在開發(fā)中經(jīng)常會(huì)遇到數(shù)據(jù)的加密,常見的有base64、DES、AES、RSA等,由于AES的用法相對(duì)簡單一些,在公司的項(xiàng)目中,我們使用的是AES加密。但是遇到一個(gè)大坑就是后臺(tái)使用了AES的128/CBC/NoPadding加密模式,很可悲的是iOS中只有PKCS7Padding和PKCS5Padding這兩種模式,沒有NoPadding模式。經(jīng)過各種百度、谷歌后,終于發(fā)現(xiàn)了一篇文章解決了這個(gè)問題。
下面是參考文章的鏈接:http://www.cnblogs.com/wanyakun/p/3403352.html
解決辦法:
問題就處在No Padding. No Pading的情況下,一定要對(duì)加密數(shù)據(jù)不是kCCKeySizeAES128倍數(shù)部分進(jìn)行0x0000的填充,不然加密長度不正確,一般情況下選擇使用kCCOptionPKCS7Padding(也就是0x0001)進(jìn)行填充,但是我們是No Padding所以要用0x0000
填充。
下面是我在項(xiàng)目中用到的一些核心代碼:
.h文件
//
// AES_SecurityUtil.h
// AES加解密(后臺(tái)使用AES+CBC+NoPadding模式)
//
// Created by 一介布衣 on 2017/5/5.
// Copyright ? 2017年 HUAMANLOU. All rights reserved.
//
#import <Foundation/Foundation.h>
@interface AES_SecurityUtil : NSObject
/**
加密
@param plaintext 明文
@return 返回密文是十六進(jìn)制的字符串
*/
+ (NSString *)aes128EncryptWithContent:(NSString *)plaintext;
/**
解密
@param ciphertext 密文
@return 返回明文的十六進(jìn)制的字符串
*/
+ (NSString *)aes128DencryptWithContent:(NSString *)ciphertext;
@end
.m文件
//
// AES_SecurityUtil.m
// AES加解密(后臺(tái)使用AES+CBC+NoPadding模式)
//
// Created by 一介布衣 on 2017/5/5.
// Copyright ? 2017年 HUAMANLOU. All rights reserved.
//
#import "AES_SecurityUtil.h"
#import <CommonCrypto/CommonCryptor.h>
#import "GTMBase64.h"
#import "BinHexOctUtil.h"
/**
說明
* SecretKey:@"16位長度的字符串" //自行修改
* gIv: @"16位長度的字符串" //自行修改
*/
#define SecretKey @"zkrj001234567890" //! 加解密的密鑰
#define gIv @"zkrj001234567890" //! 初始向量的值
@implementation AES_SecurityUtil
//!MARK:- 加密
+ (NSString *)aes128EncryptWithContent:(NSString *)plaintext {
char keyPtr[kCCKeySizeAES128+1];
memset(keyPtr, 0, sizeof(keyPtr));
[SecretKey getCString:keyPtr maxLength:sizeof(keyPtr) encoding:NSUTF8StringEncoding];
char ivPtr[kCCBlockSizeAES128+1];
memset(ivPtr, 0, sizeof(ivPtr));
[gIv getCString:ivPtr maxLength:sizeof(ivPtr) encoding:NSUTF8StringEncoding];
NSData* data = [plaintext dataUsingEncoding:NSUTF8StringEncoding];
NSUInteger dataLength = [data length];
int diff = kCCKeySizeAES128 - (dataLength % kCCKeySizeAES128);
int newSize = 0;
if(diff > 0)
{
newSize = (int)dataLength + diff;
}
char dataPtr[newSize];
memcpy(dataPtr, [data bytes], [data length]);
for(int i = 0; i < diff; i++)
{
dataPtr[i + dataLength] = 0x00;
}
size_t bufferSize = newSize + kCCBlockSizeAES128;
void *buffer = malloc(bufferSize);
memset(buffer, 0, bufferSize);
size_t numBytesCrypted = 0;
CCCryptorStatus cryptStatus = CCCrypt(kCCEncrypt,
kCCAlgorithmAES128,
0x0000, //No padding
keyPtr,
kCCKeySizeAES128,
ivPtr,
dataPtr,
sizeof(dataPtr),
buffer,
bufferSize,
&numBytesCrypted);
if (cryptStatus == kCCSuccess) {
NSData *resultData = [NSData dataWithBytesNoCopy:buffer length:numBytesCrypted];
return [BinHexOctUtil convertDataToHexStr:resultData];
}
free(buffer);
return nil;
}
//!MARK:- 解密
+ (NSString *)aes128DencryptWithContent:(NSString *)ciphertext {
NSData *data1 = [BinHexOctUtil convertHexStrToData:ciphertext];
ciphertext = [GTMBase64 stringByEncodingData:data1];
char keyPtr[kCCKeySizeAES128 + 1];
memset(keyPtr, 0, sizeof(keyPtr));
[SecretKey getCString:keyPtr maxLength:sizeof(keyPtr) encoding:NSUTF8StringEncoding];
char ivPtr[kCCBlockSizeAES128 + 1];
memset(ivPtr, 0, sizeof(ivPtr));
[gIv getCString:ivPtr maxLength:sizeof(ivPtr) encoding:NSUTF8StringEncoding];
NSData *data = [GTMBase64 decodeData:[ciphertext dataUsingEncoding:NSUTF8StringEncoding]];
NSUInteger dataLength = [data length];
size_t bufferSize = dataLength + kCCBlockSizeAES128;
void *buffer = malloc(bufferSize);
size_t numBytesCrypted = 0;
CCCryptorStatus cryptStatus = CCCrypt(kCCDecrypt,
kCCAlgorithmAES128,
0x0000, //No padding
keyPtr,
kCCBlockSizeAES128,
ivPtr,
[data bytes],
dataLength,
buffer,
bufferSize,
&numBytesCrypted);
if (cryptStatus == kCCSuccess) {
NSData *resultData = [NSData dataWithBytesNoCopy:buffer length:numBytesCrypted];
return [[NSString alloc] initWithData:resultData encoding:NSUTF8StringEncoding];
}
free(buffer);
return nil;
}
@end
測(cè)試打印的結(jié)果如下:
Snip20170505_2.png