aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2008-05-09 08:35:38 +0000
committerNick Mathewson <nickm@torproject.org>2008-05-09 08:35:38 +0000
commitb7a80920e26f53e354975a7252e3a1f33ef9192b (patch)
tree48bdba9b757b436021a4d714aed6aac75aeb76d8
parent32065813ac34437971cb9c8a95a1923557d0557d (diff)
downloadtor-b7a80920e26f53e354975a7252e3a1f33ef9192b.tar.gz
tor-b7a80920e26f53e354975a7252e3a1f33ef9192b.zip
r15558@tombo: nickm | 2008-05-09 04:35:12 -0400
New (temporary) tool to dump the modulus of a key. May help with a project of weasel's. svn:r14580
-rw-r--r--src/common/crypto.c6
-rw-r--r--src/common/crypto.h1
-rw-r--r--src/tools/Makefile.am6
-rw-r--r--src/tools/tor-checkkey.c49
4 files changed, 62 insertions, 0 deletions
diff --git a/src/common/crypto.c b/src/common/crypto.c
index 44fa3b2b40..55893fd98b 100644
--- a/src/common/crypto.c
+++ b/src/common/crypto.c
@@ -258,6 +258,12 @@ _crypto_new_pk_env_evp_pkey(EVP_PKEY *pkey)
return _crypto_new_pk_env_rsa(rsa);
}
+RSA *
+_crypto_pk_env_get_rsa(crypto_pk_env_t *env)
+{
+ return env->key;
+}
+
/** used by tortls.c: get an equivalent EVP_PKEY* for a crypto_pk_env_t. Iff
* private is set, include the private-key portion of the key. */
EVP_PKEY *
diff --git a/src/common/crypto.h b/src/common/crypto.h
index 2627335113..64b9097f5e 100644
--- a/src/common/crypto.h
+++ b/src/common/crypto.h
@@ -199,6 +199,7 @@ void secret_to_key(char *key_out, size_t key_out_len, const char *secret,
struct rsa_st;
struct evp_pkey_st;
struct dh_st;
+struct rsa_st *_crypto_pk_env_get_rsa(crypto_pk_env_t *env);
crypto_pk_env_t *_crypto_new_pk_env_rsa(struct rsa_st *rsa);
crypto_pk_env_t *_crypto_new_pk_env_evp_pkey(struct evp_pkey_st *pkey);
struct evp_pkey_st *_crypto_pk_env_get_evp_pkey(crypto_pk_env_t *env,
diff --git a/src/tools/Makefile.am b/src/tools/Makefile.am
index 7d7f2c7b8f..79393d6854 100644
--- a/src/tools/Makefile.am
+++ b/src/tools/Makefile.am
@@ -1,4 +1,5 @@
bin_PROGRAMS = tor-resolve tor-gencert
+noinst_PROGRAMS = tor-checkkey
tor_resolve_SOURCES = tor-resolve.c
tor_resolve_LDFLAGS = @TOR_LDFLAGS_libevent@
@@ -10,3 +11,8 @@ tor_gencert_LDFLAGS = @TOR_LDFLAGS_zlib@ @TOR_LDFLAGS_openssl@ \
tor_gencert_LDADD = ../common/libor.a ../common/libor-crypto.a \
-lz -lcrypto -levent @TOR_LIB_WS32@ @TOR_LIB_GDI@
+tor_checkkey_SOURCES = tor-checkkey.c
+tor_checkkey_LDFLAGS = @TOR_LDFLAGS_zlib@ @TOR_LDFLAGS_openssl@ \
+ @TOR_LDFLAGS_libevent@
+tor_checkkey_LDADD = ../common/libor.a ../common/libor-crypto.a \
+ -lz -lcrypto -levent @TOR_LIB_WS32@ @TOR_LIB_GDI@
diff --git a/src/tools/tor-checkkey.c b/src/tools/tor-checkkey.c
new file mode 100644
index 0000000000..e0be6d7287
--- /dev/null
+++ b/src/tools/tor-checkkey.c
@@ -0,0 +1,49 @@
+
+#define CRYPTO_PRIVATE
+
+#include <stdio.h>
+#include <stdlib.h>
+#include "crypto.h"
+#include "log.h"
+#include "util.h"
+#include "compat.h"
+#include <openssl/bn.h>
+#include <openssl/rsa.h>
+
+int main(int c, char **v)
+{
+ crypto_pk_env_t *env;
+ char *str;
+ RSA *rsa;
+ init_logging();
+
+ if (c < 2) {
+ fprintf(stderr, "Hi. I'm tor-checkkey. Tell me a filename that has a PEM-encoded RSA public key (like in a cert) and I'll dump the modulus.\n");
+ return 1;
+ }
+
+ if (crypto_global_init(0)) {
+ fprintf(stderr, "Couldn't initialize crypto library.\n");
+ return 1;
+ }
+
+ str = read_file_to_str(v[1], 0, NULL);
+ if (!str) {
+ fprintf(stderr, "Couldn't read %s\n", v[1]);
+ return 1;
+ }
+
+ env = crypto_new_pk_env();
+ if (crypto_pk_read_public_key_from_string(env, str, strlen(str))<0) {
+ fprintf(stderr, "Couldn't parse key.\n");
+ return 1;
+ }
+ tor_free(str);
+
+ rsa = _crypto_pk_env_get_rsa(env);
+ str = BN_bn2hex(rsa->n);
+
+ printf("%s\n", str);
+
+ return 0;
+}