aboutsummaryrefslogtreecommitdiff
path: root/src/tools
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2008-05-09 08:35:38 +0000
committerNick Mathewson <nickm@torproject.org>2008-05-09 08:35:38 +0000
commitb7a80920e26f53e354975a7252e3a1f33ef9192b (patch)
tree48bdba9b757b436021a4d714aed6aac75aeb76d8 /src/tools
parent32065813ac34437971cb9c8a95a1923557d0557d (diff)
downloadtor-b7a80920e26f53e354975a7252e3a1f33ef9192b.tar.gz
tor-b7a80920e26f53e354975a7252e3a1f33ef9192b.zip
r15558@tombo: nickm | 2008-05-09 04:35:12 -0400
New (temporary) tool to dump the modulus of a key. May help with a project of weasel's. svn:r14580
Diffstat (limited to 'src/tools')
-rw-r--r--src/tools/Makefile.am6
-rw-r--r--src/tools/tor-checkkey.c49
2 files changed, 55 insertions, 0 deletions
diff --git a/src/tools/Makefile.am b/src/tools/Makefile.am
index 7d7f2c7b8f..79393d6854 100644
--- a/src/tools/Makefile.am
+++ b/src/tools/Makefile.am
@@ -1,4 +1,5 @@
bin_PROGRAMS = tor-resolve tor-gencert
+noinst_PROGRAMS = tor-checkkey
tor_resolve_SOURCES = tor-resolve.c
tor_resolve_LDFLAGS = @TOR_LDFLAGS_libevent@
@@ -10,3 +11,8 @@ tor_gencert_LDFLAGS = @TOR_LDFLAGS_zlib@ @TOR_LDFLAGS_openssl@ \
tor_gencert_LDADD = ../common/libor.a ../common/libor-crypto.a \
-lz -lcrypto -levent @TOR_LIB_WS32@ @TOR_LIB_GDI@
+tor_checkkey_SOURCES = tor-checkkey.c
+tor_checkkey_LDFLAGS = @TOR_LDFLAGS_zlib@ @TOR_LDFLAGS_openssl@ \
+ @TOR_LDFLAGS_libevent@
+tor_checkkey_LDADD = ../common/libor.a ../common/libor-crypto.a \
+ -lz -lcrypto -levent @TOR_LIB_WS32@ @TOR_LIB_GDI@
diff --git a/src/tools/tor-checkkey.c b/src/tools/tor-checkkey.c
new file mode 100644
index 0000000000..e0be6d7287
--- /dev/null
+++ b/src/tools/tor-checkkey.c
@@ -0,0 +1,49 @@
+
+#define CRYPTO_PRIVATE
+
+#include <stdio.h>
+#include <stdlib.h>
+#include "crypto.h"
+#include "log.h"
+#include "util.h"
+#include "compat.h"
+#include <openssl/bn.h>
+#include <openssl/rsa.h>
+
+int main(int c, char **v)
+{
+ crypto_pk_env_t *env;
+ char *str;
+ RSA *rsa;
+ init_logging();
+
+ if (c < 2) {
+ fprintf(stderr, "Hi. I'm tor-checkkey. Tell me a filename that has a PEM-encoded RSA public key (like in a cert) and I'll dump the modulus.\n");
+ return 1;
+ }
+
+ if (crypto_global_init(0)) {
+ fprintf(stderr, "Couldn't initialize crypto library.\n");
+ return 1;
+ }
+
+ str = read_file_to_str(v[1], 0, NULL);
+ if (!str) {
+ fprintf(stderr, "Couldn't read %s\n", v[1]);
+ return 1;
+ }
+
+ env = crypto_new_pk_env();
+ if (crypto_pk_read_public_key_from_string(env, str, strlen(str))<0) {
+ fprintf(stderr, "Couldn't parse key.\n");
+ return 1;
+ }
+ tor_free(str);
+
+ rsa = _crypto_pk_env_get_rsa(env);
+ str = BN_bn2hex(rsa->n);
+
+ printf("%s\n", str);
+
+ return 0;
+}