2012-03-23 02:59:43 +04:00
|
|
|
/* $NetBSD: skeysubr.c,v 1.28 2012/03/22 22:59:43 joerg Exp $ */
|
1996-09-19 23:39:36 +04:00
|
|
|
|
1994-05-21 09:45:58 +04:00
|
|
|
/* S/KEY v1.1b (skeysubr.c)
|
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Neil M. Haller <nmh@thumper.bellcore.com>
|
|
|
|
* Philip R. Karn <karn@chicago.qualcomm.com>
|
|
|
|
* John S. Walden <jsw@thumper.bellcore.com>
|
|
|
|
*
|
1999-07-02 19:37:33 +04:00
|
|
|
* Modifications:
|
1994-05-21 09:45:58 +04:00
|
|
|
* Scott Chasin <chasin@crimelab.com>
|
2000-07-07 02:30:18 +04:00
|
|
|
* Todd C. Miller <Todd.Miller@courtesan.com>
|
1994-05-21 09:45:58 +04:00
|
|
|
*
|
|
|
|
* S/KEY misc routines.
|
|
|
|
*/
|
|
|
|
|
2003-03-09 03:42:56 +03:00
|
|
|
#include <sys/cdefs.h>
|
2012-03-23 02:59:43 +04:00
|
|
|
__RCSID("$NetBSD: skeysubr.c,v 1.28 2012/03/22 22:59:43 joerg Exp $");
|
2003-03-09 03:42:56 +03:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
#include <ctype.h>
|
1994-05-21 09:45:58 +04:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <signal.h>
|
1995-06-20 02:47:37 +04:00
|
|
|
#include <termios.h>
|
2000-07-07 02:30:18 +04:00
|
|
|
|
1997-06-18 23:18:27 +04:00
|
|
|
#include <md4.h>
|
2000-07-07 02:30:18 +04:00
|
|
|
#include <md5.h>
|
2006-10-28 19:35:28 +04:00
|
|
|
#include <sys/rmd160.h>
|
2000-07-07 02:30:18 +04:00
|
|
|
#include <sha1.h>
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
#include "skey.h"
|
1994-05-24 10:25:27 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Default hash function to use (index into skey_hash_types array) */
|
|
|
|
#ifndef SKEY_HASH_DEFAULT
|
|
|
|
#define SKEY_HASH_DEFAULT 0 /* MD4 */
|
|
|
|
#endif
|
|
|
|
|
2005-02-04 19:14:21 +03:00
|
|
|
static void f_md4(char *);
|
|
|
|
static void f_md5(char *);
|
|
|
|
static void f_sha1(char *);
|
|
|
|
/* static void f_rmd160(char *x); */
|
|
|
|
static int keycrunch_md4(char *, const char *, const char *);
|
|
|
|
static int keycrunch_md5(char *, const char *, const char *);
|
|
|
|
static int keycrunch_sha1(char *, const char *, const char *);
|
|
|
|
/* static int keycrunch_rmd160(char *, const char *, const char *); */
|
|
|
|
static void lowcase(char *);
|
|
|
|
static void skey_echo(int);
|
2012-03-23 02:59:43 +04:00
|
|
|
static void trapped(int) __dead;
|
2000-07-07 02:30:18 +04:00
|
|
|
static char *mkSeedPassword(const char *, const char *, size_t *);
|
|
|
|
|
|
|
|
/* Current hash type (index into skey_hash_types array) */
|
|
|
|
static int skey_hash_type = SKEY_HASH_DEFAULT;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Hash types we support.
|
|
|
|
* Each has an associated keycrunch() and f() function.
|
|
|
|
*/
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
struct skey_algorithm_table {
|
|
|
|
const char *name;
|
2005-02-04 19:14:21 +03:00
|
|
|
int (*keycrunch)(char *, const char *, const char *);
|
|
|
|
void (*f)(char *);
|
2000-07-07 02:30:18 +04:00
|
|
|
};
|
|
|
|
static struct skey_algorithm_table skey_algorithm_table[] = {
|
|
|
|
{ "md4", keycrunch_md4, f_md4 },
|
|
|
|
{ "md5", keycrunch_md5, f_md5 },
|
|
|
|
{ "sha1", keycrunch_sha1, f_sha1 },
|
|
|
|
#if 0
|
|
|
|
{ "rmd160", keycrunch_rmd160, f_rmd160 },
|
|
|
|
#endif
|
2012-03-21 14:10:36 +04:00
|
|
|
{ NULL, NULL, NULL }
|
2000-07-07 02:30:18 +04:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Crunch a key:
|
|
|
|
* concatenate the (lower cased) seed and the password, run through
|
|
|
|
* the hash algorithm and collapse to 64 bits.
|
|
|
|
* This is defined as the user's starting key.
|
1994-05-21 09:45:58 +04:00
|
|
|
*/
|
2000-07-07 02:30:18 +04:00
|
|
|
int keycrunch(char *result, /* SKEY_BINKEY_SIZE result */
|
|
|
|
const char *seed, /* Seed, any length */
|
|
|
|
const char *passwd) /* Password, any length */
|
|
|
|
{
|
|
|
|
return(skey_algorithm_table[skey_hash_type].keycrunch(result, seed, passwd));
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *mkSeedPassword(const char *seed, const char *passwd,
|
|
|
|
size_t *buflen)
|
|
|
|
{
|
|
|
|
char *buf;
|
|
|
|
|
|
|
|
*buflen = strlen(seed) + strlen(passwd);
|
|
|
|
if ((buf = (char *) malloc(*buflen + 1)) == NULL)
|
|
|
|
return NULL;
|
|
|
|
strcpy(buf, seed);
|
|
|
|
lowcase(buf);
|
|
|
|
strcat(buf, passwd);
|
|
|
|
sevenbit(buf);
|
|
|
|
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int keycrunch_md4(char *result, /* SKEY_BINKEY_SIZE result */
|
|
|
|
const char *seed, /* Seed, any length */
|
|
|
|
const char *passwd) /* Password, any length */
|
1994-05-21 09:45:58 +04:00
|
|
|
{
|
|
|
|
char *buf;
|
1997-06-18 23:18:27 +04:00
|
|
|
MD4_CTX md;
|
2000-07-08 15:48:40 +04:00
|
|
|
size_t buflen;
|
2000-07-07 02:30:18 +04:00
|
|
|
u_int32_t results[4];
|
1999-07-02 19:37:33 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
if ((buf = mkSeedPassword(seed, passwd, &buflen)) == NULL)
|
1994-05-21 09:45:58 +04:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* Crunch the key through MD4 */
|
1997-06-18 23:18:27 +04:00
|
|
|
MD4Init(&md);
|
1997-06-28 05:12:19 +04:00
|
|
|
MD4Update(&md, (unsigned char *) buf, buflen);
|
2000-07-07 02:30:18 +04:00
|
|
|
MD4Final((unsigned char *) (void *) results, &md);
|
1994-05-21 09:45:58 +04:00
|
|
|
free(buf);
|
|
|
|
|
|
|
|
/* Fold result from 128 to 64 bits */
|
2000-07-07 02:30:18 +04:00
|
|
|
results[0] ^= results[2];
|
|
|
|
results[1] ^= results[3];
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
(void)memcpy(result, results, SKEY_BINKEY_SIZE);
|
1994-05-21 09:45:58 +04:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
static int keycrunch_md5(char *result, /* SKEY_BINKEY_SIZE result */
|
|
|
|
const char *seed, /* Seed, any length */
|
|
|
|
const char *passwd) /* Password, any length */
|
1994-05-21 09:45:58 +04:00
|
|
|
{
|
2000-07-07 02:30:18 +04:00
|
|
|
char *buf;
|
|
|
|
MD5_CTX md;
|
|
|
|
u_int32_t results[4];
|
2000-07-08 15:48:40 +04:00
|
|
|
size_t buflen;
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
if ((buf = mkSeedPassword(seed, passwd, &buflen)) == NULL)
|
|
|
|
return -1;
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Crunch the key through MD5 */
|
|
|
|
MD5Init(&md);
|
|
|
|
MD5Update(&md, (unsigned char *)buf, buflen);
|
|
|
|
MD5Final((unsigned char *) (void *)results, &md);
|
|
|
|
free(buf);
|
|
|
|
|
|
|
|
/* Fold result from 128 to 64 bits */
|
|
|
|
results[0] ^= results[2];
|
|
|
|
results[1] ^= results[3];
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
(void)memcpy((void *)result, (void *)results, SKEY_BINKEY_SIZE);
|
|
|
|
|
|
|
|
return(0);
|
1994-05-21 09:45:58 +04:00
|
|
|
}
|
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
static int keycrunch_sha1(char *result, /* SKEY_BINKEY_SIZE result */
|
|
|
|
const char *seed, /* Seed, any length */
|
|
|
|
const char *passwd) /* Password, any length */
|
1994-05-21 09:45:58 +04:00
|
|
|
{
|
2000-07-07 02:30:18 +04:00
|
|
|
char *buf;
|
|
|
|
SHA1_CTX sha;
|
2000-07-08 15:48:40 +04:00
|
|
|
size_t buflen;
|
2000-07-07 02:30:18 +04:00
|
|
|
int i, j;
|
|
|
|
|
|
|
|
if ((buf = mkSeedPassword(seed, passwd, &buflen)) == NULL)
|
|
|
|
return -1;
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Crunch the key through SHA1 */
|
|
|
|
SHA1Init(&sha);
|
|
|
|
SHA1Update(&sha, (unsigned char *)buf, buflen);
|
2001-03-11 16:57:45 +03:00
|
|
|
SHA1Final(NULL, &sha);
|
2000-07-07 02:30:18 +04:00
|
|
|
free(buf);
|
|
|
|
|
|
|
|
/* Fold 160 to 64 bits */
|
2001-03-11 16:57:45 +03:00
|
|
|
sha.state[0] ^= sha.state[2];
|
|
|
|
sha.state[1] ^= sha.state[3];
|
|
|
|
sha.state[0] ^= sha.state[4];
|
2000-07-07 02:30:18 +04:00
|
|
|
|
|
|
|
/*
|
2001-03-11 16:57:45 +03:00
|
|
|
* SHA1 is a big endian algorithm but RFC2289 mandates that
|
|
|
|
* the result be in little endian form, so we copy to the
|
|
|
|
* result buffer manually.
|
2000-07-07 02:30:18 +04:00
|
|
|
*/
|
2001-03-11 16:57:45 +03:00
|
|
|
|
|
|
|
for(i=j=0; j<8; i++, j+=4) {
|
|
|
|
result[j] = (unsigned char)(sha.state[i] & 0xff);
|
|
|
|
result[j+1] = (unsigned char)((sha.state[i] >> 8) & 0xff);
|
|
|
|
result[j+2] = (unsigned char)((sha.state[i] >> 16) & 0xff);
|
|
|
|
result[j+3] = (unsigned char)((sha.state[i] >> 24) & 0xff);
|
|
|
|
}
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
return(0);
|
1994-05-21 09:45:58 +04:00
|
|
|
}
|
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
#if 0
|
|
|
|
static int keycrunch_rmd160(char *result, /* SKEY_BINKEY_SIZE result */
|
|
|
|
const char *seed, /* Seed, any length */
|
|
|
|
const char *passwd) /* Password, any length */
|
|
|
|
{
|
1995-06-05 23:48:33 +04:00
|
|
|
char *buf;
|
2000-07-07 02:30:18 +04:00
|
|
|
RMD160_CTX rmd;
|
|
|
|
u_int32_t results[5];
|
2000-07-08 15:48:40 +04:00
|
|
|
size_t buflen;
|
2000-07-07 02:30:18 +04:00
|
|
|
|
|
|
|
if ((buf = mkSeedPassword(seed, passwd, &buflen)) == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* Crunch the key through RMD-160 */
|
|
|
|
RMD160Init(&rmd);
|
|
|
|
RMD160Update(&rmd, (unsigned char *)buf, buflen);
|
|
|
|
RMD160Final((unsigned char *)(void *)results, &rmd);
|
|
|
|
free(buf);
|
|
|
|
|
|
|
|
/* Fold 160 to 64 bits */
|
|
|
|
results[0] ^= results[2];
|
|
|
|
results[1] ^= results[3];
|
|
|
|
results[0] ^= results[4];
|
|
|
|
|
|
|
|
(void)memcpy((void *)result, (void *)results, SKEY_BINKEY_SIZE);
|
|
|
|
|
|
|
|
return(0);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* The one-way function f(). Takes 8 bytes and returns 8 bytes in place */
|
|
|
|
void f(char *x)
|
1994-05-21 09:45:58 +04:00
|
|
|
{
|
2000-07-07 02:30:18 +04:00
|
|
|
skey_algorithm_table[skey_hash_type].f(x);
|
|
|
|
}
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
static void f_md4(char *x)
|
|
|
|
{
|
|
|
|
MD4_CTX md;
|
|
|
|
u_int32_t results[4];
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
MD4Init(&md);
|
|
|
|
MD4Update(&md, (unsigned char *) x, SKEY_BINKEY_SIZE);
|
|
|
|
MD4Final((unsigned char *) (void *) results, &md);
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Fold 128 to 64 bits */
|
|
|
|
results[0] ^= results[2];
|
|
|
|
results[1] ^= results[3];
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
(void)memcpy(x, results, SKEY_BINKEY_SIZE);
|
1994-05-21 09:45:58 +04:00
|
|
|
}
|
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
static void f_md5(char *x)
|
1995-05-18 00:24:39 +04:00
|
|
|
{
|
2000-07-07 02:30:18 +04:00
|
|
|
MD5_CTX md;
|
|
|
|
u_int32_t results[4];
|
1995-05-18 00:24:39 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
MD5Init(&md);
|
|
|
|
MD5Update(&md, (unsigned char *)x, SKEY_BINKEY_SIZE);
|
|
|
|
MD5Final((unsigned char *) (void *)results, &md);
|
1995-05-18 00:24:39 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Fold 128 to 64 bits */
|
|
|
|
results[0] ^= results[2];
|
|
|
|
results[1] ^= results[3];
|
1995-05-18 00:24:39 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
(void)memcpy((void *)x, (void *)results, SKEY_BINKEY_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void f_sha1(char *x)
|
|
|
|
{
|
|
|
|
SHA1_CTX sha;
|
|
|
|
int i, j;
|
|
|
|
|
|
|
|
SHA1Init(&sha);
|
|
|
|
SHA1Update(&sha, (unsigned char *)x, SKEY_BINKEY_SIZE);
|
2001-03-11 16:57:45 +03:00
|
|
|
SHA1Final(NULL, &sha);
|
2000-07-07 02:30:18 +04:00
|
|
|
|
|
|
|
/* Fold 160 to 64 bits */
|
2001-03-11 16:57:45 +03:00
|
|
|
sha.state[0] ^= sha.state[2];
|
|
|
|
sha.state[1] ^= sha.state[3];
|
|
|
|
sha.state[0] ^= sha.state[4];
|
|
|
|
|
|
|
|
for(i=j=0; j<8; i++, j+=4) {
|
|
|
|
x[j] = (unsigned char)(sha.state[i] & 0xff);
|
|
|
|
x[j+1] = (unsigned char)((sha.state[i] >> 8) & 0xff);
|
|
|
|
x[j+2] = (unsigned char)((sha.state[i] >> 16) & 0xff);
|
|
|
|
x[j+3] = (unsigned char)((sha.state[i] >> 24) & 0xff);
|
|
|
|
}
|
1995-05-18 00:24:39 +04:00
|
|
|
}
|
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
#if 0
|
|
|
|
static void f_rmd160(char *x)
|
1994-05-21 09:45:58 +04:00
|
|
|
{
|
2000-07-07 02:30:18 +04:00
|
|
|
RMD160_CTX rmd;
|
|
|
|
u_int32_t results[5];
|
1999-07-02 19:37:33 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
RMD160Init(&rmd);
|
|
|
|
RMD160Update(&rmd, (unsigned char *)x, SKEY_BINKEY_SIZE);
|
|
|
|
RMD160Final((unsigned char *)(void *)results, &rmd);
|
|
|
|
|
|
|
|
/* Fold 160 to 64 bits */
|
|
|
|
results[0] ^= results[2];
|
|
|
|
results[1] ^= results[3];
|
|
|
|
results[0] ^= results[4];
|
|
|
|
|
|
|
|
(void)memcpy((void *)x, (void *)results, SKEY_BINKEY_SIZE);
|
1994-05-21 09:45:58 +04:00
|
|
|
}
|
2000-07-07 02:30:18 +04:00
|
|
|
#endif
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Strip trailing cr/lf from a line of text */
|
|
|
|
void rip(char *buf)
|
1994-05-21 09:45:58 +04:00
|
|
|
{
|
2000-07-07 02:30:18 +04:00
|
|
|
buf += strcspn(buf, "\r\n");
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
if (*buf)
|
|
|
|
*buf = '\0';
|
1995-06-05 23:48:33 +04:00
|
|
|
}
|
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Read in secret password (turns off echo) */
|
|
|
|
char *readpass(char *buf, int n)
|
1995-06-05 23:48:33 +04:00
|
|
|
{
|
2000-07-07 02:30:18 +04:00
|
|
|
void *old_handler;
|
|
|
|
|
|
|
|
/* Turn off echoing */
|
|
|
|
skey_echo(0);
|
|
|
|
|
|
|
|
/* Catch SIGINT and save old signal handler */
|
|
|
|
old_handler = signal(SIGINT, trapped);
|
|
|
|
|
|
|
|
fgets(buf, n, stdin);
|
|
|
|
rip(buf);
|
|
|
|
|
|
|
|
putc('\n', stderr);
|
|
|
|
fflush(stderr);
|
|
|
|
|
|
|
|
/* Restore signal handler and turn echo back on */
|
|
|
|
if (old_handler != SIG_ERR)
|
|
|
|
(void)signal(SIGINT, old_handler);
|
|
|
|
skey_echo(1);
|
|
|
|
|
|
|
|
sevenbit(buf);
|
|
|
|
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Read in an s/key OTP (does not turn off echo) */
|
|
|
|
char *readskey(char *buf, int n)
|
|
|
|
{
|
|
|
|
fgets(buf, n, stdin);
|
|
|
|
|
|
|
|
rip(buf);
|
|
|
|
|
|
|
|
sevenbit (buf);
|
|
|
|
|
|
|
|
return buf;
|
1994-05-21 09:45:58 +04:00
|
|
|
}
|
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Signal handler for trapping ^C */
|
2000-01-23 05:11:02 +03:00
|
|
|
/*ARGSUSED*/
|
2000-07-07 02:30:18 +04:00
|
|
|
static void trapped(int sig)
|
1994-05-21 09:45:58 +04:00
|
|
|
{
|
2000-07-07 02:30:18 +04:00
|
|
|
fputs("^C\n", stderr);
|
|
|
|
fflush(stderr);
|
|
|
|
|
2001-07-24 20:43:02 +04:00
|
|
|
/* Turn on echo if necessary */
|
2000-07-07 02:30:18 +04:00
|
|
|
skey_echo(1);
|
|
|
|
|
2001-04-06 15:13:45 +04:00
|
|
|
exit(1);
|
1994-05-21 09:45:58 +04:00
|
|
|
}
|
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/*
|
|
|
|
* Convert 8-byte hex-ascii string to binary array
|
1995-06-05 23:48:33 +04:00
|
|
|
* Returns 0 on success, -1 on error
|
|
|
|
*/
|
2000-07-07 02:30:18 +04:00
|
|
|
int atob8(char *out, const char *in)
|
1995-06-05 23:48:33 +04:00
|
|
|
{
|
1998-02-03 22:12:13 +03:00
|
|
|
int i;
|
|
|
|
int val;
|
1995-06-05 23:48:33 +04:00
|
|
|
|
|
|
|
if (in == NULL || out == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
for (i=0; i<8; i++) {
|
|
|
|
if ((in = skipspace(in)) == NULL)
|
|
|
|
return -1;
|
|
|
|
if ((val = htoi(*in++)) == -1)
|
|
|
|
return -1;
|
|
|
|
*out = val << 4;
|
|
|
|
|
|
|
|
if ((in = skipspace(in)) == NULL)
|
|
|
|
return -1;
|
|
|
|
if ((val = htoi(*in++)) == -1)
|
|
|
|
return -1;
|
|
|
|
*out++ |= val;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Convert 8-byte binary array to hex-ascii string */
|
2000-07-07 02:30:18 +04:00
|
|
|
int btoa8(char *out, const char *in)
|
1995-06-05 23:48:33 +04:00
|
|
|
{
|
1998-02-03 22:12:13 +03:00
|
|
|
int i;
|
1995-06-05 23:48:33 +04:00
|
|
|
|
|
|
|
if (in == NULL || out == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
for (i=0;i<8;i++) {
|
2000-07-07 02:30:18 +04:00
|
|
|
sprintf(out, "%02x", *in++ & 0xff);
|
1995-06-05 23:48:33 +04:00
|
|
|
out += 2;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Convert hex digit to binary integer */
|
2000-07-07 02:30:18 +04:00
|
|
|
int htoi(int c)
|
1995-06-05 23:48:33 +04:00
|
|
|
{
|
|
|
|
if ('0' <= c && c <= '9')
|
|
|
|
return c - '0';
|
|
|
|
if ('a' <= c && c <= 'f')
|
|
|
|
return 10 + c - 'a';
|
|
|
|
if ('A' <= c && c <= 'F')
|
|
|
|
return 10 + c - 'A';
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Skip leading spaces from the string */
|
|
|
|
const char *skipspace(const char *cp)
|
1995-06-05 23:48:33 +04:00
|
|
|
{
|
|
|
|
while (*cp == ' ' || *cp == '\t')
|
|
|
|
cp++;
|
|
|
|
|
|
|
|
if (*cp == '\0')
|
|
|
|
return NULL;
|
|
|
|
else
|
|
|
|
return cp;
|
|
|
|
}
|
1994-05-21 09:45:58 +04:00
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Remove backspaced over charaters from the string */
|
|
|
|
void backspace(char *buf)
|
1994-05-21 09:45:58 +04:00
|
|
|
{
|
|
|
|
char bs = 0x8;
|
|
|
|
char *cp = buf;
|
|
|
|
char *out = buf;
|
|
|
|
|
1995-06-05 23:48:33 +04:00
|
|
|
while (*cp) {
|
|
|
|
if (*cp == bs) {
|
|
|
|
if (out == buf) {
|
1994-05-21 09:45:58 +04:00
|
|
|
cp++;
|
|
|
|
continue;
|
2000-07-07 02:30:18 +04:00
|
|
|
} else {
|
1994-05-21 09:45:58 +04:00
|
|
|
cp++;
|
|
|
|
out--;
|
|
|
|
}
|
1995-06-05 23:48:33 +04:00
|
|
|
} else {
|
1994-05-21 09:45:58 +04:00
|
|
|
*out++ = *cp++;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
*out = '\0';
|
|
|
|
}
|
|
|
|
|
2000-07-07 02:30:18 +04:00
|
|
|
/* Make sure line is all seven bits */
|
|
|
|
void sevenbit(char *s)
|
1994-05-21 09:45:58 +04:00
|
|
|
{
|
1995-06-05 23:48:33 +04:00
|
|
|
while (*s)
|
|
|
|
*s++ &= 0x7f;
|
1994-05-21 09:45:58 +04:00
|
|
|
}
|
2000-07-07 02:30:18 +04:00
|
|
|
|
|
|
|
/* Set hash algorithm type */
|
|
|
|
const char *skey_set_algorithm(const char *new)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; skey_algorithm_table[i].name; i++) {
|
|
|
|
if (strcmp(new, skey_algorithm_table[i].name) == 0) {
|
|
|
|
skey_hash_type = i;
|
|
|
|
return(new);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return(NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get current hash type */
|
2012-03-21 14:10:36 +04:00
|
|
|
const char *skey_get_algorithm(void)
|
2000-07-07 02:30:18 +04:00
|
|
|
{
|
|
|
|
return(skey_algorithm_table[skey_hash_type].name);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Turn echo on/off */
|
|
|
|
static void skey_echo(int action)
|
|
|
|
{
|
|
|
|
static struct termios term;
|
|
|
|
static int echo = 0;
|
|
|
|
|
|
|
|
if (action == 0) {
|
|
|
|
/* Turn echo off */
|
|
|
|
(void) tcgetattr(fileno(stdin), &term);
|
2005-12-05 05:07:07 +03:00
|
|
|
if ((echo = (term.c_lflag & ECHO)) != 0) {
|
2000-07-07 02:30:18 +04:00
|
|
|
term.c_lflag &= ~ECHO;
|
|
|
|
(void) tcsetattr(fileno(stdin), TCSAFLUSH|TCSASOFT, &term);
|
|
|
|
}
|
|
|
|
} else if (action && echo) {
|
|
|
|
/* Turn echo on */
|
|
|
|
term.c_lflag |= ECHO;
|
|
|
|
(void) tcsetattr(fileno(stdin), TCSAFLUSH|TCSASOFT, &term);
|
|
|
|
echo = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Convert string to lower case */
|
|
|
|
static void lowcase(char *s)
|
|
|
|
{
|
2000-07-11 10:07:25 +04:00
|
|
|
u_char *p;
|
2000-07-07 02:30:18 +04:00
|
|
|
|
2000-07-11 10:07:25 +04:00
|
|
|
for (p = (u_char *) s; *p; p++)
|
2000-07-07 02:30:18 +04:00
|
|
|
if (isupper(*p))
|
|
|
|
*p = tolower(*p);
|
|
|
|
}
|