- Remove references to SSLeay.
- Big OpenBSD CVS update
- markus@cvs.openbsd.org
[clientloop.c]
- typo
[session.c]
- update proctitle on pty alloc/dealloc, e.g. w/ windows client
[session.c]
- update proctitle for proto 1, too
[channels.h nchan.c serverloop.c session.c sshd.c]
- use c-style comments
- deraadt@cvs.openbsd.org
[scp.c]
- more atomicio
- markus@cvs.openbsd.org
[channels.c]
- set O_NONBLOCK
[ssh.1]
- update AUTHOR
[readconf.c ssh-keygen.c ssh.h]
- default DSA key file ~/.ssh/id_dsa
[clientloop.c]
- typo, rm verbose debug
- deraadt@cvs.openbsd.org
[ssh-keygen.1]
- document DSA use of ssh-keygen
[sshd.8]
- a start at describing what i understand of the DSA side
[ssh-keygen.1]
- document -X and -x
[ssh-keygen.c]
- simplify usage
- markus@cvs.openbsd.org
[sshd.8]
- there is no rhosts_dsa
[ssh-keygen.1]
- document -y, update -X,-x
[nchan.c]
- fix close for non-open ssh1 channels
[servconf.c servconf.h ssh.h sshd.8 sshd.c ]
- s/DsaKey/HostDSAKey/, document option
[sshconnect2.c]
- respect number_of_password_prompts
[channels.c channels.h servconf.c servconf.h session.c sshd.8]
- GatewayPorts for sshd, ok deraadt@
[ssh-add.1 ssh-agent.1 ssh.1]
- more doc on: DSA, id_dsa, known_hosts2, authorized_keys2
[ssh.1]
- more info on proto 2
[sshd.8]
- sync AUTHOR w/ ssh.1
[key.c key.h sshconnect.c]
- print key type when talking about host keys
[packet.c]
- clear padding in ssh2
[dsa.c key.c radix.c ssh.h sshconnect1.c uuencode.c uuencode.h]
- replace broken uuencode w/ libc b64_ntop
[auth2.c]
- log failure before sending the reply
[key.c radix.c uuencode.c]
- remote trailing comments before calling __b64_pton
[auth2.c readconf.c readconf.h servconf.c servconf.h ssh.1]
[sshconnect2.c sshd.8]
- add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8
- Bring in b64_ntop and b64_pton from OpenBSD libc (bsd-base64.[ch])
2000-05-07 02:03:14 +00:00
|
|
|
/* $OpenBSD: base64.c,v 1.3 1997/11/08 20:46:55 deraadt Exp $ */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 1996 by Internet Software Consortium.
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
|
|
|
|
* ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
|
|
|
|
* CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
|
|
|
|
* PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
|
|
|
|
* ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
|
|
|
|
* SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Portions Copyright (c) 1995 by International Business Machines, Inc.
|
|
|
|
*
|
|
|
|
* International Business Machines, Inc. (hereinafter called IBM) grants
|
|
|
|
* permission under its copyrights to use, copy, modify, and distribute this
|
|
|
|
* Software with or without fee, provided that the above copyright notice and
|
|
|
|
* all paragraphs of this notice appear in all copies, and that the name of IBM
|
|
|
|
* not be used in connection with the marketing of any product incorporating
|
|
|
|
* the Software or modifications thereof, without specific, written prior
|
|
|
|
* permission.
|
|
|
|
*
|
|
|
|
* To the extent it has a right to do so, IBM grants an immunity from suit
|
|
|
|
* under its patents, if any, for the use, sale or manufacture of products to
|
|
|
|
* the extent that such products are used for performing Domain Name System
|
|
|
|
* dynamic updates in TCP/IP networks by means of the Software. No immunity is
|
|
|
|
* granted for any product per se or for any other function of any product.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES,
|
|
|
|
* INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
|
|
|
|
* PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL,
|
|
|
|
* DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN
|
|
|
|
* IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
2000-05-09 05:28:41 +00:00
|
|
|
#if !defined(HAVE_B64_NTOP) && !defined(HAVE___B64_NTOP)
|
- Remove references to SSLeay.
- Big OpenBSD CVS update
- markus@cvs.openbsd.org
[clientloop.c]
- typo
[session.c]
- update proctitle on pty alloc/dealloc, e.g. w/ windows client
[session.c]
- update proctitle for proto 1, too
[channels.h nchan.c serverloop.c session.c sshd.c]
- use c-style comments
- deraadt@cvs.openbsd.org
[scp.c]
- more atomicio
- markus@cvs.openbsd.org
[channels.c]
- set O_NONBLOCK
[ssh.1]
- update AUTHOR
[readconf.c ssh-keygen.c ssh.h]
- default DSA key file ~/.ssh/id_dsa
[clientloop.c]
- typo, rm verbose debug
- deraadt@cvs.openbsd.org
[ssh-keygen.1]
- document DSA use of ssh-keygen
[sshd.8]
- a start at describing what i understand of the DSA side
[ssh-keygen.1]
- document -X and -x
[ssh-keygen.c]
- simplify usage
- markus@cvs.openbsd.org
[sshd.8]
- there is no rhosts_dsa
[ssh-keygen.1]
- document -y, update -X,-x
[nchan.c]
- fix close for non-open ssh1 channels
[servconf.c servconf.h ssh.h sshd.8 sshd.c ]
- s/DsaKey/HostDSAKey/, document option
[sshconnect2.c]
- respect number_of_password_prompts
[channels.c channels.h servconf.c servconf.h session.c sshd.8]
- GatewayPorts for sshd, ok deraadt@
[ssh-add.1 ssh-agent.1 ssh.1]
- more doc on: DSA, id_dsa, known_hosts2, authorized_keys2
[ssh.1]
- more info on proto 2
[sshd.8]
- sync AUTHOR w/ ssh.1
[key.c key.h sshconnect.c]
- print key type when talking about host keys
[packet.c]
- clear padding in ssh2
[dsa.c key.c radix.c ssh.h sshconnect1.c uuencode.c uuencode.h]
- replace broken uuencode w/ libc b64_ntop
[auth2.c]
- log failure before sending the reply
[key.c radix.c uuencode.c]
- remote trailing comments before calling __b64_pton
[auth2.c readconf.c readconf.h servconf.c servconf.h ssh.1]
[sshconnect2.c sshd.8]
- add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8
- Bring in b64_ntop and b64_pton from OpenBSD libc (bsd-base64.[ch])
2000-05-07 02:03:14 +00:00
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
2000-05-09 05:28:41 +00:00
|
|
|
#include "bsd-base64.h"
|
|
|
|
|
- Remove references to SSLeay.
- Big OpenBSD CVS update
- markus@cvs.openbsd.org
[clientloop.c]
- typo
[session.c]
- update proctitle on pty alloc/dealloc, e.g. w/ windows client
[session.c]
- update proctitle for proto 1, too
[channels.h nchan.c serverloop.c session.c sshd.c]
- use c-style comments
- deraadt@cvs.openbsd.org
[scp.c]
- more atomicio
- markus@cvs.openbsd.org
[channels.c]
- set O_NONBLOCK
[ssh.1]
- update AUTHOR
[readconf.c ssh-keygen.c ssh.h]
- default DSA key file ~/.ssh/id_dsa
[clientloop.c]
- typo, rm verbose debug
- deraadt@cvs.openbsd.org
[ssh-keygen.1]
- document DSA use of ssh-keygen
[sshd.8]
- a start at describing what i understand of the DSA side
[ssh-keygen.1]
- document -X and -x
[ssh-keygen.c]
- simplify usage
- markus@cvs.openbsd.org
[sshd.8]
- there is no rhosts_dsa
[ssh-keygen.1]
- document -y, update -X,-x
[nchan.c]
- fix close for non-open ssh1 channels
[servconf.c servconf.h ssh.h sshd.8 sshd.c ]
- s/DsaKey/HostDSAKey/, document option
[sshconnect2.c]
- respect number_of_password_prompts
[channels.c channels.h servconf.c servconf.h session.c sshd.8]
- GatewayPorts for sshd, ok deraadt@
[ssh-add.1 ssh-agent.1 ssh.1]
- more doc on: DSA, id_dsa, known_hosts2, authorized_keys2
[ssh.1]
- more info on proto 2
[sshd.8]
- sync AUTHOR w/ ssh.1
[key.c key.h sshconnect.c]
- print key type when talking about host keys
[packet.c]
- clear padding in ssh2
[dsa.c key.c radix.c ssh.h sshconnect1.c uuencode.c uuencode.h]
- replace broken uuencode w/ libc b64_ntop
[auth2.c]
- log failure before sending the reply
[key.c radix.c uuencode.c]
- remote trailing comments before calling __b64_pton
[auth2.c readconf.c readconf.h servconf.c servconf.h ssh.1]
[sshconnect2.c sshd.8]
- add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8
- Bring in b64_ntop and b64_pton from OpenBSD libc (bsd-base64.[ch])
2000-05-07 02:03:14 +00:00
|
|
|
#define Assert(Cond) if (!(Cond)) abort()
|
|
|
|
|
|
|
|
static const char Base64[] =
|
|
|
|
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
|
|
|
|
static const char Pad64 = '=';
|
|
|
|
|
|
|
|
/* (From RFC1521 and draft-ietf-dnssec-secext-03.txt)
|
|
|
|
The following encoding technique is taken from RFC 1521 by Borenstein
|
|
|
|
and Freed. It is reproduced here in a slightly edited form for
|
|
|
|
convenience.
|
|
|
|
|
|
|
|
A 65-character subset of US-ASCII is used, enabling 6 bits to be
|
|
|
|
represented per printable character. (The extra 65th character, "=",
|
|
|
|
is used to signify a special processing function.)
|
|
|
|
|
|
|
|
The encoding process represents 24-bit groups of input bits as output
|
|
|
|
strings of 4 encoded characters. Proceeding from left to right, a
|
|
|
|
24-bit input group is formed by concatenating 3 8-bit input groups.
|
|
|
|
These 24 bits are then treated as 4 concatenated 6-bit groups, each
|
|
|
|
of which is translated into a single digit in the base64 alphabet.
|
|
|
|
|
|
|
|
Each 6-bit group is used as an index into an array of 64 printable
|
|
|
|
characters. The character referenced by the index is placed in the
|
|
|
|
output string.
|
|
|
|
|
|
|
|
Table 1: The Base64 Alphabet
|
|
|
|
|
|
|
|
Value Encoding Value Encoding Value Encoding Value Encoding
|
|
|
|
0 A 17 R 34 i 51 z
|
|
|
|
1 B 18 S 35 j 52 0
|
|
|
|
2 C 19 T 36 k 53 1
|
|
|
|
3 D 20 U 37 l 54 2
|
|
|
|
4 E 21 V 38 m 55 3
|
|
|
|
5 F 22 W 39 n 56 4
|
|
|
|
6 G 23 X 40 o 57 5
|
|
|
|
7 H 24 Y 41 p 58 6
|
|
|
|
8 I 25 Z 42 q 59 7
|
|
|
|
9 J 26 a 43 r 60 8
|
|
|
|
10 K 27 b 44 s 61 9
|
|
|
|
11 L 28 c 45 t 62 +
|
|
|
|
12 M 29 d 46 u 63 /
|
|
|
|
13 N 30 e 47 v
|
|
|
|
14 O 31 f 48 w (pad) =
|
|
|
|
15 P 32 g 49 x
|
|
|
|
16 Q 33 h 50 y
|
|
|
|
|
|
|
|
Special processing is performed if fewer than 24 bits are available
|
|
|
|
at the end of the data being encoded. A full encoding quantum is
|
|
|
|
always completed at the end of a quantity. When fewer than 24 input
|
|
|
|
bits are available in an input group, zero bits are added (on the
|
|
|
|
right) to form an integral number of 6-bit groups. Padding at the
|
|
|
|
end of the data is performed using the '=' character.
|
|
|
|
|
|
|
|
Since all base64 input is an integral number of octets, only the
|
|
|
|
-------------------------------------------------
|
|
|
|
following cases can arise:
|
|
|
|
|
|
|
|
(1) the final quantum of encoding input is an integral
|
|
|
|
multiple of 24 bits; here, the final unit of encoded
|
|
|
|
output will be an integral multiple of 4 characters
|
|
|
|
with no "=" padding,
|
|
|
|
(2) the final quantum of encoding input is exactly 8 bits;
|
|
|
|
here, the final unit of encoded output will be two
|
|
|
|
characters followed by two "=" padding characters, or
|
|
|
|
(3) the final quantum of encoding input is exactly 16 bits;
|
|
|
|
here, the final unit of encoded output will be three
|
|
|
|
characters followed by one "=" padding character.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
b64_ntop(u_char const *src, size_t srclength, char *target, size_t targsize)
|
|
|
|
{
|
|
|
|
size_t datalength = 0;
|
|
|
|
u_char input[3];
|
|
|
|
u_char output[4];
|
|
|
|
int i;
|
|
|
|
|
|
|
|
while (2 < srclength) {
|
|
|
|
input[0] = *src++;
|
|
|
|
input[1] = *src++;
|
|
|
|
input[2] = *src++;
|
|
|
|
srclength -= 3;
|
|
|
|
|
|
|
|
output[0] = input[0] >> 2;
|
|
|
|
output[1] = ((input[0] & 0x03) << 4) + (input[1] >> 4);
|
|
|
|
output[2] = ((input[1] & 0x0f) << 2) + (input[2] >> 6);
|
|
|
|
output[3] = input[2] & 0x3f;
|
|
|
|
Assert(output[0] < 64);
|
|
|
|
Assert(output[1] < 64);
|
|
|
|
Assert(output[2] < 64);
|
|
|
|
Assert(output[3] < 64);
|
|
|
|
|
|
|
|
if (datalength + 4 > targsize)
|
|
|
|
return (-1);
|
|
|
|
target[datalength++] = Base64[output[0]];
|
|
|
|
target[datalength++] = Base64[output[1]];
|
|
|
|
target[datalength++] = Base64[output[2]];
|
|
|
|
target[datalength++] = Base64[output[3]];
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Now we worry about padding. */
|
|
|
|
if (0 != srclength) {
|
|
|
|
/* Get what's left. */
|
|
|
|
input[0] = input[1] = input[2] = '\0';
|
|
|
|
for (i = 0; i < srclength; i++)
|
|
|
|
input[i] = *src++;
|
|
|
|
|
|
|
|
output[0] = input[0] >> 2;
|
|
|
|
output[1] = ((input[0] & 0x03) << 4) + (input[1] >> 4);
|
|
|
|
output[2] = ((input[1] & 0x0f) << 2) + (input[2] >> 6);
|
|
|
|
Assert(output[0] < 64);
|
|
|
|
Assert(output[1] < 64);
|
|
|
|
Assert(output[2] < 64);
|
|
|
|
|
|
|
|
if (datalength + 4 > targsize)
|
|
|
|
return (-1);
|
|
|
|
target[datalength++] = Base64[output[0]];
|
|
|
|
target[datalength++] = Base64[output[1]];
|
|
|
|
if (srclength == 1)
|
|
|
|
target[datalength++] = Pad64;
|
|
|
|
else
|
|
|
|
target[datalength++] = Base64[output[2]];
|
|
|
|
target[datalength++] = Pad64;
|
|
|
|
}
|
|
|
|
if (datalength >= targsize)
|
|
|
|
return (-1);
|
|
|
|
target[datalength] = '\0'; /* Returned value doesn't count \0. */
|
|
|
|
return (datalength);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* skips all whitespace anywhere.
|
|
|
|
converts characters, four at a time, starting at (or after)
|
|
|
|
src from base - 64 numbers into three 8 bit bytes in the target area.
|
|
|
|
it returns the number of data bytes stored at the target, or -1 on error.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
b64_pton(char const *src, u_char *target, size_t targsize)
|
|
|
|
{
|
|
|
|
int tarindex, state, ch;
|
|
|
|
char *pos;
|
|
|
|
|
|
|
|
state = 0;
|
|
|
|
tarindex = 0;
|
|
|
|
|
|
|
|
while ((ch = *src++) != '\0') {
|
|
|
|
if (isspace(ch)) /* Skip whitespace anywhere. */
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (ch == Pad64)
|
|
|
|
break;
|
|
|
|
|
|
|
|
pos = strchr(Base64, ch);
|
|
|
|
if (pos == 0) /* A non-base64 character. */
|
|
|
|
return (-1);
|
|
|
|
|
|
|
|
switch (state) {
|
|
|
|
case 0:
|
|
|
|
if (target) {
|
|
|
|
if (tarindex >= targsize)
|
|
|
|
return (-1);
|
|
|
|
target[tarindex] = (pos - Base64) << 2;
|
|
|
|
}
|
|
|
|
state = 1;
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
if (target) {
|
|
|
|
if (tarindex + 1 >= targsize)
|
|
|
|
return (-1);
|
|
|
|
target[tarindex] |= (pos - Base64) >> 4;
|
|
|
|
target[tarindex+1] = ((pos - Base64) & 0x0f)
|
|
|
|
<< 4 ;
|
|
|
|
}
|
|
|
|
tarindex++;
|
|
|
|
state = 2;
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
if (target) {
|
|
|
|
if (tarindex + 1 >= targsize)
|
|
|
|
return (-1);
|
|
|
|
target[tarindex] |= (pos - Base64) >> 2;
|
|
|
|
target[tarindex+1] = ((pos - Base64) & 0x03)
|
|
|
|
<< 6;
|
|
|
|
}
|
|
|
|
tarindex++;
|
|
|
|
state = 3;
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
if (target) {
|
|
|
|
if (tarindex >= targsize)
|
|
|
|
return (-1);
|
|
|
|
target[tarindex] |= (pos - Base64);
|
|
|
|
}
|
|
|
|
tarindex++;
|
|
|
|
state = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We are done decoding Base-64 chars. Let's see if we ended
|
|
|
|
* on a byte boundary, and/or with erroneous trailing characters.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (ch == Pad64) { /* We got a pad char. */
|
|
|
|
ch = *src++; /* Skip it, get next. */
|
|
|
|
switch (state) {
|
|
|
|
case 0: /* Invalid = in first position */
|
|
|
|
case 1: /* Invalid = in second position */
|
|
|
|
return (-1);
|
|
|
|
|
|
|
|
case 2: /* Valid, means one byte of info */
|
|
|
|
/* Skip any number of spaces. */
|
|
|
|
for (; ch != '\0'; ch = *src++)
|
|
|
|
if (!isspace(ch))
|
|
|
|
break;
|
|
|
|
/* Make sure there is another trailing = sign. */
|
|
|
|
if (ch != Pad64)
|
|
|
|
return (-1);
|
|
|
|
ch = *src++; /* Skip the = */
|
|
|
|
/* Fall through to "single trailing =" case. */
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
|
|
|
|
case 3: /* Valid, means two bytes of info */
|
|
|
|
/*
|
|
|
|
* We know this char is an =. Is there anything but
|
|
|
|
* whitespace after it?
|
|
|
|
*/
|
|
|
|
for (; ch != '\0'; ch = *src++)
|
|
|
|
if (!isspace(ch))
|
|
|
|
return (-1);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now make sure for cases 2 and 3 that the "extra"
|
|
|
|
* bits that slopped past the last full byte were
|
|
|
|
* zeros. If we don't check them, they become a
|
|
|
|
* subliminal channel.
|
|
|
|
*/
|
|
|
|
if (target && target[tarindex] != 0)
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* We ended by seeing the end of the string. Make sure we
|
|
|
|
* have no partial bytes lying around.
|
|
|
|
*/
|
|
|
|
if (state != 0)
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (tarindex);
|
|
|
|
}
|
|
|
|
|
2000-05-09 05:28:41 +00:00
|
|
|
#endif /* !defined(HAVE_B64_NTOP) && !defined(HAVE___B64_NTOP) */
|