diff --git a/lib/krb5/decrypt.c b/lib/krb5/decrypt.c deleted file mode 100644 index b47537221..000000000 --- a/lib/krb5/decrypt.c +++ /dev/null @@ -1,80 +0,0 @@ -#include -#include "crc.h" - -RCSID("$Id$"); - -krb5_error_code -krb5_des_cbc_decrypt(krb5_context context, - void *ptr, - size_t len, - int etype, - const krb5_keyblock *keyblock, - krb5_data *result) -{ - u_char *p = (u_char *)ptr; - size_t offset; - des_cblock key; - des_key_schedule schedule; - - memcpy (&key, keyblock->keyvalue.data, sizeof(key)); - des_set_key (&key, schedule); - des_cbc_encrypt ((des_cblock *)ptr, (des_cblock *)ptr, len, - schedule, &key, DES_DECRYPT); - switch(etype){ - case ETYPE_DES_CBC_MD5: - { - struct md5 m; - u_int32_t his_checksum[4]; - u_int32_t my_checksum[4]; - memcpy(his_checksum, p + 8, 16); - memset(p + 8, 0, 16); - md5_init(&m); - md5_update (&m, ptr, len); - md5_finito(&m, my_checksum); - if(memcmp(his_checksum, my_checksum, 16)) - return KRB5KRB_AP_ERR_BAD_INTEGRITY; - offset = 24; - } - break; - - case ETYPE_DES_CBC_CRC: - { - u_int32_t my_crc, her_crc; - her_crc = (p[11] << 24) | (p[10] << 16) | - (p[9] << 8) | (p[8] << 0); - memset (p + 8, 0, sizeof(her_crc)); - crc_init_table (); - my_crc = crc_update (ptr, len, 0); - if (my_crc != her_crc) - return KRB5KRB_AP_ERR_BAD_INTEGRITY; - offset = 12; - } - break; - default: - return KRB5_PROG_ETYPE_NOSUPP; - } - result->length = len - offset; - result->data = malloc(result->length); - if (result->data == NULL) - return ENOMEM; - memcpy(result->data, p + 12, result->length); - return 0; -} - - -krb5_error_code -krb5_decrypt (krb5_context context, - void *ptr, - size_t len, - int etype, - const krb5_keyblock *keyblock, - krb5_data *result) -{ - switch(etype){ - case ETYPE_DES_CBC_CRC: - case ETYPE_DES_CBC_MD5: - return krb5_des_cbc_decrypt(context, ptr, len, etype, keyblock, - result); - } - return KRB5_PROG_ETYPE_NOSUPP; -}