This allows the method to be resued for generating other types of keys
that should also not be reused as tls-crypt/tls-auth keys.
Acked-by: Steffan Karger <steffan.karger@fox-it.com>
Message-Id: <
20190114154819.6064-2-arne@rfc2549.org>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg18090.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>
return pair->openvpn_name;
}
+
+void
+write_pem_key_file(const char *filename, const char *pem_name)
+{
+ struct gc_arena gc = gc_new();
+ struct key server_key = { 0 };
+ struct buffer server_key_buf = clear_buf();
+ struct buffer server_key_pem = clear_buf();
+
+ if (!rand_bytes((void *)&server_key, sizeof(server_key)))
+ {
+ msg(M_NONFATAL, "ERROR: could not generate random key");
+ goto cleanup;
+ }
+ buf_set_read(&server_key_buf, (void *)&server_key, sizeof(server_key));
+ if (!crypto_pem_encode(pem_name, &server_key_pem,
+ &server_key_buf, &gc))
+ {
+ msg(M_WARN, "ERROR: could not PEM-encode key");
+ goto cleanup;
+ }
+
+ if (!buffer_write_file(filename, &server_key_pem))
+ {
+ msg(M_ERR, "ERROR: could not write key file");
+ goto cleanup;
+ }
+
+cleanup:
+ secure_memzero(&server_key, sizeof(server_key));
+ buf_clear(&server_key_pem);
+ gc_free(&gc);
+ return;
+}
/** Return the worst-case OpenVPN crypto overhead (in bytes) */
unsigned int crypto_max_overhead(void);
+/**
+ * Generate a server key with enough randomness to fill a key struct
+ * and write to file.
+ *
+ * @param filename Filename of the server key file to create.
+ * @param pem_name The name to use in the PEM header/footer.
+ */
+void
+write_pem_key_file(const char *filename, const char *pem_name);
+
/* Minimum length of the nonce used by the PRNG */
#define NONCE_SECRET_LEN_MIN 16
void
tls_crypt_v2_write_server_key_file(const char *filename)
{
- struct gc_arena gc = gc_new();
- struct key server_key = { 0 };
- struct buffer server_key_buf = clear_buf();
- struct buffer server_key_pem = clear_buf();
-
- if (!rand_bytes((void *)&server_key, sizeof(server_key)))
- {
- msg(M_NONFATAL, "ERROR: could not generate random key");
- goto cleanup;
- }
- buf_set_read(&server_key_buf, (void *)&server_key, sizeof(server_key));
- if (!crypto_pem_encode(tls_crypt_v2_srv_pem_name, &server_key_pem,
- &server_key_buf, &gc))
- {
- msg(M_WARN, "ERROR: could not PEM-encode server key");
- goto cleanup;
- }
-
- if (!buffer_write_file(filename, &server_key_pem))
- {
- msg(M_ERR, "ERROR: could not write server key file");
- goto cleanup;
- }
-
-cleanup:
- secure_memzero(&server_key, sizeof(server_key));
- buf_clear(&server_key_pem);
- gc_free(&gc);
- return;
+ write_pem_key_file(filename, tls_crypt_v2_srv_pem_name);
}
void