Warning: file_get_contents(/data/phpspider/zhask/data//catemap/8/lua/3.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181

Warning: file_get_contents(/data/phpspider/zhask/data//catemap/3/html/82.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
Encryption 使用LuaJit进行FFI加密/解密_Encryption_Lua_Openssl_Ffi_Luajit - Fatal编程技术网

Encryption 使用LuaJit进行FFI加密/解密

Encryption 使用LuaJit进行FFI加密/解密,encryption,lua,openssl,ffi,luajit,Encryption,Lua,Openssl,Ffi,Luajit,我试图通过LuaJIT中的FFI使用OpenSSL进行加密和解密-我尝试了许多不同的变体,但运气不太好。我的代码似乎总是返回空字符串 我试图遵循OpenSSL文档中描述的模式: 我认为您的代码缺少某些类型的声明,例如EVP\u PKEY\u CTX,EVP\u PKEY,等等。您还需要添加这些数据类型的定义。基本上,ffi.cdef定义了将通过ffi使用的所有函数名,因此LuaJIT可以解析它们 另一方面,对这些函数的调用应该通过实际实现这些函数的库进行,例如OpenSSL,而不是ffi.C。C

我试图通过LuaJIT中的FFI使用OpenSSL进行加密和解密-我尝试了许多不同的变体,但运气不太好。我的代码似乎总是返回空字符串

我试图遵循OpenSSL文档中描述的模式:


我认为您的代码缺少某些类型的声明,例如
EVP\u PKEY\u CTX
EVP\u PKEY
,等等。您还需要添加这些数据类型的定义。基本上,
ffi.cdef
定义了将通过ffi使用的所有函数名,因此LuaJIT可以解析它们

另一方面,对这些函数的调用应该通过实际实现这些函数的库进行,例如OpenSSL,而不是
ffi.C
。C名称空间用于访问
libc
以及其他C库,如
libm
libdl
。例如:

local ffi = require("ffi")
local ssl = ffi.load("ssl")

ffi.cdef[[
struct evp_pkey_ctx_st {

};
typedef struct evp_pkey_ctx_st EVP_PKEY_CTX;

struct evp_pkey_st {

};
typedef struct evp_pkey_st EVP_PKEY;

EVP_PKEY_CTX *EVP_PKEY_CTX_new(EVP_PKEY *key, void *b);
]]

local ctx = ssl.EVP_PKEY_CTX_new(gen_key, nil)
if ctx then 
   print("ctx created") 
else
   return nil
end

我认为您的代码缺少某些类型的声明,例如
EVP\u PKEY\u CTX
EVP\u PKEY
,等等。您还需要添加这些数据类型的定义。基本上,
ffi.cdef
定义了将通过ffi使用的所有函数名,因此LuaJIT可以解析它们

另一方面,对这些函数的调用应该通过实际实现这些函数的库进行,例如OpenSSL,而不是
ffi.C
。C名称空间用于访问
libc
以及其他C库,如
libm
libdl
。例如:

local ffi = require("ffi")
local ssl = ffi.load("ssl")

ffi.cdef[[
struct evp_pkey_ctx_st {

};
typedef struct evp_pkey_ctx_st EVP_PKEY_CTX;

struct evp_pkey_st {

};
typedef struct evp_pkey_st EVP_PKEY;

EVP_PKEY_CTX *EVP_PKEY_CTX_new(EVP_PKEY *key, void *b);
]]

local ctx = ssl.EVP_PKEY_CTX_new(gen_key, nil)
if ctx then 
   print("ctx created") 
else
   return nil
end

回答我自己的问题

我的原始代码并没有严格遵循OpenSSL的C实现示例,因为它只获得加密数据的长度。它也从不使用任何填充,它重用变量,也不划分为方法,它故意遗漏一些依赖项以隐藏一些实现细节

下面的代码现在可以(独立)工作,并且结构更好,但它有意不进行错误检查,并且还会处理长度超过(KeyLength-42)的内容

为了提供一些上下文,此代码需要PEM格式的证书和密钥:

local ffi = require "ffi"
local ssl = ffi.load "ssl"

ffi.cdef[[
  typedef struct bio_st BIO;
  typedef struct bio_method_st BIO_METHOD;
  BIO *BIO_new(BIO_METHOD *type);
  BIO *BIO_new_mem_buf(void *buf, int len);
  typedef struct evp_pkey_ctx_st EVP_PKEY_CTX;
  typedef struct evp_pkey_st EVP_PKEY;
  typedef struct engine_st ENGINE;
  EVP_PKEY *EVP_PKEY_new(void);
  void EVP_PKEY_free(EVP_PKEY *key);
  typedef struct rsa_st RSA;
  typedef int pem_password_cb(char *buf, int size, int rwflag, void *userdata);
  RSA * PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, void *u);
  int EVP_PKEY_set1_RSA(EVP_PKEY *pkey,RSA *key);
  EVP_PKEY_CTX *EVP_PKEY_CTX_new(EVP_PKEY *pkey, ENGINE *e);
  int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, int cmd, int p1, void *p2);
  typedef struct x509_st X509;
  X509 *PEM_read_bio_X509(BIO *bp, X509 **x, pem_password_cb *cb, void *u);
  EVP_PKEY * X509_get_pubkey(X509 *x);
  void X509_free(X509 *a);
  int EVP_PKEY_encrypt_init(EVP_PKEY_CTX *ctx);
  int EVP_PKEY_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen);
  int EVP_PKEY_decrypt_init(EVP_PKEY_CTX *ctx);
  int EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen);
]]

function encrypt(publicPEM, body)
  local bioIn = ffi.new("unsigned char[?]", #publicPEM)
  ffi.copy(bioIn, publicPEM, #publicPEM)
  local bio = ffi.C.BIO_new_mem_buf(bioIn, -1)
  local x509 = ffi.C.PEM_read_bio_X509(bio, nil, nil, nil)
  ffi.gc(x509, ffi.C.X509_free)
  local pKey = ffi.C.X509_get_pubkey(x509)
  local ctx = ffi.C.EVP_PKEY_CTX_new(pKey, nil)
  ffi.C.EVP_PKEY_encrypt_init(ctx)

  -- Adds OEAP padding
  ffi.C.EVP_PKEY_CTX_ctrl(ctx, 6, -1, 4097, 4, null)

  -- Get the length
  local outputLength = ffi.new("size_t[1]")
  ffi.C.EVP_PKEY_encrypt(ctx, nil, outputLength, body, #body)

  -- Encrypt into outputBuffer
  local outputBuffer = ffi.new("unsigned char[?]", outputLength[0])
  ffi.C.EVP_PKEY_encrypt(ctx, outputBuffer, outputLength, body, #body)

  -- Turn it into a string
  return ffi.string(outputBuffer, outputLength[0])
end

function decrypt(privatePEM, body)
  local bioIn = ffi.new("unsigned char[?]", #privatePEM)
  ffi.copy(bioIn, privatePEM, #privatePEM)
  local bio = ffi.C.BIO_new_mem_buf(bioIn, -1)
  if not bio then
    return nil
  end
  local rsa = ffi.C.PEM_read_bio_RSAPrivateKey(bio, nil, nil, nil)
  local pKey = ffi.C.EVP_PKEY_new()

  ffi.C.EVP_PKEY_set1_RSA(pKey, rsa)
  ctx = ffi.C.EVP_PKEY_CTX_new(pKey, nil)
  ffi.C.EVP_PKEY_decrypt_init(ctx)

  -- Adds OEAP padding
  ffi.C.EVP_PKEY_CTX_ctrl(ctx, 6, -1, 4097, 4, null)

  -- Get the length
  local outputLength = ffi.new("size_t[1]")
  ffi.C.EVP_PKEY_decrypt(ctx, nil, outputLength, body, #body)

  -- Decrypt into outputBuffer
  local outputBuffer = ffi.new("unsigned char[?]", outputLength[0])
  ffi.C.EVP_PKEY_decrypt(ctx, outputBuffer, outputLength, body, #body)

  -- Turn it into a string
  return ffi.string(outputBuffer, outputLength[0])
end

io.write("Result: "..tostring(decrypt([[-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
]], encrypt([[-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]], "hello world"))).."\n")

回答我自己的问题

我的原始代码并没有严格遵循OpenSSL的C实现示例,因为它只获得加密数据的长度。它也从不使用任何填充,它重用变量,也不划分为方法,它故意遗漏一些依赖项以隐藏一些实现细节

下面的代码现在可以(独立)工作,并且结构更好,但它有意不进行错误检查,并且还会处理长度超过(KeyLength-42)的内容

为了提供一些上下文,此代码需要PEM格式的证书和密钥:

local ffi = require "ffi"
local ssl = ffi.load "ssl"

ffi.cdef[[
  typedef struct bio_st BIO;
  typedef struct bio_method_st BIO_METHOD;
  BIO *BIO_new(BIO_METHOD *type);
  BIO *BIO_new_mem_buf(void *buf, int len);
  typedef struct evp_pkey_ctx_st EVP_PKEY_CTX;
  typedef struct evp_pkey_st EVP_PKEY;
  typedef struct engine_st ENGINE;
  EVP_PKEY *EVP_PKEY_new(void);
  void EVP_PKEY_free(EVP_PKEY *key);
  typedef struct rsa_st RSA;
  typedef int pem_password_cb(char *buf, int size, int rwflag, void *userdata);
  RSA * PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, void *u);
  int EVP_PKEY_set1_RSA(EVP_PKEY *pkey,RSA *key);
  EVP_PKEY_CTX *EVP_PKEY_CTX_new(EVP_PKEY *pkey, ENGINE *e);
  int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, int cmd, int p1, void *p2);
  typedef struct x509_st X509;
  X509 *PEM_read_bio_X509(BIO *bp, X509 **x, pem_password_cb *cb, void *u);
  EVP_PKEY * X509_get_pubkey(X509 *x);
  void X509_free(X509 *a);
  int EVP_PKEY_encrypt_init(EVP_PKEY_CTX *ctx);
  int EVP_PKEY_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen);
  int EVP_PKEY_decrypt_init(EVP_PKEY_CTX *ctx);
  int EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen);
]]

function encrypt(publicPEM, body)
  local bioIn = ffi.new("unsigned char[?]", #publicPEM)
  ffi.copy(bioIn, publicPEM, #publicPEM)
  local bio = ffi.C.BIO_new_mem_buf(bioIn, -1)
  local x509 = ffi.C.PEM_read_bio_X509(bio, nil, nil, nil)
  ffi.gc(x509, ffi.C.X509_free)
  local pKey = ffi.C.X509_get_pubkey(x509)
  local ctx = ffi.C.EVP_PKEY_CTX_new(pKey, nil)
  ffi.C.EVP_PKEY_encrypt_init(ctx)

  -- Adds OEAP padding
  ffi.C.EVP_PKEY_CTX_ctrl(ctx, 6, -1, 4097, 4, null)

  -- Get the length
  local outputLength = ffi.new("size_t[1]")
  ffi.C.EVP_PKEY_encrypt(ctx, nil, outputLength, body, #body)

  -- Encrypt into outputBuffer
  local outputBuffer = ffi.new("unsigned char[?]", outputLength[0])
  ffi.C.EVP_PKEY_encrypt(ctx, outputBuffer, outputLength, body, #body)

  -- Turn it into a string
  return ffi.string(outputBuffer, outputLength[0])
end

function decrypt(privatePEM, body)
  local bioIn = ffi.new("unsigned char[?]", #privatePEM)
  ffi.copy(bioIn, privatePEM, #privatePEM)
  local bio = ffi.C.BIO_new_mem_buf(bioIn, -1)
  if not bio then
    return nil
  end
  local rsa = ffi.C.PEM_read_bio_RSAPrivateKey(bio, nil, nil, nil)
  local pKey = ffi.C.EVP_PKEY_new()

  ffi.C.EVP_PKEY_set1_RSA(pKey, rsa)
  ctx = ffi.C.EVP_PKEY_CTX_new(pKey, nil)
  ffi.C.EVP_PKEY_decrypt_init(ctx)

  -- Adds OEAP padding
  ffi.C.EVP_PKEY_CTX_ctrl(ctx, 6, -1, 4097, 4, null)

  -- Get the length
  local outputLength = ffi.new("size_t[1]")
  ffi.C.EVP_PKEY_decrypt(ctx, nil, outputLength, body, #body)

  -- Decrypt into outputBuffer
  local outputBuffer = ffi.new("unsigned char[?]", outputLength[0])
  ffi.C.EVP_PKEY_decrypt(ctx, outputBuffer, outputLength, body, #body)

  -- Turn it into a string
  return ffi.string(outputBuffer, outputLength[0])
end

io.write("Result: "..tostring(decrypt([[-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
]], encrypt([[-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]], "hello world"))).."\n")

我应该补充一点,gen_密钥是从EVP证书派生的,并且已知在这个上下文中工作良好。第一次调用EVP_PKEY_encrypt()看起来像是用来确定缓冲区长度的。然后,您应该在提供缓冲区的情况下再次调用它。请看精彩的观察-我这样做了,现在加密部分工作了,但是解密部分在对解密过程执行相同的两步过程时杀死了LUA您不需要创建两次上下文,重用已存在的内容并遵循相同的解密过程。确定所需的缓冲区len,分配它并使用新缓冲区调用descrypt second。提供更新的代码我应该添加gen_密钥是从EVP证书派生的,并且已知在该上下文中工作良好。第一次调用EVP_PKEY_encrypt()类似于确定缓冲区长度。然后,您应该在提供缓冲区的情况下再次调用它。请看精彩的观察-我这样做了,现在加密部分工作了,但是解密部分在对解密过程执行相同的两步过程时杀死了LUA您不需要创建两次上下文,重用已存在的内容并遵循相同的解密过程。确定所需的缓冲区len,分配它并使用新缓冲区调用descrypt second。提供更新的代码据我所知,ffi.C是如何与动态对象(即OpenSSL库本身)交互的。另外,为什么要重新定义structs?ffi.C是与默认库集(libc、libm、libdl)交互的名称空间。对于任何其他附加库,都需要加载它。关于定义结构,有必要定义将通过FFI使用的任何函数或数据结构。LuaJIT文档中的FFI教程有一个zlib示例,据我所知,FFI.C是如何与动态对象(即OpenSSL库本身)交互的。另外,为什么要重新定义structs?ffi.C是与默认库集(libc、libm、libdl)交互的名称空间。对于任何其他附加库,都需要加载它。关于定义结构,有必要定义将通过FFI使用的任何函数或数据结构。LuaJIT文档中的FFI教程有一个zlib示例