2005-02-20 00:55:52 +03:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 1991, 1993
|
2005-02-20 01:47:51 +03:00
|
|
|
* Dave Safford. All rights reserved.
|
2005-02-20 00:55:52 +03:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
|
|
|
|
#ifdef notdef
|
|
|
|
__FBSDID("$FreeBSD: src/contrib/telnet/libtelnet/pk.c,v 1.10 2002/08/22 06:19:07 nsayer Exp $");
|
|
|
|
#else
|
2005-02-20 01:55:35 +03:00
|
|
|
__RCSID("$NetBSD: pk.c,v 1.4 2005/02/19 22:55:35 christos Exp $");
|
2005-02-20 00:55:52 +03:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/* public key routines */
|
|
|
|
/* functions:
|
|
|
|
genkeys(char *public, char *secret)
|
|
|
|
common_key(char *secret, char *public, desData *deskey)
|
2005-02-20 01:47:51 +03:00
|
|
|
pk_encode(char *in, *out, DesData *deskey);
|
|
|
|
pk_decode(char *in, *out, DesData *deskey);
|
2005-02-20 00:55:52 +03:00
|
|
|
where
|
|
|
|
char public[HEXKEYBYTES + 1];
|
|
|
|
char secret[HEXKEYBYTES + 1];
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/time.h>
|
2005-02-20 01:47:10 +03:00
|
|
|
#include <des.h>
|
|
|
|
#include <openssl/bn.h>
|
2005-02-20 00:55:52 +03:00
|
|
|
#include <fcntl.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "pk.h"
|
|
|
|
|
2005-02-20 01:55:35 +03:00
|
|
|
static void adjust(char *, const char *);
|
2005-02-20 00:55:52 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Choose top 128 bits of the common key to use as our idea key.
|
|
|
|
*/
|
|
|
|
static void
|
2005-02-20 01:47:10 +03:00
|
|
|
extractideakey(BIGNUM *ck, IdeaData *ideakey)
|
2005-02-20 00:55:52 +03:00
|
|
|
{
|
2005-02-20 01:47:51 +03:00
|
|
|
BIGNUM *a = BN_new();
|
|
|
|
BIGNUM *z = BN_new();
|
2005-02-20 01:47:10 +03:00
|
|
|
BIGNUM *base = BN_new();
|
|
|
|
BN_CTX *ctx = BN_CTX_new();
|
2005-02-20 01:55:35 +03:00
|
|
|
size_t i;
|
2005-02-20 01:47:51 +03:00
|
|
|
char *k;
|
2005-02-20 00:55:52 +03:00
|
|
|
|
2005-02-20 01:47:51 +03:00
|
|
|
(void)BN_zero(a);
|
2005-02-20 01:47:10 +03:00
|
|
|
(void)BN_zero(z);
|
|
|
|
(void)BN_set_word(base, 1 << 8);
|
|
|
|
BN_add(a, ck, z);
|
|
|
|
|
2005-02-20 01:47:51 +03:00
|
|
|
for (i = 0; i < ((KEYSIZE - 128) / 8); i++)
|
2005-02-20 01:47:10 +03:00
|
|
|
BN_div(a, z, a, base, ctx);
|
|
|
|
|
2005-02-20 01:55:35 +03:00
|
|
|
k = (char *)(void *)ideakey;
|
2005-02-20 01:47:51 +03:00
|
|
|
for (i = 0; i < 16; i++) {
|
2005-02-20 01:47:10 +03:00
|
|
|
BN_div(a, z, a, base, ctx);
|
2005-02-20 01:47:51 +03:00
|
|
|
*k++ = (char)BN_get_word(z);
|
|
|
|
}
|
2005-02-20 01:47:10 +03:00
|
|
|
|
|
|
|
BN_CTX_free(ctx);
|
|
|
|
BN_free(base);
|
|
|
|
BN_free(z);
|
2005-02-20 01:47:51 +03:00
|
|
|
BN_free(a);
|
2005-02-20 00:55:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Choose middle 64 bits of the common key to use as our des key, possibly
|
|
|
|
* overwriting the lower order bits by setting parity.
|
|
|
|
*/
|
|
|
|
static void
|
2005-02-20 01:47:10 +03:00
|
|
|
extractdeskey(BIGNUM *ck, DesData *deskey)
|
2005-02-20 00:55:52 +03:00
|
|
|
{
|
2005-02-20 01:47:51 +03:00
|
|
|
BIGNUM *a = BN_new();
|
|
|
|
BIGNUM *z = BN_new();
|
|
|
|
BIGNUM *base = BN_new();
|
2005-02-20 01:47:10 +03:00
|
|
|
BN_CTX *ctx = BN_CTX_new();
|
2005-02-20 01:55:35 +03:00
|
|
|
size_t i;
|
2005-02-20 01:47:51 +03:00
|
|
|
char *k;
|
2005-02-20 00:55:52 +03:00
|
|
|
|
2005-02-20 01:47:51 +03:00
|
|
|
(void)BN_zero(z);
|
|
|
|
(void)BN_zero(a);
|
2005-02-20 01:47:10 +03:00
|
|
|
(void)BN_set_word(base, 1 << 8);
|
|
|
|
BN_add(a, ck, z);
|
|
|
|
|
2005-02-20 01:47:51 +03:00
|
|
|
for (i = 0; i < ((KEYSIZE - 64) / 2) / 8; i++)
|
2005-02-20 01:47:10 +03:00
|
|
|
BN_div(a, z, a, base, ctx);
|
|
|
|
|
2005-02-20 01:47:51 +03:00
|
|
|
k = (char *)deskey;
|
|
|
|
for (i = 0; i < 8; i++) {
|
2005-02-20 01:47:10 +03:00
|
|
|
BN_div(a, z, a, base, ctx);
|
2005-02-20 01:47:51 +03:00
|
|
|
*k++ = (char)BN_get_word(z);
|
|
|
|
}
|
2005-02-20 01:47:10 +03:00
|
|
|
|
|
|
|
BN_CTX_free(ctx);
|
|
|
|
BN_free(base);
|
|
|
|
BN_free(z);
|
2005-02-20 01:47:51 +03:00
|
|
|
BN_free(a);
|
2005-02-20 00:55:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* get common key from my secret key and his public key
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
common_key(char *xsecret, char *xpublic, IdeaData *ideakey, DesData *deskey)
|
|
|
|
{
|
2005-02-20 01:47:51 +03:00
|
|
|
BIGNUM *public = BN_new();
|
|
|
|
BIGNUM *secret = BN_new();
|
|
|
|
BIGNUM *common = BN_new();
|
|
|
|
BIGNUM *modulus = BN_new();
|
2005-02-20 01:47:10 +03:00
|
|
|
BN_CTX *ctx = BN_CTX_new();
|
|
|
|
|
|
|
|
(void)BN_hex2bn(&modulus, HEXMODULUS);
|
2005-02-20 01:47:51 +03:00
|
|
|
(void)BN_hex2bn(&public, xpublic);
|
|
|
|
(void)BN_hex2bn(&secret, xsecret);
|
|
|
|
(void)BN_zero(common);
|
2005-02-20 01:47:10 +03:00
|
|
|
|
2005-02-20 01:47:51 +03:00
|
|
|
BN_mod_exp(common, public, secret, modulus, ctx);
|
|
|
|
extractdeskey(common, deskey);
|
|
|
|
extractideakey(common, ideakey);
|
2005-02-20 00:55:52 +03:00
|
|
|
des_set_odd_parity(deskey);
|
2005-02-20 01:47:10 +03:00
|
|
|
|
|
|
|
BN_CTX_free(ctx);
|
2005-02-20 01:47:51 +03:00
|
|
|
BN_free(common);
|
|
|
|
BN_free(secret);
|
|
|
|
BN_free(public);
|
2005-02-20 01:47:10 +03:00
|
|
|
BN_free(modulus);
|
2005-02-20 00:55:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Generate a seed
|
|
|
|
*/
|
|
|
|
static void
|
2005-02-20 01:55:35 +03:00
|
|
|
getseed(char *seed, size_t seedsize)
|
2005-02-20 00:55:52 +03:00
|
|
|
{
|
2005-02-20 01:55:35 +03:00
|
|
|
size_t i;
|
2005-02-20 00:55:52 +03:00
|
|
|
|
2005-02-20 01:47:10 +03:00
|
|
|
for (i = 0; i < seedsize; i++)
|
|
|
|
seed[i] = arc4random() & 0xff;
|
2005-02-20 00:55:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Generate a random public/secret key pair
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
genkeys(char *public, char *secret)
|
|
|
|
{
|
2005-02-20 01:47:51 +03:00
|
|
|
size_t i;
|
2005-02-20 00:55:52 +03:00
|
|
|
|
2005-02-20 01:55:35 +03:00
|
|
|
# define BASEBITS (8 * sizeof(short) - 1)
|
2005-02-20 01:47:51 +03:00
|
|
|
# define BASE (1 << BASEBITS)
|
2005-02-20 00:55:52 +03:00
|
|
|
|
2005-02-20 01:47:51 +03:00
|
|
|
BIGNUM *pk = BN_new();
|
|
|
|
BIGNUM *sk = BN_new();
|
|
|
|
BIGNUM *tmp = BN_new();
|
|
|
|
BIGNUM *base = BN_new();
|
|
|
|
BIGNUM *root = BN_new();
|
|
|
|
BIGNUM *modulus = BN_new();
|
2005-02-20 01:47:10 +03:00
|
|
|
BN_CTX *ctx = BN_CTX_new();
|
2005-02-20 01:47:51 +03:00
|
|
|
short r;
|
|
|
|
unsigned short seed[KEYSIZE/BASEBITS + 1];
|
|
|
|
char *xkey;
|
2005-02-20 00:55:52 +03:00
|
|
|
|
2005-02-20 01:47:10 +03:00
|
|
|
(void)BN_zero(pk);
|
|
|
|
(void)BN_zero(sk);
|
|
|
|
(void)BN_set_word(base, BASE);
|
|
|
|
(void)BN_set_word(root, PROOT);
|
|
|
|
(void)BN_hex2bn(&modulus, HEXMODULUS);
|
|
|
|
|
2005-02-20 01:47:51 +03:00
|
|
|
getseed((char *)seed, sizeof(seed));
|
|
|
|
for (i = 0; i < KEYSIZE/BASEBITS + 1; i++) {
|
|
|
|
r = seed[i] % BASE;
|
2005-02-20 01:47:10 +03:00
|
|
|
(void)BN_set_word(tmp, r);
|
|
|
|
BN_mul(sk, tmp, sk, ctx);
|
|
|
|
BN_add(sk, tmp, sk);
|
2005-02-20 01:47:51 +03:00
|
|
|
}
|
2005-02-20 01:47:10 +03:00
|
|
|
|
2005-02-20 01:47:51 +03:00
|
|
|
(void)BN_zero(tmp);
|
2005-02-20 01:47:10 +03:00
|
|
|
BN_div(tmp, sk, sk, modulus, ctx);
|
2005-02-20 01:47:51 +03:00
|
|
|
BN_mod_exp(pk, root, sk, modulus, ctx);
|
2005-02-20 01:47:10 +03:00
|
|
|
|
2005-02-20 01:47:51 +03:00
|
|
|
xkey = BN_bn2hex(sk);
|
|
|
|
adjust(secret, xkey);
|
|
|
|
xkey = BN_bn2hex(pk);
|
|
|
|
adjust(public, xkey);
|
2005-02-20 01:47:10 +03:00
|
|
|
|
|
|
|
BN_CTX_free(ctx);
|
2005-02-20 01:47:51 +03:00
|
|
|
BN_free(sk);
|
|
|
|
BN_free(base);
|
|
|
|
BN_free(pk);
|
|
|
|
BN_free(tmp);
|
|
|
|
BN_free(root);
|
|
|
|
BN_free(modulus);
|
2005-02-20 00:55:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Adjust the input key so that it is 0-filled on the left
|
|
|
|
*/
|
|
|
|
static void
|
2005-02-20 01:55:35 +03:00
|
|
|
adjust(char *keyout, const char *keyin)
|
2005-02-20 00:55:52 +03:00
|
|
|
{
|
2005-02-20 01:55:35 +03:00
|
|
|
const char *p;
|
2005-02-20 01:47:51 +03:00
|
|
|
char *s;
|
|
|
|
|
|
|
|
for (p = keyin; *p; p++)
|
2005-02-20 01:55:35 +03:00
|
|
|
continue;
|
|
|
|
for (s = keyout + HEXKEYBYTES; p >= keyin; p--, s--)
|
2005-02-20 01:47:51 +03:00
|
|
|
*s = *p;
|
2005-02-20 01:55:35 +03:00
|
|
|
while (s >= keyout)
|
2005-02-20 01:47:51 +03:00
|
|
|
*s-- = '0';
|
2005-02-20 00:55:52 +03:00
|
|
|
}
|
|
|
|
|
2005-02-20 01:55:35 +03:00
|
|
|
static const char hextab[] = "0123456789ABCDEF";
|
2005-02-20 00:55:52 +03:00
|
|
|
|
|
|
|
/* given a DES key, cbc encrypt and translate input to terminated hex */
|
|
|
|
void
|
2005-02-20 01:55:35 +03:00
|
|
|
pk_encode(const char *in, char *out, DesData *key)
|
2005-02-20 00:55:52 +03:00
|
|
|
{
|
|
|
|
char buf[256];
|
|
|
|
DesData i;
|
|
|
|
des_key_schedule k;
|
2005-02-20 01:55:35 +03:00
|
|
|
size_t l, op, deslen;
|
2005-02-20 00:55:52 +03:00
|
|
|
|
2005-02-20 01:55:35 +03:00
|
|
|
(void)memset(&i, 0, sizeof(i));
|
|
|
|
(void)memset(buf, 0, sizeof(buf));
|
|
|
|
deslen = ((strlen(in) + 7) / 8) * 8;
|
2005-02-20 00:55:52 +03:00
|
|
|
des_key_sched(key, k);
|
2005-02-20 01:55:35 +03:00
|
|
|
des_cbc_encrypt(in, buf, deslen, k, &i, DES_ENCRYPT);
|
|
|
|
for (l = 0, op = 0; l < deslen; l++) {
|
2005-02-20 00:55:52 +03:00
|
|
|
out[op++] = hextab[(buf[l] & 0xf0) >> 4];
|
|
|
|
out[op++] = hextab[(buf[l] & 0x0f)];
|
|
|
|
}
|
|
|
|
out[op] = '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
/* given a DES key, translate input from hex and decrypt */
|
|
|
|
void
|
2005-02-20 01:55:35 +03:00
|
|
|
pk_decode(const char *in, char *out, DesData *key)
|
2005-02-20 00:55:52 +03:00
|
|
|
{
|
|
|
|
char buf[256];
|
|
|
|
DesData i;
|
|
|
|
des_key_schedule k;
|
2005-02-20 01:55:35 +03:00
|
|
|
int n1, n2, op;
|
2005-02-20 00:55:52 +03:00
|
|
|
size_t l;
|
2005-02-20 01:55:35 +03:00
|
|
|
size_t len = strlen(in) / 2;
|
|
|
|
|
|
|
|
(void)memset(&i, 0, sizeof(i));
|
|
|
|
(void)memset(buf, 0, sizeof(buf));
|
2005-02-20 00:55:52 +03:00
|
|
|
|
2005-02-20 01:55:35 +03:00
|
|
|
for (l = 0, op = 0; l < len; l++, op += 2) {
|
2005-02-20 00:55:52 +03:00
|
|
|
if (in[op] > '9')
|
|
|
|
n1 = in[op] - 'A' + 10;
|
|
|
|
else
|
|
|
|
n1 = in[op] - '0';
|
2005-02-20 01:55:35 +03:00
|
|
|
if (in[op + 1] > '9')
|
|
|
|
n2 = in[op + 1] - 'A' + 10;
|
2005-02-20 00:55:52 +03:00
|
|
|
else
|
2005-02-20 01:55:35 +03:00
|
|
|
n2 = in[op + 1] - '0';
|
|
|
|
buf[l] = (char)(n1 * 16 + n2);
|
2005-02-20 00:55:52 +03:00
|
|
|
}
|
|
|
|
des_key_sched(key, k);
|
2005-02-20 01:55:35 +03:00
|
|
|
des_cbc_encrypt(buf, out, len, k, &i, DES_DECRYPT);
|
|
|
|
out[len] = '\0';
|
2005-02-20 00:55:52 +03:00
|
|
|
}
|