|
|
@ -46,6 +46,26 @@ out_params(void)
|
|
|
|
return 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
|
|
|
|
static int APP_CC
|
|
|
|
|
|
|
|
sign_key(char* e_data, int e_len, char* n_data, int n_len,
|
|
|
|
|
|
|
|
char* d_data, int d_len, char* sig_data, int sign_len)
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
|
|
g_writeln("sign here");
|
|
|
|
|
|
|
|
g_writeln("");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
|
|
|
|
static int APP_CC
|
|
|
|
|
|
|
|
save_all(char* e_data, int e_len, char* n_data, int n_len,
|
|
|
|
|
|
|
|
char* d_data, int d_len, char* sig_data, int sign_len)
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
|
|
g_writeln("save to rsakeys.ini here");
|
|
|
|
|
|
|
|
g_writeln("");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*****************************************************************************/
|
|
|
|
static int APP_CC
|
|
|
|
static int APP_CC
|
|
|
|
key_gen(void)
|
|
|
|
key_gen(void)
|
|
|
@ -53,11 +73,13 @@ key_gen(void)
|
|
|
|
char* e_data;
|
|
|
|
char* e_data;
|
|
|
|
char* n_data;
|
|
|
|
char* n_data;
|
|
|
|
char* d_data;
|
|
|
|
char* d_data;
|
|
|
|
|
|
|
|
char* sign_data;
|
|
|
|
unsigned char* p;
|
|
|
|
unsigned char* p;
|
|
|
|
int len;
|
|
|
|
int len;
|
|
|
|
int e_len;
|
|
|
|
int e_len;
|
|
|
|
int n_len;
|
|
|
|
int n_len;
|
|
|
|
int d_len;
|
|
|
|
int d_len;
|
|
|
|
|
|
|
|
int sign_len;
|
|
|
|
int error;
|
|
|
|
int error;
|
|
|
|
BN_CTX* my_ctx;
|
|
|
|
BN_CTX* my_ctx;
|
|
|
|
RSA* my_key;
|
|
|
|
RSA* my_key;
|
|
|
@ -66,6 +88,12 @@ key_gen(void)
|
|
|
|
e_data = 0;
|
|
|
|
e_data = 0;
|
|
|
|
n_data = 0;
|
|
|
|
n_data = 0;
|
|
|
|
d_data = 0;
|
|
|
|
d_data = 0;
|
|
|
|
|
|
|
|
sign_data = 0;
|
|
|
|
|
|
|
|
e_len = 0;
|
|
|
|
|
|
|
|
n_len = 0;
|
|
|
|
|
|
|
|
d_len = 0;
|
|
|
|
|
|
|
|
sign_len = 0;
|
|
|
|
|
|
|
|
error = 0;
|
|
|
|
my_ctx = BN_CTX_new();
|
|
|
|
my_ctx = BN_CTX_new();
|
|
|
|
my_e = BN_new();
|
|
|
|
my_e = BN_new();
|
|
|
|
p = (unsigned char*)g_rev_exponent;
|
|
|
|
p = (unsigned char*)g_rev_exponent;
|
|
|
@ -75,16 +103,24 @@ key_gen(void)
|
|
|
|
g_writeln("");
|
|
|
|
g_writeln("");
|
|
|
|
g_writeln("Generating %d bit rsa key...", MY_KEY_SIZE);
|
|
|
|
g_writeln("Generating %d bit rsa key...", MY_KEY_SIZE);
|
|
|
|
g_writeln("");
|
|
|
|
g_writeln("");
|
|
|
|
/* RSA_generate_key_ex returns boolean */
|
|
|
|
if (error == 0)
|
|
|
|
error = RSA_generate_key_ex(my_key, MY_KEY_SIZE, my_e, 0) == 0;
|
|
|
|
{
|
|
|
|
|
|
|
|
/* RSA_generate_key_ex returns boolean */
|
|
|
|
|
|
|
|
error = RSA_generate_key_ex(my_key, MY_KEY_SIZE, my_e, 0) == 0;
|
|
|
|
|
|
|
|
if (error != 0)
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
|
|
g_writeln("error %d in key_gen, RSA_generate_key_ex", error);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
if (error == 0)
|
|
|
|
if (error == 0)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
g_writeln("RSA_generate_key_ex ok");
|
|
|
|
g_writeln("RSA_generate_key_ex ok");
|
|
|
|
g_writeln("");
|
|
|
|
g_writeln("");
|
|
|
|
e_len = BN_num_bytes(my_key->e);
|
|
|
|
e_len = BN_num_bytes(my_key->e);
|
|
|
|
|
|
|
|
e_len = ((e_len + 3) / 4) * 4;
|
|
|
|
if (e_len > 0)
|
|
|
|
if (e_len > 0)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
e_data = (char*)g_malloc(e_len, 0);
|
|
|
|
e_data = (char*)g_malloc(e_len, 1);
|
|
|
|
p = (unsigned char*)e_data;
|
|
|
|
p = (unsigned char*)e_data;
|
|
|
|
BN_bn2bin(my_key->e, p);
|
|
|
|
BN_bn2bin(my_key->e, p);
|
|
|
|
g_writeln("public exponent size %d bytes", e_len);
|
|
|
|
g_writeln("public exponent size %d bytes", e_len);
|
|
|
@ -92,16 +128,20 @@ key_gen(void)
|
|
|
|
g_writeln("");
|
|
|
|
g_writeln("");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
n_len = BN_num_bytes(my_key->n);
|
|
|
|
n_len = BN_num_bytes(my_key->n);
|
|
|
|
|
|
|
|
n_len = ((n_len + 3) / 4) * 4;
|
|
|
|
if (n_len > 0)
|
|
|
|
if (n_len > 0)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
n_data = (char*)g_malloc(n_len, 0);
|
|
|
|
n_data = (char*)g_malloc(n_len, 1);
|
|
|
|
p = (unsigned char*)n_data;
|
|
|
|
p = (unsigned char*)n_data;
|
|
|
|
BN_bn2bin(my_key->n, p);
|
|
|
|
BN_bn2bin(my_key->n, p);
|
|
|
|
g_writeln("public modulus size %d bytes", n_len);
|
|
|
|
g_writeln("public modulus size %d bytes", n_len);
|
|
|
|
g_hexdump(n_data, n_len);
|
|
|
|
g_hexdump(n_data, n_len);
|
|
|
|
g_writeln("");
|
|
|
|
g_writeln("");
|
|
|
|
|
|
|
|
sign_data = (char*)g_malloc(n_len, 1);
|
|
|
|
|
|
|
|
sign_len = n_len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
d_len = BN_num_bytes(my_key->d);
|
|
|
|
d_len = BN_num_bytes(my_key->d);
|
|
|
|
|
|
|
|
d_len = ((d_len + 3) / 4) * 4;
|
|
|
|
if (d_len > 0)
|
|
|
|
if (d_len > 0)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
d_data = (char*)g_malloc(d_len, 0);
|
|
|
|
d_data = (char*)g_malloc(d_len, 0);
|
|
|
@ -111,10 +151,21 @@ key_gen(void)
|
|
|
|
g_hexdump(d_data, d_len);
|
|
|
|
g_hexdump(d_data, d_len);
|
|
|
|
g_writeln("");
|
|
|
|
g_writeln("");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
error = sign_key(e_data, e_len, n_data, n_len, d_data, d_len,
|
|
|
|
|
|
|
|
sign_data, sign_len);
|
|
|
|
|
|
|
|
if (error != 0)
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
|
|
g_writeln("error %d in key_gen, sign_key", error);
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
if (error == 0)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
g_writeln("error %d in key_gen, RSA_generate_key_ex", error);
|
|
|
|
error = save_all(e_data, e_len, n_data, n_len, d_data, d_len,
|
|
|
|
|
|
|
|
sign_data, sign_len);
|
|
|
|
|
|
|
|
if (error != 0)
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
|
|
g_writeln("error %d in key_gen, save_all", error);
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
BN_free(my_e);
|
|
|
|
BN_free(my_e);
|
|
|
|
RSA_free(my_key);
|
|
|
|
RSA_free(my_key);
|
|
|
@ -122,6 +173,7 @@ key_gen(void)
|
|
|
|
g_free(e_data);
|
|
|
|
g_free(e_data);
|
|
|
|
g_free(n_data);
|
|
|
|
g_free(n_data);
|
|
|
|
g_free(d_data);
|
|
|
|
g_free(d_data);
|
|
|
|
|
|
|
|
g_free(sign_data);
|
|
|
|
return error;
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|