2 * Copyright (c) 1995, 1996, 1997, 1998 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 /* $FreeBSD: src/crypto/kerberosIV/lib/krb/mk_priv.c,v 1.1.1.3.2.1 2003/02/13 21:34:36 nectar Exp $ */
34 /* $DragonFly: src/crypto/kerberosIV/lib/krb/Attic/mk_priv.c,v 1.2 2003/06/17 04:24:36 dillon Exp $ */
38 RCSID("$Id: mk_priv.c,v 1.22 1999/12/02 16:58:43 joda Exp $");
40 /* application include files */
41 #include "krb-archaeology.h"
44 * krb_mk_priv() constructs an AUTH_MSG_PRIVATE message. It takes
45 * some user data "in" of "length" bytes and creates a packet in "out"
46 * consisting of the user data, a timestamp, and the sender's network
48 * The packet is encrypted by pcbc_encrypt(), using the given
49 * "key" and "schedule".
50 * The length of the resulting packet "out" is
53 * It is similar to krb_mk_safe() except for the additional key
54 * schedule argument "schedule" and the fact that the data is encrypted
55 * rather than appended with a checksum. The protocol version is
56 * KRB_PROT_VERSION, defined in "krb.h".
58 * The "out" packet consists of:
63 * 1 byte KRB_PROT_VERSION protocol version number
64 * 1 byte AUTH_MSG_PRIVATE | message type plus local
65 * HOST_BYTE_ORDER byte order in low bit
67 * 4 bytes c_length length of data
68 * we encrypt from here with pcbc_encrypt
70 * 4 bytes length length of user data
72 * 1 byte msg_time_5ms timestamp milliseconds
73 * 4 bytes sender->sin.addr.s_addr sender's IP address
75 * 4 bytes msg_time_sec or timestamp seconds with
76 * -msg_time_sec direction in sign bit
78 * 0<=n<=7 bytes pad to 8 byte multiple zeroes
82 krb_mk_priv(void *in, void *out, u_int32_t length,
83 des_key_schedule schedule, des_cblock *key,
84 struct sockaddr_in *sender, struct sockaddr_in *receiver)
86 unsigned char *p = (unsigned char*)out;
87 unsigned char *cipher;
93 p += krb_put_int(KRB_PROT_VERSION, p, 1, 1);
94 p += krb_put_int(AUTH_MSG_PRIVATE, p, 1, 1);
96 len = 4 + length + 1 + 4 + 4;
98 p += krb_put_int(len, p, 4, 4);
102 p += krb_put_int(length, p, 4, 4);
104 memcpy(p, in, length);
107 krb_kdctimeofday(&tv);
109 *p++ =tv.tv_usec / 5000;
111 src_addr = sender->sin_addr.s_addr;
112 p += krb_put_address(src_addr, p, 4);
114 p += krb_put_int(lsb_time(tv.tv_sec, sender, receiver), p, 4, 4);
118 des_pcbc_encrypt((des_cblock *)cipher, (des_cblock *)cipher,
119 len, schedule, key, DES_ENCRYPT);
121 return (cipher - (unsigned char*)out) + len;