Browse Source

rollback

pull/2108/head
orignal 1 month ago
parent
commit
2321a897f5
  1. 29
      libi2pd/Family.cpp

29
libi2pd/Family.cpp

@ -136,29 +136,34 @@ namespace data
if (ret) if (ret)
{ {
SSL * ssl = SSL_new (ctx); SSL * ssl = SSL_new (ctx);
auto pkey = SSL_get_privatekey (ssl); EVP_PKEY * pkey = SSL_get_privatekey (ssl);
if (pkey) EC_KEY * ecKey = EVP_PKEY_get1_EC_KEY (pkey);
if (ecKey)
{
auto group = EC_KEY_get0_group (ecKey);
if (group)
{
int curve = EC_GROUP_get_curve_name (group);
if (curve == NID_X9_62_prime256v1)
{ {
uint8_t buf[100], signature[128]; uint8_t signingPrivateKey[32], buf[50], signature[64];
i2p::crypto::bn2buf (EC_KEY_get0_private_key (ecKey), signingPrivateKey, 32);
i2p::crypto::ECDSAP256Signer signer (signingPrivateKey);
size_t len = family.length (); size_t len = family.length ();
memcpy (buf, family.c_str (), len); memcpy (buf, family.c_str (), len);
memcpy (buf + len, (const uint8_t *)ident, 32); memcpy (buf + len, (const uint8_t *)ident, 32);
len += 32; len += 32;
size_t l = 128; signer.Sign (buf, len, signature);
EVP_MD_CTX * mdctx = EVP_MD_CTX_create (); len = Base64EncodingBufferSize (64);
EVP_DigestSignInit (mdctx, NULL, NULL, NULL, pkey);
if (EVP_DigestSign (mdctx, signature, &l, buf, len))
{
len = Base64EncodingBufferSize (l);
char * b64 = new char[len+1]; char * b64 = new char[len+1];
len = ByteStreamToBase64 (signature, l, b64, len); len = ByteStreamToBase64 (signature, 64, b64, len);
b64[len] = 0; b64[len] = 0;
sig = b64; sig = b64;
delete[] b64; delete[] b64;
} }
else else
LogPrint (eLogError, "Family: signing failed"); LogPrint (eLogWarning, "Family: elliptic curve ", curve, " is not supported");
EVP_MD_CTX_destroy (mdctx); }
} }
SSL_free (ssl); SSL_free (ssl);
} }

Loading…
Cancel
Save