Advertisement
Guest User

Untitled

a guest
Jun 29th, 2017
55
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.90 KB | None | 0 0
  1. int sec_init(int socket, int verbose, int reliable, int secure)
  2. {
  3. char data[15];
  4. char *response = calloc(MAX_DATA,sizeof(char));
  5. char *pKey = calloc(PUB_KEY_SIZE, sizeof(char));
  6. char encryptedSecKey[ENCRYPTED_KEY_SIZE];
  7. int pKeyLen = PUB_KEY_SIZE;
  8. int i;
  9. strcpy(data,"get public key");
  10. frag_init();
  11.  
  12. if(!secure)
  13. return 1;
  14. srand( time(NULL) );
  15.  
  16. for (i = 0; i < 20 ; i++)
  17. secret_key[i] = (char)rand() % 255 +1;
  18.  
  19. if (!frag_send_data(socket, data, 15, verbose, reliable)) return 0;
  20. frag_receive_data(socket,&pKey, &pKeyLen,verbose, reliable);
  21. if (verbose) printf("Public Key:` %s\n", pKey);
  22.  
  23. sec_pk_encrypt((char *)secret_key, encryptedSecKey, pKey);
  24. if (!frag_send_data(socket, encryptedSecKey, ENCRYPTED_KEY_SIZE, verbose, reliable)) return 0;
  25. frag_receive_data(socket,&response, &pKeyLen,verbose, reliable);
  26. if (!strcmp(response,"OK")) return 1;
  27. return 0;
  28. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement