9 typedef struct ConnState {
10 uchar secret[SHA1dlen];
17 int fd; /* file descriptor for read/write of encrypted data */
18 int alg; /* if nonzero, "alg sha rc4_128" */
23 SC_secret(SConn *conn, uchar *sigma, int direction)
25 SS *ss = (SS*)(conn->chan);
26 int nsigma = conn->secretlen;
29 hmac_sha1(sigma, nsigma, (uchar*)"one", 3, ss->out.secret, nil);
30 hmac_sha1(sigma, nsigma, (uchar*)"two", 3, ss->in.secret, nil);
32 hmac_sha1(sigma, nsigma, (uchar*)"two", 3, ss->out.secret, nil);
33 hmac_sha1(sigma, nsigma, (uchar*)"one", 3, ss->in.secret, nil);
35 setupRC4state(&ss->in.rc4, ss->in.secret, 16); /* restrict to 128 bits */
36 setupRC4state(&ss->out.rc4, ss->out.secret, 16);
42 hash(uchar secret[SHA1dlen], uchar *data, int len, int seqno, uchar d[SHA1dlen])
51 memset(&sha, 0, sizeof sha);
52 sha1(secret, SHA1dlen, nil, &sha);
53 sha1(data, len, nil, &sha);
54 sha1(seq, 4, d, &sha);
58 verify(uchar secret[SHA1dlen], uchar *data, int len, int seqno, uchar d[SHA1dlen])
62 uchar digest[SHA1dlen];
68 memset(&sha, 0, sizeof sha);
69 sha1(secret, SHA1dlen, nil, &sha);
70 sha1(data, len, nil, &sha);
71 sha1(seq, 4, digest, &sha);
72 return memcmp(d, digest, SHA1dlen);
76 SC_read(SConn *conn, uchar *buf, int n)
78 SS *ss = (SS*)(conn->chan);
79 uchar count[2], digest[SHA1dlen];
82 if(read(ss->fd, count, 2) != 2 || (count[0]&0x80) == 0){
83 snprint((char*)buf,n,"!SC_read invalid count");
86 len = (count[0]&0x7f)<<8 | count[1]; /* SSL-style count; no pad */
89 if(len <= 0 || readn(ss->fd, digest, SHA1dlen) != SHA1dlen){
90 snprint((char*)buf,n,"!SC_read missing sha1");
93 if(len > n || readn(ss->fd, buf, len) != len){
94 snprint((char*)buf,n,"!SC_read missing data");
97 rc4(&ss->in.rc4, digest, SHA1dlen);
98 rc4(&ss->in.rc4, buf, len);
99 if(verify(ss->in.secret, buf, len, ss->in.seqno, digest) != 0){
100 snprint((char*)buf,n,"!SC_read integrity check failed");
104 if(len <= 0 || len > n){
105 snprint((char*)buf,n,"!SC_read implausible record length");
108 if( (nr = readn(ss->fd, buf, len)) != len){
109 snprint((char*)buf,n,"!SC_read expected %d bytes, but got %d", len, nr);
118 SC_write(SConn *conn, uchar *buf, int n)
120 SS *ss = (SS*)(conn->chan);
121 uchar count[2], digest[SHA1dlen], enc[Maxmsg+1];
124 if(n <= 0 || n > Maxmsg+1){
125 werrstr("!SC_write invalid n %d", n);
131 count[0] = 0x80 | len>>8;
133 if(write(ss->fd, count, 2) != 2){
134 werrstr("!SC_write invalid count");
138 hash(ss->out.secret, buf, n, ss->out.seqno, digest);
139 rc4(&ss->out.rc4, digest, SHA1dlen);
141 rc4(&ss->out.rc4, enc, n);
142 if(write(ss->fd, digest, SHA1dlen) != SHA1dlen ||
143 write(ss->fd, enc, n) != n){
144 werrstr("!SC_write error on send");
148 if(write(ss->fd, buf, n) != n){
149 werrstr("!SC_write error on send");
160 SS *ss = (SS*)(conn->chan);
175 ss = (SS*)emalloc(sizeof(*ss));
176 conn = (SConn*)emalloc(sizeof(*conn));
179 conn->chan = (void*)ss;
180 conn->secretlen = SHA1dlen;
181 conn->free = SC_free;
182 conn->secret = SC_secret;
183 conn->read = SC_read;
184 conn->write = SC_write;
189 writerr(SConn *conn, char *s)
193 snprint(buf, Maxmsg, "!%s", s);
194 conn->write(conn, (uchar*)buf, strlen(buf));
198 readstr(SConn *conn, char *s)
202 n = conn->read(conn, (uchar*)s, Maxmsg);
210 strcpy(s, "read error");