xref: /freebsd/crypto/heimdal/lib/krb5/salt.c (revision ae77177087c655fc883075af4f425b37e032cd05)
1*ae771770SStanislav Sedov /*
2*ae771770SStanislav Sedov  * Copyright (c) 1997 - 2008 Kungliga Tekniska Högskolan
3*ae771770SStanislav Sedov  * (Royal Institute of Technology, Stockholm, Sweden).
4*ae771770SStanislav Sedov  * All rights reserved.
5*ae771770SStanislav Sedov  *
6*ae771770SStanislav Sedov  * Redistribution and use in source and binary forms, with or without
7*ae771770SStanislav Sedov  * modification, are permitted provided that the following conditions
8*ae771770SStanislav Sedov  * are met:
9*ae771770SStanislav Sedov  *
10*ae771770SStanislav Sedov  * 1. Redistributions of source code must retain the above copyright
11*ae771770SStanislav Sedov  *    notice, this list of conditions and the following disclaimer.
12*ae771770SStanislav Sedov  *
13*ae771770SStanislav Sedov  * 2. Redistributions in binary form must reproduce the above copyright
14*ae771770SStanislav Sedov  *    notice, this list of conditions and the following disclaimer in the
15*ae771770SStanislav Sedov  *    documentation and/or other materials provided with the distribution.
16*ae771770SStanislav Sedov  *
17*ae771770SStanislav Sedov  * 3. Neither the name of the Institute nor the names of its contributors
18*ae771770SStanislav Sedov  *    may be used to endorse or promote products derived from this software
19*ae771770SStanislav Sedov  *    without specific prior written permission.
20*ae771770SStanislav Sedov  *
21*ae771770SStanislav Sedov  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22*ae771770SStanislav Sedov  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23*ae771770SStanislav Sedov  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24*ae771770SStanislav Sedov  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25*ae771770SStanislav Sedov  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26*ae771770SStanislav Sedov  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27*ae771770SStanislav Sedov  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28*ae771770SStanislav Sedov  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29*ae771770SStanislav Sedov  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30*ae771770SStanislav Sedov  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31*ae771770SStanislav Sedov  * SUCH DAMAGE.
32*ae771770SStanislav Sedov  */
33*ae771770SStanislav Sedov 
34*ae771770SStanislav Sedov #include "krb5_locl.h"
35*ae771770SStanislav Sedov 
36*ae771770SStanislav Sedov /* coverity[+alloc : arg-*3] */
37*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
38*ae771770SStanislav Sedov krb5_salttype_to_string (krb5_context context,
39*ae771770SStanislav Sedov 			 krb5_enctype etype,
40*ae771770SStanislav Sedov 			 krb5_salttype stype,
41*ae771770SStanislav Sedov 			 char **string)
42*ae771770SStanislav Sedov {
43*ae771770SStanislav Sedov     struct _krb5_encryption_type *e;
44*ae771770SStanislav Sedov     struct salt_type *st;
45*ae771770SStanislav Sedov 
46*ae771770SStanislav Sedov     e = _krb5_find_enctype (etype);
47*ae771770SStanislav Sedov     if (e == NULL) {
48*ae771770SStanislav Sedov 	krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
49*ae771770SStanislav Sedov 			       "encryption type %d not supported",
50*ae771770SStanislav Sedov 			       etype);
51*ae771770SStanislav Sedov 	return KRB5_PROG_ETYPE_NOSUPP;
52*ae771770SStanislav Sedov     }
53*ae771770SStanislav Sedov     for (st = e->keytype->string_to_key; st && st->type; st++) {
54*ae771770SStanislav Sedov 	if (st->type == stype) {
55*ae771770SStanislav Sedov 	    *string = strdup (st->name);
56*ae771770SStanislav Sedov 	    if (*string == NULL) {
57*ae771770SStanislav Sedov 		krb5_set_error_message (context, ENOMEM,
58*ae771770SStanislav Sedov 					N_("malloc: out of memory", ""));
59*ae771770SStanislav Sedov 		return ENOMEM;
60*ae771770SStanislav Sedov 	    }
61*ae771770SStanislav Sedov 	    return 0;
62*ae771770SStanislav Sedov 	}
63*ae771770SStanislav Sedov     }
64*ae771770SStanislav Sedov     krb5_set_error_message (context, HEIM_ERR_SALTTYPE_NOSUPP,
65*ae771770SStanislav Sedov 			    "salttype %d not supported", stype);
66*ae771770SStanislav Sedov     return HEIM_ERR_SALTTYPE_NOSUPP;
67*ae771770SStanislav Sedov }
68*ae771770SStanislav Sedov 
69*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
70*ae771770SStanislav Sedov krb5_string_to_salttype (krb5_context context,
71*ae771770SStanislav Sedov 			 krb5_enctype etype,
72*ae771770SStanislav Sedov 			 const char *string,
73*ae771770SStanislav Sedov 			 krb5_salttype *salttype)
74*ae771770SStanislav Sedov {
75*ae771770SStanislav Sedov     struct _krb5_encryption_type *e;
76*ae771770SStanislav Sedov     struct salt_type *st;
77*ae771770SStanislav Sedov 
78*ae771770SStanislav Sedov     e = _krb5_find_enctype (etype);
79*ae771770SStanislav Sedov     if (e == NULL) {
80*ae771770SStanislav Sedov 	krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
81*ae771770SStanislav Sedov 			       N_("encryption type %d not supported", ""),
82*ae771770SStanislav Sedov 			       etype);
83*ae771770SStanislav Sedov 	return KRB5_PROG_ETYPE_NOSUPP;
84*ae771770SStanislav Sedov     }
85*ae771770SStanislav Sedov     for (st = e->keytype->string_to_key; st && st->type; st++) {
86*ae771770SStanislav Sedov 	if (strcasecmp (st->name, string) == 0) {
87*ae771770SStanislav Sedov 	    *salttype = st->type;
88*ae771770SStanislav Sedov 	    return 0;
89*ae771770SStanislav Sedov 	}
90*ae771770SStanislav Sedov     }
91*ae771770SStanislav Sedov     krb5_set_error_message(context, HEIM_ERR_SALTTYPE_NOSUPP,
92*ae771770SStanislav Sedov 			   N_("salttype %s not supported", ""), string);
93*ae771770SStanislav Sedov     return HEIM_ERR_SALTTYPE_NOSUPP;
94*ae771770SStanislav Sedov }
95*ae771770SStanislav Sedov 
96*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
97*ae771770SStanislav Sedov krb5_get_pw_salt(krb5_context context,
98*ae771770SStanislav Sedov 		 krb5_const_principal principal,
99*ae771770SStanislav Sedov 		 krb5_salt *salt)
100*ae771770SStanislav Sedov {
101*ae771770SStanislav Sedov     size_t len;
102*ae771770SStanislav Sedov     size_t i;
103*ae771770SStanislav Sedov     krb5_error_code ret;
104*ae771770SStanislav Sedov     char *p;
105*ae771770SStanislav Sedov 
106*ae771770SStanislav Sedov     salt->salttype = KRB5_PW_SALT;
107*ae771770SStanislav Sedov     len = strlen(principal->realm);
108*ae771770SStanislav Sedov     for (i = 0; i < principal->name.name_string.len; ++i)
109*ae771770SStanislav Sedov 	len += strlen(principal->name.name_string.val[i]);
110*ae771770SStanislav Sedov     ret = krb5_data_alloc (&salt->saltvalue, len);
111*ae771770SStanislav Sedov     if (ret)
112*ae771770SStanislav Sedov 	return ret;
113*ae771770SStanislav Sedov     p = salt->saltvalue.data;
114*ae771770SStanislav Sedov     memcpy (p, principal->realm, strlen(principal->realm));
115*ae771770SStanislav Sedov     p += strlen(principal->realm);
116*ae771770SStanislav Sedov     for (i = 0; i < principal->name.name_string.len; ++i) {
117*ae771770SStanislav Sedov 	memcpy (p,
118*ae771770SStanislav Sedov 		principal->name.name_string.val[i],
119*ae771770SStanislav Sedov 		strlen(principal->name.name_string.val[i]));
120*ae771770SStanislav Sedov 	p += strlen(principal->name.name_string.val[i]);
121*ae771770SStanislav Sedov     }
122*ae771770SStanislav Sedov     return 0;
123*ae771770SStanislav Sedov }
124*ae771770SStanislav Sedov 
125*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
126*ae771770SStanislav Sedov krb5_free_salt(krb5_context context,
127*ae771770SStanislav Sedov 	       krb5_salt salt)
128*ae771770SStanislav Sedov {
129*ae771770SStanislav Sedov     krb5_data_free(&salt.saltvalue);
130*ae771770SStanislav Sedov     return 0;
131*ae771770SStanislav Sedov }
132*ae771770SStanislav Sedov 
133*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
134*ae771770SStanislav Sedov krb5_string_to_key_data (krb5_context context,
135*ae771770SStanislav Sedov 			 krb5_enctype enctype,
136*ae771770SStanislav Sedov 			 krb5_data password,
137*ae771770SStanislav Sedov 			 krb5_principal principal,
138*ae771770SStanislav Sedov 			 krb5_keyblock *key)
139*ae771770SStanislav Sedov {
140*ae771770SStanislav Sedov     krb5_error_code ret;
141*ae771770SStanislav Sedov     krb5_salt salt;
142*ae771770SStanislav Sedov 
143*ae771770SStanislav Sedov     ret = krb5_get_pw_salt(context, principal, &salt);
144*ae771770SStanislav Sedov     if(ret)
145*ae771770SStanislav Sedov 	return ret;
146*ae771770SStanislav Sedov     ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key);
147*ae771770SStanislav Sedov     krb5_free_salt(context, salt);
148*ae771770SStanislav Sedov     return ret;
149*ae771770SStanislav Sedov }
150*ae771770SStanislav Sedov 
151*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
152*ae771770SStanislav Sedov krb5_string_to_key (krb5_context context,
153*ae771770SStanislav Sedov 		    krb5_enctype enctype,
154*ae771770SStanislav Sedov 		    const char *password,
155*ae771770SStanislav Sedov 		    krb5_principal principal,
156*ae771770SStanislav Sedov 		    krb5_keyblock *key)
157*ae771770SStanislav Sedov {
158*ae771770SStanislav Sedov     krb5_data pw;
159*ae771770SStanislav Sedov     pw.data = rk_UNCONST(password);
160*ae771770SStanislav Sedov     pw.length = strlen(password);
161*ae771770SStanislav Sedov     return krb5_string_to_key_data(context, enctype, pw, principal, key);
162*ae771770SStanislav Sedov }
163*ae771770SStanislav Sedov 
164*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
165*ae771770SStanislav Sedov krb5_string_to_key_data_salt (krb5_context context,
166*ae771770SStanislav Sedov 			      krb5_enctype enctype,
167*ae771770SStanislav Sedov 			      krb5_data password,
168*ae771770SStanislav Sedov 			      krb5_salt salt,
169*ae771770SStanislav Sedov 			      krb5_keyblock *key)
170*ae771770SStanislav Sedov {
171*ae771770SStanislav Sedov     krb5_data opaque;
172*ae771770SStanislav Sedov     krb5_data_zero(&opaque);
173*ae771770SStanislav Sedov     return krb5_string_to_key_data_salt_opaque(context, enctype, password,
174*ae771770SStanislav Sedov 					       salt, opaque, key);
175*ae771770SStanislav Sedov }
176*ae771770SStanislav Sedov 
177*ae771770SStanislav Sedov /*
178*ae771770SStanislav Sedov  * Do a string -> key for encryption type `enctype' operation on
179*ae771770SStanislav Sedov  * `password' (with salt `salt' and the enctype specific data string
180*ae771770SStanislav Sedov  * `opaque'), returning the resulting key in `key'
181*ae771770SStanislav Sedov  */
182*ae771770SStanislav Sedov 
183*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
184*ae771770SStanislav Sedov krb5_string_to_key_data_salt_opaque (krb5_context context,
185*ae771770SStanislav Sedov 				     krb5_enctype enctype,
186*ae771770SStanislav Sedov 				     krb5_data password,
187*ae771770SStanislav Sedov 				     krb5_salt salt,
188*ae771770SStanislav Sedov 				     krb5_data opaque,
189*ae771770SStanislav Sedov 				     krb5_keyblock *key)
190*ae771770SStanislav Sedov {
191*ae771770SStanislav Sedov     struct _krb5_encryption_type *et =_krb5_find_enctype(enctype);
192*ae771770SStanislav Sedov     struct salt_type *st;
193*ae771770SStanislav Sedov     if(et == NULL) {
194*ae771770SStanislav Sedov 	krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
195*ae771770SStanislav Sedov 			       N_("encryption type %d not supported", ""),
196*ae771770SStanislav Sedov 			       enctype);
197*ae771770SStanislav Sedov 	return KRB5_PROG_ETYPE_NOSUPP;
198*ae771770SStanislav Sedov     }
199*ae771770SStanislav Sedov     for(st = et->keytype->string_to_key; st && st->type; st++)
200*ae771770SStanislav Sedov 	if(st->type == salt.salttype)
201*ae771770SStanislav Sedov 	    return (*st->string_to_key)(context, enctype, password,
202*ae771770SStanislav Sedov 					salt, opaque, key);
203*ae771770SStanislav Sedov     krb5_set_error_message(context, HEIM_ERR_SALTTYPE_NOSUPP,
204*ae771770SStanislav Sedov 			   N_("salt type %d not supported", ""),
205*ae771770SStanislav Sedov 			   salt.salttype);
206*ae771770SStanislav Sedov     return HEIM_ERR_SALTTYPE_NOSUPP;
207*ae771770SStanislav Sedov }
208*ae771770SStanislav Sedov 
209*ae771770SStanislav Sedov /*
210*ae771770SStanislav Sedov  * Do a string -> key for encryption type `enctype' operation on the
211*ae771770SStanislav Sedov  * string `password' (with salt `salt'), returning the resulting key
212*ae771770SStanislav Sedov  * in `key'
213*ae771770SStanislav Sedov  */
214*ae771770SStanislav Sedov 
215*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
216*ae771770SStanislav Sedov krb5_string_to_key_salt (krb5_context context,
217*ae771770SStanislav Sedov 			 krb5_enctype enctype,
218*ae771770SStanislav Sedov 			 const char *password,
219*ae771770SStanislav Sedov 			 krb5_salt salt,
220*ae771770SStanislav Sedov 			 krb5_keyblock *key)
221*ae771770SStanislav Sedov {
222*ae771770SStanislav Sedov     krb5_data pw;
223*ae771770SStanislav Sedov     pw.data = rk_UNCONST(password);
224*ae771770SStanislav Sedov     pw.length = strlen(password);
225*ae771770SStanislav Sedov     return krb5_string_to_key_data_salt(context, enctype, pw, salt, key);
226*ae771770SStanislav Sedov }
227*ae771770SStanislav Sedov 
228*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
229*ae771770SStanislav Sedov krb5_string_to_key_salt_opaque (krb5_context context,
230*ae771770SStanislav Sedov 				krb5_enctype enctype,
231*ae771770SStanislav Sedov 				const char *password,
232*ae771770SStanislav Sedov 				krb5_salt salt,
233*ae771770SStanislav Sedov 				krb5_data opaque,
234*ae771770SStanislav Sedov 				krb5_keyblock *key)
235*ae771770SStanislav Sedov {
236*ae771770SStanislav Sedov     krb5_data pw;
237*ae771770SStanislav Sedov     pw.data = rk_UNCONST(password);
238*ae771770SStanislav Sedov     pw.length = strlen(password);
239*ae771770SStanislav Sedov     return krb5_string_to_key_data_salt_opaque(context, enctype,
240*ae771770SStanislav Sedov 					       pw, salt, opaque, key);
241*ae771770SStanislav Sedov }
242*ae771770SStanislav Sedov 
243*ae771770SStanislav Sedov 
244*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
245*ae771770SStanislav Sedov krb5_string_to_key_derived(krb5_context context,
246*ae771770SStanislav Sedov 			   const void *str,
247*ae771770SStanislav Sedov 			   size_t len,
248*ae771770SStanislav Sedov 			   krb5_enctype etype,
249*ae771770SStanislav Sedov 			   krb5_keyblock *key)
250*ae771770SStanislav Sedov {
251*ae771770SStanislav Sedov     struct _krb5_encryption_type *et = _krb5_find_enctype(etype);
252*ae771770SStanislav Sedov     krb5_error_code ret;
253*ae771770SStanislav Sedov     struct _krb5_key_data kd;
254*ae771770SStanislav Sedov     size_t keylen;
255*ae771770SStanislav Sedov     u_char *tmp;
256*ae771770SStanislav Sedov 
257*ae771770SStanislav Sedov     if(et == NULL) {
258*ae771770SStanislav Sedov 	krb5_set_error_message (context, KRB5_PROG_ETYPE_NOSUPP,
259*ae771770SStanislav Sedov 				N_("encryption type %d not supported", ""),
260*ae771770SStanislav Sedov 				etype);
261*ae771770SStanislav Sedov 	return KRB5_PROG_ETYPE_NOSUPP;
262*ae771770SStanislav Sedov     }
263*ae771770SStanislav Sedov     keylen = et->keytype->bits / 8;
264*ae771770SStanislav Sedov 
265*ae771770SStanislav Sedov     ALLOC(kd.key, 1);
266*ae771770SStanislav Sedov     if(kd.key == NULL) {
267*ae771770SStanislav Sedov 	krb5_set_error_message (context, ENOMEM,
268*ae771770SStanislav Sedov 				N_("malloc: out of memory", ""));
269*ae771770SStanislav Sedov 	return ENOMEM;
270*ae771770SStanislav Sedov     }
271*ae771770SStanislav Sedov     ret = krb5_data_alloc(&kd.key->keyvalue, et->keytype->size);
272*ae771770SStanislav Sedov     if(ret) {
273*ae771770SStanislav Sedov 	free(kd.key);
274*ae771770SStanislav Sedov 	return ret;
275*ae771770SStanislav Sedov     }
276*ae771770SStanislav Sedov     kd.key->keytype = etype;
277*ae771770SStanislav Sedov     tmp = malloc (keylen);
278*ae771770SStanislav Sedov     if(tmp == NULL) {
279*ae771770SStanislav Sedov 	krb5_free_keyblock(context, kd.key);
280*ae771770SStanislav Sedov 	krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", ""));
281*ae771770SStanislav Sedov 	return ENOMEM;
282*ae771770SStanislav Sedov     }
283*ae771770SStanislav Sedov     ret = _krb5_n_fold(str, len, tmp, keylen);
284*ae771770SStanislav Sedov     if (ret) {
285*ae771770SStanislav Sedov 	free(tmp);
286*ae771770SStanislav Sedov 	krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", ""));
287*ae771770SStanislav Sedov 	return ret;
288*ae771770SStanislav Sedov     }
289*ae771770SStanislav Sedov     kd.schedule = NULL;
290*ae771770SStanislav Sedov     _krb5_DES3_random_to_key(context, kd.key, tmp, keylen);
291*ae771770SStanislav Sedov     memset(tmp, 0, keylen);
292*ae771770SStanislav Sedov     free(tmp);
293*ae771770SStanislav Sedov     ret = _krb5_derive_key(context,
294*ae771770SStanislav Sedov 			   et,
295*ae771770SStanislav Sedov 			   &kd,
296*ae771770SStanislav Sedov 			   "kerberos", /* XXX well known constant */
297*ae771770SStanislav Sedov 			   strlen("kerberos"));
298*ae771770SStanislav Sedov     if (ret) {
299*ae771770SStanislav Sedov 	_krb5_free_key_data(context, &kd, et);
300*ae771770SStanislav Sedov 	return ret;
301*ae771770SStanislav Sedov     }
302*ae771770SStanislav Sedov     ret = krb5_copy_keyblock_contents(context, kd.key, key);
303*ae771770SStanislav Sedov     _krb5_free_key_data(context, &kd, et);
304*ae771770SStanislav Sedov     return ret;
305*ae771770SStanislav Sedov }
306