auth/rsa2jwk: add code to produce jwk rsa keys

This is useful for acmed, and possibly other web
technologies.
This commit is contained in:
Ori Bernstein 2021-07-18 15:30:35 +00:00
parent acc504c319
commit 07c32fb3da
2 changed files with 90 additions and 2 deletions

View file

@ -26,6 +26,7 @@ TARG=\
readnvram\
rsa2asn1\
rsa2csr\
rsa2jwk\
rsa2pub\
rsa2ssh\
rsa2x509\
@ -106,10 +107,10 @@ nuke:V:
rm -f *.[$OS] *.[$OS].a [$OS].* y.tab.? y.debug y.output $TARG *.acid
$O.%: $LIB
$O.rsa2asn1 $O.rsa2ssh $O.rsafill $O.rsa2x509 $O.rsa2pub $O.rsa2csr: rsa2any.$O
$O.rsa2asn1 $O.rsa2ssh $O.rsafill $O.rsa2x509 $O.rsa2pub $O.rsa2csr $O.rsa2jwk: rsa2any.$O
$O.authsrv $O.guard.srv: secureidcheck.$O
rsa2asn1.$O rsa2ssh.$O rsafill.$O rsa2x509.$O rsa2pub.$O rsa2csr.$O: rsa2any.h
rsa2asn1.$O rsa2ssh.$O rsafill.$O rsa2x509.$O rsa2pub.$O rsa2csr.$O rsa2jwk.$O: rsa2any.h
$BIN/netkey:V: $O.netkey
cp $O.netkey /$objtype/bin/netkey

View file

@ -0,0 +1,87 @@
#include <u.h>
#include <libc.h>
#include <auth.h>
#include <mp.h>
#include <libsec.h>
#include "rsa2any.h"
#define between(x,min,max) (((min-1-x) & (x-max-1))>>8)
int
encurl64chr(int o)
{
int c;
c = between(o, 0, 25) & ('A'+o);
c |= between(o, 26, 51) & ('a'+(o-26));
c |= between(o, 52, 61) & ('0'+(o-52));
c |= between(o, 62, 62) & ('-');
c |= between(o, 63, 63) & ('_');
return c;
}
char*
encurl64(void *in, int n)
{
int lim;
char *out, *p;
lim = 4*n/3 + 5;
if((out = malloc(lim)) == nil)
sysfatal("malloc: %r");
enc64x(out, lim, in, n, encurl64chr);
if((p = strchr(out, '=')) != nil)
*p = 0;
return out;
}
void
usage(void)
{
fprint(2, "usage: auth/rsa2pub [file]\n");
exits("usage");
}
void
main(int argc, char **argv)
{
uchar nbuf[8192], ebuf[512];
char *nstr, *estr;
RSApriv *k;
int nlen, elen;
fmtinstall('[', encodefmt);
quotefmtinstall();
ARGBEGIN{
default:
usage();
}ARGEND
if(argc > 1)
usage();
if((k = getrsakey(argc, argv, 0, nil)) == nil)
sysfatal("%r");
nlen = (mpsignif(k->pub.n)+7)/8;
if(nlen >= sizeof(nbuf))
sysfatal("key too big");
mptobe(k->pub.n, nbuf, nlen, nil);
nstr = encurl64(nbuf, nlen);
elen = (mpsignif(k->pub.ek)+7)/8;
if(elen >= sizeof(ebuf))
sysfatal("key too big");
mptobe(k->pub.ek, ebuf, elen, nil);
estr = encurl64(ebuf, elen);
print(
"{"
"\"kty\": \"RSA\","
"\"n\": \"%s\","
"\"e\": \"%s\""
"}\n",
nstr, estr);
exits(nil);
}