partly unify enctype/keytype since there is only enctypes
This commit is contained in:
@@ -86,7 +86,7 @@ arcfour_mic_key(krb5_context context, krb5_keyblock *key,
|
|||||||
cksum_k5.checksum.data = k5_data;
|
cksum_k5.checksum.data = k5_data;
|
||||||
cksum_k5.checksum.length = sizeof(k5_data);
|
cksum_k5.checksum.length = sizeof(k5_data);
|
||||||
|
|
||||||
if (key->keytype == KEYTYPE_ARCFOUR_56) {
|
if (key->keytype == ENCTYPE_ARCFOUR_HMAC_MD5_56) {
|
||||||
char L40[14] = "fortybits";
|
char L40[14] = "fortybits";
|
||||||
|
|
||||||
memcpy(L40 + 10, T, sizeof(T));
|
memcpy(L40 + 10, T, sizeof(T));
|
||||||
@@ -100,7 +100,7 @@ arcfour_mic_key(krb5_context context, krb5_keyblock *key,
|
|||||||
if (ret)
|
if (ret)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
key5.keytype = KEYTYPE_ARCFOUR;
|
key5.keytype = ENCTYPE_ARCFOUR_HMAC_MD5;
|
||||||
key5.keyvalue = cksum_k5.checksum;
|
key5.keyvalue = cksum_k5.checksum;
|
||||||
|
|
||||||
cksum_k6.checksum.data = key6_data;
|
cksum_k6.checksum.data = key6_data;
|
||||||
|
@@ -174,8 +174,8 @@ _gsskrb5_wrap_size_limit (
|
|||||||
ret = GSS_S_FAILURE;
|
ret = GSS_S_FAILURE;
|
||||||
#endif
|
#endif
|
||||||
break;
|
break;
|
||||||
case KEYTYPE_ARCFOUR:
|
case ENCTYPE_ARCFOUR_HMAC_MD5:
|
||||||
case KEYTYPE_ARCFOUR_56:
|
case ENCTYPE_ARCFOUR_HMAC_MD5_56:
|
||||||
ret = _gssapi_wrap_size_arcfour(minor_status, ctx, context,
|
ret = _gssapi_wrap_size_arcfour(minor_status, ctx, context,
|
||||||
conf_req_flag, qop_req,
|
conf_req_flag, qop_req,
|
||||||
req_output_size, max_input_size, key);
|
req_output_size, max_input_size, key);
|
||||||
|
@@ -228,7 +228,7 @@ read_master_encryptionkey(krb5_context context, const char *filename,
|
|||||||
should cover all cases, but will break if someone has hacked
|
should cover all cases, but will break if someone has hacked
|
||||||
this code to really use des-cbc-md5 -- but then that's not my
|
this code to really use des-cbc-md5 -- but then that's not my
|
||||||
problem. */
|
problem. */
|
||||||
if(key.keytype == KEYTYPE_DES || key.keytype == ETYPE_DES_CBC_MD5)
|
if(key.keytype == ETYPE_DES_CBC_CRC || key.keytype == ETYPE_DES_CBC_MD5)
|
||||||
key.keytype = ETYPE_DES_CFB64_NONE;
|
key.keytype = ETYPE_DES_CFB64_NONE;
|
||||||
|
|
||||||
ret = hdb_process_master_key(context, 0, &key, 0, mkey);
|
ret = hdb_process_master_key(context, 0, &key, 0, mkey);
|
||||||
|
@@ -58,7 +58,7 @@ krb5_auth_con_init(krb5_context context,
|
|||||||
p->remote_address = NULL;
|
p->remote_address = NULL;
|
||||||
p->local_port = 0;
|
p->local_port = 0;
|
||||||
p->remote_port = 0;
|
p->remote_port = 0;
|
||||||
p->keytype = KEYTYPE_NULL;
|
p->keytype = ENCTYPE_NULL;
|
||||||
p->cksumtype = CKSUMTYPE_NONE;
|
p->cksumtype = CKSUMTYPE_NONE;
|
||||||
*auth_context = p;
|
*auth_context = p;
|
||||||
return 0;
|
return 0;
|
||||||
|
@@ -38,7 +38,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
static struct _krb5_key_type keytype_aes128 = {
|
static struct _krb5_key_type keytype_aes128 = {
|
||||||
KEYTYPE_AES128,
|
ENCTYPE_AES128_CTS_HMAC_SHA1_96,
|
||||||
"aes-128",
|
"aes-128",
|
||||||
128,
|
128,
|
||||||
16,
|
16,
|
||||||
@@ -52,7 +52,7 @@ static struct _krb5_key_type keytype_aes128 = {
|
|||||||
};
|
};
|
||||||
|
|
||||||
static struct _krb5_key_type keytype_aes256 = {
|
static struct _krb5_key_type keytype_aes256 = {
|
||||||
KEYTYPE_AES256,
|
ENCTYPE_AES256_CTS_HMAC_SHA1_96,
|
||||||
"aes-256",
|
"aes-256",
|
||||||
256,
|
256,
|
||||||
32,
|
32,
|
||||||
|
@@ -38,7 +38,7 @@
|
|||||||
#include "krb5_locl.h"
|
#include "krb5_locl.h"
|
||||||
|
|
||||||
static struct _krb5_key_type keytype_arcfour = {
|
static struct _krb5_key_type keytype_arcfour = {
|
||||||
KEYTYPE_ARCFOUR,
|
ENCTYPE_ARCFOUR_HMAC_MD5,
|
||||||
"arcfour",
|
"arcfour",
|
||||||
128,
|
128,
|
||||||
16,
|
16,
|
||||||
|
@@ -69,7 +69,7 @@ krb5_DES_random_to_key(krb5_context context,
|
|||||||
}
|
}
|
||||||
|
|
||||||
static struct _krb5_key_type keytype_des_old = {
|
static struct _krb5_key_type keytype_des_old = {
|
||||||
KEYTYPE_DES,
|
ETYPE_DES_CBC_CRC,
|
||||||
"des-old",
|
"des-old",
|
||||||
56,
|
56,
|
||||||
8,
|
8,
|
||||||
@@ -83,7 +83,7 @@ static struct _krb5_key_type keytype_des_old = {
|
|||||||
};
|
};
|
||||||
|
|
||||||
static struct _krb5_key_type keytype_des = {
|
static struct _krb5_key_type keytype_des = {
|
||||||
KEYTYPE_DES,
|
ETYPE_DES_CBC_CRC,
|
||||||
"des",
|
"des",
|
||||||
56,
|
56,
|
||||||
8,
|
8,
|
||||||
|
@@ -55,7 +55,7 @@ DES3_random_key(krb5_context context,
|
|||||||
|
|
||||||
#ifdef DES3_OLD_ENCTYPE
|
#ifdef DES3_OLD_ENCTYPE
|
||||||
static struct _krb5_key_type keytype_des3 = {
|
static struct _krb5_key_type keytype_des3 = {
|
||||||
KEYTYPE_DES3,
|
ETYPE_OLD_DES3_CBC_SHA1,
|
||||||
"des3",
|
"des3",
|
||||||
168,
|
168,
|
||||||
24,
|
24,
|
||||||
@@ -70,7 +70,7 @@ static struct _krb5_key_type keytype_des3 = {
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
static struct _krb5_key_type keytype_des3_derived = {
|
static struct _krb5_key_type keytype_des3_derived = {
|
||||||
KEYTYPE_DES3,
|
ETYPE_OLD_DES3_CBC_SHA1,
|
||||||
"des3",
|
"des3",
|
||||||
168,
|
168,
|
||||||
24,
|
24,
|
||||||
|
@@ -38,7 +38,7 @@
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
static struct _krb5_key_type keytype_null = {
|
static struct _krb5_key_type keytype_null = {
|
||||||
KEYTYPE_NULL,
|
ENCTYPE_NULL,
|
||||||
"null",
|
"null",
|
||||||
0,
|
0,
|
||||||
0,
|
0,
|
||||||
|
@@ -1898,11 +1898,11 @@ _krb5_derive_key(krb5_context context,
|
|||||||
|
|
||||||
/* XXX keytype dependent post-processing */
|
/* XXX keytype dependent post-processing */
|
||||||
switch(kt->type) {
|
switch(kt->type) {
|
||||||
case KEYTYPE_DES3:
|
case ETYPE_OLD_DES3_CBC_SHA1:
|
||||||
_krb5_DES3_random_to_key(context, key->key, k, nblocks * et->blocksize);
|
_krb5_DES3_random_to_key(context, key->key, k, nblocks * et->blocksize);
|
||||||
break;
|
break;
|
||||||
case KEYTYPE_AES128:
|
case ENCTYPE_AES128_CTS_HMAC_SHA1_96:
|
||||||
case KEYTYPE_AES256:
|
case ENCTYPE_AES256_CTS_HMAC_SHA1_96:
|
||||||
memcpy(key->key->keyvalue.data, k, key->key->keyvalue.length);
|
memcpy(key->key->keyvalue.data, k, key->key->keyvalue.length);
|
||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
|
@@ -69,7 +69,7 @@ struct salt_type {
|
|||||||
};
|
};
|
||||||
|
|
||||||
struct _krb5_key_type {
|
struct _krb5_key_type {
|
||||||
krb5_keytype type; /* XXX */
|
krb5_enctype type;
|
||||||
const char *name;
|
const char *name;
|
||||||
size_t bits;
|
size_t bits;
|
||||||
size_t size;
|
size_t size;
|
||||||
|
@@ -480,7 +480,7 @@ krb5_get_in_cred(krb5_context context,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
if(pa) {
|
if(pa) {
|
||||||
salt.salttype = pa->padata_type;
|
salt.salttype = (krb5_salttype)pa->padata_type;
|
||||||
salt.saltvalue = pa->padata_value;
|
salt.saltvalue = pa->padata_value;
|
||||||
|
|
||||||
ret = (*key_proc)(context, etype, salt, keyseed, &key);
|
ret = (*key_proc)(context, etype, salt, keyseed, &key);
|
||||||
|
@@ -915,7 +915,7 @@ process_pa_info(krb5_context context,
|
|||||||
PA_DATA *pa = find_pa_data(md, pa_prefs[i].type);
|
PA_DATA *pa = find_pa_data(md, pa_prefs[i].type);
|
||||||
if (pa == NULL)
|
if (pa == NULL)
|
||||||
continue;
|
continue;
|
||||||
paid->salt.salttype = pa_prefs[i].type;
|
paid->salt.salttype = (krb5_salttype)pa_prefs[i].type;
|
||||||
p = (*pa_prefs[i].salt_info)(context, client, asreq,
|
p = (*pa_prefs[i].salt_info)(context, client, asreq,
|
||||||
paid, &pa->padata_value);
|
paid, &pa->padata_value);
|
||||||
}
|
}
|
||||||
|
@@ -326,7 +326,9 @@ typedef HostAddress krb5_address;
|
|||||||
|
|
||||||
typedef HostAddresses krb5_addresses;
|
typedef HostAddresses krb5_addresses;
|
||||||
|
|
||||||
typedef enum krb5_keytype {
|
typedef krb5_enctype krb5_keytype;
|
||||||
|
|
||||||
|
enum krb5_keytype_old {
|
||||||
KEYTYPE_NULL = ETYPE_NULL,
|
KEYTYPE_NULL = ETYPE_NULL,
|
||||||
KEYTYPE_DES = ETYPE_DES_CBC_CRC,
|
KEYTYPE_DES = ETYPE_DES_CBC_CRC,
|
||||||
KEYTYPE_DES3 = ETYPE_OLD_DES3_CBC_SHA1,
|
KEYTYPE_DES3 = ETYPE_OLD_DES3_CBC_SHA1,
|
||||||
@@ -334,7 +336,7 @@ typedef enum krb5_keytype {
|
|||||||
KEYTYPE_AES256 = ETYPE_AES256_CTS_HMAC_SHA1_96,
|
KEYTYPE_AES256 = ETYPE_AES256_CTS_HMAC_SHA1_96,
|
||||||
KEYTYPE_ARCFOUR = ETYPE_ARCFOUR_HMAC_MD5,
|
KEYTYPE_ARCFOUR = ETYPE_ARCFOUR_HMAC_MD5,
|
||||||
KEYTYPE_ARCFOUR_56 = ETYPE_ARCFOUR_HMAC_MD5_56
|
KEYTYPE_ARCFOUR_56 = ETYPE_ARCFOUR_HMAC_MD5_56
|
||||||
} krb5_keytype;
|
};
|
||||||
|
|
||||||
typedef EncryptionKey krb5_keyblock;
|
typedef EncryptionKey krb5_keyblock;
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user