summaryrefslogtreecommitdiffstats
path: root/src/lib/crypto
diff options
context:
space:
mode:
authorPaul Park <pjpark@mit.edu>1995-07-07 21:01:22 +0000
committerPaul Park <pjpark@mit.edu>1995-07-07 21:01:22 +0000
commit31cb3c1d38885fd7ae02e275998e69b7be612223 (patch)
treec958bfa17d86e9045c2b4ead3ab71c2a97bb2f51 /src/lib/crypto
parenta993a6baad58f2e5ba383b76ade7c0fc0bebd6e5 (diff)
downloadkrb5-31cb3c1d38885fd7ae02e275998e69b7be612223.tar.gz
krb5-31cb3c1d38885fd7ae02e275998e69b7be612223.tar.xz
krb5-31cb3c1d38885fd7ae02e275998e69b7be612223.zip
Add verifier procedure/dispatch
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6253 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/crypto')
-rw-r--r--src/lib/crypto/md4/md4glue.c41
1 files changed, 36 insertions, 5 deletions
diff --git a/src/lib/crypto/md4/md4glue.c b/src/lib/crypto/md4/md4glue.c
index caa0a3376..cc6bd03aa 100644
--- a/src/lib/crypto/md4/md4glue.c
+++ b/src/lib/crypto/md4/md4glue.c
@@ -27,10 +27,6 @@
#include "rsa-md4.h"
krb5_error_code
-md4_sum_func KRB5_NPROTOTYPE((krb5_pointer in, size_t in_length,
- krb5_pointer seed, size_t seed_length, krb5_checksum *outcksum));
-
-krb5_error_code
md4_sum_func(in, in_length, seed, seed_length, outcksum)
krb5_pointer in;
size_t in_length;
@@ -48,15 +44,50 @@ krb5_checksum FAR *outcksum;
outcksum->checksum_type = CKSUMTYPE_RSA_MD4;
outcksum->length = RSA_MD4_CKSUM_LENGTH;
- memcpy((char *)outcksum->contents, (char *)&working.digest[0], 16);
+ memcpy((char *)outcksum->contents, (char *)&working.digest[0],
+ RSA_MD4_CKSUM_LENGTH);
memset((char *)&working, 0, sizeof(working));
return 0;
}
+krb5_error_code
+md4_verify_func(cksum, in, in_length, seed, seed_length)
+krb5_checksum FAR *cksum;
+krb5_pointer in;
+size_t in_length;
+krb5_pointer seed;
+size_t seed_length;
+{
+ krb5_octet *input = (krb5_octet *)in;
+ MD4_CTX working;
+ krb5_error_code retval;
+
+ retval = 0;
+ if (cksum->checksum_type == CKSUMTYPE_RSA_MD4) {
+ if (cksum->length == RSA_MD4_CKSUM_LENGTH) {
+ MD4Init(&working);
+ MD4Update(&working, input, in_length);
+ MD4Final(&working);
+
+ if (memcmp((char *) cksum->contents,
+ (char *) &working.digest[0],
+ RSA_MD4_CKSUM_LENGTH))
+ retval = KRB5KRB_AP_ERR_BAD_INTEGRITY;
+ memset((char *)&working, 0, sizeof(working));
+ }
+ else
+ retval = KRB5KRB_AP_ERR_BAD_INTEGRITY;
+ }
+ else
+ retval = KRB5KRB_AP_ERR_INAPP_CKSUM;
+ return retval;
+}
+
krb5_checksum_entry rsa_md4_cksumtable_entry = {
0,
md4_sum_func,
+ md4_verify_func,
RSA_MD4_CKSUM_LENGTH,
1, /* is collision proof */
0, /* doesn't use key */