From 4f46139c4fa1d4f7959665346ff6040d1cc925e6 Mon Sep 17 00:00:00 2001 From: Marc Horowitz Date: Thu, 13 Aug 1998 03:17:03 +0000 Subject: [PATCH] remove the input bounds check fix the stupid brainos. git-svn-id: svn://anonsvn.mit.edu/krb5/branches/marc-3des@10811 dc483132-0cff-0310-8789-dd5450dbe970 --- src/lib/crypto/keyhash_provider/k5_md4des.c | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/src/lib/crypto/keyhash_provider/k5_md4des.c b/src/lib/crypto/keyhash_provider/k5_md4des.c index 8da442e470..4d4a9baff8 100644 --- a/src/lib/crypto/keyhash_provider/k5_md4des.c +++ b/src/lib/crypto/keyhash_provider/k5_md4des.c @@ -32,8 +32,6 @@ k5_md4des_hash(krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, if (key->length != 8) return(KRB5_BAD_KEYSIZE); - if ((input->length%8) != 0) - return(KRB5_BAD_MSIZE); if (ivec) return(KRB5_CRYPTO_INTERNAL); if (output->length != (CONFLENGTH+RSA_MD4_CKSUM_LENGTH)) @@ -48,7 +46,7 @@ k5_md4des_hash(krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, /* create and schedule the encryption key */ - memcpy(xorkey, key->contents, sizeof(key->length)); + memcpy(xorkey, key->contents, sizeof(xorkey)); for (i=0; ilength != 8) return(KRB5_BAD_KEYSIZE); - if ((input->length%8) != 0) - return(KRB5_BAD_MSIZE); if (ivec) return(KRB5_CRYPTO_INTERNAL); if (hash->length != (CONFLENGTH+RSA_MD4_CKSUM_LENGTH)) @@ -105,7 +101,7 @@ k5_md4des_verify(krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, /* create and schedule the encryption key */ - memcpy(xorkey, key->contents, sizeof(key->length)); + memcpy(xorkey, key->contents, sizeof(xorkey)); for (i=0; idata, + mit_des_cbc_encrypt((krb5_pointer) hash->data, (krb5_pointer) plaintext, sizeof(plaintext), schedule, (char *) mit_des_zeroblock, 0); -- 2.47.2