bdc155d820
Approved by: roberto
188 lines
3.6 KiB
C
188 lines
3.6 KiB
C
/*
|
|
* ssl_init.c Common OpenSSL initialization code for the various
|
|
* programs which use it.
|
|
*
|
|
* Moved from ntpd/ntp_crypto.c crypto_setup()
|
|
*/
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
#include <ctype.h>
|
|
#include <ntp.h>
|
|
#include <ntp_debug.h>
|
|
#include <lib_strbuf.h>
|
|
|
|
#ifdef OPENSSL
|
|
#include "openssl/err.h"
|
|
#include "openssl/evp.h"
|
|
|
|
void atexit_ssl_cleanup(void);
|
|
|
|
int ssl_init_done;
|
|
|
|
void
|
|
ssl_init(void)
|
|
{
|
|
init_lib();
|
|
|
|
if (ssl_init_done)
|
|
return;
|
|
|
|
ERR_load_crypto_strings();
|
|
OpenSSL_add_all_algorithms();
|
|
atexit(&atexit_ssl_cleanup);
|
|
|
|
ssl_init_done = TRUE;
|
|
}
|
|
|
|
|
|
void
|
|
atexit_ssl_cleanup(void)
|
|
{
|
|
if (!ssl_init_done)
|
|
return;
|
|
|
|
ssl_init_done = FALSE;
|
|
EVP_cleanup();
|
|
ERR_free_strings();
|
|
}
|
|
|
|
|
|
void
|
|
ssl_check_version(void)
|
|
{
|
|
if ((SSLeay() ^ OPENSSL_VERSION_NUMBER) & ~0xff0L) {
|
|
msyslog(LOG_WARNING,
|
|
"OpenSSL version mismatch. Built against %lx, you have %lx",
|
|
(u_long)OPENSSL_VERSION_NUMBER, SSLeay());
|
|
fprintf(stderr,
|
|
"OpenSSL version mismatch. Built against %lx, you have %lx\n",
|
|
(u_long)OPENSSL_VERSION_NUMBER, SSLeay());
|
|
}
|
|
|
|
INIT_SSL();
|
|
}
|
|
#endif /* OPENSSL */
|
|
|
|
|
|
/*
|
|
* keytype_from_text returns OpenSSL NID for digest by name, and
|
|
* optionally the associated digest length.
|
|
*
|
|
* Used by ntpd authreadkeys(), ntpq and ntpdc keytype()
|
|
*/
|
|
int
|
|
keytype_from_text(
|
|
const char *text,
|
|
size_t *pdigest_len
|
|
)
|
|
{
|
|
int key_type;
|
|
u_int digest_len;
|
|
#ifdef OPENSSL
|
|
const u_long max_digest_len = MAX_MAC_LEN - sizeof(keyid_t);
|
|
u_char digest[EVP_MAX_MD_SIZE];
|
|
char * upcased;
|
|
char * pch;
|
|
EVP_MD_CTX ctx;
|
|
|
|
/*
|
|
* OpenSSL digest short names are capitalized, so uppercase the
|
|
* digest name before passing to OBJ_sn2nid(). If it is not
|
|
* recognized but begins with 'M' use NID_md5 to be consistent
|
|
* with past behavior.
|
|
*/
|
|
INIT_SSL();
|
|
LIB_GETBUF(upcased);
|
|
strlcpy(upcased, text, LIB_BUFLENGTH);
|
|
for (pch = upcased; '\0' != *pch; pch++)
|
|
*pch = (char)toupper((unsigned char)*pch);
|
|
key_type = OBJ_sn2nid(upcased);
|
|
#else
|
|
key_type = 0;
|
|
#endif
|
|
|
|
if (!key_type && 'm' == tolower((unsigned char)text[0]))
|
|
key_type = NID_md5;
|
|
|
|
if (!key_type)
|
|
return 0;
|
|
|
|
if (NULL != pdigest_len) {
|
|
#ifdef OPENSSL
|
|
EVP_DigestInit(&ctx, EVP_get_digestbynid(key_type));
|
|
EVP_DigestFinal(&ctx, digest, &digest_len);
|
|
if (digest_len > max_digest_len) {
|
|
fprintf(stderr,
|
|
"key type %s %u octet digests are too big, max %lu\n",
|
|
keytype_name(key_type), digest_len,
|
|
max_digest_len);
|
|
msyslog(LOG_ERR,
|
|
"key type %s %u octet digests are too big, max %lu",
|
|
keytype_name(key_type), digest_len,
|
|
max_digest_len);
|
|
return 0;
|
|
}
|
|
#else
|
|
digest_len = 16;
|
|
#endif
|
|
*pdigest_len = digest_len;
|
|
}
|
|
|
|
return key_type;
|
|
}
|
|
|
|
|
|
/*
|
|
* keytype_name returns OpenSSL short name for digest by NID.
|
|
*
|
|
* Used by ntpq and ntpdc keytype()
|
|
*/
|
|
const char *
|
|
keytype_name(
|
|
int nid
|
|
)
|
|
{
|
|
static const char unknown_type[] = "(unknown key type)";
|
|
const char *name;
|
|
|
|
#ifdef OPENSSL
|
|
INIT_SSL();
|
|
name = OBJ_nid2sn(nid);
|
|
if (NULL == name)
|
|
name = unknown_type;
|
|
#else /* !OPENSSL follows */
|
|
if (NID_md5 == nid)
|
|
name = "MD5";
|
|
else
|
|
name = unknown_type;
|
|
#endif
|
|
return name;
|
|
}
|
|
|
|
|
|
/*
|
|
* Use getpassphrase() if configure.ac detected it, as Suns that
|
|
* have it truncate the password in getpass() to 8 characters.
|
|
*/
|
|
#ifdef HAVE_GETPASSPHRASE
|
|
# define getpass(str) getpassphrase(str)
|
|
#endif
|
|
|
|
/*
|
|
* getpass_keytype() -- shared between ntpq and ntpdc, only vaguely
|
|
* related to the rest of ssl_init.c.
|
|
*/
|
|
char *
|
|
getpass_keytype(
|
|
int keytype
|
|
)
|
|
{
|
|
char pass_prompt[64 + 11 + 1]; /* 11 for " Password: " */
|
|
|
|
snprintf(pass_prompt, sizeof(pass_prompt),
|
|
"%.64s Password: ", keytype_name(keytype));
|
|
|
|
return getpass(pass_prompt);
|
|
}
|