diff options
author | Nick Mathewson <nickm@torproject.org> | 2008-05-09 08:35:38 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2008-05-09 08:35:38 +0000 |
commit | b7a80920e26f53e354975a7252e3a1f33ef9192b (patch) | |
tree | 48bdba9b757b436021a4d714aed6aac75aeb76d8 | |
parent | 32065813ac34437971cb9c8a95a1923557d0557d (diff) | |
download | tor-b7a80920e26f53e354975a7252e3a1f33ef9192b.tar.gz tor-b7a80920e26f53e354975a7252e3a1f33ef9192b.zip |
r15558@tombo: nickm | 2008-05-09 04:35:12 -0400
New (temporary) tool to dump the modulus of a key. May help with a project of weasel's.
svn:r14580
-rw-r--r-- | src/common/crypto.c | 6 | ||||
-rw-r--r-- | src/common/crypto.h | 1 | ||||
-rw-r--r-- | src/tools/Makefile.am | 6 | ||||
-rw-r--r-- | src/tools/tor-checkkey.c | 49 |
4 files changed, 62 insertions, 0 deletions
diff --git a/src/common/crypto.c b/src/common/crypto.c index 44fa3b2b40..55893fd98b 100644 --- a/src/common/crypto.c +++ b/src/common/crypto.c @@ -258,6 +258,12 @@ _crypto_new_pk_env_evp_pkey(EVP_PKEY *pkey) return _crypto_new_pk_env_rsa(rsa); } +RSA * +_crypto_pk_env_get_rsa(crypto_pk_env_t *env) +{ + return env->key; +} + /** used by tortls.c: get an equivalent EVP_PKEY* for a crypto_pk_env_t. Iff * private is set, include the private-key portion of the key. */ EVP_PKEY * diff --git a/src/common/crypto.h b/src/common/crypto.h index 2627335113..64b9097f5e 100644 --- a/src/common/crypto.h +++ b/src/common/crypto.h @@ -199,6 +199,7 @@ void secret_to_key(char *key_out, size_t key_out_len, const char *secret, struct rsa_st; struct evp_pkey_st; struct dh_st; +struct rsa_st *_crypto_pk_env_get_rsa(crypto_pk_env_t *env); crypto_pk_env_t *_crypto_new_pk_env_rsa(struct rsa_st *rsa); crypto_pk_env_t *_crypto_new_pk_env_evp_pkey(struct evp_pkey_st *pkey); struct evp_pkey_st *_crypto_pk_env_get_evp_pkey(crypto_pk_env_t *env, diff --git a/src/tools/Makefile.am b/src/tools/Makefile.am index 7d7f2c7b8f..79393d6854 100644 --- a/src/tools/Makefile.am +++ b/src/tools/Makefile.am @@ -1,4 +1,5 @@ bin_PROGRAMS = tor-resolve tor-gencert +noinst_PROGRAMS = tor-checkkey tor_resolve_SOURCES = tor-resolve.c tor_resolve_LDFLAGS = @TOR_LDFLAGS_libevent@ @@ -10,3 +11,8 @@ tor_gencert_LDFLAGS = @TOR_LDFLAGS_zlib@ @TOR_LDFLAGS_openssl@ \ tor_gencert_LDADD = ../common/libor.a ../common/libor-crypto.a \ -lz -lcrypto -levent @TOR_LIB_WS32@ @TOR_LIB_GDI@ +tor_checkkey_SOURCES = tor-checkkey.c +tor_checkkey_LDFLAGS = @TOR_LDFLAGS_zlib@ @TOR_LDFLAGS_openssl@ \ + @TOR_LDFLAGS_libevent@ +tor_checkkey_LDADD = ../common/libor.a ../common/libor-crypto.a \ + -lz -lcrypto -levent @TOR_LIB_WS32@ @TOR_LIB_GDI@ diff --git a/src/tools/tor-checkkey.c b/src/tools/tor-checkkey.c new file mode 100644 index 0000000000..e0be6d7287 --- /dev/null +++ b/src/tools/tor-checkkey.c @@ -0,0 +1,49 @@ + +#define CRYPTO_PRIVATE + +#include <stdio.h> +#include <stdlib.h> +#include "crypto.h" +#include "log.h" +#include "util.h" +#include "compat.h" +#include <openssl/bn.h> +#include <openssl/rsa.h> + +int main(int c, char **v) +{ + crypto_pk_env_t *env; + char *str; + RSA *rsa; + init_logging(); + + if (c < 2) { + fprintf(stderr, "Hi. I'm tor-checkkey. Tell me a filename that has a PEM-encoded RSA public key (like in a cert) and I'll dump the modulus.\n"); + return 1; + } + + if (crypto_global_init(0)) { + fprintf(stderr, "Couldn't initialize crypto library.\n"); + return 1; + } + + str = read_file_to_str(v[1], 0, NULL); + if (!str) { + fprintf(stderr, "Couldn't read %s\n", v[1]); + return 1; + } + + env = crypto_new_pk_env(); + if (crypto_pk_read_public_key_from_string(env, str, strlen(str))<0) { + fprintf(stderr, "Couldn't parse key.\n"); + return 1; + } + tor_free(str); + + rsa = _crypto_pk_env_get_rsa(env); + str = BN_bn2hex(rsa->n); + + printf("%s\n", str); + + return 0; +} |