X-Git-Url: http://git.tuebingen.mpg.de/?p=paraslash.git;a=blobdiff_plain;f=user_list.c;h=e48660299bd9fdff685782930ff7a876d9c061e5;hp=9cde1f625e3d9fd8dc2c198dd9775db2a5b24879;hb=3cdcb449fc23f0bebe34343dc26b4e34b82175d5;hpb=037059c8a25ce134af1eaa6c3fa8ac96b9f7e0b6 diff --git a/user_list.c b/user_list.c index 9cde1f62..e4866029 100644 --- a/user_list.c +++ b/user_list.c @@ -1,14 +1,9 @@ -/* - * Copyright (C) 2006-2011 Andre Noll - * - * Licensed under the GPL v2. For licencing details see COPYING. - */ +/* Copyright (C) 2006 Andre Noll , see file COPYING. */ /** \file user_list.c User handling for para_server. */ #include #include -#include #include "para.h" #include "error.h" @@ -17,7 +12,6 @@ #include "string.h" #include "list.h" #include "user_list.h" -#include "rc4.h" static struct list_head user_list; @@ -50,22 +44,22 @@ static void populate_user_list(char *user_list_file) if (strcmp(w, "user")) continue; PARA_DEBUG_LOG("found entry for user %s\n", n); - ret = get_asymmetric_key(k, LOAD_PUBLIC_KEY, &pubkey); + ret = get_public_key(k, &pubkey); if (ret < 0) { PARA_NOTICE_LOG("skipping entry for user %s: %s\n", n, para_strerror(-ret)); continue; } /* - * In order to encrypt len := CHALLENGE_SIZE + 2 * RC4_KEY_LEN + * In order to encrypt len := CHALLENGE_SIZE + 2 * SESSION_KEY_LEN * bytes using RSA_public_encrypt() with EME-OAEP padding mode, * RSA_size(rsa) must be greater than len + 41. So ignore keys * which are too short. For details see RSA_public_encrypt(3). */ - if (ret <= CHALLENGE_SIZE + 2 * RC4_KEY_LEN + 41) { + if (ret <= CHALLENGE_SIZE + 2 * SESSION_KEY_LEN + 41) { PARA_WARNING_LOG("public key %s too short (%d)\n", k, ret); - free_asymmetric_key(pubkey); + free_public_key(pubkey); continue; } u = para_malloc(sizeof(*u)); @@ -100,7 +94,7 @@ err: } /** - * Initialize the list of users allowed to connect to to para_server. + * Initialize the list of users allowed to connect to para_server. * * \param user_list_file The file containing access information. * @@ -116,7 +110,7 @@ void init_user_list(char *user_list_file) list_for_each_entry_safe(u, tmp, &user_list, node) { list_del(&u->node); free(u->name); - free_asymmetric_key(u->pubkey); + free_public_key(u->pubkey); free(u); } } else