diff options
author | 1999-09-26 20:53:32 +0000 | |
---|---|---|
committer | 1999-09-26 20:53:32 +0000 | |
commit | 84959968510b547c35dddcbd0b9dcce9f25fdf8f (patch) | |
tree | e37579877300876b034163932595ec47d00e0d8b /usr.bin/ssh/ssh-add.c | |
parent | Increase MAXMAGIS again, and change the reallocation - don't need to (diff) | |
download | wireguard-openbsd-84959968510b547c35dddcbd0b9dcce9f25fdf8f.tar.xz wireguard-openbsd-84959968510b547c35dddcbd0b9dcce9f25fdf8f.zip |
i bet a lot of people didn't know what ssh 1.2.16 had a nice license.
well, except for the patent issues. someone in sweden (forget their
name at the moment) cleaned out most of the patented code, and now
this code removes rsa code. when this is done, it will link against
libssl, but the work isn't completely done yet. then we need to bring
this up to modern days, featurewise.
Diffstat (limited to 'usr.bin/ssh/ssh-add.c')
-rw-r--r-- | usr.bin/ssh/ssh-add.c | 247 |
1 files changed, 247 insertions, 0 deletions
diff --git a/usr.bin/ssh/ssh-add.c b/usr.bin/ssh/ssh-add.c new file mode 100644 index 00000000000..99a8ada1c9a --- /dev/null +++ b/usr.bin/ssh/ssh-add.c @@ -0,0 +1,247 @@ +/* + +ssh-add.c + +Author: Tatu Ylonen <ylo@cs.hut.fi> + +Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland + All rights reserved + +Created: Thu Apr 6 00:52:24 1995 ylo + +Adds an identity to the authentication server, or removes an identity. + +*/ + +#include "includes.h" +RCSID("$Id: ssh-add.c,v 1.1 1999/09/26 20:53:37 deraadt Exp $"); + +#include "randoms.h" +#include "rsa.h" +#include "ssh.h" +#include "xmalloc.h" +#include "authfd.h" + +void delete_file(const char *filename) +{ + RSAPublicKey key; + char *comment; + AuthenticationConnection *ac; + + if (!load_public_key(filename, &key, &comment)) + { + printf("Bad key file %s: %s\n", filename, strerror(errno)); + return; + } + + /* Send the request to the authentication agent. */ + ac = ssh_get_authentication_connection(); + if (!ac) + { + fprintf(stderr, + "Could not open a connection to your authentication agent.\n"); + rsa_clear_public_key(&key); + xfree(comment); + return; + } + if (ssh_remove_identity(ac, &key)) + fprintf(stderr, "Identity removed: %s (%s)\n", filename, comment); + else + fprintf(stderr, "Could not remove identity: %s\n", filename); + rsa_clear_public_key(&key); + xfree(comment); + ssh_close_authentication_connection(ac); +} + +void delete_all() +{ + AuthenticationConnection *ac; + + /* Get a connection to the agent. */ + ac = ssh_get_authentication_connection(); + if (!ac) + { + fprintf(stderr, + "Could not open a connection to your authentication agent.\n"); + return; + } + + /* Send a request to remove all identities. */ + if (ssh_remove_all_identities(ac)) + fprintf(stderr, "All identities removed.\n"); + else + fprintf(stderr, "Failed to remove all identitities.\n"); + + /* Close the connection to the agent. */ + ssh_close_authentication_connection(ac); +} + +void add_file(const char *filename) +{ + RSAPrivateKey key; + RSAPublicKey public_key; + AuthenticationConnection *ac; + char *saved_comment, *comment, *pass; + int first; + + if (!load_public_key(filename, &public_key, &saved_comment)) + { + printf("Bad key file %s: %s\n", filename, strerror(errno)); + return; + } + rsa_clear_public_key(&public_key); + + pass = xstrdup(""); + first = 1; + while (!load_private_key(filename, pass, &key, &comment)) + { + char buf[1024]; + FILE *f; + + /* Free the old passphrase. */ + memset(pass, 0, strlen(pass)); + xfree(pass); + + /* Ask for a passphrase. */ + if (getenv("DISPLAY") && !isatty(fileno(stdin))) + { + sprintf(buf, "ssh-askpass '%sEnter passphrase for %.100s'", + first ? "" : "You entered wrong passphrase. ", + saved_comment); + f = popen(buf, "r"); + if (!fgets(buf, sizeof(buf), f)) + { + pclose(f); + xfree(saved_comment); + return; + } + pclose(f); + if (strchr(buf, '\n')) + *strchr(buf, '\n') = 0; + pass = xstrdup(buf); + } + else + { + if (first) + printf("Need passphrase for %s (%s).\n", filename, saved_comment); + else + printf("Bad passphrase.\n"); + pass = read_passphrase("Enter passphrase: ", 1); + if (strcmp(pass, "") == 0) + { + xfree(saved_comment); + xfree(pass); + return; + } + } + first = 0; + } + memset(pass, 0, strlen(pass)); + xfree(pass); + + xfree(saved_comment); + + /* Send the key to the authentication agent. */ + ac = ssh_get_authentication_connection(); + if (!ac) + { + fprintf(stderr, + "Could not open a connection to your authentication agent.\n"); + rsa_clear_private_key(&key); + xfree(comment); + return; + } + if (ssh_add_identity(ac, &key, comment)) + fprintf(stderr, "Identity added: %s (%s)\n", filename, comment); + else + fprintf(stderr, "Could not add identity: %s\n", filename); + rsa_clear_private_key(&key); + xfree(comment); + ssh_close_authentication_connection(ac); +} + +void list_identities() +{ + AuthenticationConnection *ac; + MP_INT e, n; + int bits, status; + char *comment; + int had_identities; + + ac = ssh_get_authentication_connection(); + if (!ac) + { + fprintf(stderr, "Could not connect to authentication server.\n"); + return; + } + mpz_init(&e); + mpz_init(&n); + had_identities = 0; + for (status = ssh_get_first_identity(ac, &bits, &e, &n, &comment); + status; + status = ssh_get_next_identity(ac, &bits, &e, &n, &comment)) + { + had_identities = 1; + printf("%d ", bits); + mpz_out_str(stdout, 10, &e); + printf(" "); + mpz_out_str(stdout, 10, &n); + printf(" %s\n", comment); + xfree(comment); + } + mpz_clear(&e); + mpz_clear(&n); + if (!had_identities) + printf("The agent has no identities.\n"); + ssh_close_authentication_connection(ac); +} + +int main(int ac, char **av) +{ + struct passwd *pw; + char buf[1024]; + int no_files = 1; + int i; + int deleting = 0; + + for (i = 1; i < ac; i++) + { + if (strcmp(av[i], "-l") == 0) + { + list_identities(); + no_files = 0; /* Don't default-add/delete if -l. */ + continue; + } + if (strcmp(av[i], "-d") == 0) + { + deleting = 1; + continue; + } + if (strcmp(av[i], "-D") == 0) + { + delete_all(); + no_files = 0; + continue; + } + no_files = 0; + if (deleting) + delete_file(av[i]); + else + add_file(av[i]); + } + if (no_files) + { + pw = getpwuid(getuid()); + if (!pw) + { + fprintf(stderr, "No user found with uid %d\n", (int)getuid()); + exit(1); + } + sprintf(buf, "%s/%s", pw->pw_dir, SSH_CLIENT_IDENTITY); + if (deleting) + delete_file(buf); + else + add_file(buf); + } + exit(0); +} |