Home | History | Annotate | Line # | Download | only in libtelnet
encrypt.c revision 1.18
      1  1.18      maya /*	$NetBSD: encrypt.c,v 1.18 2019/01/05 08:55:58 maya Exp $	*/
      2   1.6  christos 
      3   1.1       cgd /*-
      4   1.3       cgd  * Copyright (c) 1991, 1993
      5   1.3       cgd  *	The Regents of the University of California.  All rights reserved.
      6   1.1       cgd  *
      7   1.1       cgd  * Redistribution and use in source and binary forms, with or without
      8   1.1       cgd  * modification, are permitted provided that the following conditions
      9   1.1       cgd  * are met:
     10   1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     11   1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     12   1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     13   1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     14   1.1       cgd  *    documentation and/or other materials provided with the distribution.
     15  1.12       agc  * 3. Neither the name of the University nor the names of its contributors
     16   1.1       cgd  *    may be used to endorse or promote products derived from this software
     17   1.1       cgd  *    without specific prior written permission.
     18   1.1       cgd  *
     19   1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     20   1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     21   1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     22   1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     23   1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     24   1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     25   1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     26   1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     27   1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     28   1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     29   1.1       cgd  * SUCH DAMAGE.
     30   1.1       cgd  */
     31   1.1       cgd 
     32   1.5     lukem #include <sys/cdefs.h>
     33   1.5     lukem #if 0
     34   1.5     lukem static char sccsid[] = "@(#)encrypt.c	8.2 (Berkeley) 5/30/95";
     35   1.5     lukem #else
     36  1.18      maya __RCSID("$NetBSD: encrypt.c,v 1.18 2019/01/05 08:55:58 maya Exp $");
     37   1.1       cgd #endif /* not lint */
     38   1.1       cgd 
     39   1.1       cgd /*
     40   1.1       cgd  * Copyright (C) 1990 by the Massachusetts Institute of Technology
     41   1.1       cgd  *
     42   1.1       cgd  * Export of this software from the United States of America is assumed
     43   1.1       cgd  * to require a specific license from the United States Government.
     44   1.1       cgd  * It is the responsibility of any person or organization contemplating
     45   1.1       cgd  * export to obtain such a license before exporting.
     46   1.1       cgd  *
     47   1.1       cgd  * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
     48   1.1       cgd  * distribute this software and its documentation for any purpose and
     49   1.1       cgd  * without fee is hereby granted, provided that the above copyright
     50   1.1       cgd  * notice appear in all copies and that both that copyright notice and
     51   1.1       cgd  * this permission notice appear in supporting documentation, and that
     52   1.1       cgd  * the name of M.I.T. not be used in advertising or publicity pertaining
     53   1.1       cgd  * to distribution of the software without specific, written prior
     54   1.1       cgd  * permission.  M.I.T. makes no representations about the suitability of
     55   1.1       cgd  * this software for any purpose.  It is provided "as is" without express
     56   1.1       cgd  * or implied warranty.
     57   1.1       cgd  */
     58   1.1       cgd 
     59   1.7   thorpej #ifdef	ENCRYPTION
     60   1.7   thorpej 
     61   1.7   thorpej #include <stdio.h>
     62   1.7   thorpej #define	ENCRYPT_NAMES
     63   1.7   thorpej #include <arpa/telnet.h>
     64   1.7   thorpej 
     65   1.7   thorpej #include "encrypt.h"
     66   1.7   thorpej #include "misc.h"
     67   1.7   thorpej 
     68   1.7   thorpej #include <stdlib.h>
     69   1.7   thorpej #ifdef	NO_STRING_H
     70   1.7   thorpej #include <strings.h>
     71   1.7   thorpej #else
     72   1.7   thorpej #include <string.h>
     73   1.7   thorpej #endif
     74   1.7   thorpej 
     75   1.7   thorpej /*
     76   1.7   thorpej  * These functions pointers point to the current routines
     77   1.7   thorpej  * for encrypting and decrypting data.
     78   1.7   thorpej  */
     79  1.13     perry void	(*encrypt_output)(unsigned char *, int);
     80  1.13     perry int	(*decrypt_input)(int);
     81   1.7   thorpej 
     82   1.7   thorpej int encrypt_debug_mode = 0;
     83   1.7   thorpej static int decrypt_mode = 0;
     84   1.7   thorpej static int encrypt_mode = 0;
     85   1.7   thorpej static int encrypt_verbose = 0;
     86   1.7   thorpej static int autoencrypt = 0;
     87   1.7   thorpej static int autodecrypt = 0;
     88   1.7   thorpej static int havesessionkey = 0;
     89   1.7   thorpej static int Server = 0;
     90   1.7   thorpej static const char *Name = "Noname";
     91   1.7   thorpej 
     92   1.7   thorpej #define	typemask(x)	((x) > 0 ? 1 << ((x)-1) : 0)
     93   1.7   thorpej 
     94   1.7   thorpej static long i_support_encrypt = typemask(ENCTYPE_DES_CFB64)
     95   1.7   thorpej 				| typemask(ENCTYPE_DES_OFB64);
     96   1.7   thorpej static long i_support_decrypt = typemask(ENCTYPE_DES_CFB64)
     97   1.7   thorpej 				| typemask(ENCTYPE_DES_OFB64);
     98   1.7   thorpej static long i_wont_support_encrypt = 0;
     99   1.7   thorpej static long i_wont_support_decrypt = 0;
    100   1.7   thorpej #define	I_SUPPORT_ENCRYPT	(i_support_encrypt & ~i_wont_support_encrypt)
    101   1.7   thorpej #define	I_SUPPORT_DECRYPT	(i_support_decrypt & ~i_wont_support_decrypt)
    102   1.7   thorpej 
    103   1.7   thorpej static long remote_supports_encrypt = 0;
    104   1.7   thorpej static long remote_supports_decrypt = 0;
    105   1.7   thorpej 
    106   1.7   thorpej static Encryptions encryptions[] = {
    107   1.7   thorpej #ifdef	DES_ENCRYPTION
    108   1.7   thorpej     { "DES_CFB64",	ENCTYPE_DES_CFB64,
    109   1.7   thorpej 			cfb64_encrypt,
    110   1.7   thorpej 			cfb64_decrypt,
    111   1.7   thorpej 			cfb64_init,
    112   1.7   thorpej 			cfb64_start,
    113   1.7   thorpej 			cfb64_is,
    114   1.7   thorpej 			cfb64_reply,
    115   1.7   thorpej 			cfb64_session,
    116   1.7   thorpej 			cfb64_keyid,
    117   1.7   thorpej 			cfb64_printsub },
    118   1.7   thorpej     { "DES_OFB64",	ENCTYPE_DES_OFB64,
    119   1.7   thorpej 			ofb64_encrypt,
    120   1.7   thorpej 			ofb64_decrypt,
    121   1.7   thorpej 			ofb64_init,
    122   1.7   thorpej 			ofb64_start,
    123   1.7   thorpej 			ofb64_is,
    124   1.7   thorpej 			ofb64_reply,
    125   1.7   thorpej 			ofb64_session,
    126   1.7   thorpej 			ofb64_keyid,
    127   1.7   thorpej 			ofb64_printsub },
    128   1.7   thorpej #endif	/* DES_ENCRYPTION */
    129  1.16  christos     { .name = 0 },
    130   1.7   thorpej };
    131   1.7   thorpej 
    132   1.7   thorpej static unsigned char str_send[64] = { IAC, SB, TELOPT_ENCRYPT,
    133   1.7   thorpej 					 ENCRYPT_SUPPORT };
    134   1.7   thorpej static unsigned char str_suplen = 0;
    135   1.7   thorpej static unsigned char str_start[72] = { IAC, SB, TELOPT_ENCRYPT };
    136   1.7   thorpej static unsigned char str_end[] = { IAC, SB, TELOPT_ENCRYPT, 0, IAC, SE };
    137   1.7   thorpej 
    138  1.17      matt Encryptions *
    139  1.17      matt findencryption(int type)
    140   1.7   thorpej {
    141   1.7   thorpej 	Encryptions *ep = encryptions;
    142   1.7   thorpej 
    143   1.7   thorpej 	if (!(I_SUPPORT_ENCRYPT & remote_supports_decrypt & typemask(type)))
    144   1.7   thorpej 		return(0);
    145   1.7   thorpej 	while (ep->type && ep->type != type)
    146   1.7   thorpej 		++ep;
    147   1.7   thorpej 	return(ep->type ? ep : 0);
    148   1.7   thorpej }
    149   1.7   thorpej 
    150  1.17      matt Encryptions *
    151  1.17      matt finddecryption(int type)
    152   1.7   thorpej {
    153   1.7   thorpej 	Encryptions *ep = encryptions;
    154   1.7   thorpej 
    155   1.7   thorpej 	if (!(I_SUPPORT_DECRYPT & remote_supports_encrypt & typemask(type)))
    156   1.7   thorpej 		return(0);
    157   1.7   thorpej 	while (ep->type && ep->type != type)
    158   1.7   thorpej 		++ep;
    159   1.7   thorpej 	return(ep->type ? ep : 0);
    160   1.7   thorpej }
    161   1.7   thorpej 
    162   1.7   thorpej #define	MAXKEYLEN 64
    163   1.7   thorpej 
    164   1.7   thorpej static struct key_info {
    165   1.7   thorpej 	unsigned char keyid[MAXKEYLEN];
    166   1.7   thorpej 	int keylen;
    167   1.7   thorpej 	int dir;
    168   1.7   thorpej 	int *modep;
    169  1.13     perry 	Encryptions *(*getcrypt)(int);
    170   1.7   thorpej } ki[2] = {
    171   1.7   thorpej 	{ { 0 }, 0, DIR_ENCRYPT, &encrypt_mode, findencryption },
    172   1.7   thorpej 	{ { 0 }, 0, DIR_DECRYPT, &decrypt_mode, finddecryption },
    173   1.7   thorpej };
    174   1.7   thorpej 
    175  1.17      matt void
    176  1.17      matt encrypt_init(const char *name, int server)
    177   1.7   thorpej {
    178   1.7   thorpej 	Encryptions *ep = encryptions;
    179   1.7   thorpej 
    180   1.7   thorpej 	Name = name;
    181   1.7   thorpej 	Server = server;
    182   1.7   thorpej 	i_support_encrypt = i_support_decrypt = 0;
    183   1.7   thorpej 	remote_supports_encrypt = remote_supports_decrypt = 0;
    184   1.7   thorpej 	encrypt_mode = 0;
    185   1.7   thorpej 	decrypt_mode = 0;
    186   1.7   thorpej 	encrypt_output = 0;
    187   1.7   thorpej 	decrypt_input = 0;
    188   1.7   thorpej #ifdef notdef
    189   1.7   thorpej 	encrypt_verbose = !server;
    190   1.7   thorpej #endif
    191   1.7   thorpej 
    192   1.7   thorpej 	str_suplen = 4;
    193   1.7   thorpej 
    194   1.7   thorpej 	while (ep->type) {
    195   1.7   thorpej 		if (encrypt_debug_mode)
    196   1.7   thorpej 			printf(">>>%s: I will support %s\r\n",
    197   1.7   thorpej 				Name, ENCTYPE_NAME(ep->type));
    198   1.7   thorpej 		i_support_encrypt |= typemask(ep->type);
    199   1.7   thorpej 		i_support_decrypt |= typemask(ep->type);
    200   1.7   thorpej 		if ((i_wont_support_decrypt & typemask(ep->type)) == 0)
    201   1.7   thorpej 			if ((str_send[str_suplen++] = ep->type) == IAC)
    202   1.7   thorpej 				str_send[str_suplen++] = IAC;
    203   1.7   thorpej 		if (ep->init)
    204   1.7   thorpej 			(*ep->init)(Server);
    205   1.7   thorpej 		++ep;
    206   1.7   thorpej 	}
    207   1.7   thorpej 	str_send[str_suplen++] = IAC;
    208   1.7   thorpej 	str_send[str_suplen++] = SE;
    209   1.7   thorpej }
    210   1.7   thorpej 
    211  1.17      matt void
    212  1.17      matt encrypt_list_types(void)
    213   1.7   thorpej {
    214   1.7   thorpej 	Encryptions *ep = encryptions;
    215   1.7   thorpej 
    216   1.7   thorpej 	printf("Valid encryption types:\n");
    217   1.7   thorpej 	while (ep->type) {
    218   1.7   thorpej 		printf("\t%s (%d)\r\n", ENCTYPE_NAME(ep->type), ep->type);
    219   1.7   thorpej 		++ep;
    220   1.7   thorpej 	}
    221   1.7   thorpej }
    222   1.7   thorpej 
    223  1.17      matt int
    224  1.17      matt EncryptEnable(char *type, char *mode)
    225   1.7   thorpej {
    226   1.7   thorpej 	if (isprefix(type, "help") || isprefix(type, "?")) {
    227   1.7   thorpej 		printf("Usage: encrypt enable <type> [input|output]\n");
    228   1.7   thorpej 		encrypt_list_types();
    229  1.18      maya 		return 0;
    230   1.7   thorpej 	}
    231   1.7   thorpej 	if (EncryptType(type, mode))
    232  1.18      maya 		return EncryptStart(mode, NULL);
    233  1.18      maya 	return 0;
    234   1.7   thorpej }
    235   1.7   thorpej 
    236  1.17      matt int
    237  1.17      matt EncryptDisable(char *type, char *mode)
    238   1.7   thorpej {
    239   1.7   thorpej 	register Encryptions *ep;
    240   1.7   thorpej 	int ret = 0;
    241   1.7   thorpej 
    242   1.7   thorpej 	if (isprefix(type, "help") || isprefix(type, "?")) {
    243   1.7   thorpej 		printf("Usage: encrypt disable <type> [input|output]\n");
    244   1.7   thorpej 		encrypt_list_types();
    245   1.7   thorpej 	} else if ((ep = (Encryptions *)genget(type, (char **)encryptions,
    246   1.7   thorpej 						sizeof(Encryptions))) == 0) {
    247   1.7   thorpej 		printf("%s: invalid encryption type\n", type);
    248   1.7   thorpej 	} else if (Ambiguous(ep)) {
    249   1.7   thorpej 		printf("Ambiguous type '%s'\n", type);
    250   1.7   thorpej 	} else {
    251   1.7   thorpej 		if ((mode == 0) || (isprefix(mode, "input") ? 1 : 0)) {
    252   1.7   thorpej 			if (decrypt_mode == ep->type)
    253  1.18      maya 				EncryptStopInput(NULL, NULL);
    254   1.7   thorpej 			i_wont_support_decrypt |= typemask(ep->type);
    255   1.7   thorpej 			ret = 1;
    256   1.7   thorpej 		}
    257   1.7   thorpej 		if ((mode == 0) || (isprefix(mode, "output"))) {
    258   1.7   thorpej 			if (encrypt_mode == ep->type)
    259  1.18      maya 				EncryptStopOutput(NULL, NULL);
    260   1.7   thorpej 			i_wont_support_encrypt |= typemask(ep->type);
    261   1.7   thorpej 			ret = 1;
    262   1.7   thorpej 		}
    263   1.7   thorpej 		if (ret == 0)
    264   1.7   thorpej 			printf("%s: invalid encryption mode\n", mode);
    265   1.7   thorpej 	}
    266   1.7   thorpej 	return(ret);
    267   1.7   thorpej }
    268   1.7   thorpej 
    269  1.17      matt int
    270  1.17      matt EncryptType(char *type, char *mode)
    271   1.7   thorpej {
    272   1.7   thorpej 	register Encryptions *ep;
    273   1.7   thorpej 	int ret = 0;
    274   1.7   thorpej 
    275   1.7   thorpej 	if (isprefix(type, "help") || isprefix(type, "?")) {
    276   1.7   thorpej 		printf("Usage: encrypt type <type> [input|output]\n");
    277   1.7   thorpej 		encrypt_list_types();
    278   1.7   thorpej 	} else if ((ep = (Encryptions *)genget(type, (char **)encryptions,
    279   1.7   thorpej 						sizeof(Encryptions))) == 0) {
    280   1.7   thorpej 		printf("%s: invalid encryption type\n", type);
    281   1.7   thorpej 	} else if (Ambiguous(ep)) {
    282   1.7   thorpej 		printf("Ambiguous type '%s'\n", type);
    283   1.7   thorpej 	} else {
    284   1.7   thorpej 		if ((mode == 0) || isprefix(mode, "input")) {
    285   1.7   thorpej 			decrypt_mode = ep->type;
    286   1.7   thorpej 			i_wont_support_decrypt &= ~typemask(ep->type);
    287   1.7   thorpej 			ret = 1;
    288   1.7   thorpej 		}
    289   1.7   thorpej 		if ((mode == 0) || isprefix(mode, "output")) {
    290   1.7   thorpej 			encrypt_mode = ep->type;
    291   1.7   thorpej 			i_wont_support_encrypt &= ~typemask(ep->type);
    292   1.7   thorpej 			ret = 1;
    293   1.7   thorpej 		}
    294   1.7   thorpej 		if (ret == 0)
    295   1.7   thorpej 			printf("%s: invalid encryption mode\n", mode);
    296   1.7   thorpej 	}
    297   1.7   thorpej 	return(ret);
    298   1.7   thorpej }
    299   1.7   thorpej 
    300  1.17      matt int
    301  1.18      maya EncryptStart(char *mode, char *unused __unused)
    302   1.7   thorpej {
    303   1.7   thorpej 	register int ret = 0;
    304   1.7   thorpej 	if (mode) {
    305   1.7   thorpej 		if (isprefix(mode, "input"))
    306  1.18      maya 			return EncryptStartInput(NULL, NULL);
    307   1.7   thorpej 		if (isprefix(mode, "output"))
    308  1.18      maya 			return EncryptStartOutput(NULL, NULL);
    309   1.7   thorpej 		if (isprefix(mode, "help") || isprefix(mode, "?")) {
    310   1.7   thorpej 			printf("Usage: encrypt start [input|output]\n");
    311  1.18      maya 			return 0;
    312   1.7   thorpej 		}
    313   1.7   thorpej 		printf("%s: invalid encryption mode 'encrypt start ?' for help\n", mode);
    314  1.18      maya 		return 0;
    315   1.7   thorpej 	}
    316  1.18      maya 	ret += EncryptStartInput(NULL, NULL);
    317  1.18      maya 	ret += EncryptStartOutput(NULL, NULL);
    318  1.18      maya 	return ret;
    319   1.7   thorpej }
    320   1.7   thorpej 
    321  1.17      matt int
    322  1.18      maya EncryptStartInput(char *unused1 __unused, char *unused2 __unused)
    323   1.7   thorpej {
    324   1.7   thorpej 	if (decrypt_mode) {
    325   1.7   thorpej 		encrypt_send_request_start();
    326   1.7   thorpej 		return(1);
    327   1.7   thorpej 	}
    328   1.7   thorpej 	printf("No previous decryption mode, decryption not enabled\r\n");
    329   1.7   thorpej 	return(0);
    330   1.7   thorpej }
    331   1.7   thorpej 
    332  1.17      matt int
    333  1.18      maya EncryptStartOutput(char *unused1 __unused, char *unused2 __unused)
    334   1.7   thorpej {
    335   1.7   thorpej 	if (encrypt_mode) {
    336   1.7   thorpej 		encrypt_start_output(encrypt_mode);
    337   1.7   thorpej 		return(1);
    338   1.7   thorpej 	}
    339   1.7   thorpej 	printf("No previous encryption mode, encryption not enabled\r\n");
    340   1.7   thorpej 	return(0);
    341   1.7   thorpej }
    342   1.7   thorpej 
    343  1.17      matt int
    344  1.18      maya EncryptStop(char *mode, char *unused __unused)
    345   1.7   thorpej {
    346   1.7   thorpej 	int ret = 0;
    347   1.7   thorpej 	if (mode) {
    348   1.7   thorpej 		if (isprefix(mode, "input"))
    349  1.18      maya 			return EncryptStopInput(NULL, NULL);
    350   1.7   thorpej 		if (isprefix(mode, "output"))
    351  1.18      maya 			return EncryptStopOutput(NULL, NULL);
    352   1.7   thorpej 		if (isprefix(mode, "help") || isprefix(mode, "?")) {
    353   1.7   thorpej 			printf("Usage: encrypt stop [input|output]\n");
    354  1.18      maya 			return 0;
    355   1.7   thorpej 		}
    356   1.7   thorpej 		printf("%s: invalid encryption mode 'encrypt stop ?' for help\n", mode);
    357  1.18      maya 		return 0;
    358   1.7   thorpej 	}
    359  1.18      maya 	ret += EncryptStopInput(NULL, NULL);
    360  1.18      maya 	ret += EncryptStopOutput(NULL, NULL);
    361  1.18      maya 	return ret;
    362   1.7   thorpej }
    363   1.7   thorpej 
    364  1.17      matt int
    365  1.18      maya EncryptStopInput(char *unused1 __unused, char *unused2 __unused)
    366   1.7   thorpej {
    367   1.7   thorpej 	encrypt_send_request_end();
    368  1.18      maya 	return 1;
    369   1.7   thorpej }
    370   1.7   thorpej 
    371  1.17      matt int
    372  1.18      maya EncryptStopOutput(char *unused1 __unused, char *unused2 __unused)
    373   1.7   thorpej {
    374   1.7   thorpej 	encrypt_send_end();
    375  1.18      maya 	return 1;
    376   1.7   thorpej }
    377   1.7   thorpej 
    378  1.17      matt void
    379  1.17      matt encrypt_display(void)
    380   1.7   thorpej {
    381   1.7   thorpej 	if (encrypt_output)
    382   1.7   thorpej 		printf("Currently encrypting output with %s\r\n",
    383   1.7   thorpej 			ENCTYPE_NAME(encrypt_mode));
    384   1.7   thorpej 	if (decrypt_input)
    385   1.7   thorpej 		printf("Currently decrypting input with %s\r\n",
    386   1.7   thorpej 			ENCTYPE_NAME(decrypt_mode));
    387   1.7   thorpej }
    388   1.7   thorpej 
    389  1.17      matt int
    390  1.18      maya EncryptStatus(char *unused1 __unused, char *unused2 __unused)
    391   1.7   thorpej {
    392   1.7   thorpej 	if (encrypt_output)
    393   1.7   thorpej 		printf("Currently encrypting output with %s\r\n",
    394   1.7   thorpej 			ENCTYPE_NAME(encrypt_mode));
    395   1.7   thorpej 	else if (encrypt_mode) {
    396   1.7   thorpej 		printf("Currently output is clear text.\r\n");
    397   1.7   thorpej 		printf("Last encryption mode was %s\r\n",
    398   1.7   thorpej 			ENCTYPE_NAME(encrypt_mode));
    399   1.7   thorpej 	}
    400   1.7   thorpej 	if (decrypt_input) {
    401   1.7   thorpej 		printf("Currently decrypting input with %s\r\n",
    402   1.7   thorpej 			ENCTYPE_NAME(decrypt_mode));
    403   1.7   thorpej 	} else if (decrypt_mode) {
    404   1.7   thorpej 		printf("Currently input is clear text.\r\n");
    405   1.7   thorpej 		printf("Last decryption mode was %s\r\n",
    406   1.7   thorpej 			ENCTYPE_NAME(decrypt_mode));
    407   1.7   thorpej 	}
    408   1.7   thorpej 	return 1;
    409   1.7   thorpej }
    410   1.7   thorpej 
    411  1.17      matt void
    412  1.17      matt encrypt_send_support(void)
    413   1.7   thorpej {
    414   1.7   thorpej 	if (str_suplen) {
    415   1.7   thorpej 		/*
    416   1.7   thorpej 		 * If the user has requested that decryption start
    417   1.7   thorpej 		 * immediatly, then send a "REQUEST START" before
    418   1.7   thorpej 		 * we negotiate the type.
    419   1.7   thorpej 		 */
    420   1.7   thorpej 		if (!Server && autodecrypt)
    421   1.7   thorpej 			encrypt_send_request_start();
    422   1.7   thorpej 		telnet_net_write(str_send, str_suplen);
    423   1.7   thorpej 		printsub('>', &str_send[2], str_suplen - 2);
    424   1.7   thorpej 		str_suplen = 0;
    425   1.7   thorpej 	}
    426   1.7   thorpej }
    427   1.7   thorpej 
    428  1.17      matt int
    429  1.17      matt EncryptDebug(int on)
    430   1.7   thorpej {
    431   1.7   thorpej 	if (on < 0)
    432   1.7   thorpej 		encrypt_debug_mode ^= 1;
    433   1.7   thorpej 	else
    434   1.7   thorpej 		encrypt_debug_mode = on;
    435   1.7   thorpej 	printf("Encryption debugging %s\r\n",
    436   1.7   thorpej 		encrypt_debug_mode ? "enabled" : "disabled");
    437   1.7   thorpej 	return(1);
    438   1.7   thorpej }
    439   1.7   thorpej 
    440  1.17      matt int
    441  1.17      matt EncryptVerbose(int on)
    442   1.7   thorpej {
    443   1.7   thorpej 	if (on < 0)
    444   1.7   thorpej 		encrypt_verbose ^= 1;
    445   1.7   thorpej 	else
    446   1.7   thorpej 		encrypt_verbose = on;
    447   1.7   thorpej 	printf("Encryption %s verbose\r\n",
    448   1.7   thorpej 		encrypt_verbose ? "is" : "is not");
    449   1.7   thorpej 	return(1);
    450   1.7   thorpej }
    451   1.7   thorpej 
    452  1.17      matt int
    453  1.17      matt EncryptAutoEnc(int on)
    454   1.7   thorpej {
    455   1.7   thorpej 	encrypt_auto(on);
    456   1.7   thorpej 	printf("Automatic encryption of output is %s\r\n",
    457   1.7   thorpej 		autoencrypt ? "enabled" : "disabled");
    458   1.7   thorpej 	return(1);
    459   1.7   thorpej }
    460   1.7   thorpej 
    461  1.17      matt int
    462  1.17      matt EncryptAutoDec(int on)
    463   1.7   thorpej {
    464   1.7   thorpej 	decrypt_auto(on);
    465   1.7   thorpej 	printf("Automatic decryption of input is %s\r\n",
    466   1.7   thorpej 		autodecrypt ? "enabled" : "disabled");
    467   1.7   thorpej 	return(1);
    468   1.7   thorpej }
    469   1.7   thorpej 
    470   1.7   thorpej /*
    471   1.7   thorpej  * Called when ENCRYPT SUPPORT is received.
    472   1.7   thorpej  */
    473  1.17      matt void
    474  1.17      matt encrypt_support(unsigned char *typelist, int cnt)
    475   1.7   thorpej {
    476   1.7   thorpej 	register int type, use_type = 0;
    477   1.7   thorpej 	Encryptions *ep;
    478   1.7   thorpej 
    479   1.7   thorpej 	/*
    480   1.7   thorpej 	 * Forget anything the other side has previously told us.
    481   1.7   thorpej 	 */
    482   1.7   thorpej 	remote_supports_decrypt = 0;
    483   1.7   thorpej 
    484   1.7   thorpej 	while (cnt-- > 0) {
    485   1.7   thorpej 		type = *typelist++;
    486   1.7   thorpej 		if (encrypt_debug_mode)
    487   1.7   thorpej 			printf(">>>%s: He is supporting %s (%d)\r\n",
    488   1.7   thorpej 				Name,
    489   1.7   thorpej 				ENCTYPE_NAME(type), type);
    490   1.7   thorpej 		if ((type < ENCTYPE_CNT) &&
    491   1.7   thorpej 		    (I_SUPPORT_ENCRYPT & typemask(type))) {
    492   1.7   thorpej 			remote_supports_decrypt |= typemask(type);
    493   1.7   thorpej 			if (use_type == 0)
    494   1.7   thorpej 				use_type = type;
    495   1.7   thorpej 		}
    496   1.7   thorpej 	}
    497   1.7   thorpej 	if (use_type) {
    498   1.7   thorpej 		ep = findencryption(use_type);
    499   1.7   thorpej 		if (!ep)
    500   1.7   thorpej 			return;
    501   1.7   thorpej 		type = ep->start ? (*ep->start)(DIR_ENCRYPT, Server) : 0;
    502   1.7   thorpej 		if (encrypt_debug_mode)
    503   1.7   thorpej 			printf(">>>%s: (*ep->start)() returned %d\r\n",
    504   1.7   thorpej 					Name, type);
    505   1.7   thorpej 		if (type < 0)
    506   1.7   thorpej 			return;
    507   1.7   thorpej 		encrypt_mode = use_type;
    508   1.7   thorpej 		if (type == 0)
    509   1.7   thorpej 			encrypt_start_output(use_type);
    510   1.7   thorpej 	}
    511   1.7   thorpej }
    512   1.7   thorpej 
    513  1.17      matt void
    514  1.17      matt encrypt_is(unsigned char *data, int cnt)
    515   1.7   thorpej {
    516   1.7   thorpej 	Encryptions *ep;
    517   1.7   thorpej 	register int type, ret;
    518   1.7   thorpej 
    519   1.7   thorpej 	if (--cnt < 0)
    520   1.7   thorpej 		return;
    521   1.7   thorpej 	type = *data++;
    522   1.7   thorpej 	if (type < ENCTYPE_CNT)
    523   1.7   thorpej 		remote_supports_encrypt |= typemask(type);
    524   1.7   thorpej 	if (!(ep = finddecryption(type))) {
    525   1.7   thorpej 		if (encrypt_debug_mode)
    526   1.7   thorpej 			printf(">>>%s: Can't find type %s (%d) for initial negotiation\r\n",
    527   1.7   thorpej 				Name,
    528   1.7   thorpej 				ENCTYPE_NAME_OK(type)
    529   1.7   thorpej 					? ENCTYPE_NAME(type) : "(unknown)",
    530   1.7   thorpej 				type);
    531   1.7   thorpej 		return;
    532   1.7   thorpej 	}
    533   1.7   thorpej 	if (!ep->is) {
    534   1.7   thorpej 		if (encrypt_debug_mode)
    535   1.7   thorpej 			printf(">>>%s: No initial negotiation needed for type %s (%d)\r\n",
    536   1.7   thorpej 				Name,
    537   1.7   thorpej 				ENCTYPE_NAME_OK(type)
    538   1.7   thorpej 					? ENCTYPE_NAME(type) : "(unknown)",
    539   1.7   thorpej 				type);
    540   1.7   thorpej 		ret = 0;
    541   1.7   thorpej 	} else {
    542   1.7   thorpej 		ret = (*ep->is)(data, cnt);
    543   1.7   thorpej 		if (encrypt_debug_mode)
    544   1.7   thorpej 			printf("(*ep->is)(%p, %d) returned %s(%d)\n", data, cnt,
    545   1.7   thorpej 				(ret < 0) ? "FAIL " :
    546   1.7   thorpej 				(ret == 0) ? "SUCCESS " : "MORE_TO_DO ", ret);
    547   1.7   thorpej 	}
    548   1.7   thorpej 	if (ret < 0) {
    549   1.7   thorpej 		autodecrypt = 0;
    550   1.7   thorpej 	} else {
    551   1.7   thorpej 		decrypt_mode = type;
    552   1.7   thorpej 		if (ret == 0 && autodecrypt)
    553   1.7   thorpej 			encrypt_send_request_start();
    554   1.7   thorpej 	}
    555   1.7   thorpej }
    556   1.7   thorpej 
    557  1.17      matt void
    558  1.17      matt encrypt_reply(unsigned char *data, int cnt)
    559   1.7   thorpej {
    560   1.7   thorpej 	Encryptions *ep;
    561   1.7   thorpej 	register int ret, type;
    562   1.7   thorpej 
    563   1.7   thorpej 	if (--cnt < 0)
    564   1.7   thorpej 		return;
    565   1.7   thorpej 	type = *data++;
    566   1.7   thorpej 	if (!(ep = findencryption(type))) {
    567   1.7   thorpej 		if (encrypt_debug_mode)
    568   1.7   thorpej 			printf(">>>%s: Can't find type %s (%d) for initial negotiation\r\n",
    569   1.7   thorpej 				Name,
    570   1.7   thorpej 				ENCTYPE_NAME_OK(type)
    571   1.7   thorpej 					? ENCTYPE_NAME(type) : "(unknown)",
    572   1.7   thorpej 				type);
    573   1.7   thorpej 		return;
    574   1.7   thorpej 	}
    575   1.7   thorpej 	if (!ep->reply) {
    576   1.7   thorpej 		if (encrypt_debug_mode)
    577   1.7   thorpej 			printf(">>>%s: No initial negotiation needed for type %s (%d)\r\n",
    578   1.7   thorpej 				Name,
    579   1.7   thorpej 				ENCTYPE_NAME_OK(type)
    580   1.7   thorpej 					? ENCTYPE_NAME(type) : "(unknown)",
    581   1.7   thorpej 				type);
    582   1.7   thorpej 		ret = 0;
    583   1.7   thorpej 	} else {
    584   1.7   thorpej 		ret = (*ep->reply)(data, cnt);
    585   1.7   thorpej 		if (encrypt_debug_mode)
    586   1.7   thorpej 			printf("(*ep->reply)(%p, %d) returned %s(%d)\n",
    587   1.7   thorpej 				data, cnt,
    588   1.7   thorpej 				(ret < 0) ? "FAIL " :
    589   1.7   thorpej 				(ret == 0) ? "SUCCESS " : "MORE_TO_DO ", ret);
    590   1.7   thorpej 	}
    591   1.7   thorpej 	if (encrypt_debug_mode)
    592   1.7   thorpej 		printf(">>>%s: encrypt_reply returned %d\n", Name, ret);
    593   1.7   thorpej 	if (ret < 0) {
    594   1.7   thorpej 		autoencrypt = 0;
    595   1.7   thorpej 	} else {
    596   1.7   thorpej 		encrypt_mode = type;
    597   1.7   thorpej 		if (ret == 0 && autoencrypt)
    598   1.7   thorpej 			encrypt_start_output(type);
    599   1.7   thorpej 	}
    600   1.7   thorpej }
    601   1.7   thorpej 
    602   1.7   thorpej /*
    603   1.7   thorpej  * Called when a ENCRYPT START command is received.
    604   1.7   thorpej  */
    605  1.17      matt void
    606  1.17      matt encrypt_start(unsigned char *data, int cnt)
    607   1.7   thorpej {
    608   1.7   thorpej 	Encryptions *ep;
    609   1.7   thorpej 
    610   1.7   thorpej 	if (!decrypt_mode) {
    611   1.7   thorpej 		/*
    612   1.7   thorpej 		 * Something is wrong.  We should not get a START
    613   1.7   thorpej 		 * command without having already picked our
    614   1.7   thorpej 		 * decryption scheme.  Send a REQUEST-END to
    615   1.7   thorpej 		 * attempt to clear the channel...
    616   1.7   thorpej 		 */
    617   1.7   thorpej 		printf("%s: Warning, Cannot decrypt input stream!!!\r\n", Name);
    618   1.7   thorpej 		encrypt_send_request_end();
    619   1.7   thorpej 		return;
    620   1.7   thorpej 	}
    621   1.7   thorpej 
    622   1.7   thorpej 	if ((ep = finddecryption(decrypt_mode)) != NULL) {
    623   1.7   thorpej 		decrypt_input = ep->input;
    624   1.7   thorpej 		if (encrypt_verbose)
    625   1.7   thorpej 			printf("[ Input is now decrypted with type %s ]\r\n",
    626   1.7   thorpej 				ENCTYPE_NAME(decrypt_mode));
    627   1.7   thorpej 		if (encrypt_debug_mode)
    628   1.7   thorpej 			printf(">>>%s: Start to decrypt input with type %s\r\n",
    629   1.7   thorpej 				Name, ENCTYPE_NAME(decrypt_mode));
    630   1.7   thorpej 	} else {
    631   1.7   thorpej 		printf("%s: Warning, Cannot decrypt type %s (%d)!!!\r\n",
    632   1.7   thorpej 				Name,
    633   1.7   thorpej 				ENCTYPE_NAME_OK(decrypt_mode)
    634   1.7   thorpej 					? ENCTYPE_NAME(decrypt_mode)
    635   1.7   thorpej 					: "(unknown)",
    636   1.7   thorpej 				decrypt_mode);
    637   1.7   thorpej 		encrypt_send_request_end();
    638   1.7   thorpej 	}
    639   1.7   thorpej }
    640   1.7   thorpej 
    641  1.17      matt void
    642  1.17      matt encrypt_session_key(Session_Key *key, int server)
    643   1.7   thorpej {
    644   1.7   thorpej 	Encryptions *ep = encryptions;
    645   1.7   thorpej 
    646   1.7   thorpej 	havesessionkey = 1;
    647   1.7   thorpej 
    648   1.7   thorpej 	while (ep->type) {
    649   1.7   thorpej 		if (ep->session)
    650   1.7   thorpej 			(*ep->session)(key, server);
    651   1.7   thorpej #ifdef notdef
    652   1.7   thorpej 		if (!encrypt_output && autoencrypt && !server)
    653   1.7   thorpej 			encrypt_start_output(ep->type);
    654   1.7   thorpej 		if (!decrypt_input && autodecrypt && !server)
    655   1.7   thorpej 			encrypt_send_request_start();
    656   1.7   thorpej #endif
    657   1.7   thorpej 		++ep;
    658   1.7   thorpej 	}
    659   1.7   thorpej }
    660   1.7   thorpej 
    661   1.7   thorpej /*
    662   1.7   thorpej  * Called when ENCRYPT END is received.
    663   1.7   thorpej  */
    664  1.17      matt void
    665  1.17      matt encrypt_end(void)
    666   1.7   thorpej {
    667   1.7   thorpej 	decrypt_input = 0;
    668   1.7   thorpej 	if (encrypt_debug_mode)
    669   1.7   thorpej 		printf(">>>%s: Input is back to clear text\r\n", Name);
    670   1.7   thorpej 	if (encrypt_verbose)
    671   1.7   thorpej 		printf("[ Input is now clear text ]\r\n");
    672   1.7   thorpej }
    673   1.7   thorpej 
    674   1.7   thorpej /*
    675   1.7   thorpej  * Called when ENCRYPT REQUEST-END is received.
    676   1.7   thorpej  */
    677  1.17      matt void
    678  1.17      matt encrypt_request_end(void)
    679   1.7   thorpej {
    680   1.7   thorpej 	encrypt_send_end();
    681   1.7   thorpej }
    682   1.7   thorpej 
    683   1.7   thorpej /*
    684   1.7   thorpej  * Called when ENCRYPT REQUEST-START is received.  If we receive
    685   1.7   thorpej  * this before a type is picked, then that indicates that the
    686   1.7   thorpej  * other side wants us to start encrypting data as soon as we
    687   1.7   thorpej  * can.
    688   1.7   thorpej  */
    689  1.17      matt void
    690  1.17      matt encrypt_request_start(unsigned char *data, int cnt)
    691   1.7   thorpej {
    692   1.7   thorpej 	if (encrypt_mode == 0)  {
    693   1.7   thorpej 		if (Server)
    694   1.7   thorpej 			autoencrypt = 1;
    695   1.7   thorpej 		return;
    696   1.7   thorpej 	}
    697   1.7   thorpej 	encrypt_start_output(encrypt_mode);
    698   1.7   thorpej }
    699   1.7   thorpej 
    700   1.7   thorpej static unsigned char str_keyid[(MAXKEYLEN*2)+5] = { IAC, SB, TELOPT_ENCRYPT };
    701   1.7   thorpej 
    702  1.17      matt void
    703  1.17      matt encrypt_enc_keyid(unsigned char *keyid, int len)
    704   1.7   thorpej {
    705   1.7   thorpej 	encrypt_keyid(&ki[1], keyid, len);
    706   1.7   thorpej }
    707   1.7   thorpej 
    708  1.17      matt void
    709  1.17      matt encrypt_dec_keyid(unsigned char *keyid, int len)
    710   1.7   thorpej {
    711   1.7   thorpej 	encrypt_keyid(&ki[0], keyid, len);
    712   1.7   thorpej }
    713   1.7   thorpej 
    714   1.7   thorpej void
    715  1.17      matt encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len)
    716   1.7   thorpej {
    717   1.7   thorpej 	Encryptions *ep;
    718   1.7   thorpej 	int dir = kp->dir;
    719   1.7   thorpej 	register int ret = 0;
    720   1.7   thorpej 
    721   1.7   thorpej 	if (!(ep = (*kp->getcrypt)(*kp->modep))) {
    722   1.7   thorpej 		if (len == 0)
    723   1.7   thorpej 			return;
    724   1.7   thorpej 		kp->keylen = 0;
    725   1.7   thorpej 	} else if (len == 0) {
    726   1.7   thorpej 		/*
    727   1.7   thorpej 		 * Empty option, indicates a failure.
    728   1.7   thorpej 		 */
    729   1.7   thorpej 		if (kp->keylen == 0)
    730   1.7   thorpej 			return;
    731   1.7   thorpej 		kp->keylen = 0;
    732   1.7   thorpej 		if (ep->keyid)
    733   1.7   thorpej 			(void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
    734   1.7   thorpej 
    735  1.16  christos 	} else if ((size_t)len > sizeof(kp->keyid)) {
    736  1.15  christos 		return;
    737   1.7   thorpej 	} else if ((len != kp->keylen) ||
    738   1.7   thorpej 		   (memcmp(keyid, kp->keyid, len) != 0)) {
    739   1.7   thorpej 		/*
    740   1.7   thorpej 		 * Length or contents are different
    741   1.7   thorpej 		 */
    742   1.7   thorpej 		kp->keylen = len;
    743   1.7   thorpej 		memmove(kp->keyid, keyid, len);
    744   1.7   thorpej 		if (ep->keyid)
    745   1.7   thorpej 			(void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
    746   1.7   thorpej 	} else {
    747   1.7   thorpej 		if (ep->keyid)
    748   1.7   thorpej 			ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen);
    749   1.7   thorpej 		if ((ret == 0) && (dir == DIR_ENCRYPT) && autoencrypt)
    750   1.7   thorpej 			encrypt_start_output(*kp->modep);
    751   1.7   thorpej 		return;
    752   1.7   thorpej 	}
    753   1.7   thorpej 
    754   1.7   thorpej 	encrypt_send_keyid(dir, kp->keyid, kp->keylen, 0);
    755   1.7   thorpej }
    756   1.7   thorpej 
    757  1.17      matt void
    758  1.16  christos encrypt_send_keyid(int dir, const unsigned char *keyid, int keylen, int saveit)
    759   1.7   thorpej {
    760   1.7   thorpej 	unsigned char *strp;
    761   1.7   thorpej 
    762   1.7   thorpej 	str_keyid[3] = (dir == DIR_ENCRYPT)
    763   1.7   thorpej 			? ENCRYPT_ENC_KEYID : ENCRYPT_DEC_KEYID;
    764   1.7   thorpej 	if (saveit) {
    765   1.7   thorpej 		struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1];
    766   1.7   thorpej 		memmove(kp->keyid, keyid, keylen);
    767   1.7   thorpej 		kp->keylen = keylen;
    768   1.7   thorpej 	}
    769   1.7   thorpej 
    770   1.7   thorpej 	for (strp = &str_keyid[4]; keylen > 0; --keylen) {
    771   1.7   thorpej 		if ((*strp++ = *keyid++) == IAC)
    772   1.7   thorpej 			*strp++ = IAC;
    773   1.7   thorpej 	}
    774   1.7   thorpej 	*strp++ = IAC;
    775   1.7   thorpej 	*strp++ = SE;
    776   1.7   thorpej 	telnet_net_write(str_keyid, strp - str_keyid);
    777   1.7   thorpej 	printsub('>', &str_keyid[2], strp - str_keyid - 2);
    778   1.7   thorpej }
    779   1.7   thorpej 
    780  1.17      matt void
    781  1.17      matt encrypt_auto(int on)
    782   1.7   thorpej {
    783   1.7   thorpej 	if (on < 0)
    784   1.7   thorpej 		autoencrypt ^= 1;
    785   1.7   thorpej 	else
    786   1.7   thorpej 		autoencrypt = on ? 1 : 0;
    787   1.7   thorpej }
    788   1.7   thorpej 
    789  1.17      matt void
    790  1.17      matt decrypt_auto(int on)
    791   1.7   thorpej {
    792   1.7   thorpej 	if (on < 0)
    793   1.7   thorpej 		autodecrypt ^= 1;
    794   1.7   thorpej 	else
    795   1.7   thorpej 		autodecrypt = on ? 1 : 0;
    796   1.7   thorpej }
    797   1.7   thorpej 
    798  1.17      matt void
    799  1.17      matt encrypt_start_output(int type)
    800   1.7   thorpej {
    801   1.7   thorpej 	Encryptions *ep;
    802   1.7   thorpej 	register unsigned char *p;
    803   1.7   thorpej 	register int i;
    804   1.7   thorpej 
    805   1.7   thorpej 	if (!(ep = findencryption(type))) {
    806   1.7   thorpej 		if (encrypt_debug_mode) {
    807   1.7   thorpej 			printf(">>>%s: Can't encrypt with type %s (%d)\r\n",
    808   1.7   thorpej 				Name,
    809   1.7   thorpej 				ENCTYPE_NAME_OK(type)
    810   1.7   thorpej 					? ENCTYPE_NAME(type) : "(unknown)",
    811   1.7   thorpej 				type);
    812   1.7   thorpej 		}
    813   1.7   thorpej 		return;
    814   1.7   thorpej 	}
    815   1.7   thorpej 	if (ep->start) {
    816   1.7   thorpej 		i = (*ep->start)(DIR_ENCRYPT, Server);
    817   1.7   thorpej 		if (encrypt_debug_mode) {
    818   1.7   thorpej 			printf(">>>%s: Encrypt start: %s (%d) %s\r\n",
    819   1.7   thorpej 				Name,
    820   1.7   thorpej 				(i < 0) ? "failed" :
    821   1.7   thorpej 					"initial negotiation in progress",
    822   1.7   thorpej 				i, ENCTYPE_NAME(type));
    823   1.7   thorpej 		}
    824   1.7   thorpej 		if (i)
    825   1.7   thorpej 			return;
    826   1.7   thorpej 	}
    827   1.7   thorpej 	p = str_start + 3;
    828   1.7   thorpej 	*p++ = ENCRYPT_START;
    829   1.7   thorpej 	for (i = 0; i < ki[0].keylen; ++i) {
    830   1.7   thorpej 		if ((*p++ = ki[0].keyid[i]) == IAC)
    831   1.7   thorpej 			*p++ = IAC;
    832   1.7   thorpej 	}
    833   1.7   thorpej 	*p++ = IAC;
    834   1.7   thorpej 	*p++ = SE;
    835   1.7   thorpej 	telnet_net_write(str_start, p - str_start);
    836   1.7   thorpej 	net_encrypt();
    837   1.7   thorpej 	printsub('>', &str_start[2], p - &str_start[2]);
    838   1.7   thorpej 	/*
    839   1.7   thorpej 	 * If we are already encrypting in some mode, then
    840   1.7   thorpej 	 * encrypt the ring (which includes our request) in
    841   1.7   thorpej 	 * the old mode, mark it all as "clear text" and then
    842   1.7   thorpej 	 * switch to the new mode.
    843   1.7   thorpej 	 */
    844   1.7   thorpej 	encrypt_output = ep->output;
    845   1.7   thorpej 	encrypt_mode = type;
    846   1.7   thorpej 	if (encrypt_debug_mode)
    847   1.7   thorpej 		printf(">>>%s: Started to encrypt output with type %s\r\n",
    848   1.7   thorpej 			Name, ENCTYPE_NAME(type));
    849   1.7   thorpej 	if (encrypt_verbose)
    850   1.7   thorpej 		printf("[ Output is now encrypted with type %s ]\r\n",
    851   1.7   thorpej 			ENCTYPE_NAME(type));
    852   1.7   thorpej }
    853   1.7   thorpej 
    854  1.17      matt void
    855  1.17      matt encrypt_send_end(void)
    856   1.7   thorpej {
    857   1.7   thorpej 	if (!encrypt_output)
    858   1.7   thorpej 		return;
    859   1.7   thorpej 
    860   1.7   thorpej 	str_end[3] = ENCRYPT_END;
    861   1.7   thorpej 	telnet_net_write(str_end, sizeof(str_end));
    862   1.7   thorpej 	net_encrypt();
    863   1.7   thorpej 	printsub('>', &str_end[2], sizeof(str_end) - 2);
    864   1.7   thorpej 	/*
    865   1.7   thorpej 	 * Encrypt the output buffer now because it will not be done by
    866   1.7   thorpej 	 * netflush...
    867   1.7   thorpej 	 */
    868   1.7   thorpej 	encrypt_output = 0;
    869   1.7   thorpej 	if (encrypt_debug_mode)
    870   1.7   thorpej 		printf(">>>%s: Output is back to clear text\r\n", Name);
    871   1.7   thorpej 	if (encrypt_verbose)
    872   1.7   thorpej 		printf("[ Output is now clear text ]\r\n");
    873   1.7   thorpej }
    874   1.7   thorpej 
    875  1.17      matt void
    876  1.17      matt encrypt_send_request_start(void)
    877   1.7   thorpej {
    878   1.7   thorpej 	register unsigned char *p;
    879   1.7   thorpej 	register int i;
    880   1.7   thorpej 
    881   1.7   thorpej 	p = &str_start[3];
    882   1.7   thorpej 	*p++ = ENCRYPT_REQSTART;
    883   1.7   thorpej 	for (i = 0; i < ki[1].keylen; ++i) {
    884   1.7   thorpej 		if ((*p++ = ki[1].keyid[i]) == IAC)
    885   1.7   thorpej 			*p++ = IAC;
    886   1.7   thorpej 	}
    887   1.7   thorpej 	*p++ = IAC;
    888   1.7   thorpej 	*p++ = SE;
    889   1.7   thorpej 	telnet_net_write(str_start, p - str_start);
    890   1.7   thorpej 	printsub('>', &str_start[2], p - &str_start[2]);
    891   1.7   thorpej 	if (encrypt_debug_mode)
    892   1.7   thorpej 		printf(">>>%s: Request input to be encrypted\r\n", Name);
    893   1.7   thorpej }
    894   1.7   thorpej 
    895  1.17      matt void
    896  1.17      matt encrypt_send_request_end(void)
    897   1.7   thorpej {
    898   1.7   thorpej 	str_end[3] = ENCRYPT_REQEND;
    899   1.7   thorpej 	telnet_net_write(str_end, sizeof(str_end));
    900   1.7   thorpej 	printsub('>', &str_end[2], sizeof(str_end) - 2);
    901   1.7   thorpej 
    902   1.7   thorpej 	if (encrypt_debug_mode)
    903   1.7   thorpej 		printf(">>>%s: Request input to be clear text\r\n", Name);
    904   1.7   thorpej }
    905   1.7   thorpej 
    906  1.17      matt void
    907  1.17      matt encrypt_wait(void)
    908   1.7   thorpej {
    909   1.7   thorpej 	if (encrypt_debug_mode)
    910   1.7   thorpej 		printf(">>>%s: in encrypt_wait\r\n", Name);
    911   1.7   thorpej 	if (!havesessionkey || !(I_SUPPORT_ENCRYPT & remote_supports_decrypt))
    912   1.7   thorpej 		return;
    913   1.7   thorpej 	while (autoencrypt && !encrypt_output)
    914   1.7   thorpej 		if (telnet_spin())
    915   1.7   thorpej 			return;
    916   1.7   thorpej }
    917   1.7   thorpej 
    918  1.17      matt void
    919  1.17      matt encrypt_debug(int mode)
    920   1.7   thorpej {
    921   1.7   thorpej 	encrypt_debug_mode = mode;
    922   1.7   thorpej }
    923   1.7   thorpej 
    924  1.17      matt void
    925  1.17      matt encrypt_gen_printsub(unsigned char *data, int cnt,
    926  1.17      matt 	unsigned char *buf, int buflen)
    927   1.7   thorpej {
    928   1.7   thorpej 	char tbuf[16], *cp;
    929   1.7   thorpej 
    930   1.7   thorpej 	cnt -= 2;
    931   1.7   thorpej 	data += 2;
    932   1.7   thorpej 	buf[buflen-1] = '\0';
    933   1.7   thorpej 	buf[buflen-2] = '*';
    934  1.10    simonb 	buflen -= 2;
    935   1.7   thorpej 	for (; cnt > 0; cnt--, data++) {
    936  1.11    itojun 		snprintf(tbuf, sizeof(tbuf), " %d", *data);
    937   1.7   thorpej 		for (cp = tbuf; *cp && buflen > 0; --buflen)
    938   1.7   thorpej 			*buf++ = *cp++;
    939   1.7   thorpej 		if (buflen <= 0)
    940   1.7   thorpej 			return;
    941   1.7   thorpej 	}
    942   1.7   thorpej 	*buf = '\0';
    943   1.7   thorpej }
    944   1.7   thorpej 
    945  1.17      matt void
    946  1.17      matt encrypt_printsub(unsigned char *data, int cnt,
    947  1.17      matt 	unsigned char *buf, int buflen)
    948   1.7   thorpej {
    949   1.7   thorpej 	Encryptions *ep;
    950   1.7   thorpej 	register int type = data[1];
    951   1.7   thorpej 
    952   1.7   thorpej 	for (ep = encryptions; ep->type && ep->type != type; ep++)
    953   1.7   thorpej 		;
    954   1.7   thorpej 
    955   1.7   thorpej 	if (ep->printsub)
    956   1.7   thorpej 		(*ep->printsub)(data, cnt, buf, buflen);
    957   1.7   thorpej 	else
    958   1.7   thorpej 		encrypt_gen_printsub(data, cnt, buf, buflen);
    959   1.7   thorpej }
    960   1.7   thorpej #endif	/* ENCRYPTION */
    961