mirror of
https://github.com/clearml/dropbear
synced 2025-04-05 05:09:39 +00:00
Add '-R' for delayed hostkey option
--HG-- branch : keyondemand
This commit is contained in:
parent
4363b8b32d
commit
58fe1c2d2a
19
cli-kex.c
19
cli-kex.c
@ -147,7 +147,8 @@ void recv_msg_kexdh_reply() {
|
|||||||
TRACE(("leave recv_msg_kexdh_init"))
|
TRACE(("leave recv_msg_kexdh_init"))
|
||||||
}
|
}
|
||||||
|
|
||||||
static void ask_to_confirm(unsigned char* keyblob, unsigned int keybloblen) {
|
static void ask_to_confirm(unsigned char* keyblob, unsigned int keybloblen,
|
||||||
|
const char* algoname) {
|
||||||
|
|
||||||
char* fp = NULL;
|
char* fp = NULL;
|
||||||
FILE *tty = NULL;
|
FILE *tty = NULL;
|
||||||
@ -155,14 +156,16 @@ static void ask_to_confirm(unsigned char* keyblob, unsigned int keybloblen) {
|
|||||||
|
|
||||||
fp = sign_key_fingerprint(keyblob, keybloblen);
|
fp = sign_key_fingerprint(keyblob, keybloblen);
|
||||||
if (cli_opts.always_accept_key) {
|
if (cli_opts.always_accept_key) {
|
||||||
fprintf(stderr, "\nHost '%s' key accepted unconditionally.\n(fingerprint %s)\n",
|
fprintf(stderr, "\nHost '%s' key accepted unconditionally.\n(%s fingerprint %s)\n",
|
||||||
cli_opts.remotehost,
|
cli_opts.remotehost,
|
||||||
|
algoname,
|
||||||
fp);
|
fp);
|
||||||
m_free(fp);
|
m_free(fp);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
fprintf(stderr, "\nHost '%s' is not in the trusted hosts file.\n(fingerprint %s)\nDo you want to continue connecting? (y/n) ",
|
fprintf(stderr, "\nHost '%s' is not in the trusted hosts file.\n(%s fingerprint %s)\nDo you want to continue connecting? (y/n) ",
|
||||||
cli_opts.remotehost,
|
cli_opts.remotehost,
|
||||||
|
algoname,
|
||||||
fp);
|
fp);
|
||||||
m_free(fp);
|
m_free(fp);
|
||||||
|
|
||||||
@ -257,16 +260,17 @@ static void checkhostkey(unsigned char* keyblob, unsigned int keybloblen) {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
algoname = signkey_name_from_type(ses.newkeys->algo_hostkey, &algolen);
|
||||||
|
|
||||||
hostsfile = open_known_hosts_file(&readonly);
|
hostsfile = open_known_hosts_file(&readonly);
|
||||||
if (!hostsfile) {
|
if (!hostsfile) {
|
||||||
ask_to_confirm(keyblob, keybloblen);
|
ask_to_confirm(keyblob, keybloblen, algoname);
|
||||||
/* ask_to_confirm will exit upon failure */
|
/* ask_to_confirm will exit upon failure */
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
line = buf_new(MAX_KNOWNHOSTS_LINE);
|
line = buf_new(MAX_KNOWNHOSTS_LINE);
|
||||||
hostlen = strlen(cli_opts.remotehost);
|
hostlen = strlen(cli_opts.remotehost);
|
||||||
algoname = signkey_name_from_type(ses.newkeys->algo_hostkey, &algolen);
|
|
||||||
|
|
||||||
do {
|
do {
|
||||||
if (buf_getline(line, hostsfile) == DROPBEAR_FAILURE) {
|
if (buf_getline(line, hostsfile) == DROPBEAR_FAILURE) {
|
||||||
@ -319,17 +323,18 @@ static void checkhostkey(unsigned char* keyblob, unsigned int keybloblen) {
|
|||||||
|
|
||||||
/* The keys didn't match. eep. Note that we're "leaking"
|
/* The keys didn't match. eep. Note that we're "leaking"
|
||||||
the fingerprint strings here, but we're exiting anyway */
|
the fingerprint strings here, but we're exiting anyway */
|
||||||
dropbear_exit("\n\nHost key mismatch for %s !\n"
|
dropbear_exit("\n\n%s host key mismatch for %s !\n"
|
||||||
"Fingerprint is %s\n"
|
"Fingerprint is %s\n"
|
||||||
"Expected %s\n"
|
"Expected %s\n"
|
||||||
"If you know that the host key is correct you can\nremove the bad entry from ~/.ssh/known_hosts",
|
"If you know that the host key is correct you can\nremove the bad entry from ~/.ssh/known_hosts",
|
||||||
|
algoname,
|
||||||
cli_opts.remotehost,
|
cli_opts.remotehost,
|
||||||
sign_key_fingerprint(keyblob, keybloblen),
|
sign_key_fingerprint(keyblob, keybloblen),
|
||||||
fingerprint ? fingerprint : "UNKNOWN");
|
fingerprint ? fingerprint : "UNKNOWN");
|
||||||
} while (1); /* keep going 'til something happens */
|
} while (1); /* keep going 'til something happens */
|
||||||
|
|
||||||
/* Key doesn't exist yet */
|
/* Key doesn't exist yet */
|
||||||
ask_to_confirm(keyblob, keybloblen);
|
ask_to_confirm(keyblob, keybloblen, algoname);
|
||||||
|
|
||||||
/* If we get here, they said yes */
|
/* If we get here, they said yes */
|
||||||
|
|
||||||
|
@ -54,6 +54,7 @@
|
|||||||
#include "ecdsa.h"
|
#include "ecdsa.h"
|
||||||
#include "crypto_desc.h"
|
#include "crypto_desc.h"
|
||||||
#include "random.h"
|
#include "random.h"
|
||||||
|
#include "gensignkey.h"
|
||||||
|
|
||||||
static void printhelp(char * progname);
|
static void printhelp(char * progname);
|
||||||
|
|
||||||
@ -133,8 +134,6 @@ int main(int argc, char ** argv) {
|
|||||||
|
|
||||||
int i;
|
int i;
|
||||||
char ** next = 0;
|
char ** next = 0;
|
||||||
sign_key *key = NULL;
|
|
||||||
buffer *buf = NULL;
|
|
||||||
char * filename = NULL;
|
char * filename = NULL;
|
||||||
enum signkey_type keytype = DROPBEAR_SIGNKEY_NONE;
|
enum signkey_type keytype = DROPBEAR_SIGNKEY_NONE;
|
||||||
char * typetext = NULL;
|
char * typetext = NULL;
|
||||||
|
@ -72,7 +72,6 @@ static int get_default_bits(enum signkey_type keytype)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int signkey_generate(enum signkey_type keytype, int bits, const char* filename)
|
int signkey_generate(enum signkey_type keytype, int bits, const char* filename)
|
||||||
{
|
{
|
||||||
sign_key * key = NULL;
|
sign_key * key = NULL;
|
||||||
|
18
keyimport.c
18
keyimport.c
@ -709,19 +709,29 @@ static sign_key *openssh_read(const char *filename, char * UNUSED(passphrase))
|
|||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (len == sizeof(OID_SEC256R1_BLOB)
|
if (0) {}
|
||||||
|
#ifdef DROPBEAR_ECC_256
|
||||||
|
else if (len == sizeof(OID_SEC256R1_BLOB)
|
||||||
&& memcmp(p, OID_SEC256R1_BLOB, len) == 0) {
|
&& memcmp(p, OID_SEC256R1_BLOB, len) == 0) {
|
||||||
retkey->type = DROPBEAR_SIGNKEY_ECDSA_NISTP256;
|
retkey->type = DROPBEAR_SIGNKEY_ECDSA_NISTP256;
|
||||||
curve = &ecc_curve_nistp256;
|
curve = &ecc_curve_nistp256;
|
||||||
} else if (len == sizeof(OID_SEC384R1_BLOB)
|
}
|
||||||
|
#endif
|
||||||
|
#ifdef DROPBEAR_ECC_384
|
||||||
|
else if (len == sizeof(OID_SEC384R1_BLOB)
|
||||||
&& memcmp(p, OID_SEC384R1_BLOB, len) == 0) {
|
&& memcmp(p, OID_SEC384R1_BLOB, len) == 0) {
|
||||||
retkey->type = DROPBEAR_SIGNKEY_ECDSA_NISTP384;
|
retkey->type = DROPBEAR_SIGNKEY_ECDSA_NISTP384;
|
||||||
curve = &ecc_curve_nistp384;
|
curve = &ecc_curve_nistp384;
|
||||||
} else if (len == sizeof(OID_SEC521R1_BLOB)
|
}
|
||||||
|
#endif
|
||||||
|
#ifdef DROPBEAR_ECC_521
|
||||||
|
else if (len == sizeof(OID_SEC521R1_BLOB)
|
||||||
&& memcmp(p, OID_SEC521R1_BLOB, len) == 0) {
|
&& memcmp(p, OID_SEC521R1_BLOB, len) == 0) {
|
||||||
retkey->type = DROPBEAR_SIGNKEY_ECDSA_NISTP521;
|
retkey->type = DROPBEAR_SIGNKEY_ECDSA_NISTP521;
|
||||||
curve = &ecc_curve_nistp521;
|
curve = &ecc_curve_nistp521;
|
||||||
} else {
|
}
|
||||||
|
#endif
|
||||||
|
else {
|
||||||
errmsg = "Unknown ECC key type";
|
errmsg = "Unknown ECC key type";
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
|
19
options.h
19
options.h
@ -8,7 +8,7 @@
|
|||||||
/* Define compile-time options below - the "#ifndef DROPBEAR_XXX .... #endif"
|
/* Define compile-time options below - the "#ifndef DROPBEAR_XXX .... #endif"
|
||||||
* parts are to allow for commandline -DDROPBEAR_XXX options etc. */
|
* parts are to allow for commandline -DDROPBEAR_XXX options etc. */
|
||||||
|
|
||||||
/* Important: Many options will require "make clean" after changes */
|
/* IMPORTANT: Many options will require "make clean" after changes */
|
||||||
|
|
||||||
#ifndef DROPBEAR_DEFPORT
|
#ifndef DROPBEAR_DEFPORT
|
||||||
#define DROPBEAR_DEFPORT "22"
|
#define DROPBEAR_DEFPORT "22"
|
||||||
@ -129,7 +129,7 @@ much traffic. */
|
|||||||
|
|
||||||
/* You can also disable integrity. Don't bother disabling this if you're
|
/* You can also disable integrity. Don't bother disabling this if you're
|
||||||
* still using a cipher, it's relatively cheap. If you disable this it's dead
|
* still using a cipher, it's relatively cheap. If you disable this it's dead
|
||||||
* simple to run arbitrary commands on the remote host. Beware. */
|
* simple for an attacker to run arbitrary commands on the remote host. Beware. */
|
||||||
/* #define DROPBEAR_NONE_INTEGRITY */
|
/* #define DROPBEAR_NONE_INTEGRITY */
|
||||||
|
|
||||||
/* Hostkey/public key algorithms - at least one required, these are used
|
/* Hostkey/public key algorithms - at least one required, these are used
|
||||||
@ -138,15 +138,22 @@ much traffic. */
|
|||||||
* SSH2 RFC Draft requires dss, recommends rsa */
|
* SSH2 RFC Draft requires dss, recommends rsa */
|
||||||
#define DROPBEAR_RSA
|
#define DROPBEAR_RSA
|
||||||
#define DROPBEAR_DSS
|
#define DROPBEAR_DSS
|
||||||
|
|
||||||
#define DROPBEAR_ECDH
|
|
||||||
#define DROPBEAR_ECDSA
|
#define DROPBEAR_ECDSA
|
||||||
|
|
||||||
|
/* Generate hostkeys as-needed when the first connection using that key type occurs.
|
||||||
|
This avoids the need to otherwise run "dropbearkey" and avoids some problems
|
||||||
|
with badly seeded random devices when systems first boot.
|
||||||
|
This also requires a runtime flag "-R". */
|
||||||
|
#define DROPBEAR_DELAY_HOSTKEY
|
||||||
|
|
||||||
/* RSA can be vulnerable to timing attacks which use the time required for
|
/* RSA can be vulnerable to timing attacks which use the time required for
|
||||||
* signing to guess the private key. Blinding avoids this attack, though makes
|
* signing to guess the private key. Blinding avoids this attack, though makes
|
||||||
* signing operations slightly slower. */
|
* signing operations slightly slower. */
|
||||||
#define RSA_BLINDING
|
#define RSA_BLINDING
|
||||||
|
|
||||||
|
/* Enable elliptic curve Diffie Hellman key exchange */
|
||||||
|
#define DROPBEAR_ECDH
|
||||||
|
|
||||||
/* Control the memory/performance/compression tradeoff for zlib.
|
/* Control the memory/performance/compression tradeoff for zlib.
|
||||||
* Set windowBits=8 for least memory usage, see your system's
|
* Set windowBits=8 for least memory usage, see your system's
|
||||||
* zlib.h for full details.
|
* zlib.h for full details.
|
||||||
@ -180,9 +187,9 @@ much traffic. */
|
|||||||
* PAM challenge/response.
|
* PAM challenge/response.
|
||||||
* You can't enable both PASSWORD and PAM. */
|
* You can't enable both PASSWORD and PAM. */
|
||||||
|
|
||||||
//#define ENABLE_SVR_PASSWORD_AUTH
|
#define ENABLE_SVR_PASSWORD_AUTH
|
||||||
/* PAM requires ./configure --enable-pam */
|
/* PAM requires ./configure --enable-pam */
|
||||||
#define ENABLE_SVR_PAM_AUTH
|
/*#define ENABLE_SVR_PAM_AUTH */
|
||||||
#define ENABLE_SVR_PUBKEY_AUTH
|
#define ENABLE_SVR_PUBKEY_AUTH
|
||||||
|
|
||||||
/* Whether to take public key options in
|
/* Whether to take public key options in
|
||||||
|
@ -100,6 +100,8 @@ typedef struct svr_runopts {
|
|||||||
|
|
||||||
sign_key *hostkey;
|
sign_key *hostkey;
|
||||||
|
|
||||||
|
int delay_hostkey;
|
||||||
|
|
||||||
char *hostkey_files[MAX_HOSTKEYS];
|
char *hostkey_files[MAX_HOSTKEYS];
|
||||||
int num_hostkey_files;
|
int num_hostkey_files;
|
||||||
|
|
||||||
|
@ -351,18 +351,24 @@ void sign_key_free(sign_key *key) {
|
|||||||
key->rsakey = NULL;
|
key->rsakey = NULL;
|
||||||
#endif
|
#endif
|
||||||
#ifdef DROPBEAR_ECDSA
|
#ifdef DROPBEAR_ECDSA
|
||||||
|
#ifdef DROPBEAR_ECC_256
|
||||||
if (key->ecckey256) {
|
if (key->ecckey256) {
|
||||||
ecc_free(key->ecckey256);
|
ecc_free(key->ecckey256);
|
||||||
key->ecckey256 = NULL;
|
key->ecckey256 = NULL;
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
#ifdef DROPBEAR_ECC_384
|
||||||
if (key->ecckey384) {
|
if (key->ecckey384) {
|
||||||
ecc_free(key->ecckey384);
|
ecc_free(key->ecckey384);
|
||||||
key->ecckey384 = NULL;
|
key->ecckey384 = NULL;
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
#ifdef DROPBEAR_ECC_521
|
||||||
if (key->ecckey521) {
|
if (key->ecckey521) {
|
||||||
ecc_free(key->ecckey521);
|
ecc_free(key->ecckey521);
|
||||||
key->ecckey521 = NULL;
|
key->ecckey521 = NULL;
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
m_free(key->filename);
|
m_free(key->filename);
|
||||||
|
13
svr-kex.c
13
svr-kex.c
@ -77,6 +77,7 @@ void recv_msg_kexdh_init() {
|
|||||||
TRACE(("leave recv_msg_kexdh_init"))
|
TRACE(("leave recv_msg_kexdh_init"))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef DROPBEAR_DELAY_HOSTKEY
|
||||||
static void svr_ensure_hostkey() {
|
static void svr_ensure_hostkey() {
|
||||||
|
|
||||||
const char* fn = NULL;
|
const char* fn = NULL;
|
||||||
@ -141,7 +142,7 @@ out:
|
|||||||
|
|
||||||
if (ret == DROPBEAR_FAILURE)
|
if (ret == DROPBEAR_FAILURE)
|
||||||
{
|
{
|
||||||
dropbear_exit("Couldn't read or generate hostkey");
|
dropbear_exit("Couldn't read or generate hostkey %s", fn);
|
||||||
}
|
}
|
||||||
|
|
||||||
// directory for keys.
|
// directory for keys.
|
||||||
@ -152,6 +153,7 @@ out:
|
|||||||
// atomic rename, done.
|
// atomic rename, done.
|
||||||
|
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
/* Generate our side of the diffie-hellman key exchange value (dh_f), and
|
/* Generate our side of the diffie-hellman key exchange value (dh_f), and
|
||||||
* calculate the session key using the diffie-hellman algorithm. Following
|
* calculate the session key using the diffie-hellman algorithm. Following
|
||||||
@ -165,8 +167,13 @@ static void send_msg_kexdh_reply(mp_int *dh_e, buffer *ecdh_qs) {
|
|||||||
|
|
||||||
/* we can start creating the kexdh_reply packet */
|
/* we can start creating the kexdh_reply packet */
|
||||||
CHECKCLEARTOWRITE();
|
CHECKCLEARTOWRITE();
|
||||||
|
|
||||||
svr_ensure_hostkey();
|
#ifdef DROPBEAR_DELAY_HOSTKEY
|
||||||
|
if (svr_opts.delay_hostkey)
|
||||||
|
{
|
||||||
|
svr_ensure_hostkey();
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
buf_putbyte(ses.writepayload, SSH_MSG_KEXDH_REPLY);
|
buf_putbyte(ses.writepayload, SSH_MSG_KEXDH_REPLY);
|
||||||
buf_put_pub_key(ses.writepayload, svr_opts.hostkey,
|
buf_put_pub_key(ses.writepayload, svr_opts.hostkey,
|
||||||
|
@ -44,13 +44,19 @@ static void printhelp(const char * progname) {
|
|||||||
"-b bannerfile Display the contents of bannerfile"
|
"-b bannerfile Display the contents of bannerfile"
|
||||||
" before user login\n"
|
" before user login\n"
|
||||||
" (default: none)\n"
|
" (default: none)\n"
|
||||||
|
"-r keyfile Specify hostkeys (repeatable)\n"
|
||||||
|
" defaults: \n"
|
||||||
#ifdef DROPBEAR_DSS
|
#ifdef DROPBEAR_DSS
|
||||||
"-d dsskeyfile Use dsskeyfile for the DSS host key\n"
|
" dss %s\n"
|
||||||
" (default: %s)\n"
|
|
||||||
#endif
|
#endif
|
||||||
#ifdef DROPBEAR_RSA
|
#ifdef DROPBEAR_RSA
|
||||||
"-r rsakeyfile Use rsakeyfile for the RSA host key\n"
|
" rsa %s\n"
|
||||||
" (default: %s)\n"
|
#endif
|
||||||
|
#ifdef DROPBEAR_ECDSA
|
||||||
|
" ecdsa %s\n"
|
||||||
|
#endif
|
||||||
|
#ifdef DROPBEAR_DELAY_HOSTKEY
|
||||||
|
"-R Create hostkeys as required\n"
|
||||||
#endif
|
#endif
|
||||||
"-F Don't fork into background\n"
|
"-F Don't fork into background\n"
|
||||||
#ifdef DISABLE_SYSLOG
|
#ifdef DISABLE_SYSLOG
|
||||||
@ -95,6 +101,9 @@ static void printhelp(const char * progname) {
|
|||||||
#endif
|
#endif
|
||||||
#ifdef DROPBEAR_RSA
|
#ifdef DROPBEAR_RSA
|
||||||
RSA_PRIV_FILENAME,
|
RSA_PRIV_FILENAME,
|
||||||
|
#endif
|
||||||
|
#ifdef DROPBEAR_ECDSA
|
||||||
|
ECDSA_PRIV_FILENAME,
|
||||||
#endif
|
#endif
|
||||||
DROPBEAR_MAX_PORTS, DROPBEAR_DEFPORT, DROPBEAR_PIDFILE,
|
DROPBEAR_MAX_PORTS, DROPBEAR_DEFPORT, DROPBEAR_PIDFILE,
|
||||||
DEFAULT_RECV_WINDOW, DEFAULT_KEEPALIVE, DEFAULT_IDLE_TIMEOUT);
|
DEFAULT_RECV_WINDOW, DEFAULT_KEEPALIVE, DEFAULT_IDLE_TIMEOUT);
|
||||||
@ -122,6 +131,7 @@ void svr_getopts(int argc, char ** argv) {
|
|||||||
svr_opts.inetdmode = 0;
|
svr_opts.inetdmode = 0;
|
||||||
svr_opts.portcount = 0;
|
svr_opts.portcount = 0;
|
||||||
svr_opts.hostkey = NULL;
|
svr_opts.hostkey = NULL;
|
||||||
|
svr_opts.delay_hostkey = 0;
|
||||||
svr_opts.pidfile = DROPBEAR_PIDFILE;
|
svr_opts.pidfile = DROPBEAR_PIDFILE;
|
||||||
#ifdef ENABLE_SVR_LOCALTCPFWD
|
#ifdef ENABLE_SVR_LOCALTCPFWD
|
||||||
svr_opts.nolocaltcp = 0;
|
svr_opts.nolocaltcp = 0;
|
||||||
@ -180,6 +190,9 @@ void svr_getopts(int argc, char ** argv) {
|
|||||||
case 'r':
|
case 'r':
|
||||||
next = &keyfile;
|
next = &keyfile;
|
||||||
break;
|
break;
|
||||||
|
case 'R':
|
||||||
|
svr_opts.delay_hostkey = 1;
|
||||||
|
break;
|
||||||
case 'F':
|
case 'F':
|
||||||
svr_opts.forkbg = 0;
|
svr_opts.forkbg = 0;
|
||||||
break;
|
break;
|
||||||
@ -390,7 +403,7 @@ static void loadhostkey_helper(const char *name, void** src, void** dst, int fat
|
|||||||
/* Must be called after syslog/etc is working */
|
/* Must be called after syslog/etc is working */
|
||||||
static void loadhostkey(const char *keyfile, int fatal_duplicate) {
|
static void loadhostkey(const char *keyfile, int fatal_duplicate) {
|
||||||
sign_key * read_key = new_sign_key();
|
sign_key * read_key = new_sign_key();
|
||||||
int type = DROPBEAR_SIGNKEY_ANY;
|
enum signkey_type type = DROPBEAR_SIGNKEY_ANY;
|
||||||
if (readhostkey(keyfile, read_key, &type) == DROPBEAR_FAILURE) {
|
if (readhostkey(keyfile, read_key, &type) == DROPBEAR_FAILURE) {
|
||||||
dropbear_log(LOG_WARNING, "Failed loading %s", keyfile);
|
dropbear_log(LOG_WARNING, "Failed loading %s", keyfile);
|
||||||
}
|
}
|
||||||
@ -438,6 +451,7 @@ static void addhostkey(const char *keyfile) {
|
|||||||
|
|
||||||
void load_all_hostkeys() {
|
void load_all_hostkeys() {
|
||||||
int i;
|
int i;
|
||||||
|
int disable_unset_keys = 1;
|
||||||
|
|
||||||
svr_opts.hostkey = new_sign_key();
|
svr_opts.hostkey = new_sign_key();
|
||||||
|
|
||||||
@ -459,31 +473,47 @@ void load_all_hostkeys() {
|
|||||||
loadhostkey(ECDSA_PRIV_FILENAME, 0);
|
loadhostkey(ECDSA_PRIV_FILENAME, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifdef DROPBEAR_DELAY_HOSTKEY
|
||||||
|
if (svr_opts.delay_hostkey)
|
||||||
|
{
|
||||||
|
disable_unset_keys = 0;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
#ifdef DROPBEAR_RSA
|
#ifdef DROPBEAR_RSA
|
||||||
if (!svr_opts.hostkey->rsakey) {
|
if (disable_unset_keys && !svr_opts.hostkey->rsakey) {
|
||||||
disablekey(DROPBEAR_SIGNKEY_RSA);
|
disablekey(DROPBEAR_SIGNKEY_RSA);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef DROPBEAR_DSS
|
#ifdef DROPBEAR_DSS
|
||||||
if (!svr_opts.hostkey->dsskey) {
|
if (disable_unset_keys && !svr_opts.hostkey->dsskey) {
|
||||||
disablekey(DROPBEAR_SIGNKEY_RSA);
|
disablekey(DROPBEAR_SIGNKEY_RSA);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
#ifdef DROPBEAR_ECDSA
|
#ifdef DROPBEAR_ECDSA
|
||||||
#ifdef DROPBEAR_ECC_256
|
#ifdef DROPBEAR_ECC_256
|
||||||
if (!svr_opts.hostkey->ecckey256) {
|
if ((disable_unset_keys || ECDSA_DEFAULT_SIZE != 256)
|
||||||
|
&& !svr_opts.hostkey->ecckey256) {
|
||||||
disablekey(DROPBEAR_SIGNKEY_ECDSA_NISTP256);
|
disablekey(DROPBEAR_SIGNKEY_ECDSA_NISTP256);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef DROPBEAR_ECC_384
|
#ifdef DROPBEAR_ECC_384
|
||||||
if (!svr_opts.hostkey->ecckey384) {
|
if ((disable_unset_keys || ECDSA_DEFAULT_SIZE != 384)
|
||||||
|
&& !svr_opts.hostkey->ecckey384) {
|
||||||
disablekey(DROPBEAR_SIGNKEY_ECDSA_NISTP384);
|
disablekey(DROPBEAR_SIGNKEY_ECDSA_NISTP384);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef DROPBEAR_ECC_521
|
#ifdef DROPBEAR_ECC_521
|
||||||
if (!svr_opts.hostkey->ecckey521) {
|
if ((disable_unset_keys || ECDSA_DEFAULT_SIZE != 521)
|
||||||
//disablekey(DROPBEAR_SIGNKEY_ECDSA_NISTP521);
|
&& !svr_opts.hostkey->ecckey521) {
|
||||||
|
disablekey(DROPBEAR_SIGNKEY_ECDSA_NISTP521);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
#endif
|
#endif /* DROPBEAR_ECDSA */
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -104,21 +104,22 @@
|
|||||||
#define DROPBEAR_LTC_PRNG
|
#define DROPBEAR_LTC_PRNG
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
// hashes which will be linked and registered
|
/* hashes which will be linked and registered */
|
||||||
#if defined(DROPBEAR_SHA2_256_HMAC) || defined(DROPBEAR_ECC_256)
|
#if defined(DROPBEAR_SHA2_256_HMAC) || defined(DROPBEAR_ECC_256)
|
||||||
#define DROPBEAR_SHA256
|
#define DROPBEAR_SHA256
|
||||||
#endif
|
#endif
|
||||||
#if defined(DROPBEAR_ECC_384)
|
#if defined(DROPBEAR_ECC_384)
|
||||||
#define DROPBEAR_SHA384
|
#define DROPBEAR_SHA384
|
||||||
#endif
|
#endif
|
||||||
#if defined(DROPBEAR_SHA2_512_HMAC) || defined(DROPBEAR_ECC_521)
|
/* LTC SHA384 depends on SHA512 */
|
||||||
|
#if defined(DROPBEAR_SHA2_512_HMAC) || defined(DROPBEAR_ECC_521) || defined(DROPBEAR_ECC_384)
|
||||||
#define DROPBEAR_SHA512
|
#define DROPBEAR_SHA512
|
||||||
#endif
|
#endif
|
||||||
#if defined(DROPBEAR_MD5_HMAC)
|
#if defined(DROPBEAR_MD5_HMAC)
|
||||||
#define DROPBEAR_MD5
|
#define DROPBEAR_MD5
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
// roughly 2x 521 bits
|
/* roughly 2x 521 bits */
|
||||||
#define MAX_ECC_SIZE 140
|
#define MAX_ECC_SIZE 140
|
||||||
|
|
||||||
#define MAX_NAME_LEN 64 /* maximum length of a protocol name, isn't
|
#define MAX_NAME_LEN 64 /* maximum length of a protocol name, isn't
|
||||||
|
Loading…
Reference in New Issue
Block a user