orkeygen is obsolete

svn:r495
This commit is contained in:
Roger Dingledine 2003-09-27 05:35:18 +00:00
parent bf10a3c0f1
commit d27514b70a
3 changed files with 0 additions and 159 deletions

View File

@ -1,4 +0,0 @@
Makefile
Makefile.in
.deps
orkeygen

View File

@ -1,6 +0,0 @@
bin_PROGRAMS = orkeygen
orkeygen_SOURCES = orkeygen.c
orkeygen_LDADD = -L../common -lor

View File

@ -1,149 +0,0 @@
/**
* orkeygen.c
* Key generation utility.
*
* Matej Pfajfar <mp292@cam.ac.uk>
*/
/*
* Changes :
* $Log$
* Revision 1.3 2002/09/24 10:43:57 arma
* laying the groundwork for dynamic router lists
*
* revamped the router reading section
*
* reference counting for crypto pk env's (so we can dup them)
*
* we now read and write pem pk keys from string rather than from FILE*,
* in anticipation of fetching directories over a socket
* (so now on startup we slurp in the whole file, then parse it as a string)
*
* fixed a bug in the proxy side, where you could get some circuits
* wedged if they showed up while the connection was being made
*
* Revision 1.2 2002/07/25 08:18:05 badbytes
* Updated to use crypto.h instead of OpenSSL.
*
* Revision 1.1.1.1 2002/06/26 22:45:50 arma
* initial commit: current code
*
* Revision 1.1 2002/01/04 07:19:27 badbytes
* Key generation utility.
*
*
*/
/* likely obsoleted by:
*
* openssl genrsa -out private.pem 1024
* openssl rsa -in private.pem -pubout -out public.pem
*
*/
#include <stdlib.h>
#include <stdio.h>
#include "../common/crypto.h"
int main(int argc, char *argv[])
{
char *file_pr = argv[1];
char *file_pu = argv[2];
FILE *f_pr = NULL;
FILE *f_pu = NULL;
crypto_pk_env_t *env;
int retval = 0;
if (argc < 3)
{
printf("Need two files, for private and public key in that order.\n");
exit(1);
}
crypto_global_init();
env = crypto_new_pk_env(CRYPTO_PK_RSA);
if (!env)
{
printf("Could not create a crypto environment.");
exit(1);
}
/* generate the key */
if (crypto_pk_generate_key(env)) /* error has occured */
{
printf("%s",crypto_perror());
exit(1);
}
else /* keys generated */
{
retval = crypto_pk_check_key(env);
if (retval == 1)
{
printf("Generated key seems to be valid.\n");
/* open the output files */
f_pr = fopen(file_pr,"w");
if (!f_pr)
{
perror("fopen");
crypto_free_pk_env(env);
exit(1);
}
f_pu = fopen(file_pu,"w");
if (!f_pu)
{
perror("fopen");
crypto_free_pk_env(env);
exit(1);
}
/* write the private key */
if (crypto_pk_write_private_key_to_file(env, f_pr) == -1)
{
printf("%s",crypto_perror());
fclose(f_pr);
fclose(f_pu);
crypto_free_pk_env(env);
exit(1);
}
/* write the public key */
if (crypto_pk_write_public_key_to_file(env, f_pu) == -1)
{
printf("%s",crypto_perror());
fclose(f_pr);
fclose(f_pu);
crypto_free_pk_env(env);
exit(1);
}
printf("Keys written to files %s (public) and %s (private).\n",file_pu,file_pr);
}
else if (retval == 0)
{
printf("Generated key seems to be invalid. Exiting.\n");
crypto_free_pk_env(env);
exit(1);
}
else if (retval == -1)
{
printf("%s",crypto_perror());
crypto_free_pk_env(env);
exit(1);
}
}
crypto_free_pk_env(env);
crypto_global_cleanup();
fclose(f_pu);
fclose(f_pr);
exit(0);
}