1*ae771770SStanislav Sedov /* 2*ae771770SStanislav Sedov * Copyright (c) 1997 - 2008 Kungliga Tekniska Högskolan 3*ae771770SStanislav Sedov * (Royal Institute of Technology, Stockholm, Sweden). 4*ae771770SStanislav Sedov * All rights reserved. 5*ae771770SStanislav Sedov * 6*ae771770SStanislav Sedov * Redistribution and use in source and binary forms, with or without 7*ae771770SStanislav Sedov * modification, are permitted provided that the following conditions 8*ae771770SStanislav Sedov * are met: 9*ae771770SStanislav Sedov * 10*ae771770SStanislav Sedov * 1. Redistributions of source code must retain the above copyright 11*ae771770SStanislav Sedov * notice, this list of conditions and the following disclaimer. 12*ae771770SStanislav Sedov * 13*ae771770SStanislav Sedov * 2. Redistributions in binary form must reproduce the above copyright 14*ae771770SStanislav Sedov * notice, this list of conditions and the following disclaimer in the 15*ae771770SStanislav Sedov * documentation and/or other materials provided with the distribution. 16*ae771770SStanislav Sedov * 17*ae771770SStanislav Sedov * 3. Neither the name of the Institute nor the names of its contributors 18*ae771770SStanislav Sedov * may be used to endorse or promote products derived from this software 19*ae771770SStanislav Sedov * without specific prior written permission. 20*ae771770SStanislav Sedov * 21*ae771770SStanislav Sedov * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22*ae771770SStanislav Sedov * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23*ae771770SStanislav Sedov * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24*ae771770SStanislav Sedov * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25*ae771770SStanislav Sedov * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26*ae771770SStanislav Sedov * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27*ae771770SStanislav Sedov * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28*ae771770SStanislav Sedov * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29*ae771770SStanislav Sedov * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30*ae771770SStanislav Sedov * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31*ae771770SStanislav Sedov * SUCH DAMAGE. 32*ae771770SStanislav Sedov */ 33*ae771770SStanislav Sedov 34*ae771770SStanislav Sedov #include "krb5_locl.h" 35*ae771770SStanislav Sedov 36*ae771770SStanislav Sedov /* coverity[+alloc : arg-*3] */ 37*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 38*ae771770SStanislav Sedov krb5_salttype_to_string (krb5_context context, 39*ae771770SStanislav Sedov krb5_enctype etype, 40*ae771770SStanislav Sedov krb5_salttype stype, 41*ae771770SStanislav Sedov char **string) 42*ae771770SStanislav Sedov { 43*ae771770SStanislav Sedov struct _krb5_encryption_type *e; 44*ae771770SStanislav Sedov struct salt_type *st; 45*ae771770SStanislav Sedov 46*ae771770SStanislav Sedov e = _krb5_find_enctype (etype); 47*ae771770SStanislav Sedov if (e == NULL) { 48*ae771770SStanislav Sedov krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP, 49*ae771770SStanislav Sedov "encryption type %d not supported", 50*ae771770SStanislav Sedov etype); 51*ae771770SStanislav Sedov return KRB5_PROG_ETYPE_NOSUPP; 52*ae771770SStanislav Sedov } 53*ae771770SStanislav Sedov for (st = e->keytype->string_to_key; st && st->type; st++) { 54*ae771770SStanislav Sedov if (st->type == stype) { 55*ae771770SStanislav Sedov *string = strdup (st->name); 56*ae771770SStanislav Sedov if (*string == NULL) { 57*ae771770SStanislav Sedov krb5_set_error_message (context, ENOMEM, 58*ae771770SStanislav Sedov N_("malloc: out of memory", "")); 59*ae771770SStanislav Sedov return ENOMEM; 60*ae771770SStanislav Sedov } 61*ae771770SStanislav Sedov return 0; 62*ae771770SStanislav Sedov } 63*ae771770SStanislav Sedov } 64*ae771770SStanislav Sedov krb5_set_error_message (context, HEIM_ERR_SALTTYPE_NOSUPP, 65*ae771770SStanislav Sedov "salttype %d not supported", stype); 66*ae771770SStanislav Sedov return HEIM_ERR_SALTTYPE_NOSUPP; 67*ae771770SStanislav Sedov } 68*ae771770SStanislav Sedov 69*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 70*ae771770SStanislav Sedov krb5_string_to_salttype (krb5_context context, 71*ae771770SStanislav Sedov krb5_enctype etype, 72*ae771770SStanislav Sedov const char *string, 73*ae771770SStanislav Sedov krb5_salttype *salttype) 74*ae771770SStanislav Sedov { 75*ae771770SStanislav Sedov struct _krb5_encryption_type *e; 76*ae771770SStanislav Sedov struct salt_type *st; 77*ae771770SStanislav Sedov 78*ae771770SStanislav Sedov e = _krb5_find_enctype (etype); 79*ae771770SStanislav Sedov if (e == NULL) { 80*ae771770SStanislav Sedov krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP, 81*ae771770SStanislav Sedov N_("encryption type %d not supported", ""), 82*ae771770SStanislav Sedov etype); 83*ae771770SStanislav Sedov return KRB5_PROG_ETYPE_NOSUPP; 84*ae771770SStanislav Sedov } 85*ae771770SStanislav Sedov for (st = e->keytype->string_to_key; st && st->type; st++) { 86*ae771770SStanislav Sedov if (strcasecmp (st->name, string) == 0) { 87*ae771770SStanislav Sedov *salttype = st->type; 88*ae771770SStanislav Sedov return 0; 89*ae771770SStanislav Sedov } 90*ae771770SStanislav Sedov } 91*ae771770SStanislav Sedov krb5_set_error_message(context, HEIM_ERR_SALTTYPE_NOSUPP, 92*ae771770SStanislav Sedov N_("salttype %s not supported", ""), string); 93*ae771770SStanislav Sedov return HEIM_ERR_SALTTYPE_NOSUPP; 94*ae771770SStanislav Sedov } 95*ae771770SStanislav Sedov 96*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 97*ae771770SStanislav Sedov krb5_get_pw_salt(krb5_context context, 98*ae771770SStanislav Sedov krb5_const_principal principal, 99*ae771770SStanislav Sedov krb5_salt *salt) 100*ae771770SStanislav Sedov { 101*ae771770SStanislav Sedov size_t len; 102*ae771770SStanislav Sedov size_t i; 103*ae771770SStanislav Sedov krb5_error_code ret; 104*ae771770SStanislav Sedov char *p; 105*ae771770SStanislav Sedov 106*ae771770SStanislav Sedov salt->salttype = KRB5_PW_SALT; 107*ae771770SStanislav Sedov len = strlen(principal->realm); 108*ae771770SStanislav Sedov for (i = 0; i < principal->name.name_string.len; ++i) 109*ae771770SStanislav Sedov len += strlen(principal->name.name_string.val[i]); 110*ae771770SStanislav Sedov ret = krb5_data_alloc (&salt->saltvalue, len); 111*ae771770SStanislav Sedov if (ret) 112*ae771770SStanislav Sedov return ret; 113*ae771770SStanislav Sedov p = salt->saltvalue.data; 114*ae771770SStanislav Sedov memcpy (p, principal->realm, strlen(principal->realm)); 115*ae771770SStanislav Sedov p += strlen(principal->realm); 116*ae771770SStanislav Sedov for (i = 0; i < principal->name.name_string.len; ++i) { 117*ae771770SStanislav Sedov memcpy (p, 118*ae771770SStanislav Sedov principal->name.name_string.val[i], 119*ae771770SStanislav Sedov strlen(principal->name.name_string.val[i])); 120*ae771770SStanislav Sedov p += strlen(principal->name.name_string.val[i]); 121*ae771770SStanislav Sedov } 122*ae771770SStanislav Sedov return 0; 123*ae771770SStanislav Sedov } 124*ae771770SStanislav Sedov 125*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 126*ae771770SStanislav Sedov krb5_free_salt(krb5_context context, 127*ae771770SStanislav Sedov krb5_salt salt) 128*ae771770SStanislav Sedov { 129*ae771770SStanislav Sedov krb5_data_free(&salt.saltvalue); 130*ae771770SStanislav Sedov return 0; 131*ae771770SStanislav Sedov } 132*ae771770SStanislav Sedov 133*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 134*ae771770SStanislav Sedov krb5_string_to_key_data (krb5_context context, 135*ae771770SStanislav Sedov krb5_enctype enctype, 136*ae771770SStanislav Sedov krb5_data password, 137*ae771770SStanislav Sedov krb5_principal principal, 138*ae771770SStanislav Sedov krb5_keyblock *key) 139*ae771770SStanislav Sedov { 140*ae771770SStanislav Sedov krb5_error_code ret; 141*ae771770SStanislav Sedov krb5_salt salt; 142*ae771770SStanislav Sedov 143*ae771770SStanislav Sedov ret = krb5_get_pw_salt(context, principal, &salt); 144*ae771770SStanislav Sedov if(ret) 145*ae771770SStanislav Sedov return ret; 146*ae771770SStanislav Sedov ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); 147*ae771770SStanislav Sedov krb5_free_salt(context, salt); 148*ae771770SStanislav Sedov return ret; 149*ae771770SStanislav Sedov } 150*ae771770SStanislav Sedov 151*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 152*ae771770SStanislav Sedov krb5_string_to_key (krb5_context context, 153*ae771770SStanislav Sedov krb5_enctype enctype, 154*ae771770SStanislav Sedov const char *password, 155*ae771770SStanislav Sedov krb5_principal principal, 156*ae771770SStanislav Sedov krb5_keyblock *key) 157*ae771770SStanislav Sedov { 158*ae771770SStanislav Sedov krb5_data pw; 159*ae771770SStanislav Sedov pw.data = rk_UNCONST(password); 160*ae771770SStanislav Sedov pw.length = strlen(password); 161*ae771770SStanislav Sedov return krb5_string_to_key_data(context, enctype, pw, principal, key); 162*ae771770SStanislav Sedov } 163*ae771770SStanislav Sedov 164*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 165*ae771770SStanislav Sedov krb5_string_to_key_data_salt (krb5_context context, 166*ae771770SStanislav Sedov krb5_enctype enctype, 167*ae771770SStanislav Sedov krb5_data password, 168*ae771770SStanislav Sedov krb5_salt salt, 169*ae771770SStanislav Sedov krb5_keyblock *key) 170*ae771770SStanislav Sedov { 171*ae771770SStanislav Sedov krb5_data opaque; 172*ae771770SStanislav Sedov krb5_data_zero(&opaque); 173*ae771770SStanislav Sedov return krb5_string_to_key_data_salt_opaque(context, enctype, password, 174*ae771770SStanislav Sedov salt, opaque, key); 175*ae771770SStanislav Sedov } 176*ae771770SStanislav Sedov 177*ae771770SStanislav Sedov /* 178*ae771770SStanislav Sedov * Do a string -> key for encryption type `enctype' operation on 179*ae771770SStanislav Sedov * `password' (with salt `salt' and the enctype specific data string 180*ae771770SStanislav Sedov * `opaque'), returning the resulting key in `key' 181*ae771770SStanislav Sedov */ 182*ae771770SStanislav Sedov 183*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 184*ae771770SStanislav Sedov krb5_string_to_key_data_salt_opaque (krb5_context context, 185*ae771770SStanislav Sedov krb5_enctype enctype, 186*ae771770SStanislav Sedov krb5_data password, 187*ae771770SStanislav Sedov krb5_salt salt, 188*ae771770SStanislav Sedov krb5_data opaque, 189*ae771770SStanislav Sedov krb5_keyblock *key) 190*ae771770SStanislav Sedov { 191*ae771770SStanislav Sedov struct _krb5_encryption_type *et =_krb5_find_enctype(enctype); 192*ae771770SStanislav Sedov struct salt_type *st; 193*ae771770SStanislav Sedov if(et == NULL) { 194*ae771770SStanislav Sedov krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP, 195*ae771770SStanislav Sedov N_("encryption type %d not supported", ""), 196*ae771770SStanislav Sedov enctype); 197*ae771770SStanislav Sedov return KRB5_PROG_ETYPE_NOSUPP; 198*ae771770SStanislav Sedov } 199*ae771770SStanislav Sedov for(st = et->keytype->string_to_key; st && st->type; st++) 200*ae771770SStanislav Sedov if(st->type == salt.salttype) 201*ae771770SStanislav Sedov return (*st->string_to_key)(context, enctype, password, 202*ae771770SStanislav Sedov salt, opaque, key); 203*ae771770SStanislav Sedov krb5_set_error_message(context, HEIM_ERR_SALTTYPE_NOSUPP, 204*ae771770SStanislav Sedov N_("salt type %d not supported", ""), 205*ae771770SStanislav Sedov salt.salttype); 206*ae771770SStanislav Sedov return HEIM_ERR_SALTTYPE_NOSUPP; 207*ae771770SStanislav Sedov } 208*ae771770SStanislav Sedov 209*ae771770SStanislav Sedov /* 210*ae771770SStanislav Sedov * Do a string -> key for encryption type `enctype' operation on the 211*ae771770SStanislav Sedov * string `password' (with salt `salt'), returning the resulting key 212*ae771770SStanislav Sedov * in `key' 213*ae771770SStanislav Sedov */ 214*ae771770SStanislav Sedov 215*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 216*ae771770SStanislav Sedov krb5_string_to_key_salt (krb5_context context, 217*ae771770SStanislav Sedov krb5_enctype enctype, 218*ae771770SStanislav Sedov const char *password, 219*ae771770SStanislav Sedov krb5_salt salt, 220*ae771770SStanislav Sedov krb5_keyblock *key) 221*ae771770SStanislav Sedov { 222*ae771770SStanislav Sedov krb5_data pw; 223*ae771770SStanislav Sedov pw.data = rk_UNCONST(password); 224*ae771770SStanislav Sedov pw.length = strlen(password); 225*ae771770SStanislav Sedov return krb5_string_to_key_data_salt(context, enctype, pw, salt, key); 226*ae771770SStanislav Sedov } 227*ae771770SStanislav Sedov 228*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 229*ae771770SStanislav Sedov krb5_string_to_key_salt_opaque (krb5_context context, 230*ae771770SStanislav Sedov krb5_enctype enctype, 231*ae771770SStanislav Sedov const char *password, 232*ae771770SStanislav Sedov krb5_salt salt, 233*ae771770SStanislav Sedov krb5_data opaque, 234*ae771770SStanislav Sedov krb5_keyblock *key) 235*ae771770SStanislav Sedov { 236*ae771770SStanislav Sedov krb5_data pw; 237*ae771770SStanislav Sedov pw.data = rk_UNCONST(password); 238*ae771770SStanislav Sedov pw.length = strlen(password); 239*ae771770SStanislav Sedov return krb5_string_to_key_data_salt_opaque(context, enctype, 240*ae771770SStanislav Sedov pw, salt, opaque, key); 241*ae771770SStanislav Sedov } 242*ae771770SStanislav Sedov 243*ae771770SStanislav Sedov 244*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 245*ae771770SStanislav Sedov krb5_string_to_key_derived(krb5_context context, 246*ae771770SStanislav Sedov const void *str, 247*ae771770SStanislav Sedov size_t len, 248*ae771770SStanislav Sedov krb5_enctype etype, 249*ae771770SStanislav Sedov krb5_keyblock *key) 250*ae771770SStanislav Sedov { 251*ae771770SStanislav Sedov struct _krb5_encryption_type *et = _krb5_find_enctype(etype); 252*ae771770SStanislav Sedov krb5_error_code ret; 253*ae771770SStanislav Sedov struct _krb5_key_data kd; 254*ae771770SStanislav Sedov size_t keylen; 255*ae771770SStanislav Sedov u_char *tmp; 256*ae771770SStanislav Sedov 257*ae771770SStanislav Sedov if(et == NULL) { 258*ae771770SStanislav Sedov krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP, 259*ae771770SStanislav Sedov N_("encryption type %d not supported", ""), 260*ae771770SStanislav Sedov etype); 261*ae771770SStanislav Sedov return KRB5_PROG_ETYPE_NOSUPP; 262*ae771770SStanislav Sedov } 263*ae771770SStanislav Sedov keylen = et->keytype->bits / 8; 264*ae771770SStanislav Sedov 265*ae771770SStanislav Sedov ALLOC(kd.key, 1); 266*ae771770SStanislav Sedov if(kd.key == NULL) { 267*ae771770SStanislav Sedov krb5_set_error_message (context, ENOMEM, 268*ae771770SStanislav Sedov N_("malloc: out of memory", "")); 269*ae771770SStanislav Sedov return ENOMEM; 270*ae771770SStanislav Sedov } 271*ae771770SStanislav Sedov ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size); 272*ae771770SStanislav Sedov if(ret) { 273*ae771770SStanislav Sedov free(kd.key); 274*ae771770SStanislav Sedov return ret; 275*ae771770SStanislav Sedov } 276*ae771770SStanislav Sedov kd.key->keytype = etype; 277*ae771770SStanislav Sedov tmp = malloc (keylen); 278*ae771770SStanislav Sedov if(tmp == NULL) { 279*ae771770SStanislav Sedov krb5_free_keyblock(context, kd.key); 280*ae771770SStanislav Sedov krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", "")); 281*ae771770SStanislav Sedov return ENOMEM; 282*ae771770SStanislav Sedov } 283*ae771770SStanislav Sedov ret = _krb5_n_fold(str, len, tmp, keylen); 284*ae771770SStanislav Sedov if (ret) { 285*ae771770SStanislav Sedov free(tmp); 286*ae771770SStanislav Sedov krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", "")); 287*ae771770SStanislav Sedov return ret; 288*ae771770SStanislav Sedov } 289*ae771770SStanislav Sedov kd.schedule = NULL; 290*ae771770SStanislav Sedov _krb5_DES3_random_to_key(context, kd.key, tmp, keylen); 291*ae771770SStanislav Sedov memset(tmp, 0, keylen); 292*ae771770SStanislav Sedov free(tmp); 293*ae771770SStanislav Sedov ret = _krb5_derive_key(context, 294*ae771770SStanislav Sedov et, 295*ae771770SStanislav Sedov &kd, 296*ae771770SStanislav Sedov "kerberos", /* XXX well known constant */ 297*ae771770SStanislav Sedov strlen("kerberos")); 298*ae771770SStanislav Sedov if (ret) { 299*ae771770SStanislav Sedov _krb5_free_key_data(context, &kd, et); 300*ae771770SStanislav Sedov return ret; 301*ae771770SStanislav Sedov } 302*ae771770SStanislav Sedov ret = krb5_copy_keyblock_contents(context, kd.key, key); 303*ae771770SStanislav Sedov _krb5_free_key_data(context, &kd, et); 304*ae771770SStanislav Sedov return ret; 305*ae771770SStanislav Sedov } 306