mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-01-10 01:48:00 +00:00
SSH2 transport layer now enables encryption and MAC successfully for 3DES
[originally from svn r571]
This commit is contained in:
parent
36a499a7f1
commit
0f1e449189
21
ssh.c
21
ssh.c
@ -88,11 +88,12 @@ enum { PKT_END, PKT_INT, PKT_CHAR, PKT_DATA, PKT_STR };
|
|||||||
#define crWaitUntil(c) do { crReturn(0); } while (!(c))
|
#define crWaitUntil(c) do { crReturn(0); } while (!(c))
|
||||||
|
|
||||||
extern struct ssh_cipher ssh_3des;
|
extern struct ssh_cipher ssh_3des;
|
||||||
|
extern struct ssh_cipher ssh_3des_ssh2;
|
||||||
extern struct ssh_cipher ssh_des;
|
extern struct ssh_cipher ssh_des;
|
||||||
extern struct ssh_cipher ssh_blowfish;
|
extern struct ssh_cipher ssh_blowfish;
|
||||||
|
|
||||||
/* for ssh 2; we miss out single-DES because it isn't supported */
|
/* for ssh 2; we miss out single-DES because it isn't supported */
|
||||||
struct ssh_cipher *ciphers[] = { &ssh_3des, &ssh_blowfish };
|
struct ssh_cipher *ciphers[] = { &ssh_3des_ssh2, &ssh_blowfish };
|
||||||
|
|
||||||
extern struct ssh_kex ssh_diffiehellman;
|
extern struct ssh_kex ssh_diffiehellman;
|
||||||
struct ssh_kex *kex_algs[] = { &ssh_diffiehellman };
|
struct ssh_kex *kex_algs[] = { &ssh_diffiehellman };
|
||||||
@ -408,8 +409,9 @@ next_packet:
|
|||||||
/*
|
/*
|
||||||
* Check the MAC.
|
* Check the MAC.
|
||||||
*/
|
*/
|
||||||
if (scmac && !scmac->verify(pktin.data, incoming_sequence++, len+4))
|
if (scmac && !scmac->verify(pktin.data, len+4, incoming_sequence))
|
||||||
fatalbox("Incorrect MAC received on packet");
|
fatalbox("Incorrect MAC received on packet");
|
||||||
|
incoming_sequence++; /* whether or not we MACed */
|
||||||
|
|
||||||
pktin.savedpos = 6;
|
pktin.savedpos = 6;
|
||||||
pktin.type = pktin.data[5];
|
pktin.type = pktin.data[5];
|
||||||
@ -1207,7 +1209,7 @@ void ssh2_pkt_addmp(Bignum b) {
|
|||||||
}
|
}
|
||||||
void ssh2_pkt_send(void) {
|
void ssh2_pkt_send(void) {
|
||||||
int cipherblk, maclen, padding, i;
|
int cipherblk, maclen, padding, i;
|
||||||
unsigned long outgoing_sequence = 0;
|
static unsigned long outgoing_sequence = 0;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Add padding. At least four bytes, and must also bring total
|
* Add padding. At least four bytes, and must also bring total
|
||||||
@ -1222,8 +1224,9 @@ void ssh2_pkt_send(void) {
|
|||||||
pktout.data[pktout.length + i] = random_byte();
|
pktout.data[pktout.length + i] = random_byte();
|
||||||
PUT_32BIT(pktout.data, pktout.length + padding - 4);
|
PUT_32BIT(pktout.data, pktout.length + padding - 4);
|
||||||
if (csmac)
|
if (csmac)
|
||||||
csmac->generate(pktout.data, outgoing_sequence++,
|
csmac->generate(pktout.data, pktout.length + padding,
|
||||||
pktout.length + padding);
|
outgoing_sequence);
|
||||||
|
outgoing_sequence++; /* whether or not we MACed */
|
||||||
if (cscipher)
|
if (cscipher)
|
||||||
cscipher->encrypt(pktout.data, pktout.length + padding);
|
cscipher->encrypt(pktout.data, pktout.length + padding);
|
||||||
maclen = csmac ? csmac->len : 0;
|
maclen = csmac ? csmac->len : 0;
|
||||||
@ -1584,6 +1587,14 @@ static int do_ssh2_kex(unsigned char *in, int inlen, int ispkt)
|
|||||||
ssh2_mkkey(K, exchange_hash, 'E', keyspace); csmac->setcskey(keyspace);
|
ssh2_mkkey(K, exchange_hash, 'E', keyspace); csmac->setcskey(keyspace);
|
||||||
ssh2_mkkey(K, exchange_hash, 'F', keyspace); scmac->setsckey(keyspace);
|
ssh2_mkkey(K, exchange_hash, 'F', keyspace); scmac->setsckey(keyspace);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Now we're encrypting. Send a test packet (FIXME).
|
||||||
|
*/
|
||||||
|
crWaitUntil(!ispkt);
|
||||||
|
ssh2_pkt_init(SSH2_MSG_IGNORE);
|
||||||
|
ssh2_pkt_addstring("oo-er");
|
||||||
|
ssh2_pkt_send();
|
||||||
|
|
||||||
crWaitUntil(0);
|
crWaitUntil(0);
|
||||||
|
|
||||||
crFinish(1);
|
crFinish(1);
|
||||||
|
75
sshdes.c
75
sshdes.c
@ -1,6 +1,10 @@
|
|||||||
#include <assert.h>
|
#include <assert.h>
|
||||||
|
#include <stdarg.h> /* FIXME */
|
||||||
|
#include <windows.h> /* FIXME */
|
||||||
|
#include "putty.h" /* FIXME */
|
||||||
#include "ssh.h"
|
#include "ssh.h"
|
||||||
|
|
||||||
|
|
||||||
/* des.c - implementation of DES
|
/* des.c - implementation of DES
|
||||||
*/
|
*/
|
||||||
|
|
||||||
@ -655,6 +659,30 @@ static void des_3cbc_encrypt(unsigned char *dest, const unsigned char *src,
|
|||||||
des_cbc_encrypt(dest, src, len, &scheds[2]);
|
des_cbc_encrypt(dest, src, len, &scheds[2]);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void des_cbc3_encrypt(unsigned char *dest, const unsigned char *src,
|
||||||
|
unsigned int len, DESContext *scheds) {
|
||||||
|
word32 out[2], iv0, iv1;
|
||||||
|
unsigned int i;
|
||||||
|
|
||||||
|
assert((len & 7) == 0);
|
||||||
|
|
||||||
|
iv0 = scheds->eiv0;
|
||||||
|
iv1 = scheds->eiv1;
|
||||||
|
for (i = 0; i < len; i += 8) {
|
||||||
|
iv0 ^= GET_32BIT_MSB_FIRST(src); src += 4;
|
||||||
|
iv1 ^= GET_32BIT_MSB_FIRST(src); src += 4;
|
||||||
|
des_encipher(out, iv0, iv1, &scheds[0]);
|
||||||
|
des_decipher(out, out[0], out[1], &scheds[1]);
|
||||||
|
des_encipher(out, out[0], out[1], &scheds[2]);
|
||||||
|
iv0 = out[0];
|
||||||
|
iv1 = out[1];
|
||||||
|
PUT_32BIT_MSB_FIRST(dest, iv0); dest += 4;
|
||||||
|
PUT_32BIT_MSB_FIRST(dest, iv1); dest += 4;
|
||||||
|
}
|
||||||
|
scheds->eiv0 = iv0;
|
||||||
|
scheds->eiv1 = iv1;
|
||||||
|
}
|
||||||
|
|
||||||
static void des_3cbc_decrypt(unsigned char *dest, const unsigned char *src,
|
static void des_3cbc_decrypt(unsigned char *dest, const unsigned char *src,
|
||||||
unsigned int len, DESContext *scheds) {
|
unsigned int len, DESContext *scheds) {
|
||||||
des_cbc_decrypt(dest, src, len, &scheds[2]);
|
des_cbc_decrypt(dest, src, len, &scheds[2]);
|
||||||
@ -662,6 +690,32 @@ static void des_3cbc_decrypt(unsigned char *dest, const unsigned char *src,
|
|||||||
des_cbc_decrypt(dest, src, len, &scheds[0]);
|
des_cbc_decrypt(dest, src, len, &scheds[0]);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void des_cbc3_decrypt(unsigned char *dest, const unsigned char *src,
|
||||||
|
unsigned int len, DESContext *scheds) {
|
||||||
|
word32 out[2], iv0, iv1, xL, xR;
|
||||||
|
unsigned int i;
|
||||||
|
|
||||||
|
assert((len & 7) == 0);
|
||||||
|
|
||||||
|
iv0 = scheds->div0;
|
||||||
|
iv1 = scheds->div1;
|
||||||
|
for (i = 0; i < len; i += 8) {
|
||||||
|
xL = GET_32BIT_MSB_FIRST(src); src += 4;
|
||||||
|
xR = GET_32BIT_MSB_FIRST(src); src += 4;
|
||||||
|
des_decipher(out, xL, xR, &scheds[2]);
|
||||||
|
des_encipher(out, out[0], out[1], &scheds[1]);
|
||||||
|
des_decipher(out, out[0], out[1], &scheds[0]);
|
||||||
|
iv0 ^= out[0];
|
||||||
|
iv1 ^= out[1];
|
||||||
|
PUT_32BIT_MSB_FIRST(dest, iv0); dest += 4;
|
||||||
|
PUT_32BIT_MSB_FIRST(dest, iv1); dest += 4;
|
||||||
|
iv0 = xL;
|
||||||
|
iv1 = xR;
|
||||||
|
}
|
||||||
|
scheds->div0 = iv0;
|
||||||
|
scheds->div1 = iv1;
|
||||||
|
}
|
||||||
|
|
||||||
static DESContext cskeys[3], sckeys[3];
|
static DESContext cskeys[3], sckeys[3];
|
||||||
|
|
||||||
static void des3_cskey(unsigned char *key) {
|
static void des3_cskey(unsigned char *key) {
|
||||||
@ -707,10 +761,27 @@ static void des3_decrypt_blk(unsigned char *blk, int len) {
|
|||||||
des_3cbc_decrypt(blk, blk, len, sckeys);
|
des_3cbc_decrypt(blk, blk, len, sckeys);
|
||||||
}
|
}
|
||||||
|
|
||||||
struct ssh_cipher ssh_3des = {
|
static void des3_ssh2_encrypt_blk(unsigned char *blk, int len) {
|
||||||
des3_sesskey,
|
des_cbc3_encrypt(blk, blk, len, cskeys);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void des3_ssh2_decrypt_blk(unsigned char *blk, int len) {
|
||||||
|
des_cbc3_decrypt(blk, blk, len, sckeys);
|
||||||
|
}
|
||||||
|
|
||||||
|
struct ssh_cipher ssh_3des_ssh2 = {
|
||||||
|
NULL,
|
||||||
des3_csiv, des3_cskey,
|
des3_csiv, des3_cskey,
|
||||||
des3_sciv, des3_sckey,
|
des3_sciv, des3_sckey,
|
||||||
|
des3_ssh2_encrypt_blk,
|
||||||
|
des3_ssh2_decrypt_blk,
|
||||||
|
"3des-cbc",
|
||||||
|
8
|
||||||
|
};
|
||||||
|
|
||||||
|
struct ssh_cipher ssh_3des = {
|
||||||
|
des3_sesskey,
|
||||||
|
NULL, NULL, NULL, NULL,
|
||||||
des3_encrypt_blk,
|
des3_encrypt_blk,
|
||||||
des3_decrypt_blk,
|
des3_decrypt_blk,
|
||||||
"3des-cbc",
|
"3des-cbc",
|
||||||
|
29
sshsha.c
29
sshsha.c
@ -1,3 +1,7 @@
|
|||||||
|
#include <stdarg.h> /* FIXME */
|
||||||
|
#include <windows.h> /* FIXME */
|
||||||
|
#include "putty.h" /* FIXME */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* SHA1 hash algorithm. Used in SSH2 as a MAC, and the transform is
|
* SHA1 hash algorithm. Used in SSH2 as a MAC, and the transform is
|
||||||
* also used as a `stirring' function for the PuTTY random number
|
* also used as a `stirring' function for the PuTTY random number
|
||||||
@ -177,6 +181,11 @@ static void sha1_key(SHA_State *s1, SHA_State *s2,
|
|||||||
unsigned char *key, int len) {
|
unsigned char *key, int len) {
|
||||||
unsigned char foo[64];
|
unsigned char foo[64];
|
||||||
int i;
|
int i;
|
||||||
|
{int j;
|
||||||
|
debug(("Key supplied is:\r\n"));
|
||||||
|
for (j=0; j<len; j++) debug((" %02X", key[j]));
|
||||||
|
debug(("\r\n"));
|
||||||
|
}
|
||||||
|
|
||||||
memset(foo, 0x36, 64);
|
memset(foo, 0x36, 64);
|
||||||
for (i = 0; i < len && i < 64; i++)
|
for (i = 0; i < len && i < 64; i++)
|
||||||
@ -222,12 +231,32 @@ static void sha1_do_hmac(SHA_State *s1, SHA_State *s2,
|
|||||||
}
|
}
|
||||||
|
|
||||||
static void sha1_generate(unsigned char *blk, int len, unsigned long seq) {
|
static void sha1_generate(unsigned char *blk, int len, unsigned long seq) {
|
||||||
|
{int i;
|
||||||
|
debug(("Gen HMAC on block len=%d seq=%d:\r\n", len, seq));
|
||||||
|
for (i=0; i<len; i++) debug((" %02X", blk[i]));
|
||||||
|
debug(("\r\n"));
|
||||||
|
}
|
||||||
sha1_do_hmac(&sha1_cs_mac_s1, &sha1_cs_mac_s2, blk, len, seq, blk+len);
|
sha1_do_hmac(&sha1_cs_mac_s1, &sha1_cs_mac_s2, blk, len, seq, blk+len);
|
||||||
|
{int i;
|
||||||
|
debug(("We compute HMAC as:\r\n"));
|
||||||
|
for (i=0; i<20; i++) debug((" %02X", blk[len+i]));
|
||||||
|
debug(("\r\n"));
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static int sha1_verify(unsigned char *blk, int len, unsigned long seq) {
|
static int sha1_verify(unsigned char *blk, int len, unsigned long seq) {
|
||||||
unsigned char correct[20];
|
unsigned char correct[20];
|
||||||
|
{int i;
|
||||||
|
debug(("HMAC on block len=%d seq=%d:\r\n", len, seq));
|
||||||
|
for (i=0; i<len; i++) debug((" %02X", blk[i]));
|
||||||
|
debug(("\r\n"));
|
||||||
|
}
|
||||||
sha1_do_hmac(&sha1_sc_mac_s1, &sha1_sc_mac_s2, blk, len, seq, correct);
|
sha1_do_hmac(&sha1_sc_mac_s1, &sha1_sc_mac_s2, blk, len, seq, correct);
|
||||||
|
{int i;
|
||||||
|
debug(("We compute HMAC as:\r\n"));
|
||||||
|
for (i=0; i<20; i++) debug((" %02X", correct[i]));
|
||||||
|
debug(("\r\n"));
|
||||||
|
}
|
||||||
return !memcmp(correct, blk+len, 20);
|
return !memcmp(correct, blk+len, 20);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user