diff --git a/appl/rsh/common.c b/appl/rsh/common.c new file mode 100644 index 000000000..e6a25a76c --- /dev/null +++ b/appl/rsh/common.c @@ -0,0 +1,82 @@ +#include "rsh_locl.h" +RCSID("$Id$"); + +ssize_t +do_read (int fd, + void *buf, + size_t sz) +{ + int ret; + + if (do_encrypt) { + if (auth_method == AUTH_KRB4) { + return des_enc_read (fd, buf, sz, schedule, &iv); + } else if(auth_method == AUTH_KRB5) { + u_int32_t len, outer_len; + int status; + krb5_data data; + + ret = krb5_net_read (context, fd, &len, 4); + if (ret != 4) + return ret; + len = ntohl(len); + outer_len = len + 12; + outer_len = (outer_len + 7) & ~7; + if (outer_len > sz) + abort (); + ret = krb5_net_read (context, fd, buf, outer_len); + if (ret != outer_len) + return ret; + status = krb5_decrypt(context, buf, outer_len, + ETYPE_DES_CBC_CRC, /* XXX */ + keyblock, &data); + if (status != KSUCCESS) + errx (1, "%s", krb5_get_err_text (context, status)); + memcpy (buf, data.data, len); + free (data.data); + return len; + } else { + abort (); + } + } else + return read (fd, buf, sz); +} + +ssize_t +do_write (int fd, void *buf, size_t sz) +{ + int ret; + + if (do_encrypt) { + if(auth_method == AUTH_KRB4) { + return des_enc_write (fd, buf, sz, schedule, &iv); + } else if(auth_method == AUTH_KRB5) { + krb5_error_code status; + krb5_data data; + u_int32_t len; + int ret; + + status = krb5_encrypt (context, + buf, + sz, + ETYPE_DES_CBC_CRC, /* XXX */ + keyblock, + &data); + if (status != KSUCCESS) + errx (1, "%s", krb5_get_err_text(context, status)); + len = htonl(sz); + ret = krb5_net_write (context, fd, &len, 4); + if (ret != 4) + return ret; + ret = krb5_net_write (context, fd, data.data, data.length); + if (ret != data.length) + return ret; + free (data.data); + return sz; + } else { + abort(); + } + } else + return write (fd, buf, sz); +} +