美文网首页
openssl1.0.2p ECDH验证

openssl1.0.2p ECDH验证

作者: right_33cb | 来源:发表于2018-10-19 10:36 被阅读0次

#include <limits.h>

#include <openssl/ec.h>

#include <openssl/bn.h>

#include <openssl/rand.h>

#include <openssl/err.h>

#include <openssl/ecdsa.h>

#include <openssl/ecdh.h>

#include <openssl/obj_mac.h>

extern char *param_p;

extern char *param_a;

extern char *param_b;

extern char *param_gx;

extern char *param_gy;

extern char *param_n;

extern char *param_pri;

extern char *param_sign_k;

extern int ECC_Y_BIT;

extern void BNPrintf(BIGNUM* bn);

static const int KDF1_SHA1_len = 20;

static void *KDF1_SHA1(const void *in, size_t inlen, void *out, size_t *outlen)

{

return SHA1(in, inlen, out);

}

int test_ecdh_curve(void)

{

BN_CTX *ctx = NULL;

BIGNUM *p = NULL;

BIGNUM *a = NULL;

BIGNUM *b = NULL;

BIGNUM *x = NULL;

BIGNUM *y      = NULL;

BIGNUM *x_a = NULL;

BIGNUM *y_a = NULL;

BIGNUM *x_b = NULL;

BIGNUM *y_b = NULL;

BIGNUM *order  = NULL;

EC_GROUP *group = NULL ;

EC_POINT *P = NULL;

EC_POINT *Q = NULL;

EC_POINT *R = NULL;

EC_KEY *eckey_a = NULL;

EC_KEY *eckey_b = NULL;

unsigned char *abuff = NULL;

unsigned char *bbuff = NULL;

int iret = 0;

ctx = BN_CTX_new();

if (NULL == ctx)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

return 0;

}

p = BN_new();

if (NULL == p)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

a = BN_new();

if (NULL == a)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

b = BN_new();

if (NULL == b)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

group = EC_GROUP_new(EC_GFp_mont_method()); /* applications should use EC_GROUP_new_curve_GFp

* so that the library gets to choose the EC_METHOD */

if (NULL == group)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!BN_hex2bn(&p, param_p))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (1 != BN_is_prime_ex(p, BN_prime_checks, ctx, NULL))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!BN_hex2bn(&a, param_a))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!BN_hex2bn(&b, param_b))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!EC_GROUP_set_curve_GFp(group, p, a, b, ctx))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

P = EC_POINT_new(group);

if (NULL == P)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

Q = EC_POINT_new(group);

if (NULL == Q)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

R = EC_POINT_new(group);

if (NULL == R)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

x = BN_new();

if (NULL == x)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

y = BN_new();

if (NULL == y)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

x_a = BN_new();

if (NULL == x_a)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

y_a = BN_new();

if (NULL == y_a)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

x_b = BN_new();

if (NULL == x_b)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

y_b = BN_new();

if (NULL == y_b)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

order = BN_new();

if (NULL == order)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!BN_hex2bn(&x, param_gx))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!EC_POINT_set_compressed_coordinates_GFp(group, P, x, ECC_Y_BIT, ctx))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!EC_POINT_is_on_curve(group, P, ctx))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!BN_hex2bn(&order, param_n))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!EC_GROUP_set_generator(group, P, order, BN_value_one()))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!EC_POINT_get_affine_coordinates_GFp(group, P, x, y, ctx))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

fprintf(stdout, "\n Generator:\n    x = 0x");

BNPrintf(x);

fprintf(stdout, "\n    y = 0x");

BNPrintf(y);

fprintf(stdout, "\n");

if ((eckey_a = EC_KEY_new()) == NULL)

{

goto errhandl;

}

if (EC_KEY_set_group(eckey_a, group) == 0)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!EC_KEY_generate_key(eckey_a))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if ((eckey_b = EC_KEY_new()) == NULL)

{

goto errhandl;

}

if (EC_KEY_set_group(eckey_b, group) == 0)

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!EC_KEY_generate_key(eckey_b))

{

printf("[%s %d] failed\n", __FILE__, __LINE__);

goto errhandl;

}

if (!EC_POINT_get_affine_coordinates_GFp(group, EC_KEY_get0_public_key(eckey_a), x_a, y_a, ctx))

goto errhandl;

fprintf(stdout, "\n ECKEY a:\n    x = 0x");

BNPrintf(x_a);

fprintf(stdout, "\n    y = 0x");

BNPrintf(y_a);

fprintf(stdout, "\n");

if (!EC_POINT_get_affine_coordinates_GFp(group, EC_KEY_get0_public_key(eckey_b), x_b, y_b, ctx))

goto errhandl;

fprintf(stdout, "\n ECKEY b:\n    x = 0x");

BNPrintf(x_b);

fprintf(stdout, "\n    y = 0x");

BNPrintf(y_b);

fprintf(stdout, "\n");

int alen = KDF1_SHA1_len;

abuff = (unsigned char *)OPENSSL_malloc(alen);

int aout =ECDH_compute_key(abuff, alen, EC_KEY_get0_public_key(eckey_b), eckey_a, KDF1_SHA1);

printf( "key1 =");

int i = 0;

for (i = 0; i < aout; i++)

{

printf("%02X", abuff[i]);

}

printf("\n");

int blen = KDF1_SHA1_len;

bbuff = (unsigned char *)OPENSSL_malloc(blen);

int bout =ECDH_compute_key(bbuff, blen, EC_KEY_get0_public_key(eckey_a), eckey_b, KDF1_SHA1);

printf("key2 =");

for (i = 0; i < bout; i++)

{

printf("%02X", abuff[i]);

}

printf("\n");

if ((aout < 4) || (bout != aout) || (memcmp(abuff, bbuff, aout) != 0))

{

printf("key a:\n");

printf("private key: ");

BNPrintf(EC_KEY_get0_private_key(a));

printf("\n");

printf("public key (x,y): ");

BNPrintf(x);

printf( ",");

BNPrintf(y_a);

printf("\nkey b:\n");

printf("private key: ");

BNPrintf(EC_KEY_get0_private_key(b));

printf("\n");

printf("public key (x,y): ");

BNPrintf(x_b);

printf( ",");

BNPrintf(y_b);

printf("\n");

}

errhandl:

EC_POINT_free(P);

EC_POINT_free(Q);

EC_POINT_free(R);

}

其中:

void BNPrintf(BIGNUM* bn)

{

char *p=NULL;

p=BN_bn2hex(bn);

printf("%s",p);

OPENSSL_free(p);

}

char *param_p = NULL;

char *param_a      = NULL;

char *param_b      = NULL;

char *param_gx    = NULL;

char *param_gy    = NULL;

char *param_n      = NULL;

char *param_pri    = NULL;

char *param_sign_k = NULL;

#define ECC_256R1_p "FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF";

#define ECC_256R1_a      "FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC";

#define ECC_256R1_b      "5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B";

#define ECC_256R1_gx    "6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296";

#define ECC_256R1_gy    "4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5";

#define ECC_256R1_n      "FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551";

#define ECC_256R1_pri    "128B2FA8BD433C6C068C8D803DFF79792A519A55171B1B650C23661D15897263";

#define ECC_256R1_sign_k "6CB28D99385C175C94F94E934817663FC176D925DD72B727260DBAAE1FB2F96F";

int ECC_Y_BIT = 0;

void SetParamFlag(int flag)

{

if (1 == flag)

{

param_p      = SM2_256_p;

param_a      = SM2_256_a;

param_b      = SM2_256_b;

param_gx    = SM2_256_gx;

param_gy    = SM2_256_gy;

param_n      = SM2_256_n;

param_pri    = SM2_256_pri;

param_sign_k = SM2_256_sign_k;

ECC_Y_BIT = 0;

}

else if (2 == flag)

{

param_p      = ECC_256R1_p;

param_a      = ECC_256R1_a;

param_b      = ECC_256R1_b;

param_gx    = ECC_256R1_gx;

param_gy    = ECC_256R1_gy;

param_n      = ECC_256R1_n;

param_pri    = ECC_256R1_pri;

param_sign_k = ECC_256R1_sign_k;

ECC_Y_BIT    = 1;

}

else

{

param_p      = OTHER_EC_p;

param_a      = OTHER_EC_a;

param_b      = OTHER_EC_b;

param_gx    = OTHER_EC_gx;

param_gy    = OTHER_EC_gy;

param_n      = OTHER_EC_n;

param_pri    = OTHER_EC_pri;

param_sign_k = OTHER_EC_sign_k;

ECC_Y_BIT    = 0;

}

}

相关文章

  • openssl1.0.2p ECDH验证

    #include #include #include ...

  • 加密

    ECDH ECDH背景:1.ECC secp160r1,私钥长度20字节,压缩格式公钥21字节2.ECDH协商得出...

  • swift-ecdh

    swift 在iOS10之后,支持ecdh加解密。 1.生成公钥和私钥。 2.加密 3.解密 4.示例

  • 使用ECDH的一些感慨

    ECDH 第一次听说ECDH 是不是就像上面的图一样, 一脸的问好, 不要紧谷歌是万能的. 刚开始做的时候老大给我...

  • 以太坊与椭圆曲线

    参考 TLS/SSL 协议详解 (30) SSL中的RSA、DHE、ECDHE、ECDH流程与区别:https:/...

  • ECDH 密钥协商原理

    端对端加密(E2EE)-参考文章 DH交换 实际上,在学习密码学原理的时候,有一个重点叫做零知识证明,在零知识证明...

  • WavesWallet开发笔记

    第三方库25519 Curve25519 http://cr.yp.to/ecdh.htmlCurve25519 ...

  • windows编译openssl+curl静态库

    转载有截图的一步步照做的编译老版本openssl1.0.2p,先看下 较新的编译zlib/openssl/curl...

  • 椭圆曲线算法:入门(1)

    很多人都听说过加密算法,包括ECC、ECDH或者ECDSA。ECC是Elliptic Curve Cryptogr...

  • IOS 加密 ECDH 学习使用(OpenSSL)

    概要: ECDH 加密的学习和使用总结 1、ECDHTool 工具 单利初始化 2、创建 EC_KEY 通过 ...

网友评论

      本文标题:openssl1.0.2p ECDH验证

      本文链接:https://www.haomeiwen.com/subject/ajhyzftx.html