1 1.9 uwe /* $NetBSD: sign.c,v 1.9 2022/11/08 01:03:27 uwe Exp $ */ 2 1.1 christos 3 1.1 christos /*- 4 1.1 christos * Copyright (c) 2008 The NetBSD Foundation, Inc. 5 1.1 christos * All rights reserved. 6 1.1 christos * 7 1.1 christos * This code is derived from software contributed to The NetBSD Foundation 8 1.1 christos * by Martin Schtte. 9 1.1 christos * 10 1.1 christos * Redistribution and use in source and binary forms, with or without 11 1.1 christos * modification, are permitted provided that the following conditions 12 1.1 christos * are met: 13 1.1 christos * 1. Redistributions of source code must retain the above copyright 14 1.1 christos * notice, this list of conditions and the following disclaimer. 15 1.1 christos * 2. Redistributions in binary form must reproduce the above copyright 16 1.1 christos * notice, this list of conditions and the following disclaimer in the 17 1.1 christos * documentation and/or other materials provided with the distribution. 18 1.1 christos * 3. All advertising materials mentioning features or use of this software 19 1.1 christos * must display the following acknowledgement: 20 1.1 christos * This product includes software developed by the NetBSD 21 1.1 christos * Foundation, Inc. and its contributors. 22 1.1 christos * 4. Neither the name of The NetBSD Foundation nor the names of its 23 1.1 christos * contributors may be used to endorse or promote products derived 24 1.1 christos * from this software without specific prior written permission. 25 1.1 christos * 26 1.1 christos * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 27 1.1 christos * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 28 1.1 christos * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 29 1.1 christos * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 30 1.1 christos * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 31 1.1 christos * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 32 1.1 christos * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 33 1.1 christos * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 34 1.1 christos * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 35 1.1 christos * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 36 1.1 christos * POSSIBILITY OF SUCH DAMAGE. 37 1.1 christos */ 38 1.1 christos /* 39 1.1 christos * sign.c 40 1.1 christos * syslog-sign related code for syslogd 41 1.1 christos * 42 1.1 christos * Martin Schtte 43 1.1 christos */ 44 1.2 minskim /* 45 1.2 minskim * Issues with the current internet draft: 46 1.1 christos * 1. The draft is a bit unclear on the input format for the signature, 47 1.1 christos * so this might have to be changed later. Cf. sign_string_sign() 48 1.1 christos * 2. The draft only defines DSA signatures. I hope it will be extended 49 1.1 christos * to DSS, thus allowing DSA, RSA (ANSI X9.31) and ECDSA (ANSI X9.62) 50 1.1 christos * 3. The draft does not define the data format for public keys in CBs. 51 1.1 christos * This implementation sends public keys in DER encoding. 52 1.1 christos * 4. This current implementation uses high-level OpenSSL API. 53 1.1 christos * I am not sure if these completely implement the FIPS/ANSI standards. 54 1.1 christos * Update after WG discussion in August: 55 1.1 christos * 1. check; next draft will be clearer and specify the format as implemented. 56 1.1 christos * 2. check; definitely only DSA in this version. 57 1.1 christos * 3. remains a problem, so far no statement from authors or WG. 58 1.7 christos * 4. check; used EVP_sha1 method implements FIPS. 59 1.1 christos */ 60 1.2 minskim /* 61 1.1 christos * Limitations of this implementation: 62 1.1 christos * - cannot use OpenPGP keys, only PKIX or DSA due to OpenSSL capabilities 63 1.1 christos * - only works for correctly formatted messages, because incorrect messages 64 1.1 christos * are reformatted (e.g. if it receives a message with two spaces between 65 1.1 christos * fields it might even be parsed, but the output will have only one space). 66 1.1 christos */ 67 1.1 christos 68 1.1 christos #include <sys/cdefs.h> 69 1.9 uwe __RCSID("$NetBSD: sign.c,v 1.9 2022/11/08 01:03:27 uwe Exp $"); 70 1.2 minskim 71 1.1 christos #ifndef DISABLE_SIGN 72 1.1 christos #include "syslogd.h" 73 1.1 christos #ifndef DISABLE_TLS 74 1.1 christos #include "tls.h" 75 1.1 christos #endif /* !DISABLE_TLS */ 76 1.1 christos #include "sign.h" 77 1.1 christos #include "extern.h" 78 1.1 christos 79 1.1 christos /* 80 1.2 minskim * init all SGs for a given algorithm 81 1.1 christos */ 82 1.1 christos bool 83 1.1 christos sign_global_init(struct filed *Files) 84 1.1 christos { 85 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_global_init()\n"); 86 1.1 christos if (!(GlobalSign.sg == 0 || GlobalSign.sg == 1 87 1.1 christos || GlobalSign.sg == 2 || GlobalSign.sg == 3)) { 88 1.1 christos logerror("sign_init(): invalid SG %d", GlobalSign.sg); 89 1.1 christos return false; 90 1.1 christos } 91 1.1 christos 92 1.1 christos if (!sign_get_keys()) 93 1.1 christos return false; 94 1.1 christos 95 1.1 christos /* signature algorithm */ 96 1.1 christos /* can probably be merged with the hash algorithm/context but 97 1.1 christos * I leave the optimization for later until the RFC is ready */ 98 1.1 christos GlobalSign.sigctx = EVP_MD_CTX_create(); 99 1.1 christos EVP_MD_CTX_init(GlobalSign.sigctx); 100 1.1 christos 101 1.1 christos /* the signature algorithm depends on the type of key */ 102 1.7 christos switch (EVP_PKEY_base_id(GlobalSign.pubkey)) { 103 1.7 christos case EVP_PKEY_DSA: 104 1.7 christos GlobalSign.sig = EVP_sha1(); 105 1.1 christos GlobalSign.sig_len_b64 = SIGN_B64SIGLEN_DSS; 106 1.7 christos break; 107 1.7 christos #ifdef notyet 108 1.7 christos /* this is the place to add non-DSA key types and algorithms */ 109 1.7 christos case EVP_PKEY_RSA: 110 1.1 christos GlobalSign.sig = EVP_sha1(); 111 1.1 christos GlobalSign.sig_len_b64 = 28; 112 1.7 christos break; 113 1.7 christos #endif 114 1.7 christos default: 115 1.1 christos logerror("key type not supported for syslog-sign"); 116 1.1 christos return false; 117 1.1 christos } 118 1.1 christos 119 1.1 christos assert(GlobalSign.keytype == 'C' || GlobalSign.keytype == 'K'); 120 1.1 christos assert(GlobalSign.pubkey_b64 && GlobalSign.privkey && 121 1.1 christos GlobalSign.pubkey); 122 1.2 minskim 123 1.1 christos GlobalSign.gbc = 0; 124 1.1 christos STAILQ_INIT(&GlobalSign.SigGroups); 125 1.1 christos 126 1.1 christos /* hash algorithm */ 127 1.1 christos OpenSSL_add_all_digests(); 128 1.1 christos GlobalSign.mdctx = EVP_MD_CTX_create(); 129 1.1 christos EVP_MD_CTX_init(GlobalSign.mdctx); 130 1.1 christos 131 1.1 christos /* values for SHA-1 */ 132 1.7 christos GlobalSign.md = EVP_sha1(); 133 1.1 christos GlobalSign.md_len_b64 = 28; 134 1.1 christos GlobalSign.ver = "0111"; 135 1.1 christos 136 1.1 christos if (!sign_sg_init(Files)) 137 1.1 christos return false; 138 1.1 christos sign_new_reboot_session(); 139 1.2 minskim 140 1.1 christos DPRINTF(D_SIGN, "length values: SIGN_MAX_SD_LENGTH %d, " 141 1.1 christos "SIGN_MAX_FRAG_LENGTH %d, SIGN_MAX_SB_LENGTH %d, " 142 1.1 christos "SIGN_MAX_HASH_NUM %d\n", SIGN_MAX_SD_LENGTH, 143 1.1 christos SIGN_MAX_FRAG_LENGTH, SIGN_MAX_SB_LENGTH, SIGN_MAX_HASH_NUM); 144 1.1 christos 145 1.1 christos /* set just before return, so it indicates initialization */ 146 1.1 christos GlobalSign.rsid = now; 147 1.1 christos return true; 148 1.1 christos } 149 1.1 christos 150 1.1 christos /* 151 1.1 christos * get keys for syslog-sign 152 1.1 christos * either from the X.509 certificate used for TLS 153 1.1 christos * or by generating a new one 154 1.2 minskim * 155 1.1 christos * sets the global variables 156 1.1 christos * GlobalSign.keytype, GlobalSign.pubkey_b64, 157 1.1 christos * GlobalSign.privkey, and GlobalSign.pubkey 158 1.1 christos */ 159 1.1 christos bool 160 1.5 christos sign_get_keys(void) 161 1.1 christos { 162 1.1 christos EVP_PKEY *pubkey = NULL, *privkey = NULL; 163 1.1 christos unsigned char *der_pubkey = NULL, *ptr_der_pubkey = NULL; 164 1.1 christos char *pubkey_b64 = NULL; 165 1.1 christos int der_len; 166 1.2 minskim 167 1.1 christos /* try PKIX/TLS key first */ 168 1.1 christos #ifndef DISABLE_TLS 169 1.1 christos SSL *ssl; 170 1.1 christos if (tls_opt.global_TLS_CTX 171 1.1 christos && (ssl = SSL_new(tls_opt.global_TLS_CTX))) { 172 1.1 christos X509 *cert; 173 1.1 christos DPRINTF(D_SIGN, "Try to get keys from TLS X.509 cert...\n"); 174 1.2 minskim 175 1.1 christos if (!(cert = SSL_get_certificate(ssl))) { 176 1.1 christos logerror("SSL_get_certificate() failed"); 177 1.1 christos FREE_SSL(ssl); 178 1.1 christos return false; 179 1.1 christos } 180 1.1 christos if (!(privkey = SSL_get_privatekey(ssl))) { 181 1.1 christos logerror("SSL_get_privatekey() failed"); 182 1.1 christos FREE_SSL(ssl); 183 1.1 christos return false; 184 1.1 christos } 185 1.1 christos if (!(pubkey = X509_get_pubkey(cert))) { 186 1.1 christos logerror("X509_get_pubkey() failed"); 187 1.1 christos FREE_SSL(ssl); 188 1.1 christos return false; 189 1.1 christos } 190 1.1 christos /* note: 191 1.1 christos * - privkey is just a pointer into SSL_CTX and 192 1.1 christos * must not be changed nor be free()d 193 1.1 christos * - but pubkey has to be freed with EVP_PKEY_free() 194 1.1 christos */ 195 1.1 christos FREE_SSL(ssl); 196 1.1 christos 197 1.7 christos if (EVP_PKEY_DSA != EVP_PKEY_base_id(pubkey)) { 198 1.1 christos DPRINTF(D_SIGN, "X.509 cert has no DSA key\n"); 199 1.1 christos EVP_PKEY_free(pubkey); 200 1.1 christos privkey = NULL; 201 1.1 christos pubkey = NULL; 202 1.1 christos } else { 203 1.1 christos DPRINTF(D_SIGN, "Got public and private key " 204 1.1 christos "from X.509 --> use type PKIX\n"); 205 1.1 christos GlobalSign.keytype = 'C'; 206 1.1 christos GlobalSign.privkey = privkey; 207 1.1 christos GlobalSign.pubkey = pubkey; 208 1.2 minskim 209 1.1 christos /* base64 certificate encoding */ 210 1.1 christos der_len = i2d_X509(cert, NULL); 211 1.1 christos if (!(ptr_der_pubkey = der_pubkey = malloc(der_len)) 212 1.1 christos || !(pubkey_b64 = malloc(der_len*2))) { 213 1.1 christos free(der_pubkey); 214 1.1 christos logerror("malloc() failed"); 215 1.1 christos return false; 216 1.1 christos } 217 1.1 christos if (i2d_X509(cert, &ptr_der_pubkey) <= 0) { 218 1.1 christos logerror("i2d_X509() failed"); 219 1.1 christos return false; 220 1.1 christos } 221 1.1 christos b64_ntop(der_pubkey, der_len, pubkey_b64, der_len*2); 222 1.1 christos free(der_pubkey); 223 1.1 christos /* try to resize memory object as needed */ 224 1.1 christos GlobalSign.pubkey_b64 = realloc(pubkey_b64, 225 1.1 christos strlen(pubkey_b64)+1); 226 1.1 christos if (!GlobalSign.pubkey_b64) 227 1.1 christos GlobalSign.pubkey_b64 = pubkey_b64; 228 1.1 christos } 229 1.1 christos } 230 1.1 christos #endif /* !DISABLE_TLS */ 231 1.1 christos if (!(privkey && pubkey)) { /* PKIX not available --> generate key */ 232 1.1 christos DSA *dsa; 233 1.1 christos 234 1.1 christos DPRINTF(D_SIGN, "Unable to get keys from X.509 " 235 1.1 christos "--> use DSA with type 'K'\n"); 236 1.1 christos if (!(privkey = EVP_PKEY_new())) { 237 1.1 christos logerror("EVP_PKEY_new() failed"); 238 1.1 christos return false; 239 1.1 christos } 240 1.7 christos if ((dsa = DSA_new()) == NULL) { 241 1.7 christos logerror("DSA_new() failed"); 242 1.7 christos return false; 243 1.7 christos } 244 1.7 christos if (!DSA_generate_parameters_ex(dsa, SIGN_GENCERT_BITS, NULL, 0, 245 1.7 christos NULL, NULL, NULL)) { 246 1.7 christos logerror("DSA_generate_parameters_ex() failed"); 247 1.7 christos return false; 248 1.7 christos } 249 1.1 christos if (!DSA_generate_key(dsa)) { 250 1.1 christos logerror("DSA_generate_key() failed"); 251 1.1 christos return false; 252 1.1 christos } 253 1.1 christos if (!EVP_PKEY_assign_DSA(privkey, dsa)) { 254 1.1 christos logerror("EVP_PKEY_assign_DSA() failed"); 255 1.1 christos return false; 256 1.1 christos } 257 1.1 christos GlobalSign.keytype = 'K'; /* public/private keys used */ 258 1.1 christos GlobalSign.privkey = privkey; 259 1.1 christos GlobalSign.pubkey = privkey; 260 1.1 christos 261 1.1 christos /* pubkey base64 encoding */ 262 1.1 christos der_len = i2d_DSA_PUBKEY(dsa, NULL); 263 1.1 christos if (!(ptr_der_pubkey = der_pubkey = malloc(der_len)) 264 1.1 christos || !(pubkey_b64 = malloc(der_len*2))) { 265 1.1 christos free(der_pubkey); 266 1.1 christos logerror("malloc() failed"); 267 1.1 christos return false; 268 1.1 christos } 269 1.1 christos if (i2d_DSA_PUBKEY(dsa, &ptr_der_pubkey) <= 0) { 270 1.1 christos logerror("i2d_DSA_PUBKEY() failed"); 271 1.4 spz free(der_pubkey); 272 1.4 spz free(pubkey_b64); 273 1.1 christos return false; 274 1.1 christos } 275 1.1 christos b64_ntop(der_pubkey, der_len, pubkey_b64, der_len*2); 276 1.1 christos free(der_pubkey); 277 1.1 christos /* try to resize memory object as needed */ 278 1.1 christos GlobalSign.pubkey_b64 = realloc(pubkey_b64, 279 1.1 christos strlen(pubkey_b64) + 1); 280 1.1 christos if (!GlobalSign.pubkey_b64) 281 1.1 christos GlobalSign.pubkey_b64 = pubkey_b64; 282 1.1 christos } 283 1.1 christos return true; 284 1.1 christos } 285 1.1 christos 286 1.1 christos /* 287 1.2 minskim * init SGs 288 1.1 christos */ 289 1.1 christos bool 290 1.1 christos sign_sg_init(struct filed *Files) 291 1.1 christos { 292 1.1 christos struct signature_group_t *sg, *newsg, *last_sg; 293 1.1 christos struct filed_queue *fq; 294 1.1 christos struct string_queue *sqentry, *last_sqentry; 295 1.1 christos struct filed *f; 296 1.3 lukem unsigned int i; 297 1.1 christos 298 1.1 christos /* note on SG 1 and 2: 299 1.1 christos * it is assumed that redundant signature groups 300 1.1 christos * and especially signature groups without an associated 301 1.1 christos * destination are harmless. 302 1.1 christos * this currently holds true because sign_append_hash() 303 1.1 christos * is called from fprintlog(), so only actually used 304 1.1 christos * signature group get hashes and need memory for them 305 1.1 christos */ 306 1.1 christos /* possible optimization for SGs 1 and 2: 307 1.1 christos * use a struct signature_group_t *newsg[IETF_NUM_PRIVALUES] 308 1.1 christos * for direct group lookup 309 1.1 christos */ 310 1.1 christos 311 1.1 christos #define ALLOC_OR_FALSE(x) do { \ 312 1.1 christos if(!((x) = calloc(1, sizeof(*(x))))) { \ 313 1.1 christos logerror("Unable to allocate memory"); \ 314 1.1 christos return false; \ 315 1.1 christos } \ 316 1.8 rillig } while (0) 317 1.1 christos 318 1.1 christos #define ALLOC_SG(x) do { \ 319 1.1 christos ALLOC_OR_FALSE(x); \ 320 1.1 christos (x)->last_msg_num = 1; /* cf. section 4.2.5 */ \ 321 1.1 christos STAILQ_INIT(&(x)->hashes); \ 322 1.1 christos STAILQ_INIT(&(x)->files); \ 323 1.8 rillig } while (0) 324 1.1 christos 325 1.1 christos /* alloc(fq) and add to SGs file queue */ 326 1.1 christos #define ASSIGN_FQ() do { \ 327 1.1 christos ALLOC_OR_FALSE(fq); \ 328 1.1 christos fq->f = f; \ 329 1.1 christos f->f_sg = newsg; \ 330 1.1 christos DPRINTF(D_SIGN, "SG@%p <--> f@%p\n", newsg, f); \ 331 1.1 christos STAILQ_INSERT_TAIL(&newsg->files, fq, entries); \ 332 1.8 rillig } while (0) 333 1.1 christos 334 1.1 christos switch (GlobalSign.sg) { 335 1.1 christos case 0: 336 1.1 christos /* one SG, linked to all files */ 337 1.1 christos ALLOC_SG(newsg); 338 1.1 christos newsg->spri = 0; 339 1.1 christos for (f = Files; f; f = f->f_next) 340 1.1 christos ASSIGN_FQ(); 341 1.1 christos STAILQ_INSERT_TAIL(&GlobalSign.SigGroups, 342 1.1 christos newsg, entries); 343 1.1 christos break; 344 1.1 christos case 1: 345 1.1 christos /* every PRI gets one SG */ 346 1.1 christos for (i = 0; i < IETF_NUM_PRIVALUES; i++) { 347 1.1 christos int fac, prilev; 348 1.1 christos fac = LOG_FAC(i); 349 1.1 christos prilev = LOG_PRI(i); 350 1.1 christos ALLOC_SG(newsg); 351 1.1 christos newsg->spri = i; 352 1.1 christos 353 1.1 christos /* now find all destinations associated with this SG */ 354 1.1 christos for (f = Files; f; f = f->f_next) 355 1.1 christos /* check priorities */ 356 1.1 christos if (MATCH_PRI(f, fac, prilev)) 357 1.1 christos ASSIGN_FQ(); 358 1.1 christos STAILQ_INSERT_TAIL(&GlobalSign.SigGroups, 359 1.1 christos newsg, entries); 360 1.1 christos } 361 1.1 christos break; 362 1.1 christos case 2: 363 1.1 christos /* PRI ranges get one SG, boundaries given by the 364 1.1 christos * SPRI, indicating the largest PRI in the SG 365 1.2 minskim * 366 1.1 christos * either GlobalSign.sig2_delims has a list of 367 1.1 christos * user configured delimiters, or we use a default 368 1.1 christos * and set up one SG per facility 369 1.1 christos */ 370 1.1 christos if (STAILQ_EMPTY(&GlobalSign.sig2_delims)) { 371 1.1 christos DPRINTF(D_SIGN, "sign_sg_init(): set default " 372 1.1 christos "values for SG 2\n"); 373 1.1 christos for (i = 0; i < (IETF_NUM_PRIVALUES>>3); i++) { 374 1.1 christos ALLOC_OR_FALSE(sqentry); 375 1.1 christos sqentry->data = NULL; 376 1.1 christos sqentry->key = (i<<3); 377 1.1 christos STAILQ_INSERT_TAIL(&GlobalSign.sig2_delims, 378 1.1 christos sqentry, entries); 379 1.1 christos } 380 1.1 christos } 381 1.1 christos assert(!STAILQ_EMPTY(&GlobalSign.sig2_delims)); 382 1.1 christos 383 1.1 christos /* add one more group at the end */ 384 1.1 christos last_sqentry = STAILQ_LAST(&GlobalSign.sig2_delims, 385 1.1 christos string_queue, entries); 386 1.1 christos if (last_sqentry->key < IETF_NUM_PRIVALUES) { 387 1.1 christos ALLOC_OR_FALSE(sqentry); 388 1.1 christos sqentry->data = NULL; 389 1.1 christos sqentry->key = IETF_NUM_PRIVALUES-1; 390 1.1 christos STAILQ_INSERT_TAIL(&GlobalSign.sig2_delims, 391 1.1 christos sqentry, entries); 392 1.1 christos } 393 1.1 christos 394 1.1 christos STAILQ_FOREACH(sqentry, &GlobalSign.sig2_delims, entries) { 395 1.3 lukem unsigned int min_pri = 0; 396 1.1 christos ALLOC_SG(newsg); 397 1.1 christos newsg->spri = sqentry->key; 398 1.1 christos 399 1.1 christos /* check _all_ priorities in SG */ 400 1.1 christos last_sg = STAILQ_LAST(&GlobalSign.SigGroups, 401 1.1 christos signature_group_t, entries); 402 1.1 christos if (last_sg) 403 1.1 christos min_pri = last_sg->spri + 1; 404 1.1 christos 405 1.1 christos DPRINTF(D_SIGN, "sign_sg_init(): add SG@%p: SG=\"2\"," 406 1.1 christos " SPRI=\"%d\" -- for msgs with " 407 1.1 christos "%d <= pri <= %d\n", 408 1.1 christos newsg, newsg->spri, min_pri, newsg->spri); 409 1.1 christos /* now find all destinations associated with this SG */ 410 1.1 christos for (f = Files; f; f = f->f_next) { 411 1.1 christos bool match = false; 412 1.1 christos for (i = min_pri; i <= newsg->spri; i++) { 413 1.1 christos int fac, prilev; 414 1.1 christos fac = LOG_FAC(i); 415 1.1 christos prilev = LOG_PRI(i); 416 1.1 christos if (MATCH_PRI(f, fac, prilev)) { 417 1.1 christos match = true; 418 1.1 christos break; 419 1.1 christos } 420 1.1 christos } 421 1.1 christos if (match) 422 1.1 christos ASSIGN_FQ(); 423 1.1 christos } 424 1.1 christos STAILQ_INSERT_TAIL(&GlobalSign.SigGroups, 425 1.1 christos newsg, entries); 426 1.1 christos } 427 1.1 christos break; 428 1.1 christos case 3: 429 1.1 christos /* every file (with flag) gets one SG */ 430 1.1 christos for (f = Files; f; f = f->f_next) { 431 1.1 christos if (!(f->f_flags & FFLAG_SIGN)) { 432 1.1 christos f->f_sg = NULL; 433 1.1 christos continue; 434 1.1 christos } 435 1.1 christos ALLOC_SG(newsg); 436 1.1 christos newsg->spri = f->f_file; /* not needed but shows SGs */ 437 1.1 christos ASSIGN_FQ(); 438 1.1 christos STAILQ_INSERT_TAIL(&GlobalSign.SigGroups, 439 1.1 christos newsg, entries); 440 1.1 christos } 441 1.1 christos break; 442 1.1 christos } 443 1.1 christos DPRINTF((D_PARSE|D_SIGN), "sign_sg_init() set up these " 444 1.1 christos "Signature Groups:\n"); 445 1.1 christos STAILQ_FOREACH(sg, &GlobalSign.SigGroups, entries) { 446 1.1 christos DPRINTF((D_PARSE|D_SIGN), "SG@%p with SG=\"%d\", SPRI=\"%d\"," 447 1.1 christos " associated files:\n", sg, GlobalSign.sg, sg->spri); 448 1.1 christos STAILQ_FOREACH(fq, &sg->files, entries) { 449 1.1 christos DPRINTF((D_PARSE|D_SIGN), " f@%p with type %d\n", 450 1.1 christos fq->f, fq->f->f_type); 451 1.1 christos } 452 1.1 christos } 453 1.1 christos return true; 454 1.1 christos } 455 1.1 christos 456 1.1 christos /* 457 1.2 minskim * free all SGs for a given algorithm 458 1.1 christos */ 459 1.1 christos void 460 1.5 christos sign_global_free(void) 461 1.1 christos { 462 1.1 christos struct signature_group_t *sg, *tmp_sg; 463 1.1 christos struct filed_queue *fq, *tmp_fq; 464 1.1 christos 465 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_global_free()\n"); 466 1.1 christos STAILQ_FOREACH_SAFE(sg, &GlobalSign.SigGroups, entries, tmp_sg) { 467 1.1 christos if (!STAILQ_EMPTY(&sg->hashes)) { 468 1.1 christos /* send CB and SB twice to get minimal redundancy 469 1.1 christos * for the last few message hashes */ 470 1.1 christos sign_send_certificate_block(sg); 471 1.1 christos sign_send_certificate_block(sg); 472 1.1 christos sign_send_signature_block(sg, true); 473 1.1 christos sign_send_signature_block(sg, true); 474 1.1 christos sign_free_hashes(sg); 475 1.1 christos } 476 1.1 christos fq = STAILQ_FIRST(&sg->files); 477 1.1 christos while (fq != NULL) { 478 1.1 christos tmp_fq = STAILQ_NEXT(fq, entries); 479 1.1 christos free(fq); 480 1.1 christos fq = tmp_fq; 481 1.1 christos } 482 1.1 christos STAILQ_REMOVE(&GlobalSign.SigGroups, 483 1.1 christos sg, signature_group_t, entries); 484 1.1 christos free(sg); 485 1.1 christos } 486 1.1 christos sign_free_string_queue(&GlobalSign.sig2_delims); 487 1.1 christos 488 1.1 christos if (GlobalSign.privkey) { 489 1.1 christos GlobalSign.privkey = NULL; 490 1.1 christos } 491 1.1 christos if (GlobalSign.pubkey) { 492 1.1 christos EVP_PKEY_free(GlobalSign.pubkey); 493 1.1 christos GlobalSign.pubkey = NULL; 494 1.2 minskim } 495 1.1 christos if(GlobalSign.mdctx) { 496 1.1 christos EVP_MD_CTX_destroy(GlobalSign.mdctx); 497 1.1 christos GlobalSign.mdctx = NULL; 498 1.1 christos } 499 1.1 christos if(GlobalSign.sigctx) { 500 1.1 christos EVP_MD_CTX_destroy(GlobalSign.sigctx); 501 1.1 christos GlobalSign.sigctx = NULL; 502 1.1 christos } 503 1.1 christos FREEPTR(GlobalSign.pubkey_b64); 504 1.1 christos } 505 1.1 christos 506 1.1 christos /* 507 1.1 christos * create and send certificate block 508 1.1 christos */ 509 1.1 christos bool 510 1.1 christos sign_send_certificate_block(struct signature_group_t *sg) 511 1.1 christos { 512 1.1 christos struct filed_queue *fq; 513 1.1 christos struct buf_msg *buffer; 514 1.1 christos char *tstamp; 515 1.1 christos char payload[SIGN_MAX_PAYLOAD_LENGTH]; 516 1.1 christos char sd[SIGN_MAX_SD_LENGTH]; 517 1.9 uwe size_t payload_len, fragment_len; 518 1.1 christos size_t payload_index = 0; 519 1.1 christos 520 1.1 christos /* do nothing if CBs already sent or if there was no message in SG */ 521 1.1 christos if (!sg->resendcount 522 1.1 christos || ((sg->resendcount == SIGN_RESENDCOUNT_CERTBLOCK) 523 1.1 christos && STAILQ_EMPTY(&sg->hashes))) 524 1.1 christos return false; 525 1.1 christos 526 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_send_certificate_block(%p)\n", sg); 527 1.6 christos tstamp = make_timestamp(NULL, true, (size_t)-1); 528 1.1 christos 529 1.1 christos payload_len = snprintf(payload, sizeof(payload), "%s %c %s", tstamp, 530 1.1 christos GlobalSign.keytype, GlobalSign.pubkey_b64); 531 1.1 christos if (payload_len >= sizeof(payload)) { 532 1.1 christos DPRINTF(D_SIGN, "Buffer too small for syslog-sign setup\n"); 533 1.1 christos return false; 534 1.1 christos } 535 1.1 christos 536 1.1 christos while (payload_index < payload_len) { 537 1.1 christos if (payload_len - payload_index <= SIGN_MAX_FRAG_LENGTH) 538 1.1 christos fragment_len = payload_len - payload_index; 539 1.1 christos else 540 1.1 christos fragment_len = SIGN_MAX_FRAG_LENGTH; 541 1.1 christos 542 1.1 christos /* format SD */ 543 1.9 uwe size_t sd_len __diagused; 544 1.1 christos sd_len = snprintf(sd, sizeof(sd), "[ssign-cert " 545 1.1 christos "VER=\"%s\" RSID=\"%" PRIuFAST64 "\" SG=\"%d\" " 546 1.1 christos "SPRI=\"%d\" TBPL=\"%zu\" INDEX=\"%zu\" " 547 1.1 christos "FLEN=\"%zu\" FRAG=\"%.*s\" " 548 1.1 christos "SIGN=\"\"]", 549 1.1 christos GlobalSign.ver, GlobalSign.rsid, GlobalSign.sg, 550 1.1 christos sg->spri, payload_len, payload_index+1, 551 1.1 christos fragment_len, (int)fragment_len, 552 1.1 christos &payload[payload_index]); 553 1.1 christos assert(sd_len < sizeof(sd)); 554 1.1 christos assert(sd[sd_len] == '\0'); 555 1.1 christos assert(sd[sd_len-1] == ']'); 556 1.1 christos assert(sd[sd_len-2] == '"'); 557 1.2 minskim 558 1.1 christos if (!sign_msg_sign(&buffer, sd, sizeof(sd))) 559 1.1 christos return 0; 560 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_send_certificate_block(): " 561 1.1 christos "calling fprintlog()\n"); 562 1.1 christos 563 1.1 christos STAILQ_FOREACH(fq, &sg->files, entries) { 564 1.1 christos /* we have to preserve the f_prevcount */ 565 1.1 christos int tmpcnt; 566 1.1 christos tmpcnt = fq->f->f_prevcount; 567 1.1 christos fprintlog(fq->f, buffer, NULL); 568 1.1 christos fq->f->f_prevcount = tmpcnt; 569 1.1 christos } 570 1.1 christos sign_inc_gbc(); 571 1.1 christos DELREF(buffer); 572 1.1 christos payload_index += fragment_len; 573 1.1 christos } 574 1.1 christos sg->resendcount--; 575 1.1 christos return true; 576 1.1 christos } 577 1.1 christos 578 1.1 christos /* 579 1.1 christos * determine the SG for a message 580 1.1 christos * returns NULL if -sign not configured or no SG for this priority 581 1.1 christos */ 582 1.1 christos struct signature_group_t * 583 1.1 christos sign_get_sg(int pri, struct filed *f) 584 1.1 christos { 585 1.1 christos struct signature_group_t *sg, *rc = NULL; 586 1.2 minskim 587 1.1 christos if (GlobalSign.rsid && f) 588 1.1 christos switch (GlobalSign.sg) { 589 1.1 christos case 0: 590 1.1 christos rc = f->f_sg; 591 1.1 christos break; 592 1.1 christos case 1: 593 1.1 christos case 2: 594 1.1 christos STAILQ_FOREACH(sg, &GlobalSign.SigGroups, entries) { 595 1.3 lukem if (sg->spri >= (unsigned int)pri) { 596 1.1 christos rc = sg; 597 1.1 christos break; 598 1.1 christos } 599 1.1 christos } 600 1.1 christos break; 601 1.1 christos case 3: 602 1.1 christos if (f->f_flags & FFLAG_SIGN) 603 1.1 christos rc = f->f_sg; 604 1.1 christos else 605 1.1 christos rc = NULL; 606 1.1 christos break; 607 1.1 christos } 608 1.1 christos 609 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_get_sg(%d, %p) --> %p\n", pri, f, rc); 610 1.1 christos return rc; 611 1.1 christos } 612 1.1 christos 613 1.1 christos /* 614 1.1 christos * create and send signature block 615 1.2 minskim * 616 1.1 christos * uses a sliding window for redundancy 617 1.1 christos * if force==true then simply send all available hashes, e.g. on shutdown 618 1.2 minskim * 619 1.1 christos * sliding window checks implicitly assume that new hashes are appended 620 1.1 christos * to the SG between two calls. if that is not the case (e.g. with repeated 621 1.1 christos * messages) the queue size will shrink. 622 1.1 christos * this has no negative consequences except generating more and shorter SBs 623 1.1 christos * than expected and confusing the operator because two consecutive SBs will 624 1.1 christos * have same FMNn 625 1.1 christos */ 626 1.1 christos unsigned 627 1.1 christos sign_send_signature_block(struct signature_group_t *sg, bool force) 628 1.1 christos { 629 1.1 christos char sd[SIGN_MAX_SD_LENGTH]; 630 1.1 christos size_t sd_len; 631 1.1 christos size_t sg_num_hashes = 0; /* hashes in SG queue */ 632 1.1 christos size_t hashes_in_sb = 0; /* number of hashes in current SB */ 633 1.1 christos size_t hashes_sent = 0; /* count of hashes sent */ 634 1.1 christos struct string_queue *qentry, *old_qentry; 635 1.1 christos struct buf_msg *buffer; 636 1.1 christos struct filed_queue *fq; 637 1.3 lukem size_t i; 638 1.1 christos 639 1.1 christos if (!sg) return 0; 640 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_send_signature_block(%p, %d)\n", 641 1.1 christos sg, force); 642 1.1 christos 643 1.1 christos STAILQ_FOREACH(qentry, &sg->hashes, entries) 644 1.1 christos sg_num_hashes++; 645 1.1 christos 646 1.1 christos /* only act if a division is full */ 647 1.1 christos if (!sg_num_hashes 648 1.1 christos || (!force && (sg_num_hashes % SIGN_HASH_DIVISION_NUM))) 649 1.1 christos return 0; 650 1.1 christos 651 1.1 christos /* if no CB sent so far then do now, just before first SB */ 652 1.1 christos if (sg->resendcount == SIGN_RESENDCOUNT_CERTBLOCK) 653 1.1 christos sign_send_certificate_block(sg); 654 1.2 minskim 655 1.1 christos /* shortly after reboot we have shorter SBs */ 656 1.1 christos hashes_in_sb = MIN(sg_num_hashes, SIGN_HASH_NUM); 657 1.2 minskim 658 1.1 christos DPRINTF(D_SIGN, "sign_send_signature_block(): " 659 1.1 christos "sg_num_hashes = %zu, hashes_in_sb = %zu, SIGN_HASH_NUM = %d\n", 660 1.1 christos sg_num_hashes, hashes_in_sb, SIGN_HASH_NUM); 661 1.1 christos if (sg_num_hashes > SIGN_HASH_NUM) { 662 1.1 christos DPRINTF(D_SIGN, "sign_send_signature_block(): sg_num_hashes" 663 1.1 christos " > SIGN_HASH_NUM -- This should not happen!\n"); 664 1.1 christos } 665 1.1 christos 666 1.1 christos /* now the SD */ 667 1.1 christos qentry = STAILQ_FIRST(&sg->hashes); 668 1.1 christos sd_len = snprintf(sd, sizeof(sd), "[ssign " 669 1.1 christos "VER=\"%s\" RSID=\"%" PRIuFAST64 "\" SG=\"%d\" " 670 1.1 christos "SPRI=\"%d\" GBC=\"%" PRIuFAST64 "\" FMN=\"%" PRIuFAST64 "\" " 671 1.1 christos "CNT=\"%zu\" HB=\"", 672 1.1 christos GlobalSign.ver, GlobalSign.rsid, GlobalSign.sg, 673 1.1 christos sg->spri, GlobalSign.gbc, qentry->key, 674 1.1 christos hashes_in_sb); 675 1.1 christos while (hashes_sent < hashes_in_sb) { 676 1.1 christos assert(qentry); 677 1.1 christos sd_len += snprintf(sd+sd_len, sizeof(sd)-sd_len, "%s ", 678 1.1 christos qentry->data); 679 1.1 christos hashes_sent++; 680 1.1 christos qentry = STAILQ_NEXT(qentry, entries); 681 1.1 christos } 682 1.1 christos /* overwrite last space and close SD */ 683 1.1 christos assert(sd_len < sizeof(sd)); 684 1.1 christos assert(sd[sd_len] == '\0'); 685 1.1 christos assert(sd[sd_len-1] == ' '); 686 1.1 christos sd[sd_len-1] = '\0'; 687 1.1 christos sd_len = strlcat(sd, "\" SIGN=\"\"]", sizeof(sd)); 688 1.1 christos 689 1.1 christos if (sign_msg_sign(&buffer, sd, sizeof(sd))) { 690 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_send_signature_block(): calling" 691 1.1 christos " fprintlog(), sending %zu out of %zu hashes\n", 692 1.1 christos MIN(SIGN_MAX_HASH_NUM, sg_num_hashes), sg_num_hashes); 693 1.2 minskim 694 1.1 christos STAILQ_FOREACH(fq, &sg->files, entries) { 695 1.1 christos int tmpcnt; 696 1.1 christos tmpcnt = fq->f->f_prevcount; 697 1.1 christos fprintlog(fq->f, buffer, NULL); 698 1.1 christos fq->f->f_prevcount = tmpcnt; 699 1.1 christos } 700 1.1 christos sign_inc_gbc(); 701 1.1 christos DELREF(buffer); 702 1.1 christos } 703 1.1 christos /* always drop the oldest division of hashes */ 704 1.1 christos if (sg_num_hashes >= SIGN_HASH_NUM) { 705 1.1 christos qentry = STAILQ_FIRST(&sg->hashes); 706 1.1 christos for (i = 0; i < SIGN_HASH_DIVISION_NUM; i++) { 707 1.1 christos old_qentry = qentry; 708 1.1 christos qentry = STAILQ_NEXT(old_qentry, entries); 709 1.1 christos STAILQ_REMOVE(&sg->hashes, old_qentry, 710 1.1 christos string_queue, entries); 711 1.1 christos FREEPTR(old_qentry->data); 712 1.1 christos FREEPTR(old_qentry); 713 1.1 christos } 714 1.1 christos } 715 1.1 christos return hashes_sent; 716 1.1 christos } 717 1.1 christos 718 1.1 christos void 719 1.1 christos sign_free_hashes(struct signature_group_t *sg) 720 1.1 christos { 721 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_free_hashes(%p)\n", sg); 722 1.1 christos sign_free_string_queue(&sg->hashes); 723 1.1 christos } 724 1.1 christos 725 1.1 christos void 726 1.1 christos sign_free_string_queue(struct string_queue_head *sqhead) 727 1.1 christos { 728 1.1 christos struct string_queue *qentry, *tmp_qentry; 729 1.2 minskim 730 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_free_string_queue(%p)\n", sqhead); 731 1.1 christos STAILQ_FOREACH_SAFE(qentry, sqhead, entries, tmp_qentry) { 732 1.1 christos STAILQ_REMOVE(sqhead, qentry, string_queue, entries); 733 1.1 christos FREEPTR(qentry->data); 734 1.1 christos free(qentry); 735 1.1 christos } 736 1.1 christos assert(STAILQ_EMPTY(sqhead)); 737 1.1 christos } 738 1.1 christos 739 1.1 christos /* 740 1.1 christos * hash one syslog message 741 1.1 christos */ 742 1.1 christos bool 743 1.1 christos sign_msg_hash(char *line, char **hash) 744 1.1 christos { 745 1.1 christos unsigned char md_value[EVP_MAX_MD_SIZE]; 746 1.1 christos unsigned char md_b64[EVP_MAX_MD_SIZE*2]; 747 1.1 christos /* TODO: exact expression for b64 length? */ 748 1.1 christos unsigned md_len = 0; 749 1.1 christos 750 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_msg_hash('%s')\n", line); 751 1.2 minskim 752 1.1 christos SSL_CHECK_ONE(EVP_DigestInit_ex(GlobalSign.mdctx, GlobalSign.md, NULL)); 753 1.1 christos SSL_CHECK_ONE(EVP_DigestUpdate(GlobalSign.mdctx, line, strlen(line))); 754 1.1 christos SSL_CHECK_ONE(EVP_DigestFinal_ex(GlobalSign.mdctx, md_value, &md_len)); 755 1.2 minskim 756 1.1 christos b64_ntop(md_value, md_len, (char *)md_b64, EVP_MAX_MD_SIZE*2); 757 1.1 christos *hash = strdup((char *)md_b64); 758 1.1 christos 759 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_msg_hash() --> \"%s\"\n", *hash); 760 1.1 christos return true; 761 1.1 christos } 762 1.1 christos 763 1.1 christos /* 764 1.1 christos * append hash to SG queue 765 1.1 christos */ 766 1.1 christos bool 767 1.1 christos sign_append_hash(char *hash, struct signature_group_t *sg) 768 1.1 christos { 769 1.1 christos struct string_queue *qentry; 770 1.1 christos 771 1.1 christos /* if one SG is shared by several destinations 772 1.1 christos * prevent duplicate entries */ 773 1.1 christos if ((qentry = STAILQ_LAST(&sg->hashes, string_queue, entries)) 774 1.1 christos && !strcmp(qentry->data, hash)) { 775 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_append_hash('%s', %p): " 776 1.1 christos "hash already in queue\n", hash, sg); 777 1.1 christos return false; 778 1.1 christos } 779 1.1 christos 780 1.1 christos MALLOC(qentry, sizeof(*qentry)); 781 1.1 christos qentry->key = sign_assign_msg_num(sg); 782 1.1 christos qentry->data = hash; 783 1.1 christos STAILQ_INSERT_TAIL(&sg->hashes, qentry, entries); 784 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_append_hash('%s', %p): " 785 1.1 christos "#%" PRIdFAST64 "\n", hash, sg, qentry->key); 786 1.1 christos return true; 787 1.1 christos } 788 1.1 christos 789 1.1 christos /* 790 1.1 christos * sign one syslog-sign message 791 1.2 minskim * 792 1.1 christos * requires a ssign or ssigt-cert SD element 793 1.1 christos * ending with ' SIGN=""]' in sd 794 1.1 christos * linesize is available memory (= sizeof(sd)) 795 1.2 minskim * 796 1.1 christos * function will calculate signature and return a new buffer 797 1.1 christos */ 798 1.1 christos bool 799 1.1 christos sign_msg_sign(struct buf_msg **bufferptr, char *sd, size_t linesize) 800 1.1 christos { 801 1.1 christos char *signature, *line; 802 1.1 christos size_t linelen, tlsprefixlen, endptr, newlinelen; 803 1.1 christos struct buf_msg *buffer; 804 1.1 christos 805 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_msg_sign()\n"); 806 1.1 christos endptr = strlen(sd); 807 1.1 christos 808 1.1 christos assert(endptr < linesize); 809 1.1 christos assert(sd[endptr] == '\0'); 810 1.1 christos assert(sd[endptr-1] == ']'); 811 1.1 christos assert(sd[endptr-2] == '"'); 812 1.1 christos 813 1.1 christos /* set up buffer */ 814 1.1 christos buffer = buf_msg_new(0); 815 1.6 christos buffer->timestamp = make_timestamp(NULL, !BSDOutputFormat, 0); 816 1.1 christos buffer->prog = appname; 817 1.1 christos buffer->pid = include_pid; 818 1.1 christos buffer->recvhost = buffer->host = LocalFQDN; 819 1.1 christos buffer->pri = 110; 820 1.1 christos buffer->flags = IGN_CONS|SIGN_MSG; 821 1.1 christos buffer->sd = sd; 822 1.1 christos 823 1.1 christos /* SD ready, now format and sign */ 824 1.1 christos if (!format_buffer(buffer, &line, &linelen, NULL, 825 1.1 christos &tlsprefixlen, NULL)) { 826 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_send_signature_block():" 827 1.1 christos " format_buffer() failed\n"); 828 1.1 christos buffer->sd = NULL; 829 1.1 christos DELREF(buffer); 830 1.1 christos return false; 831 1.1 christos } 832 1.1 christos if (!sign_string_sign(line+tlsprefixlen, &signature)) { 833 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_send_signature_block():" 834 1.1 christos " sign_string_sign() failed\n"); 835 1.1 christos buffer->sd = NULL; 836 1.1 christos DELREF(buffer); 837 1.1 christos FREEPTR(line); 838 1.1 christos return false; 839 1.1 christos } 840 1.1 christos FREEPTR(line); 841 1.1 christos sd[endptr-2] = '\0'; 842 1.1 christos newlinelen = strlcat(sd, signature, linesize); 843 1.1 christos newlinelen = strlcat(sd, "\"]", linesize); 844 1.2 minskim 845 1.1 christos if (newlinelen >= linesize) { 846 1.1 christos DPRINTF(D_SIGN, "sign_send_signature_block(): " 847 1.1 christos "buffer too small\n"); 848 1.1 christos buffer->sd = NULL; 849 1.1 christos DELREF(buffer); 850 1.1 christos return false; 851 1.1 christos } 852 1.1 christos assert(newlinelen < linesize); 853 1.1 christos assert(sd[newlinelen] == '\0'); 854 1.1 christos assert(sd[newlinelen-1] == ']'); 855 1.1 christos assert(sd[newlinelen-2] == '"'); 856 1.1 christos 857 1.1 christos buffer->sd = strdup(sd); 858 1.1 christos *bufferptr = buffer; 859 1.1 christos return true; 860 1.1 christos } 861 1.1 christos 862 1.1 christos /* 863 1.1 christos * sign one string 864 1.1 christos */ 865 1.1 christos bool 866 1.1 christos sign_string_sign(char *line, char **signature) 867 1.1 christos { 868 1.1 christos char buf[SIGN_MAX_LENGTH+1]; 869 1.1 christos unsigned char sig_value[SIGN_B64SIGLEN_DSS]; 870 1.1 christos unsigned char sig_b64[SIGN_B64SIGLEN_DSS]; 871 1.1 christos unsigned sig_len = 0; 872 1.1 christos char *p, *q; 873 1.2 minskim /* 874 1.1 christos * The signature is calculated over the completely formatted 875 1.1 christos * syslog-message, including all of the PRI, HEADER, and hashes 876 1.1 christos * in the hash block, excluding spaces between fields, and also 877 1.1 christos * excluding the signature field (SD Parameter Name "SIGN", "=", 878 1.1 christos * and corresponding value). 879 1.2 minskim * 880 1.1 christos * -- I am not quite sure which spaces are to be removed. 881 1.1 christos * Only the ones inside the "ssign" element or those between 882 1.1 christos * header fields as well? 883 1.1 christos */ 884 1.1 christos /* removes the string ' SIGN=""' */ 885 1.1 christos for (p = line, q = buf; 886 1.1 christos *p && (q - buf <= SIGN_MAX_LENGTH);) { 887 1.1 christos if (strncmp(p, " SIGN=\"\"", 8) == 0) 888 1.1 christos p += 8; 889 1.1 christos *q++ = *p++; 890 1.1 christos } 891 1.1 christos *q = '\0'; 892 1.1 christos 893 1.1 christos SSL_CHECK_ONE(EVP_SignInit(GlobalSign.sigctx, GlobalSign.sig)); 894 1.1 christos SSL_CHECK_ONE(EVP_SignUpdate(GlobalSign.sigctx, buf, q-buf)); 895 1.1 christos assert(GlobalSign.privkey); 896 1.1 christos SSL_CHECK_ONE(EVP_SignFinal(GlobalSign.sigctx, sig_value, &sig_len, 897 1.1 christos GlobalSign.privkey)); 898 1.2 minskim 899 1.1 christos b64_ntop(sig_value, sig_len, (char *)sig_b64, sizeof(sig_b64)); 900 1.1 christos *signature = strdup((char *)sig_b64); 901 1.1 christos 902 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_string_sign('%s') --> '%s'\n", 903 1.1 christos buf, *signature); 904 1.1 christos return *signature != NULL; 905 1.1 christos } 906 1.1 christos 907 1.1 christos void 908 1.5 christos sign_new_reboot_session(void) 909 1.1 christos { 910 1.1 christos struct signature_group_t *sg; 911 1.1 christos 912 1.1 christos DPRINTF((D_CALL|D_SIGN), "sign_new_reboot_session()\n"); 913 1.1 christos 914 1.1 christos /* global counters */ 915 1.1 christos GlobalSign.gbc = 0; 916 1.1 christos /* might be useful for later analysis: 917 1.1 christos * rebooted session IDs are sequential, 918 1.1 christos * normal IDs are almost always not */ 919 1.1 christos GlobalSign.rsid++; 920 1.1 christos 921 1.1 christos assert(GlobalSign.sg <= 3); 922 1.1 christos /* reset SGs */ 923 1.1 christos STAILQ_FOREACH(sg, &GlobalSign.SigGroups, entries) { 924 1.1 christos sg->resendcount = SIGN_RESENDCOUNT_CERTBLOCK; 925 1.1 christos sg->last_msg_num = 1; 926 1.1 christos } 927 1.1 christos } 928 1.1 christos 929 1.1 christos /* get msg_num, increment counter, check overflow */ 930 1.1 christos uint_fast64_t 931 1.1 christos sign_assign_msg_num(struct signature_group_t *sg) 932 1.1 christos { 933 1.1 christos uint_fast64_t old; 934 1.1 christos 935 1.1 christos old = sg->last_msg_num++; 936 1.1 christos if (sg->last_msg_num > SIGN_MAX_COUNT) 937 1.1 christos sign_new_reboot_session(); 938 1.1 christos return old; 939 1.1 christos } 940 1.1 christos 941 1.1 christos 942 1.1 christos /* increment gbc, check overflow */ 943 1.1 christos void 944 1.5 christos sign_inc_gbc(void) 945 1.1 christos { 946 1.1 christos if (++GlobalSign.gbc > SIGN_MAX_COUNT) 947 1.1 christos sign_new_reboot_session(); 948 1.1 christos } 949 1.1 christos #endif /* !DISABLE_SIGN */ 950