Home | History | Annotate | Line # | Download | only in lib
      1 /*-
      2  * Copyright (c) 2009 The NetBSD Foundation, Inc.
      3  * All rights reserved.
      4  *
      5  * This code is derived from software contributed to The NetBSD Foundation
      6  * by Alistair Crooks (agc (at) NetBSD.org)
      7  *
      8  * Redistribution and use in source and binary forms, with or without
      9  * modification, are permitted provided that the following conditions
     10  * are met:
     11  * 1. Redistributions of source code must retain the above copyright
     12  *    notice, this list of conditions and the following disclaimer.
     13  * 2. Redistributions in binary form must reproduce the above copyright
     14  *    notice, this list of conditions and the following disclaimer in the
     15  *    documentation and/or other materials provided with the distribution.
     16  *
     17  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     18  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     19  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     20  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     21  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     22  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     23  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     24  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     25  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     26  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     27  * POSSIBILITY OF SUCH DAMAGE.
     28  */
     29 #include "config.h"
     30 
     31 #ifdef HAVE_SYS_CDEFS_H
     32 #include <sys/cdefs.h>
     33 #endif
     34 
     35 #include <sys/types.h>
     36 #include <sys/stat.h>
     37 #include <sys/param.h>
     38 
     39 #include <netinet/in.h>
     40 
     41 #include <arpa/inet.h>
     42 
     43 #include <ctype.h>
     44 #include <inttypes.h>
     45 #include <stdio.h>
     46 #include <stdlib.h>
     47 #include <string.h>
     48 
     49 #ifdef HAVE_UNISTD_H
     50 #include <unistd.h>
     51 #endif
     52 
     53 #ifdef HAVE_LIMITS_H
     54 #include <limits.h>
     55 #endif
     56 
     57 #ifdef HAVE_OPENSSL_CAST_H
     58 #include <openssl/cast.h>
     59 #endif
     60 
     61 #include <openssl/pem.h>
     62 
     63 #include "bufgap.h"
     64 
     65 #include "packet-parse.h"
     66 #include "netpgpdefs.h"
     67 #include "netpgpsdk.h"
     68 #include "crypto.h"
     69 #include "netpgpdigest.h"
     70 #include "ssh2pgp.h"
     71 
     72 /* structure for earching for constant strings */
     73 typedef struct str_t {
     74 	const char	*s;		/* string */
     75 	size_t		 len;		/* its length */
     76 	int		 type;		/* return type */
     77 } str_t;
     78 
     79 #ifndef USE_ARG
     80 #define USE_ARG(x)	/*LINTED*/(void)&x
     81 #endif
     82 
     83 static const uint8_t	base64s[] =
     84 /* 000 */       "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"
     85 /* 016 */       "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"
     86 /* 032 */       "\0\0\0\0\0\0\0\0\0\0\0?\0\0\0@"
     87 /* 048 */       "56789:;<=>\0\0\0\0\0\0"
     88 /* 064 */       "\0\1\2\3\4\5\6\7\10\11\12\13\14\15\16\17"
     89 /* 080 */       "\20\21\22\23\24\25\26\27\30\31\32\0\0\0\0\0"
     90 /* 096 */       "\0\33\34\35\36\37 !\"#$%&'()"
     91 /* 112 */       "*+,-./01234\0\0\0\0\0"
     92 /* 128 */       "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"
     93 /* 144 */       "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"
     94 /* 160 */       "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"
     95 /* 176 */       "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"
     96 /* 192 */       "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"
     97 /* 208 */       "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"
     98 /* 224 */       "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"
     99 /* 240 */       "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0";
    100 
    101 
    102 /* short function to decode from base64 */
    103 /* inspired by an ancient copy of b64.c, then rewritten, the bugs are all mine */
    104 static int
    105 frombase64(char *dst, const char *src, size_t size, int flag)
    106 {
    107 	uint8_t	out[3];
    108 	uint8_t	in[4];
    109 	uint8_t	b;
    110 	size_t	srcc;
    111 	int	dstc;
    112 	int	gotc;
    113 	int	i;
    114 
    115 	USE_ARG(flag);
    116 	for (dstc = 0, srcc = 0 ; srcc < size; ) {
    117 		for (gotc = 0, i = 0; i < 4 && srcc < size; i++) {
    118 			for (b = 0x0; srcc < size && b == 0x0 ; ) {
    119 				b = base64s[(unsigned)src[srcc++]];
    120 			}
    121 			if (srcc < size) {
    122 				gotc += 1;
    123 				if (b) {
    124 					in[i] = (uint8_t)(b - 1);
    125 				}
    126 			} else {
    127 				in[i] = 0x0;
    128 			}
    129 		}
    130 		if (gotc) {
    131 			out[0] = (uint8_t)((unsigned)in[0] << 2 |
    132 						(unsigned)in[1] >> 4);
    133 			out[1] = (uint8_t)((unsigned)in[1] << 4 |
    134 						(unsigned)in[2] >> 2);
    135 			out[2] = (uint8_t)(((in[2] << 6) & 0xc0) | in[3]);
    136 			for (i = 0; i < gotc - 1; i++) {
    137 				*dst++ = out[i];
    138 			}
    139 			dstc += gotc - 1;
    140 		}
    141 	}
    142 	return dstc;
    143 }
    144 
    145 /* get a bignum from the buffer gap */
    146 static BIGNUM *
    147 getbignum(bufgap_t *bg, char *buf, const char *header)
    148 {
    149 	uint32_t	 len;
    150 	BIGNUM		*bignum;
    151 
    152 	(void) bufgap_getbin(bg, &len, sizeof(len));
    153 	len = ntohl(len);
    154 	(void) bufgap_seek(bg, sizeof(len), BGFromHere, BGByte);
    155 	(void) bufgap_getbin(bg, buf, len);
    156 	bignum = BN_bin2bn((const uint8_t *)buf, (int)len, NULL);
    157 	if (pgp_get_debug_level(__FILE__)) {
    158 		hexdump(stderr, header, (const uint8_t *)(void *)buf, len);
    159 	}
    160 	(void) bufgap_seek(bg, len, BGFromHere, BGByte);
    161 	return bignum;
    162 }
    163 
    164 #if 0
    165 static int
    166 putbignum(bufgap_t *bg, BIGNUM *bignum)
    167 {
    168 	uint32_t	 len;
    169 
    170 	len = BN_num_bytes(bignum);
    171 	(void) bufgap_insert(bg, &len, sizeof(len));
    172 	(void) bufgap_insert(bg, buf, len);
    173 	bignum = BN_bin2bn((const uint8_t *)buf, (int)len, NULL);
    174 	if (pgp_get_debug_level(__FILE__)) {
    175 		hexdump(stderr, header, buf, (int)len);
    176 	}
    177 	(void) bufgap_seek(bg, len, BGFromHere, BGByte);
    178 	return bignum;
    179 }
    180 #endif
    181 
    182 static str_t	pkatypes[] = {
    183 	{	"ssh-rsa",	7,	PGP_PKA_RSA	},
    184 	{	"ssh-dss",	7,	PGP_PKA_DSA	},
    185 	{	"ssh-dsa",	7,	PGP_PKA_DSA	},
    186 	{	NULL,		0,	0		}
    187 };
    188 
    189 /* look for a string in the given array */
    190 static int
    191 findstr(str_t *array, const char *name)
    192 {
    193 	str_t	*sp;
    194 
    195 	for (sp = array ; sp->s ; sp++) {
    196 		if (strncmp(name, sp->s, sp->len) == 0) {
    197 			return sp->type;
    198 		}
    199 	}
    200 	return -1;
    201 }
    202 
    203 /* convert an ssh (host) pubkey to a pgp pubkey */
    204 int
    205 pgp_ssh2pubkey(pgp_io_t *io, const char *f, pgp_key_t *key, pgp_hash_alg_t hashtype)
    206 {
    207 	pgp_pubkey_t	*pubkey;
    208 	struct stat	 st;
    209 	bufgap_t	 bg;
    210 	uint32_t	 len;
    211 	int64_t		 off;
    212 	uint8_t		*userid;
    213 	char		 hostname[256];
    214 	char		 owner[256];
    215 	char		*space;
    216 	char	 	*buf;
    217 	char	 	*bin;
    218 	int		 ok;
    219 	int		 cc;
    220 
    221 	(void) memset(&bg, 0x0, sizeof(bg));
    222 	if (!bufgap_open(&bg, f)) {
    223 		(void) fprintf(stderr, "pgp_ssh2pubkey: can't open '%s'\n", f);
    224 		return 0;
    225 	}
    226 	(void)stat(f, &st);
    227 	if ((buf = calloc(1, (size_t)st.st_size)) == NULL) {
    228 		(void) fprintf(stderr, "can't calloc %zu bytes for '%s'\n", (size_t)st.st_size, f);
    229 		bufgap_close(&bg);
    230 		return 0;
    231 	}
    232 	if ((bin = calloc(1, (size_t)st.st_size)) == NULL) {
    233 		(void) fprintf(stderr, "can't calloc %zu bytes for '%s'\n", (size_t)st.st_size, f);
    234 		(void) free(buf);
    235 		bufgap_close(&bg);
    236 		return 0;
    237 	}
    238 
    239 	/* move past ascii type of key */
    240 	while (bufgap_peek(&bg, 0) != ' ') {
    241 		bufgap_seek(&bg, 1, BGFromHere, BGByte);
    242 	}
    243 	bufgap_seek(&bg, 1, BGFromHere, BGByte);
    244 	off = bufgap_tell(&bg, BGFromBOF, BGByte);
    245 
    246 	if (bufgap_size(&bg, BGByte) - off < 10) {
    247 		(void) fprintf(stderr, "bad key file '%s'\n", f);
    248 		(void) free(buf);
    249 		bufgap_close(&bg);
    250 		return 0;
    251 	}
    252 
    253 	/* convert from base64 to binary */
    254 	cc = bufgap_getbin(&bg, buf, (size_t)bg.bcc);
    255 	if ((space = strchr(buf, ' ')) != NULL) {
    256 		cc = (int)(space - buf);
    257 	}
    258 	if (pgp_get_debug_level(__FILE__)) {
    259 		hexdump(stderr, NULL, (const uint8_t *)(const void *)buf, (size_t)cc);
    260 	}
    261 	cc = frombase64(bin, buf, (size_t)cc, 0);
    262 	if (pgp_get_debug_level(__FILE__)) {
    263 		hexdump(stderr, "decoded base64:", (const uint8_t *)(const void *)bin, (size_t)cc);
    264 	}
    265 	bufgap_delete(&bg, (uint64_t)bufgap_tell(&bg, BGFromEOF, BGByte));
    266 	bufgap_insert(&bg, bin, cc);
    267 	bufgap_seek(&bg, off, BGFromBOF, BGByte);
    268 
    269 	/* get the type of key */
    270 	(void) bufgap_getbin(&bg, &len, sizeof(len));
    271 	len = ntohl(len);
    272 	(void) bufgap_seek(&bg, sizeof(len), BGFromHere, BGByte);
    273 	(void) bufgap_getbin(&bg, buf, len);
    274 	(void) bufgap_seek(&bg, len, BGFromHere, BGByte);
    275 
    276 	(void) memset(key, 0x0, sizeof(*key));
    277 	pubkey = &key->key.seckey.pubkey;
    278 	pubkey->version = PGP_V4;
    279 	pubkey->birthtime = 0;
    280 	/* get key type */
    281 	ok = 1;
    282 	switch (pubkey->alg = findstr(pkatypes, buf)) {
    283 	case PGP_PKA_RSA:
    284 		/* get the 'e' param of the key */
    285 		pubkey->key.rsa.e = getbignum(&bg, buf, "RSA E");
    286 		/* get the 'n' param of the key */
    287 		pubkey->key.rsa.n = getbignum(&bg, buf, "RSA N");
    288 		break;
    289 	case PGP_PKA_DSA:
    290 		/* get the 'p' param of the key */
    291 		pubkey->key.dsa.p = getbignum(&bg, buf, "DSA P");
    292 		/* get the 'q' param of the key */
    293 		pubkey->key.dsa.q = getbignum(&bg, buf, "DSA Q");
    294 		/* get the 'g' param of the key */
    295 		pubkey->key.dsa.g = getbignum(&bg, buf, "DSA G");
    296 		/* get the 'y' param of the key */
    297 		pubkey->key.dsa.y = getbignum(&bg, buf, "DSA Y");
    298 		break;
    299 	default:
    300 		(void) fprintf(stderr, "Unrecognised pubkey type %d for '%s'\n",
    301 				pubkey->alg, f);
    302 		ok = 0;
    303 		break;
    304 	}
    305 
    306 	/* check for stragglers */
    307 	if (ok && bufgap_tell(&bg, BGFromEOF, BGByte) > 0) {
    308 		printf("%"PRIi64" bytes left\n", bufgap_tell(&bg, BGFromEOF, BGByte));
    309 		printf("[%s]\n", bufgap_getstr(&bg));
    310 		ok = 0;
    311 	}
    312 	if (ok) {
    313 		(void) memset(&userid, 0x0, sizeof(userid));
    314 		(void) gethostname(hostname, sizeof(hostname));
    315 		if (strlen(space + 1) - 1 == 0) {
    316 			(void) snprintf(owner, sizeof(owner), "<root@%s>",
    317 					hostname);
    318 		} else {
    319 			(void) snprintf(owner, sizeof(owner), "<%.*s>",
    320 				(int)strlen(space + 1) - 1,
    321 				space + 1);
    322 		}
    323 		(void) pgp_asprintf((char **)(void *)&userid,
    324 						"%s (%s) %s",
    325 						hostname,
    326 						f,
    327 						owner);
    328 		pgp_keyid(key->sigid, sizeof(key->sigid), pubkey, hashtype);
    329 		pgp_add_userid(key, userid);
    330 		pgp_fingerprint(&key->sigfingerprint, pubkey, hashtype);
    331 		free(userid);
    332 		if (pgp_get_debug_level(__FILE__)) {
    333 			/*pgp_print_keydata(io, keyring, key, "pub", pubkey, 0);*/
    334 			__PGP_USED(io); /* XXX */
    335 		}
    336 	}
    337 	(void) free(bin);
    338 	(void) free(buf);
    339 	bufgap_close(&bg);
    340 	return ok;
    341 }
    342 
    343 /* convert an ssh (host) seckey to a pgp seckey */
    344 int
    345 pgp_ssh2seckey(pgp_io_t *io, const char *f, pgp_key_t *key, pgp_pubkey_t *pubkey, pgp_hash_alg_t hashtype)
    346 {
    347 	pgp_crypt_t	crypted;
    348 	pgp_hash_t	hash;
    349 	unsigned	done = 0;
    350 	unsigned	i = 0;
    351 	uint8_t		sesskey[CAST_KEY_LENGTH];
    352 	uint8_t		hashed[PGP_SHA1_HASH_SIZE];
    353 	BIGNUM		*tmp;
    354 
    355 	__PGP_USED(io);
    356 	/* XXX - check for rsa/dsa */
    357 	if (!openssl_read_pem_seckey(f, key, "ssh-rsa", 0)) {
    358 		return 0;
    359 	}
    360 	if (pgp_get_debug_level(__FILE__)) {
    361 		/*pgp_print_keydata(io, key, "sec", &key->key.seckey.pubkey, 0);*/
    362 		/* XXX */
    363 	}
    364 	/* let's add some sane defaults */
    365 	(void) memcpy(&key->key.seckey.pubkey, pubkey, sizeof(*pubkey));
    366 	key->key.seckey.s2k_usage = PGP_S2KU_ENCRYPTED_AND_HASHED;
    367 	key->key.seckey.alg = PGP_SA_CAST5;
    368 	key->key.seckey.s2k_specifier = PGP_S2KS_SALTED;
    369 	key->key.seckey.hash_alg = PGP_HASH_SHA1;
    370 	if (key->key.seckey.pubkey.alg == PGP_PKA_RSA) {
    371 		/* openssh and openssl have p and q swapped */
    372 		tmp = key->key.seckey.key.rsa.p;
    373 		key->key.seckey.key.rsa.p = key->key.seckey.key.rsa.q;
    374 		key->key.seckey.key.rsa.q = tmp;
    375 	}
    376 	for (done = 0, i = 0; done < CAST_KEY_LENGTH; i++) {
    377 		unsigned 	j;
    378 		uint8_t		zero = 0;
    379 		int             needed;
    380 		int             size;
    381 
    382 		needed = CAST_KEY_LENGTH - done;
    383 		size = MIN(needed, PGP_SHA1_HASH_SIZE);
    384 
    385 		pgp_hash_any(&hash, key->key.seckey.hash_alg);
    386 		if (!hash.init(&hash)) {
    387 			(void) fprintf(stderr, "write_seckey_body: bad alloc\n");
    388 			return 0;
    389 		}
    390 
    391 		/* preload if iterating  */
    392 		for (j = 0; j < i; j++) {
    393 			/*
    394 			 * Coverity shows a DEADCODE error on this
    395 			 * line. This is expected since the hardcoded
    396 			 * use of SHA1 and CAST5 means that it will
    397 			 * not used. This will change however when
    398 			 * other algorithms are supported.
    399 			 */
    400 			hash.add(&hash, &zero, 1);
    401 		}
    402 
    403 		if (key->key.seckey.s2k_specifier == PGP_S2KS_SALTED) {
    404 			hash.add(&hash, key->key.seckey.salt, PGP_SALT_SIZE);
    405 		}
    406 		hash.finish(&hash, hashed);
    407 
    408 		/*
    409 		 * if more in hash than is needed by session key, use
    410 		 * the leftmost octets
    411 		 */
    412 		(void) memcpy(&sesskey[i * PGP_SHA1_HASH_SIZE],
    413 				hashed, (unsigned)size);
    414 		done += (unsigned)size;
    415 		if (done > CAST_KEY_LENGTH) {
    416 			(void) fprintf(stderr,
    417 				"write_seckey_body: short add\n");
    418 			return 0;
    419 		}
    420 	}
    421 	pgp_crypt_any(&crypted, key->key.seckey.alg);
    422 	crypted.set_iv(&crypted, key->key.seckey.iv);
    423 	crypted.set_crypt_key(&crypted, sesskey);
    424 	pgp_encrypt_init(&crypted);
    425 	key->key.seckey.pubkey.alg = PGP_PKA_RSA;
    426 	pgp_fingerprint(&key->sigfingerprint, pubkey, hashtype);
    427 	pgp_keyid(key->sigid, sizeof(key->sigid), pubkey, hashtype);
    428 	return 1;
    429 }
    430 
    431 /* read a key from the ssh file, and add it to a keyring */
    432 int
    433 pgp_ssh2_readkeys(pgp_io_t *io, pgp_keyring_t *pubring,
    434 		pgp_keyring_t *secring, const char *pubfile,
    435 		const char *secfile, unsigned hashtype)
    436 {
    437 	pgp_key_t		*pubkey;
    438 	pgp_key_t		*seckey;
    439 	pgp_key_t		 key;
    440 
    441 	pubkey = NULL;
    442 	(void) memset(&key, 0x0, sizeof(key));
    443 	if (pubfile) {
    444 		if (pgp_get_debug_level(__FILE__)) {
    445 			(void) fprintf(io->errs, "pgp_ssh2_readkeys: pubfile '%s'\n", pubfile);
    446 		}
    447 		if (!pgp_ssh2pubkey(io, pubfile, &key, (pgp_hash_alg_t)hashtype)) {
    448 			(void) fprintf(io->errs, "pgp_ssh2_readkeys: can't read pubkeys '%s'\n", pubfile);
    449 			return 0;
    450 		}
    451 		EXPAND_ARRAY(pubring, key);
    452 		pubkey = &pubring->keys[pubring->keyc++];
    453 		(void) memcpy(pubkey, &key, sizeof(key));
    454 		pubkey->type = PGP_PTAG_CT_PUBLIC_KEY;
    455 	}
    456 	if (secfile) {
    457 		if (pgp_get_debug_level(__FILE__)) {
    458 			(void) fprintf(io->errs, "pgp_ssh2_readkeys: secfile '%s'\n", secfile);
    459 		}
    460 		if (pubkey == NULL) {
    461 			pubkey = &pubring->keys[0];
    462 		}
    463 		if (!pgp_ssh2seckey(io, secfile, &key, &pubkey->key.pubkey, (pgp_hash_alg_t)hashtype)) {
    464 			(void) fprintf(io->errs, "pgp_ssh2_readkeys: can't read seckeys '%s'\n", secfile);
    465 			return 0;
    466 		}
    467 		EXPAND_ARRAY(secring, key);
    468 		seckey = &secring->keys[secring->keyc++];
    469 		(void) memcpy(seckey, &key, sizeof(key));
    470 		seckey->type = PGP_PTAG_CT_SECRET_KEY;
    471 	}
    472 	return 1;
    473 }
    474