X-Git-Url: https://tinc-vpn.org/git/browse?a=blobdiff_plain;f=src%2Fopenssl%2Fecdsa.c;h=85c6a47b38eb89507dc0d0f7435c9dd847d70908;hb=ff751903aa82bd6dd66a099f9c05dcdae9fc57f2;hp=a4f0f30d259b68355d94d9920d0416249df3c2ea;hpb=027228debee2ea6f31cd176e456c13d626380066;p=tinc diff --git a/src/openssl/ecdsa.c b/src/openssl/ecdsa.c index a4f0f30d..85c6a47b 100644 --- a/src/openssl/ecdsa.c +++ b/src/openssl/ecdsa.c @@ -26,8 +26,8 @@ #include "ecdsa.h" #include "utils.h" -// Set ECDSA keys - +// Get and set ECDSA keys +// bool ecdsa_set_base64_public_key(ecdsa_t *ecdsa, const char *p) { *ecdsa = EC_KEY_new_by_curve_name(NID_secp521r1); @@ -38,12 +38,24 @@ bool ecdsa_set_base64_public_key(ecdsa_t *ecdsa, const char *p) { if(!o2i_ECPublicKey(ecdsa, &ppubkey, len)) { logger(LOG_DEBUG, "o2i_ECPublicKey failed: %s", ERR_error_string(ERR_get_error(), NULL)); - abort(); + return false; } return true; } +char *ecdsa_get_base64_public_key(ecdsa_t *ecdsa) { + unsigned char *pubkey = NULL; + int len = i2o_ECPublicKey(*ecdsa, &pubkey); + + char *base64 = malloc(len * 4 / 3 + 5); + b64encode(pubkey, base64, len); + + free(pubkey); + + return base64; +} + // Read PEM ECDSA keys bool ecdsa_read_pem_public_key(ecdsa_t *ecdsa, FILE *fp) {