237 lines
4.9 KiB
C
Raw Normal View History

2018-05-06 12:27:04 +00:00
/* $OpenBSD: key.c,v 1.132 2017/12/18 02:25:15 djm Exp $ */
/*
2015-01-05 16:09:55 +00:00
* placed in the public domain
*/
2006-09-30 13:29:51 +00:00
#include "includes.h"
2006-09-30 13:29:51 +00:00
#include <sys/types.h>
2015-01-05 16:09:55 +00:00
#include <errno.h>
2006-09-30 13:29:51 +00:00
#include <stdarg.h>
#include <stdio.h>
2015-07-02 13:15:34 +00:00
#include <limits.h>
2006-09-30 13:29:51 +00:00
2015-01-05 16:09:55 +00:00
#define SSH_KEY_NO_DEFINE
#include "key.h"
2010-03-08 11:19:52 +00:00
2015-01-05 16:09:55 +00:00
#include "compat.h"
#include "sshkey.h"
#include "ssherr.h"
#include "log.h"
#include "authfile.h"
2002-06-29 11:34:13 +00:00
2015-01-05 16:09:55 +00:00
static void
fatal_on_fatal_errors(int r, const char *func, int extra_fatal)
{
2015-01-05 16:09:55 +00:00
if (r == SSH_ERR_INTERNAL_ERROR ||
r == SSH_ERR_ALLOC_FAIL ||
(extra_fatal != 0 && r == extra_fatal))
fatal("%s: %s", func, ssh_err(r));
}
2014-01-30 10:56:49 +00:00
Key *
key_from_blob(const u_char *blob, u_int blen)
{
2015-01-05 16:09:55 +00:00
int r;
Key *ret = NULL;
if ((r = sshkey_from_blob(blob, blen, &ret)) != 0) {
fatal_on_fatal_errors(r, __func__, 0);
error("%s: %s", __func__, ssh_err(r));
return NULL;
}
return ret;
2014-01-30 10:56:49 +00:00
}
2015-01-05 16:09:55 +00:00
int
key_to_blob(const Key *key, u_char **blobp, u_int *lenp)
{
2015-01-05 16:09:55 +00:00
u_char *blob;
size_t blen;
int r;
2014-01-30 10:56:49 +00:00
if (blobp != NULL)
*blobp = NULL;
if (lenp != NULL)
*lenp = 0;
2015-01-05 16:09:55 +00:00
if ((r = sshkey_to_blob(key, &blob, &blen)) != 0) {
fatal_on_fatal_errors(r, __func__, 0);
error("%s: %s", __func__, ssh_err(r));
2002-03-18 09:55:03 +00:00
return 0;
}
2015-01-05 16:09:55 +00:00
if (blen > INT_MAX)
fatal("%s: giant len %zu", __func__, blen);
if (blobp != NULL)
*blobp = blob;
if (lenp != NULL)
2015-01-05 16:09:55 +00:00
*lenp = blen;
return blen;
2013-03-22 11:19:48 +00:00
}
int
2015-01-05 16:09:55 +00:00
key_sign(const Key *key, u_char **sigp, u_int *lenp,
2016-03-10 20:10:25 +00:00
const u_char *data, u_int datalen, const char *alg)
{
2015-01-05 16:09:55 +00:00
int r;
u_char *sig;
size_t siglen;
if (sigp != NULL)
*sigp = NULL;
if (lenp != NULL)
*lenp = 0;
if ((r = sshkey_sign(key, &sig, &siglen,
2016-03-10 20:10:25 +00:00
data, datalen, alg, datafellows)) != 0) {
2015-01-05 16:09:55 +00:00
fatal_on_fatal_errors(r, __func__, 0);
error("%s: %s", __func__, ssh_err(r));
return -1;
}
2015-01-05 16:09:55 +00:00
if (siglen > INT_MAX)
fatal("%s: giant len %zu", __func__, siglen);
if (sigp != NULL)
*sigp = sig;
if (lenp != NULL)
*lenp = siglen;
return 0;
}
2002-06-23 14:01:54 +00:00
Key *
2004-02-26 10:38:49 +00:00
key_demote(const Key *k)
2002-06-23 14:01:54 +00:00
{
2015-01-05 16:09:55 +00:00
int r;
Key *ret = NULL;
2010-03-08 11:19:52 +00:00
2015-01-05 16:09:55 +00:00
if ((r = sshkey_demote(k, &ret)) != 0)
fatal("%s: %s", __func__, ssh_err(r));
return ret;
2010-03-08 11:19:52 +00:00
}
int
key_drop_cert(Key *k)
{
2015-01-05 16:09:55 +00:00
int r;
if ((r = sshkey_drop_cert(k)) != 0) {
fatal_on_fatal_errors(r, __func__, 0);
error("%s: %s", __func__, ssh_err(r));
2010-03-08 11:19:52 +00:00
return -1;
}
2014-01-30 10:56:49 +00:00
return 0;
2010-03-08 11:19:52 +00:00
}
int
key_cert_check_authority(const Key *k, int want_host, int require_principal,
const char *name, const char **reason)
{
2015-01-05 16:09:55 +00:00
int r;
if ((r = sshkey_cert_check_authority(k, want_host, require_principal,
name, reason)) != 0) {
fatal_on_fatal_errors(r, __func__, 0);
error("%s: %s", __func__, ssh_err(r));
2010-03-08 11:19:52 +00:00
return -1;
}
return 0;
}
2010-11-08 10:45:44 +00:00
2015-01-05 16:09:55 +00:00
/* authfile.c */
Key *
key_load_cert(const char *filename)
{
int r;
Key *ret = NULL;
if ((r = sshkey_load_cert(filename, &ret)) != 0) {
fatal_on_fatal_errors(r, __func__, SSH_ERR_LIBCRYPTO_ERROR);
/* Old authfile.c ignored all file errors. */
if (r == SSH_ERR_SYSTEM_ERROR)
debug("%s: %s", __func__, ssh_err(r));
else
error("%s: %s", __func__, ssh_err(r));
return NULL;
2011-02-17 11:47:40 +00:00
}
2015-01-05 16:09:55 +00:00
return ret;
2011-02-17 11:47:40 +00:00
2015-01-05 16:09:55 +00:00
}
2011-02-17 11:47:40 +00:00
2015-01-05 16:09:55 +00:00
Key *
key_load_public(const char *filename, char **commentp)
{
int r;
Key *ret = NULL;
if ((r = sshkey_load_public(filename, &ret, commentp)) != 0) {
fatal_on_fatal_errors(r, __func__, SSH_ERR_LIBCRYPTO_ERROR);
/* Old authfile.c ignored all file errors. */
if (r == SSH_ERR_SYSTEM_ERROR)
debug("%s: %s", __func__, ssh_err(r));
else
error("%s: %s", __func__, ssh_err(r));
return NULL;
2011-02-17 11:47:40 +00:00
}
return ret;
}
2015-01-05 16:09:55 +00:00
Key *
key_load_private(const char *path, const char *passphrase,
char **commentp)
{
int r;
Key *ret = NULL;
if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) {
fatal_on_fatal_errors(r, __func__, SSH_ERR_LIBCRYPTO_ERROR);
/* Old authfile.c ignored all file errors. */
if (r == SSH_ERR_SYSTEM_ERROR ||
r == SSH_ERR_KEY_WRONG_PASSPHRASE)
debug("%s: %s", __func__, ssh_err(r));
else
error("%s: %s", __func__, ssh_err(r));
return NULL;
2011-02-17 11:47:40 +00:00
}
2015-01-05 16:09:55 +00:00
return ret;
}
2011-02-17 11:47:40 +00:00
2015-01-05 16:09:55 +00:00
Key *
key_load_private_cert(int type, const char *filename, const char *passphrase,
int *perm_ok)
{
int r;
Key *ret = NULL;
if ((r = sshkey_load_private_cert(type, filename, passphrase,
&ret, perm_ok)) != 0) {
fatal_on_fatal_errors(r, __func__, SSH_ERR_LIBCRYPTO_ERROR);
/* Old authfile.c ignored all file errors. */
if (r == SSH_ERR_SYSTEM_ERROR ||
r == SSH_ERR_KEY_WRONG_PASSPHRASE)
debug("%s: %s", __func__, ssh_err(r));
else
error("%s: %s", __func__, ssh_err(r));
return NULL;
2011-02-17 11:47:40 +00:00
}
return ret;
}
2015-01-05 16:09:55 +00:00
Key *
key_load_private_type(int type, const char *filename, const char *passphrase,
char **commentp, int *perm_ok)
{
int r;
Key *ret = NULL;
if ((r = sshkey_load_private_type(type, filename, passphrase,
&ret, commentp, perm_ok)) != 0) {
fatal_on_fatal_errors(r, __func__, SSH_ERR_LIBCRYPTO_ERROR);
/* Old authfile.c ignored all file errors. */
if (r == SSH_ERR_SYSTEM_ERROR ||
(r == SSH_ERR_KEY_WRONG_PASSPHRASE))
debug("%s: %s", __func__, ssh_err(r));
else
error("%s: %s", __func__, ssh_err(r));
return NULL;
2011-02-17 11:47:40 +00:00
}
2015-01-05 16:09:55 +00:00
return ret;
2011-02-17 11:47:40 +00:00
}