summary refs log tree commit diff stats
path: root/libotr/libotr-4.1.1/toolkit/otr_mackey.c
diff options
context:
space:
mode:
authorSoniEx2 <endermoneymod@gmail.com>2021-04-09 07:19:03 -0300
committerSoniEx2 <endermoneymod@gmail.com>2021-04-09 07:19:03 -0300
commit0e752a6e215aee21dc73da097c3225495d54a5b6 (patch)
treeb81be02cbf2f06aebf322ac4a5d014b44176bba5 /libotr/libotr-4.1.1/toolkit/otr_mackey.c
parent7754076c715285173311a1b6811ce377950e18a6 (diff)
Add libotr/etc sources
Diffstat (limited to 'libotr/libotr-4.1.1/toolkit/otr_mackey.c')
-rw-r--r--libotr/libotr-4.1.1/toolkit/otr_mackey.c65
1 files changed, 65 insertions, 0 deletions
diff --git a/libotr/libotr-4.1.1/toolkit/otr_mackey.c b/libotr/libotr-4.1.1/toolkit/otr_mackey.c
new file mode 100644
index 0000000..cf2b4eb
--- /dev/null
+++ b/libotr/libotr-4.1.1/toolkit/otr_mackey.c
@@ -0,0 +1,65 @@
+/*
+ *  Off-the-Record Messaging Toolkit
+ *  Copyright (C) 2004-2012  Ian Goldberg, Chris Alexander, Nikita Borisov
+ *                           <otr@cypherpunks.ca>
+ *
+ *  This program is free software; you can redistribute it and/or modify
+ *  it under the terms of version 2 of the GNU General Public License as
+ *  published by the Free Software Foundation.
+ *
+ *  This program is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU General Public License
+ *  along with this program; if not, write to the Free Software
+ *  Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+/* system headers */
+#include <stdio.h>
+#include <stdlib.h>
+
+/* toolkit headers */
+#include "parse.h"
+#include "sesskeys.h"
+
+static void usage(const char *progname)
+{
+    fprintf(stderr, "Usage: %s aeskey\n"
+"Calculate and display the MAC key derived from a given AES key.\n",
+	progname);
+    exit(1);
+}
+
+int main(int argc, char **argv)
+{
+    unsigned char *argbuf;
+    size_t argbuflen;
+    unsigned char mackey[20];
+
+    if (argc != 2) {
+	usage(argv[0]);
+    }
+
+    argv_to_buf(&argbuf, &argbuflen, argv[1]);
+    /* AES keys are 128 bits long, so check for that */
+    if (!argbuf) {
+	usage(argv[0]);
+    }
+
+    if (argbuflen != 16) {
+	fprintf(stderr, "The AES key must be 32 hex chars long.\n");
+	usage(argv[0]);
+    }
+
+    sesskeys_make_mac(mackey, argbuf);
+
+    dump_data(stdout, "AES key", argbuf, 16);
+    dump_data(stdout, "MAC key", mackey, 20);
+
+    free(argbuf);
+    fflush(stdout);
+    return 0;
+}