1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
|
/*
* Copyright 1993 by OpenVision Technologies, Inc.
*
* Permission to use, copy, modify, distribute, and sell this software
* and its documentation for any purpose is hereby granted without fee,
* provided that the above copyright notice appears in all copies and
* that both that copyright notice and this permission notice appear in
* supporting documentation, and that the name of OpenVision not be used
* in advertising or publicity pertaining to distribution of the software
* without specific, written prior permission. OpenVision makes no
* representations about the suitability of this software for any
* purpose. It is provided "as is" without express or implied warranty.
*
* OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
* INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO
* EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR
* CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
* USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
* OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
* PERFORMANCE OF THIS SOFTWARE.
*/
#include "gssapiP_krb5.h"
#include <memory.h>
static unsigned char zeros[8] = {0,0,0,0,0,0,0,0};
int kg_confounder_size(ed)
krb5_gss_enc_desc *ed;
{
/* XXX Is this an abstraction violation? */
return(ed->eblock.crypto_entry->block_length);
}
krb5_error_code
kg_make_confounder(ed, buf)
krb5_gss_enc_desc *ed;
unsigned char *buf;
{
krb5_error_code code;
return(krb5_random_confounder( ed->eblock.crypto_entry->block_length, buf));
}
int kg_encrypt_size(ed, n)
krb5_gss_enc_desc *ed;
int n;
{
return(krb5_encrypt_size(n, ed->eblock.crypto_entry));
}
krb5_error_code
kg_encrypt(ed, iv, in, out, length)
krb5_gss_enc_desc *ed;
krb5_pointer iv;
krb5_pointer in;
krb5_pointer out;
int length;
{
krb5_error_code code;
if (!kg_context && (code=kg_get_context()))
return code;
if (! ed->processed) {
if (code = krb5_process_key(kg_context, &ed->eblock, ed->key))
return(code);
ed->processed = 1;
}
if (code = krb5_encrypt(kg_context, in, out, length, &ed->eblock,
iv?iv:(krb5_pointer)zeros))
return(code);
return(0);
}
/* length is the length of the cleartext. */
krb5_error_code
kg_decrypt(ed, iv, in, out, length)
krb5_gss_enc_desc *ed;
krb5_pointer iv;
krb5_pointer in;
krb5_pointer out;
int length;
{
krb5_error_code code;
int elen;
char *buf;
if (!kg_context && (code=kg_get_context()))
return code;
if (! ed->processed) {
if (code = krb5_process_key(kg_context, &ed->eblock, ed->key))
return(code);
ed->processed = 1;
}
elen = krb5_encrypt_size(length, ed->eblock.crypto_entry);
if ((buf = (char *) xmalloc(elen)) == NULL)
return(ENOMEM);
if (code = krb5_decrypt(kg_context, in, buf, elen, &ed->eblock,
iv?iv:(krb5_pointer)zeros)) {
xfree(buf);
return(code);
}
memcpy(out, buf, length);
xfree(buf);
return(0);
}
|