src/sbin/isakmpd/key.c

183 lines
4.2 KiB
C

/* $OpenBSD: key.c,v 1.27 2021/10/13 16:57:43 tb Exp $ */
/*
* The author of this code is Angelos D. Keromytis (angelos@cis.upenn.edu)
*
* Copyright (c) 2000-2001 Angelos D. Keromytis.
*
* Permission to use, copy, and modify this software with or without fee
* is hereby granted, provided that this entire notice is included in
* all copies of any software which is or includes a copy or
* modification of this software.
* You may use this code under the GNU public license if you so wish. Please
* contribute changes back to the authors under this freer than GPL license
* so that we may further the use of strong encryption without limitations to
* all.
*
* THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR
* IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY
* REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE
* MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR
* PURPOSE.
*/
#include <netinet/in.h>
#include <string.h>
#include <stdlib.h>
#include "key.h"
#include "libcrypto.h"
#include "log.h"
#include "util.h"
#include "x509.h"
void
key_free(int type, int private, void *key)
{
switch (type) {
case ISAKMP_KEY_PASSPHRASE:
free(key);
break;
case ISAKMP_KEY_RSA:
RSA_free(key);
break;
case ISAKMP_KEY_NONE:
default:
log_error("key_free: unknown/unsupportedkey type %d", type);
break;
}
}
/* Convert from internal form to serialized */
void
key_serialize(int type, int private, void *key, u_int8_t **data,
size_t *datalenp)
{
u_int8_t *p;
size_t datalen;
switch (type) {
case ISAKMP_KEY_PASSPHRASE:
*datalenp = strlen((char *)key);
*data = (u_int8_t *)strdup((char *)key);
break;
case ISAKMP_KEY_RSA:
switch (private) {
case ISAKMP_KEYTYPE_PUBLIC:
datalen = i2d_RSAPublicKey((RSA *)key, NULL);
*data = p = malloc(datalen);
if (!p) {
log_error("key_serialize: malloc (%lu) failed",
(unsigned long)datalen);
return;
}
*datalenp = i2d_RSAPublicKey((RSA *) key, &p);
break;
case ISAKMP_KEYTYPE_PRIVATE:
datalen = i2d_RSAPrivateKey((RSA *)key, NULL);
*data = p = malloc(datalen);
if (!p) {
log_error("key_serialize: malloc (%lu) failed",
(unsigned long)datalen);
return;
}
*datalenp = i2d_RSAPrivateKey((RSA *)key, &p);
break;
}
break;
default:
log_error("key_serialize: unknown/unsupported key type %d",
type);
break;
}
}
/* Convert from serialized to printable */
char *
key_printable(int type, int private, u_int8_t *data, size_t datalen)
{
switch (type) {
case ISAKMP_KEY_PASSPHRASE:
return strdup((char *)data);
case ISAKMP_KEY_RSA:
return raw2hex(data, datalen);
default:
log_error("key_printable: unknown/unsupported key type %d",
type);
return 0;
}
}
/* Convert from serialized to internal. */
void *
key_internalize(int type, int private, u_int8_t *data, size_t datalen)
{
switch (type) {
case ISAKMP_KEY_PASSPHRASE:
return strdup((char *)data);
case ISAKMP_KEY_RSA:
switch (private) {
case ISAKMP_KEYTYPE_PUBLIC:
return d2i_RSAPublicKey(NULL,
(const u_int8_t **)&data, datalen);
case ISAKMP_KEYTYPE_PRIVATE:
return d2i_RSAPrivateKey(NULL,
(const u_int8_t **)&data, datalen);
default:
log_error("key_internalize: not public or private "
"RSA key passed");
return 0;
}
break;
default:
log_error("key_internalize: unknown/unsupported key type %d",
type);
break;
}
return 0;
}
/* Convert from printable to serialized */
void
key_from_printable(int type, int private, char *key, u_int8_t **data,
u_int32_t *datalenp)
{
u_int32_t datalen;
switch (type) {
case ISAKMP_KEY_PASSPHRASE:
*datalenp = strlen(key);
*data = (u_int8_t *) strdup(key);
break;
case ISAKMP_KEY_RSA:
datalen = (strlen(key) + 1) / 2; /* Round up, just in case */
*data = malloc(datalen);
if (!*data) {
log_error("key_from_printable: malloc (%d) failed",
datalen);
*datalenp = 0;
return;
}
if (hex2raw(key, *data, datalen)) {
log_error("key_from_printable: invalid hex key");
free(*data);
*data = NULL;
*datalenp = 0;
return;
}
*datalenp = datalen;
break;
default:
log_error("key_from_printable: "
"unknown/unsupported key type %d", type);
*data = NULL;
*datalenp = 0;
break;
}
}