2 * Copyright (c) 1991, 1993
3 * Dave Safford. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 #include <sys/cdefs.h>
33 __FBSDID("$FreeBSD: src/contrib/telnet/libtelnet/pk.c,v 1.10 2002/08/22 06:19:07 nsayer Exp $");
35 /* public key routines */
37 genkeys(char *public, char *secret)
38 common_key(char *secret, char *public, desData *deskey)
39 pk_encode(char *in, *out, DesData *deskey);
40 pk_decode(char *in, *out, DesData *deskey);
42 char public[HEXKEYBYTES + 1];
43 char secret[HEXKEYBYTES + 1];
47 #include <openssl/des.h>
56 static void adjust(char keyout
[HEXKEYBYTES
+1], char *keyin
);
59 * Choose top 128 bits of the common key to use as our idea key.
62 extractideakey(MINT
*ck
, IdeaData
*ideakey
)
68 short base
= (1 << 8);
74 for (i
= 0; i
< ((KEYSIZE
- 128) / 8); i
++) {
78 for (i
= 0; i
< 16; i
++) {
87 * Choose middle 64 bits of the common key to use as our des key, possibly
88 * overwriting the lower order bits by setting parity.
91 extractdeskey(MINT
*ck
, DesData
*deskey
)
97 short base
= (1 << 8);
103 for (i
= 0; i
< ((KEYSIZE
- 64) / 2) / 8; i
++) {
104 sdiv(a
, base
, a
, &r
);
107 for (i
= 0; i
< 8; i
++) {
108 sdiv(a
, base
, a
, &r
);
116 * get common key from my secret key and his public key
119 common_key(char *xsecret
, char *xpublic
, IdeaData
*ideakey
, DesData
*deskey
)
124 MINT
*modulus
= xtom(HEXMODULUS
);
126 public = xtom(xpublic
);
127 secret
= xtom(xsecret
);
129 pow(public, secret
, modulus
, common
);
130 extractdeskey(common
, deskey
);
131 extractideakey(common
, ideakey
);
132 des_set_odd_parity(deskey
);
143 getseed(char *seed
, int seedsize
)
148 for (i
= 0; i
< seedsize
; i
++) {
149 seed
[i
] = random() & 0xff;
154 * Generate a random public/secret key pair
157 genkeys(char *public, char *secret
)
161 # define BASEBITS (8*sizeof(short) - 1)
162 # define BASE (1 << BASEBITS)
167 MINT
*base
= itom(BASE
);
168 MINT
*root
= itom(PROOT
);
169 MINT
*modulus
= xtom(HEXMODULUS
);
171 unsigned short seed
[KEYSIZE
/BASEBITS
+ 1];
174 getseed((char *)seed
, sizeof(seed
));
175 for (i
= 0; i
< KEYSIZE
/BASEBITS
+ 1; i
++) {
183 mdiv(sk
, modulus
, tmp
, sk
);
185 pow(root
, sk
, modulus
, pk
);
187 adjust(secret
, xkey
);
189 adjust(public, xkey
);
198 * Adjust the input key so that it is 0-filled on the left
201 adjust(char keyout
[HEXKEYBYTES
+1], char *keyin
)
206 for (p
= keyin
; *p
; p
++)
208 for (s
= keyout
+ HEXKEYBYTES
; p
>= keyin
; p
--, s
--) {
211 while (s
>= keyout
) {
216 static char hextab
[17] = "0123456789ABCDEF";
218 /* given a DES key, cbc encrypt and translate input to terminated hex */
220 pk_encode(char *in
, char *out
, DesData
*key
)
227 memset(&i
,0,sizeof(i
));
228 memset(buf
,0,sizeof(buf
));
229 deslen
= ((strlen(in
) + 7)/8)*8;
230 des_key_sched(key
, k
);
231 des_cbc_encrypt(in
,buf
,deslen
, k
,&i
,DES_ENCRYPT
);
232 for (l
=0,op
=0;l
<deslen
;l
++) {
233 out
[op
++] = hextab
[(buf
[l
] & 0xf0) >> 4];
234 out
[op
++] = hextab
[(buf
[l
] & 0x0f)];
239 /* given a DES key, translate input from hex and decrypt */
241 pk_decode(char *in
, char *out
, DesData
*key
)
249 memset(&i
,0,sizeof(i
));
250 memset(buf
,0,sizeof(buf
));
251 for (l
=0,op
=0;l
<strlen(in
)/2;l
++,op
+=2) {
253 n1
= in
[op
] - 'A' + 10;
257 n2
= in
[op
+1] - 'A' + 10;
262 des_key_sched(key
, k
);
263 des_cbc_encrypt(buf
,out
,strlen(in
)/2, k
,&i
,DES_DECRYPT
);
264 out
[strlen(in
)/2] = '\0';