Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | | - |
9 | | - |
10 | | - |
11 | | - |
12 | | - |
13 | | - |
14 | | - |
15 | | - |
16 | | - |
17 | | - |
18 | | - |
19 | | - |
20 | | - |
21 | | - |
22 | | - |
23 | | - |
24 | | - |
25 | | - |
26 | #include "includes.h" | - |
27 | | - |
28 | #ifdef WITH_OPENSSL | - |
29 | | - |
30 | #include <sys/types.h> | - |
31 | | - |
32 | #include <signal.h> | - |
33 | | - |
34 | #include <openssl/evp.h> | - |
35 | | - |
36 | #include "openbsd-compat/openssl-compat.h" | - |
37 | | - |
38 | #include "ssh2.h" | - |
39 | #include "sshkey.h" | - |
40 | #include "cipher.h" | - |
41 | #include "kex.h" | - |
42 | #include "ssherr.h" | - |
43 | #include "sshbuf.h" | - |
44 | #include "digest.h" | - |
45 | | - |
46 | int | - |
47 | kex_dh_hash( | - |
48 | int hash_alg, | - |
49 | const char *client_version_string, | - |
50 | const char *server_version_string, | - |
51 | const u_char *ckexinit, size_t ckexinitlen, | - |
52 | const u_char *skexinit, size_t skexinitlen, | - |
53 | const u_char *serverhostkeyblob, size_t sbloblen, | - |
54 | const BIGNUM *client_dh_pub, | - |
55 | const BIGNUM *server_dh_pub, | - |
56 | const BIGNUM *shared_secret, | - |
57 | u_char *hash, size_t *hashlen) | - |
58 | { | - |
59 | struct sshbuf *b; | - |
60 | int r; | - |
61 | | - |
62 | if (*hashlen < ssh_digest_bytes(hash_alg))TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
63 | return SSH_ERR_INVALID_ARGUMENT; never executed: return -10; | 0 |
64 | if ((b = sshbuf_new()) == NULL)TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
65 | return SSH_ERR_ALLOC_FAIL; never executed: return -2; | 0 |
66 | if ((r = sshbuf_put_cstring(b, client_version_string)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
67 | (r = sshbuf_put_cstring(b, server_version_string)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
68 | | - |
69 | (r = sshbuf_put_u32(b, ckexinitlen+1)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
70 | (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
71 | (r = sshbuf_put(b, ckexinit, ckexinitlen)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
72 | (r = sshbuf_put_u32(b, skexinitlen+1)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
73 | (r = sshbuf_put_u8(b, SSH2_MSG_KEXINIT)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
74 | (r = sshbuf_put(b, skexinit, skexinitlen)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
75 | (r = sshbuf_put_string(b, serverhostkeyblob, sbloblen)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
76 | (r = sshbuf_put_bignum2(b, client_dh_pub)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
77 | (r = sshbuf_put_bignum2(b, server_dh_pub)) != 0 ||TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
78 | (r = sshbuf_put_bignum2(b, shared_secret)) != 0) {TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
79 | sshbuf_free(b); | - |
80 | return r; never executed: return r; | 0 |
81 | } | - |
82 | #ifdef DEBUG_KEX | - |
83 | sshbuf_dump(b, stderr); | - |
84 | #endif | - |
85 | if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) {TRUE | never evaluated | FALSE | evaluated 80 times by 1 test |
| 0-80 |
86 | sshbuf_free(b); | - |
87 | return SSH_ERR_LIBCRYPTO_ERROR; never executed: return -22; | 0 |
88 | } | - |
89 | sshbuf_free(b); | - |
90 | *hashlen = ssh_digest_bytes(hash_alg); | - |
91 | #ifdef DEBUG_KEX | - |
92 | dump_digest("hash", hash, *hashlen); | - |
93 | #endif | - |
94 | return 0;executed 80 times by 1 test: return 0; | 80 |
95 | } | - |
96 | #endif /* WITH_OPENSSL */ | - |
| | |