diff options
Diffstat (limited to 'src/lib/libcrypto/evp/evp_key.c')
| -rw-r--r-- | src/lib/libcrypto/evp/evp_key.c | 67 |
1 files changed, 36 insertions, 31 deletions
diff --git a/src/lib/libcrypto/evp/evp_key.c b/src/lib/libcrypto/evp/evp_key.c index dafa686f64..4271393069 100644 --- a/src/lib/libcrypto/evp/evp_key.c +++ b/src/lib/libcrypto/evp/evp_key.c | |||
| @@ -58,23 +58,26 @@ | |||
| 58 | 58 | ||
| 59 | #include <stdio.h> | 59 | #include <stdio.h> |
| 60 | #include "cryptlib.h" | 60 | #include "cryptlib.h" |
| 61 | #include "x509.h" | 61 | #include <openssl/x509.h> |
| 62 | #include "objects.h" | 62 | #include <openssl/objects.h> |
| 63 | #include "evp.h" | 63 | #include <openssl/evp.h> |
| 64 | #include <openssl/ui.h> | ||
| 64 | 65 | ||
| 65 | /* should be init to zeros. */ | 66 | /* should be init to zeros. */ |
| 66 | static char prompt_string[80]; | 67 | static char prompt_string[80]; |
| 67 | 68 | ||
| 68 | void EVP_set_pw_prompt(prompt) | 69 | void EVP_set_pw_prompt(char *prompt) |
| 69 | char *prompt; | ||
| 70 | { | 70 | { |
| 71 | if (prompt == NULL) | 71 | if (prompt == NULL) |
| 72 | prompt_string[0]='\0'; | 72 | prompt_string[0]='\0'; |
| 73 | else | 73 | else |
| 74 | { | ||
| 74 | strncpy(prompt_string,prompt,79); | 75 | strncpy(prompt_string,prompt,79); |
| 76 | prompt_string[79]='\0'; | ||
| 77 | } | ||
| 75 | } | 78 | } |
| 76 | 79 | ||
| 77 | char *EVP_get_pw_prompt() | 80 | char *EVP_get_pw_prompt(void) |
| 78 | { | 81 | { |
| 79 | if (prompt_string[0] == '\0') | 82 | if (prompt_string[0] == '\0') |
| 80 | return(NULL); | 83 | return(NULL); |
| @@ -82,30 +85,31 @@ char *EVP_get_pw_prompt() | |||
| 82 | return(prompt_string); | 85 | return(prompt_string); |
| 83 | } | 86 | } |
| 84 | 87 | ||
| 85 | #ifdef NO_DES | 88 | /* For historical reasons, the standard function for reading passwords is |
| 86 | int des_read_pw_string(char *buf,int len,char *prompt,int verify); | 89 | * in the DES library -- if someone ever wants to disable DES, |
| 87 | #endif | 90 | * this function will fail */ |
| 88 | 91 | int EVP_read_pw_string(char *buf, int len, const char *prompt, int verify) | |
| 89 | int EVP_read_pw_string(buf,len,prompt,verify) | ||
| 90 | char *buf; | ||
| 91 | int len; | ||
| 92 | char *prompt; | ||
| 93 | int verify; | ||
| 94 | { | 92 | { |
| 93 | int ret; | ||
| 94 | char buff[BUFSIZ]; | ||
| 95 | UI *ui; | ||
| 96 | |||
| 95 | if ((prompt == NULL) && (prompt_string[0] != '\0')) | 97 | if ((prompt == NULL) && (prompt_string[0] != '\0')) |
| 96 | prompt=prompt_string; | 98 | prompt=prompt_string; |
| 97 | return(des_read_pw_string(buf,len,prompt,verify)); | 99 | ui = UI_new(); |
| 100 | UI_add_input_string(ui,prompt,0,buf,0,(len>=BUFSIZ)?BUFSIZ-1:len); | ||
| 101 | if (verify) | ||
| 102 | UI_add_verify_string(ui,prompt,0, | ||
| 103 | buff,0,(len>=BUFSIZ)?BUFSIZ-1:len,buf); | ||
| 104 | ret = UI_process(ui); | ||
| 105 | UI_free(ui); | ||
| 106 | memset(buff,0,BUFSIZ); | ||
| 107 | return ret; | ||
| 98 | } | 108 | } |
| 99 | 109 | ||
| 100 | int EVP_BytesToKey(type,md,salt,data,datal,count,key,iv) | 110 | int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, |
| 101 | EVP_CIPHER *type; | 111 | const unsigned char *salt, const unsigned char *data, int datal, |
| 102 | EVP_MD *md; | 112 | int count, unsigned char *key, unsigned char *iv) |
| 103 | unsigned char *salt; | ||
| 104 | unsigned char *data; | ||
| 105 | int datal; | ||
| 106 | int count; | ||
| 107 | unsigned char *key; | ||
| 108 | unsigned char *iv; | ||
| 109 | { | 113 | { |
| 110 | EVP_MD_CTX c; | 114 | EVP_MD_CTX c; |
| 111 | unsigned char md_buf[EVP_MAX_MD_SIZE]; | 115 | unsigned char md_buf[EVP_MAX_MD_SIZE]; |
| @@ -117,21 +121,22 @@ unsigned char *iv; | |||
| 117 | 121 | ||
| 118 | if (data == NULL) return(nkey); | 122 | if (data == NULL) return(nkey); |
| 119 | 123 | ||
| 124 | EVP_MD_CTX_init(&c); | ||
| 120 | for (;;) | 125 | for (;;) |
| 121 | { | 126 | { |
| 122 | EVP_DigestInit(&c,md); | 127 | EVP_DigestInit_ex(&c,md, NULL); |
| 123 | if (addmd++) | 128 | if (addmd++) |
| 124 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 129 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); |
| 125 | EVP_DigestUpdate(&c,data,datal); | 130 | EVP_DigestUpdate(&c,data,datal); |
| 126 | if (salt != NULL) | 131 | if (salt != NULL) |
| 127 | EVP_DigestUpdate(&c,salt,8); | 132 | EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN); |
| 128 | EVP_DigestFinal(&c,&(md_buf[0]),&mds); | 133 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); |
| 129 | 134 | ||
| 130 | for (i=1; i<(unsigned int)count; i++) | 135 | for (i=1; i<(unsigned int)count; i++) |
| 131 | { | 136 | { |
| 132 | EVP_DigestInit(&c,md); | 137 | EVP_DigestInit_ex(&c,md, NULL); |
| 133 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 138 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); |
| 134 | EVP_DigestFinal(&c,&(md_buf[0]),&mds); | 139 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); |
| 135 | } | 140 | } |
| 136 | i=0; | 141 | i=0; |
| 137 | if (nkey) | 142 | if (nkey) |
| @@ -160,7 +165,7 @@ unsigned char *iv; | |||
| 160 | } | 165 | } |
| 161 | if ((nkey == 0) && (niv == 0)) break; | 166 | if ((nkey == 0) && (niv == 0)) break; |
| 162 | } | 167 | } |
| 163 | memset(&c,0,sizeof(c)); | 168 | EVP_MD_CTX_cleanup(&c); |
| 164 | memset(&(md_buf[0]),0,EVP_MAX_MD_SIZE); | 169 | memset(&(md_buf[0]),0,EVP_MAX_MD_SIZE); |
| 165 | return(type->key_len); | 170 | return(type->key_len); |
| 166 | } | 171 | } |
