xref: /minix3/crypto/external/bsd/heimdal/dist/lib/krb5/crypto-arcfour.c (revision 0a6a1f1d05b60e214de2f05a7310ddd1f0e590e7)
1*0a6a1f1dSLionel Sambuc /*	$NetBSD: crypto-arcfour.c,v 1.1.1.2 2014/04/24 12:45:49 pettai Exp $	*/
2ebfedea0SLionel Sambuc 
3ebfedea0SLionel Sambuc /*
4ebfedea0SLionel Sambuc  * Copyright (c) 1997 - 2008 Kungliga Tekniska Högskolan
5ebfedea0SLionel Sambuc  * (Royal Institute of Technology, Stockholm, Sweden).
6ebfedea0SLionel Sambuc  * All rights reserved.
7ebfedea0SLionel Sambuc  *
8ebfedea0SLionel Sambuc  * Redistribution and use in source and binary forms, with or without
9ebfedea0SLionel Sambuc  * modification, are permitted provided that the following conditions
10ebfedea0SLionel Sambuc  * are met:
11ebfedea0SLionel Sambuc  *
12ebfedea0SLionel Sambuc  * 1. Redistributions of source code must retain the above copyright
13ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer.
14ebfedea0SLionel Sambuc  *
15ebfedea0SLionel Sambuc  * 2. Redistributions in binary form must reproduce the above copyright
16ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer in the
17ebfedea0SLionel Sambuc  *    documentation and/or other materials provided with the distribution.
18ebfedea0SLionel Sambuc  *
19ebfedea0SLionel Sambuc  * 3. Neither the name of the Institute nor the names of its contributors
20ebfedea0SLionel Sambuc  *    may be used to endorse or promote products derived from this software
21ebfedea0SLionel Sambuc  *    without specific prior written permission.
22ebfedea0SLionel Sambuc  *
23ebfedea0SLionel Sambuc  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ebfedea0SLionel Sambuc  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ebfedea0SLionel Sambuc  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ebfedea0SLionel Sambuc  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ebfedea0SLionel Sambuc  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ebfedea0SLionel Sambuc  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ebfedea0SLionel Sambuc  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ebfedea0SLionel Sambuc  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ebfedea0SLionel Sambuc  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ebfedea0SLionel Sambuc  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ebfedea0SLionel Sambuc  * SUCH DAMAGE.
34ebfedea0SLionel Sambuc  */
35ebfedea0SLionel Sambuc 
36ebfedea0SLionel Sambuc /*
37ebfedea0SLionel Sambuc  * ARCFOUR
38ebfedea0SLionel Sambuc  */
39ebfedea0SLionel Sambuc 
40ebfedea0SLionel Sambuc #include "krb5_locl.h"
41ebfedea0SLionel Sambuc 
42ebfedea0SLionel Sambuc static struct _krb5_key_type keytype_arcfour = {
43*0a6a1f1dSLionel Sambuc     ENCTYPE_ARCFOUR_HMAC_MD5,
44ebfedea0SLionel Sambuc     "arcfour",
45ebfedea0SLionel Sambuc     128,
46ebfedea0SLionel Sambuc     16,
47ebfedea0SLionel Sambuc     sizeof(struct _krb5_evp_schedule),
48ebfedea0SLionel Sambuc     NULL,
49ebfedea0SLionel Sambuc     _krb5_evp_schedule,
50ebfedea0SLionel Sambuc     _krb5_arcfour_salt,
51ebfedea0SLionel Sambuc     NULL,
52ebfedea0SLionel Sambuc     _krb5_evp_cleanup,
53ebfedea0SLionel Sambuc     EVP_rc4
54ebfedea0SLionel Sambuc };
55ebfedea0SLionel Sambuc 
56ebfedea0SLionel Sambuc /*
57ebfedea0SLionel Sambuc  * checksum according to section 5. of draft-brezak-win2k-krb-rc4-hmac-03.txt
58ebfedea0SLionel Sambuc  */
59ebfedea0SLionel Sambuc 
60ebfedea0SLionel Sambuc krb5_error_code
_krb5_HMAC_MD5_checksum(krb5_context context,struct _krb5_key_data * key,const void * data,size_t len,unsigned usage,Checksum * result)61ebfedea0SLionel Sambuc _krb5_HMAC_MD5_checksum(krb5_context context,
62ebfedea0SLionel Sambuc 			struct _krb5_key_data *key,
63ebfedea0SLionel Sambuc 			const void *data,
64ebfedea0SLionel Sambuc 			size_t len,
65ebfedea0SLionel Sambuc 			unsigned usage,
66ebfedea0SLionel Sambuc 			Checksum *result)
67ebfedea0SLionel Sambuc {
68ebfedea0SLionel Sambuc     EVP_MD_CTX *m;
69ebfedea0SLionel Sambuc     struct _krb5_checksum_type *c = _krb5_find_checksum (CKSUMTYPE_RSA_MD5);
70ebfedea0SLionel Sambuc     const char signature[] = "signaturekey";
71ebfedea0SLionel Sambuc     Checksum ksign_c;
72ebfedea0SLionel Sambuc     struct _krb5_key_data ksign;
73ebfedea0SLionel Sambuc     krb5_keyblock kb;
74ebfedea0SLionel Sambuc     unsigned char t[4];
75ebfedea0SLionel Sambuc     unsigned char tmp[16];
76ebfedea0SLionel Sambuc     unsigned char ksign_c_data[16];
77ebfedea0SLionel Sambuc     krb5_error_code ret;
78ebfedea0SLionel Sambuc 
79ebfedea0SLionel Sambuc     m = EVP_MD_CTX_create();
80ebfedea0SLionel Sambuc     if (m == NULL) {
81ebfedea0SLionel Sambuc 	krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
82ebfedea0SLionel Sambuc 	return ENOMEM;
83ebfedea0SLionel Sambuc     }
84ebfedea0SLionel Sambuc     ksign_c.checksum.length = sizeof(ksign_c_data);
85ebfedea0SLionel Sambuc     ksign_c.checksum.data   = ksign_c_data;
86ebfedea0SLionel Sambuc     ret = _krb5_internal_hmac(context, c, signature, sizeof(signature),
87ebfedea0SLionel Sambuc 			      0, key, &ksign_c);
88ebfedea0SLionel Sambuc     if (ret) {
89ebfedea0SLionel Sambuc 	EVP_MD_CTX_destroy(m);
90ebfedea0SLionel Sambuc 	return ret;
91ebfedea0SLionel Sambuc     }
92ebfedea0SLionel Sambuc     ksign.key = &kb;
93ebfedea0SLionel Sambuc     kb.keyvalue = ksign_c.checksum;
94ebfedea0SLionel Sambuc     EVP_DigestInit_ex(m, EVP_md5(), NULL);
95ebfedea0SLionel Sambuc     t[0] = (usage >>  0) & 0xFF;
96ebfedea0SLionel Sambuc     t[1] = (usage >>  8) & 0xFF;
97ebfedea0SLionel Sambuc     t[2] = (usage >> 16) & 0xFF;
98ebfedea0SLionel Sambuc     t[3] = (usage >> 24) & 0xFF;
99ebfedea0SLionel Sambuc     EVP_DigestUpdate(m, t, 4);
100ebfedea0SLionel Sambuc     EVP_DigestUpdate(m, data, len);
101ebfedea0SLionel Sambuc     EVP_DigestFinal_ex (m, tmp, NULL);
102ebfedea0SLionel Sambuc     EVP_MD_CTX_destroy(m);
103ebfedea0SLionel Sambuc 
104ebfedea0SLionel Sambuc     ret = _krb5_internal_hmac(context, c, tmp, sizeof(tmp), 0, &ksign, result);
105ebfedea0SLionel Sambuc     if (ret)
106ebfedea0SLionel Sambuc 	return ret;
107ebfedea0SLionel Sambuc     return 0;
108ebfedea0SLionel Sambuc }
109ebfedea0SLionel Sambuc 
110ebfedea0SLionel Sambuc struct _krb5_checksum_type _krb5_checksum_hmac_md5 = {
111ebfedea0SLionel Sambuc     CKSUMTYPE_HMAC_MD5,
112ebfedea0SLionel Sambuc     "hmac-md5",
113ebfedea0SLionel Sambuc     64,
114ebfedea0SLionel Sambuc     16,
115ebfedea0SLionel Sambuc     F_KEYED | F_CPROOF,
116ebfedea0SLionel Sambuc     _krb5_HMAC_MD5_checksum,
117ebfedea0SLionel Sambuc     NULL
118ebfedea0SLionel Sambuc };
119ebfedea0SLionel Sambuc 
120ebfedea0SLionel Sambuc /*
121ebfedea0SLionel Sambuc  * section 6 of draft-brezak-win2k-krb-rc4-hmac-03
122ebfedea0SLionel Sambuc  *
123ebfedea0SLionel Sambuc  * warning: not for small children
124ebfedea0SLionel Sambuc  */
125ebfedea0SLionel Sambuc 
126ebfedea0SLionel Sambuc static krb5_error_code
ARCFOUR_subencrypt(krb5_context context,struct _krb5_key_data * key,void * data,size_t len,unsigned usage,void * ivec)127ebfedea0SLionel Sambuc ARCFOUR_subencrypt(krb5_context context,
128ebfedea0SLionel Sambuc 		   struct _krb5_key_data *key,
129ebfedea0SLionel Sambuc 		   void *data,
130ebfedea0SLionel Sambuc 		   size_t len,
131ebfedea0SLionel Sambuc 		   unsigned usage,
132ebfedea0SLionel Sambuc 		   void *ivec)
133ebfedea0SLionel Sambuc {
134ebfedea0SLionel Sambuc     EVP_CIPHER_CTX ctx;
135ebfedea0SLionel Sambuc     struct _krb5_checksum_type *c = _krb5_find_checksum (CKSUMTYPE_RSA_MD5);
136ebfedea0SLionel Sambuc     Checksum k1_c, k2_c, k3_c, cksum;
137ebfedea0SLionel Sambuc     struct _krb5_key_data ke;
138ebfedea0SLionel Sambuc     krb5_keyblock kb;
139ebfedea0SLionel Sambuc     unsigned char t[4];
140ebfedea0SLionel Sambuc     unsigned char *cdata = data;
141ebfedea0SLionel Sambuc     unsigned char k1_c_data[16], k2_c_data[16], k3_c_data[16];
142ebfedea0SLionel Sambuc     krb5_error_code ret;
143ebfedea0SLionel Sambuc 
144ebfedea0SLionel Sambuc     t[0] = (usage >>  0) & 0xFF;
145ebfedea0SLionel Sambuc     t[1] = (usage >>  8) & 0xFF;
146ebfedea0SLionel Sambuc     t[2] = (usage >> 16) & 0xFF;
147ebfedea0SLionel Sambuc     t[3] = (usage >> 24) & 0xFF;
148ebfedea0SLionel Sambuc 
149ebfedea0SLionel Sambuc     k1_c.checksum.length = sizeof(k1_c_data);
150ebfedea0SLionel Sambuc     k1_c.checksum.data   = k1_c_data;
151ebfedea0SLionel Sambuc 
152ebfedea0SLionel Sambuc     ret = _krb5_internal_hmac(NULL, c, t, sizeof(t), 0, key, &k1_c);
153ebfedea0SLionel Sambuc     if (ret)
154ebfedea0SLionel Sambuc 	krb5_abortx(context, "hmac failed");
155ebfedea0SLionel Sambuc 
156ebfedea0SLionel Sambuc     memcpy (k2_c_data, k1_c_data, sizeof(k1_c_data));
157ebfedea0SLionel Sambuc 
158ebfedea0SLionel Sambuc     k2_c.checksum.length = sizeof(k2_c_data);
159ebfedea0SLionel Sambuc     k2_c.checksum.data   = k2_c_data;
160ebfedea0SLionel Sambuc 
161ebfedea0SLionel Sambuc     ke.key = &kb;
162ebfedea0SLionel Sambuc     kb.keyvalue = k2_c.checksum;
163ebfedea0SLionel Sambuc 
164ebfedea0SLionel Sambuc     cksum.checksum.length = 16;
165ebfedea0SLionel Sambuc     cksum.checksum.data   = data;
166ebfedea0SLionel Sambuc 
167ebfedea0SLionel Sambuc     ret = _krb5_internal_hmac(NULL, c, cdata + 16, len - 16, 0, &ke, &cksum);
168ebfedea0SLionel Sambuc     if (ret)
169ebfedea0SLionel Sambuc 	krb5_abortx(context, "hmac failed");
170ebfedea0SLionel Sambuc 
171ebfedea0SLionel Sambuc     ke.key = &kb;
172ebfedea0SLionel Sambuc     kb.keyvalue = k1_c.checksum;
173ebfedea0SLionel Sambuc 
174ebfedea0SLionel Sambuc     k3_c.checksum.length = sizeof(k3_c_data);
175ebfedea0SLionel Sambuc     k3_c.checksum.data   = k3_c_data;
176ebfedea0SLionel Sambuc 
177ebfedea0SLionel Sambuc     ret = _krb5_internal_hmac(NULL, c, data, 16, 0, &ke, &k3_c);
178ebfedea0SLionel Sambuc     if (ret)
179ebfedea0SLionel Sambuc 	krb5_abortx(context, "hmac failed");
180ebfedea0SLionel Sambuc 
181ebfedea0SLionel Sambuc     EVP_CIPHER_CTX_init(&ctx);
182ebfedea0SLionel Sambuc 
183ebfedea0SLionel Sambuc     EVP_CipherInit_ex(&ctx, EVP_rc4(), NULL, k3_c.checksum.data, NULL, 1);
184ebfedea0SLionel Sambuc     EVP_Cipher(&ctx, cdata + 16, cdata + 16, len - 16);
185ebfedea0SLionel Sambuc     EVP_CIPHER_CTX_cleanup(&ctx);
186ebfedea0SLionel Sambuc 
187ebfedea0SLionel Sambuc     memset (k1_c_data, 0, sizeof(k1_c_data));
188ebfedea0SLionel Sambuc     memset (k2_c_data, 0, sizeof(k2_c_data));
189ebfedea0SLionel Sambuc     memset (k3_c_data, 0, sizeof(k3_c_data));
190ebfedea0SLionel Sambuc     return 0;
191ebfedea0SLionel Sambuc }
192ebfedea0SLionel Sambuc 
193ebfedea0SLionel Sambuc static krb5_error_code
ARCFOUR_subdecrypt(krb5_context context,struct _krb5_key_data * key,void * data,size_t len,unsigned usage,void * ivec)194ebfedea0SLionel Sambuc ARCFOUR_subdecrypt(krb5_context context,
195ebfedea0SLionel Sambuc 		   struct _krb5_key_data *key,
196ebfedea0SLionel Sambuc 		   void *data,
197ebfedea0SLionel Sambuc 		   size_t len,
198ebfedea0SLionel Sambuc 		   unsigned usage,
199ebfedea0SLionel Sambuc 		   void *ivec)
200ebfedea0SLionel Sambuc {
201ebfedea0SLionel Sambuc     EVP_CIPHER_CTX ctx;
202ebfedea0SLionel Sambuc     struct _krb5_checksum_type *c = _krb5_find_checksum (CKSUMTYPE_RSA_MD5);
203ebfedea0SLionel Sambuc     Checksum k1_c, k2_c, k3_c, cksum;
204ebfedea0SLionel Sambuc     struct _krb5_key_data ke;
205ebfedea0SLionel Sambuc     krb5_keyblock kb;
206ebfedea0SLionel Sambuc     unsigned char t[4];
207ebfedea0SLionel Sambuc     unsigned char *cdata = data;
208ebfedea0SLionel Sambuc     unsigned char k1_c_data[16], k2_c_data[16], k3_c_data[16];
209ebfedea0SLionel Sambuc     unsigned char cksum_data[16];
210ebfedea0SLionel Sambuc     krb5_error_code ret;
211ebfedea0SLionel Sambuc 
212ebfedea0SLionel Sambuc     t[0] = (usage >>  0) & 0xFF;
213ebfedea0SLionel Sambuc     t[1] = (usage >>  8) & 0xFF;
214ebfedea0SLionel Sambuc     t[2] = (usage >> 16) & 0xFF;
215ebfedea0SLionel Sambuc     t[3] = (usage >> 24) & 0xFF;
216ebfedea0SLionel Sambuc 
217ebfedea0SLionel Sambuc     k1_c.checksum.length = sizeof(k1_c_data);
218ebfedea0SLionel Sambuc     k1_c.checksum.data   = k1_c_data;
219ebfedea0SLionel Sambuc 
220ebfedea0SLionel Sambuc     ret = _krb5_internal_hmac(NULL, c, t, sizeof(t), 0, key, &k1_c);
221ebfedea0SLionel Sambuc     if (ret)
222ebfedea0SLionel Sambuc 	krb5_abortx(context, "hmac failed");
223ebfedea0SLionel Sambuc 
224ebfedea0SLionel Sambuc     memcpy (k2_c_data, k1_c_data, sizeof(k1_c_data));
225ebfedea0SLionel Sambuc 
226ebfedea0SLionel Sambuc     k2_c.checksum.length = sizeof(k2_c_data);
227ebfedea0SLionel Sambuc     k2_c.checksum.data   = k2_c_data;
228ebfedea0SLionel Sambuc 
229ebfedea0SLionel Sambuc     ke.key = &kb;
230ebfedea0SLionel Sambuc     kb.keyvalue = k1_c.checksum;
231ebfedea0SLionel Sambuc 
232ebfedea0SLionel Sambuc     k3_c.checksum.length = sizeof(k3_c_data);
233ebfedea0SLionel Sambuc     k3_c.checksum.data   = k3_c_data;
234ebfedea0SLionel Sambuc 
235ebfedea0SLionel Sambuc     ret = _krb5_internal_hmac(NULL, c, cdata, 16, 0, &ke, &k3_c);
236ebfedea0SLionel Sambuc     if (ret)
237ebfedea0SLionel Sambuc 	krb5_abortx(context, "hmac failed");
238ebfedea0SLionel Sambuc 
239ebfedea0SLionel Sambuc     EVP_CIPHER_CTX_init(&ctx);
240ebfedea0SLionel Sambuc     EVP_CipherInit_ex(&ctx, EVP_rc4(), NULL, k3_c.checksum.data, NULL, 0);
241ebfedea0SLionel Sambuc     EVP_Cipher(&ctx, cdata + 16, cdata + 16, len - 16);
242ebfedea0SLionel Sambuc     EVP_CIPHER_CTX_cleanup(&ctx);
243ebfedea0SLionel Sambuc 
244ebfedea0SLionel Sambuc     ke.key = &kb;
245ebfedea0SLionel Sambuc     kb.keyvalue = k2_c.checksum;
246ebfedea0SLionel Sambuc 
247ebfedea0SLionel Sambuc     cksum.checksum.length = 16;
248ebfedea0SLionel Sambuc     cksum.checksum.data   = cksum_data;
249ebfedea0SLionel Sambuc 
250ebfedea0SLionel Sambuc     ret = _krb5_internal_hmac(NULL, c, cdata + 16, len - 16, 0, &ke, &cksum);
251ebfedea0SLionel Sambuc     if (ret)
252ebfedea0SLionel Sambuc 	krb5_abortx(context, "hmac failed");
253ebfedea0SLionel Sambuc 
254ebfedea0SLionel Sambuc     memset (k1_c_data, 0, sizeof(k1_c_data));
255ebfedea0SLionel Sambuc     memset (k2_c_data, 0, sizeof(k2_c_data));
256ebfedea0SLionel Sambuc     memset (k3_c_data, 0, sizeof(k3_c_data));
257ebfedea0SLionel Sambuc 
258ebfedea0SLionel Sambuc     if (ct_memcmp (cksum.checksum.data, data, 16) != 0) {
259ebfedea0SLionel Sambuc 	krb5_clear_error_message (context);
260ebfedea0SLionel Sambuc 	return KRB5KRB_AP_ERR_BAD_INTEGRITY;
261ebfedea0SLionel Sambuc     } else {
262ebfedea0SLionel Sambuc 	return 0;
263ebfedea0SLionel Sambuc     }
264ebfedea0SLionel Sambuc }
265ebfedea0SLionel Sambuc 
266ebfedea0SLionel Sambuc /*
267ebfedea0SLionel Sambuc  * convert the usage numbers used in
268ebfedea0SLionel Sambuc  * draft-ietf-cat-kerb-key-derivation-00.txt to the ones in
269ebfedea0SLionel Sambuc  * draft-brezak-win2k-krb-rc4-hmac-04.txt
270ebfedea0SLionel Sambuc  */
271ebfedea0SLionel Sambuc 
272ebfedea0SLionel Sambuc krb5_error_code
_krb5_usage2arcfour(krb5_context context,unsigned * usage)273ebfedea0SLionel Sambuc _krb5_usage2arcfour(krb5_context context, unsigned *usage)
274ebfedea0SLionel Sambuc {
275ebfedea0SLionel Sambuc     switch (*usage) {
276ebfedea0SLionel Sambuc     case KRB5_KU_AS_REP_ENC_PART : /* 3 */
277ebfedea0SLionel Sambuc 	*usage = 8;
278ebfedea0SLionel Sambuc 	return 0;
279ebfedea0SLionel Sambuc     case KRB5_KU_USAGE_SEAL :  /* 22 */
280ebfedea0SLionel Sambuc 	*usage = 13;
281ebfedea0SLionel Sambuc 	return 0;
282ebfedea0SLionel Sambuc     case KRB5_KU_USAGE_SIGN : /* 23 */
283ebfedea0SLionel Sambuc         *usage = 15;
284ebfedea0SLionel Sambuc         return 0;
285ebfedea0SLionel Sambuc     case KRB5_KU_USAGE_SEQ: /* 24 */
286ebfedea0SLionel Sambuc 	*usage = 0;
287ebfedea0SLionel Sambuc 	return 0;
288ebfedea0SLionel Sambuc     default :
289ebfedea0SLionel Sambuc 	return 0;
290ebfedea0SLionel Sambuc     }
291ebfedea0SLionel Sambuc }
292ebfedea0SLionel Sambuc 
293ebfedea0SLionel Sambuc static krb5_error_code
ARCFOUR_encrypt(krb5_context context,struct _krb5_key_data * key,void * data,size_t len,krb5_boolean encryptp,int usage,void * ivec)294ebfedea0SLionel Sambuc ARCFOUR_encrypt(krb5_context context,
295ebfedea0SLionel Sambuc 		struct _krb5_key_data *key,
296ebfedea0SLionel Sambuc 		void *data,
297ebfedea0SLionel Sambuc 		size_t len,
298ebfedea0SLionel Sambuc 		krb5_boolean encryptp,
299ebfedea0SLionel Sambuc 		int usage,
300ebfedea0SLionel Sambuc 		void *ivec)
301ebfedea0SLionel Sambuc {
302ebfedea0SLionel Sambuc     krb5_error_code ret;
303ebfedea0SLionel Sambuc     unsigned keyusage = usage;
304ebfedea0SLionel Sambuc 
305ebfedea0SLionel Sambuc     if((ret = _krb5_usage2arcfour (context, &keyusage)) != 0)
306ebfedea0SLionel Sambuc 	return ret;
307ebfedea0SLionel Sambuc 
308ebfedea0SLionel Sambuc     if (encryptp)
309ebfedea0SLionel Sambuc 	return ARCFOUR_subencrypt (context, key, data, len, keyusage, ivec);
310ebfedea0SLionel Sambuc     else
311ebfedea0SLionel Sambuc 	return ARCFOUR_subdecrypt (context, key, data, len, keyusage, ivec);
312ebfedea0SLionel Sambuc }
313ebfedea0SLionel Sambuc 
314ebfedea0SLionel Sambuc struct _krb5_encryption_type _krb5_enctype_arcfour_hmac_md5 = {
315ebfedea0SLionel Sambuc     ETYPE_ARCFOUR_HMAC_MD5,
316ebfedea0SLionel Sambuc     "arcfour-hmac-md5",
317ebfedea0SLionel Sambuc     1,
318ebfedea0SLionel Sambuc     1,
319ebfedea0SLionel Sambuc     8,
320ebfedea0SLionel Sambuc     &keytype_arcfour,
321ebfedea0SLionel Sambuc     &_krb5_checksum_hmac_md5,
322*0a6a1f1dSLionel Sambuc     &_krb5_checksum_hmac_md5,
323ebfedea0SLionel Sambuc     F_SPECIAL,
324ebfedea0SLionel Sambuc     ARCFOUR_encrypt,
325ebfedea0SLionel Sambuc     0,
326ebfedea0SLionel Sambuc     NULL
327ebfedea0SLionel Sambuc };
328