version 1.20.2.7, 2002/03/08 17:04:42 |
version 1.21, 2000/11/12 19:50:37 |
|
|
#include "includes.h" |
#include "includes.h" |
RCSID("$OpenBSD$"); |
RCSID("$OpenBSD$"); |
|
|
|
#include <openssl/bn.h> |
|
#include <openssl/dsa.h> |
|
#include <openssl/rsa.h> |
#include <openssl/err.h> |
#include <openssl/err.h> |
#include <openssl/evp.h> |
|
#include <openssl/pem.h> |
#include <openssl/pem.h> |
|
#include <openssl/evp.h> |
|
|
#include "cipher.h" |
|
#include "xmalloc.h" |
#include "xmalloc.h" |
#include "buffer.h" |
#include "buffer.h" |
#include "bufaux.h" |
#include "bufaux.h" |
#include "key.h" |
|
#include "ssh.h" |
#include "ssh.h" |
#include "log.h" |
#include "key.h" |
#include "authfile.h" |
|
#include "rsa.h" |
|
|
|
/* Version identification string for SSH v1 identity files. */ |
/* Version identification string for identity files. */ |
static const char authfile_id_string[] = |
#define AUTHFILE_ID_STRING "SSH PRIVATE KEY FILE FORMAT 1.1\n" |
"SSH PRIVATE KEY FILE FORMAT 1.1\n"; |
|
|
|
/* |
/* |
* Saves the authentication (private) key in a file, encrypting it with |
* Saves the authentication (private) key in a file, encrypting it with |
|
|
* passphrase. |
* passphrase. |
*/ |
*/ |
|
|
static int |
int |
key_save_private_rsa1(Key *key, const char *filename, const char *passphrase, |
save_private_key_rsa1(const char *filename, const char *passphrase, |
const char *comment) |
RSA *key, const char *comment) |
{ |
{ |
Buffer buffer, encrypted; |
Buffer buffer, encrypted; |
u_char buf[100], *cp; |
char buf[100], *cp; |
int fd, i, cipher_num; |
int fd, i; |
CipherContext ciphercontext; |
CipherContext ciphercontext; |
Cipher *cipher; |
Cipher *cipher; |
u_int32_t rand; |
u_int32_t rand; |
|
|
* If the passphrase is empty, use SSH_CIPHER_NONE to ease converting |
* If the passphrase is empty, use SSH_CIPHER_NONE to ease converting |
* to another cipher; otherwise use SSH_AUTHFILE_CIPHER. |
* to another cipher; otherwise use SSH_AUTHFILE_CIPHER. |
*/ |
*/ |
cipher_num = (strcmp(passphrase, "") == 0) ? |
if (strcmp(passphrase, "") == 0) |
SSH_CIPHER_NONE : SSH_AUTHFILE_CIPHER; |
cipher = cipher_by_number(SSH_CIPHER_NONE); |
if ((cipher = cipher_by_number(cipher_num)) == NULL) |
else |
|
cipher = cipher_by_number(SSH_AUTHFILE_CIPHER); |
|
if (cipher == NULL) |
fatal("save_private_key_rsa: bad cipher"); |
fatal("save_private_key_rsa: bad cipher"); |
|
|
/* This buffer is used to built the secret part of the private key. */ |
/* This buffer is used to built the secret part of the private key. */ |
|
|
* will be stored in plain text, and storing them also in encrypted |
* will be stored in plain text, and storing them also in encrypted |
* format would just give known plaintext). |
* format would just give known plaintext). |
*/ |
*/ |
buffer_put_bignum(&buffer, key->rsa->d); |
buffer_put_bignum(&buffer, key->d); |
buffer_put_bignum(&buffer, key->rsa->iqmp); |
buffer_put_bignum(&buffer, key->iqmp); |
buffer_put_bignum(&buffer, key->rsa->q); /* reverse from SSL p */ |
buffer_put_bignum(&buffer, key->q); /* reverse from SSL p */ |
buffer_put_bignum(&buffer, key->rsa->p); /* reverse from SSL q */ |
buffer_put_bignum(&buffer, key->p); /* reverse from SSL q */ |
|
|
/* Pad the part to be encrypted until its size is a multiple of 8. */ |
/* Pad the part to be encrypted until its size is a multiple of 8. */ |
while (buffer_len(&buffer) % 8 != 0) |
while (buffer_len(&buffer) % 8 != 0) |
|
|
buffer_init(&encrypted); |
buffer_init(&encrypted); |
|
|
/* First store keyfile id string. */ |
/* First store keyfile id string. */ |
for (i = 0; authfile_id_string[i]; i++) |
cp = AUTHFILE_ID_STRING; |
buffer_put_char(&encrypted, authfile_id_string[i]); |
for (i = 0; cp[i]; i++) |
|
buffer_put_char(&encrypted, cp[i]); |
buffer_put_char(&encrypted, 0); |
buffer_put_char(&encrypted, 0); |
|
|
/* Store cipher type. */ |
/* Store cipher type. */ |
buffer_put_char(&encrypted, cipher_num); |
buffer_put_char(&encrypted, cipher->number); |
buffer_put_int(&encrypted, 0); /* For future extension */ |
buffer_put_int(&encrypted, 0); /* For future extension */ |
|
|
/* Store public key. This will be in plain text. */ |
/* Store public key. This will be in plain text. */ |
buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); |
buffer_put_int(&encrypted, BN_num_bits(key->n)); |
buffer_put_bignum(&encrypted, key->rsa->n); |
buffer_put_bignum(&encrypted, key->n); |
buffer_put_bignum(&encrypted, key->rsa->e); |
buffer_put_bignum(&encrypted, key->e); |
buffer_put_cstring(&encrypted, comment); |
buffer_put_string(&encrypted, comment, strlen(comment)); |
|
|
/* Allocate space for the private part of the key in the buffer. */ |
/* Allocate space for the private part of the key in the buffer. */ |
cp = buffer_append_space(&encrypted, buffer_len(&buffer)); |
buffer_append_space(&encrypted, &cp, buffer_len(&buffer)); |
|
|
cipher_set_key_string(&ciphercontext, cipher, passphrase, |
cipher_set_key_string(&ciphercontext, cipher, passphrase); |
CIPHER_ENCRYPT); |
cipher_encrypt(&ciphercontext, (unsigned char *) cp, |
cipher_crypt(&ciphercontext, cp, |
(unsigned char *) buffer_ptr(&buffer), buffer_len(&buffer)); |
buffer_ptr(&buffer), buffer_len(&buffer)); |
|
cipher_cleanup(&ciphercontext); |
|
memset(&ciphercontext, 0, sizeof(ciphercontext)); |
memset(&ciphercontext, 0, sizeof(ciphercontext)); |
|
|
/* Destroy temporary data. */ |
/* Destroy temporary data. */ |
|
|
buffer_free(&buffer); |
buffer_free(&buffer); |
|
|
fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0600); |
fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0600); |
if (fd < 0) { |
if (fd < 0) |
error("open %s failed: %s.", filename, strerror(errno)); |
|
return 0; |
return 0; |
} |
|
if (write(fd, buffer_ptr(&encrypted), buffer_len(&encrypted)) != |
if (write(fd, buffer_ptr(&encrypted), buffer_len(&encrypted)) != |
buffer_len(&encrypted)) { |
buffer_len(&encrypted)) { |
error("write to key file %s failed: %s", filename, |
debug("Write to key file %.200s failed: %.100s", filename, |
strerror(errno)); |
strerror(errno)); |
buffer_free(&encrypted); |
buffer_free(&encrypted); |
close(fd); |
close(fd); |
unlink(filename); |
remove(filename); |
return 0; |
return 0; |
} |
} |
close(fd); |
close(fd); |
|
|
return 1; |
return 1; |
} |
} |
|
|
/* save SSH v2 key in OpenSSL PEM format */ |
/* save SSH2 key in OpenSSL PEM format */ |
static int |
int |
key_save_private_pem(Key *key, const char *filename, const char *_passphrase, |
save_private_key_ssh2(const char *filename, const char *_passphrase, |
const char *comment) |
Key *key, const char *comment) |
{ |
{ |
FILE *fp; |
FILE *fp; |
int fd; |
int fd; |
int success = 0; |
int success = 0; |
int len = strlen(_passphrase); |
int len = strlen(_passphrase); |
u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; |
char *passphrase = (len > 0) ? (char *)_passphrase : NULL; |
const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; |
EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; |
|
|
if (len > 0 && len <= 4) { |
if (len > 0 && len <= 4) { |
error("passphrase too short: have %d bytes, need > 4", len); |
error("passphrase too short: %d bytes", len); |
|
errno = 0; |
return 0; |
return 0; |
} |
} |
fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0600); |
fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0600); |
if (fd < 0) { |
if (fd < 0) { |
error("open %s failed: %s.", filename, strerror(errno)); |
debug("open %s failed", filename); |
return 0; |
return 0; |
} |
} |
fp = fdopen(fd, "w"); |
fp = fdopen(fd, "w"); |
if (fp == NULL ) { |
if (fp == NULL ) { |
error("fdopen %s failed: %s.", filename, strerror(errno)); |
debug("fdopen %s failed", filename); |
close(fd); |
close(fd); |
return 0; |
return 0; |
} |
} |
switch (key->type) { |
switch (key->type) { |
case KEY_DSA: |
case KEY_DSA: |
success = PEM_write_DSAPrivateKey(fp, key->dsa, |
success = PEM_write_DSAPrivateKey(fp, key->dsa, |
cipher, passphrase, len, NULL, NULL); |
cipher, passphrase, len, NULL, NULL); |
break; |
break; |
case KEY_RSA: |
case KEY_RSA: |
success = PEM_write_RSAPrivateKey(fp, key->rsa, |
success = PEM_write_RSAPrivateKey(fp, key->rsa, |
cipher, passphrase, len, NULL, NULL); |
cipher, passphrase, len, NULL, NULL); |
break; |
break; |
} |
} |
fclose(fp); |
fclose(fp); |
return success; |
return success; |
} |
} |
|
|
int |
int |
key_save_private(Key *key, const char *filename, const char *passphrase, |
save_private_key(const char *filename, const char *passphrase, Key *key, |
const char *comment) |
const char *comment) |
{ |
{ |
switch (key->type) { |
switch (key->type) { |
case KEY_RSA1: |
case KEY_RSA1: |
return key_save_private_rsa1(key, filename, passphrase, |
return save_private_key_rsa1(filename, passphrase, key->rsa, comment); |
comment); |
|
break; |
break; |
case KEY_DSA: |
case KEY_DSA: |
case KEY_RSA: |
case KEY_RSA: |
return key_save_private_pem(key, filename, passphrase, |
return save_private_key_ssh2(filename, passphrase, key, comment); |
comment); |
|
break; |
break; |
default: |
default: |
break; |
break; |
} |
} |
error("key_save_private: cannot save key type %d", key->type); |
|
return 0; |
return 0; |
} |
} |
|
|
/* |
/* |
* Loads the public part of the ssh v1 key file. Returns NULL if an error was |
* Loads the public part of the key file. Returns 0 if an error was |
* encountered (the file does not exist or is not readable), and the key |
* encountered (the file does not exist or is not readable), and non-zero |
* otherwise. |
* otherwise. |
*/ |
*/ |
|
|
static Key * |
int |
key_load_public_rsa1(int fd, const char *filename, char **commentp) |
load_public_key_rsa(const char *filename, RSA * pub, char **comment_return) |
{ |
{ |
|
int fd, i; |
|
off_t len; |
Buffer buffer; |
Buffer buffer; |
Key *pub; |
|
char *cp; |
char *cp; |
int i; |
|
off_t len; |
|
|
|
|
fd = open(filename, O_RDONLY); |
|
if (fd < 0) |
|
return 0; |
len = lseek(fd, (off_t) 0, SEEK_END); |
len = lseek(fd, (off_t) 0, SEEK_END); |
lseek(fd, (off_t) 0, SEEK_SET); |
lseek(fd, (off_t) 0, SEEK_SET); |
|
|
buffer_init(&buffer); |
buffer_init(&buffer); |
cp = buffer_append_space(&buffer, len); |
buffer_append_space(&buffer, &cp, len); |
|
|
if (read(fd, cp, (size_t) len) != (size_t) len) { |
if (read(fd, cp, (size_t) len) != (size_t) len) { |
debug("Read from key file %.200s failed: %.100s", filename, |
debug("Read from key file %.200s failed: %.100s", filename, |
strerror(errno)); |
strerror(errno)); |
buffer_free(&buffer); |
buffer_free(&buffer); |
return NULL; |
close(fd); |
|
return 0; |
} |
} |
|
close(fd); |
|
|
/* Check that it is at least big enough to contain the ID string. */ |
/* Check that it is at least big enought to contain the ID string. */ |
if (len < sizeof(authfile_id_string)) { |
if (len < strlen(AUTHFILE_ID_STRING) + 1) { |
debug3("Not a RSA1 key file %.200s.", filename); |
debug3("Bad RSA1 key file %.200s.", filename); |
buffer_free(&buffer); |
buffer_free(&buffer); |
return NULL; |
return 0; |
} |
} |
/* |
/* |
* Make sure it begins with the id string. Consume the id string |
* Make sure it begins with the id string. Consume the id string |
* from the buffer. |
* from the buffer. |
*/ |
*/ |
for (i = 0; i < sizeof(authfile_id_string); i++) |
for (i = 0; i < (unsigned int) strlen(AUTHFILE_ID_STRING) + 1; i++) |
if (buffer_get_char(&buffer) != authfile_id_string[i]) { |
if (buffer_get_char(&buffer) != (u_char) AUTHFILE_ID_STRING[i]) { |
debug3("Not a RSA1 key file %.200s.", filename); |
debug3("Bad RSA1 key file %.200s.", filename); |
buffer_free(&buffer); |
buffer_free(&buffer); |
return NULL; |
return 0; |
} |
} |
/* Skip cipher type and reserved data. */ |
/* Skip cipher type and reserved data. */ |
(void) buffer_get_char(&buffer); /* cipher type */ |
(void) buffer_get_char(&buffer); /* cipher type */ |
|
|
|
|
/* Read the public key from the buffer. */ |
/* Read the public key from the buffer. */ |
buffer_get_int(&buffer); |
buffer_get_int(&buffer); |
pub = key_new(KEY_RSA1); |
/* XXX alloc */ |
buffer_get_bignum(&buffer, pub->rsa->n); |
if (pub->n == NULL) |
buffer_get_bignum(&buffer, pub->rsa->e); |
pub->n = BN_new(); |
if (commentp) |
buffer_get_bignum(&buffer, pub->n); |
*commentp = buffer_get_string(&buffer, NULL); |
/* XXX alloc */ |
|
if (pub->e == NULL) |
|
pub->e = BN_new(); |
|
buffer_get_bignum(&buffer, pub->e); |
|
if (comment_return) |
|
*comment_return = buffer_get_string(&buffer, NULL); |
/* The encrypted private part is not parsed by this function. */ |
/* The encrypted private part is not parsed by this function. */ |
|
|
buffer_free(&buffer); |
buffer_free(&buffer); |
return pub; |
|
|
return 1; |
} |
} |
|
|
/* load public key from private-key file, works only for SSH v1 */ |
/* load public key from private-key file */ |
Key * |
int |
key_load_public_type(int type, const char *filename, char **commentp) |
load_public_key(const char *filename, Key * key, char **comment_return) |
{ |
{ |
Key *pub; |
switch (key->type) { |
int fd; |
case KEY_RSA1: |
|
return load_public_key_rsa(filename, key->rsa, comment_return); |
if (type == KEY_RSA1) { |
break; |
fd = open(filename, O_RDONLY); |
case KEY_DSA: |
if (fd < 0) |
case KEY_RSA: |
return NULL; |
default: |
pub = key_load_public_rsa1(fd, filename, commentp); |
break; |
close(fd); |
|
return pub; |
|
} |
} |
return NULL; |
return 0; |
} |
} |
|
|
/* |
/* |
|
|
* Assumes we are called under uid of the owner of the file. |
* Assumes we are called under uid of the owner of the file. |
*/ |
*/ |
|
|
static Key * |
int |
key_load_private_rsa1(int fd, const char *filename, const char *passphrase, |
load_private_key_rsa1(int fd, const char *filename, |
char **commentp) |
const char *passphrase, RSA * prv, char **comment_return) |
{ |
{ |
int i, check1, check2, cipher_type; |
int i, check1, check2, cipher_type; |
off_t len; |
off_t len; |
Buffer buffer, decrypted; |
Buffer buffer, decrypted; |
u_char *cp; |
char *cp; |
CipherContext ciphercontext; |
CipherContext ciphercontext; |
Cipher *cipher; |
Cipher *cipher; |
Key *prv = NULL; |
BN_CTX *ctx; |
|
BIGNUM *aux; |
|
|
len = lseek(fd, (off_t) 0, SEEK_END); |
len = lseek(fd, (off_t) 0, SEEK_END); |
lseek(fd, (off_t) 0, SEEK_SET); |
lseek(fd, (off_t) 0, SEEK_SET); |
|
|
buffer_init(&buffer); |
buffer_init(&buffer); |
cp = buffer_append_space(&buffer, len); |
buffer_append_space(&buffer, &cp, len); |
|
|
if (read(fd, cp, (size_t) len) != (size_t) len) { |
if (read(fd, cp, (size_t) len) != (size_t) len) { |
debug("Read from key file %.200s failed: %.100s", filename, |
debug("Read from key file %.200s failed: %.100s", filename, |
strerror(errno)); |
strerror(errno)); |
buffer_free(&buffer); |
buffer_free(&buffer); |
close(fd); |
close(fd); |
return NULL; |
return 0; |
} |
} |
|
close(fd); |
|
|
/* Check that it is at least big enough to contain the ID string. */ |
/* Check that it is at least big enought to contain the ID string. */ |
if (len < sizeof(authfile_id_string)) { |
if (len < strlen(AUTHFILE_ID_STRING) + 1) { |
debug3("Not a RSA1 key file %.200s.", filename); |
debug3("Bad RSA1 key file %.200s.", filename); |
buffer_free(&buffer); |
buffer_free(&buffer); |
close(fd); |
return 0; |
return NULL; |
|
} |
} |
/* |
/* |
* Make sure it begins with the id string. Consume the id string |
* Make sure it begins with the id string. Consume the id string |
* from the buffer. |
* from the buffer. |
*/ |
*/ |
for (i = 0; i < sizeof(authfile_id_string); i++) |
for (i = 0; i < (unsigned int) strlen(AUTHFILE_ID_STRING) + 1; i++) |
if (buffer_get_char(&buffer) != authfile_id_string[i]) { |
if (buffer_get_char(&buffer) != (u_char) AUTHFILE_ID_STRING[i]) { |
debug3("Not a RSA1 key file %.200s.", filename); |
debug3("Bad RSA1 key file %.200s.", filename); |
buffer_free(&buffer); |
buffer_free(&buffer); |
close(fd); |
return 0; |
return NULL; |
|
} |
} |
|
|
/* Read cipher type. */ |
/* Read cipher type. */ |
cipher_type = buffer_get_char(&buffer); |
cipher_type = buffer_get_char(&buffer); |
(void) buffer_get_int(&buffer); /* Reserved data. */ |
(void) buffer_get_int(&buffer); /* Reserved data. */ |
|
|
/* Read the public key from the buffer. */ |
/* Read the public key from the buffer. */ |
buffer_get_int(&buffer); |
buffer_get_int(&buffer); |
prv = key_new_private(KEY_RSA1); |
prv->n = BN_new(); |
|
buffer_get_bignum(&buffer, prv->n); |
buffer_get_bignum(&buffer, prv->rsa->n); |
prv->e = BN_new(); |
buffer_get_bignum(&buffer, prv->rsa->e); |
buffer_get_bignum(&buffer, prv->e); |
if (commentp) |
if (comment_return) |
*commentp = buffer_get_string(&buffer, NULL); |
*comment_return = buffer_get_string(&buffer, NULL); |
else |
else |
xfree(buffer_get_string(&buffer, NULL)); |
xfree(buffer_get_string(&buffer, NULL)); |
|
|
|
|
} |
} |
/* Initialize space for decrypted data. */ |
/* Initialize space for decrypted data. */ |
buffer_init(&decrypted); |
buffer_init(&decrypted); |
cp = buffer_append_space(&decrypted, buffer_len(&buffer)); |
buffer_append_space(&decrypted, &cp, buffer_len(&buffer)); |
|
|
/* Rest of the buffer is encrypted. Decrypt it using the passphrase. */ |
/* Rest of the buffer is encrypted. Decrypt it using the passphrase. */ |
cipher_set_key_string(&ciphercontext, cipher, passphrase, |
cipher_set_key_string(&ciphercontext, cipher, passphrase); |
CIPHER_DECRYPT); |
cipher_decrypt(&ciphercontext, (unsigned char *) cp, |
cipher_crypt(&ciphercontext, cp, |
(unsigned char *) buffer_ptr(&buffer), buffer_len(&buffer)); |
buffer_ptr(&buffer), buffer_len(&buffer)); |
|
cipher_cleanup(&ciphercontext); |
|
memset(&ciphercontext, 0, sizeof(ciphercontext)); |
memset(&ciphercontext, 0, sizeof(ciphercontext)); |
buffer_free(&buffer); |
buffer_free(&buffer); |
|
|
|
|
if (check1 != buffer_get_char(&decrypted) || |
if (check1 != buffer_get_char(&decrypted) || |
check2 != buffer_get_char(&decrypted)) { |
check2 != buffer_get_char(&decrypted)) { |
if (strcmp(passphrase, "") != 0) |
if (strcmp(passphrase, "") != 0) |
debug("Bad passphrase supplied for key file %.200s.", |
debug("Bad passphrase supplied for key file %.200s.", filename); |
filename); |
|
/* Bad passphrase. */ |
/* Bad passphrase. */ |
buffer_free(&decrypted); |
buffer_free(&decrypted); |
goto fail; |
fail: |
|
BN_clear_free(prv->n); |
|
prv->n = NULL; |
|
BN_clear_free(prv->e); |
|
prv->e = NULL; |
|
if (comment_return) |
|
xfree(*comment_return); |
|
return 0; |
} |
} |
/* Read the rest of the private key. */ |
/* Read the rest of the private key. */ |
buffer_get_bignum(&decrypted, prv->rsa->d); |
prv->d = BN_new(); |
buffer_get_bignum(&decrypted, prv->rsa->iqmp); /* u */ |
buffer_get_bignum(&decrypted, prv->d); |
/* in SSL and SSH v1 p and q are exchanged */ |
prv->iqmp = BN_new(); |
buffer_get_bignum(&decrypted, prv->rsa->q); /* p */ |
buffer_get_bignum(&decrypted, prv->iqmp); /* u */ |
buffer_get_bignum(&decrypted, prv->rsa->p); /* q */ |
/* in SSL and SSH p and q are exchanged */ |
|
prv->q = BN_new(); |
|
buffer_get_bignum(&decrypted, prv->q); /* p */ |
|
prv->p = BN_new(); |
|
buffer_get_bignum(&decrypted, prv->p); /* q */ |
|
|
/* calculate p-1 and q-1 */ |
ctx = BN_CTX_new(); |
rsa_generate_additional_parameters(prv->rsa); |
aux = BN_new(); |
|
|
|
BN_sub(aux, prv->q, BN_value_one()); |
|
prv->dmq1 = BN_new(); |
|
BN_mod(prv->dmq1, prv->d, aux, ctx); |
|
|
|
BN_sub(aux, prv->p, BN_value_one()); |
|
prv->dmp1 = BN_new(); |
|
BN_mod(prv->dmp1, prv->d, aux, ctx); |
|
|
|
BN_clear_free(aux); |
|
BN_CTX_free(ctx); |
|
|
buffer_free(&decrypted); |
buffer_free(&decrypted); |
close(fd); |
|
return prv; |
|
|
|
fail: |
return 1; |
if (commentp) |
|
xfree(*commentp); |
|
close(fd); |
|
key_free(prv); |
|
return NULL; |
|
} |
} |
|
|
static Key * |
int |
key_load_private_pem(int fd, int type, const char *passphrase, |
load_private_key_ssh2(int fd, const char *passphrase, Key *k, char **comment_return) |
char **commentp) |
|
{ |
{ |
FILE *fp; |
FILE *fp; |
|
int success = 0; |
EVP_PKEY *pk = NULL; |
EVP_PKEY *pk = NULL; |
Key *prv = NULL; |
|
char *name = "<no key>"; |
char *name = "<no key>"; |
|
|
fp = fdopen(fd, "r"); |
fp = fdopen(fd, "r"); |
if (fp == NULL) { |
if (fp == NULL) { |
error("fdopen failed: %s", strerror(errno)); |
error("fdopen failed"); |
close(fd); |
return 0; |
return NULL; |
|
} |
} |
pk = PEM_read_PrivateKey(fp, NULL, NULL, (char *)passphrase); |
pk = PEM_read_PrivateKey(fp, NULL, NULL, (char *)passphrase); |
if (pk == NULL) { |
if (pk == NULL) { |
debug("PEM_read_PrivateKey failed"); |
debug("PEM_read_PrivateKey failed"); |
(void)ERR_get_error(); |
(void)ERR_get_error(); |
} else if (pk->type == EVP_PKEY_RSA && |
} else if (pk->type == EVP_PKEY_RSA) { |
(type == KEY_UNSPEC||type==KEY_RSA)) { |
/* replace k->rsa with loaded key */ |
prv = key_new(KEY_UNSPEC); |
if (k->type == KEY_RSA || k->type == KEY_UNSPEC) { |
prv->rsa = EVP_PKEY_get1_RSA(pk); |
if (k->rsa != NULL) |
prv->type = KEY_RSA; |
RSA_free(k->rsa); |
name = "rsa w/o comment"; |
k->rsa = EVP_PKEY_get1_RSA(pk); |
|
k->type = KEY_RSA; |
|
name = "rsa w/o comment"; |
|
success = 1; |
#ifdef DEBUG_PK |
#ifdef DEBUG_PK |
RSA_print_fp(stderr, prv->rsa, 8); |
RSA_print_fp(stderr, k->rsa, 8); |
#endif |
#endif |
} else if (pk->type == EVP_PKEY_DSA && |
} |
(type == KEY_UNSPEC||type==KEY_DSA)) { |
} else if (pk->type == EVP_PKEY_DSA) { |
prv = key_new(KEY_UNSPEC); |
/* replace k->dsa with loaded key */ |
prv->dsa = EVP_PKEY_get1_DSA(pk); |
if (k->type == KEY_DSA || k->type == KEY_UNSPEC) { |
prv->type = KEY_DSA; |
if (k->dsa != NULL) |
name = "dsa w/o comment"; |
DSA_free(k->dsa); |
|
k->dsa = EVP_PKEY_get1_DSA(pk); |
|
k->type = KEY_DSA; |
|
name = "dsa w/o comment"; |
#ifdef DEBUG_PK |
#ifdef DEBUG_PK |
DSA_print_fp(stderr, prv->dsa, 8); |
DSA_print_fp(stderr, k->dsa, 8); |
#endif |
#endif |
|
success = 1; |
|
} |
} else { |
} else { |
error("PEM_read_PrivateKey: mismatch or " |
error("PEM_read_PrivateKey: mismatch or " |
"unknown EVP_PKEY save_type %d", pk->save_type); |
"unknown EVP_PKEY save_type %d", pk->save_type); |
|
|
fclose(fp); |
fclose(fp); |
if (pk != NULL) |
if (pk != NULL) |
EVP_PKEY_free(pk); |
EVP_PKEY_free(pk); |
if (prv != NULL && commentp) |
if (success && comment_return) |
*commentp = xstrdup(name); |
*comment_return = xstrdup(name); |
debug("read PEM private key done: type %s", |
debug("read SSH2 private key done: name %s success %d", name, success); |
prv ? key_type(prv) : "<unknown>"); |
return success; |
return prv; |
|
} |
} |
|
|
static int |
int |
key_perm_ok(int fd, const char *filename) |
load_private_key(const char *filename, const char *passphrase, Key *key, |
|
char **comment_return) |
{ |
{ |
|
int fd; |
|
int ret = 0; |
struct stat st; |
struct stat st; |
|
|
if (fstat(fd, &st) < 0) |
fd = open(filename, O_RDONLY); |
|
if (fd < 0) |
return 0; |
return 0; |
/* |
|
* if a key owned by the user is accessed, then we check the |
/* check owner and modes */ |
* permissions of the file. if the key owned by a different user, |
if (fstat(fd, &st) < 0 || |
* then we don't care. |
(st.st_uid != 0 && st.st_uid != getuid()) || |
*/ |
(st.st_mode & 077) != 0) { |
if ((st.st_uid == getuid()) && (st.st_mode & 077) != 0) { |
close(fd); |
error("@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"); |
error("@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"); |
error("@ WARNING: UNPROTECTED PRIVATE KEY FILE! @"); |
error("@ WARNING: UNPROTECTED PRIVATE KEY FILE! @"); |
error("@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"); |
error("@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"); |
error("Permissions 0%3.3o for '%s' are too open.", |
error("Bad ownership or mode(0%3.3o) for '%s'.", |
st.st_mode & 0777, filename); |
st.st_mode & 0777, filename); |
error("It is recommended that your private key files are NOT accessible by others."); |
error("It is recommended that your private key files are NOT accessible by others."); |
error("This private key will be ignored."); |
|
return 0; |
return 0; |
} |
} |
return 1; |
switch (key->type) { |
} |
|
|
|
Key * |
|
key_load_private_type(int type, const char *filename, const char *passphrase, |
|
char **commentp) |
|
{ |
|
int fd; |
|
|
|
fd = open(filename, O_RDONLY); |
|
if (fd < 0) |
|
return NULL; |
|
if (!key_perm_ok(fd, filename)) { |
|
error("bad permissions: ignore key: %s", filename); |
|
close(fd); |
|
return NULL; |
|
} |
|
switch (type) { |
|
case KEY_RSA1: |
case KEY_RSA1: |
return key_load_private_rsa1(fd, filename, passphrase, |
if (key->rsa->e != NULL) { |
commentp); |
BN_clear_free(key->rsa->e); |
/* closes fd */ |
key->rsa->e = NULL; |
|
} |
|
if (key->rsa->n != NULL) { |
|
BN_clear_free(key->rsa->n); |
|
key->rsa->n = NULL; |
|
} |
|
ret = load_private_key_rsa1(fd, filename, passphrase, |
|
key->rsa, comment_return); |
break; |
break; |
case KEY_DSA: |
case KEY_DSA: |
case KEY_RSA: |
case KEY_RSA: |
case KEY_UNSPEC: |
case KEY_UNSPEC: |
return key_load_private_pem(fd, type, passphrase, commentp); |
ret = load_private_key_ssh2(fd, passphrase, key, comment_return); |
/* closes fd */ |
|
break; |
|
default: |
default: |
close(fd); |
|
break; |
break; |
} |
} |
return NULL; |
close(fd); |
|
return ret; |
} |
} |
|
|
Key * |
int |
key_load_private(const char *filename, const char *passphrase, |
do_load_public_key(const char *filename, Key *k, char **commentp) |
char **commentp) |
|
{ |
{ |
Key *pub, *prv; |
|
int fd; |
|
|
|
fd = open(filename, O_RDONLY); |
|
if (fd < 0) |
|
return NULL; |
|
if (!key_perm_ok(fd, filename)) { |
|
error("bad permissions: ignore key: %s", filename); |
|
close(fd); |
|
return NULL; |
|
} |
|
pub = key_load_public_rsa1(fd, filename, commentp); |
|
lseek(fd, (off_t) 0, SEEK_SET); /* rewind */ |
|
if (pub == NULL) { |
|
/* closes fd */ |
|
prv = key_load_private_pem(fd, KEY_UNSPEC, passphrase, NULL); |
|
/* use the filename as a comment for PEM */ |
|
if (commentp && prv) |
|
*commentp = xstrdup(filename); |
|
} else { |
|
/* it's a SSH v1 key if the public key part is readable */ |
|
key_free(pub); |
|
/* closes fd */ |
|
prv = key_load_private_rsa1(fd, filename, passphrase, NULL); |
|
} |
|
return prv; |
|
} |
|
|
|
static int |
|
key_try_load_public(Key *k, const char *filename, char **commentp) |
|
{ |
|
FILE *f; |
FILE *f; |
char line[4096]; |
char line[1024]; |
char *cp; |
char *cp; |
|
|
f = fopen(filename, "r"); |
f = fopen(filename, "r"); |
|
|
while (fgets(line, sizeof(line), f)) { |
while (fgets(line, sizeof(line), f)) { |
line[sizeof(line)-1] = '\0'; |
line[sizeof(line)-1] = '\0'; |
cp = line; |
cp = line; |
switch (*cp) { |
switch(*cp){ |
case '#': |
case '#': |
case '\n': |
case '\n': |
case '\0': |
case '\0': |
|
|
return 0; |
return 0; |
} |
} |
|
|
/* load public key from ssh v1 private or any pubkey file */ |
/* load public key from pubkey file */ |
Key * |
int |
key_load_public(const char *filename, char **commentp) |
try_load_public_key(const char *filename, Key *k, char **commentp) |
{ |
{ |
Key *pub; |
char pub[MAXPATHLEN]; |
char file[MAXPATHLEN]; |
|
|
|
pub = key_load_public_type(KEY_RSA1, filename, commentp); |
if (do_load_public_key(filename, k, commentp) == 1) |
if (pub != NULL) |
return 1; |
return pub; |
if (strlcpy(pub, filename, sizeof pub) >= MAXPATHLEN) |
pub = key_new(KEY_UNSPEC); |
return 0; |
if (key_try_load_public(pub, filename, commentp) == 1) |
if (strlcat(pub, ".pub", sizeof pub) >= MAXPATHLEN) |
return pub; |
return 0; |
if ((strlcpy(file, filename, sizeof file) < sizeof(file)) && |
if (do_load_public_key(pub, k, commentp) == 1) |
(strlcat(file, ".pub", sizeof file) < sizeof(file)) && |
return 1; |
(key_try_load_public(pub, file, commentp) == 1)) |
return 0; |
return pub; |
|
key_free(pub); |
|
return NULL; |
|
} |
} |