win api 实现 AES加密、解密,获取HASH
WCHAR szPasswod[] = {L"goodpasswod" }; HCRYPTHASH hHash; HCRYPTPROV hCryptProv; HCRYPTKEY hKey; DWORD dwHashLen = 0; DWORD dwhash = 4; BYTE byHash[] ={"123456789012345678"}; BYTE bySrc[] = {"123456789012345678901234567890"}; BYTE byDest[64] = {0}; memcpy(byDest,bySrc,32); int iret = -1 ; int idx = 0 ; WCHAR* wszProvider[] = {MS_ENH_RSA_AES_PROV,L"Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)"}; while(!(iret = CryptAcquireContext(&hCryptProv,NULL,wszProvider[idx],PROV_RSA_AES,CRYPT_SILENT))) { idx ++ ; idx %= 2 ; } // passwd to hash CryptCreateHash(hCryptProv,CALG_MD5,0,0,&hHash);
// use passwd to create hash //CryptHashData(hHash,(BYTE*)szPasswod,wcslen(szPasswod)*2,0);
// set hash CryptGetHashParam(hHash,HP_HASHSIZE,(BYTE*)&dwHashLen,&dwhash,0); // hashlen = 16 CryptSetHashParam(hHash,HP_HASHVAL ,byHash,dwHashLen); CryptDeriveKey(hCryptProv,CALG_AES_128,hHash,CRYPT_EXPORTABLE,&hKey); // CRYPT_EXPORTABLE DWORD dwLen =31; DWORD dwLen1 = 31 ; DWORD dwBufferLen = 48 ;
//get crypt need buffer-len CryptEncrypt(hKey,0,TRUE,0,byDest,&dwLen,0);
// alloc buffer that`s len should be dwlen CryptEncrypt(hKey,0,TRUE,0,byDest,&dwLen1,dwLen); MessageBoxA(NULL,(LPSTR)byDest,(LPSTR)byDest,0); CryptDecrypt(hKey,0,TRUE,0,byDest,&dwLen); MessageBoxA(NULL,(LPSTR)byDest,(LPSTR)byDest,0); CryptDestroyHash(hHash); CryptDestroyKey(hKey); CryptReleaseContext(hCryptProv,0);
测试发现兼容 xp,win7(x64)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 | LPBYTE GetHash(LPBYTE lpData, DWORD dwDataLen,LPDWORD lpdwOutLen) { HCRYPTPROV hCryptProv; HCRYPTHASH hHash; LPBYTE lpRetBuffer = NULL ; //-------------------------------------------------------------------- // Get a handle to a cryptography provider context. if (CryptAcquireContext( &hCryptProv, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT)) { // printf("CryptAcquireContext complete. \n"); //-------------------------------------------------------------------- // Acquire a hash object handle. if (CryptCreateHash( hCryptProv, CALG_MD5, 0, 0, &hHash)) { if (CryptHashData(hHash,lpData,dwDataLen,0)) { //CryptGetHashParam(hHash, HP_HASHSIZE, (BYTE*)(&dwSize), &dwLen, 0); CryptSetHashParam(hHash,HP_HASHSIZE,(BYTE*)lpdwOutLen, sizeof (DWORD)); lpRetBuffer =(LPBYTE) BPP_ReAlloc(NULL,0,*lpdwOutLen); CryptGetHashParam(hHash, HP_HASHVAL, lpRetBuffer, lpdwOutLen, 0); } } } if (hHash) CryptDestroyHash(hHash); if (hCryptProv) CryptReleaseContext(hCryptProv,0); return lpRetBuffer ; } |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 | LPBYTE Encrypt(LPBYTE lpData,LPDWORD lpdwInOutLen) { HCRYPTPROV hCryptProv =NULL ; HCRYPTKEY hKey = NULL ; HCRYPTHASH hHash = NULL ; char * szId =NULL ; LPBYTE lpRetBuf = NULL ; DWORD dwLen ; dwLen = *lpdwInOutLen ; if (!CryptAcquireContextW(&hCryptProv,NULL,NULL,PROV_RSA_FULL,0)) { if (!CryptAcquireContextW(&hCryptProv,NULL,NULL,PROV_RSA_FULL,CRYPT_NEWKEYSET)) { goto EncryptEnd ; } } if (!CryptCreateHash(hCryptProv,CALG_MD5,0,0,&hHash)) { goto EncryptEnd ; } szId = GetIdStr(); // pswd if (!CryptHashData(hHash,(BYTE*)szId,strlen(szId),0)) { goto EncryptEnd ; } if (!CryptDeriveKey(hCryptProv,CALG_RC4,hHash,0x00800000,&hKey)) { dwLen = GetLastError(); goto EncryptEnd ; } // qu jia mi suo xu chang du // dwLen = ((dwLen%8 ?1:0) + dwLen/8)*8 ; lpRetBuf = (LPBYTE)malloc(dwLen);<br> memcpy(lpRetBuf,lpData,*lpdwInOutLen); if (!CryptEncrypt(hKey,0,TRUE,0,lpRetBuf,lpdwInOutLen,dwLen)) { goto EncryptEnd ; } EncryptEnd: if (szId) { Free((LPVOID&)szId); } if (hHash) { CryptDestroyHash(hHash); } if (hKey) { CryptDestroyKey(hKey); } if (hCryptProv) { CryptReleaseContext(hCryptProv,0); } return lpRetBuf ; } LPBYTE Decrypt(LPBYTE lpData,LPDWORD lpdwInOutLen) { HCRYPTPROV hCryptProv =NULL ; HCRYPTKEY hKey = NULL ; HCRYPTHASH hHash = NULL ; char * szId =NULL ; LPBYTE lpRetBuf = NULL ; DWORD dwLen ; dwLen = *lpdwInOutLen ; if (!CryptAcquireContextW(&hCryptProv,NULL,NULL,PROV_RSA_FULL,0)) { if (!CryptAcquireContextW(&hCryptProv,NULL,NULL,PROV_RSA_FULL,CRYPT_NEWKEYSET)) { goto DecryptEnd ; } } if (!CryptCreateHash(hCryptProv,CALG_MD5,0,0,&hHash)) { goto DecryptEnd ; } szId = GetIdStr(); if (!CryptHashData(hHash,(BYTE*)szId,strlen(szId),0)) { goto DecryptEnd ; } if (!CryptDeriveKey(hCryptProv,CALG_RC4,hHash,CRYPT_EXPORTABLE,&hKey)) { dwLen = GetLastError(); goto DecryptEnd ; } // qu jia mi suo xu chang du //dwLen = ((dwLen%8 ?1:0) + dwLen/8)*8 ; lpRetBuf = (LPBYTE)malloc(dwLen); memcpy(lpRetBuf,lpData,*lpdwInOutLen); //*lpdwInOutLen = dwLen ; if (!CryptDecrypt(hKey,0,TRUE,0,lpRetBuf,lpdwInOutLen)) { goto DecryptEnd ; } DecryptEnd: if (szId) { BPP_Free((LPVOID&)szId); } if (hHash) { CryptDestroyHash(hHash); } if (hKey) { CryptDestroyKey(hKey); } if (hCryptProv) { CryptReleaseContext(hCryptProv,0); } return lpRetBuf ; } |
签名档:
从事网络安全和编程的我,很希望能找到志同道合的朋友交流。
欢迎cn博客的好友拍砖,留言。
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 如何编写易于单元测试的代码
· 10年+ .NET Coder 心语,封装的思维:从隐藏、稳定开始理解其本质意义
· .NET Core 中如何实现缓存的预热?
· 从 HTTP 原因短语缺失研究 HTTP/2 和 HTTP/3 的设计差异
· AI与.NET技术实操系列:向量存储与相似性搜索在 .NET 中的实现
· 地球OL攻略 —— 某应届生求职总结
· 周边上新:园子的第一款马克杯温暖上架
· Open-Sora 2.0 重磅开源!
· 提示词工程——AI应用必不可少的技术
· .NET周刊【3月第1期 2025-03-02】