diff options
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/crypto/md4/ChangeLog | 10 | ||||
| -rw-r--r-- | src/lib/crypto/md4/md4crypto.c | 4 |
2 files changed, 12 insertions, 2 deletions
diff --git a/src/lib/crypto/md4/ChangeLog b/src/lib/crypto/md4/ChangeLog index e74227cbe..f6809ba06 100644 --- a/src/lib/crypto/md4/ChangeLog +++ b/src/lib/crypto/md4/ChangeLog @@ -1,3 +1,13 @@ +Tue May 21 22:33:12 1996 Richard Basch <basch@lehman.com> + + * md4crypto.c: Incorrrect size arguments were being passed causing + decrypt integrity failures with the "fixed" md4 algorithm. The old + path was also fixed to better reflect the appropriate size variables + even though the two in use were identical (if someone copied the + code to make a new crypto system, they may spend a long time + debugging because of the misuse of variables). + [Tracked down by epeisach; audited by basch.] + Mon May 20 17:16:47 1996 Theodore Y. Ts'o <tytso@mit.edu> * md4crypto.c, md4crypto.h: Change use of RSA_MD4_DES_CKSUM_LENGTH diff --git a/src/lib/crypto/md4/md4crypto.c b/src/lib/crypto/md4/md4crypto.c index c2bd15347..43d644366 100644 --- a/src/lib/crypto/md4/md4crypto.c +++ b/src/lib/crypto/md4/md4crypto.c @@ -245,7 +245,7 @@ size_t seed_length; /* now encrypt the checksum */ retval = mit_des_cbc_encrypt((mit_des_cblock *)&working.digest[0], (mit_des_cblock *)&outtmp[0], - OLD_RSA_MD4_DES_CKSUM_LENGTH, + RSA_MD4_CKSUM_LENGTH, (struct mit_des_ks_struct *) eblock.priv, keyblock.contents, @@ -309,7 +309,7 @@ size_t seed_length; /* Compare the checksums */ if (memcmp((char *) &outtmp[RSA_MD4_DES_CONFOUND_LENGTH], (char *) &working.digest[0], - NEW_RSA_MD4_DES_CKSUM_LENGTH)) + RSA_MD4_CKSUM_LENGTH)) retval = KRB5KRB_AP_ERR_BAD_INTEGRITY; } else |
