Stringizing Operator, Token concatenation
After many years, even C shows new stuff:
Stringizing Operator
#define QUOTEME(x) #x
According to wiki:
Although macro expansion does not occur within a quoted string, the text of the macro arguments can be quoted and treated as a string literal by using the "#" directive (also known as the "Stringizing Operator").
the code
printf("%s\n", QUOTEME(1+2));
will expand to
printf("%s\n", "1+2");
Token concatenation
Token concatenation, also called token pasting, is one of the most subtle — and easy to abuse — features of the C macro preprocessor. Two arguments can be 'glued' together using ## preprocessor operator; this allows two tokens to be concatenated in the preprocessed code. This can be used to construct elaborate macros which act like a crude version of C++ templates.
For instance:
#define MYCASE(item,id) \ case id: \ item##_##id = id;\ break
the code
MYCASE(widget,23);
will expand to
widget_23 = 23;
create signature (of hash) with openssl c api
This is just too long...
You can find another version where all return value is checked here
EDIT: There is another solution, with SHA256_x to create digest and RSA_sign to sign here
/* gcc ./openssl_sign.c -lssl */ #include s<tdio.h> #include <string.h> #include <error.h> #include <openssl/rsa.h> #include <openssl/pem.h> #include <openssl/err.h> #include <openssl/ssl.h> #include o<penssl/evp.h> int pass_cb( char *buf, int size, int rwflag, void *u ) { int len; char tmp[1024]; printf( "Enter pass phrase for '%s': ", (char*)u ); scanf( "%s", tmp ); len = strlen( tmp ); if ( len <= 0 ) return 0; if ( len > size ) len = size; memset( buf, '\0', size ); memcpy( buf, tmp, len ); return len; } RSA* getRsaFp( const char* rsaprivKeyPath ) { FILE* fp; fp = fopen( rsaprivKeyPath, "r" ); if ( fp == 0 ) { fprintf( stderr, "Couldn't open RSA priv key: '%s'. %s\n", rsaprivKeyPath, strerror(errno) ); exit(1); } RSA *rsa = 0; rsa = RSA_new(); rsa = PEM_read_RSAPrivateKey(fp, 0, pass_cb, (char*)rsaprivKeyPath); fclose( fp ); return rsa; } int main( int argc, char* argv[] ) { if ( argc != 2 ) { fprintf( stderr, "Usage: %s <text to sign>\n", argv[0] ); exit( 1 ); } const char *clearText = argv[1]; char rsaprivKeyPath[1024]; sprintf( rsaprivKeyPath, "%s/.ssh/id_rsa", getenv ("HOME") ); SSL_load_error_strings(); OpenSSL_add_all_algorithms(); OpenSSL_add_all_ciphers(); OpenSSL_add_all_digests(); EVP_PKEY *evpKey = 0; evpKey = EVP_PKEY_new(); RSA *rsa = 0; rsa = getRsaFp( rsaprivKeyPath ); EVP_PKEY_set1_RSA( evpKey, rsa ); EVP_MD_CTX* ctx = 0; ctx = EVP_MD_CTX_create(); EVP_SignInit_ex( ctx, EVP_sha1(), 0 ); EVP_SignUpdate( ctx, clearText, strlen( clearText ) ); const int MAX_LEN = 1024; unsigned char sig[MAX_LEN]; unsigned int sigLen; memset(sig, 0, MAX_LEN); EVP_SignFinal( ctx, sig, &sigLen, evpKey ); printf( "Got signature: '%s'\n", sig ); EVP_MD_CTX_destroy( ctx ); RSA_free( rsa ); EVP_PKEY_free( evpKey ); ERR_free_strings(); return 0; }