Fixed RSA key generation

This commit is contained in:
Bazsalanszky 2019-10-28 13:39:27 +01:00
parent 41c8916e29
commit 5318e1afcf
Signed by: Bazsalanszky
GPG key ID: 0998CF5510B134D9
5 changed files with 28 additions and 13 deletions

14
main.c
View file

@ -21,22 +21,27 @@
int main(void) {
map config = config_load();
//TODO: Kijavítani ezt
RSA* r = createRSAfromFile("private.pem",0);
if(r == NULL){
logger_log("RSA key not found! Generating a new one...");
r = generate_key();
if(r == NULL){
printOpenSSLError("Error generating RSA key pair!");
return 2;
}
r = createRSAfromFile("private.pem",0);
}
char pub[513];
char pub[16964];
char priv[2049];
RSA_getPublicKey(r,pub);
RSA_getPrivateKey(r,priv);
RSA_free(r);
char buf[513];
char id[MD5_DIGEST_LENGTH];
md5(pub,id);
md5(priv,id);
node_data mynode;
strcpy(mynode.id, id);
strcpy(mynode.pubkey_str, pub);
@ -154,7 +159,6 @@ int main(void) {
if (k != -1) {
logger_log("Peer disconnected(%s->%s)", inet_ntoa(peerList1.array[k].sockaddr.sin_addr),peerList1.array[k].peerData.id);
peer_removeFromList(&peerList1, k);
closesocket(sock);
FD_CLR(sock, &master);
}
}else{

View file

@ -39,7 +39,6 @@ RSA *createRSAfromFile(char *file, int pub) {
if(fp == NULL)
{
printf("Unable to open file %s \n",file);
return NULL;
}
RSA *rsa= RSA_new() ;
@ -72,6 +71,7 @@ RSA *generate_key() {
BIO_free_all(bp_private);
RSA_free(r);
BN_free(bne);
return NULL;
}
r = RSA_new();
@ -81,15 +81,16 @@ RSA *generate_key() {
BIO_free_all(bp_private);
RSA_free(r);
BN_free(bne);
return NULL;
}
bp_public = BIO_new_file("public.pem", "w+");
ret = PEM_write_bio_RSAPublicKey(bp_public, r);
ret = PEM_write_bio_RSA_PUBKEY(bp_public, r);
if(ret != 1){
BIO_free_all(bp_public);
BIO_free_all(bp_private);
RSA_free(r);
BN_free(bne);
return NULL;
}
bp_private = BIO_new_file("private.pem", "w+");
@ -187,4 +188,12 @@ int base64Decode(const char* input, unsigned char**buffer,size_t* len) { //Decod
return (0); //success
}
void printOpenSSLError(char *msg) {
char * err = malloc(130);;
ERR_load_crypto_strings();
ERR_error_string(ERR_get_error(), err);
logger_log("%s ERROR: %s\n",msg, err);
free(err);
}

View file

@ -14,6 +14,7 @@
#include <openssl/rsa.h>
#include <openssl/pem.h>
#include <openssl/err.h>
#include "../utility.h"
@ -29,4 +30,4 @@ int private_decrypt(unsigned char * enc_data,int data_len,unsigned char * key, u
int base64Encode(const unsigned char* input ,size_t len, char** outpub);
size_t calcDecodeLength(const char* b64input);
int base64Decode(const char* input, unsigned char**buffer,size_t* len);
void printLastError(char *msg);
void printOpenSSLError(char *msg);

View file

@ -24,7 +24,6 @@ int peer_ConnetctTo(char* ip,int port,peerList* peerList, node_data my,fd_set* f
char handshake[DEFAULT_BUFLEN],*base64Key;
base64Encode((unsigned char*)my.pubkey_str,strlen(my.pubkey_str),&base64Key);
sprintf(handshake,"@id=%s&port=%d&pubkey=%s",my.id,my.port,base64Key);
logger_log("%s",handshake);
if(strlen(my.nick) != 0) {
char buf[DEFAULT_BUFLEN];
ZeroMemory(buf,DEFAULT_BUFLEN);
@ -51,6 +50,7 @@ int peer_ConnetctTo(char* ip,int port,peerList* peerList, node_data my,fd_set* f
return -1;
}
map m = getHandshakeData(buf);
map_dump(m);
node_data node;
strcpy(node.ip,ip);
@ -278,7 +278,7 @@ void peer_addTolist(peerList *list, struct peer p){
list->array[list->length++] = p;
}
void peer_removeFromList(struct peerList* list, int i){
closesocket(list->array[i].socket);
for (int k=i; k < list->length-1; ++k)
list->array[k] =list->array[k+1];
list->length--;

5
test.c
View file

@ -9,10 +9,11 @@
int main(){
printf("%d\n",SOMAXCONN);
generate_key();
RSA* r = createRSAfromFile("public.pem",1);
char plainText[1024/8] = "Hello this is Ravi"; //key length : 2048
char pubkey[1024];
char pubkey[4096];
RSA_getPublicKey(r,pubkey);
printf("%s\n",pubkey);