Blame src/libcrypto.c

Packit 6c0a39
/*
Packit 6c0a39
 * This file is part of the SSH Library
Packit 6c0a39
 *
Packit 6c0a39
 * Copyright (c) 2009 by Aris Adamantiadis
Packit 6c0a39
 *
Packit 6c0a39
 * The SSH Library is free software; you can redistribute it and/or modify
Packit 6c0a39
 * it under the terms of the GNU Lesser General Public License as published by
Packit 6c0a39
 * the Free Software Foundation; either version 2.1 of the License, or (at your
Packit 6c0a39
 * option) any later version.
Packit 6c0a39
 *
Packit 6c0a39
 * The SSH Library is distributed in the hope that it will be useful, but
Packit 6c0a39
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
Packit 6c0a39
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
Packit 6c0a39
 * License for more details.
Packit 6c0a39
 *
Packit 6c0a39
 * You should have received a copy of the GNU Lesser General Public License
Packit 6c0a39
 * along with the SSH Library; see the file COPYING.  If not, write to
Packit 6c0a39
 * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
Packit 6c0a39
 * MA 02111-1307, USA.
Packit 6c0a39
 */
Packit 6c0a39
Packit 6c0a39
#include "config.h"
Packit 6c0a39
Packit 6c0a39
#include <stdlib.h>
Packit 6c0a39
#include <stdio.h>
Packit 6c0a39
#include <string.h>
Packit 6c0a39
#ifdef HAVE_SYS_TIME_H
Packit 6c0a39
#include <sys/time.h>
Packit 6c0a39
#endif
Packit 6c0a39
Packit 6c0a39
#include "libssh/priv.h"
Packit 6c0a39
#include "libssh/session.h"
Packit 6c0a39
#include "libssh/crypto.h"
Packit 6c0a39
#include "libssh/wrapper.h"
Packit 6c0a39
#include "libssh/libcrypto.h"
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_LIBCRYPTO
Packit 6c0a39
Packit 6c0a39
#include <openssl/sha.h>
Packit 6c0a39
#include <openssl/md5.h>
Packit 6c0a39
#include <openssl/dsa.h>
Packit 6c0a39
#include <openssl/rsa.h>
Packit 6c0a39
#include <openssl/hmac.h>
Packit 6c0a39
#include <openssl/opensslv.h>
Packit 6c0a39
#include <openssl/rand.h>
Packit 6c0a39
Packit 6c0a39
#include "libcrypto-compat.h"
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_OPENSSL_AES_H
Packit 6c0a39
#define HAS_AES
Packit 6c0a39
#include <openssl/aes.h>
Packit 6c0a39
#endif
Packit 6c0a39
#ifdef HAVE_OPENSSL_DES_H
Packit 6c0a39
#define HAS_DES
Packit 6c0a39
#include <openssl/des.h>
Packit 6c0a39
#endif
Packit 6c0a39
Packit 6c0a39
#if (defined(HAVE_VALGRIND_VALGRIND_H) && defined(HAVE_OPENSSL_IA32CAP_LOC))
Packit 6c0a39
#include <valgrind/valgrind.h>
Packit 6c0a39
#define CAN_DISABLE_AESNI
Packit 6c0a39
#endif
Packit 6c0a39
Packit 6c0a39
#include "libssh/crypto.h"
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_OPENSSL_EVP_KDF_CTX_NEW_ID
Packit 6c0a39
#include <openssl/kdf.h>
Packit 6c0a39
#endif
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_OPENSSL_CRYPTO_CTR128_ENCRYPT
Packit 6c0a39
#include <openssl/modes.h>
Packit 6c0a39
#endif
Packit 6c0a39
Packit 6c0a39
#include "libssh/crypto.h"
Packit 6c0a39
Packit 6c0a39
static int libcrypto_initialized = 0;
Packit 6c0a39
Packit 6c0a39
void ssh_reseed(void){
Packit 6c0a39
#ifndef _WIN32
Packit 6c0a39
    struct timeval tv;
Packit 6c0a39
    gettimeofday(&tv, NULL);
Packit 6c0a39
    RAND_add(&tv, sizeof(tv), 0.0);
Packit 6c0a39
#endif
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
/**
Packit 6c0a39
 * @brief Get random bytes
Packit 6c0a39
 *
Packit 6c0a39
 * Make sure to always check the return code of this function!
Packit 6c0a39
 *
Packit 6c0a39
 * @param[in]  where    The buffer to fill with random bytes
Packit 6c0a39
 *
Packit 6c0a39
 * @param[in]  len      The size of the buffer to fill.
Packit 6c0a39
 *
Packit 6c0a39
 * @param[in]  strong   Use a strong or private RNG source.
Packit 6c0a39
 *
Packit 6c0a39
 * @return 1 on success, 0 on error.
Packit 6c0a39
 */
Packit 6c0a39
int ssh_get_random(void *where, int len, int strong)
Packit 6c0a39
{
Packit 6c0a39
#ifdef HAVE_OPENSSL_RAND_PRIV_BYTES
Packit 6c0a39
    if (strong) {
Packit 6c0a39
        /* Returns -1 when not supported, 0 on error, 1 on success */
Packit 6c0a39
        return !!RAND_priv_bytes(where, len);
Packit 6c0a39
    }
Packit 6c0a39
#else
Packit 6c0a39
    (void)strong;
Packit 6c0a39
#endif /* HAVE_RAND_PRIV_BYTES */
Packit 6c0a39
Packit 6c0a39
    /* Returns -1 when not supported, 0 on error, 1 on success */
Packit 6c0a39
    return !!RAND_bytes(where, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
SHACTX sha1_init(void)
Packit 6c0a39
{
Packit 6c0a39
    int rc;
Packit 6c0a39
    SHACTX c = EVP_MD_CTX_create();
Packit 6c0a39
    if (c == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
    EVP_MD_CTX_init(c);
Packit 6c0a39
    rc = EVP_DigestInit_ex(c, EVP_sha1(), NULL);
Packit 6c0a39
    if (rc == 0) {
Packit 6c0a39
        EVP_MD_CTX_destroy(c);
Packit 6c0a39
        c = NULL;
Packit 6c0a39
    }
Packit 6c0a39
    return c;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha1_update(SHACTX c, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    EVP_DigestUpdate(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha1_final(unsigned char *md, SHACTX c)
Packit 6c0a39
{
Packit 6c0a39
    unsigned int mdlen = 0;
Packit 6c0a39
Packit 6c0a39
    EVP_DigestFinal(c, md, &mdlen);
Packit 6c0a39
    EVP_MD_CTX_destroy(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha1(const unsigned char *digest, int len, unsigned char *hash)
Packit 6c0a39
{
Packit 6c0a39
    SHACTX c = sha1_init();
Packit 6c0a39
    if (c != NULL) {
Packit 6c0a39
        sha1_update(c, digest, len);
Packit 6c0a39
        sha1_final(hash, c);
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_OPENSSL_ECC
Packit 6c0a39
static const EVP_MD *nid_to_evpmd(int nid)
Packit 6c0a39
{
Packit 6c0a39
    switch (nid) {
Packit 6c0a39
        case NID_X9_62_prime256v1:
Packit 6c0a39
            return EVP_sha256();
Packit 6c0a39
        case NID_secp384r1:
Packit 6c0a39
            return EVP_sha384();
Packit 6c0a39
        case NID_secp521r1:
Packit 6c0a39
            return EVP_sha512();
Packit 6c0a39
        default:
Packit 6c0a39
            return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return NULL;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void evp(int nid, unsigned char *digest, int len, unsigned char *hash, unsigned int *hlen)
Packit 6c0a39
{
Packit 6c0a39
    const EVP_MD *evp_md = nid_to_evpmd(nid);
Packit 6c0a39
    EVP_MD_CTX *md = EVP_MD_CTX_new();
Packit 6c0a39
Packit 6c0a39
    EVP_DigestInit(md, evp_md);
Packit 6c0a39
    EVP_DigestUpdate(md, digest, len);
Packit 6c0a39
    EVP_DigestFinal(md, hash, hlen);
Packit 6c0a39
    EVP_MD_CTX_free(md);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
EVPCTX evp_init(int nid)
Packit 6c0a39
{
Packit 6c0a39
    const EVP_MD *evp_md = nid_to_evpmd(nid);
Packit 6c0a39
Packit 6c0a39
    EVPCTX ctx = EVP_MD_CTX_new();
Packit 6c0a39
    if (ctx == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    EVP_DigestInit(ctx, evp_md);
Packit 6c0a39
Packit 6c0a39
    return ctx;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void evp_update(EVPCTX ctx, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    EVP_DigestUpdate(ctx, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void evp_final(EVPCTX ctx, unsigned char *md, unsigned int *mdlen)
Packit 6c0a39
{
Packit 6c0a39
    EVP_DigestFinal(ctx, md, mdlen);
Packit 6c0a39
    EVP_MD_CTX_free(ctx);
Packit 6c0a39
}
Packit 6c0a39
#endif
Packit 6c0a39
Packit 6c0a39
SHA256CTX sha256_init(void)
Packit 6c0a39
{
Packit 6c0a39
    int rc;
Packit 6c0a39
    SHA256CTX c = EVP_MD_CTX_create();
Packit 6c0a39
    if (c == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
    EVP_MD_CTX_init(c);
Packit 6c0a39
    rc = EVP_DigestInit_ex(c, EVP_sha256(), NULL);
Packit 6c0a39
    if (rc == 0) {
Packit 6c0a39
        EVP_MD_CTX_destroy(c);
Packit 6c0a39
        c = NULL;
Packit 6c0a39
    }
Packit 6c0a39
    return c;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha256_update(SHA256CTX c, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    EVP_DigestUpdate(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha256_final(unsigned char *md, SHA256CTX c)
Packit 6c0a39
{
Packit 6c0a39
    unsigned int mdlen = 0;
Packit 6c0a39
Packit 6c0a39
    EVP_DigestFinal(c, md, &mdlen);
Packit 6c0a39
    EVP_MD_CTX_destroy(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha256(const unsigned char *digest, int len, unsigned char *hash)
Packit 6c0a39
{
Packit 6c0a39
    SHA256CTX c = sha256_init();
Packit 6c0a39
    if (c != NULL) {
Packit 6c0a39
        sha256_update(c, digest, len);
Packit 6c0a39
        sha256_final(hash, c);
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
SHA384CTX sha384_init(void)
Packit 6c0a39
{
Packit 6c0a39
    int rc;
Packit 6c0a39
    SHA384CTX c = EVP_MD_CTX_create();
Packit 6c0a39
    if (c == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
    EVP_MD_CTX_init(c);
Packit 6c0a39
    rc = EVP_DigestInit_ex(c, EVP_sha384(), NULL);
Packit 6c0a39
    if (rc == 0) {
Packit 6c0a39
        EVP_MD_CTX_destroy(c);
Packit 6c0a39
        c = NULL;
Packit 6c0a39
    }
Packit 6c0a39
    return c;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha384_update(SHA384CTX c, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    EVP_DigestUpdate(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha384_final(unsigned char *md, SHA384CTX c)
Packit 6c0a39
{
Packit 6c0a39
    unsigned int mdlen = 0;
Packit 6c0a39
Packit 6c0a39
    EVP_DigestFinal(c, md, &mdlen);
Packit 6c0a39
    EVP_MD_CTX_destroy(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha384(const unsigned char *digest, int len, unsigned char *hash)
Packit 6c0a39
{
Packit 6c0a39
    SHA384CTX c = sha384_init();
Packit 6c0a39
    if (c != NULL) {
Packit 6c0a39
        sha384_update(c, digest, len);
Packit 6c0a39
        sha384_final(hash, c);
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
SHA512CTX sha512_init(void)
Packit 6c0a39
{
Packit 6c0a39
    int rc = 0;
Packit 6c0a39
    SHA512CTX c = EVP_MD_CTX_create();
Packit 6c0a39
    if (c == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
    EVP_MD_CTX_init(c);
Packit 6c0a39
    rc = EVP_DigestInit_ex(c, EVP_sha512(), NULL);
Packit 6c0a39
    if (rc == 0) {
Packit 6c0a39
        EVP_MD_CTX_destroy(c);
Packit 6c0a39
        c = NULL;
Packit 6c0a39
    }
Packit 6c0a39
    return c;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha512_update(SHA512CTX c, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    EVP_DigestUpdate(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha512_final(unsigned char *md, SHA512CTX c)
Packit 6c0a39
{
Packit 6c0a39
    unsigned int mdlen = 0;
Packit 6c0a39
Packit 6c0a39
    EVP_DigestFinal(c, md, &mdlen);
Packit 6c0a39
    EVP_MD_CTX_destroy(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha512(const unsigned char *digest, int len, unsigned char *hash)
Packit 6c0a39
{
Packit 6c0a39
    SHA512CTX c = sha512_init();
Packit 6c0a39
    if (c != NULL) {
Packit 6c0a39
        sha512_update(c, digest, len);
Packit 6c0a39
        sha512_final(hash, c);
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
MD5CTX md5_init(void)
Packit 6c0a39
{
Packit 6c0a39
    int rc;
Packit 6c0a39
    MD5CTX c = EVP_MD_CTX_create();
Packit 6c0a39
    if (c == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
    EVP_MD_CTX_init(c);
Packit 6c0a39
    rc = EVP_DigestInit_ex(c, EVP_md5(), NULL);
Packit 6c0a39
    if(rc == 0) {
Packit 6c0a39
        EVP_MD_CTX_destroy(c);
Packit 6c0a39
        c = NULL;
Packit 6c0a39
    }
Packit 6c0a39
    return c;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void md5_update(MD5CTX c, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    EVP_DigestUpdate(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void md5_final(unsigned char *md, MD5CTX c)
Packit 6c0a39
{
Packit 6c0a39
    unsigned int mdlen = 0;
Packit 6c0a39
Packit 6c0a39
    EVP_DigestFinal(c, md, &mdlen);
Packit 6c0a39
    EVP_MD_CTX_destroy(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_OPENSSL_EVP_KDF_CTX_NEW_ID
Packit 6c0a39
static const EVP_MD *sshkdf_digest_to_md(enum ssh_kdf_digest digest_type)
Packit 6c0a39
{
Packit 6c0a39
    switch (digest_type) {
Packit 6c0a39
    case SSH_KDF_SHA1:
Packit 6c0a39
        return EVP_sha1();
Packit 6c0a39
    case SSH_KDF_SHA256:
Packit 6c0a39
        return EVP_sha256();
Packit 6c0a39
    case SSH_KDF_SHA384:
Packit 6c0a39
        return EVP_sha384();
Packit 6c0a39
    case SSH_KDF_SHA512:
Packit 6c0a39
        return EVP_sha512();
Packit 6c0a39
    }
Packit 6c0a39
    return NULL;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
int ssh_kdf(struct ssh_crypto_struct *crypto,
Packit 6c0a39
            unsigned char *key, size_t key_len,
Packit 6c0a39
            int key_type, unsigned char *output,
Packit 6c0a39
            size_t requested_len)
Packit 6c0a39
{
Packit 6c0a39
    EVP_KDF_CTX *ctx = EVP_KDF_CTX_new_id(EVP_KDF_SSHKDF);
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    if (ctx == NULL) {
Packit 6c0a39
        return -1;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = EVP_KDF_ctrl(ctx, EVP_KDF_CTRL_SET_MD,
Packit 6c0a39
                      sshkdf_digest_to_md(crypto->digest_type));
Packit 6c0a39
    if (rc != 1) {
Packit 6c0a39
        goto out;
Packit 6c0a39
    }
Packit 6c0a39
    rc = EVP_KDF_ctrl(ctx, EVP_KDF_CTRL_SET_KEY, key, key_len);
Packit 6c0a39
    if (rc != 1) {
Packit 6c0a39
        goto out;
Packit 6c0a39
    }
Packit 6c0a39
    rc = EVP_KDF_ctrl(ctx, EVP_KDF_CTRL_SET_SSHKDF_XCGHASH,
Packit 6c0a39
                      crypto->secret_hash, crypto->digest_len);
Packit 6c0a39
    if (rc != 1) {
Packit 6c0a39
        goto out;
Packit 6c0a39
    }
Packit 6c0a39
    rc = EVP_KDF_ctrl(ctx, EVP_KDF_CTRL_SET_SSHKDF_TYPE, key_type);
Packit 6c0a39
    if (rc != 1) {
Packit 6c0a39
        goto out;
Packit 6c0a39
    }
Packit 6c0a39
    rc = EVP_KDF_ctrl(ctx, EVP_KDF_CTRL_SET_SSHKDF_SESSION_ID,
Packit 6c0a39
                      crypto->session_id, crypto->digest_len);
Packit 6c0a39
    if (rc != 1) {
Packit 6c0a39
        goto out;
Packit 6c0a39
    }
Packit 6c0a39
    rc = EVP_KDF_derive(ctx, output, requested_len);
Packit 6c0a39
    if (rc != 1) {
Packit 6c0a39
        goto out;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
out:
Packit 6c0a39
    EVP_KDF_CTX_free(ctx);
Packit 6c0a39
    if (rc < 0) {
Packit 6c0a39
        return rc;
Packit 6c0a39
    }
Packit 6c0a39
    return 0;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#else
Packit 6c0a39
int ssh_kdf(struct ssh_crypto_struct *crypto,
Packit 6c0a39
            unsigned char *key, size_t key_len,
Packit 6c0a39
            int key_type, unsigned char *output,
Packit 6c0a39
            size_t requested_len)
Packit 6c0a39
{
Packit 6c0a39
    return sshkdf_derive_key(crypto, key, key_len,
Packit 6c0a39
                             key_type, output, requested_len);
Packit 6c0a39
}
Packit 6c0a39
#endif
Packit 6c0a39
Packit 6c0a39
HMACCTX hmac_init(const void *key, int len, enum ssh_hmac_e type) {
Packit 6c0a39
  HMACCTX ctx = NULL;
Packit 6c0a39
Packit 6c0a39
  ctx = HMAC_CTX_new();
Packit 6c0a39
  if (ctx == NULL) {
Packit 6c0a39
    return NULL;
Packit 6c0a39
  }
Packit 6c0a39
Packit 6c0a39
Packit 6c0a39
  switch(type) {
Packit 6c0a39
    case SSH_HMAC_SHA1:
Packit 6c0a39
      HMAC_Init_ex(ctx, key, len, EVP_sha1(), NULL);
Packit 6c0a39
      break;
Packit 6c0a39
    case SSH_HMAC_SHA256:
Packit 6c0a39
      HMAC_Init_ex(ctx, key, len, EVP_sha256(), NULL);
Packit 6c0a39
      break;
Packit 6c0a39
    case SSH_HMAC_SHA512:
Packit 6c0a39
      HMAC_Init_ex(ctx, key, len, EVP_sha512(), NULL);
Packit 6c0a39
      break;
Packit 6c0a39
    case SSH_HMAC_MD5:
Packit 6c0a39
      HMAC_Init_ex(ctx, key, len, EVP_md5(), NULL);
Packit 6c0a39
      break;
Packit 6c0a39
    default:
Packit 6c0a39
      HMAC_CTX_free(ctx);
Packit 6c0a39
      ctx = NULL;
Packit 6c0a39
  }
Packit 6c0a39
Packit 6c0a39
  return ctx;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void hmac_update(HMACCTX ctx, const void *data, unsigned long len) {
Packit 6c0a39
  HMAC_Update(ctx, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void hmac_final(HMACCTX ctx, unsigned char *hashmacbuf, unsigned int *len) {
Packit 6c0a39
  HMAC_Final(ctx,hashmacbuf,len);
Packit 6c0a39
Packit 6c0a39
#if OPENSSL_VERSION_NUMBER > 0x10100000L
Packit 6c0a39
  HMAC_CTX_free(ctx);
Packit 6c0a39
  ctx = NULL;
Packit 6c0a39
#else
Packit 6c0a39
  HMAC_cleanup(ctx);
Packit 6c0a39
  SAFE_FREE(ctx);
Packit 6c0a39
  ctx = NULL;
Packit 6c0a39
#endif
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void evp_cipher_init(struct ssh_cipher_struct *cipher) {
Packit 6c0a39
    if (cipher->ctx == NULL) {
Packit 6c0a39
        cipher->ctx = EVP_CIPHER_CTX_new();
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    switch(cipher->ciphertype){
Packit 6c0a39
    case SSH_AES128_CBC:
Packit 6c0a39
        cipher->cipher = EVP_aes_128_cbc();
Packit 6c0a39
        break;
Packit 6c0a39
    case SSH_AES192_CBC:
Packit 6c0a39
        cipher->cipher = EVP_aes_192_cbc();
Packit 6c0a39
        break;
Packit 6c0a39
    case SSH_AES256_CBC:
Packit 6c0a39
        cipher->cipher = EVP_aes_256_cbc();
Packit 6c0a39
        break;
Packit 6c0a39
#ifdef HAVE_OPENSSL_EVP_AES_CTR
Packit 6c0a39
    case SSH_AES128_CTR:
Packit 6c0a39
        cipher->cipher = EVP_aes_128_ctr();
Packit 6c0a39
        break;
Packit 6c0a39
    case SSH_AES192_CTR:
Packit 6c0a39
        cipher->cipher = EVP_aes_192_ctr();
Packit 6c0a39
        break;
Packit 6c0a39
    case SSH_AES256_CTR:
Packit 6c0a39
        cipher->cipher = EVP_aes_256_ctr();
Packit 6c0a39
        break;
Packit 6c0a39
#else
Packit 6c0a39
    case SSH_AES128_CTR:
Packit 6c0a39
    case SSH_AES192_CTR:
Packit 6c0a39
    case SSH_AES256_CTR:
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "This cipher is not available in evp_cipher_init");
Packit 6c0a39
        break;
Packit 6c0a39
#endif
Packit 6c0a39
#ifdef HAVE_OPENSSL_EVP_AES_GCM
Packit 6c0a39
    case SSH_AEAD_AES128_GCM:
Packit 6c0a39
        cipher->cipher = EVP_aes_128_gcm();
Packit 6c0a39
        break;
Packit 6c0a39
    case SSH_AEAD_AES256_GCM:
Packit 6c0a39
        cipher->cipher = EVP_aes_256_gcm();
Packit 6c0a39
        break;
Packit 6c0a39
#else
Packit 6c0a39
    case SSH_AEAD_AES128_GCM:
Packit 6c0a39
    case SSH_AEAD_AES256_GCM:
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "This cipher is not available in evp_cipher_init");
Packit 6c0a39
        break;
Packit 6c0a39
#endif /* HAVE_OPENSSL_EVP_AES_GCM */
Packit 6c0a39
    case SSH_3DES_CBC:
Packit 6c0a39
        cipher->cipher = EVP_des_ede3_cbc();
Packit 6c0a39
        break;
Packit 6c0a39
#ifdef WITH_BLOWFISH_CIPHER
Packit 6c0a39
    case SSH_BLOWFISH_CBC:
Packit 6c0a39
        cipher->cipher = EVP_bf_cbc();
Packit 6c0a39
        break;
Packit 6c0a39
        /* ciphers not using EVP */
Packit 6c0a39
#endif
Packit 6c0a39
    case SSH_AEAD_CHACHA20_POLY1305:
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "The ChaCha cipher cannot be handled here");
Packit 6c0a39
        break;
Packit 6c0a39
    case SSH_NO_CIPHER:
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "No valid ciphertype found");
Packit 6c0a39
        break;
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static int evp_cipher_set_encrypt_key(struct ssh_cipher_struct *cipher,
Packit 6c0a39
            void *key, void *IV)
Packit 6c0a39
{
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    evp_cipher_init(cipher);
Packit 6c0a39
    EVP_CIPHER_CTX_init(cipher->ctx);
Packit 6c0a39
Packit 6c0a39
    rc = EVP_EncryptInit_ex(cipher->ctx, cipher->cipher, NULL, key, IV);
Packit 6c0a39
    if (rc != 1){
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_EncryptInit_ex failed");
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_OPENSSL_EVP_AES_GCM
Packit 6c0a39
    /* For AES-GCM we need to set IV in specific way */
Packit 6c0a39
    if (cipher->ciphertype == SSH_AEAD_AES128_GCM ||
Packit 6c0a39
        cipher->ciphertype == SSH_AEAD_AES256_GCM) {
Packit 6c0a39
        rc = EVP_CIPHER_CTX_ctrl(cipher->ctx,
Packit 6c0a39
                                 EVP_CTRL_GCM_SET_IV_FIXED,
Packit 6c0a39
                                 -1,
Packit 6c0a39
                                 (uint8_t *)IV);
Packit 6c0a39
        if (rc != 1) {
Packit 6c0a39
            SSH_LOG(SSH_LOG_WARNING, "EVP_CTRL_GCM_SET_IV_FIXED failed");
Packit 6c0a39
            return SSH_ERROR;
Packit 6c0a39
        }
Packit 6c0a39
    }
Packit 6c0a39
#endif /* HAVE_OPENSSL_EVP_AES_GCM */
Packit 6c0a39
Packit 6c0a39
    EVP_CIPHER_CTX_set_padding(cipher->ctx, 0);
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static int evp_cipher_set_decrypt_key(struct ssh_cipher_struct *cipher,
Packit 6c0a39
            void *key, void *IV) {
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    evp_cipher_init(cipher);
Packit 6c0a39
    EVP_CIPHER_CTX_init(cipher->ctx);
Packit 6c0a39
Packit 6c0a39
    rc = EVP_DecryptInit_ex(cipher->ctx, cipher->cipher, NULL, key, IV);
Packit 6c0a39
    if (rc != 1){
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_DecryptInit_ex failed");
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_OPENSSL_EVP_AES_GCM
Packit 6c0a39
    /* For AES-GCM we need to set IV in specific way */
Packit 6c0a39
    if (cipher->ciphertype == SSH_AEAD_AES128_GCM ||
Packit 6c0a39
        cipher->ciphertype == SSH_AEAD_AES256_GCM) {
Packit 6c0a39
        rc = EVP_CIPHER_CTX_ctrl(cipher->ctx,
Packit 6c0a39
                                 EVP_CTRL_GCM_SET_IV_FIXED,
Packit 6c0a39
                                 -1,
Packit 6c0a39
                                 (uint8_t *)IV);
Packit 6c0a39
        if (rc != 1) {
Packit 6c0a39
            SSH_LOG(SSH_LOG_WARNING, "EVP_CTRL_GCM_SET_IV_FIXED failed");
Packit 6c0a39
            return SSH_ERROR;
Packit 6c0a39
        }
Packit 6c0a39
    }
Packit 6c0a39
#endif /* HAVE_OPENSSL_EVP_AES_GCM */
Packit 6c0a39
Packit 6c0a39
    EVP_CIPHER_CTX_set_padding(cipher->ctx, 0);
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
/* EVP wrapper function for encrypt/decrypt */
Packit 6c0a39
static void evp_cipher_encrypt(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                               void *in,
Packit 6c0a39
                               void *out,
Packit 6c0a39
                               size_t len)
Packit 6c0a39
{
Packit 6c0a39
    int outlen = 0;
Packit 6c0a39
    int rc = 0;
Packit 6c0a39
Packit 6c0a39
    rc = EVP_EncryptUpdate(cipher->ctx,
Packit 6c0a39
                           (unsigned char *)out,
Packit 6c0a39
                           &outlen,
Packit 6c0a39
                           (unsigned char *)in,
Packit 6c0a39
                           (int)len);
Packit 6c0a39
    if (rc != 1){
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_EncryptUpdate failed");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
    if (outlen != (int)len){
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING,
Packit 6c0a39
                "EVP_EncryptUpdate: output size %d for %zu in",
Packit 6c0a39
                outlen,
Packit 6c0a39
                len);
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void evp_cipher_decrypt(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                               void *in,
Packit 6c0a39
                               void *out,
Packit 6c0a39
                               size_t len)
Packit 6c0a39
{
Packit 6c0a39
    int outlen = 0;
Packit 6c0a39
    int rc = 0;
Packit 6c0a39
Packit 6c0a39
    rc = EVP_DecryptUpdate(cipher->ctx,
Packit 6c0a39
                           (unsigned char *)out,
Packit 6c0a39
                           &outlen,
Packit 6c0a39
                           (unsigned char *)in,
Packit 6c0a39
                           (int)len);
Packit 6c0a39
    if (rc != 1){
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_DecryptUpdate failed");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
    if (outlen != (int)len){
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING,
Packit 6c0a39
                "EVP_DecryptUpdate: output size %d for %zu in",
Packit 6c0a39
                outlen,
Packit 6c0a39
                len);
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void evp_cipher_cleanup(struct ssh_cipher_struct *cipher) {
Packit 6c0a39
    if (cipher->ctx != NULL) {
Packit 6c0a39
        EVP_CIPHER_CTX_cleanup(cipher->ctx);
Packit 6c0a39
        EVP_CIPHER_CTX_free(cipher->ctx);
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#ifndef HAVE_OPENSSL_EVP_AES_CTR
Packit 6c0a39
/* Some OS (osx, OpenIndiana, ...) have no support for CTR ciphers in EVP_aes */
Packit 6c0a39
Packit 6c0a39
struct ssh_aes_key_schedule {
Packit 6c0a39
    AES_KEY key;
Packit 6c0a39
    uint8_t IV[AES_BLOCK_SIZE];
Packit 6c0a39
};
Packit 6c0a39
Packit 6c0a39
static int aes_ctr_set_key(struct ssh_cipher_struct *cipher, void *key,
Packit 6c0a39
    void *IV) {
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    if (cipher->aes_key == NULL) {
Packit 6c0a39
        cipher->aes_key = malloc(sizeof (struct ssh_aes_key_schedule));
Packit 6c0a39
    }
Packit 6c0a39
    if (cipher->aes_key == NULL) {
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
    ZERO_STRUCTP(cipher->aes_key);
Packit 6c0a39
    /* CTR doesn't need a decryption key */
Packit 6c0a39
    rc = AES_set_encrypt_key(key, cipher->keysize, &cipher->aes_key->key);
Packit 6c0a39
    if (rc < 0) {
Packit 6c0a39
        SAFE_FREE(cipher->aes_key);
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
    memcpy(cipher->aes_key->IV, IV, AES_BLOCK_SIZE);
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
}
Packit 6c0a39
Packit Service fcc0d2
static void
Packit Service fcc0d2
aes_ctr_encrypt(struct ssh_cipher_struct *cipher,
Packit Service fcc0d2
                void *in,
Packit Service fcc0d2
                void *out,
Packit Service fcc0d2
                size_t len)
Packit Service fcc0d2
{
Packit 6c0a39
  unsigned char tmp_buffer[AES_BLOCK_SIZE];
Packit 6c0a39
  unsigned int num=0;
Packit 6c0a39
  /* Some things are special with ctr128 :
Packit 6c0a39
   * In this case, tmp_buffer is not being used, because it is used to store temporary data
Packit 6c0a39
   * when an encryption is made on lengths that are not multiple of blocksize.
Packit 6c0a39
   * Same for num, which is being used to store the current offset in blocksize in CTR
Packit 6c0a39
   * function.
Packit 6c0a39
   */
Packit 6c0a39
#ifdef HAVE_OPENSSL_CRYPTO_CTR128_ENCRYPT
Packit 6c0a39
  CRYPTO_ctr128_encrypt(in, out, len, &cipher->aes_key->key, cipher->aes_key->IV, tmp_buffer, &num, (block128_f)AES_encrypt);
Packit 6c0a39
#else
Packit 6c0a39
  AES_ctr128_encrypt(in, out, len, &cipher->aes_key->key, cipher->aes_key->IV, tmp_buffer, &num);
Packit 6c0a39
#endif /* HAVE_OPENSSL_CRYPTO_CTR128_ENCRYPT */
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void aes_ctr_cleanup(struct ssh_cipher_struct *cipher){
Packit Service fcc0d2
    if (cipher != NULL) {
Packit Service fcc0d2
        if (cipher->aes_key != NULL) {
Packit Service fcc0d2
            explicit_bzero(cipher->aes_key, sizeof(*cipher->aes_key));
Packit Service fcc0d2
        }
Packit Service fcc0d2
        SAFE_FREE(cipher->aes_key);
Packit Service fcc0d2
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#endif /* HAVE_OPENSSL_EVP_AES_CTR */
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_OPENSSL_EVP_AES_GCM
Packit 6c0a39
static int
Packit 6c0a39
evp_cipher_aead_get_length(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                           void *in,
Packit 6c0a39
                           uint8_t *out,
Packit 6c0a39
                           size_t len,
Packit 6c0a39
                           uint64_t seq)
Packit 6c0a39
{
Packit 6c0a39
    (void)cipher;
Packit 6c0a39
    (void)seq;
Packit 6c0a39
Packit 6c0a39
    /* The length is not encrypted: Copy it to the result buffer */
Packit 6c0a39
    memcpy(out, in, len);
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void
Packit 6c0a39
evp_cipher_aead_encrypt(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                        void *in,
Packit 6c0a39
                        void *out,
Packit 6c0a39
                        size_t len,
Packit 6c0a39
                        uint8_t *tag,
Packit 6c0a39
                        uint64_t seq)
Packit 6c0a39
{
Packit 6c0a39
    size_t authlen, aadlen;
Packit 6c0a39
    uint8_t lastiv[1];
Packit 6c0a39
    int tmplen = 0;
Packit 6c0a39
    size_t outlen;
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    (void) seq;
Packit 6c0a39
Packit 6c0a39
    aadlen = cipher->lenfield_blocksize;
Packit 6c0a39
    authlen = cipher->tag_size;
Packit 6c0a39
Packit 6c0a39
    /* increment IV */
Packit 6c0a39
    rc = EVP_CIPHER_CTX_ctrl(cipher->ctx,
Packit 6c0a39
                             EVP_CTRL_GCM_IV_GEN,
Packit 6c0a39
                             1,
Packit 6c0a39
                             lastiv);
Packit 6c0a39
    if (rc == 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_CTRL_GCM_IV_GEN failed");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    /* Pass over the authenticated data (not encrypted) */
Packit 6c0a39
    rc = EVP_EncryptUpdate(cipher->ctx,
Packit 6c0a39
                           NULL,
Packit 6c0a39
                           &tmplen,
Packit 6c0a39
                           (unsigned char *)in,
Packit 6c0a39
                           (int)aadlen);
Packit 6c0a39
    outlen = tmplen;
Packit 6c0a39
    if (rc == 0 || outlen != aadlen) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "Failed to pass authenticated data");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
    memcpy(out, in, aadlen);
Packit 6c0a39
Packit 6c0a39
    /* Encrypt the rest of the data */
Packit 6c0a39
    rc = EVP_EncryptUpdate(cipher->ctx,
Packit 6c0a39
                           (unsigned char *)out + aadlen,
Packit 6c0a39
                           &tmplen,
Packit 6c0a39
                           (unsigned char *)in + aadlen,
Packit 6c0a39
                           (int)len - aadlen);
Packit 6c0a39
    outlen = tmplen;
Packit 6c0a39
    if (rc != 1 || outlen != (int)len - aadlen) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_EncryptUpdate failed");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    /* compute tag */
Packit 6c0a39
    rc = EVP_EncryptFinal(cipher->ctx,
Packit 6c0a39
                          NULL,
Packit 6c0a39
                          &tmplen);
Packit 6c0a39
    if (rc < 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_EncryptFinal failed: Failed to create a tag");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = EVP_CIPHER_CTX_ctrl(cipher->ctx,
Packit 6c0a39
                             EVP_CTRL_GCM_GET_TAG,
Packit 6c0a39
                             authlen,
Packit 6c0a39
                             (unsigned char *)tag);
Packit 6c0a39
    if (rc != 1) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_CTRL_GCM_GET_TAG failed");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static int
Packit 6c0a39
evp_cipher_aead_decrypt(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                        void *complete_packet,
Packit 6c0a39
                        uint8_t *out,
Packit 6c0a39
                        size_t encrypted_size,
Packit 6c0a39
                        uint64_t seq)
Packit 6c0a39
{
Packit 6c0a39
    size_t authlen, aadlen;
Packit 6c0a39
    uint8_t lastiv[1];
Packit 6c0a39
    int outlen = 0;
Packit 6c0a39
    int rc = 0;
Packit 6c0a39
Packit 6c0a39
    (void)seq;
Packit 6c0a39
Packit 6c0a39
    aadlen = cipher->lenfield_blocksize;
Packit 6c0a39
    authlen = cipher->tag_size;
Packit 6c0a39
Packit 6c0a39
    /* increment IV */
Packit 6c0a39
    rc = EVP_CIPHER_CTX_ctrl(cipher->ctx,
Packit 6c0a39
                             EVP_CTRL_GCM_IV_GEN,
Packit 6c0a39
                             1,
Packit 6c0a39
                             lastiv);
Packit 6c0a39
    if (rc == 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_CTRL_GCM_IV_GEN failed");
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    /* set tag for authentication */
Packit 6c0a39
    rc = EVP_CIPHER_CTX_ctrl(cipher->ctx,
Packit 6c0a39
                             EVP_CTRL_GCM_SET_TAG,
Packit 6c0a39
                             authlen,
Packit 6c0a39
                             (unsigned char *)complete_packet + aadlen + encrypted_size);
Packit 6c0a39
    if (rc == 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_CTRL_GCM_SET_TAG failed");
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    /* Pass over the authenticated data (not encrypted) */
Packit 6c0a39
    rc = EVP_DecryptUpdate(cipher->ctx,
Packit 6c0a39
                           NULL,
Packit 6c0a39
                           &outlen,
Packit 6c0a39
                           (unsigned char *)complete_packet,
Packit 6c0a39
                           (int)aadlen);
Packit 6c0a39
    if (rc == 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "Failed to pass authenticated data");
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
    /* Do not copy the length to the target buffer, because it is already processed */
Packit 6c0a39
    //memcpy(out, complete_packet, aadlen);
Packit 6c0a39
Packit 6c0a39
    /* Decrypt the rest of the data */
Packit 6c0a39
    rc = EVP_DecryptUpdate(cipher->ctx,
Packit 6c0a39
                           (unsigned char *)out,
Packit 6c0a39
                           &outlen,
Packit 6c0a39
                           (unsigned char *)complete_packet + aadlen,
Packit 6c0a39
                           encrypted_size /* already substracted aadlen*/);
Packit 6c0a39
    if (rc != 1) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_DecryptUpdate failed");
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    if (outlen != (int)encrypted_size) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING,
Packit 6c0a39
                "EVP_DecryptUpdate: output size %d for %zd in",
Packit 6c0a39
                outlen,
Packit 6c0a39
                encrypted_size);
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    /* verify tag */
Packit 6c0a39
    rc = EVP_DecryptFinal(cipher->ctx,
Packit 6c0a39
                          NULL,
Packit 6c0a39
                          &outlen);
Packit 6c0a39
    if (rc < 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "EVP_DecryptFinal failed: Failed authentication");
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#endif /* HAVE_OPENSSL_EVP_AES_GCM */
Packit 6c0a39
Packit 6c0a39
/*
Packit 6c0a39
 * The table of supported ciphers
Packit 6c0a39
 */
Packit 6c0a39
static struct ssh_cipher_struct ssh_ciphertab[] = {
Packit 6c0a39
#ifdef WITH_BLOWFISH_CIPHER
Packit 6c0a39
  {
Packit 6c0a39
    .name = "blowfish-cbc",
Packit 6c0a39
    .blocksize = 8,
Packit 6c0a39
    .ciphertype = SSH_BLOWFISH_CBC,
Packit 6c0a39
    .keysize = 128,
Packit 6c0a39
    .set_encrypt_key = evp_cipher_set_encrypt_key,
Packit 6c0a39
    .set_decrypt_key = evp_cipher_set_decrypt_key,
Packit 6c0a39
    .encrypt = evp_cipher_encrypt,
Packit 6c0a39
    .decrypt = evp_cipher_decrypt,
Packit 6c0a39
    .cleanup = evp_cipher_cleanup
Packit 6c0a39
  },
Packit 6c0a39
#endif
Packit 6c0a39
#ifdef HAS_AES
Packit 6c0a39
#ifndef BROKEN_AES_CTR
Packit 6c0a39
/* OpenSSL until 0.9.7c has a broken AES_ctr128_encrypt implementation which
Packit 6c0a39
 * increments the counter from 2^64 instead of 1. It's better not to use it
Packit 6c0a39
 */
Packit 6c0a39
#ifdef HAVE_OPENSSL_EVP_AES_CTR
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes128-ctr",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .ciphertype = SSH_AES128_CTR,
Packit 6c0a39
    .keysize = 128,
Packit 6c0a39
    .set_encrypt_key = evp_cipher_set_encrypt_key,
Packit 6c0a39
    .set_decrypt_key = evp_cipher_set_decrypt_key,
Packit 6c0a39
    .encrypt = evp_cipher_encrypt,
Packit 6c0a39
    .decrypt = evp_cipher_decrypt,
Packit 6c0a39
    .cleanup = evp_cipher_cleanup
Packit 6c0a39
  },
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes192-ctr",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .ciphertype = SSH_AES192_CTR,
Packit 6c0a39
    .keysize = 192,
Packit 6c0a39
    .set_encrypt_key = evp_cipher_set_encrypt_key,
Packit 6c0a39
    .set_decrypt_key = evp_cipher_set_decrypt_key,
Packit 6c0a39
    .encrypt = evp_cipher_encrypt,
Packit 6c0a39
    .decrypt = evp_cipher_decrypt,
Packit 6c0a39
    .cleanup = evp_cipher_cleanup
Packit 6c0a39
  },
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes256-ctr",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .ciphertype = SSH_AES256_CTR,
Packit 6c0a39
    .keysize = 256,
Packit 6c0a39
    .set_encrypt_key = evp_cipher_set_encrypt_key,
Packit 6c0a39
    .set_decrypt_key = evp_cipher_set_decrypt_key,
Packit 6c0a39
    .encrypt = evp_cipher_encrypt,
Packit 6c0a39
    .decrypt = evp_cipher_decrypt,
Packit 6c0a39
    .cleanup = evp_cipher_cleanup
Packit 6c0a39
  },
Packit 6c0a39
#else /* HAVE_OPENSSL_EVP_AES_CTR */
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes128-ctr",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .ciphertype = SSH_AES128_CTR,
Packit 6c0a39
    .keysize = 128,
Packit 6c0a39
    .set_encrypt_key = aes_ctr_set_key,
Packit 6c0a39
    .set_decrypt_key = aes_ctr_set_key,
Packit 6c0a39
    .encrypt = aes_ctr_encrypt,
Packit 6c0a39
    .decrypt = aes_ctr_encrypt,
Packit 6c0a39
    .cleanup = aes_ctr_cleanup
Packit 6c0a39
  },
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes192-ctr",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .ciphertype = SSH_AES192_CTR,
Packit 6c0a39
    .keysize = 192,
Packit 6c0a39
    .set_encrypt_key = aes_ctr_set_key,
Packit 6c0a39
    .set_decrypt_key = aes_ctr_set_key,
Packit 6c0a39
    .encrypt = aes_ctr_encrypt,
Packit 6c0a39
    .decrypt = aes_ctr_encrypt,
Packit 6c0a39
    .cleanup = aes_ctr_cleanup
Packit 6c0a39
  },
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes256-ctr",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .ciphertype = SSH_AES256_CTR,
Packit 6c0a39
    .keysize = 256,
Packit 6c0a39
    .set_encrypt_key = aes_ctr_set_key,
Packit 6c0a39
    .set_decrypt_key = aes_ctr_set_key,
Packit 6c0a39
    .encrypt = aes_ctr_encrypt,
Packit 6c0a39
    .decrypt = aes_ctr_encrypt,
Packit 6c0a39
    .cleanup = aes_ctr_cleanup
Packit 6c0a39
  },
Packit 6c0a39
#endif /* HAVE_OPENSSL_EVP_AES_CTR */
Packit 6c0a39
#endif /* BROKEN_AES_CTR */
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes128-cbc",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .ciphertype = SSH_AES128_CBC,
Packit 6c0a39
    .keysize = 128,
Packit 6c0a39
    .set_encrypt_key = evp_cipher_set_encrypt_key,
Packit 6c0a39
    .set_decrypt_key = evp_cipher_set_decrypt_key,
Packit 6c0a39
    .encrypt = evp_cipher_encrypt,
Packit 6c0a39
    .decrypt = evp_cipher_decrypt,
Packit 6c0a39
    .cleanup = evp_cipher_cleanup
Packit 6c0a39
  },
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes192-cbc",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .ciphertype = SSH_AES192_CBC,
Packit 6c0a39
    .keysize = 192,
Packit 6c0a39
    .set_encrypt_key = evp_cipher_set_encrypt_key,
Packit 6c0a39
    .set_decrypt_key = evp_cipher_set_decrypt_key,
Packit 6c0a39
    .encrypt = evp_cipher_encrypt,
Packit 6c0a39
    .decrypt = evp_cipher_decrypt,
Packit 6c0a39
    .cleanup = evp_cipher_cleanup
Packit 6c0a39
  },
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes256-cbc",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .ciphertype = SSH_AES256_CBC,
Packit 6c0a39
    .keysize = 256,
Packit 6c0a39
    .set_encrypt_key = evp_cipher_set_encrypt_key,
Packit 6c0a39
    .set_decrypt_key = evp_cipher_set_decrypt_key,
Packit 6c0a39
    .encrypt = evp_cipher_encrypt,
Packit 6c0a39
    .decrypt = evp_cipher_decrypt,
Packit 6c0a39
    .cleanup = evp_cipher_cleanup
Packit 6c0a39
  },
Packit 6c0a39
#ifdef HAVE_OPENSSL_EVP_AES_GCM
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes128-gcm@openssh.com",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .lenfield_blocksize = 4, /* not encrypted, but authenticated */
Packit 6c0a39
    .ciphertype = SSH_AEAD_AES128_GCM,
Packit 6c0a39
    .keysize = 128,
Packit 6c0a39
    .tag_size = AES_GCM_TAGLEN,
Packit 6c0a39
    .set_encrypt_key = evp_cipher_set_encrypt_key,
Packit 6c0a39
    .set_decrypt_key = evp_cipher_set_decrypt_key,
Packit 6c0a39
    .aead_encrypt = evp_cipher_aead_encrypt,
Packit 6c0a39
    .aead_decrypt_length = evp_cipher_aead_get_length,
Packit 6c0a39
    .aead_decrypt = evp_cipher_aead_decrypt,
Packit 6c0a39
    .cleanup = evp_cipher_cleanup
Packit 6c0a39
  },
Packit 6c0a39
  {
Packit 6c0a39
    .name = "aes256-gcm@openssh.com",
Packit 6c0a39
    .blocksize = AES_BLOCK_SIZE,
Packit 6c0a39
    .lenfield_blocksize = 4, /* not encrypted, but authenticated */
Packit 6c0a39
    .ciphertype = SSH_AEAD_AES256_GCM,
Packit 6c0a39
    .keysize = 256,
Packit 6c0a39
    .tag_size = AES_GCM_TAGLEN,
Packit 6c0a39
    .set_encrypt_key = evp_cipher_set_encrypt_key,
Packit 6c0a39
    .set_decrypt_key = evp_cipher_set_decrypt_key,
Packit 6c0a39
    .aead_encrypt = evp_cipher_aead_encrypt,
Packit 6c0a39
    .aead_decrypt_length = evp_cipher_aead_get_length,
Packit 6c0a39
    .aead_decrypt = evp_cipher_aead_decrypt,
Packit 6c0a39
    .cleanup = evp_cipher_cleanup
Packit 6c0a39
  },
Packit 6c0a39
#endif /* HAVE_OPENSSL_EVP_AES_GCM */
Packit 6c0a39
#endif /* HAS_AES */
Packit 6c0a39
#ifdef HAS_DES
Packit 6c0a39
  {
Packit 6c0a39
    .name = "3des-cbc",
Packit 6c0a39
    .blocksize = 8,
Packit 6c0a39
    .ciphertype = SSH_3DES_CBC,
Packit 6c0a39
    .keysize = 192,
Packit 6c0a39
    .set_encrypt_key = evp_cipher_set_encrypt_key,
Packit 6c0a39
    .set_decrypt_key = evp_cipher_set_decrypt_key,
Packit 6c0a39
    .encrypt = evp_cipher_encrypt,
Packit 6c0a39
    .decrypt = evp_cipher_decrypt,
Packit 6c0a39
    .cleanup = evp_cipher_cleanup
Packit 6c0a39
  },
Packit 6c0a39
#endif /* HAS_DES */
Packit 6c0a39
  {
Packit 6c0a39
    .name = "chacha20-poly1305@openssh.com"
Packit 6c0a39
  },
Packit 6c0a39
  {
Packit 6c0a39
    .name = NULL
Packit 6c0a39
  }
Packit 6c0a39
};
Packit 6c0a39
Packit 6c0a39
struct ssh_cipher_struct *ssh_get_ciphertab(void)
Packit 6c0a39
{
Packit 6c0a39
  return ssh_ciphertab;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
/**
Packit 6c0a39
 * @internal
Packit 6c0a39
 * @brief Initialize libcrypto's subsystem
Packit 6c0a39
 */
Packit 6c0a39
int ssh_crypto_init(void)
Packit 6c0a39
{
Packit 6c0a39
    size_t i;
Packit 6c0a39
Packit 6c0a39
    if (libcrypto_initialized) {
Packit 6c0a39
        return SSH_OK;
Packit 6c0a39
    }
Packit 6c0a39
    if (SSLeay() != OPENSSL_VERSION_NUMBER){
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "libssh compiled with %s "
Packit 6c0a39
            "headers, currently running with %s.",
Packit 6c0a39
            OPENSSL_VERSION_TEXT,
Packit 6c0a39
            SSLeay_version(SSLeay())
Packit 6c0a39
        );
Packit 6c0a39
    }
Packit 6c0a39
#ifdef CAN_DISABLE_AESNI
Packit 6c0a39
    /*
Packit 6c0a39
     * disable AES-NI when running within Valgrind, because they generate
Packit 6c0a39
     * too many "uninitialized memory access" false positives
Packit 6c0a39
     */
Packit 6c0a39
    if (RUNNING_ON_VALGRIND){
Packit 6c0a39
        SSH_LOG(SSH_LOG_INFO, "Running within Valgrind, disabling AES-NI");
Packit 6c0a39
        /* Bit #57 denotes AES-NI instruction set extension */
Packit 6c0a39
        OPENSSL_ia32cap &= ~(1LL << 57);
Packit 6c0a39
    }
Packit 6c0a39
#endif
Packit 6c0a39
#if OPENSSL_VERSION_NUMBER < 0x10100000L
Packit 6c0a39
    OpenSSL_add_all_algorithms();
Packit 6c0a39
#endif
Packit 6c0a39
Packit 6c0a39
    for (i = 0; ssh_ciphertab[i].name != NULL; i++) {
Packit 6c0a39
        int cmp;
Packit 6c0a39
Packit 6c0a39
        cmp = strcmp(ssh_ciphertab[i].name, "chacha20-poly1305@openssh.com");
Packit 6c0a39
        if (cmp == 0) {
Packit 6c0a39
            memcpy(&ssh_ciphertab[i],
Packit 6c0a39
                   ssh_get_chacha20poly1305_cipher(),
Packit 6c0a39
                   sizeof(struct ssh_cipher_struct));
Packit 6c0a39
            break;
Packit 6c0a39
        }
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    libcrypto_initialized = 1;
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
/**
Packit 6c0a39
 * @internal
Packit 6c0a39
 * @brief Finalize libcrypto's subsystem
Packit 6c0a39
 */
Packit 6c0a39
void ssh_crypto_finalize(void)
Packit 6c0a39
{
Packit 6c0a39
    if (!libcrypto_initialized) {
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
#if OPENSSL_VERSION_NUMBER < 0x10100000L
Packit 6c0a39
    EVP_cleanup();
Packit 6c0a39
    CRYPTO_cleanup_all_ex_data();
Packit 6c0a39
#endif
Packit 6c0a39
Packit 6c0a39
    libcrypto_initialized = 0;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#endif /* LIBCRYPTO */