xref: /onnv-gate/usr/src/cmd/ssh/libssh/common/key.c (revision 5243:903f035961d7)
10Sstevel@tonic-gate /*
20Sstevel@tonic-gate  * read_bignum():
30Sstevel@tonic-gate  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
40Sstevel@tonic-gate  *
50Sstevel@tonic-gate  * As far as I am concerned, the code I have written for this software
60Sstevel@tonic-gate  * can be used freely for any purpose.  Any derived versions of this
70Sstevel@tonic-gate  * software must be clearly marked as such, and if the derived work is
80Sstevel@tonic-gate  * incompatible with the protocol description in the RFC file, it must be
90Sstevel@tonic-gate  * called by a name other than "ssh" or "Secure Shell".
100Sstevel@tonic-gate  *
110Sstevel@tonic-gate  *
120Sstevel@tonic-gate  * Copyright (c) 2000, 2001 Markus Friedl.  All rights reserved.
130Sstevel@tonic-gate  *
140Sstevel@tonic-gate  * Redistribution and use in source and binary forms, with or without
150Sstevel@tonic-gate  * modification, are permitted provided that the following conditions
160Sstevel@tonic-gate  * are met:
170Sstevel@tonic-gate  * 1. Redistributions of source code must retain the above copyright
180Sstevel@tonic-gate  *    notice, this list of conditions and the following disclaimer.
190Sstevel@tonic-gate  * 2. Redistributions in binary form must reproduce the above copyright
200Sstevel@tonic-gate  *    notice, this list of conditions and the following disclaimer in the
210Sstevel@tonic-gate  *    documentation and/or other materials provided with the distribution.
220Sstevel@tonic-gate  *
230Sstevel@tonic-gate  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
240Sstevel@tonic-gate  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
250Sstevel@tonic-gate  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
260Sstevel@tonic-gate  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
270Sstevel@tonic-gate  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
280Sstevel@tonic-gate  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
290Sstevel@tonic-gate  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
300Sstevel@tonic-gate  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
310Sstevel@tonic-gate  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
320Sstevel@tonic-gate  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
330Sstevel@tonic-gate  */
340Sstevel@tonic-gate #include "includes.h"
350Sstevel@tonic-gate RCSID("$OpenBSD: key.c,v 1.49 2002/09/09 14:54:14 markus Exp $");
360Sstevel@tonic-gate 
370Sstevel@tonic-gate #pragma ident	"%Z%%M%	%I%	%E% SMI"
380Sstevel@tonic-gate 
390Sstevel@tonic-gate #include <openssl/evp.h>
400Sstevel@tonic-gate 
410Sstevel@tonic-gate #include "xmalloc.h"
420Sstevel@tonic-gate #include "key.h"
430Sstevel@tonic-gate #include "rsa.h"
440Sstevel@tonic-gate #include "ssh-dss.h"
450Sstevel@tonic-gate #include "ssh-rsa.h"
460Sstevel@tonic-gate #include "uuencode.h"
470Sstevel@tonic-gate #include "buffer.h"
480Sstevel@tonic-gate #include "bufaux.h"
490Sstevel@tonic-gate #include "log.h"
500Sstevel@tonic-gate 
510Sstevel@tonic-gate Key *
key_new(int type)520Sstevel@tonic-gate key_new(int type)
530Sstevel@tonic-gate {
540Sstevel@tonic-gate 	Key *k;
550Sstevel@tonic-gate 	RSA *rsa;
560Sstevel@tonic-gate 	DSA *dsa;
570Sstevel@tonic-gate 	k = xmalloc(sizeof(*k));
580Sstevel@tonic-gate 	k->type = type;
590Sstevel@tonic-gate 	k->flags = 0;
600Sstevel@tonic-gate 	k->dsa = NULL;
610Sstevel@tonic-gate 	k->rsa = NULL;
620Sstevel@tonic-gate 	switch (k->type) {
630Sstevel@tonic-gate 	case KEY_RSA1:
640Sstevel@tonic-gate 	case KEY_RSA:
650Sstevel@tonic-gate 		if ((rsa = RSA_new()) == NULL)
660Sstevel@tonic-gate 			fatal("key_new: RSA_new failed");
670Sstevel@tonic-gate 		if ((rsa->n = BN_new()) == NULL)
680Sstevel@tonic-gate 			fatal("key_new: BN_new failed");
690Sstevel@tonic-gate 		if ((rsa->e = BN_new()) == NULL)
700Sstevel@tonic-gate 			fatal("key_new: BN_new failed");
710Sstevel@tonic-gate 		k->rsa = rsa;
720Sstevel@tonic-gate 		break;
730Sstevel@tonic-gate 	case KEY_DSA:
740Sstevel@tonic-gate 		if ((dsa = DSA_new()) == NULL)
750Sstevel@tonic-gate 			fatal("key_new: DSA_new failed");
760Sstevel@tonic-gate 		if ((dsa->p = BN_new()) == NULL)
770Sstevel@tonic-gate 			fatal("key_new: BN_new failed");
780Sstevel@tonic-gate 		if ((dsa->q = BN_new()) == NULL)
790Sstevel@tonic-gate 			fatal("key_new: BN_new failed");
800Sstevel@tonic-gate 		if ((dsa->g = BN_new()) == NULL)
810Sstevel@tonic-gate 			fatal("key_new: BN_new failed");
820Sstevel@tonic-gate 		if ((dsa->pub_key = BN_new()) == NULL)
830Sstevel@tonic-gate 			fatal("key_new: BN_new failed");
840Sstevel@tonic-gate 		k->dsa = dsa;
850Sstevel@tonic-gate 		break;
860Sstevel@tonic-gate 	case KEY_UNSPEC:
870Sstevel@tonic-gate 		break;
880Sstevel@tonic-gate 	default:
890Sstevel@tonic-gate 		fatal("key_new: bad key type %d", k->type);
900Sstevel@tonic-gate 		break;
910Sstevel@tonic-gate 	}
920Sstevel@tonic-gate 	return k;
930Sstevel@tonic-gate }
940Sstevel@tonic-gate 
950Sstevel@tonic-gate Key *
key_new_private(int type)960Sstevel@tonic-gate key_new_private(int type)
970Sstevel@tonic-gate {
980Sstevel@tonic-gate 	Key *k = key_new(type);
990Sstevel@tonic-gate 	switch (k->type) {
1000Sstevel@tonic-gate 	case KEY_RSA1:
1010Sstevel@tonic-gate 	case KEY_RSA:
1020Sstevel@tonic-gate 		if ((k->rsa->d = BN_new()) == NULL)
1030Sstevel@tonic-gate 			fatal("key_new_private: BN_new failed");
1040Sstevel@tonic-gate 		if ((k->rsa->iqmp = BN_new()) == NULL)
1050Sstevel@tonic-gate 			fatal("key_new_private: BN_new failed");
1060Sstevel@tonic-gate 		if ((k->rsa->q = BN_new()) == NULL)
1070Sstevel@tonic-gate 			fatal("key_new_private: BN_new failed");
1080Sstevel@tonic-gate 		if ((k->rsa->p = BN_new()) == NULL)
1090Sstevel@tonic-gate 			fatal("key_new_private: BN_new failed");
1100Sstevel@tonic-gate 		if ((k->rsa->dmq1 = BN_new()) == NULL)
1110Sstevel@tonic-gate 			fatal("key_new_private: BN_new failed");
1120Sstevel@tonic-gate 		if ((k->rsa->dmp1 = BN_new()) == NULL)
1130Sstevel@tonic-gate 			fatal("key_new_private: BN_new failed");
1140Sstevel@tonic-gate 		break;
1150Sstevel@tonic-gate 	case KEY_DSA:
1160Sstevel@tonic-gate 		if ((k->dsa->priv_key = BN_new()) == NULL)
1170Sstevel@tonic-gate 			fatal("key_new_private: BN_new failed");
1180Sstevel@tonic-gate 		break;
1190Sstevel@tonic-gate 	case KEY_UNSPEC:
1200Sstevel@tonic-gate 		break;
1210Sstevel@tonic-gate 	default:
1220Sstevel@tonic-gate 		break;
1230Sstevel@tonic-gate 	}
1240Sstevel@tonic-gate 	return k;
1250Sstevel@tonic-gate }
1260Sstevel@tonic-gate 
1270Sstevel@tonic-gate void
key_free(Key * k)1280Sstevel@tonic-gate key_free(Key *k)
1290Sstevel@tonic-gate {
1300Sstevel@tonic-gate 	switch (k->type) {
1310Sstevel@tonic-gate 	case KEY_RSA1:
1320Sstevel@tonic-gate 	case KEY_RSA:
1330Sstevel@tonic-gate 		if (k->rsa != NULL)
1340Sstevel@tonic-gate 			RSA_free(k->rsa);
1350Sstevel@tonic-gate 		k->rsa = NULL;
1360Sstevel@tonic-gate 		break;
1370Sstevel@tonic-gate 	case KEY_DSA:
1380Sstevel@tonic-gate 		if (k->dsa != NULL)
1390Sstevel@tonic-gate 			DSA_free(k->dsa);
1400Sstevel@tonic-gate 		k->dsa = NULL;
1410Sstevel@tonic-gate 		break;
1420Sstevel@tonic-gate 	case KEY_UNSPEC:
1430Sstevel@tonic-gate 		break;
1440Sstevel@tonic-gate 	default:
1450Sstevel@tonic-gate 		fatal("key_free: bad key type %d", k->type);
1460Sstevel@tonic-gate 		break;
1470Sstevel@tonic-gate 	}
1480Sstevel@tonic-gate 	xfree(k);
1490Sstevel@tonic-gate }
1500Sstevel@tonic-gate int
key_equal(const Key * a,const Key * b)151*5243Sjp161948 key_equal(const Key *a, const Key *b)
1520Sstevel@tonic-gate {
1530Sstevel@tonic-gate 	if (a == NULL || b == NULL || a->type != b->type)
1540Sstevel@tonic-gate 		return 0;
1550Sstevel@tonic-gate 	switch (a->type) {
1560Sstevel@tonic-gate 	case KEY_RSA1:
1570Sstevel@tonic-gate 	case KEY_RSA:
1580Sstevel@tonic-gate 		return a->rsa != NULL && b->rsa != NULL &&
1590Sstevel@tonic-gate 		    BN_cmp(a->rsa->e, b->rsa->e) == 0 &&
1600Sstevel@tonic-gate 		    BN_cmp(a->rsa->n, b->rsa->n) == 0;
1610Sstevel@tonic-gate 		break;
1620Sstevel@tonic-gate 	case KEY_DSA:
1630Sstevel@tonic-gate 		return a->dsa != NULL && b->dsa != NULL &&
1640Sstevel@tonic-gate 		    BN_cmp(a->dsa->p, b->dsa->p) == 0 &&
1650Sstevel@tonic-gate 		    BN_cmp(a->dsa->q, b->dsa->q) == 0 &&
1660Sstevel@tonic-gate 		    BN_cmp(a->dsa->g, b->dsa->g) == 0 &&
1670Sstevel@tonic-gate 		    BN_cmp(a->dsa->pub_key, b->dsa->pub_key) == 0;
1680Sstevel@tonic-gate 		break;
1690Sstevel@tonic-gate 	default:
1700Sstevel@tonic-gate 		fatal("key_equal: bad key type %d", a->type);
1710Sstevel@tonic-gate 		break;
1720Sstevel@tonic-gate 	}
1730Sstevel@tonic-gate 	return 0;
1740Sstevel@tonic-gate }
1750Sstevel@tonic-gate 
1760Sstevel@tonic-gate static u_char *
key_fingerprint_raw(Key * k,enum fp_type dgst_type,u_int * dgst_raw_length)1770Sstevel@tonic-gate key_fingerprint_raw(Key *k, enum fp_type dgst_type, u_int *dgst_raw_length)
1780Sstevel@tonic-gate {
1790Sstevel@tonic-gate 	const EVP_MD *md = NULL;
1800Sstevel@tonic-gate 	EVP_MD_CTX ctx;
1810Sstevel@tonic-gate 	u_char *blob = NULL;
1820Sstevel@tonic-gate 	u_char *retval = NULL;
1830Sstevel@tonic-gate 	u_int len = 0;
1840Sstevel@tonic-gate 	int nlen, elen;
1850Sstevel@tonic-gate 
1860Sstevel@tonic-gate 	*dgst_raw_length = 0;
1870Sstevel@tonic-gate 
1880Sstevel@tonic-gate 	switch (dgst_type) {
1890Sstevel@tonic-gate 	case SSH_FP_MD5:
1900Sstevel@tonic-gate 		md = EVP_md5();
1910Sstevel@tonic-gate 		break;
1920Sstevel@tonic-gate 	case SSH_FP_SHA1:
1930Sstevel@tonic-gate 		md = EVP_sha1();
1940Sstevel@tonic-gate 		break;
1950Sstevel@tonic-gate 	default:
1960Sstevel@tonic-gate 		fatal("key_fingerprint_raw: bad digest type %d",
1970Sstevel@tonic-gate 		    dgst_type);
1980Sstevel@tonic-gate 	}
1990Sstevel@tonic-gate 	switch (k->type) {
2000Sstevel@tonic-gate 	case KEY_RSA1:
2010Sstevel@tonic-gate 		nlen = BN_num_bytes(k->rsa->n);
2020Sstevel@tonic-gate 		elen = BN_num_bytes(k->rsa->e);
2030Sstevel@tonic-gate 		len = nlen + elen;
2040Sstevel@tonic-gate 		blob = xmalloc(len);
2050Sstevel@tonic-gate 		BN_bn2bin(k->rsa->n, blob);
2060Sstevel@tonic-gate 		BN_bn2bin(k->rsa->e, blob + nlen);
2070Sstevel@tonic-gate 		break;
2080Sstevel@tonic-gate 	case KEY_DSA:
2090Sstevel@tonic-gate 	case KEY_RSA:
2100Sstevel@tonic-gate 		key_to_blob(k, &blob, &len);
2110Sstevel@tonic-gate 		break;
2120Sstevel@tonic-gate 	case KEY_UNSPEC:
2130Sstevel@tonic-gate 		return retval;
2140Sstevel@tonic-gate 		break;
2150Sstevel@tonic-gate 	default:
2160Sstevel@tonic-gate 		fatal("key_fingerprint_raw: bad key type %d", k->type);
2170Sstevel@tonic-gate 		break;
2180Sstevel@tonic-gate 	}
2190Sstevel@tonic-gate 	if (blob != NULL) {
2200Sstevel@tonic-gate 		retval = xmalloc(EVP_MAX_MD_SIZE);
2210Sstevel@tonic-gate 		EVP_DigestInit(&ctx, md);
2220Sstevel@tonic-gate 		EVP_DigestUpdate(&ctx, blob, len);
2230Sstevel@tonic-gate 		EVP_DigestFinal(&ctx, retval, dgst_raw_length);
2240Sstevel@tonic-gate 		memset(blob, 0, len);
2250Sstevel@tonic-gate 		xfree(blob);
2260Sstevel@tonic-gate 	} else {
2270Sstevel@tonic-gate 		fatal("key_fingerprint_raw: blob is null");
2280Sstevel@tonic-gate 	}
2290Sstevel@tonic-gate 	return retval;
2300Sstevel@tonic-gate }
2310Sstevel@tonic-gate 
2320Sstevel@tonic-gate static char *
key_fingerprint_hex(u_char * dgst_raw,u_int dgst_raw_len)2330Sstevel@tonic-gate key_fingerprint_hex(u_char *dgst_raw, u_int dgst_raw_len)
2340Sstevel@tonic-gate {
2350Sstevel@tonic-gate 	char *retval;
2360Sstevel@tonic-gate 	int i;
2370Sstevel@tonic-gate 
2380Sstevel@tonic-gate 	retval = xmalloc(dgst_raw_len * 3 + 1);
2390Sstevel@tonic-gate 	retval[0] = '\0';
2400Sstevel@tonic-gate 	for (i = 0; i < dgst_raw_len; i++) {
2410Sstevel@tonic-gate 		char hex[4];
2420Sstevel@tonic-gate 		snprintf(hex, sizeof(hex), "%02x:", dgst_raw[i]);
2430Sstevel@tonic-gate 		strlcat(retval, hex, dgst_raw_len * 3);
2440Sstevel@tonic-gate 	}
2450Sstevel@tonic-gate 	retval[(dgst_raw_len * 3) - 1] = '\0';
2460Sstevel@tonic-gate 	return retval;
2470Sstevel@tonic-gate }
2480Sstevel@tonic-gate 
2490Sstevel@tonic-gate static char *
key_fingerprint_bubblebabble(u_char * dgst_raw,u_int dgst_raw_len)2500Sstevel@tonic-gate key_fingerprint_bubblebabble(u_char *dgst_raw, u_int dgst_raw_len)
2510Sstevel@tonic-gate {
2520Sstevel@tonic-gate 	char vowels[] = { 'a', 'e', 'i', 'o', 'u', 'y' };
2530Sstevel@tonic-gate 	char consonants[] = { 'b', 'c', 'd', 'f', 'g', 'h', 'k', 'l', 'm',
2540Sstevel@tonic-gate 	    'n', 'p', 'r', 's', 't', 'v', 'z', 'x' };
2550Sstevel@tonic-gate 	u_int i, j = 0, rounds, seed = 1;
2560Sstevel@tonic-gate 	char *retval;
2570Sstevel@tonic-gate 
2580Sstevel@tonic-gate 	rounds = (dgst_raw_len / 2) + 1;
2590Sstevel@tonic-gate 	retval = xmalloc(sizeof(char) * (rounds*6));
2600Sstevel@tonic-gate 	retval[j++] = 'x';
2610Sstevel@tonic-gate 	for (i = 0; i < rounds; i++) {
2620Sstevel@tonic-gate 		u_int idx0, idx1, idx2, idx3, idx4;
2630Sstevel@tonic-gate 		if ((i + 1 < rounds) || (dgst_raw_len % 2 != 0)) {
2640Sstevel@tonic-gate 			idx0 = (((((u_int)(dgst_raw[2 * i])) >> 6) & 3) +
2650Sstevel@tonic-gate 			    seed) % 6;
2660Sstevel@tonic-gate 			idx1 = (((u_int)(dgst_raw[2 * i])) >> 2) & 15;
2670Sstevel@tonic-gate 			idx2 = ((((u_int)(dgst_raw[2 * i])) & 3) +
2680Sstevel@tonic-gate 			    (seed / 6)) % 6;
2690Sstevel@tonic-gate 			retval[j++] = vowels[idx0];
2700Sstevel@tonic-gate 			retval[j++] = consonants[idx1];
2710Sstevel@tonic-gate 			retval[j++] = vowels[idx2];
2720Sstevel@tonic-gate 			if ((i + 1) < rounds) {
2730Sstevel@tonic-gate 				idx3 = (((u_int)(dgst_raw[(2 * i) + 1])) >> 4) & 15;
2740Sstevel@tonic-gate 				idx4 = (((u_int)(dgst_raw[(2 * i) + 1]))) & 15;
2750Sstevel@tonic-gate 				retval[j++] = consonants[idx3];
2760Sstevel@tonic-gate 				retval[j++] = '-';
2770Sstevel@tonic-gate 				retval[j++] = consonants[idx4];
2780Sstevel@tonic-gate 				seed = ((seed * 5) +
2790Sstevel@tonic-gate 				    ((((u_int)(dgst_raw[2 * i])) * 7) +
2800Sstevel@tonic-gate 				    ((u_int)(dgst_raw[(2 * i) + 1])))) % 36;
2810Sstevel@tonic-gate 			}
2820Sstevel@tonic-gate 		} else {
2830Sstevel@tonic-gate 			idx0 = seed % 6;
2840Sstevel@tonic-gate 			idx1 = 16;
2850Sstevel@tonic-gate 			idx2 = seed / 6;
2860Sstevel@tonic-gate 			retval[j++] = vowels[idx0];
2870Sstevel@tonic-gate 			retval[j++] = consonants[idx1];
2880Sstevel@tonic-gate 			retval[j++] = vowels[idx2];
2890Sstevel@tonic-gate 		}
2900Sstevel@tonic-gate 	}
2910Sstevel@tonic-gate 	retval[j++] = 'x';
2920Sstevel@tonic-gate 	retval[j++] = '\0';
2930Sstevel@tonic-gate 	return retval;
2940Sstevel@tonic-gate }
2950Sstevel@tonic-gate 
2960Sstevel@tonic-gate char *
key_fingerprint(Key * k,enum fp_type dgst_type,enum fp_rep dgst_rep)2970Sstevel@tonic-gate key_fingerprint(Key *k, enum fp_type dgst_type, enum fp_rep dgst_rep)
2980Sstevel@tonic-gate {
2990Sstevel@tonic-gate 	char *retval = NULL;
3000Sstevel@tonic-gate 	u_char *dgst_raw;
3010Sstevel@tonic-gate 	u_int dgst_raw_len;
3020Sstevel@tonic-gate 
3030Sstevel@tonic-gate 	dgst_raw = key_fingerprint_raw(k, dgst_type, &dgst_raw_len);
3040Sstevel@tonic-gate 	if (!dgst_raw)
3050Sstevel@tonic-gate 		fatal("key_fingerprint: null from key_fingerprint_raw()");
3060Sstevel@tonic-gate 	switch (dgst_rep) {
3070Sstevel@tonic-gate 	case SSH_FP_HEX:
3080Sstevel@tonic-gate 		retval = key_fingerprint_hex(dgst_raw, dgst_raw_len);
3090Sstevel@tonic-gate 		break;
3100Sstevel@tonic-gate 	case SSH_FP_BUBBLEBABBLE:
3110Sstevel@tonic-gate 		retval = key_fingerprint_bubblebabble(dgst_raw, dgst_raw_len);
3120Sstevel@tonic-gate 		break;
3130Sstevel@tonic-gate 	default:
3140Sstevel@tonic-gate 		fatal("key_fingerprint_ex: bad digest representation %d",
3150Sstevel@tonic-gate 		    dgst_rep);
3160Sstevel@tonic-gate 		break;
3170Sstevel@tonic-gate 	}
3180Sstevel@tonic-gate 	memset(dgst_raw, 0, dgst_raw_len);
3190Sstevel@tonic-gate 	xfree(dgst_raw);
3200Sstevel@tonic-gate 	return retval;
3210Sstevel@tonic-gate }
3220Sstevel@tonic-gate 
3230Sstevel@tonic-gate /*
3240Sstevel@tonic-gate  * Reads a multiple-precision integer in decimal from the buffer, and advances
3250Sstevel@tonic-gate  * the pointer.  The integer must already be initialized.  This function is
3260Sstevel@tonic-gate  * permitted to modify the buffer.  This leaves *cpp to point just beyond the
3270Sstevel@tonic-gate  * last processed (and maybe modified) character.  Note that this may modify
3280Sstevel@tonic-gate  * the buffer containing the number.
3290Sstevel@tonic-gate  */
3300Sstevel@tonic-gate static int
read_bignum(char ** cpp,BIGNUM * value)3310Sstevel@tonic-gate read_bignum(char **cpp, BIGNUM * value)
3320Sstevel@tonic-gate {
3330Sstevel@tonic-gate 	char *cp = *cpp;
3340Sstevel@tonic-gate 	int old;
3350Sstevel@tonic-gate 
3360Sstevel@tonic-gate 	/* Skip any leading whitespace. */
3370Sstevel@tonic-gate 	for (; *cp == ' ' || *cp == '\t'; cp++)
3380Sstevel@tonic-gate 		;
3390Sstevel@tonic-gate 
3400Sstevel@tonic-gate 	/* Check that it begins with a decimal digit. */
3410Sstevel@tonic-gate 	if (*cp < '0' || *cp > '9')
3420Sstevel@tonic-gate 		return 0;
3430Sstevel@tonic-gate 
3440Sstevel@tonic-gate 	/* Save starting position. */
3450Sstevel@tonic-gate 	*cpp = cp;
3460Sstevel@tonic-gate 
3470Sstevel@tonic-gate 	/* Move forward until all decimal digits skipped. */
3480Sstevel@tonic-gate 	for (; *cp >= '0' && *cp <= '9'; cp++)
3490Sstevel@tonic-gate 		;
3500Sstevel@tonic-gate 
3510Sstevel@tonic-gate 	/* Save the old terminating character, and replace it by \0. */
3520Sstevel@tonic-gate 	old = *cp;
3530Sstevel@tonic-gate 	*cp = 0;
3540Sstevel@tonic-gate 
3550Sstevel@tonic-gate 	/* Parse the number. */
3560Sstevel@tonic-gate 	if (BN_dec2bn(&value, *cpp) == 0)
3570Sstevel@tonic-gate 		return 0;
3580Sstevel@tonic-gate 
3590Sstevel@tonic-gate 	/* Restore old terminating character. */
3600Sstevel@tonic-gate 	*cp = old;
3610Sstevel@tonic-gate 
3620Sstevel@tonic-gate 	/* Move beyond the number and return success. */
3630Sstevel@tonic-gate 	*cpp = cp;
3640Sstevel@tonic-gate 	return 1;
3650Sstevel@tonic-gate }
3660Sstevel@tonic-gate 
3670Sstevel@tonic-gate static int
write_bignum(FILE * f,BIGNUM * num)3680Sstevel@tonic-gate write_bignum(FILE *f, BIGNUM *num)
3690Sstevel@tonic-gate {
3700Sstevel@tonic-gate 	char *buf = BN_bn2dec(num);
3710Sstevel@tonic-gate 	if (buf == NULL) {
3720Sstevel@tonic-gate 		error("write_bignum: BN_bn2dec() failed");
3730Sstevel@tonic-gate 		return 0;
3740Sstevel@tonic-gate 	}
3750Sstevel@tonic-gate 	fprintf(f, " %s", buf);
3760Sstevel@tonic-gate 	OPENSSL_free(buf);
3770Sstevel@tonic-gate 	return 1;
3780Sstevel@tonic-gate }
3790Sstevel@tonic-gate 
3800Sstevel@tonic-gate /* returns 1 ok, -1 error */
3810Sstevel@tonic-gate int
key_read(Key * ret,char ** cpp)3820Sstevel@tonic-gate key_read(Key *ret, char **cpp)
3830Sstevel@tonic-gate {
3840Sstevel@tonic-gate 	Key *k;
3850Sstevel@tonic-gate 	int success = -1;
3860Sstevel@tonic-gate 	char *cp, *space;
3870Sstevel@tonic-gate 	int len, n, type;
3880Sstevel@tonic-gate 	u_int bits;
3890Sstevel@tonic-gate 	u_char *blob;
3900Sstevel@tonic-gate 
3910Sstevel@tonic-gate 	cp = *cpp;
3920Sstevel@tonic-gate 
3930Sstevel@tonic-gate 	switch (ret->type) {
3940Sstevel@tonic-gate 	case KEY_RSA1:
3950Sstevel@tonic-gate 		/* Get number of bits. */
3960Sstevel@tonic-gate 		if (*cp < '0' || *cp > '9')
3970Sstevel@tonic-gate 			return -1;	/* Bad bit count... */
3980Sstevel@tonic-gate 		for (bits = 0; *cp >= '0' && *cp <= '9'; cp++)
3990Sstevel@tonic-gate 			bits = 10 * bits + *cp - '0';
4000Sstevel@tonic-gate 		if (bits == 0)
4010Sstevel@tonic-gate 			return -1;
4020Sstevel@tonic-gate 		*cpp = cp;
4030Sstevel@tonic-gate 		/* Get public exponent, public modulus. */
4040Sstevel@tonic-gate 		if (!read_bignum(cpp, ret->rsa->e))
4050Sstevel@tonic-gate 			return -1;
4060Sstevel@tonic-gate 		if (!read_bignum(cpp, ret->rsa->n))
4070Sstevel@tonic-gate 			return -1;
4080Sstevel@tonic-gate 		success = 1;
4090Sstevel@tonic-gate 		break;
4100Sstevel@tonic-gate 	case KEY_UNSPEC:
4110Sstevel@tonic-gate 	case KEY_RSA:
4120Sstevel@tonic-gate 	case KEY_DSA:
4130Sstevel@tonic-gate 		space = strchr(cp, ' ');
4140Sstevel@tonic-gate 		if (space == NULL) {
4150Sstevel@tonic-gate 			debug3("key_read: no space");
4160Sstevel@tonic-gate 			return -1;
4170Sstevel@tonic-gate 		}
4180Sstevel@tonic-gate 		*space = '\0';
4190Sstevel@tonic-gate 		type = key_type_from_name(cp);
4200Sstevel@tonic-gate 		*space = ' ';
4210Sstevel@tonic-gate 		if (type == KEY_UNSPEC) {
4220Sstevel@tonic-gate 			debug3("key_read: no key found");
4230Sstevel@tonic-gate 			return -1;
4240Sstevel@tonic-gate 		}
4250Sstevel@tonic-gate 		cp = space+1;
4260Sstevel@tonic-gate 		if (*cp == '\0') {
4270Sstevel@tonic-gate 			debug3("key_read: short string");
4280Sstevel@tonic-gate 			return -1;
4290Sstevel@tonic-gate 		}
4300Sstevel@tonic-gate 		if (ret->type == KEY_UNSPEC) {
4310Sstevel@tonic-gate 			ret->type = type;
4320Sstevel@tonic-gate 		} else if (ret->type != type) {
4330Sstevel@tonic-gate 			/* is a key, but different type */
4340Sstevel@tonic-gate 			debug3("key_read: type mismatch");
4350Sstevel@tonic-gate 			return -1;
4360Sstevel@tonic-gate 		}
4370Sstevel@tonic-gate 		len = 2*strlen(cp);
4380Sstevel@tonic-gate 		blob = xmalloc(len);
4390Sstevel@tonic-gate 		n = uudecode(cp, blob, len);
4400Sstevel@tonic-gate 		if (n < 0) {
4410Sstevel@tonic-gate 			error("key_read: uudecode %s failed", cp);
4420Sstevel@tonic-gate 			xfree(blob);
4430Sstevel@tonic-gate 			return -1;
4440Sstevel@tonic-gate 		}
4450Sstevel@tonic-gate 		k = key_from_blob(blob, n);
4460Sstevel@tonic-gate 		xfree(blob);
4470Sstevel@tonic-gate 		if (k == NULL) {
4480Sstevel@tonic-gate 			error("key_read: key_from_blob %s failed", cp);
4490Sstevel@tonic-gate 			return -1;
4500Sstevel@tonic-gate 		}
4510Sstevel@tonic-gate 		if (k->type != type) {
4520Sstevel@tonic-gate 			error("key_read: type mismatch: encoding error");
4530Sstevel@tonic-gate 			key_free(k);
4540Sstevel@tonic-gate 			return -1;
4550Sstevel@tonic-gate 		}
4560Sstevel@tonic-gate /*XXXX*/
4570Sstevel@tonic-gate 		if (ret->type == KEY_RSA) {
4580Sstevel@tonic-gate 			if (ret->rsa != NULL)
4590Sstevel@tonic-gate 				RSA_free(ret->rsa);
4600Sstevel@tonic-gate 			ret->rsa = k->rsa;
4610Sstevel@tonic-gate 			k->rsa = NULL;
4620Sstevel@tonic-gate 			success = 1;
4630Sstevel@tonic-gate #ifdef DEBUG_PK
4640Sstevel@tonic-gate 			RSA_print_fp(stderr, ret->rsa, 8);
4650Sstevel@tonic-gate #endif
4660Sstevel@tonic-gate 		} else {
4670Sstevel@tonic-gate 			if (ret->dsa != NULL)
4680Sstevel@tonic-gate 				DSA_free(ret->dsa);
4690Sstevel@tonic-gate 			ret->dsa = k->dsa;
4700Sstevel@tonic-gate 			k->dsa = NULL;
4710Sstevel@tonic-gate 			success = 1;
4720Sstevel@tonic-gate #ifdef DEBUG_PK
4730Sstevel@tonic-gate 			DSA_print_fp(stderr, ret->dsa, 8);
4740Sstevel@tonic-gate #endif
4750Sstevel@tonic-gate 		}
4760Sstevel@tonic-gate /*XXXX*/
4770Sstevel@tonic-gate 		key_free(k);
4780Sstevel@tonic-gate 		if (success != 1)
4790Sstevel@tonic-gate 			break;
4800Sstevel@tonic-gate 		/* advance cp: skip whitespace and data */
4810Sstevel@tonic-gate 		while (*cp == ' ' || *cp == '\t')
4820Sstevel@tonic-gate 			cp++;
4830Sstevel@tonic-gate 		while (*cp != '\0' && *cp != ' ' && *cp != '\t')
4840Sstevel@tonic-gate 			cp++;
4850Sstevel@tonic-gate 		*cpp = cp;
4860Sstevel@tonic-gate 		break;
4870Sstevel@tonic-gate 	default:
4880Sstevel@tonic-gate 		fatal("key_read: bad key type: %d", ret->type);
4890Sstevel@tonic-gate 		break;
4900Sstevel@tonic-gate 	}
4910Sstevel@tonic-gate 	return success;
4920Sstevel@tonic-gate }
4930Sstevel@tonic-gate 
4940Sstevel@tonic-gate int
key_write(const Key * key,FILE * f)495*5243Sjp161948 key_write(const Key *key, FILE *f)
4960Sstevel@tonic-gate {
4970Sstevel@tonic-gate 	int n, success = 0;
4980Sstevel@tonic-gate 	u_int len, bits = 0;
4990Sstevel@tonic-gate 	u_char *blob;
5000Sstevel@tonic-gate 	char *uu;
5010Sstevel@tonic-gate 
5020Sstevel@tonic-gate 	if (key->type == KEY_RSA1 && key->rsa != NULL) {
5030Sstevel@tonic-gate 		/* size of modulus 'n' */
5040Sstevel@tonic-gate 		bits = BN_num_bits(key->rsa->n);
5050Sstevel@tonic-gate 		fprintf(f, "%u", bits);
5060Sstevel@tonic-gate 		if (write_bignum(f, key->rsa->e) &&
5070Sstevel@tonic-gate 		    write_bignum(f, key->rsa->n)) {
5080Sstevel@tonic-gate 			success = 1;
5090Sstevel@tonic-gate 		} else {
5100Sstevel@tonic-gate 			error("key_write: failed for RSA key");
5110Sstevel@tonic-gate 		}
5120Sstevel@tonic-gate 	} else if ((key->type == KEY_DSA && key->dsa != NULL) ||
5130Sstevel@tonic-gate 	    (key->type == KEY_RSA && key->rsa != NULL)) {
5140Sstevel@tonic-gate 		key_to_blob(key, &blob, &len);
5150Sstevel@tonic-gate 		uu = xmalloc(2*len);
5160Sstevel@tonic-gate 		n = uuencode(blob, len, uu, 2*len);
5170Sstevel@tonic-gate 		if (n > 0) {
5180Sstevel@tonic-gate 			fprintf(f, "%s %s", key_ssh_name(key), uu);
5190Sstevel@tonic-gate 			success = 1;
5200Sstevel@tonic-gate 		}
5210Sstevel@tonic-gate 		xfree(blob);
5220Sstevel@tonic-gate 		xfree(uu);
5230Sstevel@tonic-gate 	}
5240Sstevel@tonic-gate 	return success;
5250Sstevel@tonic-gate }
5260Sstevel@tonic-gate 
5270Sstevel@tonic-gate char *
key_type(Key * k)5280Sstevel@tonic-gate key_type(Key *k)
5290Sstevel@tonic-gate {
5300Sstevel@tonic-gate 	switch (k->type) {
5310Sstevel@tonic-gate 	case KEY_RSA1:
5320Sstevel@tonic-gate 		return "RSA1";
5330Sstevel@tonic-gate 		break;
5340Sstevel@tonic-gate 	case KEY_RSA:
5350Sstevel@tonic-gate 		return "RSA";
5360Sstevel@tonic-gate 		break;
5370Sstevel@tonic-gate 	case KEY_DSA:
5380Sstevel@tonic-gate 		return "DSA";
5390Sstevel@tonic-gate 		break;
5400Sstevel@tonic-gate 	}
5410Sstevel@tonic-gate 	return "unknown";
5420Sstevel@tonic-gate }
5430Sstevel@tonic-gate 
5440Sstevel@tonic-gate char *
key_ssh_name(const Key * k)545*5243Sjp161948 key_ssh_name(const Key *k)
5460Sstevel@tonic-gate {
5470Sstevel@tonic-gate 	switch (k->type) {
5480Sstevel@tonic-gate 	case KEY_RSA:
5490Sstevel@tonic-gate 		return "ssh-rsa";
5500Sstevel@tonic-gate 		break;
5510Sstevel@tonic-gate 	case KEY_DSA:
5520Sstevel@tonic-gate 		return "ssh-dss";
5530Sstevel@tonic-gate 		break;
5540Sstevel@tonic-gate 	}
5550Sstevel@tonic-gate 	return "ssh-unknown";
5560Sstevel@tonic-gate }
5570Sstevel@tonic-gate 
5580Sstevel@tonic-gate u_int
key_size(Key * k)5590Sstevel@tonic-gate key_size(Key *k)
5600Sstevel@tonic-gate {
5610Sstevel@tonic-gate 	switch (k->type) {
5620Sstevel@tonic-gate 	case KEY_RSA1:
5630Sstevel@tonic-gate 	case KEY_RSA:
5640Sstevel@tonic-gate 		return BN_num_bits(k->rsa->n);
5650Sstevel@tonic-gate 		break;
5660Sstevel@tonic-gate 	case KEY_DSA:
5670Sstevel@tonic-gate 		return BN_num_bits(k->dsa->p);
5680Sstevel@tonic-gate 		break;
5690Sstevel@tonic-gate 	}
5700Sstevel@tonic-gate 	return 0;
5710Sstevel@tonic-gate }
5720Sstevel@tonic-gate 
5730Sstevel@tonic-gate static RSA *
rsa_generate_private_key(u_int bits)5740Sstevel@tonic-gate rsa_generate_private_key(u_int bits)
5750Sstevel@tonic-gate {
5760Sstevel@tonic-gate 	RSA *private;
5770Sstevel@tonic-gate 	private = RSA_generate_key(bits, 35, NULL, NULL);
5780Sstevel@tonic-gate 	if (private == NULL)
5790Sstevel@tonic-gate 		fatal("rsa_generate_private_key: key generation failed.");
5800Sstevel@tonic-gate 	return private;
5810Sstevel@tonic-gate }
5820Sstevel@tonic-gate 
5830Sstevel@tonic-gate static DSA*
dsa_generate_private_key(u_int bits)5840Sstevel@tonic-gate dsa_generate_private_key(u_int bits)
5850Sstevel@tonic-gate {
5860Sstevel@tonic-gate 	DSA *private = DSA_generate_parameters(bits, NULL, 0, NULL, NULL, NULL, NULL);
5870Sstevel@tonic-gate 	if (private == NULL)
5880Sstevel@tonic-gate 		fatal("dsa_generate_private_key: DSA_generate_parameters failed");
5890Sstevel@tonic-gate 	if (!DSA_generate_key(private))
5900Sstevel@tonic-gate 		fatal("dsa_generate_private_key: DSA_generate_key failed.");
5910Sstevel@tonic-gate 	if (private == NULL)
5920Sstevel@tonic-gate 		fatal("dsa_generate_private_key: NULL.");
5930Sstevel@tonic-gate 	return private;
5940Sstevel@tonic-gate }
5950Sstevel@tonic-gate 
5960Sstevel@tonic-gate Key *
key_generate(int type,u_int bits)5970Sstevel@tonic-gate key_generate(int type, u_int bits)
5980Sstevel@tonic-gate {
5990Sstevel@tonic-gate 	Key *k = key_new(KEY_UNSPEC);
6000Sstevel@tonic-gate 	switch (type) {
6010Sstevel@tonic-gate 	case KEY_DSA:
6020Sstevel@tonic-gate 		k->dsa = dsa_generate_private_key(bits);
6030Sstevel@tonic-gate 		break;
6040Sstevel@tonic-gate 	case KEY_RSA:
6050Sstevel@tonic-gate 	case KEY_RSA1:
6060Sstevel@tonic-gate 		k->rsa = rsa_generate_private_key(bits);
6070Sstevel@tonic-gate 		break;
6080Sstevel@tonic-gate 	default:
6090Sstevel@tonic-gate 		fatal("key_generate: unknown type %d", type);
6100Sstevel@tonic-gate 	}
6110Sstevel@tonic-gate 	k->type = type;
6120Sstevel@tonic-gate 	return k;
6130Sstevel@tonic-gate }
6140Sstevel@tonic-gate 
6150Sstevel@tonic-gate Key *
key_from_private(Key * k)6160Sstevel@tonic-gate key_from_private(Key *k)
6170Sstevel@tonic-gate {
6180Sstevel@tonic-gate 	Key *n = NULL;
6190Sstevel@tonic-gate 	switch (k->type) {
6200Sstevel@tonic-gate 	case KEY_DSA:
6210Sstevel@tonic-gate 		n = key_new(k->type);
6220Sstevel@tonic-gate 		BN_copy(n->dsa->p, k->dsa->p);
6230Sstevel@tonic-gate 		BN_copy(n->dsa->q, k->dsa->q);
6240Sstevel@tonic-gate 		BN_copy(n->dsa->g, k->dsa->g);
6250Sstevel@tonic-gate 		BN_copy(n->dsa->pub_key, k->dsa->pub_key);
6260Sstevel@tonic-gate 		break;
6270Sstevel@tonic-gate 	case KEY_RSA:
6280Sstevel@tonic-gate 	case KEY_RSA1:
6290Sstevel@tonic-gate 		n = key_new(k->type);
6300Sstevel@tonic-gate 		BN_copy(n->rsa->n, k->rsa->n);
6310Sstevel@tonic-gate 		BN_copy(n->rsa->e, k->rsa->e);
6320Sstevel@tonic-gate 		break;
6330Sstevel@tonic-gate 	default:
6340Sstevel@tonic-gate 		fatal("key_from_private: unknown type %d", k->type);
6350Sstevel@tonic-gate 		break;
6360Sstevel@tonic-gate 	}
6370Sstevel@tonic-gate 	return n;
6380Sstevel@tonic-gate }
6390Sstevel@tonic-gate 
6400Sstevel@tonic-gate int
key_type_from_name(char * name)6410Sstevel@tonic-gate key_type_from_name(char *name)
6420Sstevel@tonic-gate {
6430Sstevel@tonic-gate 	if (strcmp(name, "rsa1") == 0) {
6440Sstevel@tonic-gate 		return KEY_RSA1;
6450Sstevel@tonic-gate 	} else if (strcmp(name, "rsa") == 0) {
6460Sstevel@tonic-gate 		return KEY_RSA;
6470Sstevel@tonic-gate 	} else if (strcmp(name, "dsa") == 0) {
6480Sstevel@tonic-gate 		return KEY_DSA;
6490Sstevel@tonic-gate 	} else if (strcmp(name, "ssh-rsa") == 0) {
6500Sstevel@tonic-gate 		return KEY_RSA;
6510Sstevel@tonic-gate 	} else if (strcmp(name, "ssh-dss") == 0) {
6520Sstevel@tonic-gate 		return KEY_DSA;
6530Sstevel@tonic-gate 	} else if (strcmp(name, "null") == 0){
6540Sstevel@tonic-gate 		return KEY_NULL;
6550Sstevel@tonic-gate 	}
6560Sstevel@tonic-gate 	debug2("key_type_from_name: unknown key type '%s'", name);
6570Sstevel@tonic-gate 	return KEY_UNSPEC;
6580Sstevel@tonic-gate }
6590Sstevel@tonic-gate 
6600Sstevel@tonic-gate int
key_names_valid2(const char * names)6610Sstevel@tonic-gate key_names_valid2(const char *names)
6620Sstevel@tonic-gate {
6630Sstevel@tonic-gate 	char *s, *cp, *p;
6640Sstevel@tonic-gate 
6650Sstevel@tonic-gate 	if (names == NULL || strcmp(names, "") == 0)
6660Sstevel@tonic-gate 		return 0;
6670Sstevel@tonic-gate 	s = cp = xstrdup(names);
6680Sstevel@tonic-gate 	for ((p = strsep(&cp, ",")); p && *p != '\0';
6690Sstevel@tonic-gate 	    (p = strsep(&cp, ","))) {
6700Sstevel@tonic-gate 		switch (key_type_from_name(p)) {
6710Sstevel@tonic-gate 		case KEY_RSA1:
6720Sstevel@tonic-gate 		case KEY_UNSPEC:
6730Sstevel@tonic-gate 			xfree(s);
6740Sstevel@tonic-gate 			return 0;
6750Sstevel@tonic-gate 		}
6760Sstevel@tonic-gate 	}
6770Sstevel@tonic-gate 	debug3("key names ok: [%s]", names);
6780Sstevel@tonic-gate 	xfree(s);
6790Sstevel@tonic-gate 	return 1;
6800Sstevel@tonic-gate }
6810Sstevel@tonic-gate 
6820Sstevel@tonic-gate Key *
key_from_blob(u_char * blob,int blen)6830Sstevel@tonic-gate key_from_blob(u_char *blob, int blen)
6840Sstevel@tonic-gate {
6850Sstevel@tonic-gate 	Buffer b;
6860Sstevel@tonic-gate 	char *ktype;
6870Sstevel@tonic-gate 	int rlen, type;
6880Sstevel@tonic-gate 	Key *key = NULL;
6890Sstevel@tonic-gate 
6900Sstevel@tonic-gate #ifdef DEBUG_PK
6910Sstevel@tonic-gate 	dump_base64(stderr, blob, blen);
6920Sstevel@tonic-gate #endif
6930Sstevel@tonic-gate 	buffer_init(&b);
6940Sstevel@tonic-gate 	buffer_append(&b, blob, blen);
6952757Sjp161948 	if ((ktype = buffer_get_string_ret(&b, NULL)) == NULL) {
6962757Sjp161948 		error("key_from_blob: can't read key type");
6972757Sjp161948 		goto out;
6982757Sjp161948 	}
6992757Sjp161948 
7000Sstevel@tonic-gate 	type = key_type_from_name(ktype);
7010Sstevel@tonic-gate 
7020Sstevel@tonic-gate 	switch (type) {
7030Sstevel@tonic-gate 	case KEY_RSA:
7040Sstevel@tonic-gate 		key = key_new(type);
7052757Sjp161948 		if (buffer_get_bignum2_ret(&b, key->rsa->e) == -1 ||
7062757Sjp161948 		    buffer_get_bignum2_ret(&b, key->rsa->n) == -1) {
7072757Sjp161948 			error("key_from_blob: can't read rsa key");
7082757Sjp161948 			key_free(key);
7092757Sjp161948 			key = NULL;
7102757Sjp161948 			goto out;
7112757Sjp161948 		}
7120Sstevel@tonic-gate #ifdef DEBUG_PK
7130Sstevel@tonic-gate 		RSA_print_fp(stderr, key->rsa, 8);
7140Sstevel@tonic-gate #endif
7150Sstevel@tonic-gate 		break;
7160Sstevel@tonic-gate 	case KEY_DSA:
7170Sstevel@tonic-gate 		key = key_new(type);
7182757Sjp161948 		if (buffer_get_bignum2_ret(&b, key->dsa->p) == -1 ||
7192757Sjp161948 		    buffer_get_bignum2_ret(&b, key->dsa->q) == -1 ||
7202757Sjp161948 		    buffer_get_bignum2_ret(&b, key->dsa->g) == -1 ||
7212757Sjp161948 		    buffer_get_bignum2_ret(&b, key->dsa->pub_key) == -1) {
7222757Sjp161948 			error("key_from_blob: can't read dsa key");
7232757Sjp161948 			key_free(key);
7242757Sjp161948 			key = NULL;
7252757Sjp161948 			goto out;
7262757Sjp161948 		}
7270Sstevel@tonic-gate #ifdef DEBUG_PK
7280Sstevel@tonic-gate 		DSA_print_fp(stderr, key->dsa, 8);
7290Sstevel@tonic-gate #endif
7300Sstevel@tonic-gate 		break;
7310Sstevel@tonic-gate 	case KEY_UNSPEC:
7320Sstevel@tonic-gate 		key = key_new(type);
7330Sstevel@tonic-gate 		break;
7340Sstevel@tonic-gate 	default:
7350Sstevel@tonic-gate 		error("key_from_blob: cannot handle type %s", ktype);
7362757Sjp161948 		goto out;
7370Sstevel@tonic-gate 	}
7380Sstevel@tonic-gate 	rlen = buffer_len(&b);
7390Sstevel@tonic-gate 	if (key != NULL && rlen != 0)
7400Sstevel@tonic-gate 		error("key_from_blob: remaining bytes in key blob %d", rlen);
7412757Sjp161948  out:
7422757Sjp161948 	if (ktype != NULL)
7432757Sjp161948 		xfree(ktype);
7440Sstevel@tonic-gate 	buffer_free(&b);
7450Sstevel@tonic-gate 	return key;
7460Sstevel@tonic-gate }
7470Sstevel@tonic-gate 
7480Sstevel@tonic-gate int
key_to_blob(const Key * key,u_char ** blobp,u_int * lenp)749*5243Sjp161948 key_to_blob(const Key *key, u_char **blobp, u_int *lenp)
7500Sstevel@tonic-gate {
7510Sstevel@tonic-gate 	Buffer b;
7520Sstevel@tonic-gate 	int len;
7530Sstevel@tonic-gate 
7540Sstevel@tonic-gate 	if (key == NULL) {
7550Sstevel@tonic-gate 		error("key_to_blob: key == NULL");
7560Sstevel@tonic-gate 		return 0;
7570Sstevel@tonic-gate 	}
7580Sstevel@tonic-gate 	buffer_init(&b);
7590Sstevel@tonic-gate 	switch (key->type) {
7600Sstevel@tonic-gate 	case KEY_DSA:
7610Sstevel@tonic-gate 		buffer_put_cstring(&b, key_ssh_name(key));
7620Sstevel@tonic-gate 		buffer_put_bignum2(&b, key->dsa->p);
7630Sstevel@tonic-gate 		buffer_put_bignum2(&b, key->dsa->q);
7640Sstevel@tonic-gate 		buffer_put_bignum2(&b, key->dsa->g);
7650Sstevel@tonic-gate 		buffer_put_bignum2(&b, key->dsa->pub_key);
7660Sstevel@tonic-gate 		break;
7670Sstevel@tonic-gate 	case KEY_RSA:
7680Sstevel@tonic-gate 		buffer_put_cstring(&b, key_ssh_name(key));
7690Sstevel@tonic-gate 		buffer_put_bignum2(&b, key->rsa->e);
7700Sstevel@tonic-gate 		buffer_put_bignum2(&b, key->rsa->n);
7710Sstevel@tonic-gate 		break;
7720Sstevel@tonic-gate 	default:
7730Sstevel@tonic-gate 		error("key_to_blob: unsupported key type %d", key->type);
7740Sstevel@tonic-gate 		buffer_free(&b);
7750Sstevel@tonic-gate 		return 0;
7760Sstevel@tonic-gate 	}
7770Sstevel@tonic-gate 	len = buffer_len(&b);
7780Sstevel@tonic-gate 	if (lenp != NULL)
7790Sstevel@tonic-gate 		*lenp = len;
7800Sstevel@tonic-gate 	if (blobp != NULL) {
7810Sstevel@tonic-gate 		*blobp = xmalloc(len);
7820Sstevel@tonic-gate 		memcpy(*blobp, buffer_ptr(&b), len);
7830Sstevel@tonic-gate 	}
7840Sstevel@tonic-gate 	memset(buffer_ptr(&b), 0, len);
7850Sstevel@tonic-gate 	buffer_free(&b);
7860Sstevel@tonic-gate 	return len;
7870Sstevel@tonic-gate }
7880Sstevel@tonic-gate 
7890Sstevel@tonic-gate int
key_sign(Key * key,u_char ** sigp,u_int * lenp,u_char * data,u_int datalen)7900Sstevel@tonic-gate key_sign(
7910Sstevel@tonic-gate     Key *key,
7920Sstevel@tonic-gate     u_char **sigp, u_int *lenp,
7930Sstevel@tonic-gate     u_char *data, u_int datalen)
7940Sstevel@tonic-gate {
7950Sstevel@tonic-gate 	switch (key->type) {
7960Sstevel@tonic-gate 	case KEY_DSA:
7970Sstevel@tonic-gate 		return ssh_dss_sign(key, sigp, lenp, data, datalen);
7980Sstevel@tonic-gate 		break;
7990Sstevel@tonic-gate 	case KEY_RSA:
8000Sstevel@tonic-gate 		return ssh_rsa_sign(key, sigp, lenp, data, datalen);
8010Sstevel@tonic-gate 		break;
8020Sstevel@tonic-gate 	default:
8030Sstevel@tonic-gate 		error("key_sign: illegal key type %d", key->type);
8040Sstevel@tonic-gate 		return -1;
8050Sstevel@tonic-gate 		break;
8060Sstevel@tonic-gate 	}
8070Sstevel@tonic-gate }
8080Sstevel@tonic-gate 
8090Sstevel@tonic-gate /*
8100Sstevel@tonic-gate  * key_verify returns 1 for a correct signature, 0 for an incorrect signature
8110Sstevel@tonic-gate  * and -1 on error.
8120Sstevel@tonic-gate  */
8130Sstevel@tonic-gate int
key_verify(Key * key,u_char * signature,u_int signaturelen,u_char * data,u_int datalen)8140Sstevel@tonic-gate key_verify(
8150Sstevel@tonic-gate     Key *key,
8160Sstevel@tonic-gate     u_char *signature, u_int signaturelen,
8170Sstevel@tonic-gate     u_char *data, u_int datalen)
8180Sstevel@tonic-gate {
8190Sstevel@tonic-gate 	if (signaturelen == 0)
8200Sstevel@tonic-gate 		return -1;
8210Sstevel@tonic-gate 
8220Sstevel@tonic-gate 	switch (key->type) {
8230Sstevel@tonic-gate 	case KEY_DSA:
8240Sstevel@tonic-gate 		return ssh_dss_verify(key, signature, signaturelen, data, datalen);
8250Sstevel@tonic-gate 		break;
8260Sstevel@tonic-gate 	case KEY_RSA:
8270Sstevel@tonic-gate 		return ssh_rsa_verify(key, signature, signaturelen, data, datalen);
8280Sstevel@tonic-gate 		break;
8290Sstevel@tonic-gate 	default:
8300Sstevel@tonic-gate 		error("key_verify: illegal key type %d", key->type);
8310Sstevel@tonic-gate 		return -1;
8320Sstevel@tonic-gate 		break;
8330Sstevel@tonic-gate 	}
8340Sstevel@tonic-gate }
8350Sstevel@tonic-gate 
8360Sstevel@tonic-gate /* Converts a private to a public key */
8370Sstevel@tonic-gate Key *
key_demote(Key * k)8380Sstevel@tonic-gate key_demote(Key *k)
8390Sstevel@tonic-gate {
8400Sstevel@tonic-gate 	Key *pk;
8410Sstevel@tonic-gate 
8420Sstevel@tonic-gate 	pk = xmalloc(sizeof(*pk));
8430Sstevel@tonic-gate 	pk->type = k->type;
8440Sstevel@tonic-gate 	pk->flags = k->flags;
8450Sstevel@tonic-gate 	pk->dsa = NULL;
8460Sstevel@tonic-gate 	pk->rsa = NULL;
8470Sstevel@tonic-gate 
8480Sstevel@tonic-gate 	switch (k->type) {
8490Sstevel@tonic-gate 	case KEY_RSA1:
8500Sstevel@tonic-gate 	case KEY_RSA:
8510Sstevel@tonic-gate 		if ((pk->rsa = RSA_new()) == NULL)
8520Sstevel@tonic-gate 			fatal("key_demote: RSA_new failed");
8530Sstevel@tonic-gate 		if ((pk->rsa->e = BN_dup(k->rsa->e)) == NULL)
8540Sstevel@tonic-gate 			fatal("key_demote: BN_dup failed");
8550Sstevel@tonic-gate 		if ((pk->rsa->n = BN_dup(k->rsa->n)) == NULL)
8560Sstevel@tonic-gate 			fatal("key_demote: BN_dup failed");
8570Sstevel@tonic-gate 		break;
8580Sstevel@tonic-gate 	case KEY_DSA:
8590Sstevel@tonic-gate 		if ((pk->dsa = DSA_new()) == NULL)
8600Sstevel@tonic-gate 			fatal("key_demote: DSA_new failed");
8610Sstevel@tonic-gate 		if ((pk->dsa->p = BN_dup(k->dsa->p)) == NULL)
8620Sstevel@tonic-gate 			fatal("key_demote: BN_dup failed");
8630Sstevel@tonic-gate 		if ((pk->dsa->q = BN_dup(k->dsa->q)) == NULL)
8640Sstevel@tonic-gate 			fatal("key_demote: BN_dup failed");
8650Sstevel@tonic-gate 		if ((pk->dsa->g = BN_dup(k->dsa->g)) == NULL)
8660Sstevel@tonic-gate 			fatal("key_demote: BN_dup failed");
8670Sstevel@tonic-gate 		if ((pk->dsa->pub_key = BN_dup(k->dsa->pub_key)) == NULL)
8680Sstevel@tonic-gate 			fatal("key_demote: BN_dup failed");
8690Sstevel@tonic-gate 		break;
8700Sstevel@tonic-gate 	default:
8710Sstevel@tonic-gate 		fatal("key_free: bad key type %d", k->type);
8720Sstevel@tonic-gate 		break;
8730Sstevel@tonic-gate 	}
8740Sstevel@tonic-gate 
8750Sstevel@tonic-gate 	return (pk);
8760Sstevel@tonic-gate }
877