summaryrefslogtreecommitdiffstats
path: root/src/lib/crypto/dk/dk_encrypt.c
Commit message (Collapse)AuthorAgeFilesLines
* Crypto modularity proj: Separate files under crypto directory based on their ↵Zhanna Tsitkov2009-08-031-358/+0
| | | | | | | | functionality. Move Kerberos specific files into krb subdir and MIT specific - into builtin subdir. Place all tests into crypto_tests subfolder. bigredbutton: whitespace git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@22477 dc483132-0cff-0310-8789-dd5450dbe970
* Use 16/32-bit big/little-endian store functions in more placesKen Raeburn2009-01-261-8/+2
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@21796 dc483132-0cff-0310-8789-dd5450dbe970
* After malloc/realloc/calloc failures, return ENOMEM explicitly insteadKen Raeburn2008-04-301-1/+1
| | | | | | | of reading it from errno. This may make static analysis tools less confused about when we return zero vs nonzero values. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@20312 dc483132-0cff-0310-8789-dd5450dbe970
* Fix various gcc warnings about pointer target signedness and qualifiersKen Raeburn2007-05-101-8/+10
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@19548 dc483132-0cff-0310-8789-dd5450dbe970
* shsUpdate should take an unsigned int for lengthEzra Peisach2006-04-201-1/+1
| | | | | | | | | | | | | | Update shsUpdate to take an unsigned int length instead of signed. The code already assumes that it is an integer >= 0. This change cleans up a number of signed/unsigned warnings. sha1/shs.h, shs.c, t_shs.c: change ints to unsigned int dk/dk_encrypt.c: static function trunc_hmac change a signed int to unsigned hash_provider/hash_sha1.c: Remove cast in argument to shsUpdate ticket: new git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@17945 dc483132-0cff-0310-8789-dd5450dbe970
* Remove ENCTYPE_LOCAL_DES3_HMAC_SHA1Sam Hartman2004-02-241-147/+0
| | | | | | | | | | Previously, MIT had support for a version of the des3 enctype with a 32-bit length prepended to encrypted data. Remove that support. This is non-standard and is no longer needed even at MIT. Ticket: new git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@16122 dc483132-0cff-0310-8789-dd5450dbe970
* protoizeKen Raeburn2004-02-191-26/+16
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@16102 dc483132-0cff-0310-8789-dd5450dbe970
* * dk_decrypt.c (krb5_dk_decrypt_maybe_trunc_hmac): New argument IVEC_MODE. IfKen Raeburn2004-02-131-4/+24
| | | | | | | | | | | | clear, same old behavior. If set, copy out next to last block for CTS. (krb5_dk_decrypt, krb5int_aes_dk_decrypt): Pass extra argument. * dk_encrypt.c (krb5int_aes_dk_encrypt): For IV, copy out next to last block for CTS. ticket: 2229 status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@16077 dc483132-0cff-0310-8789-dd5450dbe970
* Change crypto "provider" structures to hold numeric values instead of functionKen Raeburn2003-07-221-14/+15
| | | | | | | pointers for key sizes, block sizes, etc., when the values are always constant for each encryption or hash mechanism. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15714 dc483132-0cff-0310-8789-dd5450dbe970
* * dk_encrypt.c (krb5int_aes_dk_encrypt): Set output length properlyKen Raeburn2003-04-181-0/+2
| | | | | | | ticket: 1418 status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15357 dc483132-0cff-0310-8789-dd5450dbe970
* Finish implementation of CBC+CTS decryption and truncated HMAC for AES.Ken Raeburn2003-04-131-1/+171
| | | | | | | | | Fix memory management bugs. ticket: 1418 status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15351 dc483132-0cff-0310-8789-dd5450dbe970
* krb5_const -> constKen Raeburn2001-03-061-14/+14
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13058 dc483132-0cff-0310-8789-dd5450dbe970
* pullup from 1.2 branchKen Raeburn2000-06-271-4/+26
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12442 dc483132-0cff-0310-8789-dd5450dbe970
* Various changes to:Ken Raeburn2000-01-221-10/+10
| | | | | | | | | | | | | | * make most non-changing data const * silence "gcc -Wall -Werror" complaints on sparc-solaris2.6 ** delete unused functions and variables ** change if(a=b) ... to if((a=b)) or if((a=b)!=0) [yeah, kinda gratuitous] ** insert extra braces for 2-D arrays * some basic thread safety checks Not changing afsstring2key.c until I make sure I've got some tests for it. Currently, prng.c and afsstring2key.c, at least, still aren't thread-safe. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11959 dc483132-0cff-0310-8789-dd5450dbe970
* * dk_encrypt.c (krb5_marc_dk_encrypt): CallTom Yu1999-06-291-1/+1
| | | | | | | krb5_marc_dk_encrypt_length() instead of krb5_dk_encrypt_length() to prevent blocksize errors. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11532 dc483132-0cff-0310-8789-dd5450dbe970
* * dk.h: Add prototypes for krb5_marc_dk_*Tom Yu1999-01-051-0/+137
| | | | | | | | | | | | | | * dk_encrypt.c (krb5_marc_dk_encrypt): Add compat for 32-bit length coded ciphertext. * dk_decrypt.c (krb5_marc_dk_decrypt): Add compat for 32-bit length coded ciphertext. * checksum.c: Add compat for 32-bit length included checksum. Note that nothing uses this at the moment, and probably shouldn't. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11098 dc483132-0cff-0310-8789-dd5450dbe970
* Make sure filenames are unique across all of the krb5 directories. RenamedTheodore Tso1998-11-051-0/+167
all of the */encrypt.c and */decrypt.c files to {dk,raw,old}_{en,de}crypt.c. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@11014 dc483132-0cff-0310-8789-dd5450dbe970