xref: /freebsd/crypto/heimdal/lib/krb5/salt-des3.c (revision 6a068746777241722b2b32c5d0bc443a2a64d80b)
1*ae771770SStanislav Sedov /*
2*ae771770SStanislav Sedov  * Copyright (c) 1997 - 2008 Kungliga Tekniska Högskolan
3*ae771770SStanislav Sedov  * (Royal Institute of Technology, Stockholm, Sweden).
4*ae771770SStanislav Sedov  * All rights reserved.
5*ae771770SStanislav Sedov  *
6*ae771770SStanislav Sedov  * Redistribution and use in source and binary forms, with or without
7*ae771770SStanislav Sedov  * modification, are permitted provided that the following conditions
8*ae771770SStanislav Sedov  * are met:
9*ae771770SStanislav Sedov  *
10*ae771770SStanislav Sedov  * 1. Redistributions of source code must retain the above copyright
11*ae771770SStanislav Sedov  *    notice, this list of conditions and the following disclaimer.
12*ae771770SStanislav Sedov  *
13*ae771770SStanislav Sedov  * 2. Redistributions in binary form must reproduce the above copyright
14*ae771770SStanislav Sedov  *    notice, this list of conditions and the following disclaimer in the
15*ae771770SStanislav Sedov  *    documentation and/or other materials provided with the distribution.
16*ae771770SStanislav Sedov  *
17*ae771770SStanislav Sedov  * 3. Neither the name of the Institute nor the names of its contributors
18*ae771770SStanislav Sedov  *    may be used to endorse or promote products derived from this software
19*ae771770SStanislav Sedov  *    without specific prior written permission.
20*ae771770SStanislav Sedov  *
21*ae771770SStanislav Sedov  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22*ae771770SStanislav Sedov  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23*ae771770SStanislav Sedov  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24*ae771770SStanislav Sedov  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25*ae771770SStanislav Sedov  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26*ae771770SStanislav Sedov  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27*ae771770SStanislav Sedov  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28*ae771770SStanislav Sedov  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29*ae771770SStanislav Sedov  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30*ae771770SStanislav Sedov  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31*ae771770SStanislav Sedov  * SUCH DAMAGE.
32*ae771770SStanislav Sedov  */
33*ae771770SStanislav Sedov 
34*ae771770SStanislav Sedov #include "krb5_locl.h"
35*ae771770SStanislav Sedov 
36*ae771770SStanislav Sedov #ifdef DES3_OLD_ENCTYPE
37*ae771770SStanislav Sedov static krb5_error_code
DES3_string_to_key(krb5_context context,krb5_enctype enctype,krb5_data password,krb5_salt salt,krb5_data opaque,krb5_keyblock * key)38*ae771770SStanislav Sedov DES3_string_to_key(krb5_context context,
39*ae771770SStanislav Sedov 		   krb5_enctype enctype,
40*ae771770SStanislav Sedov 		   krb5_data password,
41*ae771770SStanislav Sedov 		   krb5_salt salt,
42*ae771770SStanislav Sedov 		   krb5_data opaque,
43*ae771770SStanislav Sedov 		   krb5_keyblock *key)
44*ae771770SStanislav Sedov {
45*ae771770SStanislav Sedov     char *str;
46*ae771770SStanislav Sedov     size_t len;
47*ae771770SStanislav Sedov     unsigned char tmp[24];
48*ae771770SStanislav Sedov     DES_cblock keys[3];
49*ae771770SStanislav Sedov     krb5_error_code ret;
50*ae771770SStanislav Sedov 
51*ae771770SStanislav Sedov     len = password.length + salt.saltvalue.length;
52*ae771770SStanislav Sedov     str = malloc(len);
53*ae771770SStanislav Sedov     if(len != 0 && str == NULL) {
54*ae771770SStanislav Sedov 	krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
55*ae771770SStanislav Sedov 	return ENOMEM;
56*ae771770SStanislav Sedov     }
57*ae771770SStanislav Sedov     memcpy(str, password.data, password.length);
58*ae771770SStanislav Sedov     memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length);
59*ae771770SStanislav Sedov     {
60*ae771770SStanislav Sedov 	DES_cblock ivec;
61*ae771770SStanislav Sedov 	DES_key_schedule s[3];
62*ae771770SStanislav Sedov 	int i;
63*ae771770SStanislav Sedov 
64*ae771770SStanislav Sedov 	ret = _krb5_n_fold(str, len, tmp, 24);
65*ae771770SStanislav Sedov 	if (ret) {
66*ae771770SStanislav Sedov 	    memset(str, 0, len);
67*ae771770SStanislav Sedov 	    free(str);
68*ae771770SStanislav Sedov 	    krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
69*ae771770SStanislav Sedov 	    return ret;
70*ae771770SStanislav Sedov 	}
71*ae771770SStanislav Sedov 
72*ae771770SStanislav Sedov 	for(i = 0; i < 3; i++){
73*ae771770SStanislav Sedov 	    memcpy(keys + i, tmp + i * 8, sizeof(keys[i]));
74*ae771770SStanislav Sedov 	    DES_set_odd_parity(keys + i);
75*ae771770SStanislav Sedov 	    if(DES_is_weak_key(keys + i))
76*ae771770SStanislav Sedov 		_krb5_xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0");
77*ae771770SStanislav Sedov 	    DES_set_key_unchecked(keys + i, &s[i]);
78*ae771770SStanislav Sedov 	}
79*ae771770SStanislav Sedov 	memset(&ivec, 0, sizeof(ivec));
80*ae771770SStanislav Sedov 	DES_ede3_cbc_encrypt(tmp,
81*ae771770SStanislav Sedov 			     tmp, sizeof(tmp),
82*ae771770SStanislav Sedov 			     &s[0], &s[1], &s[2], &ivec, DES_ENCRYPT);
83*ae771770SStanislav Sedov 	memset(s, 0, sizeof(s));
84*ae771770SStanislav Sedov 	memset(&ivec, 0, sizeof(ivec));
85*ae771770SStanislav Sedov 	for(i = 0; i < 3; i++){
86*ae771770SStanislav Sedov 	    memcpy(keys + i, tmp + i * 8, sizeof(keys[i]));
87*ae771770SStanislav Sedov 	    DES_set_odd_parity(keys + i);
88*ae771770SStanislav Sedov 	    if(DES_is_weak_key(keys + i))
89*ae771770SStanislav Sedov 		_krb5_xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0");
90*ae771770SStanislav Sedov 	}
91*ae771770SStanislav Sedov 	memset(tmp, 0, sizeof(tmp));
92*ae771770SStanislav Sedov     }
93*ae771770SStanislav Sedov     key->keytype = enctype;
94*ae771770SStanislav Sedov     krb5_data_copy(&key->keyvalue, keys, sizeof(keys));
95*ae771770SStanislav Sedov     memset(keys, 0, sizeof(keys));
96*ae771770SStanislav Sedov     memset(str, 0, len);
97*ae771770SStanislav Sedov     free(str);
98*ae771770SStanislav Sedov     return 0;
99*ae771770SStanislav Sedov }
100*ae771770SStanislav Sedov #endif
101*ae771770SStanislav Sedov 
102*ae771770SStanislav Sedov static krb5_error_code
DES3_string_to_key_derived(krb5_context context,krb5_enctype enctype,krb5_data password,krb5_salt salt,krb5_data opaque,krb5_keyblock * key)103*ae771770SStanislav Sedov DES3_string_to_key_derived(krb5_context context,
104*ae771770SStanislav Sedov 			   krb5_enctype enctype,
105*ae771770SStanislav Sedov 			   krb5_data password,
106*ae771770SStanislav Sedov 			   krb5_salt salt,
107*ae771770SStanislav Sedov 			   krb5_data opaque,
108*ae771770SStanislav Sedov 			   krb5_keyblock *key)
109*ae771770SStanislav Sedov {
110*ae771770SStanislav Sedov     krb5_error_code ret;
111*ae771770SStanislav Sedov     size_t len = password.length + salt.saltvalue.length;
112*ae771770SStanislav Sedov     char *s;
113*ae771770SStanislav Sedov 
114*ae771770SStanislav Sedov     s = malloc(len);
115*ae771770SStanislav Sedov     if(len != 0 && s == NULL) {
116*ae771770SStanislav Sedov 	krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
117*ae771770SStanislav Sedov 	return ENOMEM;
118*ae771770SStanislav Sedov     }
119*ae771770SStanislav Sedov     memcpy(s, password.data, password.length);
120*ae771770SStanislav Sedov     memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length);
121*ae771770SStanislav Sedov     ret = krb5_string_to_key_derived(context,
122*ae771770SStanislav Sedov 				     s,
123*ae771770SStanislav Sedov 				     len,
124*ae771770SStanislav Sedov 				     enctype,
125*ae771770SStanislav Sedov 				     key);
126*ae771770SStanislav Sedov     memset(s, 0, len);
127*ae771770SStanislav Sedov     free(s);
128*ae771770SStanislav Sedov     return ret;
129*ae771770SStanislav Sedov }
130*ae771770SStanislav Sedov 
131*ae771770SStanislav Sedov 
132*ae771770SStanislav Sedov #ifdef DES3_OLD_ENCTYPE
133*ae771770SStanislav Sedov struct salt_type _krb5_des3_salt[] = {
134*ae771770SStanislav Sedov     {
135*ae771770SStanislav Sedov 	KRB5_PW_SALT,
136*ae771770SStanislav Sedov 	"pw-salt",
137*ae771770SStanislav Sedov 	DES3_string_to_key
138*ae771770SStanislav Sedov     },
139*ae771770SStanislav Sedov     { 0 }
140*ae771770SStanislav Sedov };
141*ae771770SStanislav Sedov #endif
142*ae771770SStanislav Sedov 
143*ae771770SStanislav Sedov struct salt_type _krb5_des3_salt_derived[] = {
144*ae771770SStanislav Sedov     {
145*ae771770SStanislav Sedov 	KRB5_PW_SALT,
146*ae771770SStanislav Sedov 	"pw-salt",
147*ae771770SStanislav Sedov 	DES3_string_to_key_derived
148*ae771770SStanislav Sedov     },
149*ae771770SStanislav Sedov     { 0 }
150*ae771770SStanislav Sedov };
151