try to use handle using openssl instead of libdes better. based on patches from GOMBAS Gabor <gombasg@inf.elte.hu> and Brian May <bam@snoopy.apana.org.au>
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@9681 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -54,7 +54,11 @@
|
|||||||
#include <parse_time.h>
|
#include <parse_time.h>
|
||||||
#include <roken.h>
|
#include <roken.h>
|
||||||
|
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
#include <openssl/des.h>
|
||||||
|
#else
|
||||||
#include <des.h>
|
#include <des.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
#include <krb5.h>
|
#include <krb5.h>
|
||||||
#include <kadm5/admin.h>
|
#include <kadm5/admin.h>
|
||||||
|
@@ -129,7 +129,13 @@ struct hostent *gethostbyname(const char *);
|
|||||||
|
|
||||||
#include "roken.h"
|
#include "roken.h"
|
||||||
#include "security.h"
|
#include "security.h"
|
||||||
#include <des.h> /* for des_read_pw_string */
|
|
||||||
|
/* des_read_pw_string */
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
#include <openssl/des.h>
|
||||||
|
#else
|
||||||
|
#include <des.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
#if defined(__sun__) && !defined(__svr4)
|
#if defined(__sun__) && !defined(__svr4)
|
||||||
int fclose(FILE*);
|
int fclose(FILE*);
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (c) 1995 - 2000 Kungliga Tekniska H<>gskolan
|
* Copyright (c) 1995 - 2001 Kungliga Tekniska H<>gskolan
|
||||||
* (Royal Institute of Technology, Stockholm, Sweden).
|
* (Royal Institute of Technology, Stockholm, Sweden).
|
||||||
* All rights reserved.
|
* All rights reserved.
|
||||||
*
|
*
|
||||||
@@ -405,7 +405,11 @@ create_and_write_cookie (char *xauthfile,
|
|||||||
auth.name_length = strlen(auth.name);
|
auth.name_length = strlen(auth.name);
|
||||||
auth.data_length = cookie_sz;
|
auth.data_length = cookie_sz;
|
||||||
auth.data = (char*)cookie;
|
auth.data = (char*)cookie;
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
krb5_generate_random_block (cookie, cookie_sz);
|
||||||
|
#else
|
||||||
des_rand_data (cookie, cookie_sz);
|
des_rand_data (cookie, cookie_sz);
|
||||||
|
#endif
|
||||||
|
|
||||||
strlcpy(xauthfile, "/tmp/AXXXXXX", xauthfile_size);
|
strlcpy(xauthfile, "/tmp/AXXXXXX", xauthfile_size);
|
||||||
fd = mkstemp(xauthfile);
|
fd = mkstemp(xauthfile);
|
||||||
|
@@ -52,5 +52,9 @@
|
|||||||
#endif
|
#endif
|
||||||
#include <roken.h>
|
#include <roken.h>
|
||||||
#include <err.h>
|
#include <err.h>
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
#include <openssl/des.h>
|
||||||
|
#else
|
||||||
#include <des.h>
|
#include <des.h>
|
||||||
|
#endif
|
||||||
#include <otp.h>
|
#include <otp.h>
|
||||||
|
@@ -50,7 +50,11 @@ RCSID("$Id$");
|
|||||||
|
|
||||||
#include <pwd.h>
|
#include <pwd.h>
|
||||||
|
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
#include <openssl/des.h>
|
||||||
|
#else
|
||||||
#include <des.h>
|
#include <des.h>
|
||||||
|
#endif
|
||||||
#include <krb5.h>
|
#include <krb5.h>
|
||||||
#include <kafs.h>
|
#include <kafs.h>
|
||||||
#include <err.h>
|
#include <err.h>
|
||||||
|
@@ -50,7 +50,11 @@ RCSID("$Id$");
|
|||||||
#include "encrypt.h"
|
#include "encrypt.h"
|
||||||
#include "misc-proto.h"
|
#include "misc-proto.h"
|
||||||
|
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
#include <openssl/des.h>
|
||||||
|
#else
|
||||||
#include <des.h>
|
#include <des.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
extern int encrypt_debug_mode;
|
extern int encrypt_debug_mode;
|
||||||
|
|
||||||
|
@@ -90,6 +90,13 @@ typedef struct {
|
|||||||
|
|
||||||
#define SK_DES 1 /* Matched Kerberos v5 KEYTYPE_DES */
|
#define SK_DES 1 /* Matched Kerberos v5 KEYTYPE_DES */
|
||||||
|
|
||||||
|
#ifdef HAVE_OPENSSL_CRYPTO_H
|
||||||
|
#include <openssl/des.h>
|
||||||
|
#define des_new_random_key des_random_key
|
||||||
|
#else
|
||||||
|
#include <des.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
#include "enc-proto.h"
|
#include "enc-proto.h"
|
||||||
|
|
||||||
extern int encrypt_debug_mode;
|
extern int encrypt_debug_mode;
|
||||||
|
@@ -65,7 +65,6 @@ RCSID("$Id$");
|
|||||||
#include <arpa/telnet.h>
|
#include <arpa/telnet.h>
|
||||||
#endif
|
#endif
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <des.h> /* BSD wont include this in krb.h, so we do it here */
|
|
||||||
#include <krb.h>
|
#include <krb.h>
|
||||||
#include <pwd.h>
|
#include <pwd.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
|
@@ -74,7 +74,6 @@ RCSID("$Id$");
|
|||||||
#include <pwd.h>
|
#include <pwd.h>
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
|
||||||
#include <des.h>
|
|
||||||
#include <krb.h>
|
#include <krb.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
@@ -166,7 +166,6 @@ struct hostent *gethostbyname(const char *);
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef KRB4
|
#ifdef KRB4
|
||||||
#include <des.h>
|
|
||||||
#include <krb.h>
|
#include <krb.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (c) 1997-2000 Kungliga Tekniska H<>gskolan
|
* Copyright (c) 1997-2001 Kungliga Tekniska H<>gskolan
|
||||||
* (Royal Institute of Technology, Stockholm, Sweden).
|
* (Royal Institute of Technology, Stockholm, Sweden).
|
||||||
* All rights reserved.
|
* All rights reserved.
|
||||||
*
|
*
|
||||||
@@ -83,7 +83,11 @@
|
|||||||
#endif
|
#endif
|
||||||
#include <err.h>
|
#include <err.h>
|
||||||
#include <roken.h>
|
#include <roken.h>
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
#include <openssl/des.h>
|
||||||
|
#else
|
||||||
#include <des.h>
|
#include <des.h>
|
||||||
|
#endif
|
||||||
#include <krb5.h>
|
#include <krb5.h>
|
||||||
#include <krb5_locl.h>
|
#include <krb5_locl.h>
|
||||||
#include <hdb.h>
|
#include <hdb.h>
|
||||||
@@ -176,7 +180,7 @@ random_password(char *pw, size_t len);
|
|||||||
|
|
||||||
/* kadm_conn.c */
|
/* kadm_conn.c */
|
||||||
|
|
||||||
sig_atomic_t term_flag, doing_useful_work;
|
extern sig_atomic_t term_flag, doing_useful_work;
|
||||||
|
|
||||||
void parse_ports(krb5_context, const char*);
|
void parse_ports(krb5_context, const char*);
|
||||||
int start_server(krb5_context);
|
int start_server(krb5_context);
|
||||||
|
@@ -57,9 +57,9 @@ random_password(char *pw, size_t len)
|
|||||||
{
|
{
|
||||||
#ifdef OTP_STYLE
|
#ifdef OTP_STYLE
|
||||||
{
|
{
|
||||||
des_cblock newkey;
|
OtpKey newkey;
|
||||||
|
|
||||||
des_new_random_key(&newkey);
|
krb5_generate_random_block(&newkey, sizeof(newkey));
|
||||||
otp_print_stddict (newkey, pw, len);
|
otp_print_stddict (newkey, pw, len);
|
||||||
strlwr(pw);
|
strlwr(pw);
|
||||||
}
|
}
|
||||||
@@ -80,11 +80,11 @@ random_password(char *pw, size_t len)
|
|||||||
#ifndef OTP_STYLE
|
#ifndef OTP_STYLE
|
||||||
/* return a random value in range 0-127 */
|
/* return a random value in range 0-127 */
|
||||||
static int
|
static int
|
||||||
RND(des_cblock *key, int *left)
|
RND(unsigned char *key, int keylen, int *left)
|
||||||
{
|
{
|
||||||
if(*left == 0){
|
if(*left == 0){
|
||||||
des_new_random_key(key);
|
krb5_generate_random_block(key, keylen);
|
||||||
*left = 8;
|
*left = keylen;
|
||||||
}
|
}
|
||||||
(*left)--;
|
(*left)--;
|
||||||
return ((unsigned char*)key)[*left];
|
return ((unsigned char*)key)[*left];
|
||||||
@@ -120,7 +120,7 @@ generate_password(char **pw, int num_classes, ...)
|
|||||||
} *classes;
|
} *classes;
|
||||||
va_list ap;
|
va_list ap;
|
||||||
int len, i;
|
int len, i;
|
||||||
des_cblock rbuf; /* random buffer */
|
unsigned char rbuf[8]; /* random buffer */
|
||||||
int rleft = 0;
|
int rleft = 0;
|
||||||
|
|
||||||
classes = malloc(num_classes * sizeof(*classes));
|
classes = malloc(num_classes * sizeof(*classes));
|
||||||
@@ -138,11 +138,12 @@ generate_password(char **pw, int num_classes, ...)
|
|||||||
return;
|
return;
|
||||||
for(i = 0; i < len; i++) {
|
for(i = 0; i < len; i++) {
|
||||||
int j;
|
int j;
|
||||||
int x = RND(&rbuf, &rleft) % (len - i);
|
int x = RND(rbuf, sizeof(rbuf), &rleft) % (len - i);
|
||||||
int t = 0;
|
int t = 0;
|
||||||
for(j = 0; j < num_classes; j++) {
|
for(j = 0; j < num_classes; j++) {
|
||||||
if(x < t + classes[j].freq) {
|
if(x < t + classes[j].freq) {
|
||||||
(*pw)[i] = classes[j].str[RND(&rbuf, &rleft) % classes[j].len];
|
(*pw)[i] = classes[j].str[RND(rbuf, sizeof(rbuf), &rleft)
|
||||||
|
% classes[j].len];
|
||||||
classes[j].freq--;
|
classes[j].freq--;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
@@ -82,7 +82,11 @@
|
|||||||
#include <getarg.h>
|
#include <getarg.h>
|
||||||
#include <base64.h>
|
#include <base64.h>
|
||||||
#include <parse_units.h>
|
#include <parse_units.h>
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
#include <openssl/des.h>
|
||||||
|
#else
|
||||||
#include <des.h>
|
#include <des.h>
|
||||||
|
#endif
|
||||||
#include <krb5.h>
|
#include <krb5.h>
|
||||||
#include <krb5_locl.h>
|
#include <krb5_locl.h>
|
||||||
#include <hdb.h>
|
#include <hdb.h>
|
||||||
|
@@ -95,7 +95,11 @@
|
|||||||
#include <err.h>
|
#include <err.h>
|
||||||
#include <roken.h>
|
#include <roken.h>
|
||||||
#include <getarg.h>
|
#include <getarg.h>
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
#include <openssl/des.h>
|
||||||
|
#else
|
||||||
#include <des.h>
|
#include <des.h>
|
||||||
|
#endif
|
||||||
#include <krb5.h>
|
#include <krb5.h>
|
||||||
|
|
||||||
#endif /* __KPASSWD_LOCL_H__ */
|
#endif /* __KPASSWD_LOCL_H__ */
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (c) 1997-2000 Kungliga Tekniska H<>gskolan
|
* Copyright (c) 1997-2001 Kungliga Tekniska H<>gskolan
|
||||||
* (Royal Institute of Technology, Stockholm, Sweden).
|
* (Royal Institute of Technology, Stockholm, Sweden).
|
||||||
* All rights reserved.
|
* All rights reserved.
|
||||||
*
|
*
|
||||||
@@ -56,7 +56,11 @@
|
|||||||
#endif
|
#endif
|
||||||
#include <roken.h>
|
#include <roken.h>
|
||||||
|
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
#include <openssl/des.h>
|
||||||
|
#else
|
||||||
#include <des.h>
|
#include <des.h>
|
||||||
|
#endif
|
||||||
#include <krb5.h>
|
#include <krb5.h>
|
||||||
#include <hdb.h>
|
#include <hdb.h>
|
||||||
#include <hdb-private.h>
|
#include <hdb-private.h>
|
||||||
@@ -73,14 +77,4 @@
|
|||||||
#include <gdbm/ndbm.h>
|
#include <gdbm/ndbm.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
int hdb_principal2key(krb5_context, krb5_principal, krb5_data*);
|
|
||||||
int hdb_key2principal(krb5_context, krb5_data*, krb5_principal);
|
|
||||||
|
|
||||||
krb5_error_code hdb_lock(int, int);
|
|
||||||
krb5_error_code hdb_unlock(int);
|
|
||||||
|
|
||||||
krb5_error_code _hdb_fetch(krb5_context, HDB*, unsigned, hdb_entry*);
|
|
||||||
krb5_error_code _hdb_store(krb5_context, HDB*, unsigned, hdb_entry*);
|
|
||||||
krb5_error_code _hdb_remove(krb5_context, HDB*, hdb_entry*);
|
|
||||||
|
|
||||||
#endif /* __HDB_LOCL_H__ */
|
#endif /* __HDB_LOCL_H__ */
|
||||||
|
@@ -2532,6 +2532,71 @@ krb5_decrypt_EncryptedData(krb5_context context,
|
|||||||
* *
|
* *
|
||||||
************************************************************/
|
************************************************************/
|
||||||
|
|
||||||
|
#ifdef HAVE_OPENSSL_DES_H
|
||||||
|
#include <openssl/rand.h>
|
||||||
|
|
||||||
|
/* From openssl/crypto/rand/rand_lcl.h */
|
||||||
|
#define ENTROPY_NEEDED 20
|
||||||
|
static int
|
||||||
|
seed_something(void)
|
||||||
|
{
|
||||||
|
int fd = -1;
|
||||||
|
size_t len;
|
||||||
|
char buf[1024], seedfile[256];
|
||||||
|
|
||||||
|
/* If there is a seed file, load it. But such a file cannot be trusted,
|
||||||
|
so use 0 for the entropy estimate */
|
||||||
|
if (RAND_file_name(seedfile, sizeof(seedfile))) {
|
||||||
|
fd = open(seedfile, O_RDONLY);
|
||||||
|
if (fd >= 0) {
|
||||||
|
read(fd, buf, sizeof(buf));
|
||||||
|
/* Use the full buffer anyway */
|
||||||
|
RAND_add(buf, sizeof(buf), 0.0);
|
||||||
|
} else
|
||||||
|
seedfile[0] = '\0';
|
||||||
|
} else
|
||||||
|
seedfile[0] = '\0';
|
||||||
|
|
||||||
|
/* Calling RAND_status() will try to use /dev/urandom if it exists so
|
||||||
|
we do not have to deal with it. */
|
||||||
|
if (RAND_status() != 1) {
|
||||||
|
krb5_context context;
|
||||||
|
char *p;
|
||||||
|
|
||||||
|
/* Try using egd */
|
||||||
|
if (!krb5_init_context(&context)) {
|
||||||
|
p = krb5_config_get_string(context, NULL, "libdefaults",
|
||||||
|
"egd_socket", NULL);
|
||||||
|
if (p != NULL)
|
||||||
|
RAND_egd_bytes(p, ENTROPY_NEEDED);
|
||||||
|
krb5_free_context(context);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (RAND_status() == 1) {
|
||||||
|
/* Update the seed file */
|
||||||
|
if (seedfile[0])
|
||||||
|
RAND_write_file(seedfile);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
} else
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
void
|
||||||
|
krb5_generate_random_block(void *buf, size_t len)
|
||||||
|
{
|
||||||
|
static int rng_initialized = 0;
|
||||||
|
|
||||||
|
if (!rng_initialized) {
|
||||||
|
if (seed_something())
|
||||||
|
krb5_abortx(NULL, "Fatal: could not seed the random number generator");
|
||||||
|
|
||||||
|
rng_initialized = 1;
|
||||||
|
}
|
||||||
|
RAND_bytes(buf, len);
|
||||||
|
}
|
||||||
|
#else
|
||||||
void
|
void
|
||||||
krb5_generate_random_block(void *buf, size_t len)
|
krb5_generate_random_block(void *buf, size_t len)
|
||||||
{
|
{
|
||||||
@@ -2557,6 +2622,7 @@ krb5_generate_random_block(void *buf, size_t len)
|
|||||||
buf = (char*)buf + sizeof(out);
|
buf = (char*)buf + sizeof(out);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
static void
|
static void
|
||||||
DES3_postproc(krb5_context context,
|
DES3_postproc(krb5_context context,
|
||||||
|
Reference in New Issue
Block a user