/* * ssl_init.c Common OpenSSL initialization code for the various * programs which use it. * * Moved from ntpd/ntp_crypto.c crypto_setup() */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #ifdef OPENSSL #include "openssl/crypto.h" #include "openssl/err.h" #include "openssl/evp.h" #include "openssl/opensslv.h" #include "libssl_compat.h" int ssl_init_done; #if OPENSSL_VERSION_NUMBER < 0x10100000L static void atexit_ssl_cleanup(void) { if (!ssl_init_done) return; ssl_init_done = FALSE; EVP_cleanup(); ERR_free_strings(); } void ssl_init(void) { init_lib(); if ( ! ssl_init_done) { ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); atexit(&atexit_ssl_cleanup); ssl_init_done = TRUE; } } #else /* OPENSSL_VERSION_NUMBER >= 0x10100000L */ void ssl_init(void) { init_lib(); ssl_init_done = TRUE; } #endif /* OPENSSL_VERSION_NUMBER */ void ssl_check_version(void) { u_long v; v = OpenSSL_version_num(); if ((v ^ OPENSSL_VERSION_NUMBER) & ~0xff0L) { msyslog(LOG_WARNING, "OpenSSL version mismatch. Built against %lx, you have %lx", (u_long)OPENSSL_VERSION_NUMBER, v); fprintf(stderr, "OpenSSL version mismatch. Built against %lx, you have %lx\n", (u_long)OPENSSL_VERSION_NUMBER, v); } INIT_SSL(); } #endif /* OPENSSL */ /* * keytype_from_text returns OpenSSL NID for digest by name, and * optionally the associated digest length. * * Used by ntpd authreadkeys(), ntpq and ntpdc keytype() */ int keytype_from_text( const char *text, size_t *pdigest_len ) { int key_type; u_int digest_len; #ifdef OPENSSL const u_long max_digest_len = MAX_MAC_LEN - sizeof(keyid_t); u_char digest[EVP_MAX_MD_SIZE]; char * upcased; char * pch; /* * OpenSSL digest short names are capitalized, so uppercase the * digest name before passing to OBJ_sn2nid(). If it is not * recognized but begins with 'M' use NID_md5 to be consistent * with past behavior. */ INIT_SSL(); LIB_GETBUF(upcased); strlcpy(upcased, text, LIB_BUFLENGTH); for (pch = upcased; '\0' != *pch; pch++) *pch = (char)toupper((unsigned char)*pch); key_type = OBJ_sn2nid(upcased); #else key_type = 0; #endif if (!key_type && 'm' == tolower((unsigned char)text[0])) key_type = NID_md5; if (!key_type) return 0; if (NULL != pdigest_len) { #ifdef OPENSSL EVP_MD_CTX *ctx; ctx = EVP_MD_CTX_new(); EVP_DigestInit(ctx, EVP_get_digestbynid(key_type)); EVP_DigestFinal(ctx, digest, &digest_len); EVP_MD_CTX_free(ctx); if (digest_len > max_digest_len) { fprintf(stderr, "key type %s %u octet digests are too big, max %lu\n", keytype_name(key_type), digest_len, max_digest_len); msyslog(LOG_ERR, "key type %s %u octet digests are too big, max %lu", keytype_name(key_type), digest_len, max_digest_len); return 0; } #else digest_len = 16; #endif *pdigest_len = digest_len; } return key_type; } /* * keytype_name returns OpenSSL short name for digest by NID. * * Used by ntpq and ntpdc keytype() */ const char * keytype_name( int nid ) { static const char unknown_type[] = "(unknown key type)"; const char *name; #ifdef OPENSSL INIT_SSL(); name = OBJ_nid2sn(nid); if (NULL == name) name = unknown_type; #else /* !OPENSSL follows */ if (NID_md5 == nid) name = "MD5"; else name = unknown_type; #endif return name; } /* * Use getpassphrase() if configure.ac detected it, as Suns that * have it truncate the password in getpass() to 8 characters. */ #ifdef HAVE_GETPASSPHRASE # define getpass(str) getpassphrase(str) #endif /* * getpass_keytype() -- shared between ntpq and ntpdc, only vaguely * related to the rest of ssl_init.c. */ char * getpass_keytype( int keytype ) { char pass_prompt[64 + 11 + 1]; /* 11 for " Password: " */ snprintf(pass_prompt, sizeof(pass_prompt), "%.64s Password: ", keytype_name(keytype)); return getpass(pass_prompt); }