encrypt.c revision 1.20 1 1.20 kre /* $NetBSD: encrypt.c,v 1.20 2024/10/29 13:10:06 kre Exp $ */
2 1.6 christos
3 1.1 cgd /*-
4 1.3 cgd * Copyright (c) 1991, 1993
5 1.3 cgd * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * Redistribution and use in source and binary forms, with or without
8 1.1 cgd * modification, are permitted provided that the following conditions
9 1.1 cgd * are met:
10 1.1 cgd * 1. Redistributions of source code must retain the above copyright
11 1.1 cgd * notice, this list of conditions and the following disclaimer.
12 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 cgd * notice, this list of conditions and the following disclaimer in the
14 1.1 cgd * documentation and/or other materials provided with the distribution.
15 1.12 agc * 3. Neither the name of the University nor the names of its contributors
16 1.1 cgd * may be used to endorse or promote products derived from this software
17 1.1 cgd * without specific prior written permission.
18 1.1 cgd *
19 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 1.1 cgd * SUCH DAMAGE.
30 1.1 cgd */
31 1.1 cgd
32 1.5 lukem #include <sys/cdefs.h>
33 1.5 lukem #if 0
34 1.5 lukem static char sccsid[] = "@(#)encrypt.c 8.2 (Berkeley) 5/30/95";
35 1.5 lukem #else
36 1.20 kre __RCSID("$NetBSD: encrypt.c,v 1.20 2024/10/29 13:10:06 kre Exp $");
37 1.1 cgd #endif /* not lint */
38 1.1 cgd
39 1.1 cgd /*
40 1.1 cgd * Copyright (C) 1990 by the Massachusetts Institute of Technology
41 1.1 cgd *
42 1.1 cgd * Export of this software from the United States of America is assumed
43 1.1 cgd * to require a specific license from the United States Government.
44 1.1 cgd * It is the responsibility of any person or organization contemplating
45 1.1 cgd * export to obtain such a license before exporting.
46 1.1 cgd *
47 1.1 cgd * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
48 1.1 cgd * distribute this software and its documentation for any purpose and
49 1.1 cgd * without fee is hereby granted, provided that the above copyright
50 1.1 cgd * notice appear in all copies and that both that copyright notice and
51 1.1 cgd * this permission notice appear in supporting documentation, and that
52 1.1 cgd * the name of M.I.T. not be used in advertising or publicity pertaining
53 1.1 cgd * to distribution of the software without specific, written prior
54 1.1 cgd * permission. M.I.T. makes no representations about the suitability of
55 1.1 cgd * this software for any purpose. It is provided "as is" without express
56 1.1 cgd * or implied warranty.
57 1.1 cgd */
58 1.1 cgd
59 1.7 thorpej #ifdef ENCRYPTION
60 1.7 thorpej
61 1.7 thorpej #include <stdio.h>
62 1.7 thorpej #define ENCRYPT_NAMES
63 1.7 thorpej #include <arpa/telnet.h>
64 1.7 thorpej
65 1.7 thorpej #include "encrypt.h"
66 1.7 thorpej #include "misc.h"
67 1.7 thorpej
68 1.7 thorpej #include <stdlib.h>
69 1.7 thorpej #ifdef NO_STRING_H
70 1.7 thorpej #include <strings.h>
71 1.7 thorpej #else
72 1.7 thorpej #include <string.h>
73 1.7 thorpej #endif
74 1.7 thorpej
75 1.7 thorpej /*
76 1.7 thorpej * These functions pointers point to the current routines
77 1.7 thorpej * for encrypting and decrypting data.
78 1.7 thorpej */
79 1.13 perry void (*encrypt_output)(unsigned char *, int);
80 1.13 perry int (*decrypt_input)(int);
81 1.7 thorpej
82 1.20 kre static int encrypt_debug_mode = 0;
83 1.7 thorpej static int decrypt_mode = 0;
84 1.7 thorpej static int encrypt_mode = 0;
85 1.7 thorpej static int encrypt_verbose = 0;
86 1.7 thorpej static int autoencrypt = 0;
87 1.7 thorpej static int autodecrypt = 0;
88 1.7 thorpej static int havesessionkey = 0;
89 1.7 thorpej static int Server = 0;
90 1.7 thorpej static const char *Name = "Noname";
91 1.7 thorpej
92 1.7 thorpej #define typemask(x) ((x) > 0 ? 1 << ((x)-1) : 0)
93 1.7 thorpej
94 1.7 thorpej static long i_support_encrypt = typemask(ENCTYPE_DES_CFB64)
95 1.7 thorpej | typemask(ENCTYPE_DES_OFB64);
96 1.7 thorpej static long i_support_decrypt = typemask(ENCTYPE_DES_CFB64)
97 1.7 thorpej | typemask(ENCTYPE_DES_OFB64);
98 1.7 thorpej static long i_wont_support_encrypt = 0;
99 1.7 thorpej static long i_wont_support_decrypt = 0;
100 1.7 thorpej #define I_SUPPORT_ENCRYPT (i_support_encrypt & ~i_wont_support_encrypt)
101 1.7 thorpej #define I_SUPPORT_DECRYPT (i_support_decrypt & ~i_wont_support_decrypt)
102 1.7 thorpej
103 1.7 thorpej static long remote_supports_encrypt = 0;
104 1.7 thorpej static long remote_supports_decrypt = 0;
105 1.7 thorpej
106 1.7 thorpej static Encryptions encryptions[] = {
107 1.7 thorpej #ifdef DES_ENCRYPTION
108 1.7 thorpej { "DES_CFB64", ENCTYPE_DES_CFB64,
109 1.7 thorpej cfb64_encrypt,
110 1.7 thorpej cfb64_decrypt,
111 1.7 thorpej cfb64_init,
112 1.7 thorpej cfb64_start,
113 1.7 thorpej cfb64_is,
114 1.7 thorpej cfb64_reply,
115 1.7 thorpej cfb64_session,
116 1.7 thorpej cfb64_keyid,
117 1.7 thorpej cfb64_printsub },
118 1.7 thorpej { "DES_OFB64", ENCTYPE_DES_OFB64,
119 1.7 thorpej ofb64_encrypt,
120 1.7 thorpej ofb64_decrypt,
121 1.7 thorpej ofb64_init,
122 1.7 thorpej ofb64_start,
123 1.7 thorpej ofb64_is,
124 1.7 thorpej ofb64_reply,
125 1.7 thorpej ofb64_session,
126 1.7 thorpej ofb64_keyid,
127 1.7 thorpej ofb64_printsub },
128 1.7 thorpej #endif /* DES_ENCRYPTION */
129 1.16 christos { .name = 0 },
130 1.7 thorpej };
131 1.7 thorpej
132 1.7 thorpej static unsigned char str_send[64] = { IAC, SB, TELOPT_ENCRYPT,
133 1.7 thorpej ENCRYPT_SUPPORT };
134 1.7 thorpej static unsigned char str_suplen = 0;
135 1.7 thorpej static unsigned char str_start[72] = { IAC, SB, TELOPT_ENCRYPT };
136 1.7 thorpej static unsigned char str_end[] = { IAC, SB, TELOPT_ENCRYPT, 0, IAC, SE };
137 1.7 thorpej
138 1.17 matt Encryptions *
139 1.17 matt findencryption(int type)
140 1.7 thorpej {
141 1.7 thorpej Encryptions *ep = encryptions;
142 1.7 thorpej
143 1.7 thorpej if (!(I_SUPPORT_ENCRYPT & remote_supports_decrypt & typemask(type)))
144 1.7 thorpej return(0);
145 1.7 thorpej while (ep->type && ep->type != type)
146 1.7 thorpej ++ep;
147 1.7 thorpej return(ep->type ? ep : 0);
148 1.7 thorpej }
149 1.7 thorpej
150 1.17 matt Encryptions *
151 1.17 matt finddecryption(int type)
152 1.7 thorpej {
153 1.7 thorpej Encryptions *ep = encryptions;
154 1.7 thorpej
155 1.7 thorpej if (!(I_SUPPORT_DECRYPT & remote_supports_encrypt & typemask(type)))
156 1.7 thorpej return(0);
157 1.7 thorpej while (ep->type && ep->type != type)
158 1.7 thorpej ++ep;
159 1.7 thorpej return(ep->type ? ep : 0);
160 1.7 thorpej }
161 1.7 thorpej
162 1.7 thorpej #define MAXKEYLEN 64
163 1.7 thorpej
164 1.7 thorpej static struct key_info {
165 1.7 thorpej unsigned char keyid[MAXKEYLEN];
166 1.7 thorpej int keylen;
167 1.7 thorpej int dir;
168 1.7 thorpej int *modep;
169 1.13 perry Encryptions *(*getcrypt)(int);
170 1.7 thorpej } ki[2] = {
171 1.7 thorpej { { 0 }, 0, DIR_ENCRYPT, &encrypt_mode, findencryption },
172 1.7 thorpej { { 0 }, 0, DIR_DECRYPT, &decrypt_mode, finddecryption },
173 1.7 thorpej };
174 1.7 thorpej
175 1.17 matt void
176 1.17 matt encrypt_init(const char *name, int server)
177 1.7 thorpej {
178 1.7 thorpej Encryptions *ep = encryptions;
179 1.7 thorpej
180 1.7 thorpej Name = name;
181 1.7 thorpej Server = server;
182 1.7 thorpej i_support_encrypt = i_support_decrypt = 0;
183 1.7 thorpej remote_supports_encrypt = remote_supports_decrypt = 0;
184 1.7 thorpej encrypt_mode = 0;
185 1.7 thorpej decrypt_mode = 0;
186 1.7 thorpej encrypt_output = 0;
187 1.7 thorpej decrypt_input = 0;
188 1.7 thorpej #ifdef notdef
189 1.7 thorpej encrypt_verbose = !server;
190 1.7 thorpej #endif
191 1.7 thorpej
192 1.7 thorpej str_suplen = 4;
193 1.7 thorpej
194 1.7 thorpej while (ep->type) {
195 1.20 kre if (encrypt_debug())
196 1.7 thorpej printf(">>>%s: I will support %s\r\n",
197 1.7 thorpej Name, ENCTYPE_NAME(ep->type));
198 1.7 thorpej i_support_encrypt |= typemask(ep->type);
199 1.7 thorpej i_support_decrypt |= typemask(ep->type);
200 1.7 thorpej if ((i_wont_support_decrypt & typemask(ep->type)) == 0)
201 1.7 thorpej if ((str_send[str_suplen++] = ep->type) == IAC)
202 1.7 thorpej str_send[str_suplen++] = IAC;
203 1.7 thorpej if (ep->init)
204 1.7 thorpej (*ep->init)(Server);
205 1.7 thorpej ++ep;
206 1.7 thorpej }
207 1.7 thorpej str_send[str_suplen++] = IAC;
208 1.7 thorpej str_send[str_suplen++] = SE;
209 1.7 thorpej }
210 1.7 thorpej
211 1.17 matt void
212 1.17 matt encrypt_list_types(void)
213 1.7 thorpej {
214 1.7 thorpej Encryptions *ep = encryptions;
215 1.7 thorpej
216 1.7 thorpej printf("Valid encryption types:\n");
217 1.7 thorpej while (ep->type) {
218 1.7 thorpej printf("\t%s (%d)\r\n", ENCTYPE_NAME(ep->type), ep->type);
219 1.7 thorpej ++ep;
220 1.7 thorpej }
221 1.7 thorpej }
222 1.7 thorpej
223 1.17 matt int
224 1.17 matt EncryptEnable(char *type, char *mode)
225 1.7 thorpej {
226 1.7 thorpej if (isprefix(type, "help") || isprefix(type, "?")) {
227 1.7 thorpej printf("Usage: encrypt enable <type> [input|output]\n");
228 1.7 thorpej encrypt_list_types();
229 1.18 maya return 0;
230 1.7 thorpej }
231 1.7 thorpej if (EncryptType(type, mode))
232 1.18 maya return EncryptStart(mode, NULL);
233 1.18 maya return 0;
234 1.7 thorpej }
235 1.7 thorpej
236 1.17 matt int
237 1.17 matt EncryptDisable(char *type, char *mode)
238 1.7 thorpej {
239 1.7 thorpej register Encryptions *ep;
240 1.7 thorpej int ret = 0;
241 1.7 thorpej
242 1.7 thorpej if (isprefix(type, "help") || isprefix(type, "?")) {
243 1.7 thorpej printf("Usage: encrypt disable <type> [input|output]\n");
244 1.7 thorpej encrypt_list_types();
245 1.7 thorpej } else if ((ep = (Encryptions *)genget(type, (char **)encryptions,
246 1.7 thorpej sizeof(Encryptions))) == 0) {
247 1.7 thorpej printf("%s: invalid encryption type\n", type);
248 1.7 thorpej } else if (Ambiguous(ep)) {
249 1.7 thorpej printf("Ambiguous type '%s'\n", type);
250 1.7 thorpej } else {
251 1.7 thorpej if ((mode == 0) || (isprefix(mode, "input") ? 1 : 0)) {
252 1.7 thorpej if (decrypt_mode == ep->type)
253 1.18 maya EncryptStopInput(NULL, NULL);
254 1.7 thorpej i_wont_support_decrypt |= typemask(ep->type);
255 1.7 thorpej ret = 1;
256 1.7 thorpej }
257 1.7 thorpej if ((mode == 0) || (isprefix(mode, "output"))) {
258 1.7 thorpej if (encrypt_mode == ep->type)
259 1.18 maya EncryptStopOutput(NULL, NULL);
260 1.7 thorpej i_wont_support_encrypt |= typemask(ep->type);
261 1.7 thorpej ret = 1;
262 1.7 thorpej }
263 1.7 thorpej if (ret == 0)
264 1.7 thorpej printf("%s: invalid encryption mode\n", mode);
265 1.7 thorpej }
266 1.7 thorpej return(ret);
267 1.7 thorpej }
268 1.7 thorpej
269 1.17 matt int
270 1.17 matt EncryptType(char *type, char *mode)
271 1.7 thorpej {
272 1.7 thorpej register Encryptions *ep;
273 1.7 thorpej int ret = 0;
274 1.7 thorpej
275 1.7 thorpej if (isprefix(type, "help") || isprefix(type, "?")) {
276 1.7 thorpej printf("Usage: encrypt type <type> [input|output]\n");
277 1.7 thorpej encrypt_list_types();
278 1.7 thorpej } else if ((ep = (Encryptions *)genget(type, (char **)encryptions,
279 1.7 thorpej sizeof(Encryptions))) == 0) {
280 1.7 thorpej printf("%s: invalid encryption type\n", type);
281 1.7 thorpej } else if (Ambiguous(ep)) {
282 1.7 thorpej printf("Ambiguous type '%s'\n", type);
283 1.7 thorpej } else {
284 1.7 thorpej if ((mode == 0) || isprefix(mode, "input")) {
285 1.7 thorpej decrypt_mode = ep->type;
286 1.7 thorpej i_wont_support_decrypt &= ~typemask(ep->type);
287 1.7 thorpej ret = 1;
288 1.7 thorpej }
289 1.7 thorpej if ((mode == 0) || isprefix(mode, "output")) {
290 1.7 thorpej encrypt_mode = ep->type;
291 1.7 thorpej i_wont_support_encrypt &= ~typemask(ep->type);
292 1.7 thorpej ret = 1;
293 1.7 thorpej }
294 1.7 thorpej if (ret == 0)
295 1.7 thorpej printf("%s: invalid encryption mode\n", mode);
296 1.7 thorpej }
297 1.7 thorpej return(ret);
298 1.7 thorpej }
299 1.7 thorpej
300 1.17 matt int
301 1.18 maya EncryptStart(char *mode, char *unused __unused)
302 1.7 thorpej {
303 1.7 thorpej register int ret = 0;
304 1.7 thorpej if (mode) {
305 1.7 thorpej if (isprefix(mode, "input"))
306 1.18 maya return EncryptStartInput(NULL, NULL);
307 1.7 thorpej if (isprefix(mode, "output"))
308 1.18 maya return EncryptStartOutput(NULL, NULL);
309 1.7 thorpej if (isprefix(mode, "help") || isprefix(mode, "?")) {
310 1.7 thorpej printf("Usage: encrypt start [input|output]\n");
311 1.18 maya return 0;
312 1.7 thorpej }
313 1.7 thorpej printf("%s: invalid encryption mode 'encrypt start ?' for help\n", mode);
314 1.18 maya return 0;
315 1.7 thorpej }
316 1.18 maya ret += EncryptStartInput(NULL, NULL);
317 1.18 maya ret += EncryptStartOutput(NULL, NULL);
318 1.18 maya return ret;
319 1.7 thorpej }
320 1.7 thorpej
321 1.17 matt int
322 1.18 maya EncryptStartInput(char *unused1 __unused, char *unused2 __unused)
323 1.7 thorpej {
324 1.7 thorpej if (decrypt_mode) {
325 1.7 thorpej encrypt_send_request_start();
326 1.7 thorpej return(1);
327 1.7 thorpej }
328 1.7 thorpej printf("No previous decryption mode, decryption not enabled\r\n");
329 1.7 thorpej return(0);
330 1.7 thorpej }
331 1.7 thorpej
332 1.17 matt int
333 1.18 maya EncryptStartOutput(char *unused1 __unused, char *unused2 __unused)
334 1.7 thorpej {
335 1.7 thorpej if (encrypt_mode) {
336 1.7 thorpej encrypt_start_output(encrypt_mode);
337 1.7 thorpej return(1);
338 1.7 thorpej }
339 1.7 thorpej printf("No previous encryption mode, encryption not enabled\r\n");
340 1.7 thorpej return(0);
341 1.7 thorpej }
342 1.7 thorpej
343 1.17 matt int
344 1.18 maya EncryptStop(char *mode, char *unused __unused)
345 1.7 thorpej {
346 1.7 thorpej int ret = 0;
347 1.7 thorpej if (mode) {
348 1.7 thorpej if (isprefix(mode, "input"))
349 1.18 maya return EncryptStopInput(NULL, NULL);
350 1.7 thorpej if (isprefix(mode, "output"))
351 1.18 maya return EncryptStopOutput(NULL, NULL);
352 1.7 thorpej if (isprefix(mode, "help") || isprefix(mode, "?")) {
353 1.7 thorpej printf("Usage: encrypt stop [input|output]\n");
354 1.18 maya return 0;
355 1.7 thorpej }
356 1.7 thorpej printf("%s: invalid encryption mode 'encrypt stop ?' for help\n", mode);
357 1.18 maya return 0;
358 1.7 thorpej }
359 1.18 maya ret += EncryptStopInput(NULL, NULL);
360 1.18 maya ret += EncryptStopOutput(NULL, NULL);
361 1.18 maya return ret;
362 1.7 thorpej }
363 1.7 thorpej
364 1.17 matt int
365 1.18 maya EncryptStopInput(char *unused1 __unused, char *unused2 __unused)
366 1.7 thorpej {
367 1.7 thorpej encrypt_send_request_end();
368 1.18 maya return 1;
369 1.7 thorpej }
370 1.7 thorpej
371 1.17 matt int
372 1.18 maya EncryptStopOutput(char *unused1 __unused, char *unused2 __unused)
373 1.7 thorpej {
374 1.7 thorpej encrypt_send_end();
375 1.18 maya return 1;
376 1.7 thorpej }
377 1.7 thorpej
378 1.17 matt void
379 1.17 matt encrypt_display(void)
380 1.7 thorpej {
381 1.7 thorpej if (encrypt_output)
382 1.7 thorpej printf("Currently encrypting output with %s\r\n",
383 1.7 thorpej ENCTYPE_NAME(encrypt_mode));
384 1.7 thorpej if (decrypt_input)
385 1.7 thorpej printf("Currently decrypting input with %s\r\n",
386 1.7 thorpej ENCTYPE_NAME(decrypt_mode));
387 1.7 thorpej }
388 1.7 thorpej
389 1.17 matt int
390 1.18 maya EncryptStatus(char *unused1 __unused, char *unused2 __unused)
391 1.7 thorpej {
392 1.7 thorpej if (encrypt_output)
393 1.7 thorpej printf("Currently encrypting output with %s\r\n",
394 1.7 thorpej ENCTYPE_NAME(encrypt_mode));
395 1.7 thorpej else if (encrypt_mode) {
396 1.7 thorpej printf("Currently output is clear text.\r\n");
397 1.7 thorpej printf("Last encryption mode was %s\r\n",
398 1.7 thorpej ENCTYPE_NAME(encrypt_mode));
399 1.7 thorpej }
400 1.7 thorpej if (decrypt_input) {
401 1.7 thorpej printf("Currently decrypting input with %s\r\n",
402 1.7 thorpej ENCTYPE_NAME(decrypt_mode));
403 1.7 thorpej } else if (decrypt_mode) {
404 1.7 thorpej printf("Currently input is clear text.\r\n");
405 1.7 thorpej printf("Last decryption mode was %s\r\n",
406 1.7 thorpej ENCTYPE_NAME(decrypt_mode));
407 1.7 thorpej }
408 1.7 thorpej return 1;
409 1.7 thorpej }
410 1.7 thorpej
411 1.17 matt void
412 1.17 matt encrypt_send_support(void)
413 1.7 thorpej {
414 1.7 thorpej if (str_suplen) {
415 1.7 thorpej /*
416 1.7 thorpej * If the user has requested that decryption start
417 1.19 andvar * immediately, then send a "REQUEST START" before
418 1.7 thorpej * we negotiate the type.
419 1.7 thorpej */
420 1.7 thorpej if (!Server && autodecrypt)
421 1.7 thorpej encrypt_send_request_start();
422 1.7 thorpej telnet_net_write(str_send, str_suplen);
423 1.7 thorpej printsub('>', &str_send[2], str_suplen - 2);
424 1.7 thorpej str_suplen = 0;
425 1.7 thorpej }
426 1.7 thorpej }
427 1.7 thorpej
428 1.17 matt int
429 1.17 matt EncryptDebug(int on)
430 1.7 thorpej {
431 1.7 thorpej if (on < 0)
432 1.7 thorpej encrypt_debug_mode ^= 1;
433 1.7 thorpej else
434 1.7 thorpej encrypt_debug_mode = on;
435 1.7 thorpej printf("Encryption debugging %s\r\n",
436 1.7 thorpej encrypt_debug_mode ? "enabled" : "disabled");
437 1.7 thorpej return(1);
438 1.7 thorpej }
439 1.7 thorpej
440 1.17 matt int
441 1.17 matt EncryptVerbose(int on)
442 1.7 thorpej {
443 1.7 thorpej if (on < 0)
444 1.7 thorpej encrypt_verbose ^= 1;
445 1.7 thorpej else
446 1.7 thorpej encrypt_verbose = on;
447 1.7 thorpej printf("Encryption %s verbose\r\n",
448 1.7 thorpej encrypt_verbose ? "is" : "is not");
449 1.7 thorpej return(1);
450 1.7 thorpej }
451 1.7 thorpej
452 1.17 matt int
453 1.17 matt EncryptAutoEnc(int on)
454 1.7 thorpej {
455 1.7 thorpej encrypt_auto(on);
456 1.7 thorpej printf("Automatic encryption of output is %s\r\n",
457 1.7 thorpej autoencrypt ? "enabled" : "disabled");
458 1.7 thorpej return(1);
459 1.7 thorpej }
460 1.7 thorpej
461 1.17 matt int
462 1.17 matt EncryptAutoDec(int on)
463 1.7 thorpej {
464 1.7 thorpej decrypt_auto(on);
465 1.7 thorpej printf("Automatic decryption of input is %s\r\n",
466 1.7 thorpej autodecrypt ? "enabled" : "disabled");
467 1.7 thorpej return(1);
468 1.7 thorpej }
469 1.7 thorpej
470 1.7 thorpej /*
471 1.7 thorpej * Called when ENCRYPT SUPPORT is received.
472 1.7 thorpej */
473 1.17 matt void
474 1.17 matt encrypt_support(unsigned char *typelist, int cnt)
475 1.7 thorpej {
476 1.7 thorpej register int type, use_type = 0;
477 1.7 thorpej Encryptions *ep;
478 1.7 thorpej
479 1.7 thorpej /*
480 1.7 thorpej * Forget anything the other side has previously told us.
481 1.7 thorpej */
482 1.7 thorpej remote_supports_decrypt = 0;
483 1.7 thorpej
484 1.7 thorpej while (cnt-- > 0) {
485 1.7 thorpej type = *typelist++;
486 1.20 kre if (encrypt_debug())
487 1.7 thorpej printf(">>>%s: He is supporting %s (%d)\r\n",
488 1.7 thorpej Name,
489 1.7 thorpej ENCTYPE_NAME(type), type);
490 1.7 thorpej if ((type < ENCTYPE_CNT) &&
491 1.7 thorpej (I_SUPPORT_ENCRYPT & typemask(type))) {
492 1.7 thorpej remote_supports_decrypt |= typemask(type);
493 1.7 thorpej if (use_type == 0)
494 1.7 thorpej use_type = type;
495 1.7 thorpej }
496 1.7 thorpej }
497 1.7 thorpej if (use_type) {
498 1.7 thorpej ep = findencryption(use_type);
499 1.7 thorpej if (!ep)
500 1.7 thorpej return;
501 1.7 thorpej type = ep->start ? (*ep->start)(DIR_ENCRYPT, Server) : 0;
502 1.20 kre if (encrypt_debug())
503 1.7 thorpej printf(">>>%s: (*ep->start)() returned %d\r\n",
504 1.7 thorpej Name, type);
505 1.7 thorpej if (type < 0)
506 1.7 thorpej return;
507 1.7 thorpej encrypt_mode = use_type;
508 1.7 thorpej if (type == 0)
509 1.7 thorpej encrypt_start_output(use_type);
510 1.7 thorpej }
511 1.7 thorpej }
512 1.7 thorpej
513 1.17 matt void
514 1.17 matt encrypt_is(unsigned char *data, int cnt)
515 1.7 thorpej {
516 1.7 thorpej Encryptions *ep;
517 1.7 thorpej register int type, ret;
518 1.7 thorpej
519 1.7 thorpej if (--cnt < 0)
520 1.7 thorpej return;
521 1.7 thorpej type = *data++;
522 1.7 thorpej if (type < ENCTYPE_CNT)
523 1.7 thorpej remote_supports_encrypt |= typemask(type);
524 1.7 thorpej if (!(ep = finddecryption(type))) {
525 1.20 kre if (encrypt_debug())
526 1.7 thorpej printf(">>>%s: Can't find type %s (%d) for initial negotiation\r\n",
527 1.7 thorpej Name,
528 1.7 thorpej ENCTYPE_NAME_OK(type)
529 1.7 thorpej ? ENCTYPE_NAME(type) : "(unknown)",
530 1.7 thorpej type);
531 1.7 thorpej return;
532 1.7 thorpej }
533 1.7 thorpej if (!ep->is) {
534 1.20 kre if (encrypt_debug())
535 1.7 thorpej printf(">>>%s: No initial negotiation needed for type %s (%d)\r\n",
536 1.7 thorpej Name,
537 1.7 thorpej ENCTYPE_NAME_OK(type)
538 1.7 thorpej ? ENCTYPE_NAME(type) : "(unknown)",
539 1.7 thorpej type);
540 1.7 thorpej ret = 0;
541 1.7 thorpej } else {
542 1.7 thorpej ret = (*ep->is)(data, cnt);
543 1.20 kre if (encrypt_debug())
544 1.7 thorpej printf("(*ep->is)(%p, %d) returned %s(%d)\n", data, cnt,
545 1.7 thorpej (ret < 0) ? "FAIL " :
546 1.7 thorpej (ret == 0) ? "SUCCESS " : "MORE_TO_DO ", ret);
547 1.7 thorpej }
548 1.7 thorpej if (ret < 0) {
549 1.7 thorpej autodecrypt = 0;
550 1.7 thorpej } else {
551 1.7 thorpej decrypt_mode = type;
552 1.7 thorpej if (ret == 0 && autodecrypt)
553 1.7 thorpej encrypt_send_request_start();
554 1.7 thorpej }
555 1.7 thorpej }
556 1.7 thorpej
557 1.17 matt void
558 1.17 matt encrypt_reply(unsigned char *data, int cnt)
559 1.7 thorpej {
560 1.7 thorpej Encryptions *ep;
561 1.7 thorpej register int ret, type;
562 1.7 thorpej
563 1.7 thorpej if (--cnt < 0)
564 1.7 thorpej return;
565 1.7 thorpej type = *data++;
566 1.7 thorpej if (!(ep = findencryption(type))) {
567 1.20 kre if (encrypt_debug())
568 1.7 thorpej printf(">>>%s: Can't find type %s (%d) for initial negotiation\r\n",
569 1.7 thorpej Name,
570 1.7 thorpej ENCTYPE_NAME_OK(type)
571 1.7 thorpej ? ENCTYPE_NAME(type) : "(unknown)",
572 1.7 thorpej type);
573 1.7 thorpej return;
574 1.7 thorpej }
575 1.7 thorpej if (!ep->reply) {
576 1.20 kre if (encrypt_debug())
577 1.7 thorpej printf(">>>%s: No initial negotiation needed for type %s (%d)\r\n",
578 1.7 thorpej Name,
579 1.7 thorpej ENCTYPE_NAME_OK(type)
580 1.7 thorpej ? ENCTYPE_NAME(type) : "(unknown)",
581 1.7 thorpej type);
582 1.7 thorpej ret = 0;
583 1.7 thorpej } else {
584 1.7 thorpej ret = (*ep->reply)(data, cnt);
585 1.20 kre if (encrypt_debug())
586 1.7 thorpej printf("(*ep->reply)(%p, %d) returned %s(%d)\n",
587 1.7 thorpej data, cnt,
588 1.7 thorpej (ret < 0) ? "FAIL " :
589 1.7 thorpej (ret == 0) ? "SUCCESS " : "MORE_TO_DO ", ret);
590 1.7 thorpej }
591 1.20 kre if (encrypt_debug())
592 1.7 thorpej printf(">>>%s: encrypt_reply returned %d\n", Name, ret);
593 1.7 thorpej if (ret < 0) {
594 1.7 thorpej autoencrypt = 0;
595 1.7 thorpej } else {
596 1.7 thorpej encrypt_mode = type;
597 1.7 thorpej if (ret == 0 && autoencrypt)
598 1.7 thorpej encrypt_start_output(type);
599 1.7 thorpej }
600 1.7 thorpej }
601 1.7 thorpej
602 1.7 thorpej /*
603 1.7 thorpej * Called when a ENCRYPT START command is received.
604 1.7 thorpej */
605 1.17 matt void
606 1.17 matt encrypt_start(unsigned char *data, int cnt)
607 1.7 thorpej {
608 1.7 thorpej Encryptions *ep;
609 1.7 thorpej
610 1.7 thorpej if (!decrypt_mode) {
611 1.7 thorpej /*
612 1.7 thorpej * Something is wrong. We should not get a START
613 1.7 thorpej * command without having already picked our
614 1.7 thorpej * decryption scheme. Send a REQUEST-END to
615 1.7 thorpej * attempt to clear the channel...
616 1.7 thorpej */
617 1.7 thorpej printf("%s: Warning, Cannot decrypt input stream!!!\r\n", Name);
618 1.7 thorpej encrypt_send_request_end();
619 1.7 thorpej return;
620 1.7 thorpej }
621 1.7 thorpej
622 1.7 thorpej if ((ep = finddecryption(decrypt_mode)) != NULL) {
623 1.7 thorpej decrypt_input = ep->input;
624 1.7 thorpej if (encrypt_verbose)
625 1.7 thorpej printf("[ Input is now decrypted with type %s ]\r\n",
626 1.7 thorpej ENCTYPE_NAME(decrypt_mode));
627 1.20 kre if (encrypt_debug())
628 1.7 thorpej printf(">>>%s: Start to decrypt input with type %s\r\n",
629 1.7 thorpej Name, ENCTYPE_NAME(decrypt_mode));
630 1.7 thorpej } else {
631 1.7 thorpej printf("%s: Warning, Cannot decrypt type %s (%d)!!!\r\n",
632 1.7 thorpej Name,
633 1.7 thorpej ENCTYPE_NAME_OK(decrypt_mode)
634 1.7 thorpej ? ENCTYPE_NAME(decrypt_mode)
635 1.7 thorpej : "(unknown)",
636 1.7 thorpej decrypt_mode);
637 1.7 thorpej encrypt_send_request_end();
638 1.7 thorpej }
639 1.7 thorpej }
640 1.7 thorpej
641 1.17 matt void
642 1.17 matt encrypt_session_key(Session_Key *key, int server)
643 1.7 thorpej {
644 1.7 thorpej Encryptions *ep = encryptions;
645 1.7 thorpej
646 1.7 thorpej havesessionkey = 1;
647 1.7 thorpej
648 1.7 thorpej while (ep->type) {
649 1.7 thorpej if (ep->session)
650 1.7 thorpej (*ep->session)(key, server);
651 1.7 thorpej #ifdef notdef
652 1.7 thorpej if (!encrypt_output && autoencrypt && !server)
653 1.7 thorpej encrypt_start_output(ep->type);
654 1.7 thorpej if (!decrypt_input && autodecrypt && !server)
655 1.7 thorpej encrypt_send_request_start();
656 1.7 thorpej #endif
657 1.7 thorpej ++ep;
658 1.7 thorpej }
659 1.7 thorpej }
660 1.7 thorpej
661 1.7 thorpej /*
662 1.7 thorpej * Called when ENCRYPT END is received.
663 1.7 thorpej */
664 1.17 matt void
665 1.17 matt encrypt_end(void)
666 1.7 thorpej {
667 1.7 thorpej decrypt_input = 0;
668 1.20 kre if (encrypt_debug())
669 1.7 thorpej printf(">>>%s: Input is back to clear text\r\n", Name);
670 1.7 thorpej if (encrypt_verbose)
671 1.7 thorpej printf("[ Input is now clear text ]\r\n");
672 1.7 thorpej }
673 1.7 thorpej
674 1.7 thorpej /*
675 1.7 thorpej * Called when ENCRYPT REQUEST-END is received.
676 1.7 thorpej */
677 1.17 matt void
678 1.17 matt encrypt_request_end(void)
679 1.7 thorpej {
680 1.7 thorpej encrypt_send_end();
681 1.7 thorpej }
682 1.7 thorpej
683 1.7 thorpej /*
684 1.7 thorpej * Called when ENCRYPT REQUEST-START is received. If we receive
685 1.7 thorpej * this before a type is picked, then that indicates that the
686 1.7 thorpej * other side wants us to start encrypting data as soon as we
687 1.7 thorpej * can.
688 1.7 thorpej */
689 1.17 matt void
690 1.17 matt encrypt_request_start(unsigned char *data, int cnt)
691 1.7 thorpej {
692 1.7 thorpej if (encrypt_mode == 0) {
693 1.7 thorpej if (Server)
694 1.7 thorpej autoencrypt = 1;
695 1.7 thorpej return;
696 1.7 thorpej }
697 1.7 thorpej encrypt_start_output(encrypt_mode);
698 1.7 thorpej }
699 1.7 thorpej
700 1.7 thorpej static unsigned char str_keyid[(MAXKEYLEN*2)+5] = { IAC, SB, TELOPT_ENCRYPT };
701 1.7 thorpej
702 1.17 matt void
703 1.17 matt encrypt_enc_keyid(unsigned char *keyid, int len)
704 1.7 thorpej {
705 1.7 thorpej encrypt_keyid(&ki[1], keyid, len);
706 1.7 thorpej }
707 1.7 thorpej
708 1.17 matt void
709 1.17 matt encrypt_dec_keyid(unsigned char *keyid, int len)
710 1.7 thorpej {
711 1.7 thorpej encrypt_keyid(&ki[0], keyid, len);
712 1.7 thorpej }
713 1.7 thorpej
714 1.7 thorpej void
715 1.17 matt encrypt_keyid(struct key_info *kp, unsigned char *keyid, int len)
716 1.7 thorpej {
717 1.7 thorpej Encryptions *ep;
718 1.7 thorpej int dir = kp->dir;
719 1.7 thorpej register int ret = 0;
720 1.7 thorpej
721 1.7 thorpej if (!(ep = (*kp->getcrypt)(*kp->modep))) {
722 1.7 thorpej if (len == 0)
723 1.7 thorpej return;
724 1.7 thorpej kp->keylen = 0;
725 1.7 thorpej } else if (len == 0) {
726 1.7 thorpej /*
727 1.7 thorpej * Empty option, indicates a failure.
728 1.7 thorpej */
729 1.7 thorpej if (kp->keylen == 0)
730 1.7 thorpej return;
731 1.7 thorpej kp->keylen = 0;
732 1.7 thorpej if (ep->keyid)
733 1.7 thorpej (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
734 1.7 thorpej
735 1.16 christos } else if ((size_t)len > sizeof(kp->keyid)) {
736 1.15 christos return;
737 1.7 thorpej } else if ((len != kp->keylen) ||
738 1.7 thorpej (memcmp(keyid, kp->keyid, len) != 0)) {
739 1.7 thorpej /*
740 1.7 thorpej * Length or contents are different
741 1.7 thorpej */
742 1.7 thorpej kp->keylen = len;
743 1.7 thorpej memmove(kp->keyid, keyid, len);
744 1.7 thorpej if (ep->keyid)
745 1.7 thorpej (void)(*ep->keyid)(dir, kp->keyid, &kp->keylen);
746 1.7 thorpej } else {
747 1.7 thorpej if (ep->keyid)
748 1.7 thorpej ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen);
749 1.7 thorpej if ((ret == 0) && (dir == DIR_ENCRYPT) && autoencrypt)
750 1.7 thorpej encrypt_start_output(*kp->modep);
751 1.7 thorpej return;
752 1.7 thorpej }
753 1.7 thorpej
754 1.7 thorpej encrypt_send_keyid(dir, kp->keyid, kp->keylen, 0);
755 1.7 thorpej }
756 1.7 thorpej
757 1.17 matt void
758 1.16 christos encrypt_send_keyid(int dir, const unsigned char *keyid, int keylen, int saveit)
759 1.7 thorpej {
760 1.7 thorpej unsigned char *strp;
761 1.7 thorpej
762 1.7 thorpej str_keyid[3] = (dir == DIR_ENCRYPT)
763 1.7 thorpej ? ENCRYPT_ENC_KEYID : ENCRYPT_DEC_KEYID;
764 1.7 thorpej if (saveit) {
765 1.7 thorpej struct key_info *kp = &ki[(dir == DIR_ENCRYPT) ? 0 : 1];
766 1.7 thorpej memmove(kp->keyid, keyid, keylen);
767 1.7 thorpej kp->keylen = keylen;
768 1.7 thorpej }
769 1.7 thorpej
770 1.7 thorpej for (strp = &str_keyid[4]; keylen > 0; --keylen) {
771 1.7 thorpej if ((*strp++ = *keyid++) == IAC)
772 1.7 thorpej *strp++ = IAC;
773 1.7 thorpej }
774 1.7 thorpej *strp++ = IAC;
775 1.7 thorpej *strp++ = SE;
776 1.7 thorpej telnet_net_write(str_keyid, strp - str_keyid);
777 1.7 thorpej printsub('>', &str_keyid[2], strp - str_keyid - 2);
778 1.7 thorpej }
779 1.7 thorpej
780 1.17 matt void
781 1.17 matt encrypt_auto(int on)
782 1.7 thorpej {
783 1.7 thorpej if (on < 0)
784 1.7 thorpej autoencrypt ^= 1;
785 1.7 thorpej else
786 1.7 thorpej autoencrypt = on ? 1 : 0;
787 1.7 thorpej }
788 1.7 thorpej
789 1.17 matt void
790 1.17 matt decrypt_auto(int on)
791 1.7 thorpej {
792 1.7 thorpej if (on < 0)
793 1.7 thorpej autodecrypt ^= 1;
794 1.7 thorpej else
795 1.7 thorpej autodecrypt = on ? 1 : 0;
796 1.7 thorpej }
797 1.7 thorpej
798 1.17 matt void
799 1.17 matt encrypt_start_output(int type)
800 1.7 thorpej {
801 1.7 thorpej Encryptions *ep;
802 1.7 thorpej register unsigned char *p;
803 1.7 thorpej register int i;
804 1.7 thorpej
805 1.7 thorpej if (!(ep = findencryption(type))) {
806 1.20 kre if (encrypt_debug()) {
807 1.7 thorpej printf(">>>%s: Can't encrypt with type %s (%d)\r\n",
808 1.7 thorpej Name,
809 1.7 thorpej ENCTYPE_NAME_OK(type)
810 1.7 thorpej ? ENCTYPE_NAME(type) : "(unknown)",
811 1.7 thorpej type);
812 1.7 thorpej }
813 1.7 thorpej return;
814 1.7 thorpej }
815 1.7 thorpej if (ep->start) {
816 1.7 thorpej i = (*ep->start)(DIR_ENCRYPT, Server);
817 1.20 kre if (encrypt_debug()) {
818 1.7 thorpej printf(">>>%s: Encrypt start: %s (%d) %s\r\n",
819 1.7 thorpej Name,
820 1.7 thorpej (i < 0) ? "failed" :
821 1.7 thorpej "initial negotiation in progress",
822 1.7 thorpej i, ENCTYPE_NAME(type));
823 1.7 thorpej }
824 1.7 thorpej if (i)
825 1.7 thorpej return;
826 1.7 thorpej }
827 1.7 thorpej p = str_start + 3;
828 1.7 thorpej *p++ = ENCRYPT_START;
829 1.7 thorpej for (i = 0; i < ki[0].keylen; ++i) {
830 1.7 thorpej if ((*p++ = ki[0].keyid[i]) == IAC)
831 1.7 thorpej *p++ = IAC;
832 1.7 thorpej }
833 1.7 thorpej *p++ = IAC;
834 1.7 thorpej *p++ = SE;
835 1.7 thorpej telnet_net_write(str_start, p - str_start);
836 1.7 thorpej net_encrypt();
837 1.7 thorpej printsub('>', &str_start[2], p - &str_start[2]);
838 1.7 thorpej /*
839 1.7 thorpej * If we are already encrypting in some mode, then
840 1.7 thorpej * encrypt the ring (which includes our request) in
841 1.7 thorpej * the old mode, mark it all as "clear text" and then
842 1.7 thorpej * switch to the new mode.
843 1.7 thorpej */
844 1.7 thorpej encrypt_output = ep->output;
845 1.7 thorpej encrypt_mode = type;
846 1.20 kre if (encrypt_debug())
847 1.7 thorpej printf(">>>%s: Started to encrypt output with type %s\r\n",
848 1.7 thorpej Name, ENCTYPE_NAME(type));
849 1.7 thorpej if (encrypt_verbose)
850 1.7 thorpej printf("[ Output is now encrypted with type %s ]\r\n",
851 1.7 thorpej ENCTYPE_NAME(type));
852 1.7 thorpej }
853 1.7 thorpej
854 1.17 matt void
855 1.17 matt encrypt_send_end(void)
856 1.7 thorpej {
857 1.7 thorpej if (!encrypt_output)
858 1.7 thorpej return;
859 1.7 thorpej
860 1.7 thorpej str_end[3] = ENCRYPT_END;
861 1.7 thorpej telnet_net_write(str_end, sizeof(str_end));
862 1.7 thorpej net_encrypt();
863 1.7 thorpej printsub('>', &str_end[2], sizeof(str_end) - 2);
864 1.7 thorpej /*
865 1.7 thorpej * Encrypt the output buffer now because it will not be done by
866 1.7 thorpej * netflush...
867 1.7 thorpej */
868 1.7 thorpej encrypt_output = 0;
869 1.20 kre if (encrypt_debug())
870 1.7 thorpej printf(">>>%s: Output is back to clear text\r\n", Name);
871 1.7 thorpej if (encrypt_verbose)
872 1.7 thorpej printf("[ Output is now clear text ]\r\n");
873 1.7 thorpej }
874 1.7 thorpej
875 1.17 matt void
876 1.17 matt encrypt_send_request_start(void)
877 1.7 thorpej {
878 1.7 thorpej register unsigned char *p;
879 1.7 thorpej register int i;
880 1.7 thorpej
881 1.7 thorpej p = &str_start[3];
882 1.7 thorpej *p++ = ENCRYPT_REQSTART;
883 1.7 thorpej for (i = 0; i < ki[1].keylen; ++i) {
884 1.7 thorpej if ((*p++ = ki[1].keyid[i]) == IAC)
885 1.7 thorpej *p++ = IAC;
886 1.7 thorpej }
887 1.7 thorpej *p++ = IAC;
888 1.7 thorpej *p++ = SE;
889 1.7 thorpej telnet_net_write(str_start, p - str_start);
890 1.7 thorpej printsub('>', &str_start[2], p - &str_start[2]);
891 1.20 kre if (encrypt_debug())
892 1.7 thorpej printf(">>>%s: Request input to be encrypted\r\n", Name);
893 1.7 thorpej }
894 1.7 thorpej
895 1.17 matt void
896 1.17 matt encrypt_send_request_end(void)
897 1.7 thorpej {
898 1.7 thorpej str_end[3] = ENCRYPT_REQEND;
899 1.7 thorpej telnet_net_write(str_end, sizeof(str_end));
900 1.7 thorpej printsub('>', &str_end[2], sizeof(str_end) - 2);
901 1.7 thorpej
902 1.20 kre if (encrypt_debug())
903 1.7 thorpej printf(">>>%s: Request input to be clear text\r\n", Name);
904 1.7 thorpej }
905 1.7 thorpej
906 1.17 matt void
907 1.17 matt encrypt_wait(void)
908 1.7 thorpej {
909 1.20 kre if (encrypt_debug())
910 1.7 thorpej printf(">>>%s: in encrypt_wait\r\n", Name);
911 1.7 thorpej if (!havesessionkey || !(I_SUPPORT_ENCRYPT & remote_supports_decrypt))
912 1.7 thorpej return;
913 1.7 thorpej while (autoencrypt && !encrypt_output)
914 1.7 thorpej if (telnet_spin())
915 1.7 thorpej return;
916 1.7 thorpej }
917 1.7 thorpej
918 1.20 kre int
919 1.20 kre encrypt_debug(void)
920 1.7 thorpej {
921 1.20 kre return encrypt_debug_mode;
922 1.7 thorpej }
923 1.7 thorpej
924 1.17 matt void
925 1.17 matt encrypt_gen_printsub(unsigned char *data, int cnt,
926 1.17 matt unsigned char *buf, int buflen)
927 1.7 thorpej {
928 1.7 thorpej char tbuf[16], *cp;
929 1.7 thorpej
930 1.7 thorpej cnt -= 2;
931 1.7 thorpej data += 2;
932 1.7 thorpej buf[buflen-1] = '\0';
933 1.7 thorpej buf[buflen-2] = '*';
934 1.10 simonb buflen -= 2;
935 1.7 thorpej for (; cnt > 0; cnt--, data++) {
936 1.11 itojun snprintf(tbuf, sizeof(tbuf), " %d", *data);
937 1.7 thorpej for (cp = tbuf; *cp && buflen > 0; --buflen)
938 1.7 thorpej *buf++ = *cp++;
939 1.7 thorpej if (buflen <= 0)
940 1.7 thorpej return;
941 1.7 thorpej }
942 1.7 thorpej *buf = '\0';
943 1.7 thorpej }
944 1.7 thorpej
945 1.17 matt void
946 1.17 matt encrypt_printsub(unsigned char *data, int cnt,
947 1.17 matt unsigned char *buf, int buflen)
948 1.7 thorpej {
949 1.7 thorpej Encryptions *ep;
950 1.7 thorpej register int type = data[1];
951 1.7 thorpej
952 1.7 thorpej for (ep = encryptions; ep->type && ep->type != type; ep++)
953 1.7 thorpej ;
954 1.7 thorpej
955 1.7 thorpej if (ep->printsub)
956 1.7 thorpej (*ep->printsub)(data, cnt, buf, buflen);
957 1.7 thorpej else
958 1.7 thorpej encrypt_gen_printsub(data, cnt, buf, buflen);
959 1.7 thorpej }
960 1.7 thorpej #endif /* ENCRYPTION */
961