 0x00000400) | ((Y ) & 0x00000200) | ((Y << 7) & 0x00000100) | ((Y >> 7) & 0x00000020) | ((Y >> 3) & 0x00000011) | ((Y << 2) & 0x00000004) | ((Y >> 21) & 0x00000002); }}/* * DES key schedule (56-bit, encryption) */void des_setkey_enc( des_context *ctx, const unsigned char key[8] ){ des_setkey( ctx->sk, key );}/* * DES key schedule (56-bit, decryption) */void des_setkey_dec( des_context *ctx, const unsigned char key[8] ){ int i; des_setkey( ctx->sk, key ); for( i = 0; i < 16; i += 2 ) { SWAP( ctx->sk[i ], ctx->sk[30 - i] ); SWAP( ctx->sk[i + 1], ctx->sk[31 - i] ); }}static void des3_set2key( unsigned long esk[96], unsigned long dsk[96], const unsigned char key[16] ){ int i; des_setkey( esk, key ); des_setkey( dsk + 32, key + 8 ); for( i = 0; i < 32; i += 2 ) { dsk[i ] = esk[30 - i]; dsk[i + 1] = esk[31 - i]; esk[i + 32] = dsk[62 - i]; esk[i + 33] = dsk[63 - i]; esk[i + 64] = esk[i ]; esk[i + 65] = esk[i + 1]; dsk[i + 64] = dsk[i ]; dsk[i + 65] = dsk[i + 1]; }}/* * Triple-DES key schedule (112-bit, encryption) */void des3_set2key_enc( des3_context *ctx, const unsigned char key[16] ){ unsigned long sk[96]; des3_set2key( ctx->sk, sk, key ); memset( sk, 0, sizeof( sk ) );}/* * Triple-DES key schedule (112-bit, decryption) */void des3_set2key_dec( des3_context *ctx, const unsigned char key[16] ){ unsigned long sk[96]; des3_set2key( sk, ctx->sk, key ); memset( sk, 0, sizeof( sk ) );}static void des3_set3key( unsigned long esk[96], unsigned long dsk[96], const unsigned char key[24] ){ int i; des_setkey( esk, key ); des_setkey( dsk + 32, key + 8 ); des_setkey( esk + 64, key + 16 ); for( i = 0; i < 32; i += 2 ) { dsk[i ] = esk[94 - i]; dsk[i + 1] = esk[95 - i]; esk[i + 32] = dsk[62 - i]; esk[i + 33] = dsk[63 - i]; dsk[i + 64] = esk[30 - i]; dsk[i + 65] = esk[31 - i]; }}/* * Triple-DES key schedule (168-bit, encryption) */void des3_set3key_enc( des3_context *ctx, const unsigned char key[24] ){ unsigned long sk[96]; des3_set3key( ctx->sk, sk, key ); memset( sk, 0, sizeof( sk ) );}/* * Triple-DES key schedule (168-bit, decryption) */void des3_set3key_dec( des3_context *ctx, const unsigned char key[24] ){ unsigned long sk[96]; des3_set3key( sk, ctx->sk, key ); memset( sk, 0, sizeof( sk ) );}/* * DES-ECB block encryption/decryption */int des_crypt_ecb( des_context *ctx, const unsigned char input[8], unsigned char output[8] ){ int i; unsigned long X, Y, T, *SK; SK = ctx->sk; GET_ULONG_BE( X, input, 0 ); GET_ULONG_BE( Y, input, 4 ); DES_IP( X, Y ); for( i = 0; i < 8; i++ ) { DES_ROUND( Y, X ); DES_ROUND( X, Y ); } DES_FP( Y, X ); PUT_ULONG_BE( Y, output, 0 ); PUT_ULONG_BE( X, output, 4 ); return( 0 );}/* * DES-CBC buffer encryption/decryption */int des_crypt_cbc( des_context *ctx, int mode, int length, unsigned char iv[8], const unsigned char *input, unsigned char *output ){ int i; unsigned char temp[8]; if( length % 8 ) return( POLARSSL_ERR_DES_INVALID_INPUT_LENGTH ); if( mode == DES_ENCRYPT ) { while( length > 0 ) { for( i = 0; i < 8; i++ ) output[i] = (unsigned char)( input[i] ^ iv[i] ); des_crypt_ecb( ctx, output, output ); memcpy( iv, output, 8 ); input += 8; output += 8; length -= 8; } } else /* DES_DECRYPT */ { while( length > 0 ) { memcpy( temp, input, 8 ); des_crypt_ecb( ctx, input, output ); for( i = 0; i < 8; i++ ) output[i] = (unsigned char)( output[i] ^ iv[i] ); memcpy( iv, temp, 8 ); input += 8; output += 8; length -= 8; } } return( 0 );}/* * 3DES-ECB block encryption/decryption */int des3_crypt_ecb( des3_context *ctx, const unsigned char input[8], unsigned char output[8] ){ int i; unsigned long X, Y, T, *SK; SK = ctx->sk; GET_ULONG_BE( X, input, 0 ); GET_ULONG_BE( Y, input, 4 ); DES_IP( X, Y ); for( i = 0; i < 8; i++ ) { DES_ROUND( Y, X ); DES_ROUND( X, Y ); } for( i = 0; i < 8; i++ ) { DES_ROUND( X, Y ); DES_ROUND( Y, X ); } for( i = 0; i < 8; i++ ) { DES_ROUND( Y, X ); DES_ROUND( X, Y ); } DES_FP( Y, X ); PUT_ULONG_BE( Y, output, 0 ); PUT_ULONG_BE( X, output, 4 ); return( 0 );}/* * 3DES-CBC buffer encryption/decryption */int des3_crypt_cbc( des3_context *ctx, int mode, int length, unsigned char iv[8], const unsigned char *input, unsigned char *output ){ int i; unsigned char temp[8]; if( length % 8 ) return( POLARSSL_ERR_DES_INVALID_INPUT_LENGTH ); if( mode == DES_ENCRYPT ) { while( length > 0 ) { for( i = 0; i < 8; i++ ) output[i] = (unsigned char)( input[i] ^ iv[i] ); des3_crypt_ecb( ctx, output, output ); memcpy( iv, output, 8 ); input += 8; output += 8; length -= 8; } } else /* DES_DECRYPT */ { while( length > 0 ) { memcpy( temp, input, 8 ); des3_crypt_ecb( ctx, input, output ); for( i = 0; i < 8; i++ ) output[i] = (unsigned char)( output[i] ^ iv[i] ); memcpy( iv, temp, 8 ); input += 8; output += 8; length -= 8; } } return( 0 );}#if defined(POLARSSL_SELF_TEST)#include
/* * DES and 3DES test vectors from: * * http://csrc.nist.gov/groups/STM/cavp/documents/des/tripledes-vectors.zip */static const unsigned char des3_test_keys[24] ={ 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0x01, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0x01, 0x23};static const unsigned char des3_test_iv[8] ={ 0x12, 0x34, 0x56, 0x78, 0x90, 0xAB, 0xCD, 0xEF,};static const unsigned char des3_test_buf[8] ={ 0x4E, 0x6F, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74};static const unsigned char des3_test_ecb_dec[3][8] ={ { 0xCD, 0xD6, 0x4F, 0x2F, 0x94, 0x27, 0xC1, 0x5D }, { 0x69, 0x96, 0xC8, 0xFA, 0x47, 0xA2, 0xAB, 0xEB }, { 0x83, 0x25, 0x39, 0x76, 0x44, 0x09, 0x1A, 0x0A }};static const unsigned char des3_test_ecb_enc[3][8] ={ { 0x6A, 0x2A, 0x19, 0xF4, 0x1E, 0xCA, 0x85, 0x4B }, { 0x03, 0xE6, 0x9F, 0x5B, 0xFA, 0x58, 0xEB, 0x42 }, { 0xDD, 0x17, 0xE8, 0xB8, 0xB4, 0x37, 0xD2, 0x32 }};static const unsigned char des3_test_cbc_dec[3][8] ={ { 0x12, 0x9F, 0x40, 0xB9, 0xD2, 0x00, 0x56, 0xB3 }, { 0x47, 0x0E, 0xFC, 0x9A, 0x6B, 0x8E, 0xE3, 0x93 }, { 0xC5, 0xCE, 0xCF, 0x63, 0xEC, 0xEC, 0x51, 0x4C }};static const unsigned char des3_test_cbc_enc[3][8] ={ { 0x54, 0xF1, 0x5A, 0xF6, 0xEB, 0xE3, 0xA4, 0xB4 }, { 0x35, 0x76, 0x11, 0x56, 0x5F, 0xA1, 0x8E, 0x4D }, { 0xCB, 0x19, 0x1F, 0x85, 0xD1, 0xED, 0x84, 0x39 }};/* * Checkup routine */int des_self_test( int verbose ){ int i, j, u, v; des_context ctx; des3_context ctx3; unsigned char key[24]; unsigned char buf[8]; unsigned char prv[8]; unsigned char iv[8]; memset( key, 0, 24 ); /* * ECB mode */ for( i = 0; i < 6; i++ ) { u = i >> 1; v = i & 1; if( verbose != 0 ) printf( " DES%c-ECB-%3d (%s): ", ( u == 0 ) ? ' ' : '3', 56 + u * 56, ( v == DES_DECRYPT ) ? "dec" : "enc" ); memcpy( buf, des3_test_buf, 8 ); switch( i ) { case 0: des_setkey_dec( &ctx, (unsigned char *) des3_test_keys ); break; case 1: des_setkey_enc( &ctx, (unsigned char *) des3_test_keys ); break; case 2: des3_set2key_dec( &ctx3, (unsigned char *) des3_test_keys ); break; case 3: des3_set2key_enc( &ctx3, (unsigned char *) des3_test_keys ); break; case 4: des3_set3key_dec( &ctx3, (unsigned char *) des3_test_keys ); break; case 5: des3_set3key_enc( &ctx3, (unsigned char *) des3_test_keys ); break; default: return( 1 ); } for( j = 0; j < 10000; j++ ) { if( u == 0 ) des_crypt_ecb( &ctx, buf, buf ); else des3_crypt_ecb( &ctx3, buf, buf ); } if( ( v == DES_DECRYPT && memcmp( buf, des3_test_ecb_dec[u], 8 ) != 0 ) || ( v != DES_DECRYPT && memcmp( buf, des3_test_ecb_enc[u], 8 ) != 0 ) ) { if( verbose != 0 ) printf( "failed\n" ); return( 1 ); } if( verbose != 0 ) printf( "passed\n" ); } if( verbose != 0 ) printf( "\n" ); /* * CBC mode */ for( i = 0; i < 6; i++ ) { u = i >> 1; v = i & 1; if( verbose != 0 ) printf( " DES%c-CBC-%3d (%s): ", ( u == 0 ) ? ' ' : '3', 56 + u * 56, ( v == DES_DECRYPT ) ? "dec" : "enc" ); memcpy( iv, des3_test_iv, 8 ); memcpy( prv, des3_test_iv, 8 ); memcpy( buf, des3_test_buf, 8 ); switch( i ) { case 0: des_setkey_dec( &ctx, (unsigned char *) des3_test_keys ); break; case 1: des_setkey_enc( &ctx, (unsigned char *) des3_test_keys ); break; case 2: des3_set2key_dec( &ctx3, (unsigned char *) des3_test_keys ); break; case 3: des3_set2key_enc( &ctx3, (unsigned char *) des3_test_keys ); break; case 4: des3_set3key_dec( &ctx3, (unsigned char *) des3_test_keys ); break; case 5: des3_set3key_enc( &ctx3, (unsigned char *) des3_test_keys ); break; default: return( 1 ); } if( v == DES_DECRYPT ) { for( j = 0; j < 10000; j++ ) { if( u == 0 ) des_crypt_cbc( &ctx, v, 8, iv, buf, buf ); else des3_crypt_cbc( &ctx3, v, 8, iv, buf, buf ); } } else { for( j = 0; j < 10000; j++ ) { unsigned char tmp[8]; if( u == 0 ) des_crypt_cbc( &ctx, v, 8, iv, buf, buf ); else des3_crypt_cbc( &ctx3, v, 8, iv, buf, buf ); memcpy( tmp, prv, 8 ); memcpy( prv, buf, 8 ); memcpy( buf, tmp, 8 ); } memcpy( buf, prv, 8 ); } if( ( v == DES_DECRYPT && memcmp( buf, des3_test_cbc_dec[u], 8 ) != 0 ) || ( v != DES_DECRYPT && memcmp( buf, des3_test_cbc_enc[u], 8 ) != 0 ) ) { if( verbose != 0 ) printf( "failed\n" ); return( 1 ); } if( verbose != 0 ) printf( "passed\n" ); } if( verbose != 0 ) printf( "\n" ); return( 0 );}#endif#endif

  usedes.c

#include 
#include
#include "des.h"#define BUFSIZE 1024int main(int argc, char* argv[]){ int i, j; unsigned char buf[BUFSIZE]; unsigned long tsc; unsigned char tmp[64]; unsigned int num = 8; des_context des; des3_context des3; memset(tmp, 0, sizeof(tmp)); strcpy(tmp, "initkey"); memset(buf, 0, sizeof(buf)); strcpy(buf, "1234567"); des_setkey_enc( &des, tmp); printf("pwd=%s, txt=%s\n", tmp, buf); des_crypt_ecb(&des, buf, buf); // des_crypt_cbc(&des, DES_ENCRYPT, num, tmp, buf, buf ); printf("encrypt txt="); for(i=0; i

  Makefile

usedes: usedes.c des.c des.h 	gcc -o des usedes.c des.c des.h

  运行结果:

结论: java和C的运行结果一致,可进行加解密

转载于:https://www.cnblogs.com/zhidian314/p/3715201.html

你可能感兴趣的文章
我的友情链接
查看>>
搭建LNMP
查看>>
文件类型,文件权限
查看>>
Xamarin.Forms教程开发的Xcode的下载安装
查看>>
js 将json字符串转换为json兑现
查看>>
java读取properties配置文件
查看>>
C/C++语言经典著作
查看>>
分布式文件系统之MogileFS实现
查看>>
qtcreator 错误error:stray'\243'in program
查看>>
工作之命令小总结(7):tail命令
查看>>
LVS+keepalived负载均衡
查看>>
YII分页显示数据
查看>>
Android下获取状态栏的高度
查看>>
Start Developing iOS Apps Today系列(六)
查看>>
UITableview中cell重用引起的内容重复的问题
查看>>
stm32 ADC使用 单通道 多通道
查看>>
Windows服务器配置与管理
查看>>
UVA 10003 Cutting Sticks
查看>>
DRP项目总结
查看>>
图的连通性——无向图的连通分量和生成树
查看>>