[or-cvs] r13679: Add --passphrase-fd to tor-gencert. (in tor/trunk: . doc src/tools)

nickm at seul.org nickm at seul.org
Fri Feb 22 19:07:52 UTC 2008


Author: nickm
Date: 2008-02-22 14:07:52 -0500 (Fri, 22 Feb 2008)
New Revision: 13679

Modified:
   tor/trunk/
   tor/trunk/ChangeLog
   tor/trunk/doc/tor-gencert.1
   tor/trunk/src/tools/tor-gencert.c
Log:
 r14396 at tombo:  nickm | 2008-02-22 14:07:37 -0500
 Add --passphrase-fd to tor-gencert.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r14396] on 49666b30-7950-49c5-bedf-9dc8f3168102

Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2008-02-22 19:03:09 UTC (rev 13678)
+++ tor/trunk/ChangeLog	2008-02-22 19:07:52 UTC (rev 13679)
@@ -58,6 +58,10 @@
     - When built with --enable-gcc-warnings, check for whether Apple's
       warning "-Wshorten-64-to-32" is enabled.
 
+  o Minor features (misc):
+    - Add a --passphrase-fd argument to tor-gencert command for
+      scriptability.
+
   o Minor bugfixes:
     - Log the correct memory chunk sizes for empty RAM chunks in mempool.c.
     - Directory mirrors no longer include a guess at the client's IP

Modified: tor/trunk/doc/tor-gencert.1
===================================================================
--- tor/trunk/doc/tor-gencert.1	2008-02-22 19:03:09 UTC (rev 13678)
+++ tor/trunk/doc/tor-gencert.1	2008-02-22 19:07:52 UTC (rev 13679)
@@ -63,6 +63,11 @@
 Number of months that the certificate should be valid.  Default: 12.
 .LP
 .TP
+\fB--passphrase-fd \fR\fIFILEDES\fP
+Filedescriptor to read the file descriptor from.  Ends at the first
+NUL or newline.  Default: read from the terminal.
+.LP
+.TP
 \fB-a \fR\fIaddress\fR:\fIport\fP
 If provided, advertise the address:port combination as this authority's
 preferred directory port in its certificate.  If the address is a hostname,

Modified: tor/trunk/src/tools/tor-gencert.c
===================================================================
--- tor/trunk/src/tools/tor-gencert.c	2008-02-22 19:03:09 UTC (rev 13678)
+++ tor/trunk/src/tools/tor-gencert.c	2008-02-22 19:07:52 UTC (rev 13679)
@@ -44,8 +44,12 @@
 int verbose = 0;
 int make_new_id = 0;
 int months_lifetime = DEFAULT_LIFETIME;
+int passphrase_fd = -1;
 char *address = NULL;
 
+char *passphrase = NULL;
+size_t passphrase_len = 0;
+
 EVP_PKEY *identity_key = NULL;
 EVP_PKEY *signing_key = NULL;
 
@@ -57,7 +61,8 @@
           "tor-gencert [-h|--help] [-v] [-r|--reuse] [--create-identity-key]\n"
           "        [-i identity_key_file] [-s signing_key_file] "
           "[-c certificate_file]\n"
-          "        [-m lifetime_in_months] [-a address:port]\n");
+          "        [-m lifetime_in_months] [-a address:port] "
+          "[--passphrase-fd <fd>]\n");
 
 }
 
@@ -83,6 +88,34 @@
   }
 }
 
+/** Read the passphrase from the passphrase fd. */
+static int
+load_passphrase(void)
+{
+  char *cp;
+  char buf[1024]; /* "Ought to be enough for anybody." */
+  int n = read_all(passphrase_fd, buf, sizeof(buf), 0);
+  if (n < 0) {
+    log_err(LD_GENERAL, "Couldn't read from passphrase fd: %s",
+            strerror(errno));
+    return -1;
+  }
+  cp = memchr(buf, '\n', n);
+  passphrase_len = cp-buf;
+  passphrase = tor_strndup(buf, passphrase_len);
+  memset(buf, 0, sizeof(buf));
+  return 0;
+}
+
+static void
+clear_passphrase(void)
+{
+  if (passphrase) {
+    memset(passphrase, 0, passphrase_len);
+    tor_free(passphrase);
+  }
+}
+
 /** Read the command line options from <b>argc</b> and <b>argv</b>,
  * setting global option vars as needed.
  */
@@ -143,6 +176,12 @@
       tor_snprintf(address, INET_NTOA_BUF_LEN+32, "%s:%d", b, (int)port);
     } else if (!strcmp(argv[i], "--create-identity-key")) {
       make_new_id = 1;
+    } else if (!strcmp(argv[i], "--passphrase-fd")) {
+      if (i+1>=argc) {
+        fprintf(stderr, "No argument to -m\n");
+        return 1;
+      }
+      passphrase_fd = atoi(argv[++i]);
     } else {
       fprintf(stderr, "Unrecognized option %s\n", argv[i]);
       return 1;
@@ -170,6 +209,10 @@
     log_info(LD_GENERAL, "No signing key file given; defaulting to %s",
              certificate_file);
   }
+  if (passphrase_fd >= 0) {
+    if (load_passphrase()<0)
+      return 1;
+  }
   return 0;
 }
 
@@ -209,9 +252,11 @@
                                           &open_file)))
       return 1;
 
+    /* Write the key to the file.  If passphrase is not set, takes it from
+     * the terminal. */
     if (!PEM_write_PKCS8PrivateKey_nid(f, identity_key,
                                        NID_pbe_WithSHA1And3_Key_TripleDES_CBC,
-                                       NULL, 0, /* no password here. */
+                                       passphrase, (int)passphrase_len,
                                        NULL, NULL)) {
       log_err(LD_GENERAL, "Couldn't write identity key to %s",
               identity_key_file);
@@ -235,7 +280,8 @@
       return 1;
     }
 
-    identity_key = PEM_read_PrivateKey(f, NULL, NULL, NULL);
+    /* Read the key.  If passphrase is not set, takes it from the terminal. */
+    identity_key = PEM_read_PrivateKey(f, NULL, NULL, passphrase);
     if (!identity_key) {
       log_err(LD_GENERAL, "Couldn't read identity key from %s",
               identity_key_file);
@@ -444,6 +490,7 @@
 
   r = 0;
  done:
+  clear_passphrase();
   if (identity_key)
     EVP_PKEY_free(identity_key);
   if (signing_key)



More information about the tor-commits mailing list