📄 pki_key.cpp
字号:
/* vi: set sw=4 ts=4: *//* * Copyright (C) 2001 Christian Hohnstaedt. * * All rights reserved. * * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * - Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * - Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * - Neither the name of the author nor the names of its contributors may be * used to endorse or promote products derived from this software without * specific prior written permission. * * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * * This program links to software with different licenses from: * * http://www.openssl.org which includes cryptographic software * written by Eric Young (eay@cryptsoft.com)" * * http://www.sleepycat.com * * http://www.trolltech.com * * * * http://www.hohnstaedt.de/xca * email: christian@hohnstaedt.de * * $Id: pki_key.cpp,v 1.48 2004/02/18 00:03:06 chris2511 Exp $ * */ #include "pki_key.h"#include "pass_info.h"#include "func.h"#include <openssl/rand.h>#include <qprogressdialog.h>#include <qapplication.h>#include <widgets/MainWindow.h>char pki_key::passwd[40]="\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0";QPixmap *pki_key::icon[2]= { NULL, NULL };void pki_key::erasePasswd(){ for (int i=0; i<40; i++) passwd[i] = 0;}void pki_key::init(int type){ ucount = 0; key = EVP_PKEY_new(); key->type = type; class_name = "pki_key";}void pki_key::incProgress(int a, int b, void *progress){ int i = ((QProgressDialog *)progress)->progress(); ((QProgressDialog *)progress)->setProgress(++i);}void pki_key::generate(int bits){ RSA *rsakey=NULL; QProgressDialog *progress = new QProgressDialog( qApp->tr("Please wait, Key generation is in progress"), qApp->tr("Cancel"),90, 0, 0, true); progress->setMinimumDuration(0); progress->setProgress(0); progress->setCaption(XCA_TITLE); rsakey = RSA_generate_key(bits, 0x10001, &incProgress, progress); progress->cancel(); delete progress; EVP_PKEY_assign_RSA(key, rsakey); openssl_error(); }pki_key::pki_key(const pki_key *pk) :pki_base(pk->desc){ init(); openssl_error(); if (pk == NULL) return; key->type = pk->key->type; if (key->type == EVP_PKEY_RSA) { key->pkey.rsa=((RSA *)ASN1_dup( (int (*)())i2d_RSAPrivateKey, (char *(*)())d2i_RSAPrivateKey,(char *)pk->key->pkey.rsa)); } // TODO add DSA support..... openssl_error();}pki_key::pki_key(const QString name, int type ) :pki_base(name){ init(type); openssl_error();} pki_key::pki_key(EVP_PKEY *pkey) :pki_base(){ init(); if (pkey) { EVP_PKEY_free(key); } key = pkey;} void pki_key::fload(const QString fname){ pass_info p(XCA_TITLE, tr("Please enter the password to decrypt the RSA key.") + "\n'" + fname + "'"); pem_password_cb *cb = &MainWindow::passRead; FILE *fp = fopen(fname.latin1(), "r"); RSA *rsakey = NULL; if (fp != NULL) { rsakey = PEM_read_RSAPrivateKey(fp, NULL, cb, &p); if (!rsakey) { ign_openssl_error(); rewind(fp); rsakey = d2i_RSAPrivateKey_fp(fp, NULL); } if (!rsakey) { ign_openssl_error(); rewind(fp); rsakey = PEM_read_RSA_PUBKEY(fp, NULL, cb, &p); } if (!rsakey) { ign_openssl_error(); rewind(fp); rsakey = d2i_RSA_PUBKEY_fp(fp, NULL); } if (!rsakey) { ign_openssl_error(); rewind(fp); p.setTitle(tr("Password for PKCS#8 private key")); p.setDescription(tr("Please enter the password to decrypt the PKCS#8 private key.") + "\n'" + fname + "'"); d2i_PKCS8PrivateKey_fp(fp, &key, cb, &p); } else { EVP_PKEY_assign_RSA(key, rsakey); openssl_error(); } setIntName(rmslashdot(fname)); openssl_error(); } else fopen_error(fname); fclose(fp);}void pki_key::fromData(unsigned char *p, int size ){ unsigned char *sik, *pdec, *pdec1, *sik1; int outl, decsize; unsigned char iv[EVP_MAX_IV_LENGTH]; unsigned char ckey[EVP_MAX_KEY_LENGTH]; memset(iv, 0, EVP_MAX_IV_LENGTH); RSA *rsakey; EVP_CIPHER_CTX ctx; const EVP_CIPHER *cipher = EVP_des_ede3_cbc(); sik = (unsigned char *)OPENSSL_malloc(size); openssl_error(); pdec = (unsigned char *)OPENSSL_malloc(size); if (pdec == NULL ) { OPENSSL_free(sik); openssl_error(); } pdec1=pdec; sik1=sik; memcpy(iv, p, 8); /* recover the iv */ /* generate the key */ EVP_BytesToKey(cipher, EVP_sha1(), iv, (unsigned char *)passwd, strlen(passwd), 1, ckey,NULL); /* we use sha1 as message digest, * because an md5 version of the password is * stored in the database... */ EVP_CIPHER_CTX_init (&ctx); EVP_DecryptInit( &ctx, cipher, ckey, iv); EVP_DecryptUpdate( &ctx, pdec , &outl, p + 8, size -8 ); decsize = outl; EVP_DecryptFinal( &ctx, pdec + decsize , &outl ); decsize += outl; openssl_error(); memcpy(sik, pdec, decsize); if (key->type == EVP_PKEY_RSA) {#if OPENSSL_VERSION_NUMBER >= 0x0090700fL rsakey = d2i_RSAPrivateKey(NULL, (const unsigned char **)&pdec, decsize);#else rsakey = d2i_RSAPrivateKey(NULL, &pdec, decsize);#endif if (ign_openssl_error()) { rsakey = d2i_RSA_PUBKEY(NULL, &sik, decsize); } openssl_error(); if (rsakey) EVP_PKEY_assign_RSA(key, rsakey); } OPENSSL_free(sik1); OPENSSL_free(pdec1); EVP_CIPHER_CTX_cleanup(&ctx); openssl_error();}unsigned char *pki_key::toData(int *size) { unsigned char *p, *p1, *penc; int outl, encsize=0; EVP_CIPHER_CTX ctx; const EVP_CIPHER *cipher = EVP_des_ede3_cbc(); unsigned char iv[EVP_MAX_IV_LENGTH]; unsigned char ckey[EVP_MAX_KEY_LENGTH]; memset(iv, 0, EVP_MAX_IV_LENGTH); RAND_pseudo_bytes(iv,8); /* Generate a salt */ EVP_BytesToKey(cipher, EVP_sha1(), iv, (unsigned char *)passwd, strlen(passwd), 1, ckey,NULL); EVP_CIPHER_CTX_init (&ctx); EVP_EncryptInit( &ctx, cipher, ckey, iv); openssl_error(); //if (key->type == EVP_PKEY_RSA) { if (true) { if (isPubKey()) { *size = i2d_RSA_PUBKEY(key->pkey.rsa, NULL); p = (unsigned char *)OPENSSL_malloc(*size); openssl_error(); penc = (unsigned char *)OPENSSL_malloc(*size + EVP_MAX_KEY_LENGTH + 8); if (!penc) { OPENSSL_free(p); openssl_error(); } p1 = p; memcpy(penc,iv,8); /* store the iv */ i2d_RSA_PUBKEY(key->pkey.rsa, &p1); EVP_EncryptUpdate( &ctx, penc + 8, &outl, p, *size ); encsize = outl; openssl_error(); } else { *size = i2d_RSAPrivateKey(key->pkey.rsa, NULL); openssl_error(); p = (unsigned char *)OPENSSL_malloc(*size); openssl_error(); penc = (unsigned char *)OPENSSL_malloc(*size + EVP_MAX_KEY_LENGTH + 8); if (!penc) { OPENSSL_free(p); openssl_error(); } p1 = p; memcpy(penc, iv, 8); /* store the iv */ i2d_RSAPrivateKey(key->pkey.rsa, &p1); EVP_EncryptUpdate( &ctx, penc + 8, &outl, p, *size ); /* store key right after the iv */ encsize = outl; openssl_error(); } } EVP_EncryptFinal( &ctx, penc + encsize + 8, &outl ); encsize += outl ; OPENSSL_free(p); EVP_CIPHER_CTX_cleanup(&ctx); openssl_error(); *size = encsize + 8; return penc;}pki_key::~pki_key(){ if (key) EVP_PKEY_free(key);}void pki_key::writePKCS8(const QString fname, pem_password_cb *cb){ pass_info p(XCA_TITLE, tr("Please enter the password protecting the PKCS#8 key")); FILE *fp = fopen(fname.latin1(),"w"); if (fp != NULL) { if (key){ PEM_write_PKCS8PrivateKey_nid(fp, key, NID_pbeWithMD5AndDES_CBC, NULL, 0, cb, &p); openssl_error(); } } else fopen_error(fname); fclose(fp);}void pki_key::writeKey(const QString fname, const EVP_CIPHER *enc, pem_password_cb *cb, bool PEM){ pass_info p(XCA_TITLE, tr("Please enter the password protecting the RSA private key")); if (isPubKey()) { writePublic(fname, PEM); return; } FILE *fp = fopen(fname.latin1(),"w"); if (fp != NULL) { if (key){ if (PEM) PEM_write_PrivateKey(fp, key, enc, NULL, 0, cb, &p); else { i2d_RSAPrivateKey_fp(fp, key->pkey.rsa); } openssl_error(); } } else fopen_error(fname); fclose(fp);}void pki_key::writePublic(const QString fname, bool PEM){ FILE *fp = fopen(fname.latin1(),"w"); if (fp != NULL) { if (key->type == EVP_PKEY_RSA) { if (PEM) PEM_write_RSA_PUBKEY(fp, key->pkey.rsa); else i2d_RSA_PUBKEY_fp(fp, key->pkey.rsa); openssl_error(); } } else fopen_error(fname); fclose(fp);}QString pki_key::length(){ char st[64]; sprintf(st,"%i bit", EVP_PKEY_size(key) * 8 ); openssl_error(); QString x = st; return x;}QString pki_key::BN2QString(BIGNUM *bn){ if (bn == NULL) return "--"; QString x=""; char zs[10]; int j; int size = BN_num_bytes(bn); unsigned char *buf = (unsigned char *)OPENSSL_malloc(size); BN_bn2bin(bn, buf); for (j = 0; j< size; j++) { sprintf(zs, "%02X%c",buf[j], ((j+1)%16 == 0) ?'\n':':'); x += zs; } OPENSSL_free(buf); openssl_error(); return x;}QString pki_key::modulus() { return BN2QString(key->pkey.rsa->n);}QString pki_key::pubEx() { return BN2QString(key->pkey.rsa->e);}QString pki_key::privEx() { if (isPubKey()) return "Not existent (not a private key)"; return BN2QString(key->pkey.rsa->d);}bool pki_key::compare(pki_base *ref){ pki_key *kref = (pki_key *)ref; if (kref == NULL) return false; if (kref->key == NULL) return false; if (kref->key->pkey.rsa->n == NULL) return false; if (key == NULL) return false; if (key->pkey.rsa->n == NULL) return false; if ( BN_cmp(key->pkey.rsa->n, kref->key->pkey.rsa->n) || BN_cmp(key->pkey.rsa->e, kref->key->pkey.rsa->e) ){ openssl_error(); return false; } openssl_error(); return true;} bool pki_key::isPubKey(){ if (key == NULL) { return false; } if (key->pkey.rsa == 0) { return false; } return (key->pkey.rsa->d == NULL); }bool pki_key::isPrivKey(){ return ! isPubKey(); }int pki_key::verify(){ bool veri = false; return true; if (key->type == EVP_PKEY_RSA && isPrivKey()) { if (RSA_check_key(key->pkey.rsa) == 1) veri = true; } if (isPrivKey()) veri = true; openssl_error(); return veri;} int pki_key::getType(){ return key->type;}int pki_key::incUcount(){ ucount++; updateView(); return ucount;}int pki_key::decUcount(){ ucount--; updateView(); return ucount;}int pki_key::getUcount(){ return ucount;}void pki_key::updateView(){ pki_base::updateView(); int pixnum = 0; if (!pointer) return; if (isPubKey()) pixnum += 1; pointer->setPixmap(0, *icon[pixnum]); pointer->setText(1, length()); pointer->setText(2, QString::number(getUcount()));}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -