/* $OpenBSD: key.c,v 1.27 2021/10/13 16:57:43 tb Exp $ */ /* * The author of this code is Angelos D. Keromytis (angelos@cis.upenn.edu) * * Copyright (c) 2000-2001 Angelos D. Keromytis. * * Permission to use, copy, and modify this software with or without fee * is hereby granted, provided that this entire notice is included in * all copies of any software which is or includes a copy or * modification of this software. * You may use this code under the GNU public license if you so wish. Please * contribute changes back to the authors under this freer than GPL license * so that we may further the use of strong encryption without limitations to * all. * * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR * IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE * MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR * PURPOSE. */ #include #include #include #include "key.h" #include "libcrypto.h" #include "log.h" #include "util.h" #include "x509.h" void key_free(int type, int private, void *key) { switch (type) { case ISAKMP_KEY_PASSPHRASE: free(key); break; case ISAKMP_KEY_RSA: RSA_free(key); break; case ISAKMP_KEY_NONE: default: log_error("key_free: unknown/unsupportedkey type %d", type); break; } } /* Convert from internal form to serialized */ void key_serialize(int type, int private, void *key, u_int8_t **data, size_t *datalenp) { u_int8_t *p; size_t datalen; switch (type) { case ISAKMP_KEY_PASSPHRASE: *datalenp = strlen((char *)key); *data = (u_int8_t *)strdup((char *)key); break; case ISAKMP_KEY_RSA: switch (private) { case ISAKMP_KEYTYPE_PUBLIC: datalen = i2d_RSAPublicKey((RSA *)key, NULL); *data = p = malloc(datalen); if (!p) { log_error("key_serialize: malloc (%lu) failed", (unsigned long)datalen); return; } *datalenp = i2d_RSAPublicKey((RSA *) key, &p); break; case ISAKMP_KEYTYPE_PRIVATE: datalen = i2d_RSAPrivateKey((RSA *)key, NULL); *data = p = malloc(datalen); if (!p) { log_error("key_serialize: malloc (%lu) failed", (unsigned long)datalen); return; } *datalenp = i2d_RSAPrivateKey((RSA *)key, &p); break; } break; default: log_error("key_serialize: unknown/unsupported key type %d", type); break; } } /* Convert from serialized to printable */ char * key_printable(int type, int private, u_int8_t *data, size_t datalen) { switch (type) { case ISAKMP_KEY_PASSPHRASE: return strdup((char *)data); case ISAKMP_KEY_RSA: return raw2hex(data, datalen); default: log_error("key_printable: unknown/unsupported key type %d", type); return 0; } } /* Convert from serialized to internal. */ void * key_internalize(int type, int private, u_int8_t *data, size_t datalen) { switch (type) { case ISAKMP_KEY_PASSPHRASE: return strdup((char *)data); case ISAKMP_KEY_RSA: switch (private) { case ISAKMP_KEYTYPE_PUBLIC: return d2i_RSAPublicKey(NULL, (const u_int8_t **)&data, datalen); case ISAKMP_KEYTYPE_PRIVATE: return d2i_RSAPrivateKey(NULL, (const u_int8_t **)&data, datalen); default: log_error("key_internalize: not public or private " "RSA key passed"); return 0; } break; default: log_error("key_internalize: unknown/unsupported key type %d", type); break; } return 0; } /* Convert from printable to serialized */ void key_from_printable(int type, int private, char *key, u_int8_t **data, u_int32_t *datalenp) { u_int32_t datalen; switch (type) { case ISAKMP_KEY_PASSPHRASE: *datalenp = strlen(key); *data = (u_int8_t *) strdup(key); break; case ISAKMP_KEY_RSA: datalen = (strlen(key) + 1) / 2; /* Round up, just in case */ *data = malloc(datalen); if (!*data) { log_error("key_from_printable: malloc (%d) failed", datalen); *datalenp = 0; return; } if (hex2raw(key, *data, datalen)) { log_error("key_from_printable: invalid hex key"); free(*data); *data = NULL; *datalenp = 0; return; } *datalenp = datalen; break; default: log_error("key_from_printable: " "unknown/unsupported key type %d", type); *data = NULL; *datalenp = 0; break; } }