SConn.c 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <mp.h>
  4. #include <libsec.h>
  5. #include "SConn.h"
  6. extern int verbose;
  7. typedef struct ConnState {
  8. uchar secret[SHA1dlen];
  9. ulong seqno;
  10. RC4state rc4;
  11. } ConnState;
  12. typedef struct SS{
  13. int fd; // file descriptor for read/write of encrypted data
  14. int alg; // if nonzero, "alg sha rc4_128"
  15. ConnState in, out;
  16. } SS;
  17. static int
  18. SC_secret(SConn *conn, uchar *sigma, int direction)
  19. {
  20. SS *ss = (SS*)(conn->chan);
  21. int nsigma = conn->secretlen;
  22. if(direction != 0){
  23. hmac_sha1(sigma, nsigma, (uchar*)"one", 3, ss->out.secret, nil);
  24. hmac_sha1(sigma, nsigma, (uchar*)"two", 3, ss->in.secret, nil);
  25. }else{
  26. hmac_sha1(sigma, nsigma, (uchar*)"two", 3, ss->out.secret, nil);
  27. hmac_sha1(sigma, nsigma, (uchar*)"one", 3, ss->in.secret, nil);
  28. }
  29. setupRC4state(&ss->in.rc4, ss->in.secret, 16); // restrict to 128 bits
  30. setupRC4state(&ss->out.rc4, ss->out.secret, 16);
  31. ss->alg = 1;
  32. return 0;
  33. }
  34. static void
  35. hash(uchar secret[SHA1dlen], uchar *data, int len, int seqno, uchar d[SHA1dlen])
  36. {
  37. DigestState sha;
  38. uchar seq[4];
  39. seq[0] = seqno>>24;
  40. seq[1] = seqno>>16;
  41. seq[2] = seqno>>8;
  42. seq[3] = seqno;
  43. memset(&sha, 0, sizeof sha);
  44. sha1(secret, SHA1dlen, nil, &sha);
  45. sha1(data, len, nil, &sha);
  46. sha1(seq, 4, d, &sha);
  47. }
  48. static int
  49. verify(uchar secret[SHA1dlen], uchar *data, int len, int seqno, uchar d[SHA1dlen])
  50. {
  51. DigestState sha;
  52. uchar seq[4];
  53. uchar digest[SHA1dlen];
  54. seq[0] = seqno>>24;
  55. seq[1] = seqno>>16;
  56. seq[2] = seqno>>8;
  57. seq[3] = seqno;
  58. memset(&sha, 0, sizeof sha);
  59. sha1(secret, SHA1dlen, nil, &sha);
  60. sha1(data, len, nil, &sha);
  61. sha1(seq, 4, digest, &sha);
  62. return memcmp(d, digest, SHA1dlen);
  63. }
  64. static int
  65. SC_read(SConn *conn, uchar *buf, int n)
  66. {
  67. SS *ss = (SS*)(conn->chan);
  68. uchar count[2], digest[SHA1dlen];
  69. int len, nr;
  70. if(read(ss->fd, count, 2) != 2 || (count[0]&0x80) == 0){
  71. snprint((char*)buf,n,"!SC_read invalid count");
  72. return -1;
  73. }
  74. len = (count[0]&0x7f)<<8 | count[1]; // SSL-style count; no pad
  75. if(ss->alg){
  76. len -= SHA1dlen;
  77. if(len <= 0 || readn(ss->fd, digest, SHA1dlen) != SHA1dlen){
  78. snprint((char*)buf,n,"!SC_read missing sha1");
  79. return -1;
  80. }
  81. if(len > n || readn(ss->fd, buf, len) != len){
  82. snprint((char*)buf,n,"!SC_read missing data");
  83. return -1;
  84. }
  85. rc4(&ss->in.rc4, digest, SHA1dlen);
  86. rc4(&ss->in.rc4, buf, len);
  87. if(verify(ss->in.secret, buf, len, ss->in.seqno, digest) != 0){
  88. snprint((char*)buf,n,"!SC_read integrity check failed");
  89. return -1;
  90. }
  91. }else{
  92. if(len <= 0 || len > n){
  93. snprint((char*)buf,n,"!SC_read implausible record length");
  94. return -1;
  95. }
  96. if( (nr = readn(ss->fd, buf, len)) != len){
  97. snprint((char*)buf,n,"!SC_read expected %d bytes, but got %d", len, nr);
  98. return -1;
  99. }
  100. }
  101. ss->in.seqno++;
  102. return len;
  103. }
  104. static int
  105. SC_write(SConn *conn, uchar *buf, int n)
  106. {
  107. SS *ss = (SS*)(conn->chan);
  108. uchar count[2], digest[SHA1dlen];
  109. int len;
  110. if(n <= 0 || n > Maxmsg+1){
  111. werrstr("!SC_write invalid n %d", n);
  112. return -1;
  113. }
  114. len = n;
  115. if(ss->alg)
  116. len += SHA1dlen;
  117. count[0] = 0x80 | len>>8;
  118. count[1] = len;
  119. if(write(ss->fd, count, 2) != 2){
  120. werrstr("!SC_write invalid count");
  121. return -1;
  122. }
  123. if(ss->alg){
  124. hash(ss->out.secret, buf, n, ss->out.seqno, digest);
  125. rc4(&ss->out.rc4, digest, SHA1dlen);
  126. rc4(&ss->out.rc4, buf, n);
  127. if(write(ss->fd, digest, SHA1dlen) != SHA1dlen ||
  128. write(ss->fd, buf, n) != n){
  129. werrstr("!SC_write error on send");
  130. return -1;
  131. }
  132. }else{
  133. if(write(ss->fd, buf, n) != n){
  134. werrstr("!SC_write error on send");
  135. return -1;
  136. }
  137. }
  138. ss->out.seqno++;
  139. return n;
  140. }
  141. static void
  142. SC_free(SConn *conn)
  143. {
  144. SS *ss = (SS*)(conn->chan);
  145. close(ss->fd);
  146. free(ss);
  147. free(conn);
  148. }
  149. SConn*
  150. newSConn(int fd)
  151. {
  152. SS *ss;
  153. SConn *conn;
  154. if(fd < 0)
  155. return nil;
  156. ss = (SS*)emalloc(sizeof(*ss));
  157. conn = (SConn*)emalloc(sizeof(*conn));
  158. ss->fd = fd;
  159. ss->alg = 0;
  160. conn->chan = (void*)ss;
  161. conn->secretlen = SHA1dlen;
  162. conn->free = SC_free;
  163. conn->secret = SC_secret;
  164. conn->read = SC_read;
  165. conn->write = SC_write;
  166. return conn;
  167. }
  168. void
  169. writerr(SConn *conn, char *s)
  170. {
  171. char buf[Maxmsg];
  172. snprint(buf, Maxmsg, "!%s", s);
  173. conn->write(conn, (uchar*)buf, strlen(buf));
  174. }
  175. int
  176. readstr(SConn *conn, char *s)
  177. {
  178. int n;
  179. n = conn->read(conn, (uchar*)s, Maxmsg);
  180. if(n >= 0){
  181. s[n] = 0;
  182. if(s[0] == '!'){
  183. memmove(s, s+1, n);
  184. n = -1;
  185. }
  186. }else{
  187. strcpy(s, "read error");
  188. }
  189. return n;
  190. }