1 /* $OpenBSD: bufbn.c,v 1.2 2006/07/22 20:48:22 stevesk Exp $*/
3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6 * Auxiliary functions for storing and retrieving various data types to/from
9 * As far as I am concerned, the code I have written for this software
10 * can be used freely for any purpose. Any derived versions of this
11 * software must be clearly marked as such, and if the derived work is
12 * incompatible with the protocol description in the RFC file, it must be
13 * called by a name other than "ssh" or "Secure Shell".
16 * SSH2 packet format added by Markus Friedl
17 * Copyright (c) 2000 Markus Friedl. All rights reserved.
19 * Redistribution and use in source and binary forms, with or without
20 * modification, are permitted provided that the following conditions
22 * 1. Redistributions of source code must retain the above copyright
23 * notice, this list of conditions and the following disclaimer.
24 * 2. Redistributions in binary form must reproduce the above copyright
25 * notice, this list of conditions and the following disclaimer in the
26 * documentation and/or other materials provided with the distribution.
28 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
29 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
30 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
31 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
32 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
33 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
34 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
35 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
36 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
37 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
42 #include <openssl/bn.h>
52 * Stores an BIGNUM in the buffer with a 2-byte msb first bit count, followed
53 * by (bits+7)/8 bytes of binary data, msb first.
56 buffer_put_bignum_ret(Buffer
*buffer
, const BIGNUM
*value
)
58 int bits
= BN_num_bits(value
);
59 int bin_size
= (bits
+ 7) / 8;
60 u_char
*buf
= xmalloc(bin_size
);
64 /* Get the value of in binary */
65 oi
= BN_bn2bin(value
, buf
);
67 error("buffer_put_bignum_ret: BN_bn2bin() failed: oi %d != bin_size %d",
73 /* Store the number of bits in the buffer in two bytes, msb first. */
75 buffer_append(buffer
, msg
, 2);
76 /* Store the binary data. */
77 buffer_append(buffer
, buf
, oi
);
79 memset(buf
, 0, bin_size
);
86 buffer_put_bignum(Buffer
*buffer
, const BIGNUM
*value
)
88 if (buffer_put_bignum_ret(buffer
, value
) == -1)
89 fatal("buffer_put_bignum: buffer error");
93 * Retrieves an BIGNUM from the buffer.
96 buffer_get_bignum_ret(Buffer
*buffer
, BIGNUM
*value
)
101 /* Get the number for bits. */
102 if (buffer_get_ret(buffer
, (char *) buf
, 2) == -1) {
103 error("buffer_get_bignum_ret: invalid length");
107 /* Compute the number of binary bytes that follow. */
108 bytes
= (bits
+ 7) / 8;
109 if (bytes
> 8 * 1024) {
110 error("buffer_get_bignum_ret: cannot handle BN of size %d", bytes
);
113 if (buffer_len(buffer
) < bytes
) {
114 error("buffer_get_bignum_ret: input buffer too small");
117 bin
= buffer_ptr(buffer
);
118 BN_bin2bn(bin
, bytes
, value
);
119 if (buffer_consume_ret(buffer
, bytes
) == -1) {
120 error("buffer_get_bignum_ret: buffer_consume failed");
127 buffer_get_bignum(Buffer
*buffer
, BIGNUM
*value
)
129 if (buffer_get_bignum_ret(buffer
, value
) == -1)
130 fatal("buffer_get_bignum: buffer error");
134 * Stores an BIGNUM in the buffer in SSH2 format.
137 buffer_put_bignum2_ret(Buffer
*buffer
, const BIGNUM
*value
)
144 if (BN_is_zero(value
)) {
145 buffer_put_int(buffer
, 0);
149 error("buffer_put_bignum2_ret: negative numbers not supported");
152 bytes
= BN_num_bytes(value
) + 1; /* extra padding byte */
154 error("buffer_put_bignum2_ret: BN too small");
157 buf
= xmalloc(bytes
);
159 /* Get the value of in binary */
160 oi
= BN_bn2bin(value
, buf
+1);
161 if (oi
< 0 || (u_int
)oi
!= bytes
- 1) {
162 error("buffer_put_bignum2_ret: BN_bn2bin() failed: "
163 "oi %d != bin_size %d", oi
, bytes
);
167 hasnohigh
= (buf
[1] & 0x80) ? 0 : 1;
168 buffer_put_string(buffer
, buf
+hasnohigh
, bytes
-hasnohigh
);
169 memset(buf
, 0, bytes
);
175 buffer_put_bignum2(Buffer
*buffer
, const BIGNUM
*value
)
177 if (buffer_put_bignum2_ret(buffer
, value
) == -1)
178 fatal("buffer_put_bignum2: buffer error");
182 buffer_get_bignum2_ret(Buffer
*buffer
, BIGNUM
*value
)
187 if ((bin
= buffer_get_string_ret(buffer
, &len
)) == NULL
) {
188 error("buffer_get_bignum2_ret: invalid bignum");
192 if (len
> 0 && (bin
[0] & 0x80)) {
193 error("buffer_get_bignum2_ret: negative numbers not supported");
197 if (len
> 8 * 1024) {
198 error("buffer_get_bignum2_ret: cannot handle BN of size %d", len
);
202 BN_bin2bn(bin
, len
, value
);
208 buffer_get_bignum2(Buffer
*buffer
, BIGNUM
*value
)
210 if (buffer_get_bignum2_ret(buffer
, value
) == -1)
211 fatal("buffer_get_bignum2: buffer error");