version 1.60, 2004/06/21 17:36:31 |
version 1.60.4.1, 2005/09/04 18:40:02 |
|
|
static void |
static void |
kex_prop2buf(Buffer *b, char *proposal[PROPOSAL_MAX]) |
kex_prop2buf(Buffer *b, char *proposal[PROPOSAL_MAX]) |
{ |
{ |
int i; |
u_int i; |
|
|
buffer_clear(b); |
buffer_clear(b); |
/* |
/* |
|
|
static void |
static void |
kex_prop_free(char **proposal) |
kex_prop_free(char **proposal) |
{ |
{ |
int i; |
u_int i; |
|
|
for (i = 0; i < PROPOSAL_MAX; i++) |
for (i = 0; i < PROPOSAL_MAX; i++) |
xfree(proposal[i]); |
xfree(proposal[i]); |
|
|
{ |
{ |
u_int32_t rnd = 0; |
u_int32_t rnd = 0; |
u_char *cookie; |
u_char *cookie; |
int i; |
u_int i; |
|
|
if (kex == NULL) { |
if (kex == NULL) { |
error("kex_send_kexinit: no kex, cannot rekey"); |
error("kex_send_kexinit: no kex, cannot rekey"); |
|
|
kex_input_kexinit(int type, u_int32_t seq, void *ctxt) |
kex_input_kexinit(int type, u_int32_t seq, void *ctxt) |
{ |
{ |
char *ptr; |
char *ptr; |
int dlen; |
u_int i, dlen; |
int i; |
|
Kex *kex = (Kex *)ctxt; |
Kex *kex = (Kex *)ctxt; |
|
|
debug("SSH2_MSG_KEXINIT received"); |
debug("SSH2_MSG_KEXINIT received"); |
|
|
char *name = match_list(client, server, NULL); |
char *name = match_list(client, server, NULL); |
if (name == NULL) |
if (name == NULL) |
fatal("no matching comp found: client %s server %s", client, server); |
fatal("no matching comp found: client %s server %s", client, server); |
if (strcmp(name, "zlib") == 0) { |
if (strcmp(name, "zlib@openssh.com") == 0) { |
comp->type = 1; |
comp->type = COMP_DELAYED; |
|
} else if (strcmp(name, "zlib") == 0) { |
|
comp->type = COMP_ZLIB; |
} else if (strcmp(name, "none") == 0) { |
} else if (strcmp(name, "none") == 0) { |
comp->type = 0; |
comp->type = COMP_NONE; |
} else { |
} else { |
fatal("unsupported comp %s", name); |
fatal("unsupported comp %s", name); |
} |
} |
|
|
char **my, **peer; |
char **my, **peer; |
char **cprop, **sprop; |
char **cprop, **sprop; |
int nenc, nmac, ncomp; |
int nenc, nmac, ncomp; |
int mode; |
u_int mode, ctos, need; |
int ctos; /* direction: if true client-to-server */ |
|
int need; |
|
int first_kex_follows, type; |
int first_kex_follows, type; |
|
|
my = kex_buf2prop(&kex->my, NULL); |
my = kex_buf2prop(&kex->my, NULL); |
|
|
|
|
/* ignore the next message if the proposals do not match */ |
/* ignore the next message if the proposals do not match */ |
if (first_kex_follows && !proposals_match(my, peer) && |
if (first_kex_follows && !proposals_match(my, peer) && |
!(datafellows & SSH_BUG_FIRSTKEX)) { |
!(datafellows & SSH_BUG_FIRSTKEX)) { |
type = packet_read(); |
type = packet_read(); |
debug2("skipping next packet (type %u)", type); |
debug2("skipping next packet (type %u)", type); |
} |
} |
|
|
} |
} |
|
|
static u_char * |
static u_char * |
derive_key(Kex *kex, int id, int need, u_char *hash, BIGNUM *shared_secret) |
derive_key(Kex *kex, int id, u_int need, u_char *hash, BIGNUM *shared_secret) |
{ |
{ |
Buffer b; |
Buffer b; |
const EVP_MD *evp_md = EVP_sha1(); |
const EVP_MD *evp_md = EVP_sha1(); |
EVP_MD_CTX md; |
EVP_MD_CTX md; |
char c = id; |
char c = id; |
int have; |
u_int have; |
int mdsz = EVP_MD_size(evp_md); |
int mdsz = EVP_MD_size(evp_md); |
u_char *digest = xmalloc(roundup(need, mdsz)); |
u_char *digest; |
|
|
|
if (mdsz < 0) |
|
fatal("derive_key: mdsz < 0"); |
|
digest = xmalloc(roundup(need, mdsz)); |
|
|
buffer_init(&b); |
buffer_init(&b); |
buffer_put_bignum2(&b, shared_secret); |
buffer_put_bignum2(&b, shared_secret); |
|
|
|
|
kex_derive_keys(Kex *kex, u_char *hash, BIGNUM *shared_secret) |
kex_derive_keys(Kex *kex, u_char *hash, BIGNUM *shared_secret) |
{ |
{ |
u_char *keys[NKEYS]; |
u_char *keys[NKEYS]; |
int i, mode, ctos; |
u_int i, mode, ctos; |
|
|
for (i = 0; i < NKEYS; i++) |
for (i = 0; i < NKEYS; i++) |
keys[i] = derive_key(kex, 'A'+i, kex->we_need, hash, shared_secret); |
keys[i] = derive_key(kex, 'A'+i, kex->we_need, hash, shared_secret); |
|
|
EVP_DigestInit(&md, evp_md); |
EVP_DigestInit(&md, evp_md); |
|
|
len = BN_num_bytes(host_modulus); |
len = BN_num_bytes(host_modulus); |
if (len < (512 / 8) || len > sizeof(nbuf)) |
if (len < (512 / 8) || (u_int)len > sizeof(nbuf)) |
fatal("%s: bad host modulus (len %d)", __func__, len); |
fatal("%s: bad host modulus (len %d)", __func__, len); |
BN_bn2bin(host_modulus, nbuf); |
BN_bn2bin(host_modulus, nbuf); |
EVP_DigestUpdate(&md, nbuf, len); |
EVP_DigestUpdate(&md, nbuf, len); |
|
|
len = BN_num_bytes(server_modulus); |
len = BN_num_bytes(server_modulus); |
if (len < (512 / 8) || len > sizeof(nbuf)) |
if (len < (512 / 8) || (u_int)len > sizeof(nbuf)) |
fatal("%s: bad server modulus (len %d)", __func__, len); |
fatal("%s: bad server modulus (len %d)", __func__, len); |
BN_bn2bin(server_modulus, nbuf); |
BN_bn2bin(server_modulus, nbuf); |
EVP_DigestUpdate(&md, nbuf, len); |
EVP_DigestUpdate(&md, nbuf, len); |
|
|
void |
void |
dump_digest(char *msg, u_char *digest, int len) |
dump_digest(char *msg, u_char *digest, int len) |
{ |
{ |
int i; |
u_int i; |
|
|
fprintf(stderr, "%s\n", msg); |
fprintf(stderr, "%s\n", msg); |
for (i = 0; i< len; i++) { |
for (i = 0; i< len; i++) { |