shithub: plan9front

Download patch

ref: 07c32fb3da0731570508e519e4cfaaaaf646ccfb
parent: acc504c319a4b4188479cfa602e40cb6851c0528
author: Ori Bernstein <ori@eigenstate.org>
date: Sun Jul 18 11:30:35 EDT 2021

auth/rsa2jwk: add code to produce jwk rsa keys

This is useful for acmed, and possibly other web
technologies.

--- a/sys/src/cmd/auth/mkfile	Sun Jul 18 10:59:51 2021
+++ b/sys/src/cmd/auth/mkfile	Sun Jul 18 11:30:35 2021
@@ -26,6 +26,7 @@
 	readnvram\
 	rsa2asn1\
 	rsa2csr\
+	rsa2jwk\
 	rsa2pub\
 	rsa2ssh\
 	rsa2x509\
@@ -106,10 +107,10 @@
 	rm -f *.[$OS] *.[$OS].a [$OS].* y.tab.? y.debug y.output $TARG *.acid
 
 $O.%:	$LIB
-$O.rsa2asn1 $O.rsa2ssh $O.rsafill $O.rsa2x509 $O.rsa2pub $O.rsa2csr: rsa2any.$O
+$O.rsa2asn1 $O.rsa2ssh $O.rsafill $O.rsa2x509 $O.rsa2pub $O.rsa2csr $O.rsa2jwk: rsa2any.$O
 $O.authsrv $O.guard.srv: secureidcheck.$O
 
-rsa2asn1.$O rsa2ssh.$O rsafill.$O rsa2x509.$O rsa2pub.$O rsa2csr.$O: rsa2any.h
+rsa2asn1.$O rsa2ssh.$O rsafill.$O rsa2x509.$O rsa2pub.$O rsa2csr.$O rsa2jwk.$O: rsa2any.h
 
 $BIN/netkey:V:	$O.netkey
 	cp $O.netkey /$objtype/bin/netkey
--- /dev/null	Mon Oct 18 12:05:45 2021
+++ b/sys/src/cmd/auth/rsa2jwk.c	Sun Jul 18 11:30:35 2021
@@ -0,0 +1,87 @@
+#include <u.h>
+#include <libc.h>
+#include <auth.h>
+#include <mp.h>
+#include <libsec.h>
+#include "rsa2any.h"
+
+#define between(x,min,max)	(((min-1-x) & (x-max-1))>>8)
+
+int
+encurl64chr(int o)
+{
+	int c;
+
+	c  = between(o,  0, 25) & ('A'+o);
+	c |= between(o, 26, 51) & ('a'+(o-26));
+	c |= between(o, 52, 61) & ('0'+(o-52));
+	c |= between(o, 62, 62) & ('-');
+	c |= between(o, 63, 63) & ('_');
+	return c;
+}
+
+char*
+encurl64(void *in, int n)
+{
+	int lim;
+	char *out, *p;
+
+	lim = 4*n/3 + 5;
+	if((out = malloc(lim)) == nil)
+		sysfatal("malloc: %r");
+	enc64x(out, lim, in, n, encurl64chr);
+	if((p = strchr(out, '=')) != nil)
+		*p = 0;
+	return out;
+}
+
+void
+usage(void)
+{
+	fprint(2, "usage: auth/rsa2pub [file]\n");
+	exits("usage");
+}
+
+void
+main(int argc, char **argv)
+{
+	uchar nbuf[8192], ebuf[512];
+	char *nstr, *estr;
+	RSApriv *k;
+	int nlen, elen;
+
+	fmtinstall('[', encodefmt);
+	quotefmtinstall();
+
+	ARGBEGIN{
+	default:
+		usage();
+	}ARGEND
+
+	if(argc > 1)
+		usage();
+
+	if((k = getrsakey(argc, argv, 0, nil)) == nil)
+		sysfatal("%r");
+
+	nlen = (mpsignif(k->pub.n)+7)/8;
+	if(nlen >= sizeof(nbuf))
+		sysfatal("key too big");
+	mptobe(k->pub.n, nbuf, nlen, nil);
+	nstr = encurl64(nbuf, nlen);
+
+	elen = (mpsignif(k->pub.ek)+7)/8;
+	if(elen >= sizeof(ebuf))
+		sysfatal("key too big");
+	mptobe(k->pub.ek, ebuf, elen, nil);
+	estr = encurl64(ebuf, elen);
+
+	print(
+		"{"
+		"\"kty\": \"RSA\","
+		"\"n\": \"%s\","
+		"\"e\": \"%s\""
+		"}\n",
+		nstr, estr);
+	exits(nil);
+}