免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 2296 | 回复: 1
打印 上一主题 下一主题

OPENSSL 解密文件失败 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2012-02-15 05:03 |只看该作者 |倒序浏览


我用openssl 生成私钥/公钥, 然后用公钥加密一段字符,保存到一个文件中。然后从该文件中读出密文,使用私钥解密,但是得到的是乱码。  
我想我可能漏掉了处理某些地方, 或者是我参数使用有误,谢谢任何建议。
  1. /*
  2.         gcc -lssl queation.c -o test_ssl
  3.         #openssl genrsa -out test_private.key 1024
  4.         #openssl rsa -in test_private.key -pubout -out test_public.key
  5.        
  6. */


  7. #include<stdio.h>
  8. #include<stdlib.h>
  9. #include<string.h>
  10. #include<openssl/rsa.h>
  11. #include<openssl/pem.h>
  12. #include<openssl/err.h>

  13. #include <errno.h>
  14. #include <sys/types.h>
  15. #include <sys/ioctl.h>
  16. #include <unistd.h>
  17. #include <netinet/in.h>
  18. #include <arpa/inet.h>
  19. #include <linux/netdevice.h>
  20. #include <linux/sockios.h>
  21. #include <linux/if.h>
  22. #include <asm/types.h>
  23. #include <linux/netlink.h>
  24. #include <linux/rtnetlink.h>
  25. #include <net/if_arp.h>
  26. #include <netinet/if_ether.h>
  27. #include <netinet/ether.h>

  28. #include <fcntl.h>
  29. #include <sys/socket.h>

  30. #define OPENSSLKEY "test_private.key"
  31. #define PUBLICKEY "test_public.key"
  32. #define BUFFSIZE 1024
  33. #define SIZE 1024

  34. #define LIC_FILE  "lic.rn"
  35. #define PRTFL printf("fun = %s, line = %d\n", __FUNCTION__,__LINE__)

  36. static char *ptr_en;
  37. static char *p_en;
  38. static RSA  *p_rsa_public;
  39. static FILE  *fp_public;
  40. static int flen_public, rsa_public_len;


  41. static char *ptr_de;
  42. static char *p_de;
  43. static RSA  *p_rsa_private;
  44. static FILE  *fp_private;
  45. static int flen_private, rsa_private_len;

  46. void usage( unsigned char * prog_name)
  47. {
  48.         printf("usage:  %s\n",
  49.                 prog_name);
  50.         exit(1);
  51. }

  52. int main(int argc , char ** argv)
  53. {
  54.         int i, ret , len;
  55.         unsigned char buf_plain[32];
  56.         unsigned char *buf_en;
  57.         unsigned char *raw_buffer;
  58.        
  59.         FILE * pf_tmp;

  60.         if( argc != 1)
  61.                 {
  62.                 usage(argv[0]);
  63.                 }
  64.        
  65.         snprintf(buf_plain,sizeof(buf_plain),"this is a test line.\n");
  66.        
  67.         if((fp_public=fopen(PUBLICKEY,"r"))==NULL)
  68.                 {
  69.                 perror("open public key file error");
  70.                 ret = -1;
  71.                 goto error;
  72.                 }   
  73.        
  74.         if((p_rsa_public = PEM_read_RSA_PUBKEY(fp_public,NULL,NULL,NULL))==NULL)
  75.                 {
  76.                 ERR_print_errors_fp(stdout);
  77.                 ret = -1;
  78.                 goto error;
  79.                 }
  80.        
  81.         rsa_public_len=RSA_size(p_rsa_public);
  82.         p_en=(unsigned char *)malloc(rsa_public_len+1);
  83.         memset(p_en,0,rsa_public_len+1);
  84.         //printf("%s(%d)p_en = %p,rsa_public_len = %d\n", __FUNCTION__,__LINE__,p_en,rsa_public_len);

  85.         len = RSA_public_encrypt(rsa_public_len,buf_plain,p_en,p_rsa_public,RSA_NO_PADDING);
  86.         if (len !=rsa_public_len)
  87.                 {
  88.                 fprintf(stderr,"Error: len =%d,  rsa_public_len = %d,ciphertext should match length of key\n", len,rsa_public_len);
  89.                 ret = -1;
  90.                 goto error;
  91.                 }

  92.        
  93.         pf_tmp = fopen(LIC_FILE,"w");
  94.         if( NULL == pf_tmp )
  95.                 {
  96.                 printf("open %s failed\n",LIC_FILE);
  97.                 ret = -1;
  98.                 goto error;
  99.                 }
  100.        
  101.         fwrite(p_en,1,128,pf_tmp);
  102.         fclose(pf_tmp);

  103.         if((fp_private=fopen(OPENSSLKEY,"r"))==NULL)
  104.                 {
  105.                 perror("open private key file error");
  106.                 ret = -1;
  107.                 goto error;
  108.                 }   
  109.        
  110.         if((p_rsa_private=PEM_read_RSAPrivateKey(fp_private,NULL,NULL,NULL))==NULL)
  111.                 {
  112.                 ERR_print_errors_fp(stdout);
  113.                 ret = -1;
  114.                 goto error;
  115.                 }
  116.        
  117.         rsa_private_len = RSA_size(p_rsa_private);

  118.         pf_tmp = fopen(LIC_FILE,"r");
  119.         if( NULL == pf_tmp )
  120.                 {
  121.                 printf("open %s failed\n",LIC_FILE);
  122.                 ret = -1;
  123.                 goto error2;
  124.                 }

  125.         raw_buffer = calloc(rsa_private_len,sizeof(char));
  126.         if( NULL == raw_buffer )
  127.                 {
  128.                 ret = -1;
  129.                 goto error;
  130.                 }
  131.        
  132.          len = fread(raw_buffer,  sizeof(char),sizeof(raw_buffer), pf_tmp);
  133.          if( len <=0 )
  134.                  {
  135.                 ret = -1;
  136.                 goto error;
  137.                  }
  138.          
  139.         p_de=(unsigned char *)malloc(rsa_private_len+1);
  140.         memset(p_de,0,rsa_private_len+1);

  141.         //printf("%s(%d)p_en = %p,rsa_public_len = %d\n", __FUNCTION__,__LINE__,p_en,rsa_public_len);
  142.         len =RSA_private_decrypt (rsa_private_len,raw_buffer,p_de,p_rsa_private,RSA_NO_PADDING);
  143.         printf("%s(%d) p_de = %s\n",__FUNCTION__,__LINE__,p_de);
  144.         if ( len != rsa_private_len )
  145.                 {
  146.                 fprintf(stderr,"Error: ciphertext should match length of key\n");
  147.                 exit(1);
  148.                 }

  149. error2:
  150.         fclose(pf_tmp);
  151.        
  152. error:
  153.         free(ptr_en);
  154.         free(ptr_de);
  155.         fclose(fp_public);
  156.         fclose(fp_private);
  157.         RSA_free(p_rsa_public);
  158.         RSA_free(p_rsa_private);

  159.         return ret;
  160. }
复制代码

论坛徽章:
0
2 [报告]
发表于 2012-02-15 13:05 |只看该作者
c - RSA_private_decrypt failed - Stack Overflow
http://stackoverflow.com/questio ... vate-decrypt-failed

It looks like you are not reading the whole file:

len = fread(raw_buffer,  sizeof(char),sizeof(raw_buffer), pf_tmp);
Note that sizeof(raw_buffer) is the size of a pointer, but you wrote 128 bytes into the file (1024 bits). So you're only reading back 4 or 8 bytes and trying to decrypt that.

Try reading 128 bytes back.
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP