c语言(openssl)实现rsa/none/pcks1padding算法,匹配java后端

前一篇文章:http://blog.csdn.net/qq372848728/article/details/78687876

int rsa_key_encrypt(EVP_PKEY *key, const unsigned char *orig_data, size_t orig_data_len,
    unsigned char *enc_data, size_t &enc_data_len)
{
    EVP_PKEY_CTX *ctx = NULL;
    OpenSSL_add_all_ciphers();

    ctx = EVP_PKEY_CTX_new(key, NULL);
    if (NULL == ctx)
    {
        printf("ras_pubkey_encryptfailed to open ctx.\n");
        EVP_PKEY_free(key);
        return -1;
    }

    if (EVP_PKEY_encrypt_init(ctx) <= 0)
    {
        printf("ras_pubkey_encryptfailed to EVP_PKEY_encrypt_init.\n");
        EVP_PKEY_free(key);
        return -1;
    }

    int ret = EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_PADDING);
    if (!ret) {
        printf("set padding error!");
        return 0;
    }

    //EVP_CIPHER_CTX_set_padding(ctx, EVP_CIPH_NO_PADDING);

    if (EVP_PKEY_encrypt(ctx,
        enc_data,
        &enc_data_len,
        orig_data,
        orig_data_len) <= 0)
    {
        printf("ras_pubkey_encryptfailed to EVP_PKEY_encrypt.\n");
        EVP_PKEY_CTX_free(ctx);
        EVP_PKEY_free(key);

        return -1;
    }

    EVP_PKEY_CTX_free(ctx);
    EVP_PKEY_free(key);

    return 0;
}

// 使用密钥解密,这种封装格式只适用公钥加密,私钥解密,这里key必须是私钥  
int rsa_key_decrypt(EVP_PKEY *key, const unsigned char *enc_data, size_t enc_data_len,
    unsigned char *orig_data, size_t &orig_data_len)
{
    EVP_PKEY_CTX *ctx = NULL;
    OpenSSL_add_all_ciphers();

    ctx = EVP_PKEY_CTX_new(key, NULL);
    if (NULL == ctx)
    {
        printf("ras_prikey_decryptfailed to open ctx.\n");
        EVP_PKEY_free(key);
        return -1;
    }

    if (EVP_PKEY_decrypt_init(ctx) <= 0)
    {
        printf("ras_prikey_decryptfailed to EVP_PKEY_decrypt_init.\n");
        EVP_PKEY_free(key);
        return -1;
    }
    int ret = EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_PADDING);
    if (ret = EVP_PKEY_decrypt(ctx,
        orig_data,
        &orig_data_len,
        enc_data,
        enc_data_len) <= 0)
    {
        printf("ras_prikey_decryptfailed to EVP_PKEY_decrypt.\n");
        EVP_PKEY_CTX_free(ctx);
        EVP_PKEY_free(key);

        return -1;
    }

    EVP_PKEY_CTX_free(ctx);
    EVP_PKEY_free(key);
    return 0;
}


EVP_PKEY *generatePubEVPKEY(char * keyChar) {
    int ret, flen, bio_len;
    BIO *bio = NULL;
    RSA *r = NULL;

    if ((bio = BIO_new_mem_buf((void *)keyChar, strlen(keyChar))) == NULL)       //从字符串读取RSA公钥
    {
        //LOGE("BIO_new_mem_buf failed!\n");
    }
    PEM_read_bio_RSA_PUBKEY(bio, &r, 0, 0);

    flen = RSA_size(r);
    EVP_PKEY *evp_key = EVP_PKEY_new();//新建一个EVP_PKEY变量
    if (evp_key == NULL)
    {
        RSA_free(r);
        return NULL;
    }
    if (EVP_PKEY_set1_RSA(evp_key, r) != 1)  //保存RSA结构体到EVP_PKEY结构体
    {
        RSA_free(r);
        EVP_PKEY_free(evp_key);
        return NULL;
    }

    RSA_free(r);
    return evp_key;
}

extern EVP_PKEY *generatePriEVPKEY(char *keyChar) {
    int ret, flen, bio_len;
    BIO *bio = NULL;
    RSA *r = NULL;

    if ((bio = BIO_new_mem_buf((void *)keyChar, strlen(keyChar))) == NULL)       //从字符串读取RSA公钥
    {
        //LOGE("BIO_new_mem_buf failed!\n");
    }
    PEM_read_bio_RSAPrivateKey(bio, &r, 0, 0);

    flen = RSA_size(r);
    EVP_PKEY *evp_key = EVP_PKEY_new();//新建一个EVP_PKEY变量
    if (evp_key == NULL)
    {
        RSA_free(r);
        return NULL;
    }
    if (EVP_PKEY_set1_RSA(evp_key, r) != 1)  //保存RSA结构体到EVP_PKEY结构体
    {
        RSA_free(r);
        EVP_PKEY_free(evp_key);
        return NULL;
    }
    RSA_free(r);
    return evp_key;
}

EVP_PKEY *pub_key = generatePubEVPKEY(pubkey1024);//新建一个EVP_PKEY变量
EVP_PKEY *pri_key = generatePriEVPKEY(prikey1024);
调用rsa_key_decrypt/rsa_key_encrypt两个函数即可加解密

  • 0
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值