X-Git-Url: https://tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fencr.c;h=a2e55312f8b6681bb220e6cf6df858bc11a07ee5;hp=31e0b9449ec0a67926c3ce135f2a61cc3ba17d36;hb=803f908078e87f433727a3ddf2d61734e1ed9233;hpb=ca6abd41ea0cdf2ca6491c3945fb3c62fd40ab98 diff --git a/src/encr.c b/src/encr.c index 31e0b944..a2e55312 100644 --- a/src/encr.c +++ b/src/encr.c @@ -1,6 +1,6 @@ /* encr.c -- everything that deals with encryption - Copyright (C) 1998,99 Ivo Timmermans + Copyright (C) 1998,1999,2000 Ivo Timmermans This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -19,6 +19,8 @@ #include "config.h" +#include + #include #include #include @@ -225,16 +227,25 @@ void encrypt_passphrase(passphrase_t *pp) { char key[1000]; char tmp[1000]; - int len; + unsigned char phrase[1000]; + int keylen; + int i; BF_KEY bf_key; + cp mpz_get_str(tmp, 16, my_public_key); - len = str_hex_to_bin(key, tmp); + keylen = str_hex_to_bin(key, tmp); + + cipher_set_key(&bf_key, keylen, key); - cipher_set_key(&bf_key, len, key); + low_crypt_key(mypassphrase, phrase, &bf_key, mypassphraselen, BF_ENCRYPT); + pp->len = ((mypassphraselen - 1) | 7) + 1; + pp->phrase = xmalloc((pp->len << 1) + 1); + + for(i = 0; i < pp->len; i++) + snprintf(&(pp->phrase)[i << 1], 3, "%02x", (int)phrase[i]); - low_crypt_key(mypassphrase, pp->phrase, &bf_key, mypassphraselen, BF_ENCRYPT); - pp->len = ((mypassphraselen - 1) | 7) + 5; + pp->phrase[(pp->len << 1) + 1] = '\0'; if(key_inited) cipher_set_key(&encryption_key, encryption_keylen, text_key); @@ -244,29 +255,31 @@ cp int verify_passphrase(conn_list_t *cl, unsigned char *his_pubkey) { char key[1000]; - char tmp[1000]; - int len; + char *tmp; + unsigned char phrase[1000]; + int keylen, pplen; mpz_t pk; unsigned char *out; BF_KEY bf_key; char which[sizeof("123.123.123.123")+1]; char *meuk; cp - mpz_init_set_str(pk, his_pubkey, 16); - mpz_get_str(tmp, 16, pk); - len = str_hex_to_bin(key, tmp); - out = xmalloc(strlen(cl->pp) + 3); - - cipher_set_key(&bf_key, len, key); - low_crypt_key(cl->pp, out, &bf_key, strlen(cl->pp), BF_DECRYPT); + mpz_init_set_str(pk, his_pubkey, 36); + tmp = mpz_get_str(NULL, 16, pk); + keylen = str_hex_to_bin(key, tmp); + out = xmalloc((cl->pp->len >> 1) + 3); + pplen = str_hex_to_bin(phrase, cl->pp->phrase); + + cipher_set_key(&bf_key, keylen, key); + low_crypt_key(phrase, out, &bf_key, pplen, BF_DECRYPT); if(key_inited) cipher_set_key(&encryption_key, encryption_keylen, text_key); sprintf(which, IP_ADDR_S, IP_ADDR_V(cl->vpn_ip)); - if((len = read_passphrase(which, &meuk)) < 0) + if((pplen = read_passphrase(which, &meuk)) < 0) return -1; - if(memcmp(meuk, out, len)) + if(memcmp(meuk, out, pplen)) return -1; cp return 0; @@ -332,7 +345,7 @@ void regenerate_keys(void) cp generate_private_key(); calculate_public_key(); - send_key_changed2(); + send_key_changed_all(); recalculate_encryption_keys(); cp }