On Fri, Dec 04, 2020 at 02:59:35PM +0000, David Howells wrote:
> Hi Chuck, Bruce,
> 
> Why is gss_krb5_crypto.c using an auxiliary cipher?  For reference, the
> gss_krb5_aes_encrypt() code looks like the attached.
> 
> >From what I can tell, in AES mode, the difference between the main cipher and
> the auxiliary cipher is that the latter is "cbc(aes)" whereas the former is
> "cts(cbc(aes))" - but they have the same key.
> 
> Reading up on CTS, I'm guessing the reason it's like this is that CTS is the
> same as the non-CTS, except for the last two blocks, but the non-CTS one is
> more efficient.

CTS is cipher-text stealing, isn't it?  I think it was Kevin Coffman
that did that, and I don't remember the history.  I thought it was
required by some spec or peer implementation (maybe Windows?) but I
really don't remember.  It may predate git.  I'll dig around and see
what I can find.

--b.

> 
> David
> ---
>       nbytes = buf->len - offset - GSS_KRB5_TOK_HDR_LEN;
>       nblocks = (nbytes + blocksize - 1) / blocksize;
>       cbcbytes = 0;
>       if (nblocks > 2)
>               cbcbytes = (nblocks - 2) * blocksize;
> 
>       memset(desc.iv, 0, sizeof(desc.iv));
> 
>       if (cbcbytes) {
>               SYNC_SKCIPHER_REQUEST_ON_STACK(req, aux_cipher);
> 
>               desc.pos = offset + GSS_KRB5_TOK_HDR_LEN;
>               desc.fragno = 0;
>               desc.fraglen = 0;
>               desc.pages = pages;
>               desc.outbuf = buf;
>               desc.req = req;
> 
>               skcipher_request_set_sync_tfm(req, aux_cipher);
>               skcipher_request_set_callback(req, 0, NULL, NULL);
> 
>               sg_init_table(desc.infrags, 4);
>               sg_init_table(desc.outfrags, 4);
> 
>               err = xdr_process_buf(buf, offset + GSS_KRB5_TOK_HDR_LEN,
>                                     cbcbytes, encryptor, &desc);
>               skcipher_request_zero(req);
>               if (err)
>                       goto out_err;
>       }
> 
>       /* Make sure IV carries forward from any CBC results. */
>       err = gss_krb5_cts_crypt(cipher, buf,
>                                offset + GSS_KRB5_TOK_HDR_LEN + cbcbytes,
>                                desc.iv, pages, 1);
>       if (err) {
>               err = GSS_S_FAILURE;
>               goto out_err;
>       }

Reply via email to