]> andersk Git - openssh.git/blobdiff - ssh-keygen.c
- jakob@cvs.openbsd.org 2001/07/31 09:28:44
[openssh.git] / ssh-keygen.c
index 51b0034057367d3aba88a2ec96c8d05213a45daf..003357321cb8dfa4abdd70e0030f546742d1f226 100644 (file)
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: ssh-keygen.c,v 1.64 2001/06/23 17:05:22 markus Exp $");
+RCSID("$OpenBSD: ssh-keygen.c,v 1.73 2001/07/26 20:04:27 rees Exp $");
 
 #include <openssl/evp.h>
 #include <openssl/pem.h>
 
+#ifdef SMARTCARD
+#include <sectok.h>
+#endif
+
 #include "xmalloc.h"
 #include "key.h"
 #include "rsa.h"
@@ -28,6 +32,7 @@ RCSID("$OpenBSD: ssh-keygen.c,v 1.64 2001/06/23 17:05:22 markus Exp $");
 #include "log.h"
 #include "readpass.h"
 
+
 /* Number of bits in the RSA/DSA key.  This value can be changed on the command line. */
 int bits = 1024;
 
@@ -123,7 +128,8 @@ load_identity(char *filename)
                if (identity_passphrase)
                        pass = xstrdup(identity_passphrase);
                else
-                       pass = read_passphrase("Enter passphrase: ", 1);
+                       pass = read_passphrase("Enter passphrase: ",
+                           RP_ALLOW_STDIN);
                prv = key_load_private(filename, pass, NULL);
                memset(pass, 0, strlen(pass));
                xfree(pass);
@@ -188,7 +194,7 @@ do_convert_private_ssh2_from_blob(char *blob, int blen)
        Buffer b;
        Key *key = NULL;
        char *type, *cipher;
-       u_char *sig, data[10] = "abcde12345";
+       u_char *sig, data[] = "abcde12345";
        int magic, rlen, ktype, i1, i2, i3, i4;
        u_int slen;
        u_long e;
@@ -258,7 +264,7 @@ do_convert_private_ssh2_from_blob(char *blob, int blen)
                buffer_get_bignum_bits(&b, key->rsa->iqmp);
                buffer_get_bignum_bits(&b, key->rsa->q);
                buffer_get_bignum_bits(&b, key->rsa->p);
-               generate_additional_parameters(key->rsa);
+               rsa_generate_additional_parameters(key->rsa);
                break;
        }
        rlen = buffer_len(&b);
@@ -374,6 +380,102 @@ do_print_public(struct passwd *pw)
        exit(0);
 }
 
+#define NUM_RSA_KEY_ELEMENTS 5+1
+#define COPY_RSA_KEY(x, i) \
+       do { \
+               len = BN_num_bytes(prv->rsa->x); \
+               elements[i] = xmalloc(len); \
+               debug("#bytes %d", len); \
+               if (BN_bn2bin(prv->rsa->x, elements[i]) < 0) \
+                       goto done; \
+       } while(0)
+
+static void
+do_upload(struct passwd *pw, int reader)
+{
+#ifndef SMARTCARD
+       fatal("no support for smartcards.");
+#else
+       Key *prv = NULL;
+       struct stat st;
+       u_char *elements[NUM_RSA_KEY_ELEMENTS];
+       u_char key_fid[2];
+       u_char AUT0[] = {0xad, 0x9f, 0x61, 0xfe, 0xfa, 0x20, 0xce, 0x63};
+       int len, status = 1, i, fd = -1, ret;
+       int sw = 0, cla = 0x00;
+
+       for (i = 0; i < NUM_RSA_KEY_ELEMENTS; i++)
+               elements[i] = NULL;
+       if (!have_identity)
+               ask_filename(pw, "Enter file in which the key is");
+       if (stat(identity_file, &st) < 0) {
+               perror(identity_file);
+               goto done;
+       }
+       prv = load_identity(identity_file);
+       if (prv == NULL) {
+               error("load failed");
+               goto done;
+       }
+       COPY_RSA_KEY(q, 0);
+       COPY_RSA_KEY(p, 1);
+       COPY_RSA_KEY(iqmp, 2);
+       COPY_RSA_KEY(dmq1, 3);
+       COPY_RSA_KEY(dmp1, 4);
+       COPY_RSA_KEY(n, 5);
+       len = BN_num_bytes(prv->rsa->n);
+       fd = sectok_open(reader, 0, &sw);
+       if (fd < 0) {
+               error("sectok_open failed");
+               goto done;
+       }
+       ret = sectok_reset(fd, 0, NULL, &sw);
+       if (ret <= 0) {
+               error("sectok_reset failed");
+               goto done;
+       }
+       if ((cla = cyberflex_inq_class(fd)) < 0) {
+               error("cyberflex_inq_class failed");
+               goto done;
+       }
+       if (cyberflex_verify_AUT0(fd, cla, AUT0, sizeof(AUT0)) < 0) {
+               error("cyberflex_verify_AUT0 failed");
+               goto done;
+       }
+       key_fid[0] = 0x00;
+       key_fid[1] = 0x12;
+       if (cyberflex_load_rsa_priv(fd, cla, key_fid, 5, 8*len, elements,
+           &sw) < 0) {
+               error("cyberflex_load_rsa_priv failed: %s", sectok_get_sw(sw));
+               goto done;
+       }
+       if (!sectok_swOK(sw))
+               goto done;
+       log("cyberflex_load_rsa_priv done");
+       key_fid[0] = 0x73;
+       key_fid[1] = 0x68;
+       if (cyberflex_load_rsa_pub(fd, cla, key_fid, len, elements[5],
+           &sw) < 0) {
+               error("cyberflex_load_rsa_pub failed: %s", sectok_get_sw(sw));
+               goto done;
+       }
+       if (!sectok_swOK(sw))
+               goto done;
+       log("cyberflex_load_rsa_pub done");
+       status = 0;
+       log("loading key done");
+done:
+       if (prv)
+               key_free(prv);
+       for (i = 0; i < NUM_RSA_KEY_ELEMENTS; i++)
+               if (elements[i])
+                       xfree(elements[i]);
+       if (fd != -1)
+               sectok_close(fd);
+       exit(status);
+#endif
+}
+
 static void
 do_fingerprint(struct passwd *pw)
 {
@@ -491,8 +593,11 @@ do_change_passphrase(struct passwd *pw)
                if (identity_passphrase)
                        old_passphrase = xstrdup(identity_passphrase);
                else
-                       old_passphrase = read_passphrase("Enter old passphrase: ", 1);
-               private = key_load_private(identity_file, old_passphrase , &comment);
+                       old_passphrase =
+                           read_passphrase("Enter old passphrase: ",
+                           RP_ALLOW_STDIN);
+               private = key_load_private(identity_file, old_passphrase,
+                   &comment);
                memset(old_passphrase, 0, strlen(old_passphrase));
                xfree(old_passphrase);
                if (private == NULL) {
@@ -508,8 +613,10 @@ do_change_passphrase(struct passwd *pw)
                passphrase2 = NULL;
        } else {
                passphrase1 =
-                       read_passphrase("Enter new passphrase (empty for no passphrase): ", 1);
-               passphrase2 = read_passphrase("Enter same passphrase again: ", 1);
+                       read_passphrase("Enter new passphrase (empty for no "
+                           "passphrase): ", RP_ALLOW_STDIN);
+               passphrase2 = read_passphrase("Enter same passphrase again: ",
+                    RP_ALLOW_STDIN);
 
                /* Verify that they are the same. */
                if (strcmp(passphrase1, passphrase2) != 0) {
@@ -570,7 +677,8 @@ do_change_comment(struct passwd *pw)
                else if (identity_new_passphrase)
                        passphrase = xstrdup(identity_new_passphrase);
                else
-                       passphrase = read_passphrase("Enter passphrase: ", 1);
+                       passphrase = read_passphrase("Enter passphrase: ",
+                           RP_ALLOW_STDIN);
                /* Try to load using the passphrase. */
                private = key_load_private(identity_file, passphrase, &comment);
                if (private == NULL) {
@@ -657,7 +765,7 @@ main(int ac, char **av)
        char dotsshdir[16 * 1024], comment[1024], *passphrase1, *passphrase2;
        Key *private, *public;
        struct passwd *pw;
-       int opt, type, fd;
+       int opt, type, fd, reader = -1;
        struct stat st;
        FILE *f;
 
@@ -681,7 +789,7 @@ main(int ac, char **av)
                exit(1);
        }
 
-       while ((opt = getopt(ac, av, "deiqpclBRxXyb:f:t:P:N:C:")) != -1) {
+       while ((opt = getopt(ac, av, "deiqpclBRxXyb:f:t:u:P:N:C:")) != -1) {
                switch (opt) {
                case 'b':
                        bits = atoi(optarg);
@@ -690,73 +798,60 @@ main(int ac, char **av)
                                exit(1);
                        }
                        break;
-
                case 'l':
                        print_fingerprint = 1;
                        break;
-
                case 'B':
                        print_bubblebabble = 1;
                        break;
-
                case 'p':
                        change_passphrase = 1;
                        break;
-
                case 'c':
                        change_comment = 1;
                        break;
-
                case 'f':
                        strlcpy(identity_file, optarg, sizeof(identity_file));
                        have_identity = 1;
                        break;
-
                case 'P':
                        identity_passphrase = optarg;
                        break;
-
                case 'N':
                        identity_new_passphrase = optarg;
                        break;
-
                case 'C':
                        identity_comment = optarg;
                        break;
-
                case 'q':
                        quiet = 1;
                        break;
-
                case 'R':
                        /* unused */
                        exit(0);
                        break;
-
                case 'e':
                case 'x':
                        /* export key */
                        convert_to_ssh2 = 1;
                        break;
-
                case 'i':
                case 'X':
                        /* import key */
                        convert_from_ssh2 = 1;
                        break;
-
                case 'y':
                        print_public = 1;
                        break;
-
                case 'd':
                        key_type_name = "dsa";
                        break;
-
                case 't':
                        key_type_name = optarg;
                        break;
-
+               case 'u':
+                       reader = atoi(optarg); /*XXX*/
+                       break;
                case '?':
                default:
                        usage();
@@ -782,6 +877,8 @@ main(int ac, char **av)
                do_convert_from_ssh2(pw);
        if (print_public)
                do_print_public(pw);
+       if (reader != -1)
+               do_upload(pw, reader);
 
        arc4random_stir();
 
@@ -830,10 +927,15 @@ main(int ac, char **av)
        else {
 passphrase_again:
                passphrase1 =
-                       read_passphrase("Enter passphrase (empty for no passphrase): ", 1);
-               passphrase2 = read_passphrase("Enter same passphrase again: ", 1);
+                       read_passphrase("Enter passphrase (empty for no "
+                           "passphrase): ", RP_ALLOW_STDIN);
+               passphrase2 = read_passphrase("Enter same passphrase again: ",
+                   RP_ALLOW_STDIN);
                if (strcmp(passphrase1, passphrase2) != 0) {
-                       /* The passphrases do not match.  Clear them and retry. */
+                       /*
+                        * The passphrases do not match.  Clear them and
+                        * retry.
+                        */
                        memset(passphrase1, 0, strlen(passphrase1));
                        memset(passphrase2, 0, strlen(passphrase2));
                        xfree(passphrase1);
This page took 0.045944 seconds and 4 git commands to generate.