2013-05-16 12:26:18 +02:00
|
|
|
/* $OpenBSD: key.c,v 1.102 2013/05/10 04:08:01 djm Exp $ */
|
2000-03-26 05:04:51 +02:00
|
|
|
/*
|
2000-09-16 04:29:08 +02:00
|
|
|
* read_bignum():
|
|
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
|
|
*
|
|
|
|
* As far as I am concerned, the code I have written for this software
|
|
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
|
|
* software must be clearly marked as such, and if the derived work is
|
|
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
|
|
* called by a name other than "ssh" or "Secure Shell".
|
|
|
|
*
|
|
|
|
*
|
2001-07-04 05:32:30 +02:00
|
|
|
* Copyright (c) 2000, 2001 Markus Friedl. All rights reserved.
|
2008-06-13 00:58:05 +02:00
|
|
|
* Copyright (c) 2008 Alexander von Gernler. All rights reserved.
|
2000-03-26 05:04:51 +02:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
2006-08-05 04:39:39 +02:00
|
|
|
|
2000-03-26 05:04:51 +02:00
|
|
|
#include "includes.h"
|
2001-01-22 06:34:40 +01:00
|
|
|
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
#include <sys/param.h>
|
2006-08-05 04:39:39 +02:00
|
|
|
#include <sys/types.h>
|
|
|
|
|
2000-03-26 05:04:51 +02:00
|
|
|
#include <openssl/evp.h>
|
2008-02-28 09:22:04 +01:00
|
|
|
#include <openbsd-compat/openssl-compat.h>
|
2001-01-22 06:34:40 +01:00
|
|
|
|
2006-09-01 07:38:36 +02:00
|
|
|
#include <stdarg.h>
|
2006-08-05 03:37:59 +02:00
|
|
|
#include <stdio.h>
|
2006-07-24 06:13:33 +02:00
|
|
|
#include <string.h>
|
|
|
|
|
2000-03-26 05:04:51 +02:00
|
|
|
#include "xmalloc.h"
|
|
|
|
#include "key.h"
|
2000-11-13 12:57:25 +01:00
|
|
|
#include "rsa.h"
|
2000-04-29 15:57:08 +02:00
|
|
|
#include "uuencode.h"
|
2000-11-13 12:57:25 +01:00
|
|
|
#include "buffer.h"
|
2001-01-22 06:34:40 +01:00
|
|
|
#include "log.h"
|
2010-07-16 05:57:51 +02:00
|
|
|
#include "misc.h"
|
2010-02-26 21:55:05 +01:00
|
|
|
#include "ssh2.h"
|
|
|
|
|
2013-01-18 01:44:04 +01:00
|
|
|
static int to_blob(const Key *, u_char **, u_int *, int);
|
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
static struct KeyCert *
|
|
|
|
cert_new(void)
|
|
|
|
{
|
|
|
|
struct KeyCert *cert;
|
|
|
|
|
|
|
|
cert = xcalloc(1, sizeof(*cert));
|
|
|
|
buffer_init(&cert->certblob);
|
2010-04-16 07:56:21 +02:00
|
|
|
buffer_init(&cert->critical);
|
|
|
|
buffer_init(&cert->extensions);
|
2010-02-26 21:55:05 +01:00
|
|
|
cert->key_id = NULL;
|
|
|
|
cert->principals = NULL;
|
|
|
|
cert->signature_key = NULL;
|
|
|
|
return cert;
|
|
|
|
}
|
2000-03-26 05:04:51 +02:00
|
|
|
|
|
|
|
Key *
|
|
|
|
key_new(int type)
|
|
|
|
{
|
|
|
|
Key *k;
|
|
|
|
RSA *rsa;
|
|
|
|
DSA *dsa;
|
2006-03-26 05:19:21 +02:00
|
|
|
k = xcalloc(1, sizeof(*k));
|
2000-03-26 05:04:51 +02:00
|
|
|
k->type = type;
|
2010-08-31 14:41:14 +02:00
|
|
|
k->ecdsa = NULL;
|
|
|
|
k->ecdsa_nid = -1;
|
2000-04-29 15:57:08 +02:00
|
|
|
k->dsa = NULL;
|
|
|
|
k->rsa = NULL;
|
2010-02-26 21:55:05 +01:00
|
|
|
k->cert = NULL;
|
2000-03-26 05:04:51 +02:00
|
|
|
switch (k->type) {
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA1:
|
2000-03-26 05:04:51 +02:00
|
|
|
case KEY_RSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
2002-01-22 13:09:22 +01:00
|
|
|
if ((rsa = RSA_new()) == NULL)
|
|
|
|
fatal("key_new: RSA_new failed");
|
|
|
|
if ((rsa->n = BN_new()) == NULL)
|
|
|
|
fatal("key_new: BN_new failed");
|
|
|
|
if ((rsa->e = BN_new()) == NULL)
|
|
|
|
fatal("key_new: BN_new failed");
|
2000-03-26 05:04:51 +02:00
|
|
|
k->rsa = rsa;
|
|
|
|
break;
|
|
|
|
case KEY_DSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2002-01-22 13:09:22 +01:00
|
|
|
if ((dsa = DSA_new()) == NULL)
|
|
|
|
fatal("key_new: DSA_new failed");
|
|
|
|
if ((dsa->p = BN_new()) == NULL)
|
|
|
|
fatal("key_new: BN_new failed");
|
|
|
|
if ((dsa->q = BN_new()) == NULL)
|
|
|
|
fatal("key_new: BN_new failed");
|
|
|
|
if ((dsa->g = BN_new()) == NULL)
|
|
|
|
fatal("key_new: BN_new failed");
|
|
|
|
if ((dsa->pub_key = BN_new()) == NULL)
|
|
|
|
fatal("key_new: BN_new failed");
|
2000-03-26 05:04:51 +02:00
|
|
|
k->dsa = dsa;
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
/* Cannot do anything until we know the group */
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_UNSPEC:
|
2000-03-26 05:04:51 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
fatal("key_new: bad key type %d", k->type);
|
|
|
|
break;
|
|
|
|
}
|
2010-02-26 21:55:05 +01:00
|
|
|
|
|
|
|
if (key_is_cert(k))
|
|
|
|
k->cert = cert_new();
|
|
|
|
|
2000-03-26 05:04:51 +02:00
|
|
|
return k;
|
|
|
|
}
|
2002-06-23 23:21:30 +02:00
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
void
|
|
|
|
key_add_private(Key *k)
|
2000-11-13 12:57:25 +01:00
|
|
|
{
|
|
|
|
switch (k->type) {
|
|
|
|
case KEY_RSA1:
|
|
|
|
case KEY_RSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
2002-01-22 13:09:22 +01:00
|
|
|
if ((k->rsa->d = BN_new()) == NULL)
|
|
|
|
fatal("key_new_private: BN_new failed");
|
|
|
|
if ((k->rsa->iqmp = BN_new()) == NULL)
|
|
|
|
fatal("key_new_private: BN_new failed");
|
|
|
|
if ((k->rsa->q = BN_new()) == NULL)
|
|
|
|
fatal("key_new_private: BN_new failed");
|
|
|
|
if ((k->rsa->p = BN_new()) == NULL)
|
|
|
|
fatal("key_new_private: BN_new failed");
|
|
|
|
if ((k->rsa->dmq1 = BN_new()) == NULL)
|
|
|
|
fatal("key_new_private: BN_new failed");
|
|
|
|
if ((k->rsa->dmp1 = BN_new()) == NULL)
|
|
|
|
fatal("key_new_private: BN_new failed");
|
2000-11-13 12:57:25 +01:00
|
|
|
break;
|
|
|
|
case KEY_DSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2002-01-22 13:09:22 +01:00
|
|
|
if ((k->dsa->priv_key = BN_new()) == NULL)
|
|
|
|
fatal("key_new_private: BN_new failed");
|
2000-11-13 12:57:25 +01:00
|
|
|
break;
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
/* Cannot do anything until we know the group */
|
|
|
|
break;
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_UNSPEC:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2010-02-26 21:55:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
Key *
|
|
|
|
key_new_private(int type)
|
|
|
|
{
|
|
|
|
Key *k = key_new(type);
|
|
|
|
|
|
|
|
key_add_private(k);
|
2000-11-13 12:57:25 +01:00
|
|
|
return k;
|
|
|
|
}
|
2002-06-23 23:21:30 +02:00
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
static void
|
|
|
|
cert_free(struct KeyCert *cert)
|
|
|
|
{
|
|
|
|
u_int i;
|
|
|
|
|
|
|
|
buffer_free(&cert->certblob);
|
2010-04-16 07:56:21 +02:00
|
|
|
buffer_free(&cert->critical);
|
|
|
|
buffer_free(&cert->extensions);
|
2010-02-26 21:55:05 +01:00
|
|
|
if (cert->key_id != NULL)
|
|
|
|
xfree(cert->key_id);
|
|
|
|
for (i = 0; i < cert->nprincipals; i++)
|
|
|
|
xfree(cert->principals[i]);
|
|
|
|
if (cert->principals != NULL)
|
|
|
|
xfree(cert->principals);
|
|
|
|
if (cert->signature_key != NULL)
|
|
|
|
key_free(cert->signature_key);
|
2013-05-16 12:26:18 +02:00
|
|
|
xfree(cert);
|
2010-02-26 21:55:05 +01:00
|
|
|
}
|
|
|
|
|
2000-03-26 05:04:51 +02:00
|
|
|
void
|
|
|
|
key_free(Key *k)
|
|
|
|
{
|
2006-03-26 05:02:16 +02:00
|
|
|
if (k == NULL)
|
2006-03-26 05:03:03 +02:00
|
|
|
fatal("key_free: key is NULL");
|
2000-03-26 05:04:51 +02:00
|
|
|
switch (k->type) {
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA1:
|
2000-03-26 05:04:51 +02:00
|
|
|
case KEY_RSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
2000-03-26 05:04:51 +02:00
|
|
|
if (k->rsa != NULL)
|
|
|
|
RSA_free(k->rsa);
|
|
|
|
k->rsa = NULL;
|
|
|
|
break;
|
|
|
|
case KEY_DSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2000-03-26 05:04:51 +02:00
|
|
|
if (k->dsa != NULL)
|
|
|
|
DSA_free(k->dsa);
|
|
|
|
k->dsa = NULL;
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
if (k->ecdsa != NULL)
|
|
|
|
EC_KEY_free(k->ecdsa);
|
|
|
|
k->ecdsa = NULL;
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_UNSPEC:
|
|
|
|
break;
|
2000-03-26 05:04:51 +02:00
|
|
|
default:
|
|
|
|
fatal("key_free: bad key type %d", k->type);
|
|
|
|
break;
|
|
|
|
}
|
2010-02-26 21:55:05 +01:00
|
|
|
if (key_is_cert(k)) {
|
|
|
|
if (k->cert != NULL)
|
|
|
|
cert_free(k->cert);
|
|
|
|
k->cert = NULL;
|
|
|
|
}
|
|
|
|
|
2000-03-26 05:04:51 +02:00
|
|
|
xfree(k);
|
|
|
|
}
|
2003-11-17 11:18:23 +01:00
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
static int
|
|
|
|
cert_compare(struct KeyCert *a, struct KeyCert *b)
|
|
|
|
{
|
|
|
|
if (a == NULL && b == NULL)
|
|
|
|
return 1;
|
|
|
|
if (a == NULL || b == NULL)
|
|
|
|
return 0;
|
|
|
|
if (buffer_len(&a->certblob) != buffer_len(&b->certblob))
|
|
|
|
return 0;
|
2010-07-16 05:58:37 +02:00
|
|
|
if (timingsafe_bcmp(buffer_ptr(&a->certblob), buffer_ptr(&b->certblob),
|
2010-02-26 21:55:05 +01:00
|
|
|
buffer_len(&a->certblob)) != 0)
|
|
|
|
return 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Compare public portions of key only, allowing comparisons between
|
|
|
|
* certificates and plain keys too.
|
|
|
|
*/
|
2000-03-26 05:04:51 +02:00
|
|
|
int
|
2010-02-26 21:55:05 +01:00
|
|
|
key_equal_public(const Key *a, const Key *b)
|
2000-03-26 05:04:51 +02:00
|
|
|
{
|
2010-09-10 04:28:24 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
BN_CTX *bnctx;
|
2010-09-10 04:28:24 +02:00
|
|
|
#endif
|
2010-08-31 14:41:14 +02:00
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
if (a == NULL || b == NULL ||
|
|
|
|
key_type_plain(a->type) != key_type_plain(b->type))
|
2000-03-26 05:04:51 +02:00
|
|
|
return 0;
|
2010-02-26 21:55:05 +01:00
|
|
|
|
2000-03-26 05:04:51 +02:00
|
|
|
switch (a->type) {
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA1:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
2000-03-26 05:04:51 +02:00
|
|
|
case KEY_RSA:
|
|
|
|
return a->rsa != NULL && b->rsa != NULL &&
|
|
|
|
BN_cmp(a->rsa->e, b->rsa->e) == 0 &&
|
|
|
|
BN_cmp(a->rsa->n, b->rsa->n) == 0;
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2000-03-26 05:04:51 +02:00
|
|
|
case KEY_DSA:
|
|
|
|
return a->dsa != NULL && b->dsa != NULL &&
|
|
|
|
BN_cmp(a->dsa->p, b->dsa->p) == 0 &&
|
|
|
|
BN_cmp(a->dsa->q, b->dsa->q) == 0 &&
|
|
|
|
BN_cmp(a->dsa->g, b->dsa->g) == 0 &&
|
|
|
|
BN_cmp(a->dsa->pub_key, b->dsa->pub_key) == 0;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
case KEY_ECDSA:
|
|
|
|
if (a->ecdsa == NULL || b->ecdsa == NULL ||
|
|
|
|
EC_KEY_get0_public_key(a->ecdsa) == NULL ||
|
|
|
|
EC_KEY_get0_public_key(b->ecdsa) == NULL)
|
|
|
|
return 0;
|
|
|
|
if ((bnctx = BN_CTX_new()) == NULL)
|
|
|
|
fatal("%s: BN_CTX_new failed", __func__);
|
|
|
|
if (EC_GROUP_cmp(EC_KEY_get0_group(a->ecdsa),
|
|
|
|
EC_KEY_get0_group(b->ecdsa), bnctx) != 0 ||
|
|
|
|
EC_POINT_cmp(EC_KEY_get0_group(a->ecdsa),
|
|
|
|
EC_KEY_get0_public_key(a->ecdsa),
|
|
|
|
EC_KEY_get0_public_key(b->ecdsa), bnctx) != 0) {
|
|
|
|
BN_CTX_free(bnctx);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BN_CTX_free(bnctx);
|
|
|
|
return 1;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif /* OPENSSL_HAS_ECC */
|
2000-03-26 05:04:51 +02:00
|
|
|
default:
|
2000-04-29 15:57:08 +02:00
|
|
|
fatal("key_equal: bad key type %d", a->type);
|
2000-03-26 05:04:51 +02:00
|
|
|
}
|
2008-07-11 09:35:09 +02:00
|
|
|
/* NOTREACHED */
|
2000-03-26 05:04:51 +02:00
|
|
|
}
|
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
int
|
|
|
|
key_equal(const Key *a, const Key *b)
|
|
|
|
{
|
|
|
|
if (a == NULL || b == NULL || a->type != b->type)
|
|
|
|
return 0;
|
|
|
|
if (key_is_cert(a)) {
|
|
|
|
if (!cert_compare(a->cert, b->cert))
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return key_equal_public(a, b);
|
|
|
|
}
|
|
|
|
|
2003-05-15 02:19:46 +02:00
|
|
|
u_char*
|
2013-01-18 01:44:04 +01:00
|
|
|
key_fingerprint_raw(const Key *k, enum fp_type dgst_type,
|
|
|
|
u_int *dgst_raw_length)
|
2000-03-26 05:04:51 +02:00
|
|
|
{
|
2002-03-05 02:33:36 +01:00
|
|
|
const EVP_MD *md = NULL;
|
2001-03-12 03:59:31 +01:00
|
|
|
EVP_MD_CTX ctx;
|
2000-12-22 02:43:59 +01:00
|
|
|
u_char *blob = NULL;
|
2001-03-11 21:03:44 +01:00
|
|
|
u_char *retval = NULL;
|
2002-02-26 19:09:42 +01:00
|
|
|
u_int len = 0;
|
2013-01-18 01:44:04 +01:00
|
|
|
int nlen, elen;
|
2000-03-26 05:04:51 +02:00
|
|
|
|
2001-03-11 21:03:44 +01:00
|
|
|
*dgst_raw_length = 0;
|
|
|
|
|
2001-03-12 03:59:31 +01:00
|
|
|
switch (dgst_type) {
|
|
|
|
case SSH_FP_MD5:
|
|
|
|
md = EVP_md5();
|
|
|
|
break;
|
|
|
|
case SSH_FP_SHA1:
|
|
|
|
md = EVP_sha1();
|
|
|
|
break;
|
2012-06-30 12:05:02 +02:00
|
|
|
#ifdef HAVE_EVP_SHA256
|
2012-06-20 13:51:11 +02:00
|
|
|
case SSH_FP_SHA256:
|
|
|
|
md = EVP_sha256();
|
|
|
|
break;
|
2012-06-30 12:05:02 +02:00
|
|
|
#endif
|
2001-03-12 03:59:31 +01:00
|
|
|
default:
|
|
|
|
fatal("key_fingerprint_raw: bad digest type %d",
|
|
|
|
dgst_type);
|
|
|
|
}
|
2000-03-26 05:04:51 +02:00
|
|
|
switch (k->type) {
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA1:
|
2000-03-26 05:04:51 +02:00
|
|
|
nlen = BN_num_bytes(k->rsa->n);
|
|
|
|
elen = BN_num_bytes(k->rsa->e);
|
|
|
|
len = nlen + elen;
|
2000-04-29 15:57:08 +02:00
|
|
|
blob = xmalloc(len);
|
|
|
|
BN_bn2bin(k->rsa->n, blob);
|
|
|
|
BN_bn2bin(k->rsa->e, blob + nlen);
|
2000-03-26 05:04:51 +02:00
|
|
|
break;
|
|
|
|
case KEY_DSA:
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA:
|
|
|
|
key_to_blob(k, &blob, &len);
|
|
|
|
break;
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
|
|
|
/* We want a fingerprint of the _key_ not of the cert */
|
2013-01-18 01:44:04 +01:00
|
|
|
to_blob(k, &blob, &len, 1);
|
2010-02-26 21:55:05 +01:00
|
|
|
break;
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_UNSPEC:
|
|
|
|
return retval;
|
2000-03-26 05:04:51 +02:00
|
|
|
default:
|
2001-03-11 21:03:44 +01:00
|
|
|
fatal("key_fingerprint_raw: bad key type %d", k->type);
|
2000-03-26 05:04:51 +02:00
|
|
|
break;
|
|
|
|
}
|
2000-04-29 15:57:08 +02:00
|
|
|
if (blob != NULL) {
|
2001-03-11 21:03:44 +01:00
|
|
|
retval = xmalloc(EVP_MAX_MD_SIZE);
|
2000-06-22 13:32:31 +02:00
|
|
|
EVP_DigestInit(&ctx, md);
|
|
|
|
EVP_DigestUpdate(&ctx, blob, len);
|
2002-02-05 01:54:07 +01:00
|
|
|
EVP_DigestFinal(&ctx, retval, dgst_raw_length);
|
2000-04-29 15:57:08 +02:00
|
|
|
memset(blob, 0, len);
|
|
|
|
xfree(blob);
|
2001-03-11 21:03:44 +01:00
|
|
|
} else {
|
|
|
|
fatal("key_fingerprint_raw: blob is null");
|
2000-03-26 05:04:51 +02:00
|
|
|
}
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2002-07-04 02:14:17 +02:00
|
|
|
static char *
|
|
|
|
key_fingerprint_hex(u_char *dgst_raw, u_int dgst_raw_len)
|
2001-03-11 21:03:44 +01:00
|
|
|
{
|
|
|
|
char *retval;
|
2005-06-17 04:59:34 +02:00
|
|
|
u_int i;
|
2001-03-11 21:03:44 +01:00
|
|
|
|
2006-03-26 05:19:21 +02:00
|
|
|
retval = xcalloc(1, dgst_raw_len * 3 + 1);
|
2001-12-21 04:45:46 +01:00
|
|
|
for (i = 0; i < dgst_raw_len; i++) {
|
2001-03-11 21:03:44 +01:00
|
|
|
char hex[4];
|
|
|
|
snprintf(hex, sizeof(hex), "%02x:", dgst_raw[i]);
|
2003-07-14 09:28:34 +02:00
|
|
|
strlcat(retval, hex, dgst_raw_len * 3 + 1);
|
2001-03-11 21:03:44 +01:00
|
|
|
}
|
2003-07-14 09:28:34 +02:00
|
|
|
|
|
|
|
/* Remove the trailing ':' character */
|
2001-03-11 21:03:44 +01:00
|
|
|
retval[(dgst_raw_len * 3) - 1] = '\0';
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2002-07-04 02:14:17 +02:00
|
|
|
static char *
|
|
|
|
key_fingerprint_bubblebabble(u_char *dgst_raw, u_int dgst_raw_len)
|
2001-03-11 21:03:44 +01:00
|
|
|
{
|
|
|
|
char vowels[] = { 'a', 'e', 'i', 'o', 'u', 'y' };
|
|
|
|
char consonants[] = { 'b', 'c', 'd', 'f', 'g', 'h', 'k', 'l', 'm',
|
|
|
|
'n', 'p', 'r', 's', 't', 'v', 'z', 'x' };
|
2001-03-11 21:06:59 +01:00
|
|
|
u_int i, j = 0, rounds, seed = 1;
|
2001-03-11 21:03:44 +01:00
|
|
|
char *retval;
|
|
|
|
|
|
|
|
rounds = (dgst_raw_len / 2) + 1;
|
2006-03-26 05:19:21 +02:00
|
|
|
retval = xcalloc((rounds * 6), sizeof(char));
|
2001-03-11 21:06:59 +01:00
|
|
|
retval[j++] = 'x';
|
|
|
|
for (i = 0; i < rounds; i++) {
|
2001-03-11 21:03:44 +01:00
|
|
|
u_int idx0, idx1, idx2, idx3, idx4;
|
2001-03-11 21:06:59 +01:00
|
|
|
if ((i + 1 < rounds) || (dgst_raw_len % 2 != 0)) {
|
|
|
|
idx0 = (((((u_int)(dgst_raw[2 * i])) >> 6) & 3) +
|
2001-03-11 21:03:44 +01:00
|
|
|
seed) % 6;
|
2001-03-11 21:06:59 +01:00
|
|
|
idx1 = (((u_int)(dgst_raw[2 * i])) >> 2) & 15;
|
|
|
|
idx2 = ((((u_int)(dgst_raw[2 * i])) & 3) +
|
2001-03-11 21:03:44 +01:00
|
|
|
(seed / 6)) % 6;
|
2001-03-11 21:06:59 +01:00
|
|
|
retval[j++] = vowels[idx0];
|
|
|
|
retval[j++] = consonants[idx1];
|
|
|
|
retval[j++] = vowels[idx2];
|
|
|
|
if ((i + 1) < rounds) {
|
|
|
|
idx3 = (((u_int)(dgst_raw[(2 * i) + 1])) >> 4) & 15;
|
|
|
|
idx4 = (((u_int)(dgst_raw[(2 * i) + 1]))) & 15;
|
|
|
|
retval[j++] = consonants[idx3];
|
|
|
|
retval[j++] = '-';
|
|
|
|
retval[j++] = consonants[idx4];
|
2001-03-11 21:03:44 +01:00
|
|
|
seed = ((seed * 5) +
|
2001-03-11 21:06:59 +01:00
|
|
|
((((u_int)(dgst_raw[2 * i])) * 7) +
|
|
|
|
((u_int)(dgst_raw[(2 * i) + 1])))) % 36;
|
2001-03-11 21:03:44 +01:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
idx0 = seed % 6;
|
|
|
|
idx1 = 16;
|
|
|
|
idx2 = seed / 6;
|
2001-03-11 21:06:59 +01:00
|
|
|
retval[j++] = vowels[idx0];
|
|
|
|
retval[j++] = consonants[idx1];
|
|
|
|
retval[j++] = vowels[idx2];
|
2001-03-11 21:03:44 +01:00
|
|
|
}
|
|
|
|
}
|
2001-03-11 21:06:59 +01:00
|
|
|
retval[j++] = 'x';
|
|
|
|
retval[j++] = '\0';
|
2001-03-11 21:03:44 +01:00
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
/*
|
|
|
|
* Draw an ASCII-Art representing the fingerprint so human brain can
|
|
|
|
* profit from its built-in pattern recognition ability.
|
|
|
|
* This technique is called "random art" and can be found in some
|
|
|
|
* scientific publications like this original paper:
|
|
|
|
*
|
|
|
|
* "Hash Visualization: a New Technique to improve Real-World Security",
|
|
|
|
* Perrig A. and Song D., 1999, International Workshop on Cryptographic
|
|
|
|
* Techniques and E-Commerce (CrypTEC '99)
|
|
|
|
* sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
|
|
|
|
*
|
|
|
|
* The subject came up in a talk by Dan Kaminsky, too.
|
|
|
|
*
|
|
|
|
* If you see the picture is different, the key is different.
|
|
|
|
* If the picture looks the same, you still know nothing.
|
|
|
|
*
|
|
|
|
* The algorithm used here is a worm crawling over a discrete plane,
|
|
|
|
* leaving a trace (augmenting the field) everywhere it goes.
|
|
|
|
* Movement is taken from dgst_raw 2bit-wise. Bumping into walls
|
|
|
|
* makes the respective movement vector be ignored for this turn.
|
|
|
|
* Graphs are not unambiguous, because circles in graphs can be
|
|
|
|
* walked in either direction.
|
|
|
|
*/
|
2008-06-12 20:54:40 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Field sizes for the random art. Have to be odd, so the starting point
|
|
|
|
* can be in the exact middle of the picture, and FLDBASE should be >=8 .
|
|
|
|
* Else pictures would be too dense, and drawing the frame would
|
|
|
|
* fail, too, because the key type would not fit in anymore.
|
|
|
|
*/
|
|
|
|
#define FLDBASE 8
|
|
|
|
#define FLDSIZE_Y (FLDBASE + 1)
|
|
|
|
#define FLDSIZE_X (FLDBASE * 2 + 1)
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
static char *
|
2008-06-12 20:54:40 +02:00
|
|
|
key_fingerprint_randomart(u_char *dgst_raw, u_int dgst_raw_len, const Key *k)
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Chars to be used after each other every time the worm
|
|
|
|
* intersects with itself. Matter of taste.
|
|
|
|
*/
|
2008-06-12 20:55:10 +02:00
|
|
|
char *augmentation_string = " .o+=*BOX@%&#/^SE";
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
char *retval, *p;
|
2008-06-12 20:43:51 +02:00
|
|
|
u_char field[FLDSIZE_X][FLDSIZE_Y];
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
u_int i, b;
|
|
|
|
int x, y;
|
2008-06-12 20:45:50 +02:00
|
|
|
size_t len = strlen(augmentation_string) - 1;
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
|
|
|
|
retval = xcalloc(1, (FLDSIZE_X + 3) * (FLDSIZE_Y + 2));
|
|
|
|
|
|
|
|
/* initialize field */
|
2008-06-12 20:43:51 +02:00
|
|
|
memset(field, 0, FLDSIZE_X * FLDSIZE_Y * sizeof(char));
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
x = FLDSIZE_X / 2;
|
|
|
|
y = FLDSIZE_Y / 2;
|
|
|
|
|
|
|
|
/* process raw key */
|
|
|
|
for (i = 0; i < dgst_raw_len; i++) {
|
|
|
|
int input;
|
|
|
|
/* each byte conveys four 2-bit move commands */
|
|
|
|
input = dgst_raw[i];
|
|
|
|
for (b = 0; b < 4; b++) {
|
|
|
|
/* evaluate 2 bit, rest is shifted later */
|
|
|
|
x += (input & 0x1) ? 1 : -1;
|
|
|
|
y += (input & 0x2) ? 1 : -1;
|
|
|
|
|
|
|
|
/* assure we are still in bounds */
|
|
|
|
x = MAX(x, 0);
|
|
|
|
y = MAX(y, 0);
|
|
|
|
x = MIN(x, FLDSIZE_X - 1);
|
|
|
|
y = MIN(y, FLDSIZE_Y - 1);
|
|
|
|
|
|
|
|
/* augment the field */
|
2008-11-03 09:16:20 +01:00
|
|
|
if (field[x][y] < len - 2)
|
|
|
|
field[x][y]++;
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
input = input >> 2;
|
|
|
|
}
|
|
|
|
}
|
2008-06-12 20:55:10 +02:00
|
|
|
|
|
|
|
/* mark starting point and end point*/
|
|
|
|
field[FLDSIZE_X / 2][FLDSIZE_Y / 2] = len - 1;
|
|
|
|
field[x][y] = len;
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
|
|
|
|
/* fill in retval */
|
2008-06-29 14:45:37 +02:00
|
|
|
snprintf(retval, FLDSIZE_X, "+--[%4s %4u]", key_type(k), key_size(k));
|
2008-06-12 20:54:40 +02:00
|
|
|
p = strchr(retval, '\0');
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
|
|
|
|
/* output upper border */
|
2008-06-29 14:45:37 +02:00
|
|
|
for (i = p - retval - 1; i < FLDSIZE_X; i++)
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
*p++ = '-';
|
|
|
|
*p++ = '+';
|
|
|
|
*p++ = '\n';
|
|
|
|
|
|
|
|
/* output content */
|
|
|
|
for (y = 0; y < FLDSIZE_Y; y++) {
|
|
|
|
*p++ = '|';
|
|
|
|
for (x = 0; x < FLDSIZE_X; x++)
|
2008-06-12 20:45:50 +02:00
|
|
|
*p++ = augmentation_string[MIN(field[x][y], len)];
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
*p++ = '|';
|
|
|
|
*p++ = '\n';
|
|
|
|
}
|
|
|
|
|
|
|
|
/* output lower border */
|
|
|
|
*p++ = '+';
|
|
|
|
for (i = 0; i < FLDSIZE_X; i++)
|
|
|
|
*p++ = '-';
|
|
|
|
*p++ = '+';
|
|
|
|
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2002-07-04 02:14:17 +02:00
|
|
|
char *
|
2010-02-26 21:55:05 +01:00
|
|
|
key_fingerprint(Key *k, enum fp_type dgst_type, enum fp_rep dgst_rep)
|
2001-03-11 21:03:44 +01:00
|
|
|
{
|
2001-04-06 01:26:32 +02:00
|
|
|
char *retval = NULL;
|
2001-03-11 21:03:44 +01:00
|
|
|
u_char *dgst_raw;
|
2002-02-05 01:54:07 +01:00
|
|
|
u_int dgst_raw_len;
|
2001-12-21 04:45:46 +01:00
|
|
|
|
2001-03-11 21:03:44 +01:00
|
|
|
dgst_raw = key_fingerprint_raw(k, dgst_type, &dgst_raw_len);
|
|
|
|
if (!dgst_raw)
|
2001-03-13 05:57:58 +01:00
|
|
|
fatal("key_fingerprint: null from key_fingerprint_raw()");
|
2001-12-06 19:00:18 +01:00
|
|
|
switch (dgst_rep) {
|
2001-03-11 21:03:44 +01:00
|
|
|
case SSH_FP_HEX:
|
|
|
|
retval = key_fingerprint_hex(dgst_raw, dgst_raw_len);
|
|
|
|
break;
|
|
|
|
case SSH_FP_BUBBLEBABBLE:
|
|
|
|
retval = key_fingerprint_bubblebabble(dgst_raw, dgst_raw_len);
|
|
|
|
break;
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
case SSH_FP_RANDOMART:
|
2008-06-12 20:54:40 +02:00
|
|
|
retval = key_fingerprint_randomart(dgst_raw, dgst_raw_len, k);
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 20:40:35 +02:00
|
|
|
break;
|
2001-03-11 21:03:44 +01:00
|
|
|
default:
|
2008-11-03 09:24:16 +01:00
|
|
|
fatal("key_fingerprint: bad digest representation %d",
|
2001-03-11 21:03:44 +01:00
|
|
|
dgst_rep);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
memset(dgst_raw, 0, dgst_raw_len);
|
|
|
|
xfree(dgst_raw);
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2000-03-26 05:04:51 +02:00
|
|
|
/*
|
|
|
|
* Reads a multiple-precision integer in decimal from the buffer, and advances
|
|
|
|
* the pointer. The integer must already be initialized. This function is
|
|
|
|
* permitted to modify the buffer. This leaves *cpp to point just beyond the
|
|
|
|
* last processed (and maybe modified) character. Note that this may modify
|
|
|
|
* the buffer containing the number.
|
|
|
|
*/
|
2001-06-25 07:01:22 +02:00
|
|
|
static int
|
2000-03-26 05:04:51 +02:00
|
|
|
read_bignum(char **cpp, BIGNUM * value)
|
|
|
|
{
|
|
|
|
char *cp = *cpp;
|
|
|
|
int old;
|
|
|
|
|
|
|
|
/* Skip any leading whitespace. */
|
|
|
|
for (; *cp == ' ' || *cp == '\t'; cp++)
|
|
|
|
;
|
|
|
|
|
|
|
|
/* Check that it begins with a decimal digit. */
|
|
|
|
if (*cp < '0' || *cp > '9')
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Save starting position. */
|
|
|
|
*cpp = cp;
|
|
|
|
|
|
|
|
/* Move forward until all decimal digits skipped. */
|
|
|
|
for (; *cp >= '0' && *cp <= '9'; cp++)
|
|
|
|
;
|
|
|
|
|
|
|
|
/* Save the old terminating character, and replace it by \0. */
|
|
|
|
old = *cp;
|
|
|
|
*cp = 0;
|
|
|
|
|
|
|
|
/* Parse the number. */
|
|
|
|
if (BN_dec2bn(&value, *cpp) == 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Restore old terminating character. */
|
|
|
|
*cp = old;
|
|
|
|
|
|
|
|
/* Move beyond the number and return success. */
|
|
|
|
*cpp = cp;
|
|
|
|
return 1;
|
|
|
|
}
|
2002-06-23 23:21:30 +02:00
|
|
|
|
2001-06-25 07:01:22 +02:00
|
|
|
static int
|
2000-03-26 05:04:51 +02:00
|
|
|
write_bignum(FILE *f, BIGNUM *num)
|
|
|
|
{
|
|
|
|
char *buf = BN_bn2dec(num);
|
|
|
|
if (buf == NULL) {
|
|
|
|
error("write_bignum: BN_bn2dec() failed");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
fprintf(f, " %s", buf);
|
2001-10-10 07:00:49 +02:00
|
|
|
OPENSSL_free(buf);
|
2000-03-26 05:04:51 +02:00
|
|
|
return 1;
|
|
|
|
}
|
2000-11-13 12:57:25 +01:00
|
|
|
|
2001-09-20 02:55:53 +02:00
|
|
|
/* returns 1 ok, -1 error */
|
2000-11-13 12:57:25 +01:00
|
|
|
int
|
2000-04-29 15:57:08 +02:00
|
|
|
key_read(Key *ret, char **cpp)
|
2000-03-26 05:04:51 +02:00
|
|
|
{
|
2000-04-29 15:57:08 +02:00
|
|
|
Key *k;
|
2000-11-13 12:57:25 +01:00
|
|
|
int success = -1;
|
|
|
|
char *cp, *space;
|
2010-09-10 04:28:24 +02:00
|
|
|
int len, n, type;
|
2000-11-13 12:57:25 +01:00
|
|
|
u_int bits;
|
2000-12-22 02:43:59 +01:00
|
|
|
u_char *blob;
|
2010-09-10 04:28:24 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
|
|
|
int curve_nid = -1;
|
|
|
|
#endif
|
2000-04-29 15:57:08 +02:00
|
|
|
|
|
|
|
cp = *cpp;
|
|
|
|
|
2001-12-06 19:00:18 +01:00
|
|
|
switch (ret->type) {
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA1:
|
2000-04-29 15:57:08 +02:00
|
|
|
/* Get number of bits. */
|
|
|
|
if (*cp < '0' || *cp > '9')
|
2000-11-13 12:57:25 +01:00
|
|
|
return -1; /* Bad bit count... */
|
2000-04-29 15:57:08 +02:00
|
|
|
for (bits = 0; *cp >= '0' && *cp <= '9'; cp++)
|
|
|
|
bits = 10 * bits + *cp - '0';
|
2000-03-26 05:04:51 +02:00
|
|
|
if (bits == 0)
|
2000-11-13 12:57:25 +01:00
|
|
|
return -1;
|
2000-04-29 15:57:08 +02:00
|
|
|
*cpp = cp;
|
2000-03-26 05:04:51 +02:00
|
|
|
/* Get public exponent, public modulus. */
|
|
|
|
if (!read_bignum(cpp, ret->rsa->e))
|
2000-11-13 12:57:25 +01:00
|
|
|
return -1;
|
2000-03-26 05:04:51 +02:00
|
|
|
if (!read_bignum(cpp, ret->rsa->n))
|
2000-11-13 12:57:25 +01:00
|
|
|
return -1;
|
2010-01-13 12:43:05 +01:00
|
|
|
/* validate the claimed number of bits */
|
|
|
|
if ((u_int)BN_num_bits(ret->rsa->n) != bits) {
|
|
|
|
verbose("key_read: claimed key size %d does not match "
|
|
|
|
"actual %d", bits, BN_num_bits(ret->rsa->n));
|
|
|
|
return -1;
|
|
|
|
}
|
2000-11-13 12:57:25 +01:00
|
|
|
success = 1;
|
2000-03-26 05:04:51 +02:00
|
|
|
break;
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_UNSPEC:
|
|
|
|
case KEY_RSA:
|
2000-03-26 05:04:51 +02:00
|
|
|
case KEY_DSA:
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
2000-11-13 12:57:25 +01:00
|
|
|
space = strchr(cp, ' ');
|
|
|
|
if (space == NULL) {
|
2003-02-24 01:54:57 +01:00
|
|
|
debug3("key_read: missing whitespace");
|
2000-11-13 12:57:25 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
*space = '\0';
|
|
|
|
type = key_type_from_name(cp);
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
if (key_type_plain(type) == KEY_ECDSA &&
|
|
|
|
(curve_nid = key_ecdsa_nid_from_name(cp)) == -1) {
|
|
|
|
debug("key_read: invalid curve");
|
|
|
|
return -1;
|
|
|
|
}
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-11-13 12:57:25 +01:00
|
|
|
*space = ' ';
|
|
|
|
if (type == KEY_UNSPEC) {
|
2003-02-24 01:54:57 +01:00
|
|
|
debug3("key_read: missing keytype");
|
2000-11-13 12:57:25 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
cp = space+1;
|
|
|
|
if (*cp == '\0') {
|
|
|
|
debug3("key_read: short string");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (ret->type == KEY_UNSPEC) {
|
|
|
|
ret->type = type;
|
|
|
|
} else if (ret->type != type) {
|
|
|
|
/* is a key, but different type */
|
|
|
|
debug3("key_read: type mismatch");
|
2001-09-20 02:55:53 +02:00
|
|
|
return -1;
|
2000-11-13 12:57:25 +01:00
|
|
|
}
|
2000-04-29 15:57:08 +02:00
|
|
|
len = 2*strlen(cp);
|
|
|
|
blob = xmalloc(len);
|
|
|
|
n = uudecode(cp, blob, len);
|
- Remove references to SSLeay.
- Big OpenBSD CVS update
- markus@cvs.openbsd.org
[clientloop.c]
- typo
[session.c]
- update proctitle on pty alloc/dealloc, e.g. w/ windows client
[session.c]
- update proctitle for proto 1, too
[channels.h nchan.c serverloop.c session.c sshd.c]
- use c-style comments
- deraadt@cvs.openbsd.org
[scp.c]
- more atomicio
- markus@cvs.openbsd.org
[channels.c]
- set O_NONBLOCK
[ssh.1]
- update AUTHOR
[readconf.c ssh-keygen.c ssh.h]
- default DSA key file ~/.ssh/id_dsa
[clientloop.c]
- typo, rm verbose debug
- deraadt@cvs.openbsd.org
[ssh-keygen.1]
- document DSA use of ssh-keygen
[sshd.8]
- a start at describing what i understand of the DSA side
[ssh-keygen.1]
- document -X and -x
[ssh-keygen.c]
- simplify usage
- markus@cvs.openbsd.org
[sshd.8]
- there is no rhosts_dsa
[ssh-keygen.1]
- document -y, update -X,-x
[nchan.c]
- fix close for non-open ssh1 channels
[servconf.c servconf.h ssh.h sshd.8 sshd.c ]
- s/DsaKey/HostDSAKey/, document option
[sshconnect2.c]
- respect number_of_password_prompts
[channels.c channels.h servconf.c servconf.h session.c sshd.8]
- GatewayPorts for sshd, ok deraadt@
[ssh-add.1 ssh-agent.1 ssh.1]
- more doc on: DSA, id_dsa, known_hosts2, authorized_keys2
[ssh.1]
- more info on proto 2
[sshd.8]
- sync AUTHOR w/ ssh.1
[key.c key.h sshconnect.c]
- print key type when talking about host keys
[packet.c]
- clear padding in ssh2
[dsa.c key.c radix.c ssh.h sshconnect1.c uuencode.c uuencode.h]
- replace broken uuencode w/ libc b64_ntop
[auth2.c]
- log failure before sending the reply
[key.c radix.c uuencode.c]
- remote trailing comments before calling __b64_pton
[auth2.c readconf.c readconf.h servconf.c servconf.h ssh.1]
[sshconnect2.c sshd.8]
- add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8
- Bring in b64_ntop and b64_pton from OpenBSD libc (bsd-base64.[ch])
2000-05-07 04:03:14 +02:00
|
|
|
if (n < 0) {
|
2000-05-30 05:44:51 +02:00
|
|
|
error("key_read: uudecode %s failed", cp);
|
2001-12-06 17:41:41 +01:00
|
|
|
xfree(blob);
|
2000-11-13 12:57:25 +01:00
|
|
|
return -1;
|
- Remove references to SSLeay.
- Big OpenBSD CVS update
- markus@cvs.openbsd.org
[clientloop.c]
- typo
[session.c]
- update proctitle on pty alloc/dealloc, e.g. w/ windows client
[session.c]
- update proctitle for proto 1, too
[channels.h nchan.c serverloop.c session.c sshd.c]
- use c-style comments
- deraadt@cvs.openbsd.org
[scp.c]
- more atomicio
- markus@cvs.openbsd.org
[channels.c]
- set O_NONBLOCK
[ssh.1]
- update AUTHOR
[readconf.c ssh-keygen.c ssh.h]
- default DSA key file ~/.ssh/id_dsa
[clientloop.c]
- typo, rm verbose debug
- deraadt@cvs.openbsd.org
[ssh-keygen.1]
- document DSA use of ssh-keygen
[sshd.8]
- a start at describing what i understand of the DSA side
[ssh-keygen.1]
- document -X and -x
[ssh-keygen.c]
- simplify usage
- markus@cvs.openbsd.org
[sshd.8]
- there is no rhosts_dsa
[ssh-keygen.1]
- document -y, update -X,-x
[nchan.c]
- fix close for non-open ssh1 channels
[servconf.c servconf.h ssh.h sshd.8 sshd.c ]
- s/DsaKey/HostDSAKey/, document option
[sshconnect2.c]
- respect number_of_password_prompts
[channels.c channels.h servconf.c servconf.h session.c sshd.8]
- GatewayPorts for sshd, ok deraadt@
[ssh-add.1 ssh-agent.1 ssh.1]
- more doc on: DSA, id_dsa, known_hosts2, authorized_keys2
[ssh.1]
- more info on proto 2
[sshd.8]
- sync AUTHOR w/ ssh.1
[key.c key.h sshconnect.c]
- print key type when talking about host keys
[packet.c]
- clear padding in ssh2
[dsa.c key.c radix.c ssh.h sshconnect1.c uuencode.c uuencode.h]
- replace broken uuencode w/ libc b64_ntop
[auth2.c]
- log failure before sending the reply
[key.c radix.c uuencode.c]
- remote trailing comments before calling __b64_pton
[auth2.c readconf.c readconf.h servconf.c servconf.h ssh.1]
[sshconnect2.c sshd.8]
- add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8
- Bring in b64_ntop and b64_pton from OpenBSD libc (bsd-base64.[ch])
2000-05-07 04:03:14 +02:00
|
|
|
}
|
2003-06-28 04:38:01 +02:00
|
|
|
k = key_from_blob(blob, (u_int)n);
|
2001-12-06 17:41:41 +01:00
|
|
|
xfree(blob);
|
2000-05-30 05:44:51 +02:00
|
|
|
if (k == NULL) {
|
2000-11-13 12:57:25 +01:00
|
|
|
error("key_read: key_from_blob %s failed", cp);
|
|
|
|
return -1;
|
2000-05-30 05:44:51 +02:00
|
|
|
}
|
2000-11-13 12:57:25 +01:00
|
|
|
if (k->type != type) {
|
|
|
|
error("key_read: type mismatch: encoding error");
|
|
|
|
key_free(k);
|
|
|
|
return -1;
|
|
|
|
}
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
if (key_type_plain(type) == KEY_ECDSA &&
|
|
|
|
curve_nid != k->ecdsa_nid) {
|
|
|
|
error("key_read: type mismatch: EC curve mismatch");
|
|
|
|
key_free(k);
|
|
|
|
return -1;
|
|
|
|
}
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-11-13 12:57:25 +01:00
|
|
|
/*XXXX*/
|
2010-02-26 21:55:05 +01:00
|
|
|
if (key_is_cert(ret)) {
|
|
|
|
if (!key_is_cert(k)) {
|
|
|
|
error("key_read: loaded key is not a cert");
|
|
|
|
key_free(k);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (ret->cert != NULL)
|
|
|
|
cert_free(ret->cert);
|
|
|
|
ret->cert = k->cert;
|
|
|
|
k->cert = NULL;
|
|
|
|
}
|
|
|
|
if (key_type_plain(ret->type) == KEY_RSA) {
|
2000-11-13 12:57:25 +01:00
|
|
|
if (ret->rsa != NULL)
|
|
|
|
RSA_free(ret->rsa);
|
|
|
|
ret->rsa = k->rsa;
|
|
|
|
k->rsa = NULL;
|
|
|
|
#ifdef DEBUG_PK
|
|
|
|
RSA_print_fp(stderr, ret->rsa, 8);
|
|
|
|
#endif
|
2010-02-26 21:55:05 +01:00
|
|
|
}
|
|
|
|
if (key_type_plain(ret->type) == KEY_DSA) {
|
2000-11-13 12:57:25 +01:00
|
|
|
if (ret->dsa != NULL)
|
|
|
|
DSA_free(ret->dsa);
|
|
|
|
ret->dsa = k->dsa;
|
|
|
|
k->dsa = NULL;
|
|
|
|
#ifdef DEBUG_PK
|
|
|
|
DSA_print_fp(stderr, ret->dsa, 8);
|
2010-08-31 14:41:14 +02:00
|
|
|
#endif
|
|
|
|
}
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
if (key_type_plain(ret->type) == KEY_ECDSA) {
|
|
|
|
if (ret->ecdsa != NULL)
|
|
|
|
EC_KEY_free(ret->ecdsa);
|
|
|
|
ret->ecdsa = k->ecdsa;
|
|
|
|
ret->ecdsa_nid = k->ecdsa_nid;
|
|
|
|
k->ecdsa = NULL;
|
|
|
|
k->ecdsa_nid = -1;
|
|
|
|
#ifdef DEBUG_PK
|
|
|
|
key_dump_ec_key(ret->ecdsa);
|
2000-11-13 12:57:25 +01:00
|
|
|
#endif
|
|
|
|
}
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2010-02-26 21:55:05 +01:00
|
|
|
success = 1;
|
2000-11-13 12:57:25 +01:00
|
|
|
/*XXXX*/
|
2001-12-06 17:41:41 +01:00
|
|
|
key_free(k);
|
2000-11-13 12:57:25 +01:00
|
|
|
if (success != 1)
|
|
|
|
break;
|
2000-05-30 05:44:51 +02:00
|
|
|
/* advance cp: skip whitespace and data */
|
|
|
|
while (*cp == ' ' || *cp == '\t')
|
|
|
|
cp++;
|
|
|
|
while (*cp != '\0' && *cp != ' ' && *cp != '\t')
|
|
|
|
cp++;
|
|
|
|
*cpp = cp;
|
2000-03-26 05:04:51 +02:00
|
|
|
break;
|
|
|
|
default:
|
2000-04-29 15:57:08 +02:00
|
|
|
fatal("key_read: bad key type: %d", ret->type);
|
2000-03-26 05:04:51 +02:00
|
|
|
break;
|
|
|
|
}
|
2000-11-13 12:57:25 +01:00
|
|
|
return success;
|
2000-03-26 05:04:51 +02:00
|
|
|
}
|
2002-06-23 23:21:30 +02:00
|
|
|
|
2000-03-26 05:04:51 +02:00
|
|
|
int
|
2003-11-17 11:18:23 +01:00
|
|
|
key_write(const Key *key, FILE *f)
|
2000-03-26 05:04:51 +02:00
|
|
|
{
|
2002-02-26 19:09:42 +01:00
|
|
|
int n, success = 0;
|
|
|
|
u_int len, bits = 0;
|
2002-09-12 01:49:15 +02:00
|
|
|
u_char *blob;
|
|
|
|
char *uu;
|
2000-03-26 05:04:51 +02:00
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
if (key_is_cert(key)) {
|
|
|
|
if (key->cert == NULL) {
|
|
|
|
error("%s: no cert data", __func__);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (buffer_len(&key->cert->certblob) == 0) {
|
|
|
|
error("%s: no signed certificate blob", __func__);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (key->type) {
|
|
|
|
case KEY_RSA1:
|
|
|
|
if (key->rsa == NULL)
|
|
|
|
return 0;
|
2000-03-26 05:04:51 +02:00
|
|
|
/* size of modulus 'n' */
|
|
|
|
bits = BN_num_bits(key->rsa->n);
|
|
|
|
fprintf(f, "%u", bits);
|
|
|
|
if (write_bignum(f, key->rsa->e) &&
|
2010-02-26 21:55:05 +01:00
|
|
|
write_bignum(f, key->rsa->n))
|
|
|
|
return 1;
|
|
|
|
error("key_write: failed for RSA key");
|
|
|
|
return 0;
|
|
|
|
case KEY_DSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
|
|
|
if (key->dsa == NULL)
|
|
|
|
return 0;
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
if (key->ecdsa == NULL)
|
|
|
|
return 0;
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
|
|
|
if (key->rsa == NULL)
|
|
|
|
return 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return 0;
|
2000-03-26 05:04:51 +02:00
|
|
|
}
|
2010-02-26 21:55:05 +01:00
|
|
|
|
|
|
|
key_to_blob(key, &blob, &len);
|
|
|
|
uu = xmalloc(2*len);
|
|
|
|
n = uuencode(blob, len, uu, 2*len);
|
|
|
|
if (n > 0) {
|
|
|
|
fprintf(f, "%s %s", key_ssh_name(key), uu);
|
|
|
|
success = 1;
|
|
|
|
}
|
|
|
|
xfree(blob);
|
|
|
|
xfree(uu);
|
|
|
|
|
2000-03-26 05:04:51 +02:00
|
|
|
return success;
|
|
|
|
}
|
2002-06-23 23:21:30 +02:00
|
|
|
|
2010-03-21 19:58:24 +01:00
|
|
|
const char *
|
|
|
|
key_cert_type(const Key *k)
|
|
|
|
{
|
|
|
|
switch (k->cert->type) {
|
|
|
|
case SSH2_CERT_TYPE_USER:
|
|
|
|
return "user";
|
|
|
|
case SSH2_CERT_TYPE_HOST:
|
|
|
|
return "host";
|
|
|
|
default:
|
|
|
|
return "unknown";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-04-23 11:24:32 +02:00
|
|
|
struct keytype {
|
|
|
|
char *name;
|
|
|
|
char *shortname;
|
|
|
|
int type;
|
|
|
|
int nid;
|
|
|
|
int cert;
|
|
|
|
};
|
|
|
|
static const struct keytype keytypes[] = {
|
|
|
|
{ NULL, "RSA1", KEY_RSA1, 0, 0 },
|
|
|
|
{ "ssh-rsa", "RSA", KEY_RSA, 0, 0 },
|
|
|
|
{ "ssh-dss", "DSA", KEY_DSA, 0, 0 },
|
|
|
|
#ifdef OPENSSL_HAS_ECC
|
|
|
|
{ "ecdsa-sha2-nistp256", "ECDSA", KEY_ECDSA, NID_X9_62_prime256v1, 0 },
|
|
|
|
{ "ecdsa-sha2-nistp384", "ECDSA", KEY_ECDSA, NID_secp384r1, 0 },
|
|
|
|
{ "ecdsa-sha2-nistp521", "ECDSA", KEY_ECDSA, NID_secp521r1, 0 },
|
|
|
|
#endif /* OPENSSL_HAS_ECC */
|
|
|
|
{ "ssh-rsa-cert-v01@openssh.com", "RSA-CERT", KEY_RSA_CERT, 0, 1 },
|
|
|
|
{ "ssh-dss-cert-v01@openssh.com", "DSA-CERT", KEY_DSA_CERT, 0, 1 },
|
|
|
|
#ifdef OPENSSL_HAS_ECC
|
|
|
|
{ "ecdsa-sha2-nistp256-cert-v01@openssh.com", "ECDSA-CERT",
|
|
|
|
KEY_ECDSA_CERT, NID_X9_62_prime256v1, 1 },
|
|
|
|
{ "ecdsa-sha2-nistp384-cert-v01@openssh.com", "ECDSA-CERT",
|
|
|
|
KEY_ECDSA_CERT, NID_secp384r1, 1 },
|
|
|
|
{ "ecdsa-sha2-nistp521-cert-v01@openssh.com", "ECDSA-CERT",
|
|
|
|
KEY_ECDSA_CERT, NID_secp521r1, 1 },
|
|
|
|
#endif /* OPENSSL_HAS_ECC */
|
|
|
|
{ "ssh-rsa-cert-v00@openssh.com", "RSA-CERT-V00",
|
|
|
|
KEY_RSA_CERT_V00, 0, 1 },
|
|
|
|
{ "ssh-dss-cert-v00@openssh.com", "DSA-CERT-V00",
|
|
|
|
KEY_DSA_CERT_V00, 0, 1 },
|
|
|
|
{ NULL, NULL, -1, -1, 0 }
|
|
|
|
};
|
|
|
|
|
|
|
|
const char *
|
|
|
|
key_type(const Key *k)
|
|
|
|
{
|
|
|
|
const struct keytype *kt;
|
|
|
|
|
|
|
|
for (kt = keytypes; kt->type != -1; kt++) {
|
|
|
|
if (kt->type == k->type)
|
|
|
|
return kt->shortname;
|
|
|
|
}
|
|
|
|
return "unknown";
|
|
|
|
}
|
|
|
|
|
2010-08-31 14:41:14 +02:00
|
|
|
static const char *
|
|
|
|
key_ssh_name_from_type_nid(int type, int nid)
|
2000-11-13 12:57:25 +01:00
|
|
|
{
|
2013-04-23 11:24:32 +02:00
|
|
|
const struct keytype *kt;
|
|
|
|
|
|
|
|
for (kt = keytypes; kt->type != -1; kt++) {
|
|
|
|
if (kt->type == type && (kt->nid == 0 || kt->nid == nid))
|
|
|
|
return kt->name;
|
2000-11-13 12:57:25 +01:00
|
|
|
}
|
|
|
|
return "ssh-unknown";
|
|
|
|
}
|
2002-06-23 23:21:30 +02:00
|
|
|
|
2010-08-31 14:41:14 +02:00
|
|
|
const char *
|
|
|
|
key_ssh_name(const Key *k)
|
|
|
|
{
|
|
|
|
return key_ssh_name_from_type_nid(k->type, k->ecdsa_nid);
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
|
|
|
key_ssh_name_plain(const Key *k)
|
|
|
|
{
|
|
|
|
return key_ssh_name_from_type_nid(key_type_plain(k->type),
|
|
|
|
k->ecdsa_nid);
|
|
|
|
}
|
|
|
|
|
2013-04-23 11:24:32 +02:00
|
|
|
int
|
|
|
|
key_type_from_name(char *name)
|
|
|
|
{
|
|
|
|
const struct keytype *kt;
|
|
|
|
|
|
|
|
for (kt = keytypes; kt->type != -1; kt++) {
|
|
|
|
/* Only allow shortname matches for plain key types */
|
|
|
|
if ((kt->name != NULL && strcmp(name, kt->name) == 0) ||
|
|
|
|
(!kt->cert && strcasecmp(kt->shortname, name) == 0))
|
|
|
|
return kt->type;
|
|
|
|
}
|
|
|
|
debug2("key_type_from_name: unknown key type '%s'", name);
|
|
|
|
return KEY_UNSPEC;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
key_ecdsa_nid_from_name(const char *name)
|
|
|
|
{
|
|
|
|
const struct keytype *kt;
|
|
|
|
|
|
|
|
for (kt = keytypes; kt->type != -1; kt++) {
|
|
|
|
if (kt->type != KEY_ECDSA && kt->type != KEY_ECDSA_CERT)
|
|
|
|
continue;
|
|
|
|
if (kt->name != NULL && strcmp(name, kt->name) == 0)
|
|
|
|
return kt->nid;
|
|
|
|
}
|
|
|
|
debug2("%s: unknown/non-ECDSA key type '%s'", __func__, name);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
key_alg_list(void)
|
|
|
|
{
|
|
|
|
char *ret = NULL;
|
|
|
|
size_t nlen, rlen = 0;
|
|
|
|
const struct keytype *kt;
|
|
|
|
|
|
|
|
for (kt = keytypes; kt->type != -1; kt++) {
|
|
|
|
if (kt->name == NULL)
|
|
|
|
continue;
|
|
|
|
if (ret != NULL)
|
|
|
|
ret[rlen++] = '\n';
|
|
|
|
nlen = strlen(kt->name);
|
|
|
|
ret = xrealloc(ret, 1, rlen + nlen + 2);
|
|
|
|
memcpy(ret + rlen, kt->name, nlen + 1);
|
|
|
|
rlen += nlen;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2000-11-13 12:57:25 +01:00
|
|
|
u_int
|
2003-11-17 11:18:23 +01:00
|
|
|
key_size(const Key *k)
|
2001-12-06 19:00:18 +01:00
|
|
|
{
|
2000-08-23 02:46:23 +02:00
|
|
|
switch (k->type) {
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA1:
|
2000-08-23 02:46:23 +02:00
|
|
|
case KEY_RSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
2000-08-23 02:46:23 +02:00
|
|
|
return BN_num_bits(k->rsa->n);
|
|
|
|
case KEY_DSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2000-08-23 02:46:23 +02:00
|
|
|
return BN_num_bits(k->dsa->p);
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
|
|
|
case KEY_ECDSA_CERT:
|
2010-09-10 03:23:34 +02:00
|
|
|
return key_curve_nid_to_bits(k->ecdsa_nid);
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-08-23 02:46:23 +02:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2000-11-13 12:57:25 +01:00
|
|
|
|
2001-06-25 07:01:22 +02:00
|
|
|
static RSA *
|
2000-12-22 02:43:59 +01:00
|
|
|
rsa_generate_private_key(u_int bits)
|
2000-11-13 12:57:25 +01:00
|
|
|
{
|
2010-11-20 05:15:49 +01:00
|
|
|
RSA *private = RSA_new();
|
|
|
|
BIGNUM *f4 = BN_new();
|
2006-03-26 05:02:35 +02:00
|
|
|
|
2001-02-05 13:42:17 +01:00
|
|
|
if (private == NULL)
|
2010-11-20 05:15:49 +01:00
|
|
|
fatal("%s: RSA_new failed", __func__);
|
|
|
|
if (f4 == NULL)
|
|
|
|
fatal("%s: BN_new failed", __func__);
|
|
|
|
if (!BN_set_word(f4, RSA_F4))
|
|
|
|
fatal("%s: BN_new failed", __func__);
|
|
|
|
if (!RSA_generate_key_ex(private, bits, f4, NULL))
|
|
|
|
fatal("%s: key generation failed.", __func__);
|
|
|
|
BN_free(f4);
|
2001-02-05 13:42:17 +01:00
|
|
|
return private;
|
2000-11-13 12:57:25 +01:00
|
|
|
}
|
|
|
|
|
2001-06-25 07:01:22 +02:00
|
|
|
static DSA*
|
2000-12-22 02:43:59 +01:00
|
|
|
dsa_generate_private_key(u_int bits)
|
2000-11-13 12:57:25 +01:00
|
|
|
{
|
2010-11-20 05:15:49 +01:00
|
|
|
DSA *private = DSA_new();
|
2006-03-26 05:02:35 +02:00
|
|
|
|
2000-11-13 12:57:25 +01:00
|
|
|
if (private == NULL)
|
2010-11-20 05:15:49 +01:00
|
|
|
fatal("%s: DSA_new failed", __func__);
|
|
|
|
if (!DSA_generate_parameters_ex(private, bits, NULL, 0, NULL,
|
|
|
|
NULL, NULL))
|
|
|
|
fatal("%s: DSA_generate_parameters failed", __func__);
|
2000-11-13 12:57:25 +01:00
|
|
|
if (!DSA_generate_key(private))
|
2010-11-20 05:15:49 +01:00
|
|
|
fatal("%s: DSA_generate_key failed.", __func__);
|
2000-11-13 12:57:25 +01:00
|
|
|
return private;
|
|
|
|
}
|
|
|
|
|
2010-08-31 14:41:14 +02:00
|
|
|
int
|
|
|
|
key_ecdsa_bits_to_nid(int bits)
|
|
|
|
{
|
|
|
|
switch (bits) {
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case 256:
|
|
|
|
return NID_X9_62_prime256v1;
|
|
|
|
case 384:
|
|
|
|
return NID_secp384r1;
|
|
|
|
case 521:
|
|
|
|
return NID_secp521r1;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2010-08-31 14:41:14 +02:00
|
|
|
default:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
int
|
2010-11-05 00:19:49 +01:00
|
|
|
key_ecdsa_key_to_nid(EC_KEY *k)
|
2010-08-31 14:41:14 +02:00
|
|
|
{
|
|
|
|
EC_GROUP *eg;
|
|
|
|
int nids[] = {
|
|
|
|
NID_X9_62_prime256v1,
|
|
|
|
NID_secp384r1,
|
|
|
|
NID_secp521r1,
|
|
|
|
-1
|
|
|
|
};
|
2010-11-05 00:19:49 +01:00
|
|
|
int nid;
|
2010-08-31 14:41:14 +02:00
|
|
|
u_int i;
|
|
|
|
BN_CTX *bnctx;
|
2010-11-05 00:19:49 +01:00
|
|
|
const EC_GROUP *g = EC_KEY_get0_group(k);
|
2010-08-31 14:41:14 +02:00
|
|
|
|
2010-11-05 00:19:49 +01:00
|
|
|
/*
|
|
|
|
* The group may be stored in a ASN.1 encoded private key in one of two
|
|
|
|
* ways: as a "named group", which is reconstituted by ASN.1 object ID
|
|
|
|
* or explicit group parameters encoded into the key blob. Only the
|
|
|
|
* "named group" case sets the group NID for us, but we can figure
|
|
|
|
* it out for the other case by comparing against all the groups that
|
|
|
|
* are supported.
|
|
|
|
*/
|
|
|
|
if ((nid = EC_GROUP_get_curve_name(g)) > 0)
|
|
|
|
return nid;
|
2010-08-31 14:41:14 +02:00
|
|
|
if ((bnctx = BN_CTX_new()) == NULL)
|
|
|
|
fatal("%s: BN_CTX_new() failed", __func__);
|
|
|
|
for (i = 0; nids[i] != -1; i++) {
|
|
|
|
if ((eg = EC_GROUP_new_by_curve_name(nids[i])) == NULL)
|
|
|
|
fatal("%s: EC_GROUP_new_by_curve_name failed",
|
|
|
|
__func__);
|
2010-11-05 00:19:49 +01:00
|
|
|
if (EC_GROUP_cmp(g, eg, bnctx) == 0)
|
2010-08-31 14:41:14 +02:00
|
|
|
break;
|
|
|
|
EC_GROUP_free(eg);
|
|
|
|
}
|
|
|
|
BN_CTX_free(bnctx);
|
|
|
|
debug3("%s: nid = %d", __func__, nids[i]);
|
2010-11-05 00:19:49 +01:00
|
|
|
if (nids[i] != -1) {
|
|
|
|
/* Use the group with the NID attached */
|
|
|
|
EC_GROUP_set_asn1_flag(eg, OPENSSL_EC_NAMED_CURVE);
|
|
|
|
if (EC_KEY_set_group(k, eg) != 1)
|
|
|
|
fatal("%s: EC_KEY_set_group", __func__);
|
|
|
|
}
|
2010-08-31 14:41:14 +02:00
|
|
|
return nids[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
static EC_KEY*
|
|
|
|
ecdsa_generate_private_key(u_int bits, int *nid)
|
|
|
|
{
|
|
|
|
EC_KEY *private;
|
|
|
|
|
|
|
|
if ((*nid = key_ecdsa_bits_to_nid(bits)) == -1)
|
|
|
|
fatal("%s: invalid key length", __func__);
|
|
|
|
if ((private = EC_KEY_new_by_curve_name(*nid)) == NULL)
|
|
|
|
fatal("%s: EC_KEY_new_by_curve_name failed", __func__);
|
|
|
|
if (EC_KEY_generate_key(private) != 1)
|
|
|
|
fatal("%s: EC_KEY_generate_key failed", __func__);
|
2010-11-05 00:19:49 +01:00
|
|
|
EC_KEY_set_asn1_flag(private, OPENSSL_EC_NAMED_CURVE);
|
2010-08-31 14:41:14 +02:00
|
|
|
return private;
|
|
|
|
}
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif /* OPENSSL_HAS_ECC */
|
2010-08-31 14:41:14 +02:00
|
|
|
|
2000-11-13 12:57:25 +01:00
|
|
|
Key *
|
2000-12-22 02:43:59 +01:00
|
|
|
key_generate(int type, u_int bits)
|
2000-11-13 12:57:25 +01:00
|
|
|
{
|
|
|
|
Key *k = key_new(KEY_UNSPEC);
|
|
|
|
switch (type) {
|
2001-02-05 13:42:17 +01:00
|
|
|
case KEY_DSA:
|
2000-11-13 12:57:25 +01:00
|
|
|
k->dsa = dsa_generate_private_key(bits);
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
|
|
|
k->ecdsa = ecdsa_generate_private_key(bits, &k->ecdsa_nid);
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA:
|
|
|
|
case KEY_RSA1:
|
|
|
|
k->rsa = rsa_generate_private_key(bits);
|
|
|
|
break;
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
|
|
|
case KEY_DSA_CERT:
|
|
|
|
fatal("key_generate: cert keys cannot be generated directly");
|
2000-11-13 12:57:25 +01:00
|
|
|
default:
|
2001-02-05 13:42:17 +01:00
|
|
|
fatal("key_generate: unknown type %d", type);
|
2000-11-13 12:57:25 +01:00
|
|
|
}
|
2001-02-05 13:42:17 +01:00
|
|
|
k->type = type;
|
2000-11-13 12:57:25 +01:00
|
|
|
return k;
|
|
|
|
}
|
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
void
|
|
|
|
key_cert_copy(const Key *from_key, struct Key *to_key)
|
|
|
|
{
|
|
|
|
u_int i;
|
|
|
|
const struct KeyCert *from;
|
|
|
|
struct KeyCert *to;
|
|
|
|
|
|
|
|
if (to_key->cert != NULL) {
|
|
|
|
cert_free(to_key->cert);
|
|
|
|
to_key->cert = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((from = from_key->cert) == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
to = to_key->cert = cert_new();
|
|
|
|
|
|
|
|
buffer_append(&to->certblob, buffer_ptr(&from->certblob),
|
|
|
|
buffer_len(&from->certblob));
|
|
|
|
|
2010-04-16 07:56:21 +02:00
|
|
|
buffer_append(&to->critical,
|
|
|
|
buffer_ptr(&from->critical), buffer_len(&from->critical));
|
|
|
|
buffer_append(&to->extensions,
|
|
|
|
buffer_ptr(&from->extensions), buffer_len(&from->extensions));
|
2010-02-26 21:55:05 +01:00
|
|
|
|
2010-04-16 07:56:21 +02:00
|
|
|
to->serial = from->serial;
|
2010-02-26 21:55:05 +01:00
|
|
|
to->type = from->type;
|
|
|
|
to->key_id = from->key_id == NULL ? NULL : xstrdup(from->key_id);
|
|
|
|
to->valid_after = from->valid_after;
|
|
|
|
to->valid_before = from->valid_before;
|
|
|
|
to->signature_key = from->signature_key == NULL ?
|
|
|
|
NULL : key_from_private(from->signature_key);
|
|
|
|
|
|
|
|
to->nprincipals = from->nprincipals;
|
|
|
|
if (to->nprincipals > CERT_MAX_PRINCIPALS)
|
|
|
|
fatal("%s: nprincipals (%u) > CERT_MAX_PRINCIPALS (%u)",
|
|
|
|
__func__, to->nprincipals, CERT_MAX_PRINCIPALS);
|
|
|
|
if (to->nprincipals > 0) {
|
|
|
|
to->principals = xcalloc(from->nprincipals,
|
|
|
|
sizeof(*to->principals));
|
|
|
|
for (i = 0; i < to->nprincipals; i++)
|
|
|
|
to->principals[i] = xstrdup(from->principals[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-11-13 12:57:25 +01:00
|
|
|
Key *
|
2003-11-17 11:18:23 +01:00
|
|
|
key_from_private(const Key *k)
|
2000-11-13 12:57:25 +01:00
|
|
|
{
|
|
|
|
Key *n = NULL;
|
|
|
|
switch (k->type) {
|
2001-02-05 13:42:17 +01:00
|
|
|
case KEY_DSA:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2000-11-13 12:57:25 +01:00
|
|
|
n = key_new(k->type);
|
2006-11-07 13:14:41 +01:00
|
|
|
if ((BN_copy(n->dsa->p, k->dsa->p) == NULL) ||
|
|
|
|
(BN_copy(n->dsa->q, k->dsa->q) == NULL) ||
|
|
|
|
(BN_copy(n->dsa->g, k->dsa->g) == NULL) ||
|
|
|
|
(BN_copy(n->dsa->pub_key, k->dsa->pub_key) == NULL))
|
|
|
|
fatal("key_from_private: BN_copy failed");
|
2000-11-13 12:57:25 +01:00
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
n = key_new(k->type);
|
|
|
|
n->ecdsa_nid = k->ecdsa_nid;
|
|
|
|
if ((n->ecdsa = EC_KEY_new_by_curve_name(k->ecdsa_nid)) == NULL)
|
|
|
|
fatal("%s: EC_KEY_new_by_curve_name failed", __func__);
|
|
|
|
if (EC_KEY_set_public_key(n->ecdsa,
|
|
|
|
EC_KEY_get0_public_key(k->ecdsa)) != 1)
|
|
|
|
fatal("%s: EC_KEY_set_public_key failed", __func__);
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA:
|
|
|
|
case KEY_RSA1:
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
2000-11-13 12:57:25 +01:00
|
|
|
n = key_new(k->type);
|
2006-11-07 13:14:41 +01:00
|
|
|
if ((BN_copy(n->rsa->n, k->rsa->n) == NULL) ||
|
|
|
|
(BN_copy(n->rsa->e, k->rsa->e) == NULL))
|
|
|
|
fatal("key_from_private: BN_copy failed");
|
2000-11-13 12:57:25 +01:00
|
|
|
break;
|
|
|
|
default:
|
2001-02-05 13:42:17 +01:00
|
|
|
fatal("key_from_private: unknown type %d", k->type);
|
2000-11-13 12:57:25 +01:00
|
|
|
break;
|
|
|
|
}
|
2010-02-26 21:55:05 +01:00
|
|
|
if (key_is_cert(k))
|
|
|
|
key_cert_copy(k, n);
|
2000-11-13 12:57:25 +01:00
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
2001-04-17 20:11:36 +02:00
|
|
|
int
|
|
|
|
key_names_valid2(const char *names)
|
|
|
|
{
|
|
|
|
char *s, *cp, *p;
|
|
|
|
|
|
|
|
if (names == NULL || strcmp(names, "") == 0)
|
|
|
|
return 0;
|
|
|
|
s = cp = xstrdup(names);
|
|
|
|
for ((p = strsep(&cp, ",")); p && *p != '\0';
|
2001-12-21 04:45:46 +01:00
|
|
|
(p = strsep(&cp, ","))) {
|
2001-04-17 20:11:36 +02:00
|
|
|
switch (key_type_from_name(p)) {
|
|
|
|
case KEY_RSA1:
|
|
|
|
case KEY_UNSPEC:
|
|
|
|
xfree(s);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
debug3("key names ok: [%s]", names);
|
|
|
|
xfree(s);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
static int
|
|
|
|
cert_parse(Buffer *b, Key *key, const u_char *blob, u_int blen)
|
|
|
|
{
|
2010-04-16 07:56:21 +02:00
|
|
|
u_char *principals, *critical, *exts, *sig_key, *sig;
|
|
|
|
u_int signed_len, plen, clen, sklen, slen, kidlen, elen;
|
2010-02-26 21:55:05 +01:00
|
|
|
Buffer tmp;
|
|
|
|
char *principal;
|
|
|
|
int ret = -1;
|
2010-04-16 07:56:21 +02:00
|
|
|
int v00 = key->type == KEY_DSA_CERT_V00 ||
|
|
|
|
key->type == KEY_RSA_CERT_V00;
|
2010-02-26 21:55:05 +01:00
|
|
|
|
|
|
|
buffer_init(&tmp);
|
|
|
|
|
|
|
|
/* Copy the entire key blob for verification and later serialisation */
|
|
|
|
buffer_append(&key->cert->certblob, blob, blen);
|
|
|
|
|
2010-04-16 07:56:21 +02:00
|
|
|
elen = 0; /* Not touched for v00 certs */
|
|
|
|
principals = exts = critical = sig_key = sig = NULL;
|
|
|
|
if ((!v00 && buffer_get_int64_ret(&key->cert->serial, b) != 0) ||
|
|
|
|
buffer_get_int_ret(&key->cert->type, b) != 0 ||
|
2010-08-31 14:36:39 +02:00
|
|
|
(key->cert->key_id = buffer_get_cstring_ret(b, &kidlen)) == NULL ||
|
2010-02-26 21:55:05 +01:00
|
|
|
(principals = buffer_get_string_ret(b, &plen)) == NULL ||
|
|
|
|
buffer_get_int64_ret(&key->cert->valid_after, b) != 0 ||
|
|
|
|
buffer_get_int64_ret(&key->cert->valid_before, b) != 0 ||
|
2010-04-16 07:56:21 +02:00
|
|
|
(critical = buffer_get_string_ret(b, &clen)) == NULL ||
|
|
|
|
(!v00 && (exts = buffer_get_string_ret(b, &elen)) == NULL) ||
|
|
|
|
(v00 && buffer_get_string_ptr_ret(b, NULL) == NULL) || /* nonce */
|
|
|
|
buffer_get_string_ptr_ret(b, NULL) == NULL || /* reserved */
|
2010-02-26 21:55:05 +01:00
|
|
|
(sig_key = buffer_get_string_ret(b, &sklen)) == NULL) {
|
|
|
|
error("%s: parse error", __func__);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Signature is left in the buffer so we can calculate this length */
|
|
|
|
signed_len = buffer_len(&key->cert->certblob) - buffer_len(b);
|
|
|
|
|
|
|
|
if ((sig = buffer_get_string_ret(b, &slen)) == NULL) {
|
|
|
|
error("%s: parse error", __func__);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (key->cert->type != SSH2_CERT_TYPE_USER &&
|
|
|
|
key->cert->type != SSH2_CERT_TYPE_HOST) {
|
|
|
|
error("Unknown certificate type %u", key->cert->type);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
buffer_append(&tmp, principals, plen);
|
|
|
|
while (buffer_len(&tmp) > 0) {
|
|
|
|
if (key->cert->nprincipals >= CERT_MAX_PRINCIPALS) {
|
2010-03-04 11:51:11 +01:00
|
|
|
error("%s: Too many principals", __func__);
|
2010-02-26 21:55:05 +01:00
|
|
|
goto out;
|
|
|
|
}
|
2010-08-31 14:36:39 +02:00
|
|
|
if ((principal = buffer_get_cstring_ret(&tmp, &plen)) == NULL) {
|
2010-03-04 11:51:11 +01:00
|
|
|
error("%s: Principals data invalid", __func__);
|
|
|
|
goto out;
|
|
|
|
}
|
2010-02-26 21:55:05 +01:00
|
|
|
key->cert->principals = xrealloc(key->cert->principals,
|
|
|
|
key->cert->nprincipals + 1, sizeof(*key->cert->principals));
|
|
|
|
key->cert->principals[key->cert->nprincipals++] = principal;
|
|
|
|
}
|
|
|
|
|
|
|
|
buffer_clear(&tmp);
|
|
|
|
|
2010-04-16 07:56:21 +02:00
|
|
|
buffer_append(&key->cert->critical, critical, clen);
|
|
|
|
buffer_append(&tmp, critical, clen);
|
2010-02-26 21:55:05 +01:00
|
|
|
/* validate structure */
|
|
|
|
while (buffer_len(&tmp) != 0) {
|
2010-03-04 11:52:18 +01:00
|
|
|
if (buffer_get_string_ptr_ret(&tmp, NULL) == NULL ||
|
|
|
|
buffer_get_string_ptr_ret(&tmp, NULL) == NULL) {
|
2010-04-16 07:56:21 +02:00
|
|
|
error("%s: critical option data invalid", __func__);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
buffer_clear(&tmp);
|
|
|
|
|
|
|
|
buffer_append(&key->cert->extensions, exts, elen);
|
|
|
|
buffer_append(&tmp, exts, elen);
|
|
|
|
/* validate structure */
|
|
|
|
while (buffer_len(&tmp) != 0) {
|
|
|
|
if (buffer_get_string_ptr_ret(&tmp, NULL) == NULL ||
|
|
|
|
buffer_get_string_ptr_ret(&tmp, NULL) == NULL) {
|
|
|
|
error("%s: extension data invalid", __func__);
|
2010-02-26 21:55:05 +01:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
buffer_clear(&tmp);
|
|
|
|
|
|
|
|
if ((key->cert->signature_key = key_from_blob(sig_key,
|
|
|
|
sklen)) == NULL) {
|
2010-03-04 11:51:11 +01:00
|
|
|
error("%s: Signature key invalid", __func__);
|
2010-02-26 21:55:05 +01:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (key->cert->signature_key->type != KEY_RSA &&
|
2010-08-31 14:41:14 +02:00
|
|
|
key->cert->signature_key->type != KEY_DSA &&
|
|
|
|
key->cert->signature_key->type != KEY_ECDSA) {
|
2010-03-04 11:51:11 +01:00
|
|
|
error("%s: Invalid signature key type %s (%d)", __func__,
|
2010-02-26 21:55:05 +01:00
|
|
|
key_type(key->cert->signature_key),
|
|
|
|
key->cert->signature_key->type);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (key_verify(key->cert->signature_key, sig, slen,
|
|
|
|
buffer_ptr(&key->cert->certblob), signed_len)) {
|
|
|
|
case 1:
|
2010-03-04 11:51:11 +01:00
|
|
|
ret = 0;
|
2010-02-26 21:55:05 +01:00
|
|
|
break; /* Good signature */
|
|
|
|
case 0:
|
2010-03-04 11:51:11 +01:00
|
|
|
error("%s: Invalid signature on certificate", __func__);
|
2010-02-26 21:55:05 +01:00
|
|
|
goto out;
|
|
|
|
case -1:
|
2010-03-04 11:51:11 +01:00
|
|
|
error("%s: Certificate signature verification failed",
|
|
|
|
__func__);
|
2010-02-26 21:55:05 +01:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
buffer_free(&tmp);
|
|
|
|
if (principals != NULL)
|
|
|
|
xfree(principals);
|
2010-04-16 07:56:21 +02:00
|
|
|
if (critical != NULL)
|
|
|
|
xfree(critical);
|
|
|
|
if (exts != NULL)
|
|
|
|
xfree(exts);
|
2010-02-26 21:55:05 +01:00
|
|
|
if (sig_key != NULL)
|
|
|
|
xfree(sig_key);
|
|
|
|
if (sig != NULL)
|
|
|
|
xfree(sig);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2000-11-13 12:57:25 +01:00
|
|
|
Key *
|
2003-11-17 11:18:23 +01:00
|
|
|
key_from_blob(const u_char *blob, u_int blen)
|
2000-11-13 12:57:25 +01:00
|
|
|
{
|
|
|
|
Buffer b;
|
2010-09-10 04:28:24 +02:00
|
|
|
int rlen, type;
|
2010-08-31 14:41:14 +02:00
|
|
|
char *ktype = NULL, *curve = NULL;
|
2000-11-13 12:57:25 +01:00
|
|
|
Key *key = NULL;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
EC_POINT *q = NULL;
|
2010-09-10 04:28:24 +02:00
|
|
|
int nid = -1;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-11-13 12:57:25 +01:00
|
|
|
|
|
|
|
#ifdef DEBUG_PK
|
|
|
|
dump_base64(stderr, blob, blen);
|
|
|
|
#endif
|
|
|
|
buffer_init(&b);
|
|
|
|
buffer_append(&b, blob, blen);
|
2010-08-31 14:36:39 +02:00
|
|
|
if ((ktype = buffer_get_cstring_ret(&b, NULL)) == NULL) {
|
2004-11-05 10:42:28 +01:00
|
|
|
error("key_from_blob: can't read key type");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2000-11-13 12:57:25 +01:00
|
|
|
type = key_type_from_name(ktype);
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
if (key_type_plain(type) == KEY_ECDSA)
|
|
|
|
nid = key_ecdsa_nid_from_name(ktype);
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-11-13 12:57:25 +01:00
|
|
|
|
2001-12-06 19:00:18 +01:00
|
|
|
switch (type) {
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
2010-04-16 07:56:21 +02:00
|
|
|
(void)buffer_get_string_ptr_ret(&b, NULL); /* Skip nonce */
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
case KEY_RSA:
|
|
|
|
case KEY_RSA_CERT_V00:
|
2000-11-13 12:57:25 +01:00
|
|
|
key = key_new(type);
|
2004-11-05 10:42:28 +01:00
|
|
|
if (buffer_get_bignum2_ret(&b, key->rsa->e) == -1 ||
|
|
|
|
buffer_get_bignum2_ret(&b, key->rsa->n) == -1) {
|
|
|
|
error("key_from_blob: can't read rsa key");
|
2010-02-26 21:55:05 +01:00
|
|
|
badkey:
|
2004-11-05 10:42:28 +01:00
|
|
|
key_free(key);
|
|
|
|
key = NULL;
|
|
|
|
goto out;
|
|
|
|
}
|
2000-11-13 12:57:25 +01:00
|
|
|
#ifdef DEBUG_PK
|
|
|
|
RSA_print_fp(stderr, key->rsa, 8);
|
|
|
|
#endif
|
|
|
|
break;
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2010-04-16 07:56:21 +02:00
|
|
|
(void)buffer_get_string_ptr_ret(&b, NULL); /* Skip nonce */
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
case KEY_DSA:
|
|
|
|
case KEY_DSA_CERT_V00:
|
2000-11-13 12:57:25 +01:00
|
|
|
key = key_new(type);
|
2004-11-05 10:42:28 +01:00
|
|
|
if (buffer_get_bignum2_ret(&b, key->dsa->p) == -1 ||
|
|
|
|
buffer_get_bignum2_ret(&b, key->dsa->q) == -1 ||
|
|
|
|
buffer_get_bignum2_ret(&b, key->dsa->g) == -1 ||
|
|
|
|
buffer_get_bignum2_ret(&b, key->dsa->pub_key) == -1) {
|
|
|
|
error("key_from_blob: can't read dsa key");
|
2010-02-26 21:55:05 +01:00
|
|
|
goto badkey;
|
2004-11-05 10:42:28 +01:00
|
|
|
}
|
2000-11-13 12:57:25 +01:00
|
|
|
#ifdef DEBUG_PK
|
|
|
|
DSA_print_fp(stderr, key->dsa, 8);
|
2010-08-31 14:41:14 +02:00
|
|
|
#endif
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
(void)buffer_get_string_ptr_ret(&b, NULL); /* Skip nonce */
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
case KEY_ECDSA:
|
|
|
|
key = key_new(type);
|
|
|
|
key->ecdsa_nid = nid;
|
|
|
|
if ((curve = buffer_get_string_ret(&b, NULL)) == NULL) {
|
|
|
|
error("key_from_blob: can't read ecdsa curve");
|
|
|
|
goto badkey;
|
|
|
|
}
|
|
|
|
if (key->ecdsa_nid != key_curve_name_to_nid(curve)) {
|
|
|
|
error("key_from_blob: ecdsa curve doesn't match type");
|
|
|
|
goto badkey;
|
|
|
|
}
|
|
|
|
if (key->ecdsa != NULL)
|
|
|
|
EC_KEY_free(key->ecdsa);
|
|
|
|
if ((key->ecdsa = EC_KEY_new_by_curve_name(key->ecdsa_nid))
|
|
|
|
== NULL)
|
|
|
|
fatal("key_from_blob: EC_KEY_new_by_curve_name failed");
|
|
|
|
if ((q = EC_POINT_new(EC_KEY_get0_group(key->ecdsa))) == NULL)
|
|
|
|
fatal("key_from_blob: EC_POINT_new failed");
|
|
|
|
if (buffer_get_ecpoint_ret(&b, EC_KEY_get0_group(key->ecdsa),
|
|
|
|
q) == -1) {
|
|
|
|
error("key_from_blob: can't read ecdsa key point");
|
|
|
|
goto badkey;
|
|
|
|
}
|
|
|
|
if (key_ec_validate_public(EC_KEY_get0_group(key->ecdsa),
|
|
|
|
q) != 0)
|
|
|
|
goto badkey;
|
|
|
|
if (EC_KEY_set_public_key(key->ecdsa, q) != 1)
|
|
|
|
fatal("key_from_blob: EC_KEY_set_public_key failed");
|
|
|
|
#ifdef DEBUG_PK
|
|
|
|
key_dump_ec_point(EC_KEY_get0_group(key->ecdsa), q);
|
2000-11-13 12:57:25 +01:00
|
|
|
#endif
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif /* OPENSSL_HAS_ECC */
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_UNSPEC:
|
|
|
|
key = key_new(type);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
error("key_from_blob: cannot handle type %s", ktype);
|
2004-11-05 10:42:28 +01:00
|
|
|
goto out;
|
2000-11-13 12:57:25 +01:00
|
|
|
}
|
2010-02-26 21:55:05 +01:00
|
|
|
if (key_is_cert(key) && cert_parse(&b, key, blob, blen) == -1) {
|
|
|
|
error("key_from_blob: can't parse cert data");
|
|
|
|
goto badkey;
|
|
|
|
}
|
2000-11-13 12:57:25 +01:00
|
|
|
rlen = buffer_len(&b);
|
|
|
|
if (key != NULL && rlen != 0)
|
|
|
|
error("key_from_blob: remaining bytes in key blob %d", rlen);
|
2004-11-05 10:42:28 +01:00
|
|
|
out:
|
|
|
|
if (ktype != NULL)
|
|
|
|
xfree(ktype);
|
2010-08-31 14:41:14 +02:00
|
|
|
if (curve != NULL)
|
|
|
|
xfree(curve);
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
if (q != NULL)
|
|
|
|
EC_POINT_free(q);
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-11-13 12:57:25 +01:00
|
|
|
buffer_free(&b);
|
|
|
|
return key;
|
|
|
|
}
|
|
|
|
|
2013-01-18 01:44:04 +01:00
|
|
|
static int
|
|
|
|
to_blob(const Key *key, u_char **blobp, u_int *lenp, int force_plain)
|
2000-11-13 12:57:25 +01:00
|
|
|
{
|
|
|
|
Buffer b;
|
2013-01-18 01:44:04 +01:00
|
|
|
int len, type;
|
2000-11-13 12:57:25 +01:00
|
|
|
|
|
|
|
if (key == NULL) {
|
|
|
|
error("key_to_blob: key == NULL");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
buffer_init(&b);
|
2013-01-18 01:44:04 +01:00
|
|
|
type = force_plain ? key_type_plain(key->type) : key->type;
|
|
|
|
switch (type) {
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
|
|
|
/* Use the existing blob */
|
|
|
|
buffer_append(&b, buffer_ptr(&key->cert->certblob),
|
|
|
|
buffer_len(&key->cert->certblob));
|
|
|
|
break;
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_DSA:
|
2013-01-18 01:44:04 +01:00
|
|
|
buffer_put_cstring(&b,
|
|
|
|
key_ssh_name_from_type_nid(type, key->ecdsa_nid));
|
2000-11-13 12:57:25 +01:00
|
|
|
buffer_put_bignum2(&b, key->dsa->p);
|
|
|
|
buffer_put_bignum2(&b, key->dsa->q);
|
|
|
|
buffer_put_bignum2(&b, key->dsa->g);
|
|
|
|
buffer_put_bignum2(&b, key->dsa->pub_key);
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
2013-01-18 01:44:04 +01:00
|
|
|
buffer_put_cstring(&b,
|
|
|
|
key_ssh_name_from_type_nid(type, key->ecdsa_nid));
|
2010-08-31 14:41:14 +02:00
|
|
|
buffer_put_cstring(&b, key_curve_nid_to_name(key->ecdsa_nid));
|
|
|
|
buffer_put_ecpoint(&b, EC_KEY_get0_group(key->ecdsa),
|
|
|
|
EC_KEY_get0_public_key(key->ecdsa));
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA:
|
2013-01-18 01:44:04 +01:00
|
|
|
buffer_put_cstring(&b,
|
|
|
|
key_ssh_name_from_type_nid(type, key->ecdsa_nid));
|
2000-11-13 12:57:25 +01:00
|
|
|
buffer_put_bignum2(&b, key->rsa->e);
|
2001-01-18 03:04:35 +01:00
|
|
|
buffer_put_bignum2(&b, key->rsa->n);
|
2000-11-13 12:57:25 +01:00
|
|
|
break;
|
|
|
|
default:
|
2001-09-18 07:49:14 +02:00
|
|
|
error("key_to_blob: unsupported key type %d", key->type);
|
|
|
|
buffer_free(&b);
|
|
|
|
return 0;
|
2000-11-13 12:57:25 +01:00
|
|
|
}
|
|
|
|
len = buffer_len(&b);
|
|
|
|
if (lenp != NULL)
|
|
|
|
*lenp = len;
|
2002-07-08 00:13:31 +02:00
|
|
|
if (blobp != NULL) {
|
|
|
|
*blobp = xmalloc(len);
|
|
|
|
memcpy(*blobp, buffer_ptr(&b), len);
|
|
|
|
}
|
|
|
|
memset(buffer_ptr(&b), 0, len);
|
|
|
|
buffer_free(&b);
|
2000-11-13 12:57:25 +01:00
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2013-01-18 01:44:04 +01:00
|
|
|
int
|
|
|
|
key_to_blob(const Key *key, u_char **blobp, u_int *lenp)
|
|
|
|
{
|
|
|
|
return to_blob(key, blobp, lenp, 0);
|
|
|
|
}
|
|
|
|
|
2000-11-13 12:57:25 +01:00
|
|
|
int
|
|
|
|
key_sign(
|
2003-11-17 11:18:23 +01:00
|
|
|
const Key *key,
|
2002-02-26 19:09:42 +01:00
|
|
|
u_char **sigp, u_int *lenp,
|
2003-11-17 11:18:23 +01:00
|
|
|
const u_char *data, u_int datalen)
|
2000-11-13 12:57:25 +01:00
|
|
|
{
|
2001-12-06 19:00:18 +01:00
|
|
|
switch (key->type) {
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_DSA:
|
|
|
|
return ssh_dss_sign(key, sigp, lenp, data, datalen);
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
case KEY_ECDSA:
|
|
|
|
return ssh_ecdsa_sign(key, sigp, lenp, data, datalen);
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA:
|
|
|
|
return ssh_rsa_sign(key, sigp, lenp, data, datalen);
|
|
|
|
default:
|
2004-08-12 14:40:24 +02:00
|
|
|
error("key_sign: invalid key type %d", key->type);
|
2000-11-13 12:57:25 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-06-06 22:54:07 +02:00
|
|
|
/*
|
|
|
|
* key_verify returns 1 for a correct signature, 0 for an incorrect signature
|
|
|
|
* and -1 on error.
|
|
|
|
*/
|
2000-11-13 12:57:25 +01:00
|
|
|
int
|
|
|
|
key_verify(
|
2003-11-17 11:18:23 +01:00
|
|
|
const Key *key,
|
|
|
|
const u_char *signature, u_int signaturelen,
|
|
|
|
const u_char *data, u_int datalen)
|
2000-11-13 12:57:25 +01:00
|
|
|
{
|
2001-06-25 06:42:20 +02:00
|
|
|
if (signaturelen == 0)
|
|
|
|
return -1;
|
|
|
|
|
2001-12-06 19:00:18 +01:00
|
|
|
switch (key->type) {
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_DSA:
|
|
|
|
return ssh_dss_verify(key, signature, signaturelen, data, datalen);
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
case KEY_ECDSA:
|
|
|
|
return ssh_ecdsa_verify(key, signature, signaturelen, data, datalen);
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
2000-11-13 12:57:25 +01:00
|
|
|
case KEY_RSA:
|
|
|
|
return ssh_rsa_verify(key, signature, signaturelen, data, datalen);
|
|
|
|
default:
|
2004-08-12 14:40:24 +02:00
|
|
|
error("key_verify: invalid key type %d", key->type);
|
2000-11-13 12:57:25 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
2002-03-22 02:45:53 +01:00
|
|
|
|
|
|
|
/* Converts a private to a public key */
|
|
|
|
Key *
|
2003-11-17 11:18:23 +01:00
|
|
|
key_demote(const Key *k)
|
2002-03-22 02:45:53 +01:00
|
|
|
{
|
|
|
|
Key *pk;
|
2002-03-22 03:54:23 +01:00
|
|
|
|
2006-03-26 05:19:21 +02:00
|
|
|
pk = xcalloc(1, sizeof(*pk));
|
2002-03-22 02:45:53 +01:00
|
|
|
pk->type = k->type;
|
|
|
|
pk->flags = k->flags;
|
2010-08-31 14:41:14 +02:00
|
|
|
pk->ecdsa_nid = k->ecdsa_nid;
|
2002-03-22 02:45:53 +01:00
|
|
|
pk->dsa = NULL;
|
2010-08-31 14:41:14 +02:00
|
|
|
pk->ecdsa = NULL;
|
2002-03-22 02:45:53 +01:00
|
|
|
pk->rsa = NULL;
|
|
|
|
|
|
|
|
switch (k->type) {
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
|
|
|
key_cert_copy(k, pk);
|
|
|
|
/* FALLTHROUGH */
|
2002-03-22 02:45:53 +01:00
|
|
|
case KEY_RSA1:
|
|
|
|
case KEY_RSA:
|
|
|
|
if ((pk->rsa = RSA_new()) == NULL)
|
|
|
|
fatal("key_demote: RSA_new failed");
|
|
|
|
if ((pk->rsa->e = BN_dup(k->rsa->e)) == NULL)
|
|
|
|
fatal("key_demote: BN_dup failed");
|
|
|
|
if ((pk->rsa->n = BN_dup(k->rsa->n)) == NULL)
|
|
|
|
fatal("key_demote: BN_dup failed");
|
|
|
|
break;
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
|
|
|
key_cert_copy(k, pk);
|
|
|
|
/* FALLTHROUGH */
|
2002-03-22 02:45:53 +01:00
|
|
|
case KEY_DSA:
|
|
|
|
if ((pk->dsa = DSA_new()) == NULL)
|
|
|
|
fatal("key_demote: DSA_new failed");
|
|
|
|
if ((pk->dsa->p = BN_dup(k->dsa->p)) == NULL)
|
|
|
|
fatal("key_demote: BN_dup failed");
|
|
|
|
if ((pk->dsa->q = BN_dup(k->dsa->q)) == NULL)
|
|
|
|
fatal("key_demote: BN_dup failed");
|
|
|
|
if ((pk->dsa->g = BN_dup(k->dsa->g)) == NULL)
|
|
|
|
fatal("key_demote: BN_dup failed");
|
|
|
|
if ((pk->dsa->pub_key = BN_dup(k->dsa->pub_key)) == NULL)
|
|
|
|
fatal("key_demote: BN_dup failed");
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
key_cert_copy(k, pk);
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
case KEY_ECDSA:
|
|
|
|
if ((pk->ecdsa = EC_KEY_new_by_curve_name(pk->ecdsa_nid)) == NULL)
|
|
|
|
fatal("key_demote: EC_KEY_new_by_curve_name failed");
|
|
|
|
if (EC_KEY_set_public_key(pk->ecdsa,
|
|
|
|
EC_KEY_get0_public_key(k->ecdsa)) != 1)
|
|
|
|
fatal("key_demote: EC_KEY_set_public_key failed");
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2002-03-22 02:45:53 +01:00
|
|
|
default:
|
|
|
|
fatal("key_free: bad key type %d", k->type);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (pk);
|
|
|
|
}
|
2010-02-26 21:55:05 +01:00
|
|
|
|
|
|
|
int
|
|
|
|
key_is_cert(const Key *k)
|
|
|
|
{
|
2010-04-16 07:56:21 +02:00
|
|
|
if (k == NULL)
|
|
|
|
return 0;
|
|
|
|
switch (k->type) {
|
|
|
|
case KEY_RSA_CERT_V00:
|
|
|
|
case KEY_DSA_CERT_V00:
|
|
|
|
case KEY_RSA_CERT:
|
|
|
|
case KEY_DSA_CERT:
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
2010-04-16 07:56:21 +02:00
|
|
|
return 1;
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
2010-02-26 21:55:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Return the cert-less equivalent to a certified key type */
|
|
|
|
int
|
|
|
|
key_type_plain(int type)
|
|
|
|
{
|
|
|
|
switch (type) {
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
|
|
|
return KEY_RSA;
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
|
|
|
return KEY_DSA;
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
return KEY_ECDSA;
|
2010-02-26 21:55:05 +01:00
|
|
|
default:
|
|
|
|
return type;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Convert a KEY_RSA or KEY_DSA to their _CERT equivalent */
|
|
|
|
int
|
2010-04-16 07:56:21 +02:00
|
|
|
key_to_certified(Key *k, int legacy)
|
2010-02-26 21:55:05 +01:00
|
|
|
{
|
|
|
|
switch (k->type) {
|
|
|
|
case KEY_RSA:
|
|
|
|
k->cert = cert_new();
|
2010-04-16 07:56:21 +02:00
|
|
|
k->type = legacy ? KEY_RSA_CERT_V00 : KEY_RSA_CERT;
|
2010-02-26 21:55:05 +01:00
|
|
|
return 0;
|
|
|
|
case KEY_DSA:
|
|
|
|
k->cert = cert_new();
|
2010-04-16 07:56:21 +02:00
|
|
|
k->type = legacy ? KEY_DSA_CERT_V00 : KEY_DSA_CERT;
|
2010-02-26 21:55:05 +01:00
|
|
|
return 0;
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA:
|
2011-05-20 11:03:08 +02:00
|
|
|
if (legacy)
|
|
|
|
fatal("%s: legacy ECDSA certificates are not supported",
|
|
|
|
__func__);
|
2010-08-31 14:41:14 +02:00
|
|
|
k->cert = cert_new();
|
|
|
|
k->type = KEY_ECDSA_CERT;
|
|
|
|
return 0;
|
2010-02-26 21:55:05 +01:00
|
|
|
default:
|
|
|
|
error("%s: key has incorrect type %s", __func__, key_type(k));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Convert a KEY_RSA_CERT or KEY_DSA_CERT to their raw key equivalent */
|
|
|
|
int
|
|
|
|
key_drop_cert(Key *k)
|
|
|
|
{
|
|
|
|
switch (k->type) {
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
|
|
|
cert_free(k->cert);
|
|
|
|
k->type = KEY_RSA;
|
|
|
|
return 0;
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
|
|
|
cert_free(k->cert);
|
|
|
|
k->type = KEY_DSA;
|
|
|
|
return 0;
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
cert_free(k->cert);
|
|
|
|
k->type = KEY_ECDSA;
|
|
|
|
return 0;
|
2010-02-26 21:55:05 +01:00
|
|
|
default:
|
|
|
|
error("%s: key has incorrect type %s", __func__, key_type(k));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-08-31 14:41:14 +02:00
|
|
|
/*
|
|
|
|
* Sign a KEY_RSA_CERT, KEY_DSA_CERT or KEY_ECDSA_CERT, (re-)generating
|
|
|
|
* the signed certblob
|
|
|
|
*/
|
2010-02-26 21:55:05 +01:00
|
|
|
int
|
|
|
|
key_certify(Key *k, Key *ca)
|
|
|
|
{
|
|
|
|
Buffer principals;
|
|
|
|
u_char *ca_blob, *sig_blob, nonce[32];
|
|
|
|
u_int i, ca_len, sig_len;
|
|
|
|
|
|
|
|
if (k->cert == NULL) {
|
|
|
|
error("%s: key lacks cert info", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!key_is_cert(k)) {
|
|
|
|
error("%s: certificate has unknown type %d", __func__,
|
|
|
|
k->cert->type);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-08-31 14:41:14 +02:00
|
|
|
if (ca->type != KEY_RSA && ca->type != KEY_DSA &&
|
|
|
|
ca->type != KEY_ECDSA) {
|
2010-02-26 21:55:05 +01:00
|
|
|
error("%s: CA key has unsupported type %s", __func__,
|
|
|
|
key_type(ca));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
key_to_blob(ca, &ca_blob, &ca_len);
|
|
|
|
|
|
|
|
buffer_clear(&k->cert->certblob);
|
|
|
|
buffer_put_cstring(&k->cert->certblob, key_ssh_name(k));
|
|
|
|
|
2010-04-16 07:56:21 +02:00
|
|
|
/* -v01 certs put nonce first */
|
2011-02-04 01:47:01 +01:00
|
|
|
arc4random_buf(&nonce, sizeof(nonce));
|
|
|
|
if (!key_cert_is_legacy(k))
|
2010-04-16 07:56:21 +02:00
|
|
|
buffer_put_string(&k->cert->certblob, nonce, sizeof(nonce));
|
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
switch (k->type) {
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_DSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_DSA_CERT:
|
|
|
|
buffer_put_bignum2(&k->cert->certblob, k->dsa->p);
|
|
|
|
buffer_put_bignum2(&k->cert->certblob, k->dsa->q);
|
|
|
|
buffer_put_bignum2(&k->cert->certblob, k->dsa->g);
|
|
|
|
buffer_put_bignum2(&k->cert->certblob, k->dsa->pub_key);
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
case KEY_ECDSA_CERT:
|
|
|
|
buffer_put_cstring(&k->cert->certblob,
|
|
|
|
key_curve_nid_to_name(k->ecdsa_nid));
|
|
|
|
buffer_put_ecpoint(&k->cert->certblob,
|
|
|
|
EC_KEY_get0_group(k->ecdsa),
|
|
|
|
EC_KEY_get0_public_key(k->ecdsa));
|
|
|
|
break;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2010-04-16 07:56:21 +02:00
|
|
|
case KEY_RSA_CERT_V00:
|
2010-02-26 21:55:05 +01:00
|
|
|
case KEY_RSA_CERT:
|
|
|
|
buffer_put_bignum2(&k->cert->certblob, k->rsa->e);
|
|
|
|
buffer_put_bignum2(&k->cert->certblob, k->rsa->n);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
error("%s: key has incorrect type %s", __func__, key_type(k));
|
|
|
|
buffer_clear(&k->cert->certblob);
|
|
|
|
xfree(ca_blob);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-04-16 07:56:21 +02:00
|
|
|
/* -v01 certs have a serial number next */
|
2010-08-31 14:41:14 +02:00
|
|
|
if (!key_cert_is_legacy(k))
|
2010-04-16 07:56:21 +02:00
|
|
|
buffer_put_int64(&k->cert->certblob, k->cert->serial);
|
|
|
|
|
2010-02-26 21:55:05 +01:00
|
|
|
buffer_put_int(&k->cert->certblob, k->cert->type);
|
|
|
|
buffer_put_cstring(&k->cert->certblob, k->cert->key_id);
|
|
|
|
|
|
|
|
buffer_init(&principals);
|
|
|
|
for (i = 0; i < k->cert->nprincipals; i++)
|
|
|
|
buffer_put_cstring(&principals, k->cert->principals[i]);
|
|
|
|
buffer_put_string(&k->cert->certblob, buffer_ptr(&principals),
|
|
|
|
buffer_len(&principals));
|
|
|
|
buffer_free(&principals);
|
|
|
|
|
|
|
|
buffer_put_int64(&k->cert->certblob, k->cert->valid_after);
|
|
|
|
buffer_put_int64(&k->cert->certblob, k->cert->valid_before);
|
|
|
|
buffer_put_string(&k->cert->certblob,
|
2010-04-16 07:56:21 +02:00
|
|
|
buffer_ptr(&k->cert->critical), buffer_len(&k->cert->critical));
|
|
|
|
|
|
|
|
/* -v01 certs have non-critical options here */
|
2010-08-31 14:41:14 +02:00
|
|
|
if (!key_cert_is_legacy(k)) {
|
2010-04-16 07:56:21 +02:00
|
|
|
buffer_put_string(&k->cert->certblob,
|
|
|
|
buffer_ptr(&k->cert->extensions),
|
|
|
|
buffer_len(&k->cert->extensions));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* -v00 certs put the nonce at the end */
|
2010-08-31 14:41:14 +02:00
|
|
|
if (key_cert_is_legacy(k))
|
2010-04-16 07:56:21 +02:00
|
|
|
buffer_put_string(&k->cert->certblob, nonce, sizeof(nonce));
|
2010-02-26 21:55:05 +01:00
|
|
|
|
|
|
|
buffer_put_string(&k->cert->certblob, NULL, 0); /* reserved */
|
|
|
|
buffer_put_string(&k->cert->certblob, ca_blob, ca_len);
|
|
|
|
xfree(ca_blob);
|
|
|
|
|
|
|
|
/* Sign the whole mess */
|
|
|
|
if (key_sign(ca, &sig_blob, &sig_len, buffer_ptr(&k->cert->certblob),
|
|
|
|
buffer_len(&k->cert->certblob)) != 0) {
|
|
|
|
error("%s: signature operation failed", __func__);
|
|
|
|
buffer_clear(&k->cert->certblob);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
/* Append signature and we are done */
|
|
|
|
buffer_put_string(&k->cert->certblob, sig_blob, sig_len);
|
|
|
|
xfree(sig_blob);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
key_cert_check_authority(const Key *k, int want_host, int require_principal,
|
|
|
|
const char *name, const char **reason)
|
|
|
|
{
|
|
|
|
u_int i, principal_matches;
|
|
|
|
time_t now = time(NULL);
|
|
|
|
|
|
|
|
if (want_host) {
|
|
|
|
if (k->cert->type != SSH2_CERT_TYPE_HOST) {
|
|
|
|
*reason = "Certificate invalid: not a host certificate";
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (k->cert->type != SSH2_CERT_TYPE_USER) {
|
|
|
|
*reason = "Certificate invalid: not a user certificate";
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (now < 0) {
|
|
|
|
error("%s: system clock lies before epoch", __func__);
|
|
|
|
*reason = "Certificate invalid: not yet valid";
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if ((u_int64_t)now < k->cert->valid_after) {
|
|
|
|
*reason = "Certificate invalid: not yet valid";
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if ((u_int64_t)now >= k->cert->valid_before) {
|
|
|
|
*reason = "Certificate invalid: expired";
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (k->cert->nprincipals == 0) {
|
|
|
|
if (require_principal) {
|
|
|
|
*reason = "Certificate lacks principal list";
|
|
|
|
return -1;
|
|
|
|
}
|
2010-05-10 03:58:03 +02:00
|
|
|
} else if (name != NULL) {
|
2010-02-26 21:55:05 +01:00
|
|
|
principal_matches = 0;
|
|
|
|
for (i = 0; i < k->cert->nprincipals; i++) {
|
|
|
|
if (strcmp(name, k->cert->principals[i]) == 0) {
|
|
|
|
principal_matches = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!principal_matches) {
|
|
|
|
*reason = "Certificate invalid: name is not a listed "
|
|
|
|
"principal";
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2010-04-16 07:56:21 +02:00
|
|
|
|
|
|
|
int
|
2013-01-18 01:44:04 +01:00
|
|
|
key_cert_is_legacy(const Key *k)
|
2010-04-16 07:56:21 +02:00
|
|
|
{
|
|
|
|
switch (k->type) {
|
|
|
|
case KEY_DSA_CERT_V00:
|
|
|
|
case KEY_RSA_CERT_V00:
|
|
|
|
return 1;
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2010-08-31 14:41:14 +02:00
|
|
|
|
2010-09-10 03:23:34 +02:00
|
|
|
/* XXX: these are really begging for a table-driven approach */
|
2010-08-31 14:41:14 +02:00
|
|
|
int
|
|
|
|
key_curve_name_to_nid(const char *name)
|
|
|
|
{
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
if (strcmp(name, "nistp256") == 0)
|
|
|
|
return NID_X9_62_prime256v1;
|
|
|
|
else if (strcmp(name, "nistp384") == 0)
|
|
|
|
return NID_secp384r1;
|
|
|
|
else if (strcmp(name, "nistp521") == 0)
|
|
|
|
return NID_secp521r1;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2010-08-31 14:41:14 +02:00
|
|
|
|
|
|
|
debug("%s: unsupported EC curve name \"%.100s\"", __func__, name);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-09-10 03:23:34 +02:00
|
|
|
u_int
|
|
|
|
key_curve_nid_to_bits(int nid)
|
|
|
|
{
|
|
|
|
switch (nid) {
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-09-10 03:23:34 +02:00
|
|
|
case NID_X9_62_prime256v1:
|
|
|
|
return 256;
|
|
|
|
case NID_secp384r1:
|
|
|
|
return 384;
|
|
|
|
case NID_secp521r1:
|
|
|
|
return 521;
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2010-09-10 03:23:34 +02:00
|
|
|
default:
|
|
|
|
error("%s: unsupported EC curve nid %d", __func__, nid);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-08-31 14:41:14 +02:00
|
|
|
const char *
|
|
|
|
key_curve_nid_to_name(int nid)
|
|
|
|
{
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-08-31 14:41:14 +02:00
|
|
|
if (nid == NID_X9_62_prime256v1)
|
|
|
|
return "nistp256";
|
|
|
|
else if (nid == NID_secp384r1)
|
|
|
|
return "nistp384";
|
|
|
|
else if (nid == NID_secp521r1)
|
|
|
|
return "nistp521";
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif
|
2010-08-31 14:41:14 +02:00
|
|
|
error("%s: unsupported EC curve nid %d", __func__, nid);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2010-09-10 03:39:26 +02:00
|
|
|
#ifdef OPENSSL_HAS_ECC
|
2010-09-10 03:23:34 +02:00
|
|
|
const EVP_MD *
|
|
|
|
key_ec_nid_to_evpmd(int nid)
|
|
|
|
{
|
|
|
|
int kbits = key_curve_nid_to_bits(nid);
|
|
|
|
|
|
|
|
if (kbits == 0)
|
|
|
|
fatal("%s: invalid nid %d", __func__, nid);
|
|
|
|
/* RFC5656 section 6.2.1 */
|
|
|
|
if (kbits <= 256)
|
|
|
|
return EVP_sha256();
|
|
|
|
else if (kbits <= 384)
|
|
|
|
return EVP_sha384();
|
|
|
|
else
|
|
|
|
return EVP_sha512();
|
|
|
|
}
|
|
|
|
|
2010-08-31 14:41:14 +02:00
|
|
|
int
|
|
|
|
key_ec_validate_public(const EC_GROUP *group, const EC_POINT *public)
|
|
|
|
{
|
|
|
|
BN_CTX *bnctx;
|
|
|
|
EC_POINT *nq = NULL;
|
|
|
|
BIGNUM *order, *x, *y, *tmp;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
if ((bnctx = BN_CTX_new()) == NULL)
|
|
|
|
fatal("%s: BN_CTX_new failed", __func__);
|
|
|
|
BN_CTX_start(bnctx);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We shouldn't ever hit this case because bignum_get_ecpoint()
|
|
|
|
* refuses to load GF2m points.
|
|
|
|
*/
|
|
|
|
if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
|
|
|
|
NID_X9_62_prime_field) {
|
|
|
|
error("%s: group is not a prime field", __func__);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Q != infinity */
|
|
|
|
if (EC_POINT_is_at_infinity(group, public)) {
|
|
|
|
error("%s: received degenerate public key (infinity)",
|
|
|
|
__func__);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((x = BN_CTX_get(bnctx)) == NULL ||
|
|
|
|
(y = BN_CTX_get(bnctx)) == NULL ||
|
|
|
|
(order = BN_CTX_get(bnctx)) == NULL ||
|
|
|
|
(tmp = BN_CTX_get(bnctx)) == NULL)
|
|
|
|
fatal("%s: BN_CTX_get failed", __func__);
|
|
|
|
|
|
|
|
/* log2(x) > log2(order)/2, log2(y) > log2(order)/2 */
|
|
|
|
if (EC_GROUP_get_order(group, order, bnctx) != 1)
|
|
|
|
fatal("%s: EC_GROUP_get_order failed", __func__);
|
|
|
|
if (EC_POINT_get_affine_coordinates_GFp(group, public,
|
|
|
|
x, y, bnctx) != 1)
|
|
|
|
fatal("%s: EC_POINT_get_affine_coordinates_GFp", __func__);
|
|
|
|
if (BN_num_bits(x) <= BN_num_bits(order) / 2) {
|
|
|
|
error("%s: public key x coordinate too small: "
|
|
|
|
"bits(x) = %d, bits(order)/2 = %d", __func__,
|
|
|
|
BN_num_bits(x), BN_num_bits(order) / 2);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (BN_num_bits(y) <= BN_num_bits(order) / 2) {
|
|
|
|
error("%s: public key y coordinate too small: "
|
|
|
|
"bits(y) = %d, bits(order)/2 = %d", __func__,
|
|
|
|
BN_num_bits(x), BN_num_bits(order) / 2);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* nQ == infinity (n == order of subgroup) */
|
|
|
|
if ((nq = EC_POINT_new(group)) == NULL)
|
|
|
|
fatal("%s: BN_CTX_tmp failed", __func__);
|
|
|
|
if (EC_POINT_mul(group, nq, NULL, public, order, bnctx) != 1)
|
|
|
|
fatal("%s: EC_GROUP_mul failed", __func__);
|
|
|
|
if (EC_POINT_is_at_infinity(group, nq) != 1) {
|
|
|
|
error("%s: received degenerate public key (nQ != infinity)",
|
|
|
|
__func__);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* x < order - 1, y < order - 1 */
|
|
|
|
if (!BN_sub(tmp, order, BN_value_one()))
|
|
|
|
fatal("%s: BN_sub failed", __func__);
|
|
|
|
if (BN_cmp(x, tmp) >= 0) {
|
|
|
|
error("%s: public key x coordinate >= group order - 1",
|
|
|
|
__func__);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (BN_cmp(y, tmp) >= 0) {
|
|
|
|
error("%s: public key y coordinate >= group order - 1",
|
|
|
|
__func__);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
out:
|
|
|
|
BN_CTX_free(bnctx);
|
|
|
|
EC_POINT_free(nq);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
key_ec_validate_private(const EC_KEY *key)
|
|
|
|
{
|
|
|
|
BN_CTX *bnctx;
|
|
|
|
BIGNUM *order, *tmp;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
if ((bnctx = BN_CTX_new()) == NULL)
|
|
|
|
fatal("%s: BN_CTX_new failed", __func__);
|
|
|
|
BN_CTX_start(bnctx);
|
|
|
|
|
|
|
|
if ((order = BN_CTX_get(bnctx)) == NULL ||
|
|
|
|
(tmp = BN_CTX_get(bnctx)) == NULL)
|
|
|
|
fatal("%s: BN_CTX_get failed", __func__);
|
|
|
|
|
|
|
|
/* log2(private) > log2(order)/2 */
|
|
|
|
if (EC_GROUP_get_order(EC_KEY_get0_group(key), order, bnctx) != 1)
|
|
|
|
fatal("%s: EC_GROUP_get_order failed", __func__);
|
|
|
|
if (BN_num_bits(EC_KEY_get0_private_key(key)) <=
|
|
|
|
BN_num_bits(order) / 2) {
|
|
|
|
error("%s: private key too small: "
|
|
|
|
"bits(y) = %d, bits(order)/2 = %d", __func__,
|
|
|
|
BN_num_bits(EC_KEY_get0_private_key(key)),
|
|
|
|
BN_num_bits(order) / 2);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* private < order - 1 */
|
|
|
|
if (!BN_sub(tmp, order, BN_value_one()))
|
|
|
|
fatal("%s: BN_sub failed", __func__);
|
|
|
|
if (BN_cmp(EC_KEY_get0_private_key(key), tmp) >= 0) {
|
|
|
|
error("%s: private key >= group order - 1", __func__);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
out:
|
|
|
|
BN_CTX_free(bnctx);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(DEBUG_KEXECDH) || defined(DEBUG_PK)
|
|
|
|
void
|
|
|
|
key_dump_ec_point(const EC_GROUP *group, const EC_POINT *point)
|
|
|
|
{
|
|
|
|
BIGNUM *x, *y;
|
|
|
|
BN_CTX *bnctx;
|
|
|
|
|
|
|
|
if (point == NULL) {
|
|
|
|
fputs("point=(NULL)\n", stderr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if ((bnctx = BN_CTX_new()) == NULL)
|
|
|
|
fatal("%s: BN_CTX_new failed", __func__);
|
|
|
|
BN_CTX_start(bnctx);
|
|
|
|
if ((x = BN_CTX_get(bnctx)) == NULL || (y = BN_CTX_get(bnctx)) == NULL)
|
|
|
|
fatal("%s: BN_CTX_get failed", __func__);
|
|
|
|
if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) !=
|
|
|
|
NID_X9_62_prime_field)
|
|
|
|
fatal("%s: group is not a prime field", __func__);
|
|
|
|
if (EC_POINT_get_affine_coordinates_GFp(group, point, x, y, bnctx) != 1)
|
|
|
|
fatal("%s: EC_POINT_get_affine_coordinates_GFp", __func__);
|
|
|
|
fputs("x=", stderr);
|
|
|
|
BN_print_fp(stderr, x);
|
|
|
|
fputs("\ny=", stderr);
|
|
|
|
BN_print_fp(stderr, y);
|
|
|
|
fputs("\n", stderr);
|
|
|
|
BN_CTX_free(bnctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
key_dump_ec_key(const EC_KEY *key)
|
|
|
|
{
|
|
|
|
const BIGNUM *exponent;
|
|
|
|
|
|
|
|
key_dump_ec_point(EC_KEY_get0_group(key), EC_KEY_get0_public_key(key));
|
|
|
|
fputs("exponent=", stderr);
|
|
|
|
if ((exponent = EC_KEY_get0_private_key(key)) == NULL)
|
|
|
|
fputs("(NULL)", stderr);
|
|
|
|
else
|
|
|
|
BN_print_fp(stderr, EC_KEY_get0_private_key(key));
|
|
|
|
fputs("\n", stderr);
|
|
|
|
}
|
|
|
|
#endif /* defined(DEBUG_KEXECDH) || defined(DEBUG_PK) */
|
2010-09-10 03:39:26 +02:00
|
|
|
#endif /* OPENSSL_HAS_ECC */
|