#include "rsh_locl.h" RCSID("$Id$"); ssize_t do_read (int fd, void *buf, size_t sz) { int ret; if (do_encrypt) { if (auth_method == AUTH_KRB4) { return des_enc_read (fd, buf, sz, schedule, &iv); } else if(auth_method == AUTH_KRB5) { u_int32_t len, outer_len; int status; krb5_data data; ret = krb5_net_read (context, fd, &len, 4); if (ret != 4) return ret; len = ntohl(len); outer_len = len + 12; outer_len = (outer_len + 7) & ~7; if (outer_len > sz) abort (); ret = krb5_net_read (context, fd, buf, outer_len); if (ret != outer_len) return ret; status = krb5_decrypt(context, buf, outer_len, ETYPE_DES_CBC_CRC, /* XXX */ keyblock, &data); if (status != KSUCCESS) errx (1, "%s", krb5_get_err_text (context, status)); memcpy (buf, data.data, len); free (data.data); return len; } else { abort (); } } else return read (fd, buf, sz); } ssize_t do_write (int fd, void *buf, size_t sz) { int ret; if (do_encrypt) { if(auth_method == AUTH_KRB4) { return des_enc_write (fd, buf, sz, schedule, &iv); } else if(auth_method == AUTH_KRB5) { krb5_error_code status; krb5_data data; u_int32_t len; int ret; status = krb5_encrypt (context, buf, sz, ETYPE_DES_CBC_CRC, /* XXX */ keyblock, &data); if (status != KSUCCESS) errx (1, "%s", krb5_get_err_text(context, status)); len = htonl(sz); ret = krb5_net_write (context, fd, &len, 4); if (ret != 4) return ret; ret = krb5_net_write (context, fd, data.data, data.length); if (ret != data.length) return ret; free (data.data); return sz; } else { abort(); } } else return write (fd, buf, sz); }