diff options
| author | Paul Park <pjpark@mit.edu> | 1995-07-07 21:01:22 +0000 |
|---|---|---|
| committer | Paul Park <pjpark@mit.edu> | 1995-07-07 21:01:22 +0000 |
| commit | 31cb3c1d38885fd7ae02e275998e69b7be612223 (patch) | |
| tree | c958bfa17d86e9045c2b4ead3ab71c2a97bb2f51 /src/lib/crypto | |
| parent | a993a6baad58f2e5ba383b76ade7c0fc0bebd6e5 (diff) | |
| download | krb5-31cb3c1d38885fd7ae02e275998e69b7be612223.tar.gz krb5-31cb3c1d38885fd7ae02e275998e69b7be612223.tar.xz krb5-31cb3c1d38885fd7ae02e275998e69b7be612223.zip | |
Add verifier procedure/dispatch
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6253 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/crypto')
| -rw-r--r-- | src/lib/crypto/md4/md4glue.c | 41 |
1 files changed, 36 insertions, 5 deletions
diff --git a/src/lib/crypto/md4/md4glue.c b/src/lib/crypto/md4/md4glue.c index caa0a3376..cc6bd03aa 100644 --- a/src/lib/crypto/md4/md4glue.c +++ b/src/lib/crypto/md4/md4glue.c @@ -27,10 +27,6 @@ #include "rsa-md4.h" krb5_error_code -md4_sum_func KRB5_NPROTOTYPE((krb5_pointer in, size_t in_length, - krb5_pointer seed, size_t seed_length, krb5_checksum *outcksum)); - -krb5_error_code md4_sum_func(in, in_length, seed, seed_length, outcksum) krb5_pointer in; size_t in_length; @@ -48,15 +44,50 @@ krb5_checksum FAR *outcksum; outcksum->checksum_type = CKSUMTYPE_RSA_MD4; outcksum->length = RSA_MD4_CKSUM_LENGTH; - memcpy((char *)outcksum->contents, (char *)&working.digest[0], 16); + memcpy((char *)outcksum->contents, (char *)&working.digest[0], + RSA_MD4_CKSUM_LENGTH); memset((char *)&working, 0, sizeof(working)); return 0; } +krb5_error_code +md4_verify_func(cksum, in, in_length, seed, seed_length) +krb5_checksum FAR *cksum; +krb5_pointer in; +size_t in_length; +krb5_pointer seed; +size_t seed_length; +{ + krb5_octet *input = (krb5_octet *)in; + MD4_CTX working; + krb5_error_code retval; + + retval = 0; + if (cksum->checksum_type == CKSUMTYPE_RSA_MD4) { + if (cksum->length == RSA_MD4_CKSUM_LENGTH) { + MD4Init(&working); + MD4Update(&working, input, in_length); + MD4Final(&working); + + if (memcmp((char *) cksum->contents, + (char *) &working.digest[0], + RSA_MD4_CKSUM_LENGTH)) + retval = KRB5KRB_AP_ERR_BAD_INTEGRITY; + memset((char *)&working, 0, sizeof(working)); + } + else + retval = KRB5KRB_AP_ERR_BAD_INTEGRITY; + } + else + retval = KRB5KRB_AP_ERR_INAPP_CKSUM; + return retval; +} + krb5_checksum_entry rsa_md4_cksumtable_entry = { 0, md4_sum_func, + md4_verify_func, RSA_MD4_CKSUM_LENGTH, 1, /* is collision proof */ 0, /* doesn't use key */ |
