[BACK]Return to hostfile.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/hostfile.c, Revision 1.6

1.1       deraadt     1: /*
                      2:
                      3: hostfile.c
                      4:
                      5: Author: Tatu Ylonen <ylo@cs.hut.fi>
                      6:
                      7: Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
                      8:                    All rights reserved
                      9:
                     10: Created: Thu Jun 29 07:10:56 1995 ylo
                     11:
                     12: Functions for manipulating the known hosts files.
                     13:
                     14: */
                     15:
                     16: #include "includes.h"
1.6     ! provos     17: RCSID("$Id: hostfile.c,v 1.5 1999/11/15 20:53:24 markus Exp $");
1.1       deraadt    18:
                     19: #include "packet.h"
                     20: #include "ssh.h"
                     21:
                     22: /* Reads a multiple-precision integer in hex from the buffer, and advances the
                     23:    pointer.  The integer must already be initialized.  This function is
                     24:    permitted to modify the buffer.  This leaves *cpp to point just beyond
                     25:    the last processed (and maybe modified) character.  Note that this may
                     26:    modify the buffer containing the number. */
                     27:
1.2       provos     28: int
                     29: auth_rsa_read_bignum(char **cpp, BIGNUM *value)
1.1       deraadt    30: {
                     31:   char *cp = *cpp;
                     32:   int len, old;
                     33:
                     34:   /* Skip any leading whitespace. */
                     35:   for (; *cp == ' ' || *cp == '\t'; cp++)
                     36:     ;
                     37:
                     38:   /* Check that it begins with a hex digit. */
                     39:   if (*cp < '0' || *cp > '9')
                     40:     return 0;
                     41:
                     42:   /* Save starting position. */
                     43:   *cpp = cp;
                     44:
                     45:   /* Move forward until all hex digits skipped. */
                     46:   for (; *cp >= '0' && *cp <= '9'; cp++)
                     47:     ;
                     48:
                     49:   /* Compute the length of the hex number. */
                     50:   len = cp - *cpp;
                     51:
                     52:   /* Save the old terminating character, and replace it by \0. */
                     53:   old = *cp;
                     54:   *cp = 0;
                     55:
1.2       provos     56:
1.1       deraadt    57:   /* Parse the number. */
1.2       provos     58:   if (BN_dec2bn(&value, *cpp) == 0)
1.1       deraadt    59:     return 0;
                     60:
                     61:   /* Restore old terminating character. */
                     62:   *cp = old;
                     63:
                     64:   /* Move beyond the number and return success. */
                     65:   *cpp = cp;
                     66:   return 1;
                     67: }
                     68:
                     69: /* Parses an RSA key (number of bits, e, n) from a string.  Moves the pointer
                     70:    over the key.  Skips any whitespace at the beginning and at end. */
                     71:
1.2       provos     72: int
                     73: auth_rsa_read_key(char **cpp, unsigned int *bitsp, BIGNUM *e, BIGNUM *n)
1.1       deraadt    74: {
                     75:   unsigned int bits;
                     76:   char *cp;
                     77:
                     78:   /* Skip leading whitespace. */
                     79:   for (cp = *cpp; *cp == ' ' || *cp == '\t'; cp++)
                     80:     ;
                     81:
                     82:   /* Get number of bits. */
                     83:   if (*cp < '0' || *cp > '9')
                     84:     return 0; /* Bad bit count... */
                     85:   for (bits = 0; *cp >= '0' && *cp <= '9'; cp++)
                     86:     bits = 10 * bits + *cp - '0';
                     87:
                     88:   /* Get public exponent. */
1.2       provos     89:   if (!auth_rsa_read_bignum(&cp, e))
1.1       deraadt    90:     return 0;
                     91:
                     92:   /* Get public modulus. */
1.2       provos     93:   if (!auth_rsa_read_bignum(&cp, n))
1.1       deraadt    94:     return 0;
                     95:
                     96:   /* Skip trailing whitespace. */
                     97:   for (; *cp == ' ' || *cp == '\t'; cp++)
                     98:     ;
                     99:
                    100:   /* Return results. */
                    101:   *cpp = cp;
                    102:   *bitsp = bits;
                    103:   return 1;
                    104: }
                    105:
                    106: /* Tries to match the host name (which must be in all lowercase) against the
                    107:    comma-separated sequence of subpatterns (each possibly preceded by ! to
                    108:    indicate negation).  Returns true if there is a positive match; zero
                    109:    otherwise. */
                    110:
1.2       provos    111: int
                    112: match_hostname(const char *host, const char *pattern, unsigned int len)
1.1       deraadt   113: {
                    114:   char sub[1024];
                    115:   int negated;
                    116:   int got_positive;
                    117:   unsigned int i, subi;
                    118:
                    119:   got_positive = 0;
                    120:   for (i = 0; i < len;)
                    121:     {
                    122:       /* Check if the subpattern is negated. */
                    123:       if (pattern[i] == '!')
                    124:        {
                    125:          negated = 1;
                    126:          i++;
                    127:        }
                    128:       else
                    129:        negated = 0;
                    130:
                    131:       /* Extract the subpattern up to a comma or end.  Convert the subpattern
                    132:          to lowercase. */
                    133:       for (subi = 0;
                    134:           i < len && subi < sizeof(sub) - 1 && pattern[i] != ',';
                    135:           subi++, i++)
                    136:        sub[subi] = isupper(pattern[i]) ? tolower(pattern[i]) : pattern[i];
                    137:       /* If subpattern too long, return failure (no match). */
                    138:       if (subi >= sizeof(sub) - 1)
                    139:        return 0;
                    140:
                    141:       /* If the subpattern was terminated by a comma, skip the comma. */
                    142:       if (i < len && pattern[i] == ',')
                    143:        i++;
                    144:
                    145:       /* Null-terminate the subpattern. */
                    146:       sub[subi] = '\0';
                    147:
                    148:       /* Try to match the subpattern against the host name. */
1.2       provos    149:       if (match_pattern(host, sub)) {
1.1       deraadt   150:        if (negated)
                    151:          return 0;  /* Fail if host matches any negated subpattern. */
                    152:         else
                    153:          got_positive = 1;
1.2       provos    154:       }
1.1       deraadt   155:     }
                    156:
                    157:   /* Return success if got a positive match.  If there was a negative match,
                    158:      we have already returned zero and never get here. */
                    159:   return got_positive;
                    160: }
                    161:
                    162: /* Checks whether the given host (which must be in all lowercase) is
                    163:    already in the list of our known hosts.
                    164:    Returns HOST_OK if the host is known and has the specified key,
                    165:    HOST_NEW if the host is not known, and HOST_CHANGED if the host is known
                    166:    but used to have a different host key. */
                    167:
1.2       provos    168: HostStatus
1.5       markus    169: check_host_in_hostfile(const char *filename, const char *host,
                    170:                       BIGNUM *e, BIGNUM *n, BIGNUM *ke, BIGNUM *kn)
1.1       deraadt   171: {
                    172:   FILE *f;
                    173:   char line[8192];
1.5       markus    174:   int linenum = 0;
                    175:   unsigned int bits, kbits, hostlen;
1.1       deraadt   176:   char *cp, *cp2;
                    177:   HostStatus end_return;
                    178:
                    179:   /* Open the file containing the list of known hosts. */
                    180:   f = fopen(filename, "r");
                    181:   if (!f)
1.5       markus    182:     return HOST_NEW;
1.1       deraadt   183:
                    184:   /* Cache the length of the host name. */
                    185:   hostlen = strlen(host);
                    186:
                    187:   /* Return value when the loop terminates.  This is set to HOST_CHANGED if
                    188:      we have seen a different key for the host and have not found the proper
                    189:      one. */
                    190:   end_return = HOST_NEW;
                    191:
1.5       markus    192:   /* size of modulus 'n' */
                    193:   bits = BN_num_bits(n);
                    194:
1.1       deraadt   195:   /* Go trough the file. */
                    196:   while (fgets(line, sizeof(line), f))
                    197:     {
                    198:       cp = line;
1.5       markus    199:       linenum++;
1.1       deraadt   200:
                    201:       /* Skip any leading whitespace. */
                    202:       for (; *cp == ' ' || *cp == '\t'; cp++)
                    203:        ;
                    204:
                    205:       /* Ignore comment lines and empty lines. */
                    206:       if (!*cp || *cp == '#' || *cp == '\n')
                    207:        continue;
                    208:
                    209:       /* Find the end of the host name portion. */
                    210:       for (cp2 = cp; *cp2 && *cp2 != ' ' && *cp2 != '\t'; cp2++)
                    211:        ;
                    212:
                    213:       /* Check if the host name matches. */
                    214:       if (!match_hostname(host, cp, (unsigned int)(cp2 - cp)))
                    215:        continue;
                    216:
                    217:       /* Got a match.  Skip host name. */
                    218:       cp = cp2;
                    219:
                    220:       /* Extract the key from the line.  This will skip any leading
                    221:         whitespace.  Ignore badly formatted lines. */
1.2       provos    222:       if (!auth_rsa_read_key(&cp, &kbits, ke, kn))
1.1       deraadt   223:        continue;
                    224:
1.5       markus    225:       if (kbits != BN_num_bits(kn)) {
                    226:         error("Warning: error in %s, line %d: keysize mismatch for host %s: "
                    227:              "actual size %d vs. announced %d.",
                    228:              filename, linenum, host, BN_num_bits(kn), kbits);
                    229:         error("Warning: replace %d with %d in %s, line %d.",
                    230:              kbits, BN_num_bits(kn), filename, linenum);
                    231:       }
                    232:
                    233:       /* Check if the current key is the same as the given key. */
1.6     ! provos    234:       if (BN_cmp(ke, e) == 0 && BN_cmp(kn, n) == 0)
1.1       deraadt   235:        {
                    236:          /* Ok, they match. */
                    237:          fclose(f);
                    238:          return HOST_OK;
                    239:        }
                    240:
                    241:       /* They do not match.  We will continue to go through the file; however,
                    242:         we note that we will not return that it is new. */
                    243:       end_return = HOST_CHANGED;
                    244:     }
                    245:   /* Clear variables and close the file. */
                    246:   fclose(f);
                    247:
                    248:   /* Return either HOST_NEW or HOST_CHANGED, depending on whether we saw a
                    249:      different key for the host. */
                    250:   return end_return;
                    251: }
                    252:
                    253: /* Appends an entry to the host file.  Returns false if the entry
                    254:    could not be appended. */
                    255:
1.2       provos    256: int
                    257: add_host_to_hostfile(const char *filename, const char *host,
1.5       markus    258:                     BIGNUM *e, BIGNUM *n)
1.1       deraadt   259: {
                    260:   FILE *f;
1.2       provos    261:   char *buf;
1.5       markus    262:   unsigned int bits;
1.1       deraadt   263:
                    264:   /* Open the file for appending. */
                    265:   f = fopen(filename, "a");
                    266:   if (!f)
                    267:     return 0;
                    268:
1.5       markus    269:   /* size of modulus 'n' */
                    270:   bits = BN_num_bits(n);
                    271:
1.1       deraadt   272:   /* Print the host name and key to the file. */
                    273:   fprintf(f, "%s %u ", host, bits);
1.2       provos    274:   buf = BN_bn2dec(e);
1.4       markus    275:   if (buf == NULL) {
1.5       markus    276:     error("add_host_to_hostfile: BN_bn2dec(e) failed");
1.4       markus    277:     fclose(f);
                    278:     return 0;
                    279:   }
1.2       provos    280:   fprintf(f, "%s ", buf);
                    281:   free (buf);
                    282:   buf = BN_bn2dec(n);
1.4       markus    283:   if (buf == NULL) {
1.5       markus    284:     error("add_host_to_hostfile: BN_bn2dec(n) failed");
1.4       markus    285:     fclose(f);
                    286:     return 0;
                    287:   }
1.2       provos    288:   fprintf(f, "%s\n", buf);
                    289:   free (buf);
1.1       deraadt   290:
                    291:   /* Close the file. */
                    292:   fclose(f);
                    293:   return 1;
                    294: }