Stringizing Operator, Token concatenation
After many years, even C shows new stuff:
Stringizing Operator
#define QUOTEME(x) #x
According to wiki:
Although macro expansion does not occur within a quoted string, the text of the macro arguments can be quoted and treated as a string literal by using the "#" directive (also known as the "Stringizing Operator").
the code
printf("%s\n", QUOTEME(1+2));
will expand to
printf("%s\n", "1+2");
Token concatenation
Token concatenation, also called token pasting, is one of the most subtle — and easy to abuse — features of the C macro preprocessor. Two arguments can be 'glued' together using ## preprocessor operator; this allows two tokens to be concatenated in the preprocessed code. This can be used to construct elaborate macros which act like a crude version of C++ templates.
For instance:
#define MYCASE(item,id) \ case id: \ item##_##id = id;\ break
the code
MYCASE(widget,23);
will expand to
widget_23 = 23;
create signature (of hash) with openssl c api
This is just too long...
You can find another version where all return value is checked here
EDIT: There is another solution, with SHA256_x to create digest and RSA_sign to sign here
/* gcc ./openssl_sign.c -lssl */
#include s<tdio.h>
#include <string.h>
#include <error.h>
#include <openssl/rsa.h>
#include <openssl/pem.h>
#include <openssl/err.h>
#include <openssl/ssl.h>
#include o<penssl/evp.h>
int pass_cb( char *buf, int size, int rwflag, void *u )
{
int len;
char tmp[1024];
printf( "Enter pass phrase for '%s': ", (char*)u );
scanf( "%s", tmp );
len = strlen( tmp );
if ( len <= 0 ) return 0;
if ( len > size ) len = size;
memset( buf, '\0', size );
memcpy( buf, tmp, len );
return len;
}
RSA* getRsaFp( const char* rsaprivKeyPath )
{
FILE* fp;
fp = fopen( rsaprivKeyPath, "r" );
if ( fp == 0 ) {
fprintf( stderr, "Couldn't open RSA priv key: '%s'. %s\n",
rsaprivKeyPath, strerror(errno) );
exit(1);
}
RSA *rsa = 0;
rsa = RSA_new();
rsa = PEM_read_RSAPrivateKey(fp, 0, pass_cb, (char*)rsaprivKeyPath);
fclose( fp );
return rsa;
}
int main( int argc, char* argv[] )
{
if ( argc != 2 ) {
fprintf( stderr, "Usage: %s <text to sign>\n", argv[0] );
exit( 1 );
}
const char *clearText = argv[1];
char rsaprivKeyPath[1024];
sprintf( rsaprivKeyPath, "%s/.ssh/id_rsa", getenv ("HOME") );
SSL_load_error_strings();
OpenSSL_add_all_algorithms();
OpenSSL_add_all_ciphers();
OpenSSL_add_all_digests();
EVP_PKEY *evpKey = 0;
evpKey = EVP_PKEY_new();
RSA *rsa = 0;
rsa = getRsaFp( rsaprivKeyPath );
EVP_PKEY_set1_RSA( evpKey, rsa );
EVP_MD_CTX* ctx = 0;
ctx = EVP_MD_CTX_create();
EVP_SignInit_ex( ctx, EVP_sha1(), 0 );
EVP_SignUpdate( ctx, clearText, strlen( clearText ) );
const int MAX_LEN = 1024;
unsigned char sig[MAX_LEN];
unsigned int sigLen;
memset(sig, 0, MAX_LEN);
EVP_SignFinal( ctx, sig, &sigLen, evpKey );
printf( "Got signature: '%s'\n", sig );
EVP_MD_CTX_destroy( ctx );
RSA_free( rsa );
EVP_PKEY_free( evpKey );
ERR_free_strings();
return 0;
}