⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 openssldh_link.c

📁 bind 9.3结合mysql数据库
💻 C
字号:
/* * Portions Copyright (C) 2004  Internet Systems Consortium, Inc. ("ISC") * Portions Copyright (C) 1999-2002  Internet Software Consortium. * Portions Copyright (C) 1995-2000 by Network Associates, Inc. * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND ISC AND NETWORK ASSOCIATES DISCLAIMS * ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE * FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR * IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. *//* * Principal Author: Brian Wellington * $Id: openssldh_link.c,v 1.38.2.2.8.7 2004/03/16 05:50:23 marka Exp $ */#ifdef OPENSSL#include <config.h>#include <ctype.h>#include <isc/mem.h>#include <isc/string.h>#include <isc/util.h>#include <dst/result.h>#include "dst_internal.h"#include "dst_openssl.h"#include "dst_parse.h"#include <openssl/dh.h>#define PRIME768 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088" \	"A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25" \	"F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A63A3620FFFFFFFFFFFFFFFF"#define PRIME1024 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" \	"8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF2" \	"5F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406" \	"B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF"#define PRIME1536 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \	"29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \	"EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \	"E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \	"EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \	"C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \	"83655D23DCA3AD961C62F356208552BB9ED529077096966D" \	"670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF"static isc_result_t openssldh_todns(const dst_key_t *key, isc_buffer_t *data);static BIGNUM bn2, bn768, bn1024, bn1536;static isc_result_topenssldh_computesecret(const dst_key_t *pub, const dst_key_t *priv,			isc_buffer_t *secret){	DH *dhpub, *dhpriv;	int ret;	isc_region_t r;	unsigned int len;	REQUIRE(pub->opaque != NULL);	REQUIRE(priv->opaque != NULL);	dhpub = (DH *) pub->opaque;	dhpriv = (DH *) priv->opaque;	len = DH_size(dhpriv);	isc_buffer_availableregion(secret, &r);	if (r.length < len)		return (ISC_R_NOSPACE);	ret = DH_compute_key(r.base, dhpub->pub_key, dhpriv);	if (ret == 0)		return (dst__openssl_toresult(DST_R_COMPUTESECRETFAILURE));	isc_buffer_add(secret, len);	return (ISC_R_SUCCESS);}static isc_boolean_topenssldh_compare(const dst_key_t *key1, const dst_key_t *key2) {	int status;	DH *dh1, *dh2;	dh1 = (DH *) key1->opaque;	dh2 = (DH *) key2->opaque;	if (dh1 == NULL && dh2 == NULL)		return (ISC_TRUE);	else if (dh1 == NULL || dh2 == NULL)		return (ISC_FALSE);	status = BN_cmp(dh1->p, dh2->p) ||		 BN_cmp(dh1->g, dh2->g) ||		 BN_cmp(dh1->pub_key, dh2->pub_key);	if (status != 0)		return (ISC_FALSE);	if (dh1->priv_key != NULL || dh2->priv_key != NULL) {		if (dh1->priv_key == NULL || dh2->priv_key == NULL)			return (ISC_FALSE);		if (BN_cmp(dh1->priv_key, dh2->priv_key) != 0)			return (ISC_FALSE);	}	return (ISC_TRUE);}static isc_boolean_topenssldh_paramcompare(const dst_key_t *key1, const dst_key_t *key2) {	int status;	DH *dh1, *dh2;	dh1 = (DH *) key1->opaque;	dh2 = (DH *) key2->opaque;	if (dh1 == NULL && dh2 == NULL)		return (ISC_TRUE);	else if (dh1 == NULL || dh2 == NULL)		return (ISC_FALSE);	status = BN_cmp(dh1->p, dh2->p) ||		 BN_cmp(dh1->g, dh2->g);	if (status != 0)		return (ISC_FALSE);	return (ISC_TRUE);}static isc_result_topenssldh_generate(dst_key_t *key, int generator) {	DH *dh = NULL;	if (generator == 0) {		if (key->key_size == 768 ||		    key->key_size == 1024 ||		    key->key_size == 1536)		{			dh = DH_new();			if (dh == NULL)				return (ISC_R_NOMEMORY);			if (key->key_size == 768)				dh->p = &bn768;			else if (key->key_size == 1024)				dh->p = &bn1024;			else				dh->p = &bn1536;			dh->g = &bn2;		}		else			generator = 2;	}	if (generator != 0)		dh = DH_generate_parameters(key->key_size, generator,					    NULL, NULL);	if (dh == NULL)		return (dst__openssl_toresult(DST_R_OPENSSLFAILURE));	if (DH_generate_key(dh) == 0) {		DH_free(dh);		return (dst__openssl_toresult(DST_R_OPENSSLFAILURE));	}	dh->flags &= ~DH_FLAG_CACHE_MONT_P;	key->opaque = dh;	return (ISC_R_SUCCESS);}static isc_boolean_topenssldh_isprivate(const dst_key_t *key) {	DH *dh = (DH *) key->opaque;	return (ISC_TF(dh != NULL && dh->priv_key != NULL));}static voidopenssldh_destroy(dst_key_t *key) {	DH *dh = key->opaque;	if (dh == NULL)		return;	if (dh->p == &bn768 || dh->p == &bn1024 || dh->p == &bn1536)		dh->p = NULL;	if (dh->g == &bn2)		dh->g = NULL;	DH_free(dh);	key->opaque = NULL;}static voiduint16_toregion(isc_uint16_t val, isc_region_t *region) {	*region->base++ = (val & 0xff00) >> 8;	*region->base++ = (val & 0x00ff);}static isc_uint16_tuint16_fromregion(isc_region_t *region) {	isc_uint16_t val;	unsigned char *cp = region->base;	val = ((unsigned int)(cp[0])) << 8;	val |= ((unsigned int)(cp[1]));	region->base += 2;	return (val);}static isc_result_topenssldh_todns(const dst_key_t *key, isc_buffer_t *data) {	DH *dh;	isc_region_t r;	isc_uint16_t dnslen, plen, glen, publen;	REQUIRE(key->opaque != NULL);	dh = (DH *) key->opaque;	isc_buffer_availableregion(data, &r);	if (dh->g == &bn2 &&	    (dh->p == &bn768 || dh->p == &bn1024 || dh->p == &bn1536)) {		plen = 1;		glen = 0;	}	else {		plen = BN_num_bytes(dh->p);		glen = BN_num_bytes(dh->g);	}	publen = BN_num_bytes(dh->pub_key);	dnslen = plen + glen + publen + 6;	if (r.length < (unsigned int) dnslen)		return (ISC_R_NOSPACE);	uint16_toregion(plen, &r);	if (plen == 1) {		if (dh->p == &bn768)			*r.base = 1;		else if (dh->p == &bn1024)			*r.base = 2;		else			*r.base = 3;	}	else		BN_bn2bin(dh->p, r.base);	r.base += plen;	uint16_toregion(glen, &r);	if (glen > 0)		BN_bn2bin(dh->g, r.base);	r.base += glen;	uint16_toregion(publen, &r);	BN_bn2bin(dh->pub_key, r.base);	r.base += publen;	isc_buffer_add(data, dnslen);	return (ISC_R_SUCCESS);}static isc_result_topenssldh_fromdns(dst_key_t *key, isc_buffer_t *data) {	DH *dh;	isc_region_t r;	isc_uint16_t plen, glen, publen;	int special = 0;	isc_buffer_remainingregion(data, &r);	if (r.length == 0)		return (ISC_R_SUCCESS);	dh = DH_new();	if (dh == NULL)		return (ISC_R_NOMEMORY);	dh->flags &= ~DH_FLAG_CACHE_MONT_P;	/*	 * Read the prime length.  1 & 2 are table entries, > 16 means a	 * prime follows, otherwise an error.	 */	if (r.length < 2) {		DH_free(dh);		return (DST_R_INVALIDPUBLICKEY);	}	plen = uint16_fromregion(&r);	if (plen < 16 && plen != 1 && plen != 2) {		DH_free(dh);		return (DST_R_INVALIDPUBLICKEY);	}	if (r.length < plen) {		DH_free(dh);		return (DST_R_INVALIDPUBLICKEY);	}	if (plen == 1 || plen == 2) {		if (plen == 1)			special = *r.base++;		else			special = uint16_fromregion(&r);		switch (special) {			case 1:				dh->p = &bn768;				break;			case 2:				dh->p = &bn1024;				break;			case 3:				dh->p = &bn1536;				break;			default:				DH_free(dh);				return (DST_R_INVALIDPUBLICKEY);		}	}	else {		dh->p = BN_bin2bn(r.base, plen, NULL);		r.base += plen;	}	/*	 * Read the generator length.  This should be 0 if the prime was	 * special, but it might not be.  If it's 0 and the prime is not	 * special, we have a problem.	 */	if (r.length < 2) {		DH_free(dh);		return (DST_R_INVALIDPUBLICKEY);	}	glen = uint16_fromregion(&r);	if (r.length < glen) {		DH_free(dh);		return (DST_R_INVALIDPUBLICKEY);	}	if (special != 0) {		if (glen == 0)			dh->g = &bn2;		else {			dh->g = BN_bin2bn(r.base, glen, NULL);			if (BN_cmp(dh->g, &bn2) == 0) {				BN_free(dh->g);				dh->g = &bn2;			}			else {				DH_free(dh);				return (DST_R_INVALIDPUBLICKEY);			}		}	}	else {		if (glen == 0) {			DH_free(dh);			return (DST_R_INVALIDPUBLICKEY);		}		dh->g = BN_bin2bn(r.base, glen, NULL);	}	r.base += glen;	if (r.length < 2) {		DH_free(dh);		return (DST_R_INVALIDPUBLICKEY);	}	publen = uint16_fromregion(&r);	if (r.length < publen) {		DH_free(dh);		return (DST_R_INVALIDPUBLICKEY);	}	dh->pub_key = BN_bin2bn(r.base, publen, NULL);	r.base += publen;	key->key_size = BN_num_bits(dh->p);	isc_buffer_forward(data, plen + glen + publen + 6);	key->opaque = (void *) dh;	return (ISC_R_SUCCESS);}static isc_result_topenssldh_tofile(const dst_key_t *key, const char *directory) {	int i;	DH *dh;	dst_private_t priv;	unsigned char *bufs[4];	isc_result_t result;	if (key->opaque == NULL)		return (DST_R_NULLKEY);	dh = (DH *) key->opaque;	for (i = 0; i < 4; i++) {		bufs[i] = isc_mem_get(key->mctx, BN_num_bytes(dh->p));		if (bufs[i] == NULL) {			result = ISC_R_NOMEMORY;			goto fail;		}	}	i = 0;	priv.elements[i].tag = TAG_DH_PRIME;	priv.elements[i].length = BN_num_bytes(dh->p);	BN_bn2bin(dh->p, bufs[i]);	priv.elements[i].data = bufs[i];	i++;	priv.elements[i].tag = TAG_DH_GENERATOR;	priv.elements[i].length = BN_num_bytes(dh->g);	BN_bn2bin(dh->g, bufs[i]);	priv.elements[i].data = bufs[i];	i++;	priv.elements[i].tag = TAG_DH_PRIVATE;	priv.elements[i].length = BN_num_bytes(dh->priv_key);	BN_bn2bin(dh->priv_key, bufs[i]);	priv.elements[i].data = bufs[i];	i++;	priv.elements[i].tag = TAG_DH_PUBLIC;	priv.elements[i].length = BN_num_bytes(dh->pub_key);	BN_bn2bin(dh->pub_key, bufs[i]);	priv.elements[i].data = bufs[i];	i++;	priv.nelements = i;	result = dst__privstruct_writefile(key, &priv, directory); fail:	for (i = 0; i < 4; i++) {		if (bufs[i] == NULL)			break;		isc_mem_put(key->mctx, bufs[i], BN_num_bytes(dh->p));	}	return (result);}static isc_result_topenssldh_parse(dst_key_t *key, isc_lex_t *lexer) {	dst_private_t priv;	isc_result_t ret;	int i;	DH *dh = NULL;	isc_mem_t *mctx;#define DST_RET(a) {ret = a; goto err;}	mctx = key->mctx;	/* read private key file */	ret = dst__privstruct_parse(key, DST_ALG_DH, lexer, mctx, &priv);	if (ret != ISC_R_SUCCESS)		return (ret);	dh = DH_new();	if (dh == NULL)		DST_RET(ISC_R_NOMEMORY);	dh->flags &= ~DH_FLAG_CACHE_MONT_P;	key->opaque = dh;	for (i = 0; i < priv.nelements; i++) {		BIGNUM *bn;		bn = BN_bin2bn(priv.elements[i].data,			       priv.elements[i].length, NULL);		if (bn == NULL)			DST_RET(ISC_R_NOMEMORY);		switch (priv.elements[i].tag) {			case TAG_DH_PRIME:				dh->p = bn;				break;			case TAG_DH_GENERATOR:				dh->g = bn;				break;			case TAG_DH_PRIVATE:				dh->priv_key = bn;				break;			case TAG_DH_PUBLIC:				dh->pub_key = bn;				break;		}	}	dst__privstruct_free(&priv, mctx);	key->key_size = BN_num_bits(dh->p);	if ((key->key_size == 768 ||	     key->key_size == 1024 ||	     key->key_size == 1536) &&	    BN_cmp(dh->g, &bn2) == 0)	{		if (key->key_size == 768 && BN_cmp(dh->p, &bn768) == 0) {			BN_free(dh->p);			BN_free(dh->g);			dh->p = &bn768;			dh->g = &bn2;		} else if (key->key_size == 1024 &&			   BN_cmp(dh->p, &bn1024) == 0) {			BN_free(dh->p);			BN_free(dh->g);			dh->p = &bn1024;			dh->g = &bn2;		} else if (key->key_size == 1536 &&			   BN_cmp(dh->p, &bn1536) == 0) {			BN_free(dh->p);			BN_free(dh->g);			dh->p = &bn1536;			dh->g = &bn2;		}	}	return (ISC_R_SUCCESS); err:	openssldh_destroy(key);	dst__privstruct_free(&priv, mctx);	memset(&priv, 0, sizeof(priv));	return (ret);}static voidBN_fromhex(BIGNUM *b, const char *str) {	static const char hexdigits[] = "0123456789abcdef";	unsigned char data[512];	unsigned int i;	BIGNUM *out;	RUNTIME_CHECK(strlen(str) < 1024U && strlen(str) % 2 == 0U);	for (i = 0; i < strlen(str); i += 2) {		char *s;		unsigned int high, low;		s = strchr(hexdigits, tolower((unsigned char)str[i]));		RUNTIME_CHECK(s != NULL);		high = s - hexdigits;		s = strchr(hexdigits, tolower((unsigned char)str[i + 1]));		RUNTIME_CHECK(s != NULL);		low = s - hexdigits;		data[i/2] = (unsigned char)((high << 4) + low);	}	out = BN_bin2bn(data, strlen(str)/2, b);	RUNTIME_CHECK(out != NULL);}static voidopenssldh_cleanup(void) {	BN_free(&bn2);	BN_free(&bn768);	BN_free(&bn1024);	BN_free(&bn1536);}static dst_func_t openssldh_functions = {	NULL, /* createctx */	NULL, /* destroyctx */	NULL, /* adddata */	NULL, /* openssldh_sign */	NULL, /* openssldh_verify */	openssldh_computesecret,	openssldh_compare,	openssldh_paramcompare,	openssldh_generate,	openssldh_isprivate,	openssldh_destroy,	openssldh_todns,	openssldh_fromdns,	openssldh_tofile,	openssldh_parse,	openssldh_cleanup,};isc_result_tdst__openssldh_init(dst_func_t **funcp) {	REQUIRE(funcp != NULL);	if (*funcp == NULL) {		BN_init(&bn2);		BN_init(&bn768);		BN_init(&bn1024);		BN_init(&bn1536);		BN_set_word(&bn2, 2);		BN_fromhex(&bn768, PRIME768);		BN_fromhex(&bn1024, PRIME1024);		BN_fromhex(&bn1536, PRIME1536);		*funcp = &openssldh_functions;	}	return (ISC_R_SUCCESS);}#else /* OPENSSL */#include <isc/util.h>EMPTY_TRANSLATION_UNIT#endif /* OPENSSL */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -