2015-01-02 20:27:39 +01:00
|
|
|
/* Copyright (c) 2008-2015, The Tor Project, Inc. */
|
2012-06-05 02:58:17 +02:00
|
|
|
/* See LICENSE for licensing information */
|
2008-05-09 10:35:38 +02:00
|
|
|
|
2008-12-03 00:13:40 +01:00
|
|
|
#include "orconfig.h"
|
|
|
|
|
2008-05-09 10:35:38 +02:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include "crypto.h"
|
2010-07-10 03:52:20 +02:00
|
|
|
#include "torlog.h"
|
2015-02-27 15:24:21 +01:00
|
|
|
#include "util.h"
|
2008-05-09 10:35:38 +02:00
|
|
|
#include "compat.h"
|
|
|
|
#include <openssl/bn.h>
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
|
2010-05-21 04:30:08 +02:00
|
|
|
int
|
|
|
|
main(int c, char **v)
|
2008-05-09 10:35:38 +02:00
|
|
|
{
|
2012-01-18 21:53:30 +01:00
|
|
|
crypto_pk_t *env;
|
2008-05-09 10:35:38 +02:00
|
|
|
char *str;
|
|
|
|
RSA *rsa;
|
2009-02-10 21:03:58 +01:00
|
|
|
int wantdigest=0;
|
|
|
|
int fname_idx;
|
2010-02-22 12:08:58 +01:00
|
|
|
char *fname=NULL;
|
2014-09-11 05:30:37 +02:00
|
|
|
init_logging(1);
|
2008-05-09 10:35:38 +02:00
|
|
|
|
|
|
|
if (c < 2) {
|
2008-12-03 00:13:40 +01:00
|
|
|
fprintf(stderr, "Hi. I'm tor-checkkey. Tell me a filename that "
|
|
|
|
"has a PEM-encoded RSA public key (like in a cert) and I'll "
|
2009-02-10 21:03:58 +01:00
|
|
|
"dump the modulus. Use the --digest option too and I'll "
|
|
|
|
"dump the digest.\n");
|
2008-05-09 10:35:38 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2009-05-24 01:42:44 +02:00
|
|
|
if (crypto_global_init(0, NULL, NULL)) {
|
2008-05-09 10:35:38 +02:00
|
|
|
fprintf(stderr, "Couldn't initialize crypto library.\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2009-02-10 21:03:58 +01:00
|
|
|
if (!strcmp(v[1], "--digest")) {
|
|
|
|
wantdigest = 1;
|
|
|
|
fname_idx = 2;
|
|
|
|
if (c<3) {
|
|
|
|
fprintf(stderr, "too few arguments");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
wantdigest = 0;
|
|
|
|
fname_idx = 1;
|
|
|
|
}
|
|
|
|
|
2010-02-22 12:08:58 +01:00
|
|
|
fname = expand_filename(v[fname_idx]);
|
|
|
|
str = read_file_to_str(fname, 0, NULL);
|
|
|
|
tor_free(fname);
|
2008-05-09 10:35:38 +02:00
|
|
|
if (!str) {
|
2009-02-10 21:03:58 +01:00
|
|
|
fprintf(stderr, "Couldn't read %s\n", v[fname_idx]);
|
2008-05-09 10:35:38 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2012-01-18 21:53:30 +01:00
|
|
|
env = crypto_pk_new();
|
2008-05-09 10:35:38 +02:00
|
|
|
if (crypto_pk_read_public_key_from_string(env, str, strlen(str))<0) {
|
|
|
|
fprintf(stderr, "Couldn't parse key.\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
tor_free(str);
|
|
|
|
|
2009-02-10 21:03:58 +01:00
|
|
|
if (wantdigest) {
|
|
|
|
char digest[HEX_DIGEST_LEN+1];
|
|
|
|
if (crypto_pk_get_fingerprint(env, digest, 0)<0)
|
|
|
|
return 1;
|
|
|
|
printf("%s\n",digest);
|
|
|
|
} else {
|
2012-10-12 18:22:13 +02:00
|
|
|
rsa = crypto_pk_get_rsa_(env);
|
2009-02-10 21:03:58 +01:00
|
|
|
str = BN_bn2hex(rsa->n);
|
2008-05-09 10:35:38 +02:00
|
|
|
|
2009-02-10 21:03:58 +01:00
|
|
|
printf("%s\n", str);
|
|
|
|
}
|
2008-05-09 10:35:38 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2008-12-03 00:13:40 +01:00
|
|
|
|