90 lines
2.9 KiB
Zig
90 lines
2.9 KiB
Zig
|
const std = @import("std");
|
||
|
const c = @cImport({
|
||
|
@cInclude("openssl/rsa.h");
|
||
|
@cInclude("openssl/bn.h");
|
||
|
@cInclude("openssl/err.h");
|
||
|
@cInclude("arpa/inet.h");
|
||
|
});
|
||
|
|
||
|
const stdout = std.io.getStdOut().writer();
|
||
|
|
||
|
fn print(comptime str: []const u8, args: anytype) void {
|
||
|
stdout.print(str, args) catch unreachable;
|
||
|
}
|
||
|
|
||
|
fn println(comptime str: []const u8, args: anytype) void {
|
||
|
print(str ++ "\n", args);
|
||
|
}
|
||
|
|
||
|
fn create_bn_from_dec_string(str: []const u8) ?*c.BIGNUM {
|
||
|
var n: ?*c.BIGNUM = c.BN_new();
|
||
|
if (n == null) {
|
||
|
println("Failed to create BIGNUM.", .{});
|
||
|
std.os.exit(1);
|
||
|
}
|
||
|
|
||
|
if (c.BN_dec2bn(@alignCast(@ptrCast(&n)), @ptrCast(str)) == 0) {
|
||
|
println("Failed to convert dec to BIGNUM.", .{});
|
||
|
std.os.exit(1);
|
||
|
}
|
||
|
|
||
|
return n;
|
||
|
}
|
||
|
|
||
|
pub fn main() !void {
|
||
|
var arena = std.heap.ArenaAllocator.init(std.heap.page_allocator);
|
||
|
defer arena.deinit();
|
||
|
|
||
|
var alloc = arena.allocator();
|
||
|
|
||
|
var e: ?*c.BIGNUM = create_bn_from_dec_string("65537");
|
||
|
var pubkey: ?*c.BIGNUM = create_bn_from_dec_string("7405872386298001828045412304885395957447735855540402226273272018863616985100578690399814241980651881616439657049448993379923363875365701026162288146836853");
|
||
|
|
||
|
var d: ?*c.BIGNUM = create_bn_from_dec_string("1545653943570564246212141988589994139279645559486726912293297140150091598977726717239879077953798120855868459360771804433616650588668281034152580212290153");
|
||
|
|
||
|
var p: ?*c.BIGNUM = create_bn_from_dec_string("112546167358047505471958486197519319605436748416824057782825895564365669780011");
|
||
|
var q: ?*c.BIGNUM = create_bn_from_dec_string("65802972772386034028625679514602920156340140357656235951559577501150333990623");
|
||
|
|
||
|
var result_str = "16B33257CF7E2CF19E62B814538CACFC2AD77851DBF18E9299C057EA1FF46336DAB290D3805EA45C2A827E387EC9D6F558D6C0A3C1C740C35BE8696195E70B0B";
|
||
|
|
||
|
var chs = try alloc.alloc(u8, result_str.len / 2);
|
||
|
|
||
|
for (0..chs.len) |_i| {
|
||
|
var i = _i * 2;
|
||
|
var end = i + 2;
|
||
|
var r = try std.fmt.parseInt(u8, result_str[i..end], 16);
|
||
|
chs[_i] = r;
|
||
|
}
|
||
|
|
||
|
var rsa: ?*c.RSA = c.RSA_new();
|
||
|
if (rsa == null) {
|
||
|
println("Failed to init rsa", .{});
|
||
|
return;
|
||
|
}
|
||
|
defer c.RSA_free(rsa);
|
||
|
|
||
|
if (c.RSA_set0_key(rsa, pubkey, e, d) != 1) {
|
||
|
println("Failed to set the pub key", .{});
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
if (c.RSA_set0_factors(rsa, p, q) != 1) {
|
||
|
println("Failed to set the priv key", .{});
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
var test_r = try alloc.alloc(u8, 64);
|
||
|
defer alloc.free(test_r);
|
||
|
@memset(test_r, 0);
|
||
|
|
||
|
println("{} {any}", .{ chs.len, chs });
|
||
|
|
||
|
if (c.RSA_private_decrypt(@intCast(chs.len), @ptrCast(chs.ptr), @ptrCast(test_r.ptr), rsa, c.RSA_NO_PADDING) == -1) {
|
||
|
var err = c.ERR_get_error();
|
||
|
var err_buff = c.ERR_error_string(err, null);
|
||
|
println("Failed to encrypt! {} err: {s}", .{ err, err_buff });
|
||
|
std.os.exit(1);
|
||
|
}
|
||
|
println("{any}\n{s}", .{ test_r, test_r });
|
||
|
}
|