1
0
mirror of https://git.libssh.org/projects/libssh.git synced 2025-12-12 15:41:16 +03:00

CVE-2023-6918: Systematically check return values when calculating digests

with all crypto backends

Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
This commit is contained in:
Jakub Jelen
2023-12-15 12:55:54 +01:00
committed by Andreas Schneider
parent 10c200037a
commit 5c407d2f16
6 changed files with 588 additions and 215 deletions

View File

@@ -72,29 +72,33 @@ struct ssh_crypto_struct;
typedef struct ssh_mac_ctx_struct *ssh_mac_ctx; typedef struct ssh_mac_ctx_struct *ssh_mac_ctx;
MD5CTX md5_init(void); MD5CTX md5_init(void);
void md5_update(MD5CTX c, const void *data, size_t len); void md5_ctx_free(MD5CTX);
void md5_final(unsigned char *md,MD5CTX c); int md5_update(MD5CTX c, const void *data, size_t len);
int md5_final(unsigned char *md, MD5CTX c);
SHACTX sha1_init(void); SHACTX sha1_init(void);
void sha1_update(SHACTX c, const void *data, size_t len); void sha1_ctx_free(SHACTX);
void sha1_final(unsigned char *md,SHACTX c); int sha1_update(SHACTX c, const void *data, size_t len);
void sha1(const unsigned char *digest,size_t len,unsigned char *hash); int sha1_final(unsigned char *md,SHACTX c);
int sha1(const unsigned char *digest,size_t len, unsigned char *hash);
SHA256CTX sha256_init(void); SHA256CTX sha256_init(void);
void sha256_update(SHA256CTX c, const void *data, size_t len); void sha256_ctx_free(SHA256CTX);
void sha256_final(unsigned char *md,SHA256CTX c); int sha256_update(SHA256CTX c, const void *data, size_t len);
void sha256(const unsigned char *digest, size_t len, unsigned char *hash); int sha256_final(unsigned char *md,SHA256CTX c);
int sha256(const unsigned char *digest, size_t len, unsigned char *hash);
SHA384CTX sha384_init(void); SHA384CTX sha384_init(void);
void sha384_update(SHA384CTX c, const void *data, size_t len); void sha384_ctx_free(SHA384CTX);
void sha384_final(unsigned char *md,SHA384CTX c); int sha384_update(SHA384CTX c, const void *data, size_t len);
void sha384(const unsigned char *digest, size_t len, unsigned char *hash); int sha384_final(unsigned char *md,SHA384CTX c);
int sha384(const unsigned char *digest, size_t len, unsigned char *hash);
SHA512CTX sha512_init(void); SHA512CTX sha512_init(void);
void sha512_update(SHA512CTX c, const void *data, size_t len); void sha512_ctx_free(SHA512CTX);
void sha512_final(unsigned char *md,SHA512CTX c); int sha512_update(SHA512CTX c, const void *data, size_t len);
void sha512(const unsigned char *digest, size_t len, unsigned char *hash); int sha512_final(unsigned char *md,SHA512CTX c);
int sha512(const unsigned char *digest, size_t len, unsigned char *hash);
HMACCTX hmac_init(const void *key,size_t len, enum ssh_hmac_e type); HMACCTX hmac_init(const void *key,size_t len, enum ssh_hmac_e type);
int hmac_update(HMACCTX c, const void *data, size_t len); int hmac_update(HMACCTX c, const void *data, size_t len);

118
src/kdf.c
View File

@@ -77,43 +77,66 @@ static ssh_mac_ctx ssh_mac_ctx_init(enum ssh_kdf_digest type)
} }
} }
static void ssh_mac_update(ssh_mac_ctx ctx, const void *data, size_t len) static void ssh_mac_ctx_free(ssh_mac_ctx ctx)
{ {
switch (ctx->digest_type) { if (ctx == NULL) {
case SSH_KDF_SHA1: return;
sha1_update(ctx->ctx.sha1_ctx, data, len);
break;
case SSH_KDF_SHA256:
sha256_update(ctx->ctx.sha256_ctx, data, len);
break;
case SSH_KDF_SHA384:
sha384_update(ctx->ctx.sha384_ctx, data, len);
break;
case SSH_KDF_SHA512:
sha512_update(ctx->ctx.sha512_ctx, data, len);
break;
} }
}
static void ssh_mac_final(unsigned char *md, ssh_mac_ctx ctx)
{
switch (ctx->digest_type) { switch (ctx->digest_type) {
case SSH_KDF_SHA1: case SSH_KDF_SHA1:
sha1_final(md, ctx->ctx.sha1_ctx); sha1_ctx_free(ctx->ctx.sha1_ctx);
break; break;
case SSH_KDF_SHA256: case SSH_KDF_SHA256:
sha256_final(md, ctx->ctx.sha256_ctx); sha256_ctx_free(ctx->ctx.sha256_ctx);
break; break;
case SSH_KDF_SHA384: case SSH_KDF_SHA384:
sha384_final(md, ctx->ctx.sha384_ctx); sha384_ctx_free(ctx->ctx.sha384_ctx);
break; break;
case SSH_KDF_SHA512: case SSH_KDF_SHA512:
sha512_final(md, ctx->ctx.sha512_ctx); sha512_ctx_free(ctx->ctx.sha512_ctx);
break; break;
} }
SAFE_FREE(ctx); SAFE_FREE(ctx);
} }
static int ssh_mac_update(ssh_mac_ctx ctx, const void *data, size_t len)
{
switch (ctx->digest_type) {
case SSH_KDF_SHA1:
return sha1_update(ctx->ctx.sha1_ctx, data, len);
case SSH_KDF_SHA256:
return sha256_update(ctx->ctx.sha256_ctx, data, len);
case SSH_KDF_SHA384:
return sha384_update(ctx->ctx.sha384_ctx, data, len);
case SSH_KDF_SHA512:
return sha512_update(ctx->ctx.sha512_ctx, data, len);
}
return SSH_ERROR;
}
static int ssh_mac_final(unsigned char *md, ssh_mac_ctx ctx)
{
int rc = SSH_ERROR;
switch (ctx->digest_type) {
case SSH_KDF_SHA1:
rc = sha1_final(md, ctx->ctx.sha1_ctx);
break;
case SSH_KDF_SHA256:
rc = sha256_final(md, ctx->ctx.sha256_ctx);
break;
case SSH_KDF_SHA384:
rc = sha384_final(md, ctx->ctx.sha384_ctx);
break;
case SSH_KDF_SHA512:
rc = sha512_final(md, ctx->ctx.sha512_ctx);
break;
}
SAFE_FREE(ctx);
return rc;
}
int sshkdf_derive_key(struct ssh_crypto_struct *crypto, int sshkdf_derive_key(struct ssh_crypto_struct *crypto,
unsigned char *key, unsigned char *key,
size_t key_len, size_t key_len,
@@ -126,6 +149,7 @@ int sshkdf_derive_key(struct ssh_crypto_struct *crypto,
unsigned char digest[DIGEST_MAX_LEN]; unsigned char digest[DIGEST_MAX_LEN];
size_t output_len = crypto->digest_len; size_t output_len = crypto->digest_len;
ssh_mac_ctx ctx; ssh_mac_ctx ctx;
int rc;
if (DIGEST_MAX_LEN < crypto->digest_len) { if (DIGEST_MAX_LEN < crypto->digest_len) {
return -1; return -1;
@@ -136,11 +160,30 @@ int sshkdf_derive_key(struct ssh_crypto_struct *crypto,
return -1; return -1;
} }
ssh_mac_update(ctx, key, key_len); rc = ssh_mac_update(ctx, key, key_len);
ssh_mac_update(ctx, crypto->secret_hash, crypto->digest_len); if (rc != SSH_OK) {
ssh_mac_update(ctx, &key_type, 1); ssh_mac_ctx_free(ctx);
ssh_mac_update(ctx, crypto->session_id, crypto->session_id_len); return -1;
ssh_mac_final(digest, ctx); }
rc = ssh_mac_update(ctx, crypto->secret_hash, crypto->digest_len);
if (rc != SSH_OK) {
ssh_mac_ctx_free(ctx);
return -1;
}
rc = ssh_mac_update(ctx, &key_type, 1);
if (rc != SSH_OK) {
ssh_mac_ctx_free(ctx);
return -1;
}
rc = ssh_mac_update(ctx, crypto->session_id, crypto->session_id_len);
if (rc != SSH_OK) {
ssh_mac_ctx_free(ctx);
return -1;
}
rc = ssh_mac_final(digest, ctx);
if (rc != SSH_OK) {
return -1;
}
if (requested_len < output_len) { if (requested_len < output_len) {
output_len = requested_len; output_len = requested_len;
@@ -152,10 +195,25 @@ int sshkdf_derive_key(struct ssh_crypto_struct *crypto,
if (ctx == NULL) { if (ctx == NULL) {
return -1; return -1;
} }
ssh_mac_update(ctx, key, key_len); rc = ssh_mac_update(ctx, key, key_len);
ssh_mac_update(ctx, crypto->secret_hash, crypto->digest_len); if (rc != SSH_OK) {
ssh_mac_update(ctx, output, output_len); ssh_mac_ctx_free(ctx);
ssh_mac_final(digest, ctx); return -1;
}
rc = ssh_mac_update(ctx, crypto->secret_hash, crypto->digest_len);
if (rc != SSH_OK) {
ssh_mac_ctx_free(ctx);
return -1;
}
rc = ssh_mac_update(ctx, output, output_len);
if (rc != SSH_OK) {
ssh_mac_ctx_free(ctx);
return -1;
}
rc = ssh_mac_final(digest, ctx);
if (rc != SSH_OK) {
return -1;
}
if (requested_len < output_len + crypto->digest_len) { if (requested_len < output_len + crypto->digest_len) {
memcpy(output + output_len, digest, requested_len - output_len); memcpy(output + output_len, digest, requested_len - output_len);
} else { } else {

View File

@@ -25,6 +25,7 @@
#include "libssh/crypto.h" #include "libssh/crypto.h"
#include "libssh/wrapper.h" #include "libssh/wrapper.h"
#include <openssl/crypto.h>
#include <openssl/evp.h> #include <openssl/evp.h>
#include <openssl/md5.h> #include <openssl/md5.h>
#include <openssl/sha.h> #include <openssl/sha.h>
@@ -46,28 +47,49 @@ sha1_init(void)
} }
void void
sha1_update(SHACTX c, const void *data, size_t len) sha1_ctx_free(SHACTX c)
{ {
EVP_DigestUpdate(c, data, len);
}
void
sha1_final(unsigned char *md, SHACTX c)
{
unsigned int mdlen = 0;
EVP_DigestFinal(c, md, &mdlen);
EVP_MD_CTX_free(c); EVP_MD_CTX_free(c);
} }
void int
sha1_update(SHACTX c, const void *data, size_t len)
{
int rc = EVP_DigestUpdate(c, data, len);
if (rc != 1) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha1_final(unsigned char *md, SHACTX c)
{
unsigned int mdlen = 0;
int rc = EVP_DigestFinal(c, md, &mdlen);
EVP_MD_CTX_free(c);
if (rc != 1) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha1(const unsigned char *digest, size_t len, unsigned char *hash) sha1(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
SHACTX c = sha1_init(); SHACTX c = sha1_init();
if (c != NULL) { int rc;
sha1_update(c, digest, len);
sha1_final(hash, c); if (c == NULL) {
return SSH_ERROR;
} }
rc = sha1_update(c, digest, len);
if (rc != SSH_OK) {
EVP_MD_CTX_free(c);
return SSH_ERROR;
}
return sha1_final(hash, c);
} }
SHA256CTX SHA256CTX
@@ -87,28 +109,49 @@ sha256_init(void)
} }
void void
sha256_update(SHA256CTX c, const void *data, size_t len) sha256_ctx_free(SHA256CTX c)
{ {
EVP_DigestUpdate(c, data, len);
}
void
sha256_final(unsigned char *md, SHA256CTX c)
{
unsigned int mdlen = 0;
EVP_DigestFinal(c, md, &mdlen);
EVP_MD_CTX_free(c); EVP_MD_CTX_free(c);
} }
void int
sha256_update(SHA256CTX c, const void *data, size_t len)
{
int rc = EVP_DigestUpdate(c, data, len);
if (rc != 1) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha256_final(unsigned char *md, SHA256CTX c)
{
unsigned int mdlen = 0;
int rc = EVP_DigestFinal(c, md, &mdlen);
EVP_MD_CTX_free(c);
if (rc != 1) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha256(const unsigned char *digest, size_t len, unsigned char *hash) sha256(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
SHA256CTX c = sha256_init(); SHA256CTX c = sha256_init();
if (c != NULL) { int rc;
sha256_update(c, digest, len);
sha256_final(hash, c); if (c == NULL) {
return SSH_ERROR;
} }
rc = sha256_update(c, digest, len);
if (rc != SSH_OK) {
EVP_MD_CTX_free(c);
return SSH_ERROR;
}
return sha256_final(hash, c);
} }
SHA384CTX SHA384CTX
@@ -128,28 +171,49 @@ sha384_init(void)
} }
void void
sha384_update(SHA384CTX c, const void *data, size_t len) sha384_ctx_free(SHA384CTX c)
{ {
EVP_DigestUpdate(c, data, len);
}
void
sha384_final(unsigned char *md, SHA384CTX c)
{
unsigned int mdlen = 0;
EVP_DigestFinal(c, md, &mdlen);
EVP_MD_CTX_free(c); EVP_MD_CTX_free(c);
} }
void int
sha384_update(SHA384CTX c, const void *data, size_t len)
{
int rc = EVP_DigestUpdate(c, data, len);
if (rc != 1) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha384_final(unsigned char *md, SHA384CTX c)
{
unsigned int mdlen = 0;
int rc = EVP_DigestFinal(c, md, &mdlen);
EVP_MD_CTX_free(c);
if (rc != 1) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha384(const unsigned char *digest, size_t len, unsigned char *hash) sha384(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
SHA384CTX c = sha384_init(); SHA384CTX c = sha384_init();
if (c != NULL) { int rc;
sha384_update(c, digest, len);
sha384_final(hash, c); if (c == NULL) {
return SSH_ERROR;
} }
rc = sha384_update(c, digest, len);
if (rc != SSH_OK) {
EVP_MD_CTX_free(c);
return SSH_ERROR;
}
return sha384_final(hash, c);
} }
SHA512CTX SHA512CTX
@@ -169,28 +233,49 @@ sha512_init(void)
} }
void void
sha512_update(SHA512CTX c, const void *data, size_t len) sha512_ctx_free(SHA512CTX c)
{ {
EVP_DigestUpdate(c, data, len);
}
void
sha512_final(unsigned char *md, SHA512CTX c)
{
unsigned int mdlen = 0;
EVP_DigestFinal(c, md, &mdlen);
EVP_MD_CTX_free(c); EVP_MD_CTX_free(c);
} }
void int
sha512_update(SHA512CTX c, const void *data, size_t len)
{
int rc = EVP_DigestUpdate(c, data, len);
if (rc != 1) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha512_final(unsigned char *md, SHA512CTX c)
{
unsigned int mdlen = 0;
int rc = EVP_DigestFinal(c, md, &mdlen);
EVP_MD_CTX_free(c);
if (rc != 1) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha512(const unsigned char *digest, size_t len, unsigned char *hash) sha512(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
SHA512CTX c = sha512_init(); SHA512CTX c = sha512_init();
if (c != NULL) { int rc;
sha512_update(c, digest, len);
sha512_final(hash, c); if (c == NULL) {
return SSH_ERROR;
} }
rc = sha512_update(c, digest, len);
if (rc != SSH_OK) {
EVP_MD_CTX_free(c);
return SSH_ERROR;
}
return sha512_final(hash, c);
} }
MD5CTX MD5CTX
@@ -210,16 +295,30 @@ md5_init(void)
} }
void void
md5_update(MD5CTX c, const void *data, size_t len) md5_ctx_free(MD5CTX c)
{ {
EVP_DigestUpdate(c, data, len); EVP_MD_CTX_free(c);
} }
void int
md5_update(MD5CTX c, const void *data, size_t len)
{
int rc = EVP_DigestUpdate(c, data, len);
if (rc != 1) {
return SSH_ERROR;
}
return SSH_OK;
}
int
md5_final(unsigned char *md, MD5CTX c) md5_final(unsigned char *md, MD5CTX c)
{ {
unsigned int mdlen = 0; unsigned int mdlen = 0;
int rc = EVP_DigestFinal(c, md, &mdlen);
EVP_DigestFinal(c, md, &mdlen);
EVP_MD_CTX_free(c); EVP_MD_CTX_free(c);
if (rc != 1) {
return SSH_ERROR;
}
return SSH_OK;
} }

View File

@@ -36,24 +36,40 @@ sha1_init(void)
return ctx; return ctx;
} }
void int
sha1_update(SHACTX c, const void *data, size_t len) sha1_update(SHACTX c, const void *data, size_t len)
{ {
gcry_md_write(c, data, len); gcry_md_write(c, data, len);
return SSH_OK;
} }
void void
sha1_final(unsigned char *md, SHACTX c) sha1_ctx_free(SHACTX c)
{ {
gcry_md_final(c);
memcpy(md, gcry_md_read(c, 0), SHA_DIGEST_LEN);
gcry_md_close(c); gcry_md_close(c);
} }
void int
sha1_final(unsigned char *md, SHACTX c)
{
unsigned char *tmp = NULL;
gcry_md_final(c);
tmp = gcry_md_read(c, 0);
if (tmp == NULL) {
gcry_md_close(c);
return SSH_ERROR;
}
memcpy(md, tmp, SHA_DIGEST_LEN);
gcry_md_close(c);
return SSH_OK;
}
int
sha1(const unsigned char *digest, size_t len, unsigned char *hash) sha1(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
gcry_md_hash_buffer(GCRY_MD_SHA1, hash, digest, len); gcry_md_hash_buffer(GCRY_MD_SHA1, hash, digest, len);
return SSH_OK;
} }
SHA256CTX SHA256CTX
@@ -66,23 +82,39 @@ sha256_init(void)
} }
void void
sha256_update(SHACTX c, const void *data, size_t len) sha256_ctx_free(SHA256CTX c)
{ {
gcry_md_write(c, data, len);
}
void
sha256_final(unsigned char *md, SHACTX c)
{
gcry_md_final(c);
memcpy(md, gcry_md_read(c, 0), SHA256_DIGEST_LEN);
gcry_md_close(c); gcry_md_close(c);
} }
void int
sha256_update(SHACTX c, const void *data, size_t len)
{
gcry_md_write(c, data, len);
return SSH_OK;
}
int
sha256_final(unsigned char *md, SHACTX c)
{
unsigned char *tmp = NULL;
gcry_md_final(c);
tmp = gcry_md_read(c, 0);
if (tmp == NULL) {
gcry_md_close(c);
return SSH_ERROR;
}
memcpy(md, tmp, SHA256_DIGEST_LEN);
gcry_md_close(c);
return SSH_OK;
}
int
sha256(const unsigned char *digest, size_t len, unsigned char *hash) sha256(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
gcry_md_hash_buffer(GCRY_MD_SHA256, hash, digest, len); gcry_md_hash_buffer(GCRY_MD_SHA256, hash, digest, len);
return SSH_OK;
} }
SHA384CTX SHA384CTX
@@ -95,23 +127,39 @@ sha384_init(void)
} }
void void
sha384_update(SHACTX c, const void *data, size_t len) sha384_ctx_free(SHA384CTX c)
{ {
gcry_md_write(c, data, len);
}
void
sha384_final(unsigned char *md, SHACTX c)
{
gcry_md_final(c);
memcpy(md, gcry_md_read(c, 0), SHA384_DIGEST_LEN);
gcry_md_close(c); gcry_md_close(c);
} }
void int
sha384_update(SHACTX c, const void *data, size_t len)
{
gcry_md_write(c, data, len);
return SSH_OK;
}
int
sha384_final(unsigned char *md, SHACTX c)
{
unsigned char *tmp = NULL;
gcry_md_final(c);
tmp = gcry_md_read(c, 0);
if (tmp == NULL) {
gcry_md_close(c);
return SSH_ERROR;
}
memcpy(md, tmp, SHA384_DIGEST_LEN);
gcry_md_close(c);
return SSH_OK;
}
int
sha384(const unsigned char *digest, size_t len, unsigned char *hash) sha384(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
gcry_md_hash_buffer(GCRY_MD_SHA384, hash, digest, len); gcry_md_hash_buffer(GCRY_MD_SHA384, hash, digest, len);
return SSH_OK;
} }
SHA512CTX SHA512CTX
@@ -124,23 +172,39 @@ sha512_init(void)
} }
void void
sha512_update(SHACTX c, const void *data, size_t len) sha512_ctx_free(SHA512CTX c)
{ {
gcry_md_write(c, data, len);
}
void
sha512_final(unsigned char *md, SHACTX c)
{
gcry_md_final(c);
memcpy(md, gcry_md_read(c, 0), SHA512_DIGEST_LEN);
gcry_md_close(c); gcry_md_close(c);
} }
void int
sha512_update(SHACTX c, const void *data, size_t len)
{
gcry_md_write(c, data, len);
return SSH_OK;
}
int
sha512_final(unsigned char *md, SHACTX c)
{
unsigned char *tmp = NULL;
gcry_md_final(c);
tmp = gcry_md_read(c, 0);
if (tmp == NULL) {
gcry_md_close(c);
return SSH_ERROR;
}
memcpy(md, tmp, SHA512_DIGEST_LEN);
gcry_md_close(c);
return SSH_OK;
}
int
sha512(const unsigned char *digest, size_t len, unsigned char *hash) sha512(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
gcry_md_hash_buffer(GCRY_MD_SHA512, hash, digest, len); gcry_md_hash_buffer(GCRY_MD_SHA512, hash, digest, len);
return SSH_OK;
} }
MD5CTX MD5CTX
@@ -153,15 +217,30 @@ md5_init(void)
} }
void void
md5_ctx_free(MD5CTX c)
{
gcry_md_close(c);
}
int
md5_update(MD5CTX c, const void *data, size_t len) md5_update(MD5CTX c, const void *data, size_t len)
{ {
gcry_md_write(c, data, len); gcry_md_write(c, data, len);
return SSH_OK;
} }
void int
md5_final(unsigned char *md, MD5CTX c) md5_final(unsigned char *md, MD5CTX c)
{ {
unsigned char *tmp = NULL;
gcry_md_final(c); gcry_md_final(c);
memcpy(md, gcry_md_read(c, 0), MD5_DIGEST_LEN); tmp = gcry_md_read(c, 0);
if (tmp == NULL) {
gcry_md_close(c); gcry_md_close(c);
return SSH_ERROR;
}
memcpy(md, tmp, MD5_DIGEST_LEN);
gcry_md_close(c);
return SSH_OK;
} }

View File

@@ -64,27 +64,48 @@ sha1_init(void)
} }
void void
sha1_update(SHACTX c, const void *data, size_t len) sha1_ctx_free(SHACTX c)
{ {
mbedtls_md_update(c, data, len);
}
void
sha1_final(unsigned char *md, SHACTX c)
{
mbedtls_md_finish(c, md);
mbedtls_md_free(c); mbedtls_md_free(c);
SAFE_FREE(c); SAFE_FREE(c);
} }
void int
sha1_update(SHACTX c, const void *data, size_t len)
{
int rc = mbedtls_md_update(c, data, len);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha1_final(unsigned char *md, SHACTX c)
{
int rc = mbedtls_md_finish(c, md);
sha1_ctx_free(c);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha1(const unsigned char *digest, size_t len, unsigned char *hash) sha1(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
const mbedtls_md_info_t *md_info = const mbedtls_md_info_t *md_info =
mbedtls_md_info_from_type(MBEDTLS_MD_SHA1); mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
if (md_info != NULL) { int rc;
mbedtls_md(md_info, digest, len, hash);
if (md_info == NULL) {
return SSH_ERROR;
} }
rc = mbedtls_md(md_info, digest, len, hash);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
} }
SHA256CTX SHA256CTX
@@ -122,27 +143,48 @@ sha256_init(void)
} }
void void
sha256_update(SHA256CTX c, const void *data, size_t len) sha256_ctx_free(SHA256CTX c)
{ {
mbedtls_md_update(c, data, len);
}
void
sha256_final(unsigned char *md, SHA256CTX c)
{
mbedtls_md_finish(c, md);
mbedtls_md_free(c); mbedtls_md_free(c);
SAFE_FREE(c); SAFE_FREE(c);
} }
void int
sha256_update(SHA256CTX c, const void *data, size_t len)
{
int rc = mbedtls_md_update(c, data, len);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha256_final(unsigned char *md, SHA256CTX c)
{
int rc = mbedtls_md_finish(c, md);
mbedtls_md_free(c);
SAFE_FREE(c);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha256(const unsigned char *digest, size_t len, unsigned char *hash) sha256(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
int rc;
const mbedtls_md_info_t *md_info = const mbedtls_md_info_t *md_info =
mbedtls_md_info_from_type(MBEDTLS_MD_SHA256); mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
if (md_info != NULL) { if (md_info == NULL) {
mbedtls_md(md_info, digest, len, hash); return SSH_ERROR;
} }
rc = mbedtls_md(md_info, digest, len, hash);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
} }
SHA384CTX SHA384CTX
@@ -180,27 +222,48 @@ sha384_init(void)
} }
void void
sha384_update(SHA384CTX c, const void *data, size_t len) sha384_ctx_free(SHA384CTX c)
{ {
mbedtls_md_update(c, data, len);
}
void
sha384_final(unsigned char *md, SHA384CTX c)
{
mbedtls_md_finish(c, md);
mbedtls_md_free(c); mbedtls_md_free(c);
SAFE_FREE(c); SAFE_FREE(c);
} }
void int
sha384_update(SHA384CTX c, const void *data, size_t len)
{
int rc = mbedtls_md_update(c, data, len);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha384_final(unsigned char *md, SHA384CTX c)
{
int rc = mbedtls_md_finish(c, md);
sha384_ctx_free(c);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha384(const unsigned char *digest, size_t len, unsigned char *hash) sha384(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
const mbedtls_md_info_t *md_info = const mbedtls_md_info_t *md_info =
mbedtls_md_info_from_type(MBEDTLS_MD_SHA384); mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
if (md_info != NULL) { int rc;
mbedtls_md(md_info, digest, len, hash);
if (md_info == NULL) {
return SSH_ERROR;
} }
rc = mbedtls_md(md_info, digest, len, hash);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
} }
SHA512CTX SHA512CTX
@@ -237,27 +300,48 @@ sha512_init(void)
} }
void void
sha512_update(SHA512CTX c, const void *data, size_t len) sha512_ctx_free(SHA512CTX c)
{ {
mbedtls_md_update(c, data, len);
}
void
sha512_final(unsigned char *md, SHA512CTX c)
{
mbedtls_md_finish(c, md);
mbedtls_md_free(c); mbedtls_md_free(c);
SAFE_FREE(c); SAFE_FREE(c);
} }
void int
sha512_update(SHA512CTX c, const void *data, size_t len)
{
int rc = mbedtls_md_update(c, data, len);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha512_final(unsigned char *md, SHA512CTX c)
{
int rc = mbedtls_md_finish(c, md);
sha512_ctx_free(c);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
}
int
sha512(const unsigned char *digest, size_t len, unsigned char *hash) sha512(const unsigned char *digest, size_t len, unsigned char *hash)
{ {
const mbedtls_md_info_t *md_info = const mbedtls_md_info_t *md_info =
mbedtls_md_info_from_type(MBEDTLS_MD_SHA512); mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
if (md_info != NULL) { int rc;
mbedtls_md(md_info, digest, len, hash);
if (md_info == NULL) {
return SSH_ERROR;
} }
rc = mbedtls_md(md_info, digest, len, hash);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
} }
MD5CTX MD5CTX
@@ -294,15 +378,30 @@ md5_init(void)
} }
void void
md5_update(MD5CTX c, const void *data, size_t len) md5_ctx_free(MD5CTX c)
{ {
mbedtls_md_update(c, data, len);
}
void
md5_final(unsigned char *md, MD5CTX c)
{
mbedtls_md_finish(c, md);
mbedtls_md_free(c); mbedtls_md_free(c);
SAFE_FREE(c); SAFE_FREE(c);
} }
int
md5_update(MD5CTX c, const void *data, size_t len)
{
int rc = mbedtls_md_update(c, data, len);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
}
int
md5_final(unsigned char *md, MD5CTX c)
{
int rc = mbedtls_md_finish(c, md);
mbedtls_md_free(c);
SAFE_FREE(c);
if (rc != 0) {
return SSH_ERROR;
}
return SSH_OK;
}

View File

@@ -1047,7 +1047,18 @@ int ssh_get_pubkey_hash(ssh_session session, unsigned char **hash)
*hash = NULL; *hash = NULL;
if (session->current_crypto == NULL || if (session->current_crypto == NULL ||
session->current_crypto->server_pubkey == NULL) { session->current_crypto->server_pubkey == NULL) {
ssh_set_error(session,SSH_FATAL,"No current cryptographic context"); ssh_set_error(session, SSH_FATAL, "No current cryptographic context");
return SSH_ERROR;
}
rc = ssh_get_server_publickey(session, &pubkey);
if (rc != SSH_OK) {
return SSH_ERROR;
}
rc = ssh_pki_export_pubkey_blob(pubkey, &pubkey_blob);
ssh_key_free(pubkey);
if (rc != SSH_OK) {
return SSH_ERROR; return SSH_ERROR;
} }
@@ -1062,24 +1073,20 @@ int ssh_get_pubkey_hash(ssh_session session, unsigned char **hash)
return SSH_ERROR; return SSH_ERROR;
} }
rc = ssh_get_server_publickey(session, &pubkey); rc = md5_update(ctx,
ssh_string_data(pubkey_blob),
ssh_string_len(pubkey_blob));
if (rc != SSH_OK) { if (rc != SSH_OK) {
md5_final(h, ctx); md5_ctx_free(ctx);
SAFE_FREE(h); SAFE_FREE(h);
return SSH_ERROR; return rc;
} }
rc = ssh_pki_export_pubkey_blob(pubkey, &pubkey_blob);
ssh_key_free(pubkey);
if (rc != SSH_OK) {
md5_final(h, ctx);
SAFE_FREE(h);
return SSH_ERROR;
}
md5_update(ctx, ssh_string_data(pubkey_blob), ssh_string_len(pubkey_blob));
SSH_STRING_FREE(pubkey_blob); SSH_STRING_FREE(pubkey_blob);
md5_final(h, ctx); rc = md5_final(h, ctx);
if (rc != SSH_OK) {
SAFE_FREE(h);
return rc;
}
*hash = h; *hash = h;
@@ -1200,8 +1207,17 @@ int ssh_get_publickey_hash(const ssh_key key,
goto out; goto out;
} }
sha1_update(ctx, ssh_string_data(blob), ssh_string_len(blob)); rc = sha1_update(ctx, ssh_string_data(blob), ssh_string_len(blob));
sha1_final(h, ctx); if (rc != SSH_OK) {
free(h);
sha1_ctx_free(ctx);
goto out;
}
rc = sha1_final(h, ctx);
if (rc != SSH_OK) {
free(h);
goto out;
}
*hlen = SHA_DIGEST_LEN; *hlen = SHA_DIGEST_LEN;
} }
@@ -1223,8 +1239,17 @@ int ssh_get_publickey_hash(const ssh_key key,
goto out; goto out;
} }
sha256_update(ctx, ssh_string_data(blob), ssh_string_len(blob)); rc = sha256_update(ctx, ssh_string_data(blob), ssh_string_len(blob));
sha256_final(h, ctx); if (rc != SSH_OK) {
free(h);
sha256_ctx_free(ctx);
goto out;
}
rc = sha256_final(h, ctx);
if (rc != SSH_OK) {
free(h);
goto out;
}
*hlen = SHA256_DIGEST_LEN; *hlen = SHA256_DIGEST_LEN;
} }
@@ -1254,8 +1279,17 @@ int ssh_get_publickey_hash(const ssh_key key,
goto out; goto out;
} }
md5_update(ctx, ssh_string_data(blob), ssh_string_len(blob)); rc = md5_update(ctx, ssh_string_data(blob), ssh_string_len(blob));
md5_final(h, ctx); if (rc != SSH_OK) {
free(h);
md5_ctx_free(ctx);
goto out;
}
rc = md5_final(h, ctx);
if (rc != SSH_OK) {
free(h);
goto out;
}
*hlen = MD5_DIGEST_LEN; *hlen = MD5_DIGEST_LEN;
} }