/* $OpenBSD: des_rw.c,v 1.8 2001/07/17 02:13:29 pvalchev Exp $ */ /* $NetBSD: des_rw.c,v 1.2 1995/03/21 07:58:30 cgd Exp $ */ /*- * Copyright (c) 1989, 1993 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by the University of * California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #ifndef lint #if 0 static char sccsid[] = "@(#)des_rw.c 8.1 (Berkeley) 6/6/93"; #else static char rcsid[] = "$OpenBSD: des_rw.c,v 1.8 2001/07/17 02:13:29 pvalchev Exp $"; #endif #endif /* not lint */ #ifdef KERBEROS #include #include #include #include #include #include #include void desrw_set_key __P((des_cblock *, des_key_schedule *)); void desrw_clear_key __P((void)); int des_read __P((int, char *, int)); int des_write __P((int, char *, int)); static unsigned char des_inbuf[10240], storage[10240], *store_ptr; static des_cblock *key; static des_key_schedule *key_schedule; /* * NB: These routines will not function properly if NBIO * is set */ /* * des_set_key * * Set des encryption/decryption key for use by the des_read and * des_write routines * * The inkey parameter is actually the DES initial vector, * and the insched is the DES Key unwrapped for faster decryption */ static int nstored = 0; void desrw_set_key(inkey, insched) des_cblock *inkey; des_key_schedule*insched; { key = inkey; key_schedule = insched; nstored = 0; } void desrw_clear_key() { bzero((char *) key, sizeof(C_Block)); bzero((char *) key_schedule, sizeof(Key_schedule)); } int des_read(fd, buf, len) int fd; register char *buf; int len; { long net_len, rd_len; int nreturned = 0; if (nstored >= len) { (void) bcopy(store_ptr, buf, len); store_ptr += len; nstored -= len; return(len); } else if (nstored) { (void) bcopy(store_ptr, buf, nstored); nreturned += nstored; buf += nstored; len -= nstored; nstored = 0; } if (krb_net_read(fd, (char *)&net_len, sizeof(net_len)) != sizeof(net_len)) { /* XXX can't read enough, pipe must have closed */ return(0); } net_len = ntohl(net_len); if (net_len <= 0 || net_len > sizeof(des_inbuf)) { /* preposterous length; assume out-of-sync; only recourse is to close connection, so return 0 */ return(0); } /* the writer tells us how much real data we are getting, but we need to read the pad bytes (8-byte boundary) */ rd_len = roundup(net_len, 8); if (krb_net_read(fd, (char *)des_inbuf, rd_len) != rd_len) { /* pipe must have closed, return 0 */ return(0); } (void) des_pcbc_encrypt((des_cblock *)des_inbuf, /* inbuf */ (des_cblock *)storage, /* outbuf */ rd_len, /* length */ *key_schedule, /* DES key */ key, /* IV */ DECRYPT); /* direction */ if(net_len < 8) store_ptr = storage + 8 - net_len; else store_ptr = storage; nstored = net_len; if (nstored > len) { (void) bcopy(store_ptr, buf, len); nreturned += len; store_ptr += len; nstored -= len; } else { (void) bcopy(store_ptr, buf, nstored); nreturned += nstored; nstored = 0; } return(nreturned); } static unsigned char des_outbuf[10240]; /* > longest write */ int des_write(fd, buf, len) int fd; char *buf; int len; { static int seeded = 0; static char garbage_buf[8]; long net_len, garbage; if(len < 8) { if(!seeded) { seeded = 1; srandom((int) time(NULL)); } garbage = random(); /* insert random garbage */ (void) bcopy(&garbage, garbage_buf, MIN(sizeof(long),8)); /* this "right-justifies" the data in the buffer */ (void) bcopy(buf, garbage_buf + 8 - len, len); } /* pcbc_encrypt outputs in 8-byte (64 bit) increments */ (void) des_pcbc_encrypt((des_cblock *)((len < 8) ? garbage_buf : buf), (des_cblock *)des_outbuf, (len < 8) ? 8 : len, *key_schedule, /* DES key */ key, /* IV */ ENCRYPT); /* tell the other end the real amount, but send an 8-byte padded packet */ net_len = htonl(len); (void) write(fd, &net_len, sizeof(net_len)); (void) write(fd, des_outbuf, roundup(len,8)); return(len); } #endif /* KERBEROS */