19a747e4fSDavid du Colombier // PAK is an encrypted key exchange protocol designed by Philip MacKenzie et al.
29a747e4fSDavid du Colombier // It is patented and use outside Plan 9 requires you get a license.
39a747e4fSDavid du Colombier // (All other EKE protocols are patented as well, by Lucent or others.)
49a747e4fSDavid du Colombier #include <u.h>
59a747e4fSDavid du Colombier #include <libc.h>
69a747e4fSDavid du Colombier #include <mp.h>
79a747e4fSDavid du Colombier #include <libsec.h>
89a747e4fSDavid du Colombier #include "SConn.h"
99a747e4fSDavid du Colombier #include "secstore.h"
109a747e4fSDavid du Colombier
119a747e4fSDavid du Colombier extern int verbose;
129a747e4fSDavid du Colombier
13b27b55e2SDavid du Colombier char VERSION[] = "secstore";
149a747e4fSDavid du Colombier static char *feedback[] = {"alpha","bravo","charlie","delta","echo","foxtrot","golf","hotel"};
159a747e4fSDavid du Colombier
169a747e4fSDavid du Colombier typedef struct PAKparams{
179a747e4fSDavid du Colombier mpint *q, *p, *r, *g;
189a747e4fSDavid du Colombier } PAKparams;
199a747e4fSDavid du Colombier
209a747e4fSDavid du Colombier static PAKparams *pak;
219a747e4fSDavid du Colombier
229a747e4fSDavid du Colombier // from seed EB7B6E35F7CD37B511D96C67D6688CC4DD440E1E
239a747e4fSDavid du Colombier static void
initPAKparams(void)249a747e4fSDavid du Colombier initPAKparams(void)
259a747e4fSDavid du Colombier {
269a747e4fSDavid du Colombier if(pak)
279a747e4fSDavid du Colombier return;
289a747e4fSDavid du Colombier pak = (PAKparams*)emalloc(sizeof(*pak));
299a747e4fSDavid du Colombier pak->q = strtomp("E0F0EF284E10796C5A2A511E94748BA03C795C13", nil, 16, nil);
309a747e4fSDavid du Colombier pak->p = strtomp("C41CFBE4D4846F67A3DF7DE9921A49D3B42DC33728427AB159CEC8CBB"
319a747e4fSDavid du Colombier "DB12B5F0C244F1A734AEB9840804EA3C25036AD1B61AFF3ABBC247CD4B384224567A86"
329a747e4fSDavid du Colombier "3A6F020E7EE9795554BCD08ABAD7321AF27E1E92E3DB1C6E7E94FAAE590AE9C48F96D9"
339a747e4fSDavid du Colombier "3D178E809401ABE8A534A1EC44359733475A36A70C7B425125062B1142D",
349a747e4fSDavid du Colombier nil, 16, nil);
359a747e4fSDavid du Colombier pak->r = strtomp("DF310F4E54A5FEC5D86D3E14863921E834113E060F90052AD332B3241"
369a747e4fSDavid du Colombier "CEF2497EFA0303D6344F7C819691A0F9C4A773815AF8EAECFB7EC1D98F039F17A32A7E"
379a747e4fSDavid du Colombier "887D97251A927D093F44A55577F4D70444AEBD06B9B45695EC23962B175F266895C67D"
389a747e4fSDavid du Colombier "21C4656848614D888A4", nil, 16, nil);
399a747e4fSDavid du Colombier pak->g = strtomp("2F1C308DC46B9A44B52DF7DACCE1208CCEF72F69C743ADD4D23271734"
409a747e4fSDavid du Colombier "44ED6E65E074694246E07F9FD4AE26E0FDDD9F54F813C40CB9BCD4338EA6F242AB94CD"
419a747e4fSDavid du Colombier "410E676C290368A16B1A3594877437E516C53A6EEE5493A038A017E955E218E7819734"
429a747e4fSDavid du Colombier "E3E2A6E0BAE08B14258F8C03CC1B30E0DDADFCF7CEDF0727684D3D255F1",
439a747e4fSDavid du Colombier nil, 16, nil);
449a747e4fSDavid du Colombier }
459a747e4fSDavid du Colombier
469a747e4fSDavid du Colombier // H = (sha(ver,C,sha(passphrase)))^r mod p,
479a747e4fSDavid du Colombier // a hash function expensive to attack by brute force.
489a747e4fSDavid du Colombier static void
longhash(char * ver,char * C,uchar * passwd,mpint * H)499a747e4fSDavid du Colombier longhash(char *ver, char *C, uchar *passwd, mpint *H)
509a747e4fSDavid du Colombier {
519a747e4fSDavid du Colombier uchar *Cp;
529a747e4fSDavid du Colombier int i, n, nver, nC;
539a747e4fSDavid du Colombier uchar buf[140], key[1];
549a747e4fSDavid du Colombier
559a747e4fSDavid du Colombier nver = strlen(ver);
569a747e4fSDavid du Colombier nC = strlen(C);
579a747e4fSDavid du Colombier n = nver + nC + SHA1dlen;
589a747e4fSDavid du Colombier Cp = (uchar*)emalloc(n);
599a747e4fSDavid du Colombier memmove(Cp, ver, nver);
609a747e4fSDavid du Colombier memmove(Cp+nver, C, nC);
619a747e4fSDavid du Colombier memmove(Cp+nver+nC, passwd, SHA1dlen);
629a747e4fSDavid du Colombier for(i = 0; i < 7; i++){
639a747e4fSDavid du Colombier key[0] = 'A'+i;
649a747e4fSDavid du Colombier hmac_sha1(Cp, n, key, sizeof key, buf+i*SHA1dlen, nil);
659a747e4fSDavid du Colombier }
669a747e4fSDavid du Colombier memset(Cp, 0, n);
679a747e4fSDavid du Colombier free(Cp);
689a747e4fSDavid du Colombier betomp(buf, sizeof buf, H);
699a747e4fSDavid du Colombier mpmod(H, pak->p, H);
709a747e4fSDavid du Colombier mpexp(H, pak->r, pak->p, H);
719a747e4fSDavid du Colombier }
729a747e4fSDavid du Colombier
739a747e4fSDavid du Colombier // Hi = H^-1 mod p
749a747e4fSDavid du Colombier char *
PAK_Hi(char * C,char * passphrase,mpint * H,mpint * Hi)759a747e4fSDavid du Colombier PAK_Hi(char *C, char *passphrase, mpint *H, mpint *Hi)
769a747e4fSDavid du Colombier {
779a747e4fSDavid du Colombier uchar passhash[SHA1dlen];
789a747e4fSDavid du Colombier
799a747e4fSDavid du Colombier sha1((uchar *)passphrase, strlen(passphrase), passhash, nil);
809a747e4fSDavid du Colombier initPAKparams();
819a747e4fSDavid du Colombier longhash(VERSION, C, passhash, H);
829a747e4fSDavid du Colombier mpinvert(H, pak->p, Hi);
839a747e4fSDavid du Colombier return mptoa(Hi, 64, nil, 0);
849a747e4fSDavid du Colombier }
859a747e4fSDavid du Colombier
869a747e4fSDavid du Colombier // another, faster, hash function for each party to
879a747e4fSDavid du Colombier // confirm that the other has the right secrets.
889a747e4fSDavid du Colombier static void
shorthash(char * mess,char * C,char * S,char * m,char * mu,char * sigma,char * Hi,uchar * digest)899a747e4fSDavid du Colombier shorthash(char *mess, char *C, char *S, char *m, char *mu, char *sigma, char *Hi, uchar *digest)
909a747e4fSDavid du Colombier {
919a747e4fSDavid du Colombier SHA1state *state;
929a747e4fSDavid du Colombier
939a747e4fSDavid du Colombier state = sha1((uchar*)mess, strlen(mess), 0, 0);
949a747e4fSDavid du Colombier state = sha1((uchar*)C, strlen(C), 0, state);
959a747e4fSDavid du Colombier state = sha1((uchar*)S, strlen(S), 0, state);
969a747e4fSDavid du Colombier state = sha1((uchar*)m, strlen(m), 0, state);
979a747e4fSDavid du Colombier state = sha1((uchar*)mu, strlen(mu), 0, state);
989a747e4fSDavid du Colombier state = sha1((uchar*)sigma, strlen(sigma), 0, state);
999a747e4fSDavid du Colombier state = sha1((uchar*)Hi, strlen(Hi), 0, state);
1009a747e4fSDavid du Colombier state = sha1((uchar*)mess, strlen(mess), 0, state);
1019a747e4fSDavid du Colombier state = sha1((uchar*)C, strlen(C), 0, state);
1029a747e4fSDavid du Colombier state = sha1((uchar*)S, strlen(S), 0, state);
1039a747e4fSDavid du Colombier state = sha1((uchar*)m, strlen(m), 0, state);
1049a747e4fSDavid du Colombier state = sha1((uchar*)mu, strlen(mu), 0, state);
1059a747e4fSDavid du Colombier state = sha1((uchar*)sigma, strlen(sigma), 0, state);
1069a747e4fSDavid du Colombier sha1((uchar*)Hi, strlen(Hi), digest, state);
1079a747e4fSDavid du Colombier }
1089a747e4fSDavid du Colombier
1099a747e4fSDavid du Colombier // On input, conn provides an open channel to the server;
1109a747e4fSDavid du Colombier // C is the name this client calls itself;
1119a747e4fSDavid du Colombier // pass is the user's passphrase
1129a747e4fSDavid du Colombier // On output, session secret has been set in conn
1139a747e4fSDavid du Colombier // (unless return code is negative, which means failure).
1149a747e4fSDavid du Colombier // If pS is not nil, it is set to the (alloc'd) name the server calls itself.
1159a747e4fSDavid du Colombier int
PAKclient(SConn * conn,char * C,char * pass,char ** pS)1169a747e4fSDavid du Colombier PAKclient(SConn *conn, char *C, char *pass, char **pS)
1179a747e4fSDavid du Colombier {
1189a747e4fSDavid du Colombier char *mess, *mess2, *eol, *S, *hexmu, *ks, *hexm, *hexsigma = nil, *hexHi;
1199a747e4fSDavid du Colombier char kc[2*SHA1dlen+1];
1209a747e4fSDavid du Colombier uchar digest[SHA1dlen];
1219a747e4fSDavid du Colombier int rc = -1, n;
1229a747e4fSDavid du Colombier mpint *x, *m = mpnew(0), *mu = mpnew(0), *sigma = mpnew(0);
1239a747e4fSDavid du Colombier mpint *H = mpnew(0), *Hi = mpnew(0);
1249a747e4fSDavid du Colombier
1259a747e4fSDavid du Colombier hexHi = PAK_Hi(C, pass, H, Hi);
1269a747e4fSDavid du Colombier if(verbose)
1279a747e4fSDavid du Colombier fprint(2, "%s\n", feedback[H->p[0]&0x7]); // provide a clue to catch typos
1289a747e4fSDavid du Colombier
1299a747e4fSDavid du Colombier // random 1<=x<=q-1; send C, m=g**x H
1309a747e4fSDavid du Colombier x = mprand(240, genrandom, nil);
1319a747e4fSDavid du Colombier mpmod(x, pak->q, x);
1329a747e4fSDavid du Colombier if(mpcmp(x, mpzero) == 0)
1339a747e4fSDavid du Colombier mpassign(mpone, x);
1349a747e4fSDavid du Colombier mpexp(pak->g, x, pak->p, m);
1359a747e4fSDavid du Colombier mpmul(m, H, m);
1369a747e4fSDavid du Colombier mpmod(m, pak->p, m);
1379a747e4fSDavid du Colombier hexm = mptoa(m, 64, nil, 0);
1389a747e4fSDavid du Colombier mess = (char*)emalloc(2*Maxmsg+2);
1399a747e4fSDavid du Colombier mess2 = mess+Maxmsg+1;
1409a747e4fSDavid du Colombier snprint(mess, Maxmsg, "%s\tPAK\nC=%s\nm=%s\n", VERSION, C, hexm);
1419a747e4fSDavid du Colombier conn->write(conn, (uchar*)mess, strlen(mess));
1429a747e4fSDavid du Colombier
1439a747e4fSDavid du Colombier // recv g**y, S, check hash1(g**xy)
1449a747e4fSDavid du Colombier if(readstr(conn, mess) < 0){
145*d854de59SDavid du Colombier fprint(2, "%s: error: %s\n", argv0, mess);
1469a747e4fSDavid du Colombier writerr(conn, "couldn't read g**y");
1479a747e4fSDavid du Colombier goto done;
1489a747e4fSDavid du Colombier }
1499a747e4fSDavid du Colombier eol = strchr(mess, '\n');
1509a747e4fSDavid du Colombier if(strncmp("mu=", mess, 3) != 0 || !eol || strncmp("\nk=", eol, 3) != 0){
1519a747e4fSDavid du Colombier writerr(conn, "verifier syntax error");
1529a747e4fSDavid du Colombier goto done;
1539a747e4fSDavid du Colombier }
1549a747e4fSDavid du Colombier hexmu = mess+3;
1559a747e4fSDavid du Colombier *eol = 0;
1569a747e4fSDavid du Colombier ks = eol+3;
1579a747e4fSDavid du Colombier eol = strchr(ks, '\n');
1589a747e4fSDavid du Colombier if(!eol || strncmp("\nS=", eol, 3) != 0){
1599a747e4fSDavid du Colombier writerr(conn, "verifier syntax error for secstore 1.0");
1609a747e4fSDavid du Colombier goto done;
1619a747e4fSDavid du Colombier }
1629a747e4fSDavid du Colombier *eol = 0;
1639a747e4fSDavid du Colombier S = eol+3;
1649a747e4fSDavid du Colombier eol = strchr(S, '\n');
1659a747e4fSDavid du Colombier if(!eol){
1669a747e4fSDavid du Colombier writerr(conn, "verifier syntax error for secstore 1.0");
1679a747e4fSDavid du Colombier goto done;
1689a747e4fSDavid du Colombier }
1699a747e4fSDavid du Colombier *eol = 0;
1709a747e4fSDavid du Colombier if(pS)
1719a747e4fSDavid du Colombier *pS = estrdup(S);
1729a747e4fSDavid du Colombier strtomp(hexmu, nil, 64, mu);
1739a747e4fSDavid du Colombier mpexp(mu, x, pak->p, sigma);
1749a747e4fSDavid du Colombier hexsigma = mptoa(sigma, 64, nil, 0);
1759a747e4fSDavid du Colombier shorthash("server", C, S, hexm, hexmu, hexsigma, hexHi, digest);
1769a747e4fSDavid du Colombier enc64(kc, sizeof kc, digest, SHA1dlen);
1779a747e4fSDavid du Colombier if(strcmp(ks, kc) != 0){
1789a747e4fSDavid du Colombier writerr(conn, "verifier didn't match");
1799a747e4fSDavid du Colombier goto done;
1809a747e4fSDavid du Colombier }
1819a747e4fSDavid du Colombier
1829a747e4fSDavid du Colombier // send hash2(g**xy)
1839a747e4fSDavid du Colombier shorthash("client", C, S, hexm, hexmu, hexsigma, hexHi, digest);
1849a747e4fSDavid du Colombier enc64(kc, sizeof kc, digest, SHA1dlen);
1859a747e4fSDavid du Colombier snprint(mess2, Maxmsg, "k'=%s\n", kc);
1869a747e4fSDavid du Colombier conn->write(conn, (uchar*)mess2, strlen(mess2));
1879a747e4fSDavid du Colombier
1889a747e4fSDavid du Colombier // set session key
1899a747e4fSDavid du Colombier shorthash("session", C, S, hexm, hexmu, hexsigma, hexHi, digest);
1909a747e4fSDavid du Colombier memset(hexsigma, 0, strlen(hexsigma));
1919a747e4fSDavid du Colombier n = conn->secret(conn, digest, 0);
1929a747e4fSDavid du Colombier memset(digest, 0, SHA1dlen);
193be0c1e85SDavid du Colombier if(n < 0){
1949a747e4fSDavid du Colombier writerr(conn, "can't set secret");
1959a747e4fSDavid du Colombier goto done;
1969a747e4fSDavid du Colombier }
1979a747e4fSDavid du Colombier
1989a747e4fSDavid du Colombier rc = 0;
1999a747e4fSDavid du Colombier done:
2009a747e4fSDavid du Colombier mpfree(x);
2019a747e4fSDavid du Colombier mpfree(sigma);
2029a747e4fSDavid du Colombier mpfree(mu);
2039a747e4fSDavid du Colombier mpfree(m);
2049a747e4fSDavid du Colombier mpfree(Hi);
2059a747e4fSDavid du Colombier mpfree(H);
2069a747e4fSDavid du Colombier free(hexsigma);
2079a747e4fSDavid du Colombier free(hexHi);
2089a747e4fSDavid du Colombier free(hexm);
2099a747e4fSDavid du Colombier free(mess);
2109a747e4fSDavid du Colombier return rc;
2119a747e4fSDavid du Colombier }
2129a747e4fSDavid du Colombier
2139a747e4fSDavid du Colombier // On input,
2149a747e4fSDavid du Colombier // mess contains first message;
2159a747e4fSDavid du Colombier // name is name this server should call itself.
2169a747e4fSDavid du Colombier // On output, session secret has been set in conn;
2179a747e4fSDavid du Colombier // if pw!=nil, then *pw points to PW struct for authenticated user.
2189a747e4fSDavid du Colombier // returns -1 if error
2199a747e4fSDavid du Colombier int
PAKserver(SConn * conn,char * S,char * mess,PW ** pwp)2209a747e4fSDavid du Colombier PAKserver(SConn *conn, char *S, char *mess, PW **pwp)
2219a747e4fSDavid du Colombier {
2229a747e4fSDavid du Colombier int rc = -1, n;
2239a747e4fSDavid du Colombier char mess2[Maxmsg+1], *eol;
2249a747e4fSDavid du Colombier char *C, ks[41], *kc, *hexm, *hexmu = nil, *hexsigma = nil, *hexHi = nil;
2259a747e4fSDavid du Colombier uchar digest[SHA1dlen];
2269a747e4fSDavid du Colombier mpint *H = mpnew(0), *Hi = mpnew(0);
2279a747e4fSDavid du Colombier mpint *y = nil, *m = mpnew(0), *mu = mpnew(0), *sigma = mpnew(0);
2289a747e4fSDavid du Colombier PW *pw = nil;
2299a747e4fSDavid du Colombier
2309a747e4fSDavid du Colombier // secstore version and algorithm
2319a747e4fSDavid du Colombier snprint(mess2,Maxmsg,"%s\tPAK\n", VERSION);
2329a747e4fSDavid du Colombier n = strlen(mess2);
2339a747e4fSDavid du Colombier if(strncmp(mess,mess2,n) != 0){
2349a747e4fSDavid du Colombier writerr(conn, "protocol should start with ver alg");
2359a747e4fSDavid du Colombier return -1;
2369a747e4fSDavid du Colombier }
2379a747e4fSDavid du Colombier mess += n;
2389a747e4fSDavid du Colombier initPAKparams();
2399a747e4fSDavid du Colombier
2409a747e4fSDavid du Colombier // parse first message into C, m
2419a747e4fSDavid du Colombier eol = strchr(mess, '\n');
242be0c1e85SDavid du Colombier if(strncmp("C=", mess, 2) != 0 || !eol){
243*d854de59SDavid du Colombier fprint(2, "%s: mess[1]=%s\n", argv0, mess);
2449a747e4fSDavid du Colombier writerr(conn, "PAK version mismatch");
2459a747e4fSDavid du Colombier goto done;
2469a747e4fSDavid du Colombier }
2479a747e4fSDavid du Colombier C = mess+2;
2489a747e4fSDavid du Colombier *eol = 0;
2499a747e4fSDavid du Colombier hexm = eol+3;
2509a747e4fSDavid du Colombier eol = strchr(hexm, '\n');
251be0c1e85SDavid du Colombier if(strncmp("m=", hexm-2, 2) != 0 || !eol){
2529a747e4fSDavid du Colombier writerr(conn, "PAK version mismatch");
2539a747e4fSDavid du Colombier goto done;
2549a747e4fSDavid du Colombier }
2559a747e4fSDavid du Colombier *eol = 0;
2569a747e4fSDavid du Colombier strtomp(hexm, nil, 64, m);
2579a747e4fSDavid du Colombier mpmod(m, pak->p, m);
2589a747e4fSDavid du Colombier
2599a747e4fSDavid du Colombier // lookup client
260369036d9SDavid du Colombier if((pw = getPW(C,0)) == nil) {
2619a747e4fSDavid du Colombier snprint(mess2, sizeof mess2, "%r");
2629a747e4fSDavid du Colombier writerr(conn, mess2);
2639a747e4fSDavid du Colombier goto done;
2649a747e4fSDavid du Colombier }
2659a747e4fSDavid du Colombier if(mpcmp(m, mpzero) == 0) {
2669a747e4fSDavid du Colombier writerr(conn, "account exists");
2679a747e4fSDavid du Colombier freePW(pw);
2689a747e4fSDavid du Colombier pw = nil;
2699a747e4fSDavid du Colombier goto done;
2709a747e4fSDavid du Colombier }
2719a747e4fSDavid du Colombier hexHi = mptoa(pw->Hi, 64, nil, 0);
2729a747e4fSDavid du Colombier
2739a747e4fSDavid du Colombier // random y, mu=g**y, sigma=g**xy
2749a747e4fSDavid du Colombier y = mprand(240, genrandom, nil);
2759a747e4fSDavid du Colombier mpmod(y, pak->q, y);
276be0c1e85SDavid du Colombier if(mpcmp(y, mpzero) == 0){
2779a747e4fSDavid du Colombier mpassign(mpone, y);
2789a747e4fSDavid du Colombier }
2799a747e4fSDavid du Colombier mpexp(pak->g, y, pak->p, mu);
2809a747e4fSDavid du Colombier mpmul(m, pw->Hi, m);
2819a747e4fSDavid du Colombier mpmod(m, pak->p, m);
2829a747e4fSDavid du Colombier mpexp(m, y, pak->p, sigma);
2839a747e4fSDavid du Colombier
2849a747e4fSDavid du Colombier // send g**y, hash1(g**xy)
2859a747e4fSDavid du Colombier hexmu = mptoa(mu, 64, nil, 0);
2869a747e4fSDavid du Colombier hexsigma = mptoa(sigma, 64, nil, 0);
2879a747e4fSDavid du Colombier shorthash("server", C, S, hexm, hexmu, hexsigma, hexHi, digest);
2889a747e4fSDavid du Colombier enc64(ks, sizeof ks, digest, SHA1dlen);
2899a747e4fSDavid du Colombier snprint(mess2, sizeof mess2, "mu=%s\nk=%s\nS=%s\n", hexmu, ks, S);
2909a747e4fSDavid du Colombier conn->write(conn, (uchar*)mess2, strlen(mess2));
2919a747e4fSDavid du Colombier
2929a747e4fSDavid du Colombier // recv hash2(g**xy)
293be0c1e85SDavid du Colombier if(readstr(conn, mess2) < 0){
2949a747e4fSDavid du Colombier writerr(conn, "couldn't read verifier");
2959a747e4fSDavid du Colombier goto done;
2969a747e4fSDavid du Colombier }
2979a747e4fSDavid du Colombier eol = strchr(mess2, '\n');
298be0c1e85SDavid du Colombier if(strncmp("k'=", mess2, 3) != 0 || !eol){
2999a747e4fSDavid du Colombier writerr(conn, "verifier syntax error");
3009a747e4fSDavid du Colombier goto done;
3019a747e4fSDavid du Colombier }
3029a747e4fSDavid du Colombier kc = mess2+3;
3039a747e4fSDavid du Colombier *eol = 0;
3049a747e4fSDavid du Colombier shorthash("client", C, S, hexm, hexmu, hexsigma, hexHi, digest);
3059a747e4fSDavid du Colombier enc64(ks, sizeof ks, digest, SHA1dlen);
3069a747e4fSDavid du Colombier if(strcmp(ks, kc) != 0) {
3079a747e4fSDavid du Colombier rc = -2;
3089a747e4fSDavid du Colombier goto done;
3099a747e4fSDavid du Colombier }
3109a747e4fSDavid du Colombier
3119a747e4fSDavid du Colombier // set session key
3129a747e4fSDavid du Colombier shorthash("session", C, S, hexm, hexmu, hexsigma, hexHi, digest);
3139a747e4fSDavid du Colombier n = conn->secret(conn, digest, 1);
314be0c1e85SDavid du Colombier if(n < 0){
3159a747e4fSDavid du Colombier writerr(conn, "can't set secret");
3169a747e4fSDavid du Colombier goto done;
3179a747e4fSDavid du Colombier }
3189a747e4fSDavid du Colombier
3199a747e4fSDavid du Colombier rc = 0;
3209a747e4fSDavid du Colombier done:
3219a747e4fSDavid du Colombier if(rc<0 && pw){
3229a747e4fSDavid du Colombier pw->failed++;
3239a747e4fSDavid du Colombier putPW(pw);
3249a747e4fSDavid du Colombier }
3259a747e4fSDavid du Colombier if(rc==0 && pw && pw->failed>0){
3269a747e4fSDavid du Colombier pw->failed = 0;
3279a747e4fSDavid du Colombier putPW(pw);
3289a747e4fSDavid du Colombier }
3299a747e4fSDavid du Colombier if(pwp)
3309a747e4fSDavid du Colombier *pwp = pw;
3319a747e4fSDavid du Colombier else
3329a747e4fSDavid du Colombier freePW(pw);
3339a747e4fSDavid du Colombier free(hexsigma);
3349a747e4fSDavid du Colombier free(hexHi);
3359a747e4fSDavid du Colombier free(hexmu);
3369a747e4fSDavid du Colombier mpfree(y);
3379a747e4fSDavid du Colombier mpfree(sigma);
3389a747e4fSDavid du Colombier mpfree(mu);
3399a747e4fSDavid du Colombier mpfree(m);
3409a747e4fSDavid du Colombier mpfree(Hi);
3419a747e4fSDavid du Colombier mpfree(H);
3429a747e4fSDavid du Colombier return rc;
3439a747e4fSDavid du Colombier }
3449a747e4fSDavid du Colombier
345