X-Git-Url: http://git.tuebingen.mpg.de/?p=paraslash.git;a=blobdiff_plain;f=user_list.c;h=f835c11015aaf9f866edeaead3423b40724c2b05;hp=3c0b4f856546a2173c77696f80e0c554a646985c;hb=15714678f57f0e8931a70d64dca43c31e693bb61;hpb=a37e903213215dd36b11bbde4ea98e1d4590a472 diff --git a/user_list.c b/user_list.c index 3c0b4f85..f835c110 100644 --- a/user_list.c +++ b/user_list.c @@ -1,5 +1,5 @@ /* - * Copyright (C) 2006-2009 Andre Noll + * Copyright (C) 2006-2011 Andre Noll * * Licensed under the GPL v2. For licencing details see COPYING. */ @@ -9,7 +9,6 @@ #include #include #include -#include #include "para.h" #include "error.h" @@ -18,6 +17,7 @@ #include "string.h" #include "list.h" #include "user_list.h" +#include "rc4.h" static struct list_head user_list; @@ -40,9 +40,9 @@ static void populate_user_list(char *user_list_file) /* keyword, name, key, perms */ char w[255], n[255], k[255], p[255], tmp[4][255]; struct user *u; - RSA *rsa; + struct asymmetric_key *pubkey; - ret = para_fgets(line, MAXLINE, file_ptr); + ret = para_fgets(line, sizeof(line), file_ptr); if (ret <= 0) break; if (sscanf(line,"%200s %200s %200s %200s", w, n, k, p) < 3) @@ -50,20 +50,27 @@ static void populate_user_list(char *user_list_file) if (strcmp(w, "user")) continue; PARA_DEBUG_LOG("found entry for user %s\n", n); - ret = get_rsa_key(k, &rsa, LOAD_PUBLIC_KEY); + ret = get_asymmetric_key(k, LOAD_PUBLIC_KEY, &pubkey); if (ret < 0) { PARA_NOTICE_LOG("skipping entry for user %s: %s\n", n, para_strerror(-ret)); continue; } - if (ret < CHALLENGE_SIZE + 2 * CHALLENGE_SIZE + 41) { - PARA_WARNING_LOG("rsa key for %s too small\n", n); - rsa_free(rsa); + /* + * In order to encrypt len := CHALLENGE_SIZE + 2 * SESSION_KEY_LEN + * bytes using RSA_public_encrypt() with EME-OAEP padding mode, + * RSA_size(rsa) must be greater than len + 41. So ignore keys + * which are too short. For details see RSA_public_encrypt(3). + */ + if (ret <= CHALLENGE_SIZE + 2 * SESSION_KEY_LEN + 41) { + PARA_WARNING_LOG("public key %s too short (%d)\n", + k, ret); + free_asymmetric_key(pubkey); continue; } u = para_malloc(sizeof(*u)); u->name = para_strdup(n); - u->rsa = rsa; + u->pubkey = pubkey; u->perms = 0; num = sscanf(p, "%200[A-Z_],%200[A-Z_],%200[A-Z_],%200[A-Z_]", tmp[0], tmp[1], tmp[2], tmp[3]); @@ -109,7 +116,7 @@ void init_user_list(char *user_list_file) list_for_each_entry_safe(u, tmp, &user_list, node) { list_del(&u->node); free(u->name); - rsa_free(u->rsa); + free_asymmetric_key(u->pubkey); free(u); } } else