2011-07-20 16:40:29 +02:00
|
|
|
/* ssh-utils.c - Secure Shell helper functions
|
|
|
|
* Copyright (C) 2011 Free Software Foundation, Inc.
|
|
|
|
*
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
*
|
Change license for some files in common to LGPLv3+/GPLv2+.
Having the LGPL on the common GnuPG code helps to share code
between GnuPG and related projects (like GPGME and Libassuan). This
is good for interoperability and to reduces bugs.
* common/asshelp.c, common/asshelp.h, common/asshelp2.c, common/b64dec.c
* common/b64enc.c, common/convert.c, common/dns-cert.c
* common/dns-cert.h common/exechelp-posix.c, common/exechelp-w32.c
* common/exechelp-w32ce.c, common/exechelp.h, common/get-passphrase.c
* common/get-passphrase.h, common/gettime.c, common/gpgrlhelp.c
* common/helpfile.c, common/homedir.c, common/http.c, common/http.h
* common/i18n.c, common/init.c, common/init.h, common/iobuf.c
* common/iobuf.h, common/localename.c, common/membuf.c, common/membuf.h
* common/miscellaneous.c, common/openpgp-oid.c, common/openpgpdefs.h
* common/percent.c, common/pka.c, common/pka.h, common/session-env.c
* common/session-env.h, common/sexp-parse.h, common/sexputil.c
* common/signal.c, common/srv.c, common/srv.h, common/ssh-utils.c
* common/ssh-utils.h, common/sysutils.c, common/sysutils.h
* common/tlv.c, common/tlv.h, common/ttyio.c, common/ttyio.h
* common/userids.c, common/userids.h, common/xasprintf.c: Change
license to LGPLv3+/GPLv2+/
2012-04-20 15:43:06 +02:00
|
|
|
* This file is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of either
|
2011-07-20 16:40:29 +02:00
|
|
|
*
|
Change license for some files in common to LGPLv3+/GPLv2+.
Having the LGPL on the common GnuPG code helps to share code
between GnuPG and related projects (like GPGME and Libassuan). This
is good for interoperability and to reduces bugs.
* common/asshelp.c, common/asshelp.h, common/asshelp2.c, common/b64dec.c
* common/b64enc.c, common/convert.c, common/dns-cert.c
* common/dns-cert.h common/exechelp-posix.c, common/exechelp-w32.c
* common/exechelp-w32ce.c, common/exechelp.h, common/get-passphrase.c
* common/get-passphrase.h, common/gettime.c, common/gpgrlhelp.c
* common/helpfile.c, common/homedir.c, common/http.c, common/http.h
* common/i18n.c, common/init.c, common/init.h, common/iobuf.c
* common/iobuf.h, common/localename.c, common/membuf.c, common/membuf.h
* common/miscellaneous.c, common/openpgp-oid.c, common/openpgpdefs.h
* common/percent.c, common/pka.c, common/pka.h, common/session-env.c
* common/session-env.h, common/sexp-parse.h, common/sexputil.c
* common/signal.c, common/srv.c, common/srv.h, common/ssh-utils.c
* common/ssh-utils.h, common/sysutils.c, common/sysutils.h
* common/tlv.c, common/tlv.h, common/ttyio.c, common/ttyio.h
* common/userids.c, common/userids.h, common/xasprintf.c: Change
license to LGPLv3+/GPLv2+/
2012-04-20 15:43:06 +02:00
|
|
|
* - the GNU Lesser General Public License as published by the Free
|
|
|
|
* Software Foundation; either version 3 of the License, or (at
|
|
|
|
* your option) any later version.
|
|
|
|
*
|
|
|
|
* or
|
|
|
|
*
|
|
|
|
* - the GNU General Public License as published by the Free
|
|
|
|
* Software Foundation; either version 2 of the License, or (at
|
|
|
|
* your option) any later version.
|
|
|
|
*
|
|
|
|
* or both in parallel, as here.
|
|
|
|
*
|
|
|
|
* This file is distributed in the hope that it will be useful,
|
2011-07-20 16:40:29 +02:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-11-05 12:02:19 +01:00
|
|
|
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
2011-07-20 16:40:29 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <assert.h>
|
|
|
|
|
|
|
|
#include "util.h"
|
|
|
|
#include "ssh-utils.h"
|
|
|
|
|
|
|
|
|
2014-03-22 20:51:16 +01:00
|
|
|
/* Return true if KEYPARMS holds an EdDSA key. */
|
|
|
|
static int
|
|
|
|
is_eddsa (gcry_sexp_t keyparms)
|
|
|
|
{
|
|
|
|
int result = 0;
|
|
|
|
gcry_sexp_t list;
|
|
|
|
const char *s;
|
|
|
|
size_t n;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
list = gcry_sexp_find_token (keyparms, "flags", 0);
|
|
|
|
for (i = list ? gcry_sexp_length (list)-1 : 0; i > 0; i--)
|
|
|
|
{
|
|
|
|
s = gcry_sexp_nth_data (list, i, &n);
|
|
|
|
if (!s)
|
|
|
|
continue; /* Not a data element. */
|
|
|
|
|
|
|
|
if (n == 5 && !memcmp (s, "eddsa", 5))
|
|
|
|
{
|
|
|
|
result = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
gcry_sexp_release (list);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2011-07-20 16:40:29 +02:00
|
|
|
|
|
|
|
/* Return the Secure Shell type fingerprint for KEY. The length of
|
|
|
|
the fingerprint is returned at R_LEN and the fingerprint itself at
|
|
|
|
R_FPR. In case of a error code is returned and NULL stored at
|
2012-02-07 10:15:57 +01:00
|
|
|
R_FPR. */
|
2011-07-20 16:40:29 +02:00
|
|
|
static gpg_error_t
|
2012-02-07 10:15:57 +01:00
|
|
|
get_fingerprint (gcry_sexp_t key, void **r_fpr, size_t *r_len, int as_string)
|
2011-07-20 16:40:29 +02:00
|
|
|
{
|
|
|
|
gpg_error_t err;
|
|
|
|
gcry_sexp_t list = NULL;
|
|
|
|
gcry_sexp_t l2 = NULL;
|
|
|
|
const char *s;
|
|
|
|
char *name = NULL;
|
|
|
|
int idx;
|
|
|
|
const char *elems;
|
|
|
|
gcry_md_hd_t md = NULL;
|
2014-03-22 20:51:16 +01:00
|
|
|
int blobmode = 0;
|
2011-07-20 16:40:29 +02:00
|
|
|
|
|
|
|
*r_fpr = NULL;
|
|
|
|
*r_len = 0;
|
|
|
|
|
|
|
|
/* Check that the first element is valid. */
|
|
|
|
list = gcry_sexp_find_token (key, "public-key", 0);
|
|
|
|
if (!list)
|
|
|
|
list = gcry_sexp_find_token (key, "private-key", 0);
|
|
|
|
if (!list)
|
|
|
|
list = gcry_sexp_find_token (key, "protected-private-key", 0);
|
|
|
|
if (!list)
|
|
|
|
list = gcry_sexp_find_token (key, "shadowed-private-key", 0);
|
|
|
|
if (!list)
|
|
|
|
{
|
2012-02-07 10:15:57 +01:00
|
|
|
err = gpg_err_make (default_errsource, GPG_ERR_UNKNOWN_SEXP);
|
2011-07-20 16:40:29 +02:00
|
|
|
goto leave;
|
|
|
|
}
|
|
|
|
|
|
|
|
l2 = gcry_sexp_cadr (list);
|
|
|
|
gcry_sexp_release (list);
|
|
|
|
list = l2;
|
|
|
|
l2 = NULL;
|
|
|
|
|
|
|
|
name = gcry_sexp_nth_string (list, 0);
|
|
|
|
if (!name)
|
|
|
|
{
|
2012-02-07 10:15:57 +01:00
|
|
|
err = gpg_err_make (default_errsource, GPG_ERR_INV_SEXP);
|
2011-07-20 16:40:29 +02:00
|
|
|
goto leave;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = gcry_md_open (&md, GCRY_MD_MD5, 0);
|
|
|
|
if (err)
|
|
|
|
goto leave;
|
|
|
|
|
|
|
|
switch (gcry_pk_map_name (name))
|
|
|
|
{
|
|
|
|
case GCRY_PK_RSA:
|
|
|
|
elems = "en";
|
|
|
|
gcry_md_write (md, "\0\0\0\x07ssh-rsa", 11);
|
|
|
|
break;
|
2014-03-22 20:51:16 +01:00
|
|
|
|
2011-07-20 16:40:29 +02:00
|
|
|
case GCRY_PK_DSA:
|
|
|
|
elems = "pqgy";
|
|
|
|
gcry_md_write (md, "\0\0\0\x07ssh-dss", 11);
|
|
|
|
break;
|
2014-03-22 20:51:16 +01:00
|
|
|
|
|
|
|
case GCRY_PK_ECC:
|
|
|
|
if (is_eddsa (list))
|
|
|
|
{
|
|
|
|
elems = "q";
|
|
|
|
blobmode = 1;
|
|
|
|
/* For now there is just one curve, thus no need to switch
|
|
|
|
on it. */
|
|
|
|
gcry_md_write (md, "\0\0\0\x0b" "ssh-ed25519", 15);
|
|
|
|
}
|
2012-12-12 18:47:21 +01:00
|
|
|
else
|
|
|
|
{
|
2014-03-22 20:51:16 +01:00
|
|
|
/* We only support the 3 standard curves for now. It is
|
|
|
|
just a quick hack. */
|
|
|
|
elems = "q";
|
|
|
|
gcry_md_write (md, "\0\0\0\x13" "ecdsa-sha2-nistp", 20);
|
|
|
|
l2 = gcry_sexp_find_token (list, "curve", 0);
|
|
|
|
if (!l2)
|
2012-12-12 18:47:21 +01:00
|
|
|
elems = "";
|
|
|
|
else
|
2014-03-22 20:51:16 +01:00
|
|
|
{
|
|
|
|
gcry_free (name);
|
|
|
|
name = gcry_sexp_nth_string (l2, 1);
|
|
|
|
gcry_sexp_release (l2);
|
|
|
|
l2 = NULL;
|
|
|
|
if (!name)
|
|
|
|
elems = "";
|
|
|
|
else if (!strcmp (name, "NIST P-256")||!strcmp (name, "nistp256"))
|
|
|
|
gcry_md_write (md, "256\0\0\0\x08nistp256", 15);
|
|
|
|
else if (!strcmp (name, "NIST P-384")||!strcmp (name, "nistp384"))
|
2015-09-22 09:28:35 +02:00
|
|
|
gcry_md_write (md, "384\0\0\0\x08nistp384", 15);
|
2014-03-22 20:51:16 +01:00
|
|
|
else if (!strcmp (name, "NIST P-521")||!strcmp (name, "nistp521"))
|
|
|
|
gcry_md_write (md, "521\0\0\0\x08nistp521", 15);
|
|
|
|
else
|
|
|
|
elems = "";
|
|
|
|
}
|
|
|
|
if (!*elems)
|
|
|
|
err = gpg_err_make (default_errsource, GPG_ERR_UNKNOWN_CURVE);
|
2012-12-12 18:47:21 +01:00
|
|
|
}
|
|
|
|
break;
|
2014-03-22 20:51:16 +01:00
|
|
|
|
2011-07-20 16:40:29 +02:00
|
|
|
default:
|
|
|
|
elems = "";
|
2012-02-07 10:15:57 +01:00
|
|
|
err = gpg_err_make (default_errsource, GPG_ERR_PUBKEY_ALGO);
|
2011-07-20 16:40:29 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (err)
|
|
|
|
goto leave;
|
|
|
|
|
2014-03-22 20:51:16 +01:00
|
|
|
|
2011-07-20 16:40:29 +02:00
|
|
|
for (idx = 0, s = elems; *s; s++, idx++)
|
|
|
|
{
|
|
|
|
l2 = gcry_sexp_find_token (list, s, 1);
|
|
|
|
if (!l2)
|
|
|
|
{
|
2012-02-07 10:15:57 +01:00
|
|
|
err = gpg_err_make (default_errsource, GPG_ERR_INV_SEXP);
|
2011-07-20 16:40:29 +02:00
|
|
|
goto leave;
|
|
|
|
}
|
2014-03-22 20:51:16 +01:00
|
|
|
if (blobmode)
|
2011-07-20 16:40:29 +02:00
|
|
|
{
|
2014-03-22 20:51:16 +01:00
|
|
|
const char *blob;
|
|
|
|
size_t bloblen;
|
|
|
|
unsigned char lenbuf[4];
|
|
|
|
|
|
|
|
blob = gcry_sexp_nth_data (l2, 1, &bloblen);
|
|
|
|
if (!blob)
|
|
|
|
{
|
|
|
|
err = gpg_err_make (default_errsource, GPG_ERR_INV_SEXP);
|
|
|
|
goto leave;
|
|
|
|
}
|
2015-09-29 15:33:59 +09:00
|
|
|
blob++;
|
|
|
|
bloblen--;
|
2014-03-22 20:51:16 +01:00
|
|
|
lenbuf[0] = bloblen >> 24;
|
|
|
|
lenbuf[1] = bloblen >> 16;
|
|
|
|
lenbuf[2] = bloblen >> 8;
|
|
|
|
lenbuf[3] = bloblen;
|
|
|
|
gcry_md_write (md, lenbuf, 4);
|
|
|
|
gcry_md_write (md, blob, bloblen);
|
2011-07-20 16:40:29 +02:00
|
|
|
}
|
2014-03-22 20:51:16 +01:00
|
|
|
else
|
|
|
|
{
|
|
|
|
gcry_mpi_t a;
|
|
|
|
unsigned char *buf;
|
|
|
|
size_t buflen;
|
2011-07-20 16:40:29 +02:00
|
|
|
|
2014-03-22 20:51:16 +01:00
|
|
|
a = gcry_sexp_nth_mpi (l2, 1, GCRYMPI_FMT_USG);
|
|
|
|
gcry_sexp_release (l2);
|
|
|
|
l2 = NULL;
|
|
|
|
if (!a)
|
|
|
|
{
|
|
|
|
err = gpg_err_make (default_errsource, GPG_ERR_INV_SEXP);
|
|
|
|
goto leave;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = gcry_mpi_aprint (GCRYMPI_FMT_SSH, &buf, &buflen, a);
|
|
|
|
gcry_mpi_release (a);
|
|
|
|
if (err)
|
|
|
|
goto leave;
|
|
|
|
gcry_md_write (md, buf, buflen);
|
|
|
|
gcry_free (buf);
|
|
|
|
}
|
2011-07-20 16:40:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
*r_fpr = gcry_malloc (as_string? 61:20);
|
|
|
|
if (!*r_fpr)
|
|
|
|
{
|
2012-02-07 10:15:57 +01:00
|
|
|
err = gpg_err_make (default_errsource, gpg_err_code_from_syserror ());
|
2011-07-20 16:40:29 +02:00
|
|
|
goto leave;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (as_string)
|
|
|
|
{
|
|
|
|
bin2hexcolon (gcry_md_read (md, GCRY_MD_MD5), 16, *r_fpr);
|
|
|
|
*r_len = 3*16+1;
|
|
|
|
strlwr (*r_fpr);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
memcpy (*r_fpr, gcry_md_read (md, GCRY_MD_MD5), 16);
|
|
|
|
*r_len = 16;
|
|
|
|
}
|
|
|
|
err = 0;
|
|
|
|
|
|
|
|
leave:
|
|
|
|
gcry_free (name);
|
|
|
|
gcry_sexp_release (l2);
|
|
|
|
gcry_md_close (md);
|
|
|
|
gcry_sexp_release (list);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return the Secure Shell type fingerprint for KEY. The length of
|
|
|
|
the fingerprint is returned at R_LEN and the fingerprint itself at
|
|
|
|
R_FPR. In case of an error an error code is returned and NULL
|
2012-02-07 10:15:57 +01:00
|
|
|
stored at R_FPR. */
|
2011-07-20 16:40:29 +02:00
|
|
|
gpg_error_t
|
2012-02-07 10:15:57 +01:00
|
|
|
ssh_get_fingerprint (gcry_sexp_t key, void **r_fpr, size_t *r_len)
|
2011-07-20 16:40:29 +02:00
|
|
|
{
|
2012-02-07 10:15:57 +01:00
|
|
|
return get_fingerprint (key, r_fpr, r_len, 0);
|
2011-07-20 16:40:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Return the Secure Shell type fingerprint for KEY as a string. The
|
|
|
|
fingerprint is mallcoed and stored at R_FPRSTR. In case of an
|
2012-02-07 10:15:57 +01:00
|
|
|
error an error code is returned and NULL stored at R_FPRSTR. */
|
2011-07-20 16:40:29 +02:00
|
|
|
gpg_error_t
|
2012-02-07 10:15:57 +01:00
|
|
|
ssh_get_fingerprint_string (gcry_sexp_t key, char **r_fprstr)
|
2011-07-20 16:40:29 +02:00
|
|
|
{
|
|
|
|
gpg_error_t err;
|
|
|
|
size_t dummy;
|
|
|
|
void *string;
|
|
|
|
|
2012-02-07 10:15:57 +01:00
|
|
|
err = get_fingerprint (key, &string, &dummy, 1);
|
2011-07-20 16:40:29 +02:00
|
|
|
*r_fprstr = string;
|
|
|
|
return err;
|
|
|
|
}
|