CryptoAPI RSA:CryptDecrypt 仅在第一次解密,其他调用 return NTE_BAD_DATA
CryptoAPI RSA: CryptDecrypt decrypts only at the first time, other calls return NTE_BAD_DATA
我已经编写了 encrypts/decrypts 自定义长度内存缓冲区的程序。加密结束很好;但是我的解密代码在任何缓冲区位置只解密一次数据,对应于块条目。其他块的解密以 NTE_BAD_DATA.
结束
你对为什么会这样有什么建议吗?
这是我的加密代码:
void CWinRSA::FinishEncrypt(const char* pcbRawData, const size_t nDataSize, char** ppcbEcrData, size_t& rnEcrSize) const
{
if (m_hProvider == NULL)
{
throw ("Cannot encrypt data with wrong provider!!");
}
if (m_hKey == NULL)
{
throw ("Cannot encrypt data with a wrong key!!");
}
size_t nBlockLength = GetBlockLength();
size_t nPaddingSize = nBlockLength - 11;
size_t nRemain = nDataSize % nBlockLength;
size_t nBlockProcess = (nDataSize / nPaddingSize + (nRemain != 0 ? 1 : 0));
size_t nResultSize = nBlockProcess * nBlockLength;
(*ppcbEcrData) = new char[nResultSize];
DWORD dwBufferLength = nBlockLength;
DWORD dwDataLength;
for (int iBlock = 0; iBlock < nBlockProcess - 1; iBlock++)
{
memcpy((*ppcbEcrData) + (iBlock * nBlockLength),
pcbRawData + (iBlock * nPaddingSize), nPaddingSize);
dwDataLength = nPaddingSize;
if (!CryptEncrypt(m_hKey, NULL, FALSE, 0,
(BYTE*)((*ppcbEcrData) + (iBlock * nBlockLength)),
&dwDataLength, dwBufferLength))
{
throw ("Cannot encrypt data!!");
}
}
memcpy((*ppcbEcrData) + ((nBlockProcess - 1) * nBlockLength),
pcbRawData + ((nBlockProcess - 1) * nPaddingSize), (nRemain ? nRemain : nPaddingSize));
dwDataLength = (nRemain ? nRemain : nPaddingSize);
if (!CryptEncrypt(m_hKey, NULL, TRUE, 0,
(BYTE*)((*ppcbEcrData) + ((nBlockProcess - 1) * nBlockLength)),
&dwDataLength, dwBufferLength))
{
throw ("Cannot encrypt data!!");
}
rnEcrSize = nResultSize;
}
解密:
void CWinRSA::FinishDecrypt(const char* pcbRawData, const size_t nDataSize, char** ppcbDecData, size_t& rnDecSize) const
{
if (m_hProvider == NULL)
{
throw ("Cannot decrypt data with wrong provider!!");
}
if (m_hKey == NULL)
{
throw ("Cannot decrypt data with a wrong key!!");
}
size_t nBlockLength = GetBlockLength();
if ((nDataSize % nBlockLength) != 0)
{
throw ("Cannot decrypt data!! Probably data is corrupted!!");
}
size_t nPaddingSize = nBlockLength - 11;
size_t nBlockProcess = nDataSize / nBlockLength;
size_t nResultSize = nBlockProcess * nPaddingSize;
(*ppcbDecData) = new char[nResultSize];
DWORD dwDataLength;
char* pcbComputeResult = new char[nBlockLength];
for (int iBlock = 0; iBlock < nBlockProcess - 1; iBlock++)
{
memcpy(pcbComputeResult, pcbRawData + (iBlock * nBlockLength), nBlockLength);
if (!CryptDecrypt(m_hKey, NULL, FALSE, 0, (BYTE*)pcbComputeResult, &dwDataLength))
{
throw ("Cannot decrypt data!!");
}
memcpy((*ppcbDecData) + (iBlock * nPaddingSize), pcbComputeResult, nPaddingSize);
}
memcpy(pcbComputeResult, pcbRawData + ((nBlockProcess - 1) * nBlockLength), nBlockLength);
if (!CryptDecrypt(m_hKey, NULL, TRUE, 0, (BYTE*)pcbComputeResult, &dwDataLength))
{
DWORD dwError = GetLastError();
throw ("Cannot decrypt data!!");
}
memcpy((*ppcbDecData) + ((nBlockProcess - 1) * nPaddingSize), pcbComputeResult, nPaddingSize);
rnDecSize = ((nBlockProcess - 1) * nPaddingSize) + dwDataLength;
delete[] pcbComputeResult;
pcbComputeResult = NULL;
}
RSA 不应该以这种方式使用。它真的不是块密码(或流密码,就此而言)。据我了解,除了一条 "short" 消息外,它实际上没有任何密码学用途,所以我对库在一次解密后失败并不感到惊讶。
如果您需要保护任意大小的数据,请使用 RSA 将对称密钥交换为流或分组密码(如 AES)。
我找到了答案。我必须在所有解密调用之前用块长度(以字节为单位)初始化 dwDataLength。
dwDataLength = nBlockLength;
if (!CryptDecrypt(m_hKey, NULL, TRUE, 0, (BYTE*)pcbComputeResult, &dwDataLength))
{
DWORD dwError = GetLastError();
throw ("Cannot decrypt data!!");
}
完整解密方法
void CWinRSA::FinishDecrypt(const char* pcbRawData, const size_t nDataSize, char** ppcbDecData, size_t& rnDecSize) const
{
if (m_hProvider == NULL)
{
throw ("Cannot decrypt data with wrong provider!!");
}
if (m_hKey == NULL)
{
throw ("Cannot decrypt data with a wrong key!!");
}
size_t nBlockLength = GetBlockLength();
if ((nDataSize % nBlockLength) != 0)
{
throw ("Cannot decrypt data!! Probably data is corrupted!!");
}
size_t nPaddingSize = nBlockLength - 11;
size_t nBlockProcess = nDataSize / nBlockLength;
size_t nResultSize = nBlockProcess * nPaddingSize;
(*ppcbDecData) = new char[nResultSize];
DWORD dwDataLength;
char* pcbComputeResult = new char[nBlockLength];
for (int iBlock = 0; iBlock < nBlockProcess - 1; iBlock++)
{
memcpy(pcbComputeResult, pcbRawData + (iBlock * nBlockLength), nBlockLength);
dwDataLength = nBlockLength;
if (!CryptDecrypt(m_hKey, NULL, FALSE, 0, (BYTE*)pcbComputeResult, &dwDataLength))
{
throw ("Cannot decrypt data!!");
}
memcpy((*ppcbDecData) + (iBlock * nPaddingSize), pcbComputeResult, nPaddingSize);
}
memcpy(pcbComputeResult, pcbRawData + ((nBlockProcess - 1) * nBlockLength), nBlockLength);
dwDataLength = nBlockLength;
if (!CryptDecrypt(m_hKey, NULL, TRUE, 0, (BYTE*)pcbComputeResult, &dwDataLength))
{
throw ("Cannot decrypt data!!");
}
memcpy((*ppcbDecData) + ((nBlockProcess - 1) * nPaddingSize), pcbComputeResult, nPaddingSize);
rnDecSize = ((nBlockProcess - 1) * nPaddingSize) + dwDataLength;
delete[] pcbComputeResult;
pcbComputeResult = NULL;
}
我已经编写了 encrypts/decrypts 自定义长度内存缓冲区的程序。加密结束很好;但是我的解密代码在任何缓冲区位置只解密一次数据,对应于块条目。其他块的解密以 NTE_BAD_DATA.
结束你对为什么会这样有什么建议吗?
这是我的加密代码:
void CWinRSA::FinishEncrypt(const char* pcbRawData, const size_t nDataSize, char** ppcbEcrData, size_t& rnEcrSize) const
{
if (m_hProvider == NULL)
{
throw ("Cannot encrypt data with wrong provider!!");
}
if (m_hKey == NULL)
{
throw ("Cannot encrypt data with a wrong key!!");
}
size_t nBlockLength = GetBlockLength();
size_t nPaddingSize = nBlockLength - 11;
size_t nRemain = nDataSize % nBlockLength;
size_t nBlockProcess = (nDataSize / nPaddingSize + (nRemain != 0 ? 1 : 0));
size_t nResultSize = nBlockProcess * nBlockLength;
(*ppcbEcrData) = new char[nResultSize];
DWORD dwBufferLength = nBlockLength;
DWORD dwDataLength;
for (int iBlock = 0; iBlock < nBlockProcess - 1; iBlock++)
{
memcpy((*ppcbEcrData) + (iBlock * nBlockLength),
pcbRawData + (iBlock * nPaddingSize), nPaddingSize);
dwDataLength = nPaddingSize;
if (!CryptEncrypt(m_hKey, NULL, FALSE, 0,
(BYTE*)((*ppcbEcrData) + (iBlock * nBlockLength)),
&dwDataLength, dwBufferLength))
{
throw ("Cannot encrypt data!!");
}
}
memcpy((*ppcbEcrData) + ((nBlockProcess - 1) * nBlockLength),
pcbRawData + ((nBlockProcess - 1) * nPaddingSize), (nRemain ? nRemain : nPaddingSize));
dwDataLength = (nRemain ? nRemain : nPaddingSize);
if (!CryptEncrypt(m_hKey, NULL, TRUE, 0,
(BYTE*)((*ppcbEcrData) + ((nBlockProcess - 1) * nBlockLength)),
&dwDataLength, dwBufferLength))
{
throw ("Cannot encrypt data!!");
}
rnEcrSize = nResultSize;
}
解密:
void CWinRSA::FinishDecrypt(const char* pcbRawData, const size_t nDataSize, char** ppcbDecData, size_t& rnDecSize) const
{
if (m_hProvider == NULL)
{
throw ("Cannot decrypt data with wrong provider!!");
}
if (m_hKey == NULL)
{
throw ("Cannot decrypt data with a wrong key!!");
}
size_t nBlockLength = GetBlockLength();
if ((nDataSize % nBlockLength) != 0)
{
throw ("Cannot decrypt data!! Probably data is corrupted!!");
}
size_t nPaddingSize = nBlockLength - 11;
size_t nBlockProcess = nDataSize / nBlockLength;
size_t nResultSize = nBlockProcess * nPaddingSize;
(*ppcbDecData) = new char[nResultSize];
DWORD dwDataLength;
char* pcbComputeResult = new char[nBlockLength];
for (int iBlock = 0; iBlock < nBlockProcess - 1; iBlock++)
{
memcpy(pcbComputeResult, pcbRawData + (iBlock * nBlockLength), nBlockLength);
if (!CryptDecrypt(m_hKey, NULL, FALSE, 0, (BYTE*)pcbComputeResult, &dwDataLength))
{
throw ("Cannot decrypt data!!");
}
memcpy((*ppcbDecData) + (iBlock * nPaddingSize), pcbComputeResult, nPaddingSize);
}
memcpy(pcbComputeResult, pcbRawData + ((nBlockProcess - 1) * nBlockLength), nBlockLength);
if (!CryptDecrypt(m_hKey, NULL, TRUE, 0, (BYTE*)pcbComputeResult, &dwDataLength))
{
DWORD dwError = GetLastError();
throw ("Cannot decrypt data!!");
}
memcpy((*ppcbDecData) + ((nBlockProcess - 1) * nPaddingSize), pcbComputeResult, nPaddingSize);
rnDecSize = ((nBlockProcess - 1) * nPaddingSize) + dwDataLength;
delete[] pcbComputeResult;
pcbComputeResult = NULL;
}
RSA 不应该以这种方式使用。它真的不是块密码(或流密码,就此而言)。据我了解,除了一条 "short" 消息外,它实际上没有任何密码学用途,所以我对库在一次解密后失败并不感到惊讶。
如果您需要保护任意大小的数据,请使用 RSA 将对称密钥交换为流或分组密码(如 AES)。
我找到了答案。我必须在所有解密调用之前用块长度(以字节为单位)初始化 dwDataLength。
dwDataLength = nBlockLength;
if (!CryptDecrypt(m_hKey, NULL, TRUE, 0, (BYTE*)pcbComputeResult, &dwDataLength))
{
DWORD dwError = GetLastError();
throw ("Cannot decrypt data!!");
}
完整解密方法
void CWinRSA::FinishDecrypt(const char* pcbRawData, const size_t nDataSize, char** ppcbDecData, size_t& rnDecSize) const
{
if (m_hProvider == NULL)
{
throw ("Cannot decrypt data with wrong provider!!");
}
if (m_hKey == NULL)
{
throw ("Cannot decrypt data with a wrong key!!");
}
size_t nBlockLength = GetBlockLength();
if ((nDataSize % nBlockLength) != 0)
{
throw ("Cannot decrypt data!! Probably data is corrupted!!");
}
size_t nPaddingSize = nBlockLength - 11;
size_t nBlockProcess = nDataSize / nBlockLength;
size_t nResultSize = nBlockProcess * nPaddingSize;
(*ppcbDecData) = new char[nResultSize];
DWORD dwDataLength;
char* pcbComputeResult = new char[nBlockLength];
for (int iBlock = 0; iBlock < nBlockProcess - 1; iBlock++)
{
memcpy(pcbComputeResult, pcbRawData + (iBlock * nBlockLength), nBlockLength);
dwDataLength = nBlockLength;
if (!CryptDecrypt(m_hKey, NULL, FALSE, 0, (BYTE*)pcbComputeResult, &dwDataLength))
{
throw ("Cannot decrypt data!!");
}
memcpy((*ppcbDecData) + (iBlock * nPaddingSize), pcbComputeResult, nPaddingSize);
}
memcpy(pcbComputeResult, pcbRawData + ((nBlockProcess - 1) * nBlockLength), nBlockLength);
dwDataLength = nBlockLength;
if (!CryptDecrypt(m_hKey, NULL, TRUE, 0, (BYTE*)pcbComputeResult, &dwDataLength))
{
throw ("Cannot decrypt data!!");
}
memcpy((*ppcbDecData) + ((nBlockProcess - 1) * nPaddingSize), pcbComputeResult, nPaddingSize);
rnDecSize = ((nBlockProcess - 1) * nPaddingSize) + dwDataLength;
delete[] pcbComputeResult;
pcbComputeResult = NULL;
}