[ssh-keygen.c]
     allow uploading RSA keys for non-default AUT0 (sha1 over passphrase
     like sectok).
This commit is contained in:
Ben Lindstrom 2001-08-06 21:40:04 +00:00
Родитель 020a8699a9
Коммит 6818bfbf30
2 изменённых файлов: 42 добавлений и 13 удалений

Просмотреть файл

@ -94,6 +94,10 @@
- markus@cvs.openbsd.org 2001/08/01 22:16:45 - markus@cvs.openbsd.org 2001/08/01 22:16:45
[ssh.1 sshd.8] [ssh.1 sshd.8]
refer to current ietf drafts for protocol v2 refer to current ietf drafts for protocol v2
- markus@cvs.openbsd.org 2001/08/01 23:33:09
[ssh-keygen.c]
allow uploading RSA keys for non-default AUT0 (sha1 over passphrase
like sectok).
20010803 20010803
- (djm) Fix interrupted read in entropy gatherer. Spotted by markus@ on - (djm) Fix interrupted read in entropy gatherer. Spotted by markus@ on
@ -6204,4 +6208,4 @@
- Wrote replacements for strlcpy and mkdtemp - Wrote replacements for strlcpy and mkdtemp
- Released 1.0pre1 - Released 1.0pre1
$Id: ChangeLog,v 1.1450 2001/08/06 21:38:10 mouring Exp $ $Id: ChangeLog,v 1.1451 2001/08/06 21:40:04 mouring Exp $

Просмотреть файл

@ -12,7 +12,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: ssh-keygen.c,v 1.73 2001/07/26 20:04:27 rees Exp $"); RCSID("$OpenBSD: ssh-keygen.c,v 1.74 2001/08/01 23:33:09 markus Exp $");
#include <openssl/evp.h> #include <openssl/evp.h>
#include <openssl/pem.h> #include <openssl/pem.h>
@ -380,6 +380,7 @@ do_print_public(struct passwd *pw)
exit(0); exit(0);
} }
#ifdef SMARTCARD
#define NUM_RSA_KEY_ELEMENTS 5+1 #define NUM_RSA_KEY_ELEMENTS 5+1
#define COPY_RSA_KEY(x, i) \ #define COPY_RSA_KEY(x, i) \
do { \ do { \
@ -390,17 +391,33 @@ do_print_public(struct passwd *pw)
goto done; \ goto done; \
} while(0) } while(0)
static int
get_AUT0(char *aut0)
{
EVP_MD *evp_md = EVP_sha1();
EVP_MD_CTX md;
char *pass;
pass = read_passphrase("Enter passphrase for smartcard: ", RP_ALLOW_STDIN);
if (pass == NULL)
return -1;
EVP_DigestInit(&md, evp_md);
EVP_DigestUpdate(&md, pass, strlen(pass));
EVP_DigestFinal(&md, aut0, NULL);
memset(pass, 0, strlen(pass));
xfree(pass);
return 0;
}
static void static void
do_upload(struct passwd *pw, int reader) do_upload(struct passwd *pw, int reader)
{ {
#ifndef SMARTCARD
fatal("no support for smartcards.");
#else
Key *prv = NULL; Key *prv = NULL;
struct stat st; struct stat st;
u_char *elements[NUM_RSA_KEY_ELEMENTS]; u_char *elements[NUM_RSA_KEY_ELEMENTS];
u_char key_fid[2]; u_char key_fid[2];
u_char AUT0[] = {0xad, 0x9f, 0x61, 0xfe, 0xfa, 0x20, 0xce, 0x63}; u_char DEFAUT0[] = {0xad, 0x9f, 0x61, 0xfe, 0xfa, 0x20, 0xce, 0x63};
u_char AUT0[EVP_MAX_MD_SIZE];
int len, status = 1, i, fd = -1, ret; int len, status = 1, i, fd = -1, ret;
int sw = 0, cla = 0x00; int sw = 0, cla = 0x00;
@ -424,23 +441,27 @@ do_upload(struct passwd *pw, int reader)
COPY_RSA_KEY(dmp1, 4); COPY_RSA_KEY(dmp1, 4);
COPY_RSA_KEY(n, 5); COPY_RSA_KEY(n, 5);
len = BN_num_bytes(prv->rsa->n); len = BN_num_bytes(prv->rsa->n);
fd = sectok_open(reader, 0, &sw); fd = sectok_open(reader, STONOWAIT, &sw);
if (fd < 0) { if (fd < 0) {
error("sectok_open failed"); error("sectok_open failed: %s", sectok_get_sw(sw));
goto done; goto done;
} }
ret = sectok_reset(fd, 0, NULL, &sw); ret = sectok_reset(fd, 0, NULL, &sw);
if (ret <= 0) { if (ret <= 0) {
error("sectok_reset failed"); error("sectok_reset failed: %s", sectok_get_sw(sw));
goto done; goto done;
} }
if ((cla = cyberflex_inq_class(fd)) < 0) { if ((cla = cyberflex_inq_class(fd)) < 0) {
error("cyberflex_inq_class failed"); error("cyberflex_inq_class failed");
goto done; goto done;
} }
if (cyberflex_verify_AUT0(fd, cla, AUT0, sizeof(AUT0)) < 0) { memcpy(AUT0, DEFAUT0, sizeof(DEFAUT0));
error("cyberflex_verify_AUT0 failed"); if (cyberflex_verify_AUT0(fd, cla, AUT0, sizeof(DEFAUT0)) < 0) {
goto done; if (get_AUT0(AUT0) < 0 ||
cyberflex_verify_AUT0(fd, cla, AUT0, sizeof(DEFAUT0)) < 0) {
error("cyberflex_verify_AUT0 failed");
goto done;
}
} }
key_fid[0] = 0x00; key_fid[0] = 0x00;
key_fid[1] = 0x12; key_fid[1] = 0x12;
@ -473,8 +494,8 @@ done:
if (fd != -1) if (fd != -1)
sectok_close(fd); sectok_close(fd);
exit(status); exit(status);
#endif
} }
#endif
static void static void
do_fingerprint(struct passwd *pw) do_fingerprint(struct passwd *pw)
@ -878,7 +899,11 @@ main(int ac, char **av)
if (print_public) if (print_public)
do_print_public(pw); do_print_public(pw);
if (reader != -1) if (reader != -1)
#ifdef SMARTCARD
do_upload(pw, reader); do_upload(pw, reader);
#else
fatal("no support for smartcards.");
#endif
arc4random_stir(); arc4random_stir();