|
Lines 44-49
RCSID("$OpenBSD: kex.c,v 1.63 2005/07/17
Link Here
|
| 44 |
|
44 |
|
| 45 |
#define KEX_COOKIE_LEN 16 |
45 |
#define KEX_COOKIE_LEN 16 |
| 46 |
|
46 |
|
|
|
47 |
extern const EVP_MD *evp_ssh_sha256(void); |
| 48 |
|
| 47 |
/* prototype */ |
49 |
/* prototype */ |
| 48 |
static void kex_kexinit_finish(Kex *); |
50 |
static void kex_kexinit_finish(Kex *); |
| 49 |
static void kex_choose_conf(Kex *); |
51 |
static void kex_choose_conf(Kex *); |
|
Lines 287-304
choose_comp(Comp *comp, char *client, ch
Link Here
|
| 287 |
static void |
289 |
static void |
| 288 |
choose_kex(Kex *k, char *client, char *server) |
290 |
choose_kex(Kex *k, char *client, char *server) |
| 289 |
{ |
291 |
{ |
|
|
292 |
int mdsz; |
| 293 |
|
| 290 |
k->name = match_list(client, server, NULL); |
294 |
k->name = match_list(client, server, NULL); |
| 291 |
if (k->name == NULL) |
295 |
if (k->name == NULL) |
| 292 |
fatal("no kex alg"); |
296 |
fatal("no kex alg"); |
| 293 |
if (strcmp(k->name, KEX_DH1) == 0) { |
297 |
if (strcmp(k->name, KEX_DH1) == 0) { |
| 294 |
k->kex_type = KEX_DH_GRP1_SHA1; |
298 |
k->kex_type = KEX_DH_GRP1_SHA1; |
|
|
299 |
k->evp_md = EVP_sha1(); |
| 295 |
} else if (strcmp(k->name, KEX_DH14) == 0) { |
300 |
} else if (strcmp(k->name, KEX_DH14) == 0) { |
| 296 |
k->kex_type = KEX_DH_GRP14_SHA1; |
301 |
k->kex_type = KEX_DH_GRP14_SHA1; |
| 297 |
} else if (strcmp(k->name, KEX_DHGEX) == 0) { |
302 |
k->evp_md = EVP_sha1(); |
|
|
303 |
} else if (strcmp(k->name, KEX_DHGEX_SHA1) == 0) { |
| 298 |
k->kex_type = KEX_DH_GEX_SHA1; |
304 |
k->kex_type = KEX_DH_GEX_SHA1; |
|
|
305 |
k->evp_md = EVP_sha1(); |
| 306 |
} else if (strcmp(k->name, KEX_DHGEX_SHA256) == 0) { |
| 307 |
k->kex_type = KEX_DH_GEX_SHA256; |
| 308 |
k->evp_md = evp_ssh_sha256(); |
| 299 |
} else |
309 |
} else |
| 300 |
fatal("bad kex alg %s", k->name); |
310 |
fatal("bad kex alg %s", k->name); |
|
|
311 |
|
| 312 |
if ((mdsz = EVP_MD_size(k->evp_md)) <= 0) |
| 313 |
fatal("bad kex md size %d", mdsz); |
| 314 |
k->mdsz = mdsz; |
| 301 |
} |
315 |
} |
|
|
316 |
|
| 302 |
static void |
317 |
static void |
| 303 |
choose_hostkeyalg(Kex *k, char *client, char *server) |
318 |
choose_hostkeyalg(Kex *k, char *client, char *server) |
| 304 |
{ |
319 |
{ |
|
Lines 402-429
kex_choose_conf(Kex *kex)
Link Here
|
| 402 |
} |
417 |
} |
| 403 |
|
418 |
|
| 404 |
static u_char * |
419 |
static u_char * |
| 405 |
derive_key(Kex *kex, int id, u_int need, u_char *hash, BIGNUM *shared_secret) |
420 |
derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, |
|
|
421 |
BIGNUM *shared_secret) |
| 406 |
{ |
422 |
{ |
| 407 |
Buffer b; |
423 |
Buffer b; |
| 408 |
const EVP_MD *evp_md = EVP_sha1(); |
|
|
| 409 |
EVP_MD_CTX md; |
424 |
EVP_MD_CTX md; |
| 410 |
char c = id; |
425 |
char c = id; |
| 411 |
u_int have; |
426 |
u_int have; |
| 412 |
int mdsz = EVP_MD_size(evp_md); |
427 |
u_char *digest = xmalloc(roundup(need, kex->mdsz)); |
| 413 |
u_char *digest; |
|
|
| 414 |
|
| 415 |
if (mdsz < 0) |
| 416 |
fatal("derive_key: mdsz < 0"); |
| 417 |
digest = xmalloc(roundup(need, mdsz)); |
| 418 |
|
428 |
|
| 419 |
buffer_init(&b); |
429 |
buffer_init(&b); |
| 420 |
buffer_put_bignum2(&b, shared_secret); |
430 |
buffer_put_bignum2(&b, shared_secret); |
| 421 |
|
431 |
|
| 422 |
/* K1 = HASH(K || H || "A" || session_id) */ |
432 |
/* K1 = HASH(K || H || "A" || session_id) */ |
| 423 |
EVP_DigestInit(&md, evp_md); |
433 |
EVP_DigestInit(&md, kex->evp_md); |
| 424 |
if (!(datafellows & SSH_BUG_DERIVEKEY)) |
434 |
if (!(datafellows & SSH_BUG_DERIVEKEY)) |
| 425 |
EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)); |
435 |
EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)); |
| 426 |
EVP_DigestUpdate(&md, hash, mdsz); |
436 |
EVP_DigestUpdate(&md, hash, hashlen); |
| 427 |
EVP_DigestUpdate(&md, &c, 1); |
437 |
EVP_DigestUpdate(&md, &c, 1); |
| 428 |
EVP_DigestUpdate(&md, kex->session_id, kex->session_id_len); |
438 |
EVP_DigestUpdate(&md, kex->session_id, kex->session_id_len); |
| 429 |
EVP_DigestFinal(&md, digest, NULL); |
439 |
EVP_DigestFinal(&md, digest, NULL); |
|
Lines 433-443
derive_key(Kex *kex, int id, u_int need,
Link Here
|
| 433 |
* Kn = HASH(K || H || K1 || K2 || ... || Kn-1) |
443 |
* Kn = HASH(K || H || K1 || K2 || ... || Kn-1) |
| 434 |
* Key = K1 || K2 || ... || Kn |
444 |
* Key = K1 || K2 || ... || Kn |
| 435 |
*/ |
445 |
*/ |
| 436 |
for (have = mdsz; need > have; have += mdsz) { |
446 |
for (have = kex->mdsz; need > have; have += kex->mdsz) { |
| 437 |
EVP_DigestInit(&md, evp_md); |
447 |
EVP_DigestInit(&md, kex->evp_md); |
| 438 |
if (!(datafellows & SSH_BUG_DERIVEKEY)) |
448 |
if (!(datafellows & SSH_BUG_DERIVEKEY)) |
| 439 |
EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)); |
449 |
EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)); |
| 440 |
EVP_DigestUpdate(&md, hash, mdsz); |
450 |
EVP_DigestUpdate(&md, hash, kex->mdsz); |
| 441 |
EVP_DigestUpdate(&md, digest, have); |
451 |
EVP_DigestUpdate(&md, digest, have); |
| 442 |
EVP_DigestFinal(&md, digest + have, NULL); |
452 |
EVP_DigestFinal(&md, digest + have, NULL); |
| 443 |
} |
453 |
} |
|
Lines 453-465
Newkeys *current_keys[MODE_MAX];
Link Here
|
| 453 |
|
463 |
|
| 454 |
#define NKEYS 6 |
464 |
#define NKEYS 6 |
| 455 |
void |
465 |
void |
| 456 |
kex_derive_keys(Kex *kex, u_char *hash, BIGNUM *shared_secret) |
466 |
kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, BIGNUM *shared_secret) |
| 457 |
{ |
467 |
{ |
| 458 |
u_char *keys[NKEYS]; |
468 |
u_char *keys[NKEYS]; |
| 459 |
u_int i, mode, ctos; |
469 |
u_int i, mode, ctos; |
| 460 |
|
470 |
|
| 461 |
for (i = 0; i < NKEYS; i++) |
471 |
for (i = 0; i < NKEYS; i++) { |
| 462 |
keys[i] = derive_key(kex, 'A'+i, kex->we_need, hash, shared_secret); |
472 |
keys[i] = derive_key(kex, 'A'+i, kex->we_need, hash, hashlen, |
|
|
473 |
shared_secret); |
| 474 |
} |
| 463 |
|
475 |
|
| 464 |
debug2("kex_derive_keys"); |
476 |
debug2("kex_derive_keys"); |
| 465 |
for (mode = 0; mode < MODE_MAX; mode++) { |
477 |
for (mode = 0; mode < MODE_MAX; mode++) { |