⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 dst_api.c

📁 DHCP服务器源码
💻 C
📖 第 1 页 / 共 3 页
字号:
	/* Fill in private key and some fields in the general key structure */	if (dst_s_read_private_key_file(keyname, dg_key, pubkey->dk_id,					pubkey->dk_alg) == 0)		dg_key = dst_free_key(dg_key);	pubkey = dst_free_key(pubkey);	return (dg_key);}int dst_write_key(const DST_KEY *key, const int type){	int pub = 0, priv = 0;	if (key == NULL) 		return (0);	if (!dst_check_algorithm(key->dk_alg)) { /* make sure alg is available */		EREPORT(("dst_write_key(): Algorithm %d not suppored\n", 			 key->dk_alg));		return (UNSUPPORTED_KEYALG);	}	if ((type & (DST_PRIVATE|DST_PUBLIC)) == 0)		return (0);	if (type & DST_PUBLIC) 		if ((pub = dst_s_write_public_key(key)) < 0)			return (pub);	if (type & DST_PRIVATE)		if ((priv = dst_s_write_private_key(key)) < 0)			return (priv);	return (priv+pub);}/* *  dst_write_private_key *	Write a private key to disk.  The filename will be of the form: *	K<key->dk_name>+<key->dk_alg>+<key->dk_id>.<private key suffix>. *	If there is already a file with this name, an error is returned. * *  Parameters *	key     A DST managed key structure that contains *	      all information needed about a key. *  Return *	>= 0    Correct behavior.  Returns length of encoded key value *		  written to disk. *	<  0    error. */static intdst_s_write_private_key(const DST_KEY *key){	u_char encoded_block[RAW_KEY_SIZE];	char file[PATH_MAX];	unsigned len;	FILE *fp;	/* First encode the key into the portable key format */	if (key == NULL)		return (-1);	if (key->dk_KEY_struct == NULL)		return (0);	/* null key has no private key */	if (key->dk_func == NULL || key->dk_func->to_file_fmt == NULL) {		EREPORT(("dst_write_private_key(): Unsupported operation %d\n",			 key->dk_alg));		return (-5);	} else if ((len = key->dk_func->to_file_fmt(key, (char *)encoded_block,					     sizeof(encoded_block))) <= 0) {		EREPORT(("dst_write_private_key(): Failed encoding private RSA bsafe key %d\n", len));		return (-8);	}	/* Now I can create the file I want to use */	dst_s_build_filename(file, key->dk_key_name, key->dk_id, key->dk_alg,			     PRIVATE_KEY, PATH_MAX);	/* Do not overwrite an existing file */	if ((fp = dst_s_fopen(file, "w", 0600)) != NULL) {		int nn;		if ((nn = fwrite(encoded_block, 1, len, fp)) != len) {			EREPORT(("dst_write_private_key(): Write failure on %s %d != %d errno=%d\n",				 file, out_len, nn, errno));			return (-5);		}		fclose(fp);	} else {		EREPORT(("dst_write_private_key(): Can not create file %s\n"			 ,file));		return (-6);	}	memset(encoded_block, 0, len);	return (len);}/** *  dst_read_public_key *	Read a public key from disk and store in a DST key structure. *  Parameters *	in_name	 K<in_name><in_id>.<public key suffix> is the *		      filename of the key file to be read. *  Returns *	NULL	    If the key does not exist or no name is supplied. *	NON-NULL	Initalized key structure if the key exists. */static DST_KEY *dst_s_read_public_key(const char *in_name, const unsigned in_id, int in_alg){	unsigned flags, len;	int proto, alg, dlen;	int c;	char name[PATH_MAX], enckey[RAW_KEY_SIZE], *notspace;	u_char deckey[RAW_KEY_SIZE];	FILE *fp;	if (in_name == NULL) {		EREPORT(("dst_read_public_key(): No key name given\n"));		return (NULL);	}	if (dst_s_build_filename(name, in_name, in_id, in_alg, PUBLIC_KEY,				 PATH_MAX) == -1) {		EREPORT(("dst_read_public_key(): Cannot make filename from %s, %d, and %s\n",			 in_name, in_id, PUBLIC_KEY));		return (NULL);	}	/*	 * Open the file and read it's formatted contents up to key	 * File format:	 *    domain.name [ttl] [IN] KEY  <flags> <protocol> <algorithm> <key>	 * flags, proto, alg stored as decimal (or hex numbers FIXME).	 * (FIXME: handle parentheses for line continuation.)	 */	if ((fp = dst_s_fopen(name, "r", 0)) == NULL) {		EREPORT(("dst_read_public_key(): Public Key not found %s\n",			 name));		return (NULL);	}	/* Skip domain name, which ends at first blank */	while ((c = getc(fp)) != EOF)		if (isspace(c))			break;	/* Skip blank to get to next field */	while ((c = getc(fp)) != EOF)		if (!isspace(c))			break;	/* Skip optional TTL -- if initial digit, skip whole word. */	if (isdigit(c)) {		while ((c = getc(fp)) != EOF)			if (isspace(c))				break;		while ((c = getc(fp)) != EOF)			if (!isspace(c))				break;	}	/* Skip optional "IN" */	if (c == 'I' || c == 'i') {		while ((c = getc(fp)) != EOF)			if (isspace(c))				break;		while ((c = getc(fp)) != EOF)			if (!isspace(c))				break;	}	/* Locate and skip "KEY" */	if (c != 'K' && c != 'k') {		EREPORT(("\"KEY\" doesn't appear in file: %s", name));		return NULL;	}	while ((c = getc(fp)) != EOF)		if (isspace(c))			break;	while ((c = getc(fp)) != EOF)		if (!isspace(c))			break;	ungetc(c, fp);		/* return the charcter to the input field */	/* Handle hex!! FIXME.  */	if (fscanf(fp, "%d %d %d", &flags, &proto, &alg) != 3) {		EREPORT(("dst_read_public_key(): Can not read flag/proto/alg field from %s\n"			 ,name));		return (NULL);	}	/* read in the key string */	fgets(enckey, sizeof(enckey), fp);	/* If we aren't at end-of-file, something is wrong.  */	while ((c = getc(fp)) != EOF)		if (!isspace(c))			break;	if (!feof(fp)) {		EREPORT(("Key too long in file: %s", name));		return NULL;	}	fclose(fp);	if ((len = strlen(enckey)) <= 0)		return (NULL);	/* discard \n */	enckey[--len] = '\0';	/* remove leading spaces */	for (notspace = (char *) enckey; isspace(*notspace); len--)		notspace++;	dlen = b64_pton(notspace, deckey, sizeof(deckey));	if (dlen < 0) {		EREPORT(("dst_read_public_key: bad return from b64_pton = %d",			 dlen));		return (NULL);	}	/* store key and info in a key structure that is returned *//*	return dst_store_public_key(in_name, alg, proto, 666, flags, deckey,				    dlen);*/	return dst_buffer_to_key(in_name, alg,				 flags, proto, deckey, (unsigned)dlen);}/* *  dst_write_public_key *	Write a key to disk in DNS format. *  Parameters *	key     Pointer to a DST key structure. *  Returns *	0       Failure *	1       Success */static intdst_s_write_public_key(const DST_KEY *key){	FILE *fp;	char filename[PATH_MAX];	u_char out_key[RAW_KEY_SIZE];	char enc_key[RAW_KEY_SIZE];	int len = 0;	memset(out_key, 0, sizeof(out_key));	if (key == NULL) {		EREPORT(("dst_write_public_key(): No key specified \n"));		return (0);	} else if ((len = dst_key_to_dnskey(key, out_key, sizeof(out_key)))< 0)		return (0);	/* Make the filename */	if (dst_s_build_filename(filename, key->dk_key_name, key->dk_id,				 key->dk_alg, PUBLIC_KEY, PATH_MAX) == -1) {		EREPORT(("dst_write_public_key(): Cannot make filename from %s, %d, and %s\n",			 key->dk_key_name, key->dk_id, PUBLIC_KEY));		return (0);	}	/* create public key file */	if ((fp = dst_s_fopen(filename, "w+", 0644)) == NULL) {		EREPORT(("DST_write_public_key: open of file:%s failed (errno=%d)\n",			 filename, errno));		return (0);	}	/*write out key first base64 the key data */	if (key->dk_flags & DST_EXTEND_FLAG)		b64_ntop(&out_key[6],			 (unsigned)(len - 6), enc_key, sizeof(enc_key));	else		b64_ntop(&out_key[4],			 (unsigned)(len - 4), enc_key, sizeof(enc_key));	fprintf(fp, "%s IN KEY %d %d %d %s\n",		key->dk_key_name,		key->dk_flags, key->dk_proto, key->dk_alg, enc_key);	fclose(fp);	return (1);}/* *  dst_dnskey_to_public_key *	This function converts the contents of a DNS KEY RR into a DST *	key structure. *  Paramters *	len	 Length of the RDATA of the KEY RR RDATA *	rdata	 A pointer to the the KEY RR RDATA. *	in_name     Key name to be stored in key structure. *  Returns *	NULL	    Failure *	NON-NULL	Success.  Pointer to key structure. *			Caller's responsibility to free() it. */DST_KEY *dst_dnskey_to_key(const char *in_name,		  const u_char *rdata, const unsigned len){	DST_KEY *key_st;	int alg ;	int start = DST_KEY_START;	if (rdata == NULL || len <= DST_KEY_ALG) /* no data */		return (NULL);	alg = (u_int8_t) rdata[DST_KEY_ALG];	if (!dst_check_algorithm(alg)) { /* make sure alg is available */		EREPORT(("dst_dnskey_to_key(): Algorithm %d not suppored\n",			 alg));		return (NULL);	}	if ((key_st = dst_s_get_key_struct(in_name, alg, 0, 0, 0)) == NULL)		return (NULL);	if (in_name == NULL)		return (NULL);	key_st->dk_flags = dst_s_get_int16(rdata);	key_st->dk_proto = (u_int16_t) rdata[DST_KEY_PROT];	if (key_st->dk_flags & DST_EXTEND_FLAG) {		u_int32_t ext_flags;		ext_flags = (u_int32_t) dst_s_get_int16(&rdata[DST_EXT_FLAG]);		key_st->dk_flags = key_st->dk_flags | (ext_flags << 16);		start += 2;	}	/*	 * now point to the begining of the data representing the encoding	 * of the key	 */	if (key_st->dk_func && key_st->dk_func->from_dns_key) {		if (key_st->dk_func->from_dns_key(key_st, &rdata[start],						  len - start) > 0)			return (key_st);	} else		EREPORT(("dst_dnskey_to_public_key(): unsuppored alg %d\n",			 alg));	SAFE_FREE(key_st);	return (key_st);}/* *  dst_public_key_to_dnskey *	Function to encode a public key into DNS KEY wire format  *  Parameters *	key	     Key structure to encode. *	out_storage     Location to write the encoded key to. *	out_len	 Size of the output array. *  Returns *	<0      Failure *	>=0     Number of bytes written to out_storage */intdst_key_to_dnskey(const DST_KEY *key, u_char *out_storage,			 const unsigned out_len){	u_int16_t val;	int loc = 0;	int enc_len = 0;	if (key == NULL)		return (-1);	if (!dst_check_algorithm(key->dk_alg)) { /* make sure alg is available */		EREPORT(("dst_key_to_dnskey(): Algorithm %d not suppored\n",			 key->dk_alg));		return (UNSUPPORTED_KEYALG);	}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -