From: Zhanna Tsitkov Date: Wed, 28 Oct 2009 18:12:38 +0000 (+0000) Subject: Replace krb5_ with krb5Int_ prefix for non-API functions X-Git-Tag: krb5-1.8-alpha1~254 X-Git-Url: http://git.tremily.us/?a=commitdiff_plain;h=c60792b08a48ec497e541917d7fea953d59f5612;p=krb5.git Replace krb5_ with krb5Int_ prefix for non-API functions git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@23079 dc483132-0cff-0310-8789-dd5450dbe970 --- diff --git a/src/include/k5-int.h b/src/include/k5-int.h index 858b9bd6d..9217174f2 100644 --- a/src/include/k5-int.h +++ b/src/include/k5-int.h @@ -756,11 +756,11 @@ struct krb5_aead_provider { * in here to deal with stuff from lib/crypto */ -void krb5_nfold +void krb5int_nfold (unsigned int inbits, const unsigned char *in, unsigned int outbits, unsigned char *out); -krb5_error_code krb5_hmac +krb5_error_code krb5int_hmac (const struct krb5_hash_provider *hash, krb5_key key, unsigned int icount, const krb5_data *input, krb5_data *output); @@ -2227,7 +2227,7 @@ typedef struct _krb5int_access { /* crypto stuff */ const struct krb5_hash_provider *md5_hash_provider; const struct krb5_enc_provider *arcfour_enc_provider; - krb5_error_code (* krb5_hmac) (const struct krb5_hash_provider *hash, + krb5_error_code (* krb5int_hmac) (const struct krb5_hash_provider *hash, const krb5_keyblock *key, unsigned int icount, const krb5_data *input, krb5_data *output); @@ -2644,7 +2644,7 @@ typedef struct krb5_boolean krb5_is_permitted_enctype_ext ( krb5_context, krb5_etypes_permitted *); -krb5_boolean KRB5_CALLCONV krb5_c_weak_enctype(krb5_enctype); +krb5_boolean KRB5_CALLCONV krb5int_c_weak_enctype(krb5_enctype); krb5_error_code krb5_kdc_rep_decrypt_proc (krb5_context, diff --git a/src/lib/crypto/builtin/aes/aes_s2k.c b/src/lib/crypto/builtin/aes/aes_s2k.c index 76d73c635..14c7726bb 100644 --- a/src/lib/crypto/builtin/aes/aes_s2k.c +++ b/src/lib/crypto/builtin/aes/aes_s2k.c @@ -81,7 +81,7 @@ krb5int_aes_string_to_key(const struct krb5_enc_provider *enc, if (err) goto cleanup; - err = krb5_derive_keyblock (enc, tempkey, key, &usage); + err = krb5int_derive_keyblock (enc, tempkey, key, &usage); cleanup: if (err) diff --git a/src/lib/crypto/builtin/arcfour/arcfour.c b/src/lib/crypto/builtin/arcfour/arcfour.c index ad7ccec0b..ff2f4378c 100644 --- a/src/lib/crypto/builtin/arcfour/arcfour.c +++ b/src/lib/crypto/builtin/arcfour/arcfour.c @@ -13,7 +13,7 @@ of RSA Data Security) const char *const krb5int_arcfour_l40 = "fortybits"; void -krb5_arcfour_encrypt_length(const struct krb5_enc_provider *enc, +krb5int_arcfour_encrypt_length(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, size_t inputlen, size_t *length) { @@ -62,7 +62,7 @@ case 7: /* tgs-req authenticator */ } krb5_error_code -krb5_arcfour_encrypt(const struct krb5_enc_provider *enc, +krb5int_arcfour_encrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, @@ -148,7 +148,7 @@ krb5_arcfour_encrypt(const struct krb5_enc_provider *enc, salt.length=4; store_32_le(ms_usage, salt.data); } - krb5_hmac(hash, key, 1, &salt, &d1); + krb5int_hmac(hash, key, 1, &salt, &d1); memcpy(k2.contents, k1.contents, k2.length); @@ -192,7 +192,7 @@ krb5_arcfour_encrypt(const struct krb5_enc_provider *enc, /* This is the arcfour-hmac decryption routine */ krb5_error_code -krb5_arcfour_decrypt(const struct krb5_enc_provider *enc, +krb5int_arcfour_decrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, @@ -275,7 +275,7 @@ krb5_arcfour_decrypt(const struct krb5_enc_provider *enc, salt.length = 4; store_32_le(ms_usage, salt.data); } - ret = krb5_hmac(hash, key, 1, &salt, &d1); + ret = krb5int_hmac(hash, key, 1, &salt, &d1); if (ret) goto cleanup; diff --git a/src/lib/crypto/builtin/arcfour/arcfour.h b/src/lib/crypto/builtin/arcfour/arcfour.h index 1a2876437..e00708a7c 100644 --- a/src/lib/crypto/builtin/arcfour/arcfour.h +++ b/src/lib/crypto/builtin/arcfour/arcfour.h @@ -2,13 +2,13 @@ #define ARCFOUR_H extern void -krb5_arcfour_encrypt_length(const struct krb5_enc_provider *, +krb5int_arcfour_encrypt_length(const struct krb5_enc_provider *, const struct krb5_hash_provider *, size_t, size_t *); -extern -krb5_error_code krb5_arcfour_encrypt(const struct krb5_enc_provider *, +extern krb5_error_code +krb5int_arcfour_encrypt(const struct krb5_enc_provider *, const struct krb5_hash_provider *, krb5_key, krb5_keyusage, @@ -16,8 +16,8 @@ krb5_error_code krb5_arcfour_encrypt(const struct krb5_enc_provider *, const krb5_data *, krb5_data *); -extern -krb5_error_code krb5_arcfour_decrypt(const struct krb5_enc_provider *, +extern krb5_error_code +krb5int_arcfour_decrypt(const struct krb5_enc_provider *, const struct krb5_hash_provider *, krb5_key, krb5_keyusage, @@ -25,7 +25,8 @@ krb5_error_code krb5_arcfour_decrypt(const struct krb5_enc_provider *, const krb5_data *, krb5_data *); -extern krb5_error_code krb5int_arcfour_string_to_key( +extern krb5_error_code +krb5int_arcfour_string_to_key( const struct krb5_enc_provider *, const krb5_data *, const krb5_data *, diff --git a/src/lib/crypto/builtin/arcfour/arcfour_aead.c b/src/lib/crypto/builtin/arcfour/arcfour_aead.c index 4896afaaf..c01fc001b 100644 --- a/src/lib/crypto/builtin/arcfour/arcfour_aead.c +++ b/src/lib/crypto/builtin/arcfour/arcfour_aead.c @@ -152,7 +152,7 @@ krb5int_arcfour_encrypt_iov(const struct krb5_aead_provider *aead, salt.length = 4; store_32_le(ms_usage, salt.data); } - ret = krb5_hmac(hash, key, 1, &salt, &d1); + ret = krb5int_hmac(hash, key, 1, &salt, &d1); if (ret != 0) goto cleanup; @@ -272,7 +272,7 @@ krb5int_arcfour_decrypt_iov(const struct krb5_aead_provider *aead, salt.length = 4; store_32_le(ms_usage, (unsigned char *)salt.data); } - ret = krb5_hmac(hash, key, 1, &salt, &d1); + ret = krb5int_hmac(hash, key, 1, &salt, &d1); if (ret != 0) goto cleanup; diff --git a/src/lib/crypto/builtin/arcfour/arcfour_s2k.c b/src/lib/crypto/builtin/arcfour/arcfour_s2k.c index 41053ed17..09c9b7689 100644 --- a/src/lib/crypto/builtin/arcfour/arcfour_s2k.c +++ b/src/lib/crypto/builtin/arcfour/arcfour_s2k.c @@ -35,9 +35,9 @@ krb5int_arcfour_string_to_key(const struct krb5_enc_provider *enc, return err; /* the actual MD4 hash of the data */ - krb5_MD4Init(&md4_context); - krb5_MD4Update(&md4_context, copystr, copystrlen); - krb5_MD4Final(&md4_context); + krb5int_MD4Init(&md4_context); + krb5int_MD4Update(&md4_context, copystr, copystrlen); + krb5int_MD4Final(&md4_context); memcpy(key->contents, md4_context.digest, 16); #if 0 diff --git a/src/lib/crypto/builtin/hash_provider/hash_md4.c b/src/lib/crypto/builtin/hash_provider/hash_md4.c index f507aaaf7..3a4a4d530 100644 --- a/src/lib/crypto/builtin/hash_provider/hash_md4.c +++ b/src/lib/crypto/builtin/hash_provider/hash_md4.c @@ -38,10 +38,10 @@ k5_md4_hash(unsigned int icount, const krb5_data *input, if (output->length != RSA_MD4_CKSUM_LENGTH) return(KRB5_CRYPTO_INTERNAL); - krb5_MD4Init(&ctx); + krb5int_MD4Init(&ctx); for (i=0; idata, ctx.digest, RSA_MD4_CKSUM_LENGTH); diff --git a/src/lib/crypto/builtin/hash_provider/hash_md5.c b/src/lib/crypto/builtin/hash_provider/hash_md5.c index a6e380ae2..10840d0d9 100644 --- a/src/lib/crypto/builtin/hash_provider/hash_md5.c +++ b/src/lib/crypto/builtin/hash_provider/hash_md5.c @@ -38,10 +38,10 @@ k5_md5_hash(unsigned int icount, const krb5_data *input, if (output->length != RSA_MD5_CKSUM_LENGTH) return(KRB5_CRYPTO_INTERNAL); - krb5_MD5Init(&ctx); + krb5int_MD5Init(&ctx); for (i=0; idata, ctx.digest, RSA_MD5_CKSUM_LENGTH); diff --git a/src/lib/crypto/builtin/hmac.c b/src/lib/crypto/builtin/hmac.c index 6726a0826..d1be17e9c 100644 --- a/src/lib/crypto/builtin/hmac.c +++ b/src/lib/crypto/builtin/hmac.c @@ -178,7 +178,7 @@ krb5int_hmac_iov_keyblock(const struct krb5_hash_provider *hash, } krb5_error_code -krb5_hmac(const struct krb5_hash_provider *hash, krb5_key key, +krb5int_hmac(const struct krb5_hash_provider *hash, krb5_key key, unsigned int icount, const krb5_data *input, krb5_data *output) { return krb5int_hmac_keyblock(hash, &key->keyblock, icount, input, output); diff --git a/src/lib/crypto/builtin/md4/md4.c b/src/lib/crypto/builtin/md4/md4.c index 7922c71ed..b36a47613 100644 --- a/src/lib/crypto/builtin/md4/md4.c +++ b/src/lib/crypto/builtin/md4/md4.c @@ -76,7 +76,7 @@ static const unsigned char PADDING[64] = { (a) = ROTATE_LEFT ((a), (s));} void -krb5_MD4Init (krb5_MD4_CTX *mdContext) +krb5int_MD4Init (krb5_MD4_CTX *mdContext) { mdContext->i[0] = mdContext->i[1] = (krb5_ui_4)0; @@ -89,7 +89,7 @@ krb5_MD4Init (krb5_MD4_CTX *mdContext) } void -krb5_MD4Update (krb5_MD4_CTX *mdContext, const unsigned char *inBuf, unsigned int inLen) +krb5int_MD4Update (krb5_MD4_CTX *mdContext, const unsigned char *inBuf, unsigned int inLen) { krb5_ui_4 in[16]; int mdi; @@ -120,7 +120,7 @@ krb5_MD4Update (krb5_MD4_CTX *mdContext, const unsigned char *inBuf, unsigned in } void -krb5_MD4Final (krb5_MD4_CTX *mdContext) +krb5int_MD4Final (krb5_MD4_CTX *mdContext) { krb5_ui_4 in[16]; int mdi; @@ -136,7 +136,7 @@ krb5_MD4Final (krb5_MD4_CTX *mdContext) /* pad out to 56 mod 64 */ padLen = (mdi < 56) ? (56 - mdi) : (120 - mdi); - krb5_MD4Update (mdContext, PADDING, padLen); + krb5int_MD4Update (mdContext, PADDING, padLen); /* append length in bits and transform */ for (i = 0, ii = 0; i < 14; i++, ii += 4) diff --git a/src/lib/crypto/builtin/md4/rsa-md4.h b/src/lib/crypto/builtin/md4/rsa-md4.h index d4e6f6b79..f4272d5ff 100644 --- a/src/lib/crypto/builtin/md4/rsa-md4.h +++ b/src/lib/crypto/builtin/md4/rsa-md4.h @@ -82,9 +82,9 @@ typedef struct { unsigned char digest[16]; /* actual digest after MD4Final call */ } krb5_MD4_CTX; -extern void krb5_MD4Init(krb5_MD4_CTX *); -extern void krb5_MD4Update(krb5_MD4_CTX *, const unsigned char *, unsigned int); -extern void krb5_MD4Final(krb5_MD4_CTX *); +extern void krb5int_MD4Init(krb5_MD4_CTX *); +extern void krb5int_MD4Update(krb5_MD4_CTX *, const unsigned char *, unsigned int); +extern void krb5int_MD4Final(krb5_MD4_CTX *); /* ********************************************************************** diff --git a/src/lib/crypto/builtin/md5/md5.c b/src/lib/crypto/builtin/md5/md5.c index e548dbc3a..8f04be426 100644 --- a/src/lib/crypto/builtin/md5/md5.c +++ b/src/lib/crypto/builtin/md5/md5.c @@ -42,9 +42,9 @@ *********************************************************************** ** Message-digest routines: ** ** To form the message digest for a message M ** - ** (1) Initialize a context buffer mdContext using krb5_MD5Init ** - ** (2) Call krb5_MD5Update on mdContext and M ** - ** (3) Call krb5_MD5Final on mdContext ** + ** (1) Initialize a context buffer mdContext using krb5int_MD5Init ** + ** (2) Call krb5int_MD5Update on mdContext and M ** + ** (3) Call krb5int_MD5Final on mdContext ** ** The message digest is now in mdContext->digest[0...15] ** *********************************************************************** */ @@ -103,11 +103,11 @@ static const unsigned char PADDING[64] = { (a) &= 0xffffffff; \ } -/* The routine krb5_MD5Init initializes the message-digest context +/* The routine krb5int_MD5Init initializes the message-digest context mdContext. All fields are set to zero. */ void -krb5_MD5Init (krb5_MD5_CTX *mdContext) +krb5int_MD5Init (krb5_MD5_CTX *mdContext) { mdContext->i[0] = mdContext->i[1] = (krb5_ui_4)0; @@ -119,12 +119,12 @@ krb5_MD5Init (krb5_MD5_CTX *mdContext) mdContext->buf[3] = 0x10325476UL; } -/* The routine krb5_MD5Update updates the message-digest context to +/* The routine krb5int_MD5Update updates the message-digest context to account for the presence of each of the characters inBuf[0..inLen-1] in the message whose digest is being computed. */ void -krb5_MD5Update (krb5_MD5_CTX *mdContext, const unsigned char *inBuf, unsigned int inLen) +krb5int_MD5Update (krb5_MD5_CTX *mdContext, const unsigned char *inBuf, unsigned int inLen) { krb5_ui_4 in[16]; int mdi; @@ -153,11 +153,11 @@ krb5_MD5Update (krb5_MD5_CTX *mdContext, const unsigned char *inBuf, unsigned in } } -/* The routine krb5_MD5Final terminates the message-digest computation and +/* The routine krb5int_MD5Final terminates the message-digest computation and ends with the desired message digest in mdContext->digest[0...15]. */ void -krb5_MD5Final (krb5_MD5_CTX *mdContext) +krb5int_MD5Final (krb5_MD5_CTX *mdContext) { krb5_ui_4 in[16]; int mdi; @@ -173,7 +173,7 @@ krb5_MD5Final (krb5_MD5_CTX *mdContext) /* pad out to 56 mod 64 */ padLen = (mdi < 56) ? (56 - mdi) : (120 - mdi); - krb5_MD5Update (mdContext, PADDING, padLen); + krb5int_MD5Update (mdContext, PADDING, padLen); /* append length in bits and transform */ for (i = 0, ii = 0; i < 14; i++, ii += 4) diff --git a/src/lib/crypto/builtin/md5/rsa-md5.h b/src/lib/crypto/builtin/md5/rsa-md5.h index 846b23856..938b22d7a 100644 --- a/src/lib/crypto/builtin/md5/rsa-md5.h +++ b/src/lib/crypto/builtin/md5/rsa-md5.h @@ -48,9 +48,9 @@ typedef struct { unsigned char digest[16]; /* actual digest after MD5Final call */ } krb5_MD5_CTX; -extern void krb5_MD5Init(krb5_MD5_CTX *); -extern void krb5_MD5Update(krb5_MD5_CTX *,const unsigned char *,unsigned int); -extern void krb5_MD5Final(krb5_MD5_CTX *); +extern void krb5int_MD5Init(krb5_MD5_CTX *); +extern void krb5int_MD5Update(krb5_MD5_CTX *,const unsigned char *,unsigned int); +extern void krb5int_MD5Final(krb5_MD5_CTX *); #define RSA_MD5_CKSUM_LENGTH 16 #define OLD_RSA_MD5_DES_CKSUM_LENGTH 16 diff --git a/src/lib/crypto/builtin/pbkdf2.c b/src/lib/crypto/builtin/pbkdf2.c index 9201e23b0..96409ba28 100644 --- a/src/lib/crypto/builtin/pbkdf2.c +++ b/src/lib/crypto/builtin/pbkdf2.c @@ -223,7 +223,7 @@ hmac_sha1(krb5_key pass, krb5_data *salt, krb5_data *out) if (debug_hmac) printd(" hmac input", salt); - err = krb5_hmac(h, pass, 1, salt, out); + err = krb5int_hmac(h, pass, 1, salt, out); if (err == 0 && debug_hmac) printd(" hmac output", out); return err; diff --git a/src/lib/crypto/crypto_tests/t_mddriver.c b/src/lib/crypto/crypto_tests/t_mddriver.c index d894aaaec..2c0210cac 100644 --- a/src/lib/crypto/crypto_tests/t_mddriver.c +++ b/src/lib/crypto/crypto_tests/t_mddriver.c @@ -58,9 +58,9 @@ struct md_test_entry { #if MD == 4 #define MD_CTX krb5_MD4_CTX -#define MDInit krb5_MD4Init -#define MDUpdate krb5_MD4Update -#define MDFinal krb5_MD4Final +#define MDInit krb5int_MD4Init +#define MDUpdate krb5int_MD4Update +#define MDFinal krb5int_MD4Final #define HAVE_TEST_SUITE /* Test suite from RFC 1320 */ @@ -94,9 +94,9 @@ struct md_test_entry md_test_suite[] = { #if MD == 5 #define MD_CTX krb5_MD5_CTX -#define MDInit krb5_MD5Init -#define MDUpdate krb5_MD5Update -#define MDFinal krb5_MD5Final +#define MDInit krb5int_MD5Init +#define MDUpdate krb5int_MD5Update +#define MDFinal krb5int_MD5Final #define HAVE_TEST_SUITE /* Test suite from RFC 1321 */ diff --git a/src/lib/crypto/crypto_tests/t_nfold.c b/src/lib/crypto/crypto_tests/t_nfold.c index 6be0a0934..2b5b0e3f8 100644 --- a/src/lib/crypto/crypto_tests/t_nfold.c +++ b/src/lib/crypto/crypto_tests/t_nfold.c @@ -82,7 +82,7 @@ static void rfc_tests () for (i = 0; i < ASIZE (tests); i++) { unsigned char *p = (unsigned char *) tests[i].input; assert (tests[i].n / 8 <= sizeof (outbuf)); - krb5_nfold (8 * strlen ((char *) p), p, tests[i].n, outbuf); + krb5int_nfold (8 * strlen ((char *) p), p, tests[i].n, outbuf); printf ("%d-fold(\"%s\") =\n", tests[i].n, p); printf ("%d-fold(", tests[i].n); printstringhex (p); @@ -106,7 +106,7 @@ static void fold_kerberos(unsigned int nbytes) abort(); printf("%d-fold(\"kerberos\") =\n\t", nbytes*8); - krb5_nfold(64, (unsigned char *) "kerberos", 8*nbytes, cipher_text); + krb5int_nfold(64, (unsigned char *) "kerberos", 8*nbytes, cipher_text); for (j=0; jhashsize; - else if (krb5_cksumtypes_list[i].trunc_size) - *length = krb5_cksumtypes_list[i].trunc_size; + if (krb5int_cksumtypes_list[i].keyhash) + *length = krb5int_cksumtypes_list[i].keyhash->hashsize; + else if (krb5int_cksumtypes_list[i].trunc_size) + *length = krb5int_cksumtypes_list[i].trunc_size; else - *length = krb5_cksumtypes_list[i].hash->hashsize; + *length = krb5int_cksumtypes_list[i].hash->hashsize; return 0; } diff --git a/src/lib/crypto/krb/cksumtype_to_string.c b/src/lib/crypto/krb/cksumtype_to_string.c index 82e0702c8..d97476623 100644 --- a/src/lib/crypto/krb/cksumtype_to_string.c +++ b/src/lib/crypto/krb/cksumtype_to_string.c @@ -32,9 +32,9 @@ krb5_cksumtype_to_string(krb5_cksumtype cksumtype, char *buffer, size_t buflen) { unsigned int i; - for (i = 0; i < krb5_cksumtypes_length; i++) { - if (krb5_cksumtypes_list[i].ctype == cksumtype) { - if (strlcpy(buffer, krb5_cksumtypes_list[i].out_string, + for (i = 0; i < krb5int_cksumtypes_length; i++) { + if (krb5int_cksumtypes_list[i].ctype == cksumtype) { + if (strlcpy(buffer, krb5int_cksumtypes_list[i].out_string, buflen) >= buflen) return ENOMEM; return 0; diff --git a/src/lib/crypto/krb/cksumtypes.c b/src/lib/crypto/krb/cksumtypes.c index 2b5f33d30..e03c0adc8 100644 --- a/src/lib/crypto/krb/cksumtypes.c +++ b/src/lib/crypto/krb/cksumtypes.c @@ -29,7 +29,7 @@ #include "keyhash_provider.h" #include "cksumtypes.h" -const struct krb5_cksumtypes krb5_cksumtypes_list[] = { +const struct krb5_cksumtypes krb5int_cksumtypes_list[] = { { CKSUMTYPE_CRC32, KRB5_CKSUMFLAG_NOT_COLL_PROOF, "crc32", { 0 }, "CRC-32", 0, NULL, @@ -87,5 +87,5 @@ const struct krb5_cksumtypes krb5_cksumtypes_list[] = { NULL } }; -const unsigned int krb5_cksumtypes_length = - sizeof(krb5_cksumtypes_list) / sizeof(struct krb5_cksumtypes); +const unsigned int krb5int_cksumtypes_length = + sizeof(krb5int_cksumtypes_list) / sizeof(struct krb5_cksumtypes); diff --git a/src/lib/crypto/krb/cksumtypes.h b/src/lib/crypto/krb/cksumtypes.h index 05e7be6c2..10d8ccd53 100644 --- a/src/lib/crypto/krb/cksumtypes.h +++ b/src/lib/crypto/krb/cksumtypes.h @@ -63,6 +63,6 @@ struct krb5_cksumtypes { #define KRB5_CKSUMFLAG_DERIVE 0x0001 #define KRB5_CKSUMFLAG_NOT_COLL_PROOF 0x0002 -extern const struct krb5_cksumtypes krb5_cksumtypes_list[]; -extern const unsigned int krb5_cksumtypes_length; +extern const struct krb5_cksumtypes krb5int_cksumtypes_list[]; +extern const unsigned int krb5int_cksumtypes_length; #endif diff --git a/src/lib/crypto/krb/coll_proof_cksum.c b/src/lib/crypto/krb/coll_proof_cksum.c index d66863e1d..08b4ccb11 100644 --- a/src/lib/crypto/krb/coll_proof_cksum.c +++ b/src/lib/crypto/krb/coll_proof_cksum.c @@ -32,9 +32,9 @@ krb5_c_is_coll_proof_cksum(krb5_cksumtype ctype) { unsigned int i; - for (i = 0; i < krb5_cksumtypes_length; i++) { - if (krb5_cksumtypes_list[i].ctype == ctype) - return((krb5_cksumtypes_list[i].flags & + for (i = 0; i < krb5int_cksumtypes_length; i++) { + if (krb5int_cksumtypes_list[i].ctype == ctype) + return((krb5int_cksumtypes_list[i].flags & KRB5_CKSUMFLAG_NOT_COLL_PROOF) ? FALSE : TRUE); } diff --git a/src/lib/crypto/krb/combine_keys.c b/src/lib/crypto/krb/combine_keys.c index acfb99bbd..0cf3f6f10 100644 --- a/src/lib/crypto/krb/combine_keys.c +++ b/src/lib/crypto/krb/combine_keys.c @@ -137,14 +137,14 @@ krb5int_c_combine_keys(krb5_context context, krb5_keyblock *key1, /* * Concatenate the two keys together, and then run them through * n-fold to reduce them to a length appropriate for the random-to-key - * operation. Note here that krb5_nfold() takes sizes in bits, hence + * operation. Note here that krb5int_nfold() takes sizes in bits, hence * the multiply by 8. */ memcpy(combined, r1, keybytes); memcpy(combined + keybytes, r2, keybytes); - krb5_nfold((keybytes * 2) * 8, combined, keybytes * 8, rnd); + krb5int_nfold((keybytes * 2) * 8, combined, keybytes * 8, rnd); /* * Run the "random" bits through random-to-key to produce a encryption @@ -190,7 +190,7 @@ krb5int_c_combine_keys(krb5_context context, krb5_keyblock *key1, myalloc = TRUE; } - ret = krb5_derive_keyblock(enc, tkey, outkey, &input); + ret = krb5int_derive_keyblock(enc, tkey, outkey, &input); if (ret) { if (myalloc) { free(outkey->contents); @@ -248,7 +248,7 @@ dr(const struct krb5_enc_provider *enc, const krb5_keyblock *inkey, if (in_constant->length == inblock.length) { memcpy(inblock.data, in_constant->data, inblock.length); } else { - krb5_nfold(in_constant->length*8, (unsigned char *) in_constant->data, + krb5int_nfold(in_constant->length*8, (unsigned char *) in_constant->data, inblock.length*8, (unsigned char *) inblock.data); } diff --git a/src/lib/crypto/krb/dk/checksum.c b/src/lib/crypto/krb/dk/checksum.c index 31e7de90e..e5087e742 100644 --- a/src/lib/crypto/krb/dk/checksum.c +++ b/src/lib/crypto/krb/dk/checksum.c @@ -32,7 +32,7 @@ #define K5CLENGTH 5 /* 32 bit net byte order integer + one byte seed */ krb5_error_code -krb5_dk_make_checksum(const struct krb5_hash_provider *hash, +krb5int_dk_make_checksum(const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *input, krb5_data *output) { @@ -50,7 +50,7 @@ krb5_dk_make_checksum(const struct krb5_hash_provider *hash, /* * key->length will be tested in enc->encrypt. - * output->length will be tested in krb5_hmac. + * output->length will be tested in krb5int_hmac. */ /* Derive the key. */ @@ -62,7 +62,7 @@ krb5_dk_make_checksum(const struct krb5_hash_provider *hash, datain.data[4] = (char) 0x99; - ret = krb5_derive_key(enc, key, &kc, &datain); + ret = krb5int_derive_key(enc, key, &kc, &datain); if (ret) return ret; @@ -70,7 +70,7 @@ krb5_dk_make_checksum(const struct krb5_hash_provider *hash, datain = *input; - ret = krb5_hmac(hash, kc, 1, &datain, output); + ret = krb5int_hmac(hash, kc, 1, &datain, output); if (ret) memset(output->data, 0, output->length); @@ -98,7 +98,7 @@ krb5int_dk_make_checksum_iov(const struct krb5_hash_provider *hash, /* * key->length will be tested in enc->encrypt. - * output->length will be tested in krb5_hmac. + * output->length will be tested in krb5int_hmac. */ /* Derive the key. */ @@ -110,7 +110,7 @@ krb5int_dk_make_checksum_iov(const struct krb5_hash_provider *hash, datain.data[4] = (char) 0x99; - ret = krb5_derive_key(enc, key, &kc, &datain); + ret = krb5int_derive_key(enc, key, &kc, &datain); if (ret) return ret; diff --git a/src/lib/crypto/krb/dk/derive.c b/src/lib/crypto/krb/dk/derive.c index c2638e804..bcd111435 100644 --- a/src/lib/crypto/krb/dk/derive.c +++ b/src/lib/crypto/krb/dk/derive.c @@ -80,12 +80,12 @@ cleanup: /* * Compute a derived key into the keyblock outkey. This variation on - * krb5_derive_key does not cache the result, as it is only used + * krb5int_derive_key does not cache the result, as it is only used * directly in situations which are not expected to be repeated with * the same inkey and constant. */ krb5_error_code -krb5_derive_keyblock(const struct krb5_enc_provider *enc, +krb5int_derive_keyblock(const struct krb5_enc_provider *enc, krb5_key inkey, krb5_keyblock *outkey, const krb5_data *in_constant) { @@ -123,7 +123,7 @@ krb5_derive_keyblock(const struct krb5_enc_provider *enc, if (in_constant->length == inblock.length) { memcpy(inblock.data, in_constant->data, inblock.length); } else { - krb5_nfold(in_constant->length*8, (unsigned char *) in_constant->data, + krb5int_nfold(in_constant->length*8, (unsigned char *) in_constant->data, inblock.length*8, (unsigned char *) inblock.data); } @@ -162,7 +162,7 @@ cleanup: } krb5_error_code -krb5_derive_key(const struct krb5_enc_provider *enc, +krb5int_derive_key(const struct krb5_enc_provider *enc, krb5_key inkey, krb5_key *outkey, const krb5_data *in_constant) { @@ -184,7 +184,7 @@ krb5_derive_key(const struct krb5_enc_provider *enc, keyblock.contents = malloc(keyblock.length); if (keyblock.contents == NULL) return ENOMEM; - ret = krb5_derive_keyblock(enc, inkey, &keyblock, in_constant); + ret = krb5int_derive_keyblock(enc, inkey, &keyblock, in_constant); if (ret) goto cleanup; @@ -201,7 +201,7 @@ cleanup: } krb5_error_code -krb5_derive_random(const struct krb5_enc_provider *enc, +krb5int_derive_random(const struct krb5_enc_provider *enc, krb5_key inkey, krb5_data *outrnd, const krb5_data *in_constant) { @@ -238,7 +238,7 @@ krb5_derive_random(const struct krb5_enc_provider *enc, if (in_constant->length == inblock.length) { memcpy(inblock.data, in_constant->data, inblock.length); } else { - krb5_nfold(in_constant->length*8, (unsigned char *) in_constant->data, + krb5int_nfold(in_constant->length*8, (unsigned char *) in_constant->data, inblock.length*8, (unsigned char *) inblock.data); } diff --git a/src/lib/crypto/krb/dk/dk.h b/src/lib/crypto/krb/dk/dk.h index 6566ce8d5..67cbf1397 100644 --- a/src/lib/crypto/krb/dk/dk.h +++ b/src/lib/crypto/krb/dk/dk.h @@ -26,21 +26,25 @@ #include "k5-int.h" -void krb5_dk_encrypt_length(const struct krb5_enc_provider *enc, +void +krb5int_dk_encrypt_length(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, size_t input, size_t *length); -krb5_error_code krb5_dk_encrypt(const struct krb5_enc_provider *enc, +krb5_error_code +krb5int_dk_encrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output); -void krb5int_aes_encrypt_length(const struct krb5_enc_provider *enc, +void +krb5int_aes_encrypt_length(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, size_t input, size_t *length); -krb5_error_code krb5int_aes_dk_encrypt(const struct krb5_enc_provider *enc, +krb5_error_code +krb5int_aes_dk_encrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, @@ -48,13 +52,15 @@ krb5_error_code krb5int_aes_dk_encrypt(const struct krb5_enc_provider *enc, const krb5_data *input, krb5_data *output); -krb5_error_code krb5_dk_decrypt(const struct krb5_enc_provider *enc, +krb5_error_code +krb5int_dk_decrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *arg_output); -krb5_error_code krb5int_aes_dk_decrypt(const struct krb5_enc_provider *enc, +krb5_error_code +krb5int_aes_dk_decrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, @@ -62,23 +68,27 @@ krb5_error_code krb5int_aes_dk_decrypt(const struct krb5_enc_provider *enc, const krb5_data *input, krb5_data *arg_output); -krb5_error_code krb5int_dk_string_to_key(const struct krb5_enc_provider *enc, +krb5_error_code +krb5int_dk_string_to_key(const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *params, krb5_keyblock *key); -krb5_error_code krb5_derive_keyblock(const struct krb5_enc_provider *enc, +krb5_error_code +krb5int_derive_keyblock(const struct krb5_enc_provider *enc, krb5_key inkey, krb5_keyblock *outkey, const krb5_data *in_constant); -krb5_error_code krb5_derive_key(const struct krb5_enc_provider *enc, +krb5_error_code +krb5_derive_key(const struct krb5_enc_provider *enc, krb5_key inkey, krb5_key *outkey, const krb5_data *in_constant); -krb5_error_code krb5_dk_make_checksum(const struct krb5_hash_provider *hash, +krb5_error_code +krb5int_dk_make_checksum(const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *input, @@ -91,7 +101,7 @@ krb5int_dk_make_checksum_iov(const struct krb5_hash_provider *hash, krb5_data *output); krb5_error_code -krb5_derive_random(const struct krb5_enc_provider *enc, +krb5int_derive_random(const struct krb5_enc_provider *enc, krb5_key inkey, krb5_data *outrnd, const krb5_data *in_constant); diff --git a/src/lib/crypto/krb/dk/dk_aead.c b/src/lib/crypto/krb/dk/dk_aead.c index 5c9c1ad5c..e35ca5549 100644 --- a/src/lib/crypto/krb/dk/dk_aead.c +++ b/src/lib/crypto/krb/dk/dk_aead.c @@ -136,13 +136,13 @@ krb5int_dk_encrypt_iov(const struct krb5_aead_provider *aead, d1.data[4] = 0xAA; - ret = krb5_derive_key(enc, key, &ke, &d1); + ret = krb5int_derive_key(enc, key, &ke, &d1); if (ret != 0) goto cleanup; d1.data[4] = 0x55; - ret = krb5_derive_key(enc, key, &ki, &d1); + ret = krb5int_derive_key(enc, key, &ki, &d1); if (ret != 0) goto cleanup; @@ -261,13 +261,13 @@ krb5int_dk_decrypt_iov(const struct krb5_aead_provider *aead, d1.data[4] = 0xAA; - ret = krb5_derive_key(enc, key, &ke, &d1); + ret = krb5int_derive_key(enc, key, &ke, &d1); if (ret != 0) goto cleanup; d1.data[4] = 0x55; - ret = krb5_derive_key(enc, key, &ki, &d1); + ret = krb5int_derive_key(enc, key, &ki, &d1); if (ret != 0) goto cleanup; diff --git a/src/lib/crypto/krb/dk/dk_decrypt.c b/src/lib/crypto/krb/dk/dk_decrypt.c index abb7a39b0..9535a7554 100644 --- a/src/lib/crypto/krb/dk/dk_decrypt.c +++ b/src/lib/crypto/krb/dk/dk_decrypt.c @@ -41,7 +41,7 @@ krb5_dk_decrypt_maybe_trunc_hmac(const struct krb5_enc_provider *enc, int ivec_mode); krb5_error_code -krb5_dk_decrypt(const struct krb5_enc_provider *enc, +krb5int_dk_decrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, @@ -104,13 +104,13 @@ krb5_dk_decrypt_maybe_trunc_hmac(const struct krb5_enc_provider *enc, d1.data[4] = (char) 0xAA; - ret = krb5_derive_key(enc, key, &ke, &d1); + ret = krb5int_derive_key(enc, key, &ke, &d1); if (ret != 0) goto cleanup; d1.data[4] = 0x55; - ret = krb5_derive_key(enc, key, &ki, &d1); + ret = krb5int_derive_key(enc, key, &ki, &d1); if (ret != 0) goto cleanup; @@ -142,7 +142,7 @@ krb5_dk_decrypt_maybe_trunc_hmac(const struct krb5_enc_provider *enc, d1.length = hashsize; d1.data = (char *) cksum; - ret = krb5_hmac(hash, ki, 1, &d2, &d1); + ret = krb5int_hmac(hash, ki, 1, &d2, &d1); if (ret != 0) goto cleanup; diff --git a/src/lib/crypto/krb/dk/dk_encrypt.c b/src/lib/crypto/krb/dk/dk_encrypt.c index bb045fa6b..b44671abe 100644 --- a/src/lib/crypto/krb/dk/dk_encrypt.c +++ b/src/lib/crypto/krb/dk/dk_encrypt.c @@ -39,7 +39,7 @@ */ void -krb5_dk_encrypt_length(const struct krb5_enc_provider *enc, +krb5int_dk_encrypt_length(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, size_t inputlen, size_t *length) { @@ -51,7 +51,7 @@ krb5_dk_encrypt_length(const struct krb5_enc_provider *enc, } krb5_error_code -krb5_dk_encrypt(const struct krb5_enc_provider *enc, +krb5int_dk_encrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, @@ -68,7 +68,7 @@ krb5_dk_encrypt(const struct krb5_enc_provider *enc, blocksize = enc->block_size; plainlen = krb5_roundup(blocksize + input->length, blocksize); - krb5_dk_encrypt_length(enc, hash, input->length, &enclen); + krb5int_dk_encrypt_length(enc, hash, input->length, &enclen); /* key->length, ivec will be tested in enc->encrypt. */ @@ -90,13 +90,13 @@ krb5_dk_encrypt(const struct krb5_enc_provider *enc, d1.data[4] = (char) 0xAA; - ret = krb5_derive_key(enc, key, &ke, &d1); + ret = krb5int_derive_key(enc, key, &ke, &d1); if (ret != 0) goto cleanup; d1.data[4] = 0x55; - ret = krb5_derive_key(enc, key, &ki, &d1); + ret = krb5int_derive_key(enc, key, &ki, &d1); if (ret != 0) goto cleanup; @@ -138,7 +138,7 @@ krb5_dk_encrypt(const struct krb5_enc_provider *enc, output->length = enclen; - ret = krb5_hmac(hash, ki, 1, &d1, &d2); + ret = krb5int_hmac(hash, ki, 1, &d1, &d2); if (ret != 0) { memset(d2.data, 0, d2.length); goto cleanup; @@ -188,7 +188,7 @@ trunc_hmac (const struct krb5_hash_provider *hash, tmp.data = malloc(hashsize); if (tmp.data == NULL) return ENOMEM; - ret = krb5_hmac(hash, ki, num, input, &tmp); + ret = krb5int_hmac(hash, ki, num, input, &tmp); if (ret == 0) memcpy(output->data, tmp.data, output->length); memset(tmp.data, 0, hashsize); @@ -237,13 +237,13 @@ krb5int_aes_dk_encrypt(const struct krb5_enc_provider *enc, d1.data[4] = (char) 0xAA; - ret = krb5_derive_key(enc, key, &ke, &d1); + ret = krb5int_derive_key(enc, key, &ke, &d1); if (ret != 0) goto cleanup; d1.data[4] = 0x55; - ret = krb5_derive_key(enc, key, &ki, &d1); + ret = krb5int_derive_key(enc, key, &ki, &d1); if (ret != 0) goto cleanup; diff --git a/src/lib/crypto/krb/dk/stringtokey.c b/src/lib/crypto/krb/dk/stringtokey.c index 48b053ad9..7589b4b80 100644 --- a/src/lib/crypto/krb/dk/stringtokey.c +++ b/src/lib/crypto/krb/dk/stringtokey.c @@ -41,7 +41,7 @@ krb5int_dk_string_to_key(const struct krb5_enc_provider *enc, krb5_keyblock foldkeyblock; krb5_key foldkey = NULL; - /* keyblock->length is checked by krb5_derive_key. */ + /* keyblock->length is checked by krb5int_derive_key. */ keybytes = enc->keybytes; keylength = enc->keylength; @@ -64,7 +64,7 @@ krb5int_dk_string_to_key(const struct krb5_enc_provider *enc, if (salt) memcpy(concat + string->length, salt->data, salt->length); - krb5_nfold(concatlen*8, concat, keybytes*8, foldstring); + krb5int_nfold(concatlen*8, concat, keybytes*8, foldstring); indata.length = keybytes; indata.data = (char *) foldstring; @@ -84,7 +84,7 @@ krb5int_dk_string_to_key(const struct krb5_enc_provider *enc, indata.length = kerberos_len; indata.data = (char *) kerberos; - ret = krb5_derive_keyblock(enc, foldkey, keyblock, &indata); + ret = krb5int_derive_keyblock(enc, foldkey, keyblock, &indata); if (ret != 0) memset(keyblock->contents, 0, keyblock->length); diff --git a/src/lib/crypto/krb/etypes.c b/src/lib/crypto/krb/etypes.c index b3abd1835..8552c0f16 100644 --- a/src/lib/crypto/krb/etypes.c +++ b/src/lib/crypto/krb/etypes.c @@ -42,12 +42,12 @@ that the keytypes are all near each other. I'd rather not make that assumption. */ -const struct krb5_keytypes krb5_enctypes_list[] = { +const struct krb5_keytypes krb5int_enctypes_list[] = { { ENCTYPE_DES_CBC_CRC, "des-cbc-crc", { 0 }, "DES cbc mode with CRC-32", &krb5int_enc_des, &krb5int_hash_crc32, 16, - krb5_old_encrypt_length, krb5_old_encrypt, krb5_old_decrypt, + krb5int_old_encrypt_length, krb5int_old_encrypt, krb5int_old_decrypt, krb5int_des_string_to_key, krb5int_des_prf, CKSUMTYPE_RSA_MD5, @@ -57,7 +57,7 @@ const struct krb5_keytypes krb5_enctypes_list[] = { "des-cbc-md4", { 0 }, "DES cbc mode with RSA-MD4", &krb5int_enc_des, &krb5int_hash_md4, 16, - krb5_old_encrypt_length, krb5_old_encrypt, krb5_old_decrypt, + krb5int_old_encrypt_length, krb5int_old_encrypt, krb5int_old_decrypt, krb5int_des_string_to_key, krb5int_des_prf, CKSUMTYPE_RSA_MD4, @@ -67,7 +67,7 @@ const struct krb5_keytypes krb5_enctypes_list[] = { "des-cbc-md5", { "des" }, "DES cbc mode with RSA-MD5", &krb5int_enc_des, &krb5int_hash_md5, 16, - krb5_old_encrypt_length, krb5_old_encrypt, krb5_old_decrypt, + krb5int_old_encrypt_length, krb5int_old_encrypt, krb5int_old_decrypt, krb5int_des_string_to_key, krb5int_des_prf, CKSUMTYPE_RSA_MD5, @@ -77,7 +77,7 @@ const struct krb5_keytypes krb5_enctypes_list[] = { "des-cbc-raw", { 0 }, "DES cbc mode raw", &krb5int_enc_des, NULL, 16, - krb5_raw_encrypt_length, krb5_raw_encrypt, krb5_raw_decrypt, + krb5_raw_encrypt_length, krb5int_raw_encrypt, krb5int_raw_decrypt, krb5int_des_string_to_key, krb5int_des_prf, 0, @@ -87,7 +87,7 @@ const struct krb5_keytypes krb5_enctypes_list[] = { "des3-cbc-raw", { 0 }, "Triple DES cbc mode raw", &krb5int_enc_des3, NULL, 16, - krb5_raw_encrypt_length, krb5_raw_encrypt, krb5_raw_decrypt, + krb5_raw_encrypt_length, krb5int_raw_encrypt, krb5int_raw_decrypt, krb5int_dk_string_to_key, NULL, /*PRF*/ 0, @@ -99,7 +99,7 @@ const struct krb5_keytypes krb5_enctypes_list[] = { "Triple DES cbc mode with HMAC/sha1", &krb5int_enc_des3, &krb5int_hash_sha1, 16, - krb5_dk_encrypt_length, krb5_dk_encrypt, krb5_dk_decrypt, + krb5int_dk_encrypt_length, krb5int_dk_encrypt, krb5int_dk_decrypt, krb5int_dk_string_to_key, krb5int_dk_prf, CKSUMTYPE_HMAC_SHA1_DES3, @@ -110,7 +110,7 @@ const struct krb5_keytypes krb5_enctypes_list[] = { "des-hmac-sha1", { 0 }, "DES with HMAC/sha1", &krb5int_enc_des, &krb5int_hash_sha1, 8, - krb5_dk_encrypt_length, krb5_dk_encrypt, krb5_dk_decrypt, + krb5int_dk_encrypt_length, krb5int_dk_encrypt, krb5int_dk_decrypt, krb5int_dk_string_to_key, NULL, /*PRF*/ 0, @@ -122,8 +122,8 @@ const struct krb5_keytypes krb5_enctypes_list[] = { &krb5int_enc_arcfour, &krb5int_hash_md5, 20, - krb5_arcfour_encrypt_length, krb5_arcfour_encrypt, - krb5_arcfour_decrypt, krb5int_arcfour_string_to_key, + krb5int_arcfour_encrypt_length, krb5int_arcfour_encrypt, + krb5int_arcfour_decrypt, krb5int_arcfour_string_to_key, krb5int_arcfour_prf, /*PRF*/ CKSUMTYPE_HMAC_MD5_ARCFOUR, &krb5int_aead_arcfour, @@ -134,8 +134,8 @@ const struct krb5_keytypes krb5_enctypes_list[] = { &krb5int_enc_arcfour, &krb5int_hash_md5, 20, - krb5_arcfour_encrypt_length, krb5_arcfour_encrypt, - krb5_arcfour_decrypt, krb5int_arcfour_string_to_key, + krb5int_arcfour_encrypt_length, krb5int_arcfour_encrypt, + krb5int_arcfour_decrypt, krb5int_arcfour_string_to_key, krb5int_arcfour_prf, /*PRF*/ CKSUMTYPE_HMAC_MD5_ARCFOUR, &krb5int_aead_arcfour, @@ -166,5 +166,5 @@ const struct krb5_keytypes krb5_enctypes_list[] = { 0 /*flags*/ }, }; -const int krb5_enctypes_length = - sizeof(krb5_enctypes_list) / sizeof(struct krb5_keytypes); +const int krb5int_enctypes_length = + sizeof(krb5int_enctypes_list) / sizeof(struct krb5_keytypes); diff --git a/src/lib/crypto/krb/etypes.h b/src/lib/crypto/krb/etypes.h index edaa00cae..16dbae9ce 100644 --- a/src/lib/crypto/krb/etypes.h +++ b/src/lib/crypto/krb/etypes.h @@ -71,20 +71,20 @@ struct krb5_keytypes { #define ETYPE_WEAK 1 -extern const struct krb5_keytypes krb5_enctypes_list[]; -extern const int krb5_enctypes_length; +extern const struct krb5_keytypes krb5int_enctypes_list[]; +extern const int krb5int_enctypes_length; static inline const struct krb5_keytypes * find_enctype(krb5_enctype enctype) { int i; - for (i = 0; i < krb5_enctypes_length; i++) { - if (krb5_enctypes_list[i].etype == enctype) + for (i = 0; i < krb5int_enctypes_length; i++) { + if (krb5int_enctypes_list[i].etype == enctype) break; } - if (i == krb5_enctypes_length) + if (i == krb5int_enctypes_length) return NULL; - return &krb5_enctypes_list[i]; + return &krb5int_enctypes_list[i]; } diff --git a/src/lib/crypto/krb/keyed_checksum_types.c b/src/lib/crypto/krb/keyed_checksum_types.c index 2fd239c40..48743722a 100644 --- a/src/lib/crypto/krb/keyed_checksum_types.c +++ b/src/lib/crypto/krb/keyed_checksum_types.c @@ -50,8 +50,8 @@ krb5_c_keyed_checksum_types(krb5_context context, krb5_enctype enctype, *cksumtypes = NULL; nctypes = 0; - for (i = 0; i < krb5_cksumtypes_length; i++) { - ct = &krb5_cksumtypes_list[i]; + for (i = 0; i < krb5int_cksumtypes_length; i++) { + ct = &krb5int_cksumtypes_list[i]; if ((ct->keyhash && etype_match(ct->keyed_etype, enctype)) || (ct->flags & KRB5_CKSUMFLAG_DERIVE)) nctypes++; @@ -62,11 +62,11 @@ krb5_c_keyed_checksum_types(krb5_context context, krb5_enctype enctype, return ENOMEM; c = 0; - for (i = 0; i < krb5_cksumtypes_length; i++) { - ct = &krb5_cksumtypes_list[i]; + for (i = 0; i < krb5int_cksumtypes_length; i++) { + ct = &krb5int_cksumtypes_list[i]; if ((ct->keyhash && etype_match(ct->keyed_etype, enctype)) || (ct->flags & KRB5_CKSUMFLAG_DERIVE)) - ctypes[c++] = krb5_cksumtypes_list[i].ctype; + ctypes[c++] = krb5int_cksumtypes_list[i].ctype; } *count = nctypes; diff --git a/src/lib/crypto/krb/keyed_cksum.c b/src/lib/crypto/krb/keyed_cksum.c index 8cf5f1052..dcf72b533 100644 --- a/src/lib/crypto/krb/keyed_cksum.c +++ b/src/lib/crypto/krb/keyed_cksum.c @@ -33,8 +33,8 @@ krb5_c_is_keyed_cksum(krb5_cksumtype ctype) unsigned int i; const struct krb5_cksumtypes *ctp; - for (i = 0; i < krb5_cksumtypes_length; i++) { - ctp = &krb5_cksumtypes_list[i]; + for (i = 0; i < krb5int_cksumtypes_length; i++) { + ctp = &krb5int_cksumtypes_list[i]; if (ctp->ctype == ctype) { return (ctp->keyhash != NULL || (ctp->flags & KRB5_CKSUMFLAG_DERIVE)); diff --git a/src/lib/crypto/krb/keyhash_provider/hmac_md5.c b/src/lib/crypto/krb/keyhash_provider/hmac_md5.c index c1825be6a..8318dc0e7 100644 --- a/src/lib/crypto/krb/keyhash_provider/hmac_md5.c +++ b/src/lib/crypto/krb/keyhash_provider/hmac_md5.c @@ -57,7 +57,7 @@ k5_hmac_md5_hash (krb5_key key, krb5_keyusage usage, ks_constant.data = "signaturekey"; ks_constant.length = strlen(ks_constant.data)+1; /* Including null*/ - ret = krb5_hmac( &krb5int_hash_md5, key, 1, + ret = krb5int_hmac( &krb5int_hash_md5, key, 1, &ks_constant, &ds); if (ret) goto cleanup; @@ -68,17 +68,17 @@ k5_hmac_md5_hash (krb5_key key, krb5_keyusage usage, if (ret) goto cleanup; - krb5_MD5Init (&ctx); + krb5int_MD5Init (&ctx); ms_usage = krb5int_arcfour_translate_usage (usage); store_32_le(ms_usage, t); - krb5_MD5Update (&ctx, (unsigned char * ) &t, 4); - krb5_MD5Update (&ctx, (unsigned char *) input-> data, + krb5int_MD5Update (&ctx, (unsigned char * ) &t, 4); + krb5int_MD5Update (&ctx, (unsigned char *) input-> data, (unsigned int) input->length ); - krb5_MD5Final(&ctx); + krb5int_MD5Final(&ctx); md5tmp.data = (void *) ctx.digest; md5tmp.length = 16; - ret = krb5_hmac ( &krb5int_hash_md5, ks, 1, &md5tmp, + ret = krb5int_hmac ( &krb5int_hash_md5, ks, 1, &md5tmp, output); cleanup: @@ -114,7 +114,7 @@ k5_hmac_md5_hash_iov (krb5_key key, krb5_keyusage usage, ks_constant.data = "signaturekey"; ks_constant.length = strlen(ks_constant.data)+1; /* Including null*/ - ret = krb5_hmac( &krb5int_hash_md5, key, 1, + ret = krb5int_hmac( &krb5int_hash_md5, key, 1, &ks_constant, &ds); if (ret) goto cleanup; @@ -125,21 +125,21 @@ k5_hmac_md5_hash_iov (krb5_key key, krb5_keyusage usage, if (ret) goto cleanup; - krb5_MD5Init (&ctx); + krb5int_MD5Init (&ctx); ms_usage = krb5int_arcfour_translate_usage (usage); store_32_le(ms_usage, t); - krb5_MD5Update (&ctx, (unsigned char * ) &t, 4); + krb5int_MD5Update (&ctx, (unsigned char * ) &t, 4); for (i = 0; i < num_data; i++) { const krb5_crypto_iov *iov = &data[i]; if (SIGN_IOV(iov)) - krb5_MD5Update (&ctx, (unsigned char *)iov->data.data, + krb5int_MD5Update (&ctx, (unsigned char *)iov->data.data, (unsigned int)iov->data.length); } - krb5_MD5Final(&ctx); + krb5int_MD5Final(&ctx); md5tmp.data = (void *) ctx.digest; md5tmp.length = 16; - ret = krb5_hmac ( &krb5int_hash_md5, ks, 1, &md5tmp, + ret = krb5int_hmac ( &krb5int_hash_md5, ks, 1, &md5tmp, output); cleanup: diff --git a/src/lib/crypto/krb/keyhash_provider/k5_md4des.c b/src/lib/crypto/krb/keyhash_provider/k5_md4des.c index 1514dccc6..f3c6d62da 100644 --- a/src/lib/crypto/krb/keyhash_provider/k5_md4des.c +++ b/src/lib/crypto/krb/keyhash_provider/k5_md4des.c @@ -32,7 +32,7 @@ #define CONFLENGTH 8 /* Force acceptance of krb5-beta5 md4des checksum for now. */ -#define KRB5_MD4DES_BETA5_COMPAT +#define KRB5int_MD4DES_BETA5_COMPAT /* des-cbc(xorkey, conf | rsa-md4(conf | data)) */ @@ -60,11 +60,11 @@ k5_md4des_hash(krb5_key key, krb5_keyusage usage, const krb5_data *ivec, /* hash the confounder, then the input data */ - krb5_MD4Init(&ctx); - krb5_MD4Update(&ctx, conf, CONFLENGTH); - krb5_MD4Update(&ctx, (unsigned char *) input->data, + krb5int_MD4Init(&ctx); + krb5int_MD4Update(&ctx, conf, CONFLENGTH); + krb5int_MD4Update(&ctx, (unsigned char *) input->data, (unsigned int) input->length); - krb5_MD4Final(&ctx); + krb5int_MD4Final(&ctx); /* construct the buffer to be encrypted */ @@ -92,7 +92,7 @@ k5_md4des_verify(krb5_key key, krb5_keyusage usage, if (key->keyblock.length != 8) return(KRB5_BAD_KEYSIZE); if (hash->length != (CONFLENGTH+RSA_MD4_CKSUM_LENGTH)) { -#ifdef KRB5_MD4DES_BETA5_COMPAT +#ifdef KRB5int_MD4DES_BETA5_COMPAT if (hash->length != RSA_MD4_CKSUM_LENGTH) return(KRB5_CRYPTO_INTERNAL); else @@ -132,13 +132,13 @@ k5_md4des_verify(krb5_key key, krb5_keyusage usage, /* hash the confounder, then the input data */ - krb5_MD4Init(&ctx); + krb5int_MD4Init(&ctx); if (!compathash) { - krb5_MD4Update(&ctx, plaintext, CONFLENGTH); + krb5int_MD4Update(&ctx, plaintext, CONFLENGTH); } - krb5_MD4Update(&ctx, (unsigned char *) input->data, + krb5int_MD4Update(&ctx, (unsigned char *) input->data, (unsigned int) input->length); - krb5_MD4Final(&ctx); + krb5int_MD4Final(&ctx); /* compare the decrypted hash to the computed one */ diff --git a/src/lib/crypto/krb/keyhash_provider/k5_md5des.c b/src/lib/crypto/krb/keyhash_provider/k5_md5des.c index e7a84e2a8..1a2089a02 100644 --- a/src/lib/crypto/krb/keyhash_provider/k5_md5des.c +++ b/src/lib/crypto/krb/keyhash_provider/k5_md5des.c @@ -32,7 +32,7 @@ #define CONFLENGTH 8 /* Force acceptance of krb5-beta5 md5des checksum for now. */ -#define KRB5_MD5DES_BETA5_COMPAT +#define KRB5int_MD5DES_BETA5_COMPAT /* des-cbc(xorkey, conf | rsa-md5(conf | data)) */ @@ -60,11 +60,11 @@ k5_md5des_hash(krb5_key key, krb5_keyusage usage, const krb5_data *ivec, /* hash the confounder, then the input data */ - krb5_MD5Init(&ctx); - krb5_MD5Update(&ctx, conf, CONFLENGTH); - krb5_MD5Update(&ctx, (unsigned char *) input->data, + krb5int_MD5Init(&ctx); + krb5int_MD5Update(&ctx, conf, CONFLENGTH); + krb5int_MD5Update(&ctx, (unsigned char *) input->data, (unsigned int) input->length); - krb5_MD5Final(&ctx); + krb5int_MD5Final(&ctx); /* construct the buffer to be encrypted */ @@ -93,7 +93,7 @@ k5_md5des_verify(krb5_key key, krb5_keyusage usage, const krb5_data *ivec, return(KRB5_BAD_KEYSIZE); if (hash->length != (CONFLENGTH+RSA_MD5_CKSUM_LENGTH)) { -#ifdef KRB5_MD5DES_BETA5_COMPAT +#ifdef KRB5int_MD5DES_BETA5_COMPAT if (hash->length != RSA_MD5_CKSUM_LENGTH) return(KRB5_CRYPTO_INTERNAL); else @@ -132,13 +132,13 @@ k5_md5des_verify(krb5_key key, krb5_keyusage usage, const krb5_data *ivec, /* hash the confounder, then the input data */ - krb5_MD5Init(&ctx); + krb5int_MD5Init(&ctx); if (!compathash) { - krb5_MD5Update(&ctx, plaintext, CONFLENGTH); + krb5int_MD5Update(&ctx, plaintext, CONFLENGTH); } - krb5_MD5Update(&ctx, (unsigned char *) input->data, + krb5int_MD5Update(&ctx, (unsigned char *) input->data, (unsigned) input->length); - krb5_MD5Final(&ctx); + krb5int_MD5Final(&ctx); /* compare the decrypted hash to the computed one */ diff --git a/src/lib/crypto/krb/keyhash_provider/md5_hmac.c b/src/lib/crypto/krb/keyhash_provider/md5_hmac.c index 589c3475e..50eb2ecfd 100644 --- a/src/lib/crypto/krb/keyhash_provider/md5_hmac.c +++ b/src/lib/crypto/krb/keyhash_provider/md5_hmac.c @@ -42,19 +42,19 @@ k5_md5_hmac_hash (krb5_key key, krb5_keyusage usage, unsigned char t[4]; krb5_data ds; - krb5_MD5Init(&ctx); + krb5int_MD5Init(&ctx); ms_usage = krb5int_arcfour_translate_usage (usage); store_32_le(ms_usage, t); - krb5_MD5Update(&ctx, t, sizeof(t)); - krb5_MD5Update(&ctx, (unsigned char *)input->data, input->length); - krb5_MD5Final(&ctx); + krb5int_MD5Update(&ctx, t, sizeof(t)); + krb5int_MD5Update(&ctx, (unsigned char *)input->data, input->length); + krb5int_MD5Final(&ctx); ds.magic = KV5M_DATA; ds.length = 16; ds.data = (char *)ctx.digest; - return krb5_hmac ( &krb5int_hash_md5, key, 1, &ds, output); + return krb5int_hmac ( &krb5int_hash_md5, key, 1, &ds, output); } const struct krb5_keyhash_provider krb5int_keyhash_md5_hmac = { diff --git a/src/lib/crypto/krb/make_checksum.c b/src/lib/crypto/krb/make_checksum.c index 01e374b14..def88a18d 100644 --- a/src/lib/crypto/krb/make_checksum.c +++ b/src/lib/crypto/krb/make_checksum.c @@ -43,13 +43,13 @@ krb5_k_make_checksum(krb5_context context, krb5_cksumtype cksumtype, krb5_error_code ret; size_t cksumlen; - for (i = 0; i < krb5_cksumtypes_length; i++) { - if (krb5_cksumtypes_list[i].ctype == cksumtype) + for (i = 0; i < krb5int_cksumtypes_length; i++) { + if (krb5int_cksumtypes_list[i].ctype == cksumtype) break; } - if (i == krb5_cksumtypes_length) + if (i == krb5int_cksumtypes_length) return KRB5_BAD_ENCTYPE; - ctp = &krb5_cksumtypes_list[i]; + ctp = &krb5int_cksumtypes_list[i]; if (ctp->keyhash != NULL) cksumlen = ctp->keyhash->hashsize; @@ -90,7 +90,7 @@ krb5_k_make_checksum(krb5_context context, krb5_cksumtype cksumtype, ret = (*keyhash->hash)(key, usage, 0, input, &data); } } else if (ctp->flags & KRB5_CKSUMFLAG_DERIVE) { - ret = krb5_dk_make_checksum(ctp->hash, key, usage, input, &data); + ret = krb5int_dk_make_checksum(ctp->hash, key, usage, input, &data); } else { /* No key is used. */ ret = (*ctp->hash->hash)(1, input, &data); diff --git a/src/lib/crypto/krb/make_checksum_iov.c b/src/lib/crypto/krb/make_checksum_iov.c index 32c9a4cb4..e4e2c2d00 100644 --- a/src/lib/crypto/krb/make_checksum_iov.c +++ b/src/lib/crypto/krb/make_checksum_iov.c @@ -43,13 +43,13 @@ krb5_k_make_checksum_iov(krb5_context context, krb5_crypto_iov *checksum; const struct krb5_cksumtypes *ctp; - for (i = 0; i < krb5_cksumtypes_length; i++) { - if (krb5_cksumtypes_list[i].ctype == cksumtype) + for (i = 0; i < krb5int_cksumtypes_length; i++) { + if (krb5int_cksumtypes_list[i].ctype == cksumtype) break; } - if (i == krb5_cksumtypes_length) + if (i == krb5int_cksumtypes_length) return KRB5_BAD_ENCTYPE; - ctp = &krb5_cksumtypes_list[i]; + ctp = &krb5int_cksumtypes_list[i]; if (ctp->keyhash != NULL) cksum_data.length = ctp->keyhash->hashsize; @@ -69,7 +69,7 @@ krb5_k_make_checksum_iov(krb5_context context, if (cksum_data.data == NULL) return(ENOMEM); - ret = krb5int_c_make_checksum_iov(&krb5_cksumtypes_list[i], + ret = krb5int_c_make_checksum_iov(&krb5int_cksumtypes_list[i], key, usage, data, num_data, &cksum_data); if (ret == 0) { diff --git a/src/lib/crypto/krb/nfold.c b/src/lib/crypto/krb/nfold.c index 1f1902d1c..01e897217 100644 --- a/src/lib/crypto/krb/nfold.c +++ b/src/lib/crypto/krb/nfold.c @@ -46,7 +46,7 @@ n-fold(k-bits): /* input length is in bits */ void -krb5_nfold(unsigned int inbits, const unsigned char *in, unsigned int outbits, +krb5int_nfold(unsigned int inbits, const unsigned char *in, unsigned int outbits, unsigned char *out) { int a,b,c,lcm; diff --git a/src/lib/crypto/krb/old/old.h b/src/lib/crypto/krb/old/old.h index 6cfb0c97a..a5f3f7889 100644 --- a/src/lib/crypto/krb/old/old.h +++ b/src/lib/crypto/krb/old/old.h @@ -26,19 +26,19 @@ #include "k5-int.h" -void krb5_old_encrypt_length +void krb5int_old_encrypt_length (const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, size_t input, size_t *length); -krb5_error_code krb5_old_encrypt +krb5_error_code krb5int_old_encrypt (const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output); -krb5_error_code krb5_old_decrypt +krb5_error_code krb5int_old_decrypt (const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, diff --git a/src/lib/crypto/krb/old/old_decrypt.c b/src/lib/crypto/krb/old/old_decrypt.c index dd9ad19cb..42a755a4a 100644 --- a/src/lib/crypto/krb/old/old_decrypt.c +++ b/src/lib/crypto/krb/old/old_decrypt.c @@ -28,7 +28,7 @@ #include "old.h" krb5_error_code -krb5_old_decrypt(const struct krb5_enc_provider *enc, +krb5int_old_decrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, diff --git a/src/lib/crypto/krb/old/old_encrypt.c b/src/lib/crypto/krb/old/old_encrypt.c index 1121dc935..b3a1c5bea 100644 --- a/src/lib/crypto/krb/old/old_encrypt.c +++ b/src/lib/crypto/krb/old/old_encrypt.c @@ -28,7 +28,7 @@ #include "old.h" void -krb5_old_encrypt_length(const struct krb5_enc_provider *enc, +krb5int_old_encrypt_length(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, size_t inputlen, size_t *length) @@ -42,7 +42,7 @@ krb5_old_encrypt_length(const struct krb5_enc_provider *enc, } krb5_error_code -krb5_old_encrypt(const struct krb5_enc_provider *enc, +krb5int_old_encrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, @@ -58,7 +58,7 @@ krb5_old_encrypt(const struct krb5_enc_provider *enc, blocksize = enc->block_size; hashsize = hash->hashsize; - krb5_old_encrypt_length(enc, hash, input->length, &enclen); + krb5int_old_encrypt_length(enc, hash, input->length, &enclen); if (output->length < enclen) return(KRB5_BAD_MSIZE); diff --git a/src/lib/crypto/krb/prf/dk_prf.c b/src/lib/crypto/krb/prf/dk_prf.c index cc203875c..379cc1cbe 100644 --- a/src/lib/crypto/krb/prf/dk_prf.c +++ b/src/lib/crypto/krb/prf/dk_prf.c @@ -50,7 +50,7 @@ krb5int_dk_prf (const struct krb5_enc_provider *enc, return ENOMEM; hash->hash(1, in, &tmp); tmp.length = (tmp.length/enc->block_size)*enc->block_size; /*truncate to block size*/ - ret = krb5_derive_key(enc, key, &kp, &prfconst); + ret = krb5int_derive_key(enc, key, &kp, &prfconst); if (ret == 0) ret = enc->encrypt(kp, NULL, &tmp, out); krb5_k_free_key(NULL, kp); diff --git a/src/lib/crypto/krb/prf/rc4_prf.c b/src/lib/crypto/krb/prf/rc4_prf.c index 3affaa539..8a79b553a 100644 --- a/src/lib/crypto/krb/prf/rc4_prf.c +++ b/src/lib/crypto/krb/prf/rc4_prf.c @@ -35,7 +35,7 @@ krb5int_arcfour_prf(const struct krb5_enc_provider *enc, krb5_key key, const krb5_data *in, krb5_data *out) { assert(out->length == 20); - return krb5_hmac(&krb5int_hash_sha1, key, 1, in, out); + return krb5int_hmac(&krb5int_hash_sha1, key, 1, in, out); } diff --git a/src/lib/crypto/krb/raw/raw.h b/src/lib/crypto/krb/raw/raw.h index 84ae73023..3c2618874 100644 --- a/src/lib/crypto/krb/raw/raw.h +++ b/src/lib/crypto/krb/raw/raw.h @@ -31,14 +31,14 @@ void krb5_raw_encrypt_length const struct krb5_hash_provider *hash, size_t input, size_t *length); -krb5_error_code krb5_raw_encrypt +krb5_error_code krb5int_raw_encrypt (const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output); -krb5_error_code krb5_raw_decrypt +krb5_error_code krb5int_raw_decrypt (const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, diff --git a/src/lib/crypto/krb/raw/raw_decrypt.c b/src/lib/crypto/krb/raw/raw_decrypt.c index dd62806e4..58ee6f82c 100644 --- a/src/lib/crypto/krb/raw/raw_decrypt.c +++ b/src/lib/crypto/krb/raw/raw_decrypt.c @@ -28,7 +28,7 @@ #include "raw.h" krb5_error_code -krb5_raw_decrypt(const struct krb5_enc_provider *enc, +krb5int_raw_decrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, diff --git a/src/lib/crypto/krb/raw/raw_encrypt.c b/src/lib/crypto/krb/raw/raw_encrypt.c index 462239ee5..b02258d4b 100644 --- a/src/lib/crypto/krb/raw/raw_encrypt.c +++ b/src/lib/crypto/krb/raw/raw_encrypt.c @@ -40,7 +40,7 @@ krb5_raw_encrypt_length(const struct krb5_enc_provider *enc, } krb5_error_code -krb5_raw_encrypt(const struct krb5_enc_provider *enc, +krb5int_raw_encrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, diff --git a/src/lib/crypto/krb/string_to_cksumtype.c b/src/lib/crypto/krb/string_to_cksumtype.c index 92ecbfaa1..796cc2a44 100644 --- a/src/lib/crypto/krb/string_to_cksumtype.c +++ b/src/lib/crypto/krb/string_to_cksumtype.c @@ -34,8 +34,8 @@ krb5_string_to_cksumtype(char *string, krb5_cksumtype *cksumtypep) const char *alias; const struct krb5_cksumtypes *ctp; - for (i=0; iname, string) == 0) { *cksumtypep = ctp->ctype; return 0; diff --git a/src/lib/crypto/krb/string_to_enctype.c b/src/lib/crypto/krb/string_to_enctype.c index 141c36c96..4978ac785 100644 --- a/src/lib/crypto/krb/string_to_enctype.c +++ b/src/lib/crypto/krb/string_to_enctype.c @@ -35,8 +35,8 @@ krb5_string_to_enctype(char *string, krb5_enctype *enctypep) const char *alias; const struct krb5_keytypes *ktp; - for (i = 0; i < krb5_enctypes_length; i++) { - ktp = &krb5_enctypes_list[i]; + for (i = 0; i < krb5int_enctypes_length; i++) { + ktp = &krb5int_enctypes_list[i]; if (strcasecmp(ktp->name, string) == 0) { *enctypep = ktp->etype; return 0; diff --git a/src/lib/crypto/krb/valid_cksumtype.c b/src/lib/crypto/krb/valid_cksumtype.c index 56a92df25..d32e8f589 100644 --- a/src/lib/crypto/krb/valid_cksumtype.c +++ b/src/lib/crypto/krb/valid_cksumtype.c @@ -32,8 +32,8 @@ krb5_c_valid_cksumtype(krb5_cksumtype ctype) { unsigned int i; - for (i = 0; i < krb5_cksumtypes_length; i++) { - if (krb5_cksumtypes_list[i].ctype == ctype) + for (i = 0; i < krb5int_cksumtypes_length; i++) { + if (krb5int_cksumtypes_list[i].ctype == ctype) return TRUE; } diff --git a/src/lib/crypto/krb/valid_enctype.c b/src/lib/crypto/krb/valid_enctype.c index b5c61d360..2657fd084 100644 --- a/src/lib/crypto/krb/valid_enctype.c +++ b/src/lib/crypto/krb/valid_enctype.c @@ -40,7 +40,7 @@ valid_enctype(krb5_enctype etype) } krb5_boolean KRB5_CALLCONV -krb5_c_weak_enctype(krb5_enctype etype) +krb5int_c_weak_enctype(krb5_enctype etype) { const struct krb5_keytypes *ktp; diff --git a/src/lib/crypto/krb/verify_checksum.c b/src/lib/crypto/krb/verify_checksum.c index 82f4fb11f..d8a9cc8b7 100644 --- a/src/lib/crypto/krb/verify_checksum.c +++ b/src/lib/crypto/krb/verify_checksum.c @@ -40,13 +40,13 @@ krb5_k_verify_checksum(krb5_context context, krb5_key key, krb5_data indata; krb5_checksum computed; - for (i=0; ichecksum_type) + for (i=0; ichecksum_type) break; } - if (i == krb5_cksumtypes_length) + if (i == krb5int_cksumtypes_length) return KRB5_BAD_ENCTYPE; - ctp = &krb5_cksumtypes_list[i]; + ctp = &krb5int_cksumtypes_list[i]; indata.length = cksum->length; indata.data = (char *) cksum->contents; diff --git a/src/lib/crypto/krb/verify_checksum_iov.c b/src/lib/crypto/krb/verify_checksum_iov.c index f322dc386..f72ca652f 100644 --- a/src/lib/crypto/krb/verify_checksum_iov.c +++ b/src/lib/crypto/krb/verify_checksum_iov.c @@ -44,13 +44,13 @@ krb5_k_verify_checksum_iov(krb5_context context, krb5_data computed; krb5_crypto_iov *checksum; - for (i = 0; i < krb5_cksumtypes_length; i++) { - if (krb5_cksumtypes_list[i].ctype == checksum_type) + for (i = 0; i < krb5int_cksumtypes_length; i++) { + if (krb5int_cksumtypes_list[i].ctype == checksum_type) break; } - if (i == krb5_cksumtypes_length) + if (i == krb5int_cksumtypes_length) return KRB5_BAD_ENCTYPE; - ctp = &krb5_cksumtypes_list[i]; + ctp = &krb5int_cksumtypes_list[i]; checksum = krb5int_c_locate_iov((krb5_crypto_iov *)data, num_data, KRB5_CRYPTO_TYPE_CHECKSUM); @@ -81,7 +81,7 @@ krb5_k_verify_checksum_iov(krb5_context context, if (computed.data == NULL) return ENOMEM; - ret = krb5int_c_make_checksum_iov(&krb5_cksumtypes_list[i], key, usage, + ret = krb5int_c_make_checksum_iov(&krb5int_cksumtypes_list[i], key, usage, data, num_data, &computed); if (ret) { free(computed.data); diff --git a/src/lib/crypto/libk5crypto.exports b/src/lib/crypto/libk5crypto.exports index 097886c46..03804c94b 100644 --- a/src/lib/crypto/libk5crypto.exports +++ b/src/lib/crypto/libk5crypto.exports @@ -1,14 +1,14 @@ is_coll_proof_cksum is_keyed_cksum -krb5_MD4Final -krb5_MD4Init -krb5_MD4Update -krb5_MD5Final -krb5_MD5Init -krb5_MD5Update -krb5_arcfour_decrypt -krb5_arcfour_encrypt -krb5_arcfour_encrypt_length +krb5int_MD4Final +krb5int_MD4Init +krb5int_MD4Update +krb5int_MD5Final +krb5int_MD5Init +krb5int_MD5Update +krb5int_arcfour_decrypt +krb5int_arcfour_encrypt +krb5int_arcfour_encrypt_length krb5_c_block_size krb5_c_fx_cf2_simple krb5_c_checksum_length @@ -43,31 +43,31 @@ krb5_c_valid_cksumtype krb5_c_valid_enctype krb5_c_verify_checksum krb5_c_verify_checksum_iov -krb5_c_weak_enctype +krb5int_c_weak_enctype krb5_calculate_checksum krb5_checksum_size krb5_cksumtype_to_string -krb5_cksumtypes_length -krb5_cksumtypes_list +krb5int_cksumtypes_length +krb5int_cksumtypes_list krb5_decrypt krb5_decrypt_data -krb5_derive_key -krb5_derive_random -krb5_dk_decrypt -krb5_dk_encrypt -krb5_dk_encrypt_length -krb5_dk_make_checksum +krb5int_derive_key +krb5int_derive_random +krb5int_dk_decrypt +krb5int_dk_encrypt +krb5int_dk_encrypt_length +krb5int_dk_make_checksum krb5_eblock_enctype krb5_encrypt krb5_encrypt_data krb5_encrypt_size krb5_enctype_to_string -krb5_enctypes_length -krb5_enctypes_list +krb5int_enctypes_length +krb5int_enctypes_list krb5_finish_key krb5_finish_random_key krb5_free_cksumtypes -krb5_hmac +krb5int_hmac krb5_init_random_key krb5_k_create_key krb5_k_decrypt @@ -81,15 +81,15 @@ krb5_k_make_checksum krb5_k_make_checksum_iov krb5_k_verify_checksum krb5_k_verify_checksum_iov -krb5_nfold -krb5_old_decrypt -krb5_old_encrypt -krb5_old_encrypt_length +krb5int_nfold +krb5int_old_decrypt +krb5int_old_encrypt +krb5int_old_encrypt_length krb5_process_key krb5_random_confounder krb5_random_key -krb5_raw_decrypt -krb5_raw_encrypt +krb5int_raw_decrypt +krb5int_raw_encrypt krb5_raw_encrypt_length krb5_string_to_cksumtype krb5_string_to_enctype diff --git a/src/lib/crypto/openssl/aes/aes_s2k.c b/src/lib/crypto/openssl/aes/aes_s2k.c index db6553e25..1b088ae8b 100644 --- a/src/lib/crypto/openssl/aes/aes_s2k.c +++ b/src/lib/crypto/openssl/aes/aes_s2k.c @@ -81,7 +81,7 @@ krb5int_aes_string_to_key(const struct krb5_enc_provider *enc, if (err) goto cleanup; - err = krb5_derive_keyblock (enc, tempkey, key, &usage); + err = krb5int_derive_keyblock (enc, tempkey, key, &usage); cleanup: if (err) diff --git a/src/lib/crypto/openssl/arcfour/arcfour.c b/src/lib/crypto/openssl/arcfour/arcfour.c index 719bfaabd..68feb4985 100644 --- a/src/lib/crypto/openssl/arcfour/arcfour.c +++ b/src/lib/crypto/openssl/arcfour/arcfour.c @@ -13,7 +13,7 @@ of RSA Data Security) const char *const krb5int_arcfour_l40 = "fortybits"; void -krb5_arcfour_encrypt_length(const struct krb5_enc_provider *enc, +krb5int_arcfour_encrypt_length(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, size_t inputlen, size_t *length) { @@ -63,7 +63,7 @@ case 7: /* tgs-req authenticator */ /* RFC 4757 */ krb5_error_code -krb5_arcfour_encrypt(const struct krb5_enc_provider *enc, +krb5int_arcfour_encrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, @@ -149,7 +149,7 @@ krb5_arcfour_encrypt(const struct krb5_enc_provider *enc, salt.length=4; store_32_le(ms_usage, salt.data); } - krb5_hmac(hash, key, 1, &salt, &d1); + krb5int_hmac(hash, key, 1, &salt, &d1); memcpy(k2.contents, k1.contents, k2.length); @@ -193,7 +193,7 @@ krb5_arcfour_encrypt(const struct krb5_enc_provider *enc, /* This is the arcfour-hmac decryption routine */ krb5_error_code -krb5_arcfour_decrypt(const struct krb5_enc_provider *enc, +krb5int_arcfour_decrypt(const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, krb5_key key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, @@ -276,7 +276,7 @@ krb5_arcfour_decrypt(const struct krb5_enc_provider *enc, salt.length = 4; store_32_le(ms_usage, salt.data); } - ret = krb5_hmac(hash, key, 1, &salt, &d1); + ret = krb5int_hmac(hash, key, 1, &salt, &d1); if (ret) goto cleanup; diff --git a/src/lib/crypto/openssl/arcfour/arcfour.h b/src/lib/crypto/openssl/arcfour/arcfour.h index 1a2876437..e00708a7c 100644 --- a/src/lib/crypto/openssl/arcfour/arcfour.h +++ b/src/lib/crypto/openssl/arcfour/arcfour.h @@ -2,13 +2,13 @@ #define ARCFOUR_H extern void -krb5_arcfour_encrypt_length(const struct krb5_enc_provider *, +krb5int_arcfour_encrypt_length(const struct krb5_enc_provider *, const struct krb5_hash_provider *, size_t, size_t *); -extern -krb5_error_code krb5_arcfour_encrypt(const struct krb5_enc_provider *, +extern krb5_error_code +krb5int_arcfour_encrypt(const struct krb5_enc_provider *, const struct krb5_hash_provider *, krb5_key, krb5_keyusage, @@ -16,8 +16,8 @@ krb5_error_code krb5_arcfour_encrypt(const struct krb5_enc_provider *, const krb5_data *, krb5_data *); -extern -krb5_error_code krb5_arcfour_decrypt(const struct krb5_enc_provider *, +extern krb5_error_code +krb5int_arcfour_decrypt(const struct krb5_enc_provider *, const struct krb5_hash_provider *, krb5_key, krb5_keyusage, @@ -25,7 +25,8 @@ krb5_error_code krb5_arcfour_decrypt(const struct krb5_enc_provider *, const krb5_data *, krb5_data *); -extern krb5_error_code krb5int_arcfour_string_to_key( +extern krb5_error_code +krb5int_arcfour_string_to_key( const struct krb5_enc_provider *, const krb5_data *, const krb5_data *, diff --git a/src/lib/crypto/openssl/arcfour/arcfour_aead.c b/src/lib/crypto/openssl/arcfour/arcfour_aead.c index 4896afaaf..c01fc001b 100644 --- a/src/lib/crypto/openssl/arcfour/arcfour_aead.c +++ b/src/lib/crypto/openssl/arcfour/arcfour_aead.c @@ -152,7 +152,7 @@ krb5int_arcfour_encrypt_iov(const struct krb5_aead_provider *aead, salt.length = 4; store_32_le(ms_usage, salt.data); } - ret = krb5_hmac(hash, key, 1, &salt, &d1); + ret = krb5int_hmac(hash, key, 1, &salt, &d1); if (ret != 0) goto cleanup; @@ -272,7 +272,7 @@ krb5int_arcfour_decrypt_iov(const struct krb5_aead_provider *aead, salt.length = 4; store_32_le(ms_usage, (unsigned char *)salt.data); } - ret = krb5_hmac(hash, key, 1, &salt, &d1); + ret = krb5int_hmac(hash, key, 1, &salt, &d1); if (ret != 0) goto cleanup; diff --git a/src/lib/crypto/openssl/arcfour/arcfour_s2k.c b/src/lib/crypto/openssl/arcfour/arcfour_s2k.c index 41053ed17..09c9b7689 100644 --- a/src/lib/crypto/openssl/arcfour/arcfour_s2k.c +++ b/src/lib/crypto/openssl/arcfour/arcfour_s2k.c @@ -35,9 +35,9 @@ krb5int_arcfour_string_to_key(const struct krb5_enc_provider *enc, return err; /* the actual MD4 hash of the data */ - krb5_MD4Init(&md4_context); - krb5_MD4Update(&md4_context, copystr, copystrlen); - krb5_MD4Final(&md4_context); + krb5int_MD4Init(&md4_context); + krb5int_MD4Update(&md4_context, copystr, copystrlen); + krb5int_MD4Final(&md4_context); memcpy(key->contents, md4_context.digest, 16); #if 0 diff --git a/src/lib/crypto/openssl/hash_provider/hash_md4.c b/src/lib/crypto/openssl/hash_provider/hash_md4.c index f507aaaf7..3a4a4d530 100644 --- a/src/lib/crypto/openssl/hash_provider/hash_md4.c +++ b/src/lib/crypto/openssl/hash_provider/hash_md4.c @@ -38,10 +38,10 @@ k5_md4_hash(unsigned int icount, const krb5_data *input, if (output->length != RSA_MD4_CKSUM_LENGTH) return(KRB5_CRYPTO_INTERNAL); - krb5_MD4Init(&ctx); + krb5int_MD4Init(&ctx); for (i=0; idata, ctx.digest, RSA_MD4_CKSUM_LENGTH); diff --git a/src/lib/crypto/openssl/hash_provider/hash_md5.c b/src/lib/crypto/openssl/hash_provider/hash_md5.c index a6e380ae2..10840d0d9 100644 --- a/src/lib/crypto/openssl/hash_provider/hash_md5.c +++ b/src/lib/crypto/openssl/hash_provider/hash_md5.c @@ -38,10 +38,10 @@ k5_md5_hash(unsigned int icount, const krb5_data *input, if (output->length != RSA_MD5_CKSUM_LENGTH) return(KRB5_CRYPTO_INTERNAL); - krb5_MD5Init(&ctx); + krb5int_MD5Init(&ctx); for (i=0; idata, ctx.digest, RSA_MD5_CKSUM_LENGTH); diff --git a/src/lib/crypto/openssl/hmac.c b/src/lib/crypto/openssl/hmac.c index 658bc28f1..f0734b6ce 100644 --- a/src/lib/crypto/openssl/hmac.c +++ b/src/lib/crypto/openssl/hmac.c @@ -112,7 +112,7 @@ krb5int_hmac_iov_keyblock(const struct krb5_hash_provider *hash, } krb5_error_code -krb5_hmac(const struct krb5_hash_provider *hash, krb5_key key, +krb5int_hmac(const struct krb5_hash_provider *hash, krb5_key key, unsigned int icount, const krb5_data *input, krb5_data *output) { return krb5int_hmac_keyblock(hash, &key->keyblock, icount, input, output); diff --git a/src/lib/crypto/openssl/md4/md4.c b/src/lib/crypto/openssl/md4/md4.c index 88d519188..88f5e3616 100644 --- a/src/lib/crypto/openssl/md4/md4.c +++ b/src/lib/crypto/openssl/md4/md4.c @@ -8,20 +8,20 @@ #include void -krb5_MD4Init (krb5_MD4_CTX *mdContext) +krb5int_MD4Init (krb5_MD4_CTX *mdContext) { EVP_MD_CTX_init(&mdContext->ossl_md4_ctx ); EVP_DigestInit_ex(&mdContext->ossl_md4_ctx, EVP_md4(), NULL); } void -krb5_MD4Update (krb5_MD4_CTX *mdContext, const unsigned char *inBuf, unsigned int inLen) +krb5int_MD4Update (krb5_MD4_CTX *mdContext, const unsigned char *inBuf, unsigned int inLen) { EVP_DigestUpdate(&mdContext->ossl_md4_ctx, inBuf, inLen); } void -krb5_MD4Final (krb5_MD4_CTX *mdContext) +krb5int_MD4Final (krb5_MD4_CTX *mdContext) { EVP_DigestFinal_ex(&mdContext->ossl_md4_ctx, mdContext->digest , NULL); EVP_MD_CTX_cleanup(&mdContext->ossl_md4_ctx ); diff --git a/src/lib/crypto/openssl/md4/rsa-md4.h b/src/lib/crypto/openssl/md4/rsa-md4.h index 4b0204727..ec4e0458f 100644 --- a/src/lib/crypto/openssl/md4/rsa-md4.h +++ b/src/lib/crypto/openssl/md4/rsa-md4.h @@ -87,9 +87,9 @@ typedef struct { unsigned char digest[16]; /* actual digest after MD4Final call */ } krb5_MD4_CTX; -extern void krb5_MD4Init(krb5_MD4_CTX *); -extern void krb5_MD4Update(krb5_MD4_CTX *, const unsigned char *, unsigned int); -extern void krb5_MD4Final(krb5_MD4_CTX *); +extern void krb5int_MD4Init(krb5_MD4_CTX *); +extern void krb5int_MD4Update(krb5_MD4_CTX *, const unsigned char *, unsigned int); +extern void krb5int_MD4Final(krb5_MD4_CTX *); /* ********************************************************************** diff --git a/src/lib/crypto/openssl/md5/md5.c b/src/lib/crypto/openssl/md5/md5.c index 8519dd535..2a725dc58 100644 --- a/src/lib/crypto/openssl/md5/md5.c +++ b/src/lib/crypto/openssl/md5/md5.c @@ -4,31 +4,31 @@ #include #include -/* The routine krb5_MD5Init initializes the message-digest context +/* The routine krb5int_MD5Init initializes the message-digest context mdContext. All fields are set to zero. */ void -krb5_MD5Init (krb5_MD5_CTX *mdContext) +krb5int_MD5Init (krb5_MD5_CTX *mdContext) { EVP_MD_CTX_init(&mdContext->ossl_md5_ctx); EVP_DigestInit_ex(&mdContext->ossl_md5_ctx, EVP_md5(), NULL); } -/* The routine krb5_MD5Update updates the message-digest context to +/* The routine krb5int_MD5Update updates the message-digest context to account for the presence of each of the characters inBuf[0..inLen-1] in the message whose digest is being computed. */ void -krb5_MD5Update (krb5_MD5_CTX *mdContext, const unsigned char *inBuf, unsigned int inLen) +krb5int_MD5Update (krb5_MD5_CTX *mdContext, const unsigned char *inBuf, unsigned int inLen) { EVP_DigestUpdate(&mdContext->ossl_md5_ctx, inBuf, inLen); } -/* The routine krb5_MD5Final terminates the message-digest computation and +/* The routine krb5int_MD5Final terminates the message-digest computation and ends with the desired message digest in mdContext->digest[0...15]. */ void -krb5_MD5Final (krb5_MD5_CTX *mdContext) +krb5int_MD5Final (krb5_MD5_CTX *mdContext) { EVP_DigestFinal_ex(&mdContext->ossl_md5_ctx, mdContext->digest, NULL); EVP_MD_CTX_cleanup(&mdContext->ossl_md5_ctx); diff --git a/src/lib/crypto/openssl/md5/rsa-md5.h b/src/lib/crypto/openssl/md5/rsa-md5.h index 7240b20ca..3142f6b76 100644 --- a/src/lib/crypto/openssl/md5/rsa-md5.h +++ b/src/lib/crypto/openssl/md5/rsa-md5.h @@ -15,9 +15,9 @@ typedef struct { unsigned char digest[16]; /* actual digest after MD5Final call */ } krb5_MD5_CTX; -extern void krb5_MD5Init(krb5_MD5_CTX *); -extern void krb5_MD5Update(krb5_MD5_CTX *,const unsigned char *,unsigned int); -extern void krb5_MD5Final(krb5_MD5_CTX *); +extern void krb5int_MD5Init(krb5_MD5_CTX *); +extern void krb5int_MD5Update(krb5_MD5_CTX *,const unsigned char *,unsigned int); +extern void krb5int_MD5Final(krb5_MD5_CTX *); #define RSA_MD5_CKSUM_LENGTH 16 #define OLD_RSA_MD5_DES_CKSUM_LENGTH 16 diff --git a/src/lib/gssapi/krb5/util_crypt.c b/src/lib/gssapi/krb5/util_crypt.c index 8afd603d2..0f712ea46 100644 --- a/src/lib/gssapi/krb5/util_crypt.c +++ b/src/lib/gssapi/krb5/util_crypt.c @@ -321,7 +321,7 @@ kg_arcfour_docrypt(const krb5_keyblock *longterm_key , int ms_usage, input.length = i; output.data = (void *) usage_key.contents; output.length = usage_key.length; - code = (*kaccess.krb5_hmac) (kaccess.md5_hash_provider, + code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider, longterm_key, 1, &input, &output); if (code) goto cleanup_arcfour; @@ -331,7 +331,7 @@ kg_arcfour_docrypt(const krb5_keyblock *longterm_key , int ms_usage, input.data = ( void *) kd_data; input.length = kd_data_len; output.data = (void *) seq_enc_key.contents; - code = (*kaccess.krb5_hmac) (kaccess.md5_hash_provider, + code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider, &usage_key, 1, &input, &output); if (code) goto cleanup_arcfour; @@ -667,7 +667,7 @@ kg_arcfour_docrypt_iov(krb5_context context, input.length = i; output.data = (void *) usage_key.contents; output.length = usage_key.length; - code = (*kaccess.krb5_hmac) (kaccess.md5_hash_provider, + code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider, longterm_key, 1, &input, &output); if (code) goto cleanup_arcfour; @@ -677,7 +677,7 @@ kg_arcfour_docrypt_iov(krb5_context context, input.data = ( void *) kd_data; input.length = kd_data_len; output.data = (void *) seq_enc_key.contents; - code = (*kaccess.krb5_hmac) (kaccess.md5_hash_provider, + code = (*kaccess.krb5int_hmac) (kaccess.md5_hash_provider, &usage_key, 1, &input, &output); if (code) goto cleanup_arcfour; diff --git a/src/lib/krb5/krb/init_ctx.c b/src/lib/krb5/krb/init_ctx.c index 2545be396..ea78e0da7 100644 --- a/src/lib/krb5/krb/init_ctx.c +++ b/src/lib/krb5/krb/init_ctx.c @@ -309,7 +309,7 @@ set_default_etype_var(krb5_context context, const krb5_enctype *etypes, for (i = 0; etypes[i]; i++) { if (!krb5_c_valid_enctype(etypes[i])) return KRB5_PROG_ETYPE_NOSUPP; - if (!context->allow_weak_crypto && krb5_c_weak_enctype(etypes[i])) + if (!context->allow_weak_crypto && krb5int_c_weak_enctype(etypes[i])) return KRB5_PROG_ETYPE_NOSUPP; } @@ -357,7 +357,7 @@ mod_list(krb5_enctype etype, krb5_boolean add, krb5_boolean allow_weak, unsigned int i; assert(etype > 0 && etype <= MAX_ENCTYPE); - if (!allow_weak && krb5_c_weak_enctype(etype)) + if (!allow_weak && krb5int_c_weak_enctype(etype)) return; for (i = 0; i < *count; i++) { if (list[i] == etype) { diff --git a/src/lib/krb5/os/accessor.c b/src/lib/krb5/os/accessor.c index 5575687dd..6df7e1100 100644 --- a/src/lib/krb5/os/accessor.c +++ b/src/lib/krb5/os/accessor.c @@ -52,7 +52,7 @@ krb5int_accessor(krb5int_access *internals, krb5_int32 version) krb5int_access internals_temp; #endif S (free_addrlist, krb5int_free_addrlist), - S (krb5_hmac, krb5int_hmac_keyblock), + S (krb5int_hmac, krb5int_hmac_keyblock), S (krb5_auth_con_get_subkey_enctype, krb5_auth_con_get_subkey_enctype), S (md5_hash_provider, &krb5int_hash_md5), S (arcfour_enc_provider, &krb5int_enc_arcfour), diff --git a/src/tests/misc/test_nfold.c b/src/tests/misc/test_nfold.c index 78b586618..7a0bffe07 100644 --- a/src/tests/misc/test_nfold.c +++ b/src/tests/misc/test_nfold.c @@ -51,7 +51,7 @@ int main(int argc, char *argv[]) exit(1); } - krb5_nfold(inlen,instr,outlen,outstr); + krb5int_nfold(inlen,instr,outlen,outstr); printf("%d-fold(",outlen); for (i=0; i<(inlen/8); i++)