summaryrefslogtreecommitdiff
path: root/utils/key2pub.py
blob: 8cd959663e4fba10304c942c0f44746bcf2ebf26 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
#!/usr/bin/env python

import sys
from M2Crypto import RSA

def print_ssl(name, val):
    while val[0] == '\0':
        val = val[1:]
    while len(val) % 4:
        val = '\0' + val
    vnew = []
    while len(val):
        vnew.append((val[0], val[1], val[2], val[3], ))
        val = val[4:]
    vnew.reverse()
    sys.stdout.write('static BN_ULONG %s[%d] = {\n' % (name, len(vnew)))
    idx = 0
    for v1, v2, v3, v4 in vnew:
        if not idx:
            sys.stdout.write('\t')
        sys.stdout.write('0x%.2x%.2x%.2x%.2x, ' % (ord(v1), ord(v2), ord(v3), ord(v4)))
        idx += 1
        if idx == 4:
            idx = 0
            sys.stdout.write('\n')
    if idx:
        sys.stdout.write('\n')
    sys.stdout.write('};\n\n')

def print_ssl_keys(n):
    sys.stdout.write(r'''
struct pubkey {
	struct bignum_st e, n;
};

#define KEY(data) {				\
	.d = data,				\
	.top = sizeof(data)/sizeof(data[0]),	\
}

#define KEYS(e,n)	{ KEY(e), KEY(n), }

static struct pubkey keys[] = {
''')
    for n in xrange(n + 1):
        sys.stdout.write('	KEYS(e_%d, n_%d),\n' % (n, n))
    sys.stdout.write('};\n')
    pass

def print_gcrypt(name, val):
    while val[0] == '\0':
        val = val[1:]
    sys.stdout.write('static __u8 %s[%d] = {\n' % (name, len(val)))
    idx = 0
    for v in val:
        if not idx:
            sys.stdout.write('\t')
        sys.stdout.write('0x%.2x, ' % ord(v))
        idx += 1
        if idx == 8:
            idx = 0
            sys.stdout.write('\n')
    if idx:
        sys.stdout.write('\n')
    sys.stdout.write('};\n\n')

def print_gcrypt_keys(n):
    sys.stdout.write(r'''
struct key_params {
	__u8 *e, *n;
	__u32 len_e, len_n; 
};

#define KEYS(_e, _n) {			\
	.e = _e, .len_e = sizeof(_e),	\
	.n = _n, .len_n = sizeof(_n),	\
}

static struct key_params keys[] = {
''')
    for n in xrange(n + 1):
        sys.stdout.write('	KEYS(e_%d, n_%d),\n' % (n, n))
    sys.stdout.write('};\n')
    

modes = {
    '--ssl': (print_ssl, print_ssl_keys),
    '--gcrypt': (print_gcrypt, print_gcrypt_keys),
}

try:
    mode = sys.argv[1]
    files = sys.argv[2:]
except IndexError:
    mode = None

if not mode in modes:
    print 'Usage: %s [%s] files' % (sys.argv[0], '|'.join(modes.keys()))
    sys.exit(2)

# load key
idx = 0
for f in files:
    try:
        key = RSA.load_pub_key(f)
    except RSA.RSAError:
        key = RSA.load_key(f)

    modes[mode][0]('e_%d' % idx, key.e[4:])
    modes[mode][0]('n_%d' % idx, key.n[4:])

modes[mode][1](idx)