diff options
Diffstat (limited to 'kerberosIV/krb/str2key.c')
-rw-r--r-- | kerberosIV/krb/str2key.c | 129 |
1 files changed, 129 insertions, 0 deletions
diff --git a/kerberosIV/krb/str2key.c b/kerberosIV/krb/str2key.c new file mode 100644 index 00000000000..cdc56583caf --- /dev/null +++ b/kerberosIV/krb/str2key.c @@ -0,0 +1,129 @@ +/* + * This software may now be redistributed outside the US. + * + * $Source: /cvs/OpenBSD/src/kerberosIV/krb/Attic/str2key.c,v $ + * + * $Locker: $ + */ + +/* + * This defines the Andrew string_to_key function. It accepts a password + * string as input and converts its via a one-way encryption algorithm to a DES + * encryption key. It is compatible with the original Andrew authentication + * service password database. + */ + +#include "krb_locl.h" + +/* +EXPORT void afs_string_to_key(char *passwd, char *cell, des_cblock *key); +*/ + +static void +mklower(s) + char *s; +{ + for (; *s; s++) + if ('A' <= *s && *s <= 'Z') + *s = *s - 'A' + 'a'; +} + +/* + * Short passwords, i.e 8 characters or less. + */ +static void +afs_cmu_StringToKey (str, cell, key) + char *str; + char *cell; + des_cblock *key; +{ + char password[8+1]; /* crypt is limited to 8 chars anyway */ + int i; + int passlen; + + bzero (key, sizeof(key)); + bzero(password, sizeof(password)); + + strncpy (password, cell, 8); + passlen = strlen (str); + if (passlen > 8) passlen = 8; + + for (i=0; i<passlen; i++) + password[i] = str[i] ^ cell[i]; /* make sure cell is zero padded */ + + for (i=0; i<8; i++) + if (password[i] == '\0') password[i] = 'X'; + + /* crypt only considers the first 8 characters of password but for some + reason returns eleven characters of result (plus the two salt chars). */ + strncpy((void *)key, (char *)crypt(password, "#~") + 2, sizeof(des_cblock)); + + /* parity is inserted into the LSB so leftshift each byte up one bit. This + allows ascii characters with a zero MSB to retain as much significance + as possible. */ + { char *keybytes = (char *)key; + unsigned int temp; + + for (i = 0; i < 8; i++) { + temp = (unsigned int) keybytes[i]; + keybytes[i] = (unsigned char) (temp << 1); + } + } + des_fixup_key_parity (key); +} + +#undef BUFSIZ +#define BUFSIZ 512 + +/* + * Long passwords, i.e 9 characters or more. +*/ +static void +afs_transarc_StringToKey (str, cell, key) + char *str; + char *cell; + des_cblock *key; +{ + des_key_schedule schedule; + des_cblock temp_key; + des_cblock ivec; + char password[BUFSIZ]; + int passlen; + + strncpy (password, str, sizeof(password)); + if ((passlen = strlen (password)) < sizeof(password)-1) + strncat (password, cell, sizeof(password)-passlen); + if ((passlen = strlen(password)) > sizeof(password)) passlen = sizeof(password); + + bcopy ("kerberos", &ivec, 8); + bcopy ("kerberos", &temp_key, 8); + des_fixup_key_parity (&temp_key); + des_key_sched (&temp_key, schedule); + des_cbc_cksum ((des_cblock *)password, &ivec, passlen, schedule, &ivec); + + bcopy (&ivec, &temp_key, 8); + des_fixup_key_parity (&temp_key); + des_key_sched (&temp_key, schedule); + des_cbc_cksum ((des_cblock *)password, key, passlen, schedule, &ivec); + + des_fixup_key_parity (key); +} + +#undef REALM_SZ +#define REALM_SZ 41 + +void +afs_string_to_key(str, cell, key) + char *str; + char *cell; + des_cblock *key; +{ + char realm[REALM_SZ]; + (void)strcpy(realm, cell); + (void)mklower(realm); + + if (strlen(str) > 8) + afs_transarc_StringToKey (str, realm, key); + else + afs_cmu_StringToKey (str, realm, key); +} |