由于项目需要验证签名,这里不做签名,只验签 直接上代码:
使用方法: openssl版本:1.0.2g 其他的自行验证 编译:g++ x509.cpp -o x509 -lssl -lcrypto 执行:./x509
#include <openssl/pem.h>
#include <openssl/x509.h>
#include <openssl/x509v3.h>
#include <cstring>
#include <iostream>
char *base64_encode(const char *buffer, int length) {
BIO *bmem = NULL;
BIO *b64 = NULL;
BUF_MEM *bptr;
char *buff = NULL;
b64 = BIO_new(BIO_f_base64());
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
bmem = BIO_new(BIO_s_mem());
b64 = BIO_push(b64, bmem);
BIO_write(b64, buffer, length);
BIO_flush(b64);
BIO_get_mem_ptr(b64, &bptr);
BIO_set_close(b64, BIO_NOCLOSE);
buff = (char *)malloc(bptr->length + 1);
memcpy(buff, bptr->data, bptr->length);
buff[bptr->length] = 0;
BIO_free_all(b64);
return buff;
}
char *base64_decode(char *input, int length) {
BIO *b64 = NULL;
BIO *bmem = NULL;
char *buffer = NULL;
buffer = (char *)malloc(length);
memset(buffer, 0, length);
b64 = BIO_new(BIO_f_base64());
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
bmem = BIO_new_mem_buf(input, length);
bmem = BIO_push(b64, bmem);
BIO_read(bmem, buffer, length);
BIO_free_all(bmem);
return buffer;
}
int get_str_len(const char *in) {
int num = 0;
if(in == NULL) {
return 0;
}
while (!((*(in + num) == NULL) && (*(in + num + 1) == NULL) \
&& (*(in + num + 2) == NULL) && (*(in + num + 3) == NULL) \
&& (*(in + num + 4) == NULL)&& (*(in + num + 5) == NULL) \
&& (*(in + num + 6) == NULL)&& (*(in + num + 7) == NULL))) {
num++;
}
return num;
}
static const char hex_table[16] = {
'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'A', 'B', 'C', 'D', 'E', 'F'
};
std::string BytesToHexStr(const char* aInStr, int len)
{
std::string hex_str;
for (int i = 0; i < len; ++i) {
hex_str.append(&hex_table[(aInStr[i] & 0xF0) >> 4], 1);
hex_str.append(&hex_table[aInStr[i] & 0xF], 1);
}
std::cout << hex_str << std::endl;
return hex_str;
}
char* substring(char* ch,int pos,int length)
{
char *pch = ch;
char *subch = (char*)calloc(sizeof(char),length+1);
int i;
pch = pch + pos;
for(i = 0; i < length; i++) {
subch[i] = *(pch++);
}
subch[length]='\0';
return subch;
}
int ECDSA_WithSHA256_do_verify(const char *strx509, char *message, unsigned int messageLen, char *signBuf, unsigned int signLen) {
EC_KEY * ec_key;
EVP_MD_CTX md_ctx;
int ret = -1;
char *Sigbuff = NULL, *Signature = NULL, *r = NULL, *s = NULL;
char dst_str[2][512+1];
unsigned char digest[EVP_MAX_MD_SIZE];
unsigned int digestLen = 0;
BIO *bio_mem = BIO_new(BIO_s_mem());
BIO_puts(bio_mem, strx509);
X509 * x509 = PEM_read_bio_X509(bio_mem, NULL, NULL, NULL);
EVP_PKEY *pkey = X509_get_pubkey(x509);
if (pkey->type == EVP_PKEY_EC) {
ec_key = EVP_PKEY_get1_EC_KEY(pkey);
if (!ec_key) {
printf("get EVP_PKEY_get1_EC_KEY fail \n");
}
}
EVP_PKEY_free(pkey);
Sigbuff = base64_decode(message,messageLen);
Signature = base64_decode(signBuf,signLen);
printf("Sigbuff: %s\n", Sigbuff);
printf("Signature: %s\n Signature len: %d\n EVP_MAX_MD_SIZE: %d\n", Signature,get_str_len(Signature), EVP_MAX_MD_SIZE);
r = substring(Signature,0,get_str_len(Signature)/2);
s = substring(Signature,get_str_len(Signature)/2,get_str_len(Signature));
std::string rSignatureInHex = BytesToHexStr(r,get_str_len(Signature)/2);
std::string sSignatureInHex = BytesToHexStr(s,get_str_len(Signature)/2);
free(r);
free(s);
EVP_MD_CTX_init(&md_ctx);
if (!EVP_DigestInit(&md_ctx, EVP_sha256())) {
printf("EVP_digest fail \n");
}
if (!EVP_DigestUpdate(&md_ctx, (const void *)Sigbuff, get_str_len(Sigbuff))) {
printf("EVP_DigestUpdate fail \n");
}
if (!EVP_DigestFinal(&md_ctx, digest, &digestLen)) {
printf("EVP_DigestFinal fail \n");
}
free(Sigbuff);
free(Signature);
ECDSA_SIG *sig = (ECDSA_SIG *)malloc(sizeof(ECDSA_SIG));
strncpy(dst_str[0], rSignatureInHex.c_str(), 512);
strncpy(dst_str[1], sSignatureInHex.c_str(), 512);
printf("dst_str[0]: %s\n", &dst_str[0]);
printf("dst_str[1]: %s\n", &dst_str[1]);
sig->r = BN_new();
sig->s = BN_new();
BN_hex2bn(&(sig->r), dst_str[0]);
BN_hex2bn(&(sig->s), dst_str[1]);
ret = ECDSA_do_verify((const unsigned char*)digest, digestLen, sig, ec_key);
if (ret == -1) {
printf("ECDSA_verify failed\n");
} else if (ret == 0) {
printf("ECDSA_verify incorrect signature\n");
} else {
printf("ECDSA_verify ok\n");
}
BN_free(sig->r);
BN_free(sig->s);
free(sig);
if (ec_key) {
EC_KEY_free(ec_key);
ec_key = NULL;
}
BIO_free(bio_mem);
X509_free(x509);
return ret;
}
int main(int argc, char **argv)
{
OpenSSL_add_all_algorithms();
char message[] = "hGpTaWduYXR1cmUxTaIESDSaQrDC0HKOASZAWQECpAQaZF2BgAYaYUOemQFiSVQ5AQOhAaRhdoGqYmRuAWJtYW1PUkctMTAwMDAxNjk5YnZwajExMTkzMDUwMDViZHRqMjAyMS0wNS0wNWJjb2JJVGJjaXgmMDFJVDVBMUM2NEYyREYwODQ3RjI5Rjc0MTA2MjA1OEFGQUUwIzFibXBsRVUvMS8yMS8xNTI5Ymlzdk1pbmlzdGVybyBkZWxsYSBTYWx1dGVic2QBYnRnaTg0MDUzOTAwNmNuYW2kY2ZudGdQQU5ESU5JYmZuZ1BBTkRJTkljZ250ZkFORFJFQWJnbmZBTkRSRUFjdmVyZTEuMC4wY2RvYmoxOTUyLTA5LTI4";
char signBuf[] = "a0KNpWa23iFQue19IioU/jrUPd/Utoo9A4prMG9LvS3FCsNEHHAwoAUpO4/KIfLB6R1MiIakaIJo4lIBawvUOA==";
std::string str = "MIIEDzCCAfegAwIBAgIURldu5rsfrDeZtDBxrJ+SujMr2IswDQYJKoZIhvcNAQELBQAwSTELMAkGA1UEBhMCSVQxHzAdBgNVBAoMFk1pbmlzdGVybyBkZWxsYSBTYWx1dGUxGTAXBgNVBAMMEEl0YWx5IERHQyBDU0NBIDEwHhcNMjEwNTEyMDgxODE3WhcNMjMwNTEyMDgxMTU5WjBIMQswCQYDVQQGEwJJVDEfMB0GA1UECgwWTWluaXN0ZXJvIGRlbGxhIFNhbHV0ZTEYMBYGA1UEAwwPSXRhbHkgREdDIERTQyAxMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnL9+WnIp9fvbcocZSGUFlSw9ffW/jbMONzcvm1X4c+pXOPEs7C4/83+PxS8Swea2hgm/tKt4PI0z8wgnIehoj6OBujCBtzAfBgNVHSMEGDAWgBS+VOVpXmeSQImXYEEAB/pLRVCw/zBlBgNVHR8EXjBcMFqgWKBWhlRsZGFwOi8vY2Fkcy5kZ2MuZ292Lml0L0NOPUl0YWx5JTIwREdDJTIwQ1NDQSUyMHhcMSxPPU1pbmlzdGVybyUyMGRlbGxhJTIwU2FsdXRlLEM9SVQwHQYDVR0OBBYEFC4bAbCvpArrgZ0E+RrqS8V7TNNIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAjxTeF7yhKz/3PKZ9+WfgZPaIzZvnO/nmuUartgVd3xuTPNtd5tuYRNS/1B78HNNk7fXiq5hH2q8xHF9yxYxExov2qFrfUMD5HOZzYKHZcjcWFNHvH6jx7qDCtb5PrOgSK5QUQzycR7MgWIFinoWwsWIrA1AJOwfUoi7v1aoWNMK1eHZmR3Y9LQ84qeE2yDk3jqEGjlJVCbgBp7O8emzy2KhWv3JyRZgTmFz7p6eRXDzUYHtJaufveIhkNM/U8p3S7egQegliIFMmufvEyZemD2BMvb97H9PQpuzeMwB8zcFbuZmNl42AFMQ2PhQe27pU0wFsDEqLe0ETb5eR3T9L6zdSrWldw6UuXoYV0/5fvjA55qCjAaLJ0qi16Ca/jt6iKuws/KKh9yr+FqZMnZUH2D2j2i8LBA67Ie0JoZPSojr8cwSTxQBdJFI722uczCj/Rt69Y4sLdV3hNQ2A9hHrXesyQslr0ez3UHHzDRFMVlOXWCayj3LIgvtfTjKrT1J+/3Vu9fvs1+CCJELuC9gtVLxMsdRc/A6/bvW4mAsyY78ROX27Bi8CxPN5IZbtiyjpmdfr2bufDcwhwzdwsdQQDoSiIF1LZqCn7sHBmUhzoPcBJdXFET58EKow0BWcerZzpvsVHcMTE2uuAUr/JUh1SBpoJCiMIRSl+XPoEA2qqYU=";
str.insert(0,"-----BEGIN CERTIFICATE-----" "\n");
str.append( "\n" "-----END CERTIFICATE-----" "\n");
int ret = ECDSA_WithSHA256_do_verify(str.c_str(), message, sizeof(message), signBuf, sizeof(signBuf));
printf("ECDSA_WithSHA256 ret = %d\n", ret);
}
|