c语言 通过openssl进行rsa的加密和解密

您所在的位置:网站首页 rsa代码c语言 c语言 通过openssl进行rsa的加密和解密

c语言 通过openssl进行rsa的加密和解密

2024-04-30 17:18| 来源: 网络整理| 查看: 265

参考资料

https://blog.csdn.net/enjoyinwind/article/details/23530303

https://blog.csdn.net/stormbjm/article/details/46898757

摘自:https://blog.csdn.net/u011983700/article/details/108240200

 

最近项目中需要用到RSA加密,网上这方面的资料很多,研究了一番,发现直接用openssl的rsa接口非常方便,可以直接通过别人提供的公钥私钥进行加密解密,也可以通过openssl生成密钥对将公钥提供给别人使用。

具体的RSA加密原理就不在这里赘述,直接上代码,代码参考上面两个链接。

其中的重点记录一下哈:

问题1,openssl提供了bio接口以支持各种形式的秘钥读取。在使用bio接口从内存中读取pem格式的公钥时,总是读取公钥失败,经不断查找资料,发现在我们得到base64编码的RSA公钥后,从内存中读取这个公钥时要注意以下几点:(1)公钥字符串开头要加上“-----BEGIN PUBLIC KEY-----\n”,结尾加上“\n-----END PUBLIC KEY-----\n”。否则会出现error:0906D06C:PEM routines:PEM_read_bio:no start line(2)公钥字符串每隔64个字符要加一个换行,否则会报秘钥格式错误。

问题2,PEM_read_RSA_PUBKEY()函数和PEM_read_RSAPublicKEY()的疑惑。为什么读取私钥文件用的PEM_read_RSAPrivateKey(),针对上述openssl命令生成的公钥文件,在读取其内容时用对称的PEM_read_RSAPublicKEY()接口却会报错,必须要用PEM_read_RSA_PUBKEY()才可以。 原因是生成公钥时要把-pubout参数改成-RSAPublicKey_out

 

目前支持两种模式获取公钥和私钥。第一种方式比较常用,直接通过文件获取公私钥。第二种方式通过内存获取,这种方式比较灵活,可以将密钥保存在数据库,文件,甚至直接写在代码里,只要使用的时候将其转成对应格式的字符串即可。

另外,由于通过rsa加密以后的二进制密文有时候不太方便传输,所以一般会将其通过base64进行编码然后再进行传输。

在进行代码开发前,首先需要安装openssl库,ubuntu下直接执行一下命令即可。

sudo apt-get install libssl-dev // rsa.h #ifndef _RSA_H #define _RSA_H #define PRIVATEKEY "key.pem" #define PUBLICKEY "key_pub.pem" int rsa_pub_encrypt(char *str,char *path_key,char** outstr); int rsa_prv_decrypt(char *str,char *path_key,int inlen,char** outstr); #endif // rsa.c #include #include #include #include #include #include #include "rsa.h" #define RSAPUBKEY #define KEYFORMFILE 1 #define KEYFORMMEM 2 #define KEYFORM KEYFORMMEM static int do_operation(RSA* rsa_ctx,char *instr,char* path_key,int inlen,char** outstr,int type) { if(rsa_ctx == NULL || instr == NULL || path_key == NULL) { perror("input elems error,please check them!"); return -1; } int rsa_len,num; rsa_len=RSA_size(rsa_ctx); *outstr=(unsigned char *)malloc(rsa_len+1); memset(*outstr,0,rsa_len+1); switch(type){ case 1: //pub enc if(inlen == 0){ perror("input str len is zero!"); goto err; } num = RSA_public_encrypt(inlen,(unsigned char *)instr,(unsigned char*)*outstr,rsa_ctx,RSA_PKCS1_PADDING); break; case 2: //prv dec num = RSA_private_decrypt(inlen,(unsigned char *)instr,(unsigned char*)*outstr,rsa_ctx,RSA_PKCS1_PADDING); break; default: break; } if(num == -1) { printf("Got error on enc/dec!\n"); err: free(*outstr); *outstr = NULL; num = -1; } return num; } char* pubkey="-----BEGIN PUBLIC KEY-----\n\ MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv1Gt1Q3FCo9rgwR1+bsR\ qaInU+2OFnoYdhp2189doeAwP+XH3LLBnxeDRfH1PZKrvEFtKBWaB2112lN4dL/T\ /dSOezszKHPTSg0PaxW4F+ooAY0gTQWGSuSMcY8H4RpkI7sNFFfOYQZYT0albs+e\ RepaHtfQCfM/cFTmpHVDXqdK4uCRNZbhff2+5oEN/j0eW5t4aq+G+Qu1gz9poH5B\ uqea69foG4LRcnwVKCXz+5ZrzE2YWYayvCEgpojXmkLcemvWkJD+K0SUsKoZ/7Wn\ vMBg1mfkSlNTFzpDgKjYESnnUgUobwDtBT9Wdq0RHVVTyZLh4CvZMeS1NcHBqDxp\ PQIDAQAB\ \n-----END PUBLIC KEY-----\n"; int rsa_pub_encrypt(char *str,char *path_key,char** outstr) { RSA *p_rsa; BIO *bio = NULL; FILE *file; int flen,rsa_len,num; #if KEYFORM==KEYFORMFILE if((file=fopen(path_key,"r"))==NULL){ perror("open key file error"); return -1; } #else if ((bio = BIO_new_mem_buf(pubkey, -1)) == NULL) //从字符串读取RSA公钥 { perror("BIO_new_mem_buf failed!"); } #endif #ifdef RSAPUBKEY #if KEYFORM==KEYFORMFILE if((p_rsa=PEM_read_RSA_PUBKEY(file,NULL,NULL,NULL))==NULL){ #else if((p_rsa=PEM_read_bio_RSA_PUBKEY(bio,NULL,NULL,NULL))==NULL){ #endif #else if((p_rsa=PEM_read_RSAPublicKey(file,NULL,NULL,NULL))==NULL){ #endif ERR_print_errors_fp(stdout); return -1; } num = do_operation(p_rsa,str,path_key,strlen(str),outstr,1); RSA_free(p_rsa); #if KEYFORM==KEYFORMFILE fclose(file); #else BIO_free_all(bio); #endif return num; } char* prikey="-----BEGIN RSA PRIVATE KEY-----\n\ MIIEogIBAAKCAQEAv1Gt1Q3FCo9rgwR1+bsRqaInU+2OFnoYdhp2189doeAwP+XH\ 3LLBnxeDRfH1PZKrvEFtKBWaB2112lN4dL/T/dSOezszKHPTSg0PaxW4F+ooAY0g\ TQWGSuSMcY8H4RpkI7sNFFfOYQZYT0albs+eRepaHtfQCfM/cFTmpHVDXqdK4uCR\ NZbhff2+5oEN/j0eW5t4aq+G+Qu1gz9poH5Buqea69foG4LRcnwVKCXz+5ZrzE2Y\ WYayvCEgpojXmkLcemvWkJD+K0SUsKoZ/7WnvMBg1mfkSlNTFzpDgKjYESnnUgUo\ bwDtBT9Wdq0RHVVTyZLh4CvZMeS1NcHBqDxpPQIDAQABAoIBAGleFLzoLoMYZf/s\ bwUxEBM66SoCBWU/rUUuYhGNdWX30NsANEjKcnSqQHQ/Q++7XbX62qFe9Evu7x9l\ JUw3cgu0Cxy3h/9Zex6nfrxdY9xX69ye2xFQX5vTr73DJnXFUS2UkSmJCnLJSc2v\ fOFAm0yqOyQNe9hfDatSNwyQQKBZ0iiBP4DMfZyW0L0uREDb1Zex4PL5EMt9dlNh\ m6rObetXBXU9Fu1UFSbH2BFzjbsgCJ/kr2ty3hwTv8ygFrNrFJtDfEGdln6vmIiE\ Lbq12UElXtKi2Ko+uulzILFNSSHzi7aJt0y+szBnXkF0XVirvBgIEGCQvL2ynf5O\ Vr96N0kCgYEA7ixwmmjevu4zvcW2nVrXbV+0H0088OKKJMrs92daECL1H/lRCAxI\ MOK6nXEgPy6siMPbErPt3j2bj63HAZVXMfkv4xhn5kCbbhqxS6EsBwoy3hH8Mg9a\ EIbIurdtIZPaElC/nMbD8EoLZpruNhuezQJpsJOm9zIswpj5SYLmEIsCgYEAzaN5\ 2eAyEWPTf8Jd+EwhHfGYRnvdNCnlO1G4mbY5w6UU0grko1uuE7XzCfDYAeRgqUHc\ FDFcj3K/wTofj/KqcUBATy7WolkQOc5TF9P6z8HBPpCaxIHgIT3xMzCLSeSlZkK5\ 5MBEl0kCGYdTOhGFlQkmNfYb9b3Y3AmJ3NVlnlcCgYA2w3ccufJFmoXBI93qboHM\ P04uSFcz2BMFhLdZ56S4wyDzuiLco95Rh0B7hRByFqxLQiV0NnUCPc4wCjgQ8CK9\ dduB7xGsyrwyY+bSSfvSnpC1qRMA+7CsziEHdbedGd7xiSmVxco1zQC0Ffmh7VXl\ M6HTnQ+uFRZfpEbllTiLIwKBgGW2lm7OFfXECrkGyrQl87t75HX4jlFe56OPqF9f\ YvMClGnQOYcTsebN+IjSOAW3kJgnm1PhlobdmztYJIRu4x9hSG3iHQfwRbZR94ex\ sj1Q+OSZYfQQyWun18YaHMtP7P/HwWsELuklk4RNCz2NrSUqgVvvf6TtYnZzwV0Z\ sEnBAoGAF7be2xB6tDoGic/oKahwbR9rviur7zKA+LPapeRwxXElWYCE2ON1NUlF\ +Z+5ajqGjUtQWXDCPqaLO5gSPipPHxX6tYIeolk1C5veZBkeHgG4TLMuIxtpGayw\ 6/P3Pru8xzm8gZZTYqpmnFoXS6gQ2sNtrbyLJNNzH9bUNH7diVU=\ \n-----END RSA PRIVATE KEY-----\n"; int rsa_prv_decrypt(char *str,char *path_key,int inlen,char** outstr) { RSA *p_rsa; BIO *bio = NULL; FILE *file; int rsa_len,num; #if KEYFORM==KEYFORMFILE if((file=fopen(path_key,"r"))==NULL){ perror("open key file error"); return -1; } #else if ((bio = BIO_new_mem_buf(prikey, -1)) == NULL) //从字符串读取RSA公钥 { perror("BIO_new_mem_buf failed!"); } #endif #if KEYFORM==KEYFORMFILE if((p_rsa=PEM_read_RSAPrivateKey(file,NULL,NULL,NULL))==NULL){ #else if((p_rsa=PEM_read_bio_RSAPrivateKey(bio,NULL,NULL,NULL))==NULL){ #endif ERR_print_errors_fp(stdout); return -1; } num = do_operation(p_rsa,str,path_key,inlen,outstr,2); RSA_free(p_rsa); #if KEYFORM==KEYFORMFILE fclose(file); #else BIO_free_all(bio); #endif return num; } /*base64.h*/ #ifndef _BASE64_H #define _BASE64_H #include #include unsigned char *base64_encode(unsigned char *str,int strlen); unsigned char *base64_decode(unsigned char *code,int *codelen); #endif /*base64.c*/ #include "base64.h" unsigned char *base64_encode(unsigned char *str,int strlen) { long len; long str_len; unsigned char *res; int i,j; //定义base64编码表 unsigned char *base64_table="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; //计算经过base64编码后的字符串长度 str_len=strlen; if(str_len % 3 == 0) len=str_len/3*4; else len=(str_len/3+1)*4; res=malloc(sizeof(unsigned char)*len+1); res[len]='\0'; //以3个8位字符为一组进行编码 for(i=0,j=0;i>2]; //取出第一个字符的前6位并找出对应的结果字符 res[i+1]=base64_table[(str[j]&0x3)4)]; //将第一个字符的后位与第二个字符的前4位进行组合并找到对应的结果字符 res[i+2]=base64_table[(str[j+1]&0xf)6)]; //将第二个字符的后4位与第三个字符的前2位组合并找出对应的结果字符 res[i+3]=base64_table[str[j+2]&0x3f]; //取出第三个字符的后6位并找出结果字符 } switch(str_len % 3) { case 1: res[i-2]='='; res[i-1]='='; break; case 2: res[i-1]='='; break; } return res; } unsigned char *base64_decode(unsigned char *code,int *codelen) { //根据base64表,以字符找到对应的十进制数据 int table[]={0,0,0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,62,0,0,0, 63,52,53,54,55,56,57,58, 59,60,61,0,0,0,0,0,0,0,0, 1,2,3,4,5,6,7,8,9,10,11,12, 13,14,15,16,17,18,19,20,21, 22,23,24,25,0,0,0,0,0,0,26, 27,28,29,30,31,32,33,34,35, 36,37,38,39,40,41,42,43,44, 45,46,47,48,49,50,51 }; long len; long str_len; unsigned char *res; int i,j; //计算解码后的字符串长度 len=strlen(code); //判断编码后的字符串后是否有= if(strstr(code,"==")) str_len=len/4*3-2; else if(strstr(code,"=")) str_len=len/4*3-1; else str_len=len/4*3; res=malloc(sizeof(unsigned char)*str_len+1); res[str_len]='\0'; *codelen=str_len; //以4个字符为一位进行解码 for(i=0,j=0;i < len-2;j+=3,i+=4) { res[j]=((unsigned char)table[code[i]])4); //取出第一个字符对应base64表的十进制数的前6位与第二个字符对应base64表的十进制数的后2位进行组合 res[j+1]=(((unsigned char)table[code[i+1]])2); //取出第二个字符对应base64表的十进制数的后4位与第三个字符对应bas464表的十进制数的后4位进行组合 res[j+2]=(((unsigned char)table[code[i+2]])


【本文地址】


今日新闻


推荐新闻


CopyRight 2018-2019 办公设备维修网 版权所有 豫ICP备15022753号-3