[comp.archives] [kerberos...] DES src, giving the body back to bones.tar.Z

raob@cs.mu.oz.au (richard oxbrow) (08/28/90)

Archive-name: des-crypt/28-Aug-90
Original-posting-by: raob@cs.mu.oz.au (richard oxbrow)
Original-subject: DES src, giving the body back to bones.tar.Z
Archive-site: gondwana.ecr.mu.oz.au [128.250.1.63]
Reposted-by: emv@math.lsa.umich.edu (Edward Vielmetti)


	The file des.tar.Z has been place on gondwana.ecr.mu.OZ.AU for
    anonymous ftp. 

    The file originates from surf.sics.bu.oz.au but since they aren't
	on the internet, gondwana.ecr.mu.oz.au is acting as their redistribution
	point and as such is provided as it. 

    The software should be a suitable replace for the DES code normally found
    in kerberos, it comes with an imakefile (but doesn't include verify). 
    (note the DES stuff was developed for the first version of
    bones.tar.Z so somethings may have changed slightly). 

    Finially you will need to certify the DES encryption/decryption
    routines for your own piece of mind 8-) 

	richard..

    raob@mullian.ee.mu.oz.au


#ps note string_to_key probably works differently from the MITs des stuff

*************************README FILE*************************************
This is a DES implementation written by Eric Young (eay@surf.sics.bu.oz.au)
The implementation was written so as to conform with the manual entry
for the des_crypt(3) library routines from MIT's project Athena.

Copyright 1990 Eric Young. All Rights Reserved.

The COPYRIGHT file tells you what you are allowed to do with this software.

These routines have been tested on
mvax 3600
sgi 4D/20
sun 3/60
ibm ps/2

The program destest and rpw test various aspects of the library.
The Imakefile is setup for use in the kerberos distribution.
For normal compilation use makesh.

These routines are best compiled with gcc but make sure the ioctls in
read_password still work.

The inner loop of this des implementation
is a merged S/P translation with the E table perm/key sched
xor done at the same time.  It gives optimizing compilers something
to chew on.

This implementation is fast and has low data overhead.
It need improvement in the do_IP and do_FP routines.
Copyright 1990 Eric Young. All Rights Reserved.


*************************COPYRIGHT FILE*************************************

This is a DES implementation written by Eric Young (eay@surf.sics.bu.oz.au)
The implementation was written so as to conform with the manual entry
for the des_crypt(3) library routines from MIT's project Athena.

At this time you may use this library for non-commercial use.
If you modify any of the files making up this library, you must
add a comment in the modified file indicating who modified it.
For commercial purposes please contact me (or Bond Uni via
postmaster@surf.sics.bu.oz.au).

If you find bugs or otherwise modify this program, please send
changes back to me.