diff options
| author | Greg Hudson <ghudson@mit.edu> | 2009-11-28 00:43:34 +0000 |
|---|---|---|
| committer | Greg Hudson <ghudson@mit.edu> | 2009-11-28 00:43:34 +0000 |
| commit | 65577cf37ab5831e736dd5db8459c0927cd3e224 (patch) | |
| tree | 49d60364bcfaa50cd849568b7313d92e1388d28c /src/lib/crypto/openssl/enc_provider | |
| parent | 9fde1f049d4f2205a9cccdc82278d93e6eaad748 (diff) | |
| download | krb5-65577cf37ab5831e736dd5db8459c0927cd3e224.tar.gz krb5-65577cf37ab5831e736dd5db8459c0927cd3e224.tar.xz krb5-65577cf37ab5831e736dd5db8459c0927cd3e224.zip | |
Mark and reindent lib/crypto
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@23374 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/crypto/openssl/enc_provider')
| -rw-r--r-- | src/lib/crypto/openssl/enc_provider/aes.c | 81 | ||||
| -rw-r--r-- | src/lib/crypto/openssl/enc_provider/des.c | 21 | ||||
| -rw-r--r-- | src/lib/crypto/openssl/enc_provider/des3.c | 49 | ||||
| -rw-r--r-- | src/lib/crypto/openssl/enc_provider/enc_provider.h | 1 | ||||
| -rw-r--r-- | src/lib/crypto/openssl/enc_provider/rc4.c | 21 |
5 files changed, 89 insertions, 84 deletions
diff --git a/src/lib/crypto/openssl/enc_provider/aes.c b/src/lib/crypto/openssl/enc_provider/aes.c index 51ba8afa6..519a1b54a 100644 --- a/src/lib/crypto/openssl/enc_provider/aes.c +++ b/src/lib/crypto/openssl/enc_provider/aes.c @@ -1,3 +1,4 @@ +/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ /* * lib/crypto/openssl/enc_provider/aes.c * @@ -36,22 +37,22 @@ /* proto's */ static krb5_error_code cts_enc(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output); + const krb5_data *input, krb5_data *output); static krb5_error_code cbc_enc(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output); + const krb5_data *input, krb5_data *output); static krb5_error_code cts_decr(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output); + const krb5_data *input, krb5_data *output); static krb5_error_code cbc_decr(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output); + const krb5_data *input, krb5_data *output); static krb5_error_code cts_encr_iov(krb5_key key, const krb5_data *ivec, - krb5_crypto_iov *data, size_t num_data, size_t dlen); + krb5_crypto_iov *data, size_t num_data, size_t dlen); static krb5_error_code cts_decr_iov(krb5_key key, const krb5_data *ivec, - krb5_crypto_iov *data, size_t num_data, size_t dlen); + krb5_crypto_iov *data, size_t num_data, size_t dlen); #define BLOCK_SIZE 16 #define NUM_BITS 8 @@ -70,7 +71,7 @@ map_mode(unsigned int len) static krb5_error_code cbc_enc(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { int ret = 0, tmp_len = 0; unsigned char *tmp_buf = NULL; @@ -85,12 +86,12 @@ cbc_enc(krb5_key key, const krb5_data *ivec, EVP_CIPHER_CTX_init(&ciph_ctx); ret = EVP_EncryptInit_ex(&ciph_ctx, map_mode(key->keyblock.length), - NULL, key->keyblock.contents, (ivec) ? (unsigned char*)ivec->data : NULL); + NULL, key->keyblock.contents, (ivec) ? (unsigned char*)ivec->data : NULL); if (ret == 1){ EVP_CIPHER_CTX_set_padding(&ciph_ctx,0); ret = EVP_EncryptUpdate(&ciph_ctx, tmp_buf, &tmp_len, - (unsigned char *)input->data, input->length); + (unsigned char *)input->data, input->length); output->length = tmp_len; if(ret) ret = EVP_EncryptFinal_ex(&ciph_ctx,tmp_buf+tmp_len,&tmp_len); @@ -113,7 +114,7 @@ cbc_enc(krb5_key key, const krb5_data *ivec, static krb5_error_code cbc_decr(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { int ret = 0, tmp_len = 0; unsigned char *tmp_buf = NULL; @@ -128,11 +129,11 @@ cbc_decr(krb5_key key, const krb5_data *ivec, EVP_CIPHER_CTX_init(&ciph_ctx); ret = EVP_DecryptInit_ex(&ciph_ctx, map_mode(key->keyblock.length), - NULL, key->keyblock.contents, (ivec) ? (unsigned char*)ivec->data : NULL); + NULL, key->keyblock.contents, (ivec) ? (unsigned char*)ivec->data : NULL); if (ret == 1) { EVP_CIPHER_CTX_set_padding(&ciph_ctx,0); ret = EVP_EncryptUpdate(&ciph_ctx, tmp_buf, &tmp_len, - (unsigned char *)input->data, input->length); + (unsigned char *)input->data, input->length); output->length = tmp_len; if (ret == 1) ret = EVP_DecryptFinal_ex(&ciph_ctx,tmp_buf+tmp_len,&tmp_len); @@ -156,7 +157,7 @@ cbc_decr(krb5_key key, const krb5_data *ivec, static krb5_error_code cts_enc(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { int ret = 0, tmp_len = 0; size_t size = 0; @@ -177,7 +178,7 @@ cts_enc(krb5_key key, const krb5_data *ivec, tmp_len = input->length; AES_set_encrypt_key(key->keyblock.contents, - NUM_BITS * key->keyblock.length, &enck); + NUM_BITS * key->keyblock.length, &enck); size = CRYPTO_cts128_encrypt((unsigned char *)input->data, tmp_buf, input->length, &enck, @@ -201,7 +202,7 @@ cts_enc(krb5_key key, const krb5_data *ivec, static krb5_error_code cts_decr(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { int ret = 0, tmp_len = 0; size_t size = 0; @@ -222,7 +223,7 @@ cts_decr(krb5_key key, const krb5_data *ivec, tmp_len = input->length; AES_set_decrypt_key(key->keyblock.contents, - NUM_BITS * key->keyblock.length, &deck); + NUM_BITS * key->keyblock.length, &deck); size = CRYPTO_cts128_decrypt((unsigned char *)input->data, tmp_buf, input->length, &deck, @@ -246,9 +247,9 @@ cts_decr(krb5_key key, const krb5_data *ivec, static krb5_error_code cts_encr_iov(krb5_key key, - const krb5_data *ivec, - krb5_crypto_iov *data, - size_t num_data, size_t dlen) + const krb5_data *ivec, + krb5_crypto_iov *data, + size_t num_data, size_t dlen) { int ret = 0; int oblock_len = BLOCK_SIZE * num_data; @@ -285,20 +286,20 @@ cts_encr_iov(krb5_key key, tlen = 0; for (;;) { if (krb5int_c_iov_get_block(iblock, BLOCK_SIZE, - data, num_data, &input_pos)){ + data, num_data, &input_pos)){ memcpy(dbuf+tlen,iblock, BLOCK_SIZE); tlen += BLOCK_SIZE; - } else { + } else { memcpy(dbuf+tlen,iblock, dlen - tlen); break; - } + } if (tlen > dlen) break; } AES_set_encrypt_key(key->keyblock.contents, - NUM_BITS * key->keyblock.length, &enck); + NUM_BITS * key->keyblock.length, &enck); size = CRYPTO_cts128_encrypt((unsigned char *)dbuf, oblock, dlen, &enck, iv_cts, (cbc128_f)AES_cbc_encrypt); @@ -322,9 +323,9 @@ cts_encr_iov(krb5_key key, static krb5_error_code cts_decr_iov(krb5_key key, - const krb5_data *ivec, - krb5_crypto_iov *data, - size_t num_data, size_t dlen) + const krb5_data *ivec, + krb5_crypto_iov *data, + size_t num_data, size_t dlen) { int ret = 0; int oblock_len = BLOCK_SIZE*num_data; @@ -359,19 +360,19 @@ cts_decr_iov(krb5_key key, memset(dbuf, 0, dlen); AES_set_decrypt_key(key->keyblock.contents, - NUM_BITS * key->keyblock.length, &deck); + NUM_BITS * key->keyblock.length, &deck); tlen = 0; for (;;) { if (krb5int_c_iov_get_block(iblock, BLOCK_SIZE, - data, num_data, &input_pos)){ + data, num_data, &input_pos)){ memcpy(dbuf+tlen,iblock, BLOCK_SIZE); tlen += BLOCK_SIZE; - } else { + } else { memcpy(dbuf+tlen,iblock, dlen - tlen); break; - } + } if (tlen > dlen) break; } @@ -398,7 +399,7 @@ cts_decr_iov(krb5_key key, krb5_error_code krb5int_aes_encrypt(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { int ret = 0; @@ -413,7 +414,7 @@ krb5int_aes_encrypt(krb5_key key, const krb5_data *ivec, krb5_error_code krb5int_aes_decrypt(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { int ret = 0; int nblocks = 0; @@ -432,9 +433,9 @@ krb5int_aes_decrypt(krb5_key key, const krb5_data *ivec, static krb5_error_code krb5int_aes_encrypt_iov(krb5_key key, - const krb5_data *ivec, - krb5_crypto_iov *data, - size_t num_data) + const krb5_data *ivec, + krb5_crypto_iov *data, + size_t num_data) { int ret = 0; int nblocks = 0; @@ -457,9 +458,9 @@ krb5int_aes_encrypt_iov(krb5_key key, static krb5_error_code krb5int_aes_decrypt_iov(krb5_key key, - const krb5_data *ivec, - krb5_crypto_iov *data, - size_t num_data) + const krb5_data *ivec, + krb5_crypto_iov *data, + size_t num_data) { int ret = 0; int nblocks = 0; @@ -483,12 +484,12 @@ krb5int_aes_decrypt_iov(krb5_key key, static krb5_error_code krb5int_aes_init_state (const krb5_keyblock *key, krb5_keyusage usage, - krb5_data *state) + krb5_data *state) { state->length = 16; state->data = (void *) malloc(16); if (state->data == NULL) - return ENOMEM; + return ENOMEM; memset(state->data, 0, state->length); return 0; } diff --git a/src/lib/crypto/openssl/enc_provider/des.c b/src/lib/crypto/openssl/enc_provider/des.c index 9c30ef172..5881291c9 100644 --- a/src/lib/crypto/openssl/enc_provider/des.c +++ b/src/lib/crypto/openssl/enc_provider/des.c @@ -1,3 +1,4 @@ +/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ /* lib/crypto/openssl/enc_provider/des.c * * Copyright (C) 2009 by the Massachusetts Institute of Technology. @@ -60,7 +61,7 @@ static krb5_error_code validate(krb5_key key, const krb5_data *ivec, - const krb5_data *input, const krb5_data *output) + const krb5_data *input, const krb5_data *output) { /* key->keyblock.enctype was checked by the caller */ if (key->keyblock.length != KRB5_MIT_DES_KEYSIZE) @@ -77,7 +78,7 @@ validate(krb5_key key, const krb5_data *ivec, static krb5_error_code validate_iov(krb5_key key, const krb5_data *ivec, - const krb5_crypto_iov *data, size_t num_data) + const krb5_crypto_iov *data, size_t num_data) { size_t i, input_length; @@ -99,7 +100,7 @@ validate_iov(krb5_key key, const krb5_data *ivec, static krb5_error_code k5_des_encrypt(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { int ret = 0, tmp_len = 0; unsigned int tmp_buf_len = 0; @@ -148,7 +149,7 @@ k5_des_encrypt(krb5_key key, const krb5_data *ivec, static krb5_error_code k5_des_decrypt(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { /* key->keyblock.enctype was checked by the caller */ int ret = 0, tmp_len = 0; @@ -194,9 +195,9 @@ k5_des_decrypt(krb5_key key, const krb5_data *ivec, static krb5_error_code k5_des_encrypt_iov(krb5_key key, - const krb5_data *ivec, - krb5_crypto_iov *data, - size_t num_data) + const krb5_data *ivec, + krb5_crypto_iov *data, + size_t num_data) { int ret = 0, tmp_len = MIT_DES_BLOCK_LENGTH; int oblock_len = MIT_DES_BLOCK_LENGTH * num_data; @@ -268,9 +269,9 @@ k5_des_encrypt_iov(krb5_key key, static krb5_error_code k5_des_decrypt_iov(krb5_key key, - const krb5_data *ivec, - krb5_crypto_iov *data, - size_t num_data) + const krb5_data *ivec, + krb5_crypto_iov *data, + size_t num_data) { int ret = 0; int tmp_len = MIT_DES_BLOCK_LENGTH; diff --git a/src/lib/crypto/openssl/enc_provider/des3.c b/src/lib/crypto/openssl/enc_provider/des3.c index 7228a46b2..b299d3c29 100644 --- a/src/lib/crypto/openssl/enc_provider/des3.c +++ b/src/lib/crypto/openssl/enc_provider/des3.c @@ -1,3 +1,4 @@ +/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ /* lib/crypto/openssl/enc_provider/des3.c * * Copyright (C) 2009 by the Massachusetts Institute of Technology. @@ -59,47 +60,47 @@ static krb5_error_code validate(krb5_key key, const krb5_data *ivec, - const krb5_data *input, const krb5_data *output) + const krb5_data *input, const krb5_data *output) { /* key->keyblock.enctype was checked by the caller */ if (key->keyblock.length != KRB5_MIT_DES3_KEYSIZE) - return(KRB5_BAD_KEYSIZE); + return(KRB5_BAD_KEYSIZE); if ((input->length%DES_BLOCK_SIZE) != 0) - return(KRB5_BAD_MSIZE); + return(KRB5_BAD_MSIZE); if (ivec && (ivec->length != 8)) - return(KRB5_BAD_MSIZE); + return(KRB5_BAD_MSIZE); if (input->length != output->length) - return(KRB5_BAD_MSIZE); + return(KRB5_BAD_MSIZE); return 0; } static krb5_error_code validate_iov(krb5_key key, const krb5_data *ivec, - const krb5_crypto_iov *data, size_t num_data) + const krb5_crypto_iov *data, size_t num_data) { size_t i, input_length; for (i = 0, input_length = 0; i < num_data; i++) { - const krb5_crypto_iov *iov = &data[i]; - if (ENCRYPT_IOV(iov)) - input_length += iov->data.length; + const krb5_crypto_iov *iov = &data[i]; + if (ENCRYPT_IOV(iov)) + input_length += iov->data.length; } if (key->keyblock.length != KRB5_MIT_DES3_KEYSIZE) - return(KRB5_BAD_KEYSIZE); + return(KRB5_BAD_KEYSIZE); if ((input_length%DES_BLOCK_SIZE) != 0) - return(KRB5_BAD_MSIZE); + return(KRB5_BAD_MSIZE); if (ivec && (ivec->length != 8)) - return(KRB5_BAD_MSIZE); + return(KRB5_BAD_MSIZE); return 0; } static krb5_error_code k5_des3_encrypt(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { int ret = 0, tmp_len = 0; unsigned int tmp_buf_len = 0; @@ -108,7 +109,7 @@ k5_des3_encrypt(krb5_key key, const krb5_data *ivec, ret = validate(key, ivec, input, output); if (ret) - return ret; + return ret; tmp_buf_len = output->length * 2; tmp_buf = OPENSSL_malloc(tmp_buf_len); @@ -148,7 +149,7 @@ k5_des3_encrypt(krb5_key key, const krb5_data *ivec, static krb5_error_code k5_des3_decrypt(krb5_key key, const krb5_data *ivec, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { int ret = 0, tmp_len = 0; unsigned int tmp_buf_len = 0; @@ -157,7 +158,7 @@ k5_des3_decrypt(krb5_key key, const krb5_data *ivec, ret = validate(key, ivec, input, output); if (ret) - return ret; + return ret; tmp_buf_len = output->length; @@ -197,9 +198,9 @@ k5_des3_decrypt(krb5_key key, const krb5_data *ivec, static krb5_error_code k5_des3_encrypt_iov(krb5_key key, - const krb5_data *ivec, - krb5_crypto_iov *data, - size_t num_data) + const krb5_data *ivec, + krb5_crypto_iov *data, + size_t num_data) { int ret = 0; int tmp_len = MIT_DES_BLOCK_LENGTH; @@ -258,7 +259,7 @@ k5_des3_encrypt_iov(krb5_key key, if(ret) { /*if (ivec != NULL && ivec->data) - memcpy(ivec->data, oblock, MIT_DES_BLOCK_LENGTH); */ + memcpy(ivec->data, oblock, MIT_DES_BLOCK_LENGTH); */ ret = EVP_EncryptFinal_ex(&ciph_ctx, oblock+input_pos.data_pos, &tmp_len); } @@ -276,9 +277,9 @@ k5_des3_encrypt_iov(krb5_key key, static krb5_error_code k5_des3_decrypt_iov(krb5_key key, - const krb5_data *ivec, - krb5_crypto_iov *data, - size_t num_data) + const krb5_data *ivec, + krb5_crypto_iov *data, + size_t num_data) { int ret = 0; int tmp_len = MIT_DES_BLOCK_LENGTH; @@ -337,7 +338,7 @@ k5_des3_decrypt_iov(krb5_key key, if(ret) { /*if (ivec != NULL && ivec->data) - memcpy(ivec->data, oblock, MIT_DES_BLOCK_LENGTH); */ + memcpy(ivec->data, oblock, MIT_DES_BLOCK_LENGTH); */ ret = EVP_DecryptFinal_ex(&ciph_ctx, oblock + input_pos.data_pos, &tmp_len); } diff --git a/src/lib/crypto/openssl/enc_provider/enc_provider.h b/src/lib/crypto/openssl/enc_provider/enc_provider.h index 49ffaafea..8144b6533 100644 --- a/src/lib/crypto/openssl/enc_provider/enc_provider.h +++ b/src/lib/crypto/openssl/enc_provider/enc_provider.h @@ -1,3 +1,4 @@ +/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ /* * Copyright (C) 1998 by the FundsXpress, INC. * diff --git a/src/lib/crypto/openssl/enc_provider/rc4.c b/src/lib/crypto/openssl/enc_provider/rc4.c index b5e69ff67..edfbb3218 100644 --- a/src/lib/crypto/openssl/enc_provider/rc4.c +++ b/src/lib/crypto/openssl/enc_provider/rc4.c @@ -1,3 +1,4 @@ +/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ /* lib/crypto/openssl/enc_provider/rc4.c * * #include STD_DISCLAIMER @@ -61,12 +62,12 @@ typedef struct { /* prototypes */ static krb5_error_code k5_arcfour_docrypt(krb5_key, const krb5_data *, - const krb5_data *, krb5_data *); + const krb5_data *, krb5_data *); static krb5_error_code k5_arcfour_free_state ( krb5_data *state); static krb5_error_code k5_arcfour_init_state (const krb5_keyblock *key, - krb5_keyusage keyusage, krb5_data *new_state); + krb5_keyusage keyusage, krb5_data *new_state); /* The workhorse of the arcfour system, * this impliments the cipher @@ -75,7 +76,7 @@ k5_arcfour_init_state (const krb5_keyblock *key, /* In-place rc4 crypto */ static krb5_error_code k5_arcfour_docrypt(krb5_key key, const krb5_data *state, - const krb5_data *input, krb5_data *output) + const krb5_data *input, krb5_data *output) { int ret = 0, tmp_len = 0; unsigned char *tmp_buf = NULL; @@ -114,9 +115,9 @@ k5_arcfour_docrypt(krb5_key key, const krb5_data *state, /* In-place IOV crypto */ static krb5_error_code k5_arcfour_docrypt_iov(krb5_key key, - const krb5_data *state, - krb5_crypto_iov *data, - size_t num_data) + const krb5_data *state, + krb5_crypto_iov *data, + size_t num_data) { size_t i; int ret = 0, tmp_len = 0; @@ -141,8 +142,8 @@ k5_arcfour_docrypt_iov(krb5_key key, if (ENCRYPT_IOV(iov)) { tmp_buf=(unsigned char *)iov->data.data; ret = EVP_EncryptUpdate(&ciph_ctx, - tmp_buf, &tmp_len, - (unsigned char *)iov->data.data, iov->data.length); + tmp_buf, &tmp_len, + (unsigned char *)iov->data.data, iov->data.length); if (!ret) break; iov->data.length = tmp_len; } @@ -163,14 +164,14 @@ k5_arcfour_docrypt_iov(krb5_key key, static krb5_error_code k5_arcfour_free_state ( krb5_data *state) { - return 0; /* not implemented */ + return 0; /* not implemented */ } static krb5_error_code k5_arcfour_init_state (const krb5_keyblock *key, krb5_keyusage keyusage, krb5_data *new_state) { - return 0; /* not implemented */ + return 0; /* not implemented */ } |
