Commit d27514b7 authored by Roger Dingledine's avatar Roger Dingledine
Browse files

orkeygen is obsolete


svn:r495
parent bf10a3c0
Loading
Loading
Loading
Loading

src/orkeygen/.cvsignore

deleted100644 → 0
+0 −4
Original line number Diff line number Diff line
Makefile
Makefile.in
.deps
orkeygen

src/orkeygen/Makefile.am

deleted100644 → 0
+0 −6
Original line number Diff line number Diff line

bin_PROGRAMS = orkeygen

orkeygen_SOURCES = orkeygen.c

orkeygen_LDADD = -L../common -lor

src/orkeygen/orkeygen.c

deleted100644 → 0
+0 −149
Original line number Diff line number Diff line
/**
 * orkeygen.c 
 * Key generation utility. 
 *
 * Matej Pfajfar <mp292@cam.ac.uk>
 */

/*
 * Changes :
 * $Log$
 * Revision 1.3  2002/09/24 10:43:57  arma
 * laying the groundwork for dynamic router lists
 *
 * revamped the router reading section
 *
 * reference counting for crypto pk env's (so we can dup them)
 *
 * we now read and write pem pk keys from string rather than from FILE*,
 *   in anticipation of fetching directories over a socket
 *   (so now on startup we slurp in the whole file, then parse it as a string)
 *
 * fixed a bug in the proxy side, where you could get some circuits
 *   wedged if they showed up while the connection was being made
 *
 * Revision 1.2  2002/07/25 08:18:05  badbytes
 * Updated to use crypto.h instead of OpenSSL.
 *
 * Revision 1.1.1.1  2002/06/26 22:45:50  arma
 * initial commit: current code
 *
 * Revision 1.1  2002/01/04 07:19:27  badbytes
 * Key generation utility.
 *
 *
 */

/* likely obsoleted by:
 *
 * openssl genrsa -out private.pem 1024
 * openssl rsa -in private.pem -pubout -out public.pem
 *
 */

#include <stdlib.h>
#include <stdio.h>

#include "../common/crypto.h"

int main(int argc, char *argv[])
{

  char *file_pr = argv[1];
  char *file_pu = argv[2];
  
  FILE *f_pr = NULL;
  FILE *f_pu = NULL;
  
  crypto_pk_env_t *env;
 
  int retval = 0;
  
  
  if (argc < 3)
  {
    printf("Need two files, for private and public key in that order.\n");
    exit(1);
  }
  
  crypto_global_init();
  
  env = crypto_new_pk_env(CRYPTO_PK_RSA);
  if (!env)
  {
    printf("Could not create a crypto environment.");
    exit(1);
  }
  
  /* generate the key */
  if (crypto_pk_generate_key(env)) /* error has occured */
  {
    printf("%s",crypto_perror());
    exit(1);
  }
  else /* keys generated */
  {
    retval = crypto_pk_check_key(env);
    if (retval == 1)
    {
      printf("Generated key seems to be valid.\n");
      /* open the output files */
      f_pr = fopen(file_pr,"w");
      if (!f_pr)
      {
	perror("fopen");
	crypto_free_pk_env(env);
	exit(1);
      }
      
      f_pu = fopen(file_pu,"w");
      if (!f_pu)
      {
	perror("fopen");
	crypto_free_pk_env(env);
	exit(1);
      }
      
      /* write the private key */
      if (crypto_pk_write_private_key_to_file(env, f_pr) == -1)
      {
	printf("%s",crypto_perror());
	fclose(f_pr);
	fclose(f_pu);
        crypto_free_pk_env(env);
	exit(1);
      }
      
      /* write the public key */
      if (crypto_pk_write_public_key_to_file(env, f_pu) == -1)
      {
	printf("%s",crypto_perror());
	fclose(f_pr);
	fclose(f_pu);
        crypto_free_pk_env(env);
	exit(1);
      }
      
      printf("Keys written to files %s (public) and %s (private).\n",file_pu,file_pr);
    }
    else if (retval == 0)
    {
      printf("Generated key seems to be invalid. Exiting.\n");
      crypto_free_pk_env(env);
      exit(1);
    }
    else if (retval == -1)
    {
      printf("%s",crypto_perror());
      crypto_free_pk_env(env);
      exit(1);
    }
  }
     
  crypto_free_pk_env(env);
  crypto_global_cleanup();
  fclose(f_pu);
  fclose(f_pr);
  exit(0);
  
 }