[aus.sources] DES src, giving the body back to bones.tar.Z

raob@cs.mu.oz.au (richard oxbrow) (08/28/90)

	The file des.tar.Z has been place on gondwana.ecr.mu.OZ.AU for
    anonymous ftp. 

    The file originates from surf.sics.bu.oz.au but since they aren't
	on the internet, gondwana.ecr.mu.oz.au is acting as their redistribution
	point and as such is provided as it. 

    The software should be a suitable replace for the DES code normally found
    in kerberos, it comes with an imakefile (but doesn't include verify). 
    (note the DES stuff was developed for the first version of
    bones.tar.Z so somethings may have changed slightly). 

    Finially you will need to certify the DES encryption/decryption
    routines for your own piece of mind 8-) 

	richard..

    raob@mullian.ee.mu.oz.au


#ps note string_to_key probably works differently from the MITs des stuff

*************************README FILE*************************************
This is a DES implementation written by Eric Young (eay@surf.sics.bu.oz.au)
The implementation was written so as to conform with the manual entry
for the des_crypt(3) library routines from MIT's project Athena.

Copyright 1990 Eric Young. All Rights Reserved.

The COPYRIGHT file tells you what you are allowed to do with this software.

These routines have been tested on
mvax 3600
sgi 4D/20
sun 3/60
ibm ps/2

The program destest and rpw test various aspects of the library.
The Imakefile is setup for use in the kerberos distribution.
For normal compilation use makesh.

These routines are best compiled with gcc but make sure the ioctls in
read_password still work.

The inner loop of this des implementation
is a merged S/P translation with the E table perm/key sched
xor done at the same time.  It gives optimizing compilers something
to chew on.

This implementation is fast and has low data overhead.
It need improvement in the do_IP and do_FP routines.
Copyright 1990 Eric Young. All Rights Reserved.


*************************COPYRIGHT FILE*************************************

This is a DES implementation written by Eric Young (eay@surf.sics.bu.oz.au)
The implementation was written so as to conform with the manual entry
for the des_crypt(3) library routines from MIT's project Athena.

At this time you may use this library for non-commercial use.
If you modify any of the files making up this library, you must
add a comment in the modified file indicating who modified it.
For commercial purposes please contact me (or Bond Uni via
postmaster@surf.sics.bu.oz.au).

If you find bugs or otherwise modify this program, please send
changes back to me.

jtkohl@MIT.EDU (John T Kohl) (08/28/90)

In article <5212@munnari.oz.au> raob@cs.mu.oz.au (richard oxbrow) writes:

> #ps note string_to_key probably works differently from the MITs des stuff

Surprisingly, it seems to implement the same twisted algorithm.

The quad_cksum, however, does not implement the broken version
MIT/Athena distributes, and will not be interoperable.

Is Bond Uni. working on diffs to apply to the bones distribution to put
the calls to encryption back into the kerberos routines?

John
--
John Kohl <jtkohl@ATHENA.MIT.EDU> or <jtkohl@MIT.EDU>
Digital Equipment Corporation/Project Athena
(The above opinions are MINE.  Don't put my words in somebody else's mouth!)

bernerus@utcrt2.utc.chalmers.se (Christer Bernerus) (08/29/90)

Now, if I ftp those DES sources from Down Under to Sweden, using the
internet possibly going through the USA, will they (US Govt) send the
marines to get me? :-)
More specifically, do I break US Law if I import DES from Australia via
USA to Sweden ?
Any Lawyers out there ?

Chris.