mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-11-24 10:53:24 +08:00
b0fb6872ed
[atomicio.c auth-bsdauth.c auth-chall.c auth-krb5.c auth-options.c] [auth-pam.c auth-passwd.c auth-rh-rsa.c auth-rhosts.c auth-rsa.c] [auth-shadow.c auth-skey.c auth.c auth1.c auth2-chall.c] [auth2-hostbased.c auth2-kbdint.c auth2-none.c auth2-passwd.c] [auth2-pubkey.c auth2.c authfd.c authfile.c bufaux.c buffer.c] [canohost.c channels.c cipher-3des1.c cipher-acss.c cipher-aes.c] [cipher-bf1.c cipher-ctr.c cipher.c cleanup.c clientloop.c compat.c] [compress.c deattack.c dh.c dispatch.c dns.c entropy.c fatal.c] [groupaccess.c hostfile.c includes.h kex.c kexdh.c kexdhc.c] [kexdhs.c kexgex.c kexgexc.c kexgexs.c key.c log.c loginrec.c] [loginrec.h logintest.c mac.c match.c md-sha256.c md5crypt.c misc.c] [monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c msg.c] [nchan.c packet.c progressmeter.c readconf.c readpass.c rsa.c] [scard.c scp.c servconf.c serverloop.c session.c sftp-client.c] [sftp-common.c sftp-glob.c sftp-server.c sftp.c ssh-add.c] [ssh-agent.c ssh-dss.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c] [ssh-rand-helper.c ssh-rsa.c ssh.c sshconnect.c sshconnect1.c] [sshconnect2.c sshd.c sshlogin.c sshpty.c sshtty.c ttymodes.c] [uidswap.c uuencode.c xmalloc.c openbsd-compat/bsd-arc4random.c] [openbsd-compat/bsd-closefrom.c openbsd-compat/bsd-cygwin_util.c] [openbsd-compat/bsd-getpeereid.c openbsd-compat/bsd-misc.c] [openbsd-compat/bsd-nextstep.c openbsd-compat/bsd-snprintf.c] [openbsd-compat/bsd-waitpid.c openbsd-compat/fake-rfc2553.c] RCSID() can die
147 lines
3.6 KiB
C
147 lines
3.6 KiB
C
/*
|
|
* Copyright (c) 2003 Markus Friedl <markus@openbsd.org>
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
#include "includes.h"
|
|
|
|
#include <openssl/evp.h>
|
|
|
|
#include "log.h"
|
|
#include "xmalloc.h"
|
|
|
|
/* compatibility with old or broken OpenSSL versions */
|
|
#include "openbsd-compat/openssl-compat.h"
|
|
|
|
#ifdef USE_BUILTIN_RIJNDAEL
|
|
#include "rijndael.h"
|
|
#define AES_KEY rijndael_ctx
|
|
#define AES_BLOCK_SIZE 16
|
|
#define AES_encrypt(a, b, c) rijndael_encrypt(c, a, b)
|
|
#define AES_set_encrypt_key(a, b, c) rijndael_set_key(c, (char *)a, b, 1)
|
|
#else
|
|
#include <openssl/aes.h>
|
|
#endif
|
|
|
|
const EVP_CIPHER *evp_aes_128_ctr(void);
|
|
void ssh_aes_ctr_iv(EVP_CIPHER_CTX *, int, u_char *, u_int);
|
|
|
|
struct ssh_aes_ctr_ctx
|
|
{
|
|
AES_KEY aes_ctx;
|
|
u_char aes_counter[AES_BLOCK_SIZE];
|
|
};
|
|
|
|
/*
|
|
* increment counter 'ctr',
|
|
* the counter is of size 'len' bytes and stored in network-byte-order.
|
|
* (LSB at ctr[len-1], MSB at ctr[0])
|
|
*/
|
|
static void
|
|
ssh_ctr_inc(u_char *ctr, u_int len)
|
|
{
|
|
int i;
|
|
|
|
for (i = len - 1; i >= 0; i--)
|
|
if (++ctr[i]) /* continue on overflow */
|
|
return;
|
|
}
|
|
|
|
static int
|
|
ssh_aes_ctr(EVP_CIPHER_CTX *ctx, u_char *dest, const u_char *src,
|
|
u_int len)
|
|
{
|
|
struct ssh_aes_ctr_ctx *c;
|
|
u_int n = 0;
|
|
u_char buf[AES_BLOCK_SIZE];
|
|
|
|
if (len == 0)
|
|
return (1);
|
|
if ((c = EVP_CIPHER_CTX_get_app_data(ctx)) == NULL)
|
|
return (0);
|
|
|
|
while ((len--) > 0) {
|
|
if (n == 0) {
|
|
AES_encrypt(c->aes_counter, buf, &c->aes_ctx);
|
|
ssh_ctr_inc(c->aes_counter, AES_BLOCK_SIZE);
|
|
}
|
|
*(dest++) = *(src++) ^ buf[n];
|
|
n = (n + 1) % AES_BLOCK_SIZE;
|
|
}
|
|
return (1);
|
|
}
|
|
|
|
static int
|
|
ssh_aes_ctr_init(EVP_CIPHER_CTX *ctx, const u_char *key, const u_char *iv,
|
|
int enc)
|
|
{
|
|
struct ssh_aes_ctr_ctx *c;
|
|
|
|
if ((c = EVP_CIPHER_CTX_get_app_data(ctx)) == NULL) {
|
|
c = xmalloc(sizeof(*c));
|
|
EVP_CIPHER_CTX_set_app_data(ctx, c);
|
|
}
|
|
if (key != NULL)
|
|
AES_set_encrypt_key(key, EVP_CIPHER_CTX_key_length(ctx) * 8,
|
|
&c->aes_ctx);
|
|
if (iv != NULL)
|
|
memcpy(c->aes_counter, iv, AES_BLOCK_SIZE);
|
|
return (1);
|
|
}
|
|
|
|
static int
|
|
ssh_aes_ctr_cleanup(EVP_CIPHER_CTX *ctx)
|
|
{
|
|
struct ssh_aes_ctr_ctx *c;
|
|
|
|
if ((c = EVP_CIPHER_CTX_get_app_data(ctx)) != NULL) {
|
|
memset(c, 0, sizeof(*c));
|
|
xfree(c);
|
|
EVP_CIPHER_CTX_set_app_data(ctx, NULL);
|
|
}
|
|
return (1);
|
|
}
|
|
|
|
void
|
|
ssh_aes_ctr_iv(EVP_CIPHER_CTX *evp, int doset, u_char * iv, u_int len)
|
|
{
|
|
struct ssh_aes_ctr_ctx *c;
|
|
|
|
if ((c = EVP_CIPHER_CTX_get_app_data(evp)) == NULL)
|
|
fatal("ssh_aes_ctr_iv: no context");
|
|
if (doset)
|
|
memcpy(c->aes_counter, iv, len);
|
|
else
|
|
memcpy(iv, c->aes_counter, len);
|
|
}
|
|
|
|
const EVP_CIPHER *
|
|
evp_aes_128_ctr(void)
|
|
{
|
|
static EVP_CIPHER aes_ctr;
|
|
|
|
memset(&aes_ctr, 0, sizeof(EVP_CIPHER));
|
|
aes_ctr.nid = NID_undef;
|
|
aes_ctr.block_size = AES_BLOCK_SIZE;
|
|
aes_ctr.iv_len = AES_BLOCK_SIZE;
|
|
aes_ctr.key_len = 16;
|
|
aes_ctr.init = ssh_aes_ctr_init;
|
|
aes_ctr.cleanup = ssh_aes_ctr_cleanup;
|
|
aes_ctr.do_cipher = ssh_aes_ctr;
|
|
#ifndef SSH_OLD_EVP
|
|
aes_ctr.flags = EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH |
|
|
EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CUSTOM_IV;
|
|
#endif
|
|
return (&aes_ctr);
|
|
}
|