version 1.5, 2002/06/26 22:27:32 |
version 1.6, 2002/07/03 09:55:38 |
|
|
RCSID("$OpenBSD$"); |
RCSID("$OpenBSD$"); |
|
|
#include <openssl/evp.h> |
#include <openssl/evp.h> |
|
#include <openssl/rand.h> |
|
#include <openssl/rsa.h> |
|
|
#include "log.h" |
#include "log.h" |
#include "key.h" |
#include "key.h" |
|
|
u_char *signature, *data; |
u_char *signature, *data; |
char *host; |
char *host; |
u_int slen, dlen; |
u_int slen, dlen; |
|
u_int32_t rnd[256]; |
|
|
key_fd[0] = open(_PATH_HOST_RSA_KEY_FILE, O_RDONLY); |
key_fd[0] = open(_PATH_HOST_RSA_KEY_FILE, O_RDONLY); |
key_fd[1] = open(_PATH_HOST_DSA_KEY_FILE, O_RDONLY); |
key_fd[1] = open(_PATH_HOST_DSA_KEY_FILE, O_RDONLY); |
|
|
pw = pwcopy(pw); |
pw = pwcopy(pw); |
|
|
SSLeay_add_all_algorithms(); |
SSLeay_add_all_algorithms(); |
|
for (i = 0; i < 256; i++) |
|
rnd[i] = arc4random(); |
|
RAND_seed(rnd, sizeof(rnd)); |
|
|
found = 0; |
found = 0; |
for (i = 0; i < 2; i++) { |
for (i = 0; i < 2; i++) { |
|
|
keys[i] = key_load_private_pem(key_fd[i], KEY_UNSPEC, |
keys[i] = key_load_private_pem(key_fd[i], KEY_UNSPEC, |
NULL, NULL); |
NULL, NULL); |
close(key_fd[i]); |
close(key_fd[i]); |
|
if (keys[i] != NULL && keys[i]->type == KEY_RSA) { |
|
if (RSA_blinding_on(keys[i]->rsa, NULL) != 1) { |
|
error("RSA_blinding_on failed"); |
|
key_free(keys[i]); |
|
keys[i] = NULL; |
|
} |
|
} |
if (keys[i] != NULL) |
if (keys[i] != NULL) |
found = 1; |
found = 1; |
} |
} |