9 /* from %OpenBSD: skeylogin.c,v 1.32 1999/08/16 14:46:56 millert Exp % */
12 #define ROUND(x) (((x)[0] << 24) + (((x)[1]) << 16) + (((x)[2]) << 8) + \
25 if ((strlen(s) % sizeof(u_int32_t)) == 0)
26 target = strlen(s); /* Multiple of 4 */
28 target = strlen(s) - (strlen(s) % sizeof(u_int32_t));
30 for (i = 0, len = 0; len < target; len += 4)
36 skey_fake_keyinfo(char *username)
40 u_char hseed[SKEY_MAX_SEED_LEN], flg = 1, *up;
41 char pbuf[SKEY_MAX_PW_LEN+1];
42 static char skeyprompt[SKEY_MAX_CHALLENGE+1];
49 * Base first 4 chars of seed on hostname.
50 * Add some filler for short hostnames if necessary.
52 if (gethostname(pbuf, sizeof(pbuf)) == -1)
55 for (p = pbuf; *p && isalnum(*p); p++)
56 if (isalpha(*p) && isupper(*p))
58 if (*p && pbuf - p < 4)
59 (void)strncpy(p, "asjd", 4 - (pbuf - p));
62 /* Hash the username if possible */
63 if ((up = SHA1Data(username, strlen(username), NULL)) != NULL) {
68 /* Collapse the hash */
69 ptr = hash_collapse(up);
70 memset(up, 0, strlen(up));
72 /* See if the random file's there, else use ctime */
73 if ((fd = open(_SKEY_RAND_FILE_PATH_, O_RDONLY)) != -1
74 && fstat(fd, &sb) == 0 &&
75 sb.st_size > (off_t)SKEY_MAX_SEED_LEN &&
76 lseek(fd, ptr % (sb.st_size - SKEY_MAX_SEED_LEN),
77 SEEK_SET) != -1 && read(fd, hseed,
78 SKEY_MAX_SEED_LEN) == SKEY_MAX_SEED_LEN) {
81 secretlen = SKEY_MAX_SEED_LEN;
83 } else if (!stat(_PATH_MEM, &sb) || !stat("/", &sb)) {
86 secretlen = strlen(secret);
91 /* Put that in your pipe and smoke it */
93 /* Hash secret value with username */
95 SHA1Update(&ctx, secret, secretlen);
96 SHA1Update(&ctx, username, strlen(username));
100 memset(secret, 0, secretlen);
102 /* Now hash the hash */
104 SHA1Update(&ctx, up, strlen(up));
107 ptr = hash_collapse(up + 4);
109 for (i = 4; i < 9; i++) {
110 pbuf[i] = (ptr % 10) + '0';
115 /* Sequence number */
116 ptr = ((up[2] + up[3]) % 99) + 1;
118 memset(up, 0, 20); /* SHA1 specific */
121 (void)snprintf(skeyprompt, sizeof skeyprompt,
123 SKEY_MAX_HASHNAME_LEN,
124 skey_get_algorithm(),
125 ptr, SKEY_MAX_SEED_LEN,
128 /* Base last 8 chars of seed on username */
134 /* Pad remainder with zeros */
140 *p++ = (*u++ % 10) + '0';
144 (void)snprintf(skeyprompt, sizeof skeyprompt,
146 SKEY_MAX_HASHNAME_LEN,
147 skey_get_algorithm(),
148 99, SKEY_MAX_SEED_LEN, pbuf);