2 * Copyright (c) 1997 - 2008 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include "krb5_locl.h"
36 #ifdef HEIM_WEAK_CRYPTO
40 krb5_DES_random_key(krb5_context context,
43 DES_cblock *k = key->keyvalue.data;
45 krb5_generate_random_block(k, sizeof(DES_cblock));
46 DES_set_odd_parity(k);
47 } while(DES_is_weak_key(k));
51 krb5_DES_schedule_old(krb5_context context,
55 DES_set_key_unchecked(key->key->keyvalue.data, key->schedule->data);
59 krb5_DES_random_to_key(krb5_context context,
64 DES_cblock *k = key->keyvalue.data;
65 memcpy(k, data, key->keyvalue.length);
66 DES_set_odd_parity(k);
67 if(DES_is_weak_key(k))
68 _krb5_xor(k, (const unsigned char*)"\0\0\0\0\0\0\0\xf0");
71 static struct key_type keytype_des_old = {
76 sizeof(DES_key_schedule),
78 krb5_DES_schedule_old,
80 krb5_DES_random_to_key
83 static struct key_type keytype_des = {
88 sizeof(struct evp_schedule),
92 krb5_DES_random_to_key,
97 static krb5_error_code
98 CRC32_checksum(krb5_context context,
106 unsigned char *r = C->checksum.data;
107 _krb5_crc_init_table ();
108 crc = _krb5_crc_update (data, len, 0);
110 r[1] = (crc >> 8) & 0xff;
111 r[2] = (crc >> 16) & 0xff;
112 r[3] = (crc >> 24) & 0xff;
116 static krb5_error_code
117 RSA_MD4_checksum(krb5_context context,
118 struct key_data *key,
124 if (EVP_Digest(data, len, C->checksum.data, NULL, EVP_md4(), NULL) != 1)
125 krb5_abortx(context, "md4 checksum failed");
129 static krb5_error_code
130 RSA_MD4_DES_checksum(krb5_context context,
131 struct key_data *key,
137 return _krb5_des_checksum(context, EVP_md4(), key, data, len, cksum);
140 static krb5_error_code
141 RSA_MD4_DES_verify(krb5_context context,
142 struct key_data *key,
148 return _krb5_des_verify(context, EVP_md4(), key, data, len, C);
151 static krb5_error_code
152 RSA_MD5_DES_checksum(krb5_context context,
153 struct key_data *key,
159 return _krb5_des_checksum(context, EVP_md5(), key, data, len, C);
162 static krb5_error_code
163 RSA_MD5_DES_verify(krb5_context context,
164 struct key_data *key,
170 return _krb5_des_verify(context, EVP_md5(), key, data, len, C);
173 struct checksum_type _krb5_checksum_crc32 = {
183 struct checksum_type _krb5_checksum_rsa_md4 = {
193 struct checksum_type _krb5_checksum_rsa_md4_des = {
194 CKSUMTYPE_RSA_MD4_DES,
198 F_KEYED | F_CPROOF | F_VARIANT,
199 RSA_MD4_DES_checksum,
203 struct checksum_type _krb5_checksum_rsa_md5_des = {
204 CKSUMTYPE_RSA_MD5_DES,
208 F_KEYED | F_CPROOF | F_VARIANT,
209 RSA_MD5_DES_checksum,
213 static krb5_error_code
214 evp_des_encrypt_null_ivec(krb5_context context,
215 struct key_data *key,
218 krb5_boolean encryptp,
222 struct evp_schedule *ctx = key->schedule->data;
225 memset(&ivec, 0, sizeof(ivec));
226 c = encryptp ? &ctx->ectx : &ctx->dctx;
227 EVP_CipherInit_ex(c, NULL, NULL, NULL, (void *)&ivec, -1);
228 EVP_Cipher(c, data, data, len);
232 static krb5_error_code
233 evp_des_encrypt_key_ivec(krb5_context context,
234 struct key_data *key,
237 krb5_boolean encryptp,
241 struct evp_schedule *ctx = key->schedule->data;
244 memcpy(&ivec, key->key->keyvalue.data, sizeof(ivec));
245 c = encryptp ? &ctx->ectx : &ctx->dctx;
246 EVP_CipherInit_ex(c, NULL, NULL, NULL, (void *)&ivec, -1);
247 EVP_Cipher(c, data, data, len);
251 static krb5_error_code
252 DES_CFB64_encrypt_null_ivec(krb5_context context,
253 struct key_data *key,
256 krb5_boolean encryptp,
262 DES_key_schedule *s = key->schedule->data;
263 memset(&ivec, 0, sizeof(ivec));
265 DES_cfb64_encrypt(data, data, len, s, &ivec, &num, encryptp);
269 static krb5_error_code
270 DES_PCBC_encrypt_key_ivec(krb5_context context,
271 struct key_data *key,
274 krb5_boolean encryptp,
279 DES_key_schedule *s = key->schedule->data;
280 memcpy(&ivec, key->key->keyvalue.data, sizeof(ivec));
282 DES_pcbc_encrypt(data, data, len, s, &ivec, encryptp);
286 struct encryption_type _krb5_enctype_des_cbc_crc = {
293 &_krb5_checksum_crc32,
296 evp_des_encrypt_key_ivec,
301 struct encryption_type _krb5_enctype_des_cbc_md4 = {
308 &_krb5_checksum_rsa_md4,
309 &_krb5_checksum_rsa_md4_des,
311 evp_des_encrypt_null_ivec,
316 struct encryption_type _krb5_enctype_des_cbc_md5 = {
323 &_krb5_checksum_rsa_md5,
324 &_krb5_checksum_rsa_md5_des,
326 evp_des_encrypt_null_ivec,
331 struct encryption_type _krb5_enctype_des_cbc_none = {
338 &_krb5_checksum_none,
340 F_PSEUDO|F_DISABLED|F_WEAK,
341 evp_des_encrypt_null_ivec,
346 struct encryption_type _krb5_enctype_des_cfb64_none = {
347 ETYPE_DES_CFB64_NONE,
353 &_krb5_checksum_none,
355 F_PSEUDO|F_DISABLED|F_WEAK,
356 DES_CFB64_encrypt_null_ivec,
361 struct encryption_type _krb5_enctype_des_pcbc_none = {
368 &_krb5_checksum_none,
370 F_PSEUDO|F_DISABLED|F_WEAK,
371 DES_PCBC_encrypt_key_ivec,
375 #endif /* HEIM_WEAK_CRYPTO */