Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | | - |
9 | | - |
10 | | - |
11 | | - |
12 | | - |
13 | | - |
14 | static int input_kex_dh_gex_group(int, u_int32_t, struct ssh *); | - |
15 | static int input_kex_dh_gex_reply(int, u_int32_t, struct ssh *); | - |
16 | | - |
17 | int | - |
18 | kexgex_client(struct ssh *ssh) | - |
19 | { | - |
20 | struct kex *kex = ssh->kex; | - |
21 | int r; | - |
22 | u_int nbits; | - |
23 | | - |
24 | nbits = dh_estimate(kex->dh_need * 8); | - |
25 | | - |
26 | kex->min = 2048; | - |
27 | kex->max = 8192; | - |
28 | kex->nbits = nbits; | - |
29 | if (datafellows & 0x40000000TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) | 0-40 |
30 | kex->nbits = (((TRUE | never evaluated | FALSE | never evaluated |
kex->nbits) < (4096))TRUE | never evaluated | FALSE | never evaluated |
? (kex->nbits) : (4096));never executed: kex->nbits = (((kex->nbits) < (4096)) ? (kex->nbits) : (4096)); | 0 |
31 | | - |
32 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_start(ssh, 34)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
33 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_put_u32(ssh, kex->min)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
34 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_put_u32(ssh, kex->nbits)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
35 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_put_u32(ssh, kex->max)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
36 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_send(ssh)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) | 0-40 |
37 | goto never executed: goto out; out;never executed: goto out; | 0 |
38 | debug("SSH2_MSG_KEX_DH_GEX_REQUEST(%u<%u<%u) sent", | - |
39 | kex->min, kex->nbits, kex->max); | - |
40 | | - |
41 | | - |
42 | | - |
43 | | - |
44 | ssh_dispatch_set(ssh, 31, | - |
45 | &input_kex_dh_gex_group); | - |
46 | r = 0; | - |
47 | out:code before this statement executed 40 times by 1 test: out: | 40 |
48 | returnexecuted 40 times by 1 test: return r; r;executed 40 times by 1 test: return r; | 40 |
49 | } | - |
50 | | - |
51 | static int | - |
52 | input_kex_dh_gex_group(int type, u_int32_t seq, struct ssh *ssh) | - |
53 | { | - |
54 | struct kex *kex = ssh->kex; | - |
55 | BIGNUM *p = | - |
56 | ((void *)0) | - |
57 | , *g = | - |
58 | ((void *)0) | - |
59 | ; | - |
60 | const BIGNUM *pub_key; | - |
61 | int r, bits; | - |
62 | | - |
63 | debug("got SSH2_MSG_KEX_DH_GEX_GROUP"); | - |
64 | | - |
65 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
p = BN_new()) == TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
66 | ((void *)0)TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
67 | || | - |
68 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
g = BN_new()) == TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
69 | ((void *)0)TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
70 | ) { | - |
71 | r = -2; | - |
72 | goto never executed: goto out; out;never executed: goto out; | 0 |
73 | } | - |
74 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_get_bignum2(ssh, p)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
75 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_get_bignum2(ssh, g)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
76 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_get_end(ssh)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) | 0-40 |
77 | goto never executed: goto out; out;never executed: goto out; | 0 |
78 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
bits = BN_num_bits(p)) < 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
79 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
u_int)bits < kex->minTRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
u_int)bits > kex->maxTRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) { | 0-40 |
80 | r = -28; | - |
81 | goto never executed: goto out; out;never executed: goto out; | 0 |
82 | } | - |
83 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
kex->dh = dh_new_group(g, p)) == TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
84 | ((void *)0)TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
85 | ) { | - |
86 | r = -2; | - |
87 | goto never executed: goto out; out;never executed: goto out; | 0 |
88 | } | - |
89 | p = g = | - |
90 | ((void *)0) | - |
91 | ; | - |
92 | | - |
93 | | - |
94 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = dh_gen_key(kex->dh, kex->we_need * 8)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) | 0-40 |
95 | goto never executed: goto out; out;never executed: goto out; | 0 |
96 | DH_get0_key(kex->dh, &pub_key, | - |
97 | ((void *)0) | - |
98 | ); | - |
99 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_start(ssh, 32)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
100 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_put_bignum2(ssh, pub_key)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
101 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_send(ssh)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) | 0-40 |
102 | goto never executed: goto out; out;never executed: goto out; | 0 |
103 | debug("SSH2_MSG_KEX_DH_GEX_INIT sent"); | - |
104 | | - |
105 | | - |
106 | | - |
107 | | - |
108 | | - |
109 | | - |
110 | ssh_dispatch_set(ssh, 31, | - |
111 | ((void *)0) | - |
112 | ); | - |
113 | ssh_dispatch_set(ssh, 33, &input_kex_dh_gex_reply); | - |
114 | r = 0; | - |
115 | out:code before this statement executed 40 times by 1 test: out: | 40 |
116 | BN_clear_free(p); | - |
117 | BN_clear_free(g); | - |
118 | returnexecuted 40 times by 1 test: return r; r;executed 40 times by 1 test: return r; | 40 |
119 | } | - |
120 | | - |
121 | static int | - |
122 | input_kex_dh_gex_reply(int type, u_int32_t seq, struct ssh *ssh) | - |
123 | { | - |
124 | struct kex *kex = ssh->kex; | - |
125 | BIGNUM *dh_server_pub = | - |
126 | ((void *)0) | - |
127 | , *shared_secret = | - |
128 | ((void *)0) | - |
129 | ; | - |
130 | const BIGNUM *pub_key, *dh_p, *dh_g; | - |
131 | struct sshkey *server_host_key = | - |
132 | ((void *)0) | - |
133 | ; | - |
134 | u_char *kbuf = | - |
135 | ((void *)0) | - |
136 | , *signature = | - |
137 | ((void *)0) | - |
138 | , *server_host_key_blob = | - |
139 | ((void *)0) | - |
140 | ; | - |
141 | u_char hash[64]; | - |
142 | size_t klen = 0, slen, sbloblen, hashlen; | - |
143 | int kout, r; | - |
144 | | - |
145 | debug("got SSH2_MSG_KEX_DH_GEX_REPLY"); | - |
146 | if (kex->verify_host_key == TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
147 | ((void *)0)TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
148 | ) { | - |
149 | r = -10; | - |
150 | goto never executed: goto out; out;never executed: goto out; | 0 |
151 | } | - |
152 | | - |
153 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_get_string(ssh, &server_host_key_blob,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
154 | &sbloblen)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
155 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshkey_from_blob(server_host_key_blob, sbloblen,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
156 | &server_host_key)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) | 0-40 |
157 | goto never executed: goto out; out;never executed: goto out; | 0 |
158 | if (server_host_key->type != kex->hostkey_typeTRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
159 | (kex->hostkey_type == KEY_ECDSATRUE | evaluated 10 times by 1 test | FALSE | evaluated 30 times by 1 test |
&& | 10-30 |
160 | server_host_key->ecdsa_nid != kex->hostkey_nidTRUE | never evaluated | FALSE | evaluated 10 times by 1 test |
)) { | 0-10 |
161 | r = -13; | - |
162 | goto never executed: goto out; out;never executed: goto out; | 0 |
163 | } | - |
164 | if (kex->verify_host_key(server_host_key, ssh) == -1TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) { | 0-40 |
165 | r = -21; | - |
166 | goto never executed: goto out; out;never executed: goto out; | 0 |
167 | } | - |
168 | | - |
169 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
dh_server_pub = BN_new()) == TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
170 | ((void *)0)TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
171 | ) { | - |
172 | r = -2; | - |
173 | goto never executed: goto out; out;never executed: goto out; | 0 |
174 | } | - |
175 | | - |
176 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_get_bignum2(ssh, dh_server_pub)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
177 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_get_string(ssh, &signature, &slen)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
178 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshpkt_get_end(ssh)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) | 0-40 |
179 | goto never executed: goto out; out;never executed: goto out; | 0 |
180 | | - |
181 | | - |
182 | | - |
183 | | - |
184 | | - |
185 | | - |
186 | if (!dh_pub_is_valid(kex->dh, dh_server_pub)TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) { | 0-40 |
187 | sshpkt_disconnect(ssh, "bad server public DH value"); | - |
188 | r = -3; | - |
189 | goto never executed: goto out; out;never executed: goto out; | 0 |
190 | } | - |
191 | | - |
192 | klen = DH_size(kex->dh); | - |
193 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
kbuf = malloc(klen)) == TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
194 | ((void *)0)TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
195 | || | - |
196 | (TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
shared_secret = BN_new()) == TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
197 | ((void *)0)TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
198 | ) { | - |
199 | r = -2; | - |
200 | goto never executed: goto out; out;never executed: goto out; | 0 |
201 | } | - |
202 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
kout = DH_compute_key(kbuf, dh_server_pub, kex->dh)) < 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
|| | 0-40 |
203 | BN_bin2bn(kbuf, kout, shared_secret) == TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
204 | ((void *)0)TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
205 | ) { | - |
206 | r = -22; | - |
207 | goto never executed: goto out; out;never executed: goto out; | 0 |
208 | } | - |
209 | | - |
210 | | - |
211 | | - |
212 | if (ssh->compat & 0x00004000TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) | 0-40 |
213 | kex->min = kex->max = -1; never executed: kex->min = kex->max = -1; | 0 |
214 | | - |
215 | | - |
216 | DH_get0_key(kex->dh, &pub_key, | - |
217 | ((void *)0) | - |
218 | ); | - |
219 | DH_get0_pqg(kex->dh, &dh_p, | - |
220 | ((void *)0) | - |
221 | , &dh_g); | - |
222 | hashlen = sizeof(hash); | - |
223 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = kexgex_hash(TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
224 | kex->hash_alg,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
225 | kex->client_version_string,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
226 | kex->server_version_string,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
227 | sshbuf_ptr(kex->my), sshbuf_len(kex->my),TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
228 | sshbuf_ptr(kex->peer), sshbuf_len(kex->peer),TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
229 | server_host_key_blob, sbloblen,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
230 | kex->min, kex->nbits, kex->max,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
231 | dh_p, dh_g,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
232 | pub_key,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
233 | dh_server_pub,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
234 | shared_secret,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
235 | hash, &hashlen)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) | 0-40 |
236 | goto never executed: goto out; out;never executed: goto out; | 0 |
237 | | - |
238 | if ((TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
r = sshkey_verify(server_host_key, signature, slen, hash,TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
| 0-40 |
239 | hashlen, kex->hostkey_alg, ssh->compat)) != 0TRUE | never evaluated | FALSE | evaluated 40 times by 1 test |
) | 0-40 |
240 | goto never executed: goto out; out;never executed: goto out; | 0 |
241 | | - |
242 | | - |
243 | if (kex->session_id == TRUE | evaluated 8 times by 1 test | FALSE | evaluated 32 times by 1 test |
| 8-32 |
244 | ((void *)0)TRUE | evaluated 8 times by 1 test | FALSE | evaluated 32 times by 1 test |
| 8-32 |
245 | ) { | - |
246 | kex->session_id_len = hashlen; | - |
247 | kex->session_id = malloc(kex->session_id_len); | - |
248 | if (kex->session_id == TRUE | never evaluated | FALSE | evaluated 8 times by 1 test |
| 0-8 |
249 | ((void *)0)TRUE | never evaluated | FALSE | evaluated 8 times by 1 test |
| 0-8 |
250 | ) { | - |
251 | r = -2; | - |
252 | goto never executed: goto out; out;never executed: goto out; | 0 |
253 | } | - |
254 | memcpy(kex->session_id, hash, kex->session_id_len); | - |
255 | }executed 8 times by 1 test: end of block | 8 |
256 | | - |
257 | if ((TRUE | evaluated 40 times by 1 test | FALSE | never evaluated |
r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0TRUE | evaluated 40 times by 1 test | FALSE | never evaluated |
) | 0-40 |
258 | r = kex_send_newkeys(ssh);executed 40 times by 1 test: r = kex_send_newkeys(ssh); | 40 |
259 | out:code before this statement executed 40 times by 1 test: out: | 40 |
260 | explicit_bzero(hash, sizeof(hash)); | - |
261 | DH_free(kex->dh); | - |
262 | kex->dh = | - |
263 | ((void *)0) | - |
264 | ; | - |
265 | BN_clear_free(dh_server_pub); | - |
266 | if (kbufTRUE | evaluated 40 times by 1 test | FALSE | never evaluated |
) { | 0-40 |
267 | explicit_bzero(kbuf, klen); | - |
268 | free(kbuf); | - |
269 | }executed 40 times by 1 test: end of block | 40 |
270 | BN_clear_free(shared_secret); | - |
271 | sshkey_free(server_host_key); | - |
272 | free(server_host_key_blob); | - |
273 | free(signature); | - |
274 | returnexecuted 40 times by 1 test: return r; r;executed 40 times by 1 test: return r; | 40 |
275 | } | - |
| | |