1 |
|
|
/* $OpenBSD: kexdh.c,v 1.26 2016/05/02 10:26:04 djm Exp $ */ |
2 |
|
|
/* |
3 |
|
|
* Copyright (c) 2001 Markus Friedl. All rights reserved. |
4 |
|
|
* |
5 |
|
|
* Redistribution and use in source and binary forms, with or without |
6 |
|
|
* modification, are permitted provided that the following conditions |
7 |
|
|
* are met: |
8 |
|
|
* 1. Redistributions of source code must retain the above copyright |
9 |
|
|
* notice, this list of conditions and the following disclaimer. |
10 |
|
|
* 2. Redistributions in binary form must reproduce the above copyright |
11 |
|
|
* notice, this list of conditions and the following disclaimer in the |
12 |
|
|
* documentation and/or other materials provided with the distribution. |
13 |
|
|
* |
14 |
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
15 |
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
16 |
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
17 |
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
18 |
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
19 |
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
20 |
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
21 |
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
22 |
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
23 |
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
24 |
|
|
*/ |
25 |
|
|
|
26 |
|
|
#include <sys/types.h> |
27 |
|
|
|
28 |
|
|
#include <signal.h> |
29 |
|
|
|
30 |
|
|
#include <openssl/evp.h> |
31 |
|
|
|
32 |
|
|
#include "ssh2.h" |
33 |
|
|
#include "sshkey.h" |
34 |
|
|
#include "cipher.h" |
35 |
|
|
#include "kex.h" |
36 |
|
|
#include "ssherr.h" |
37 |
|
|
#include "sshbuf.h" |
38 |
|
|
#include "digest.h" |
39 |
|
|
|
40 |
|
|
int |
41 |
|
|
kex_dh_hash( |
42 |
|
|
int hash_alg, |
43 |
|
|
const char *client_version_string, |
44 |
|
|
const char *server_version_string, |
45 |
|
|
const u_char *ckexinit, size_t ckexinitlen, |
46 |
|
|
const u_char *skexinit, size_t skexinitlen, |
47 |
|
|
const u_char *serverhostkeyblob, size_t sbloblen, |
48 |
|
|
const BIGNUM *client_dh_pub, |
49 |
|
|
const BIGNUM *server_dh_pub, |
50 |
|
|
const BIGNUM *shared_secret, |
51 |
|
|
u_char *hash, size_t *hashlen) |
52 |
|
|
{ |
53 |
|
|
struct sshbuf *b; |
54 |
|
|
int r; |
55 |
|
|
|
56 |
|
|
if (*hashlen < ssh_digest_bytes(hash_alg)) |
57 |
|
|
return SSH_ERR_INVALID_ARGUMENT; |
58 |
|
|
if ((b = sshbuf_new()) == NULL) |
59 |
|
|
return SSH_ERR_ALLOC_FAIL; |
60 |
|
|
if ((r = sshbuf_put_cstring(b, client_version_string)) != 0 || |
61 |
|
|
(r = sshbuf_put_cstring(b, server_version_string)) != 0 || |
62 |
|
|
/* kexinit messages: fake header: len+SSH2_MSG_KEXINIT */ |
63 |
|
|
(r = sshbuf_put_u32(b, ckexinitlen+1)) != 0 || |
64 |
|
|
(r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || |
65 |
|
|
(r = sshbuf_put(b, ckexinit, ckexinitlen)) != 0 || |
66 |
|
|
(r = sshbuf_put_u32(b, skexinitlen+1)) != 0 || |
67 |
|
|
(r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 || |
68 |
|
|
(r = sshbuf_put(b, skexinit, skexinitlen)) != 0 || |
69 |
|
|
(r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 || |
70 |
|
|
(r = sshbuf_put_bignum2(b, client_dh_pub)) != 0 || |
71 |
|
|
(r = sshbuf_put_bignum2(b, server_dh_pub)) != 0 || |
72 |
|
|
(r = sshbuf_put_bignum2(b, shared_secret)) != 0) { |
73 |
|
|
sshbuf_free(b); |
74 |
|
|
return r; |
75 |
|
|
} |
76 |
|
|
#ifdef DEBUG_KEX |
77 |
|
|
sshbuf_dump(b, stderr); |
78 |
|
|
#endif |
79 |
|
|
if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { |
80 |
|
|
sshbuf_free(b); |
81 |
|
|
return SSH_ERR_LIBCRYPTO_ERROR; |
82 |
|
|
} |
83 |
|
|
sshbuf_free(b); |
84 |
|
|
*hashlen = ssh_digest_bytes(hash_alg); |
85 |
|
|
#ifdef DEBUG_KEX |
86 |
|
|
dump_digest("hash", hash, *hashlen); |
87 |
|
|
#endif |
88 |
|
|
return 0; |
89 |
|
|
} |