/* * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd) * * Copyright (c) 2000-2014 ircd-hybrid development team * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 * USA */ /*! \file rsa.c * \brief Functions for use with RSA public key cryptography. * \version $Id$ */ #include "stdinc.h" #ifdef HAVE_LIBCRYPTO #include #include #include #include #include #include #include #include "memory.h" #include "rsa.h" #include "conf.h" #include "log.h" /* * report_crypto_errors - Dump crypto error list to log */ void report_crypto_errors(void) { unsigned long e = 0; while ((e = ERR_get_error())) ilog(LOG_TYPE_IRCD, "SSL error: %s", ERR_error_string(e, 0)); } static void binary_to_hex(const unsigned char *bin, char *hex, unsigned int length) { static const char trans[] = "0123456789ABCDEF"; for (const unsigned char *end = bin + length; bin < end; ++bin) { *hex++ = trans[*bin >> 4]; *hex++ = trans[*bin & 0xf]; } *hex = '\0'; } int get_randomness(unsigned char *buf, int length) { return RAND_bytes(buf, length); } int generate_challenge(char **r_challenge, char **r_response, RSA *rsa) { unsigned char secret[32], *tmp = NULL; unsigned long length = 0; int ret = -1; if (!rsa) return -1; if (!get_randomness(secret, 32)) { report_crypto_errors(); return -1; } *r_response = MyMalloc(65); binary_to_hex(secret, *r_response, 32); length = RSA_size(rsa); tmp = MyMalloc(length); ret = RSA_public_encrypt(32, secret, tmp, rsa, RSA_PKCS1_PADDING); *r_challenge = MyMalloc((length << 1) + 1); binary_to_hex(tmp, *r_challenge, length); MyFree(tmp); if (ret < 0) { report_crypto_errors(); return -1; } return 0; } #endif