1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
|
/*
* ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
*
* Copyright (c) 2000-2014 ircd-hybrid development team
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
* USA
*/
/*! \file rsa.c
* \brief Functions for use with RSA public key cryptography.
* \version $Id$
*/
#include "stdinc.h"
#ifdef HAVE_LIBCRYPTO
#include <openssl/pem.h>
#include <openssl/rand.h>
#include <openssl/rsa.h>
#include <openssl/bn.h>
#include <openssl/evp.h>
#include <openssl/err.h>
#include <openssl/opensslv.h>
#include "memory.h"
#include "rsa.h"
#include "conf.h"
#include "log.h"
/*
* report_crypto_errors - Dump crypto error list to log
*/
void
report_crypto_errors(void)
{
unsigned long e = 0;
while ((e = ERR_get_error()))
ilog(LOG_TYPE_IRCD, "SSL error: %s", ERR_error_string(e, 0));
}
static void
binary_to_hex(unsigned char *bin, char *hex, int length)
{
static const char trans[] = "0123456789ABCDEF";
int i;
for (i = 0; i < length; ++i)
{
hex[(i << 1) ] = trans[bin[i] >> 4];
hex[(i << 1) + 1] = trans[bin[i] & 0xf];
}
hex[i << 1] = '\0';
}
int
get_randomness(unsigned char *buf, int length)
{
/* Seed OpenSSL PRNG with EGD enthropy pool -kre */
if (ConfigFileEntry.use_egd &&
ConfigFileEntry.egdpool_path)
if (RAND_egd(ConfigFileEntry.egdpool_path) == -1)
return -1;
if (RAND_status())
return RAND_bytes(buf, length);
/* XXX - abort? */
return RAND_pseudo_bytes(buf, length);
}
int
generate_challenge(char **r_challenge, char **r_response, RSA *rsa)
{
unsigned char secret[32], *tmp;
unsigned long length;
int ret = -1;
if (!rsa)
return -1;
get_randomness(secret, 32);
*r_response = MyMalloc(65);
binary_to_hex(secret, *r_response, 32);
length = RSA_size(rsa);
tmp = MyMalloc(length);
ret = RSA_public_encrypt(32, secret, tmp, rsa, RSA_PKCS1_PADDING);
*r_challenge = MyMalloc((length << 1) + 1);
binary_to_hex( tmp, *r_challenge, length);
(*r_challenge)[length<<1] = 0;
MyFree(tmp);
if (ret < 0)
{
report_crypto_errors();
return -1;
}
return 0;
}
#endif
|