1 /* 2 * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 3 * Use is subject to license terms. 4 */ 5 #pragma ident "%Z%%M% %I% %E% SMI" 6 7 /* 8 * lib/kdb/kdb_cpw.c 9 * 10 * Copyright 1995 by the Massachusetts Institute of Technology. 11 * All Rights Reserved. 12 * 13 * Export of this software from the United States of America may 14 * require a specific license from the United States Government. 15 * It is the responsibility of any person or organization contemplating 16 * export to obtain such a license before exporting. 17 * 18 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and 19 * distribute this software and its documentation for any purpose and 20 * without fee is hereby granted, provided that the above copyright 21 * notice appear in all copies and that both that copyright notice and 22 * this permission notice appear in supporting documentation, and that 23 * the name of M.I.T. not be used in advertising or publicity pertaining 24 * to distribution of the software without specific, written prior 25 * permission. Furthermore if you modify this software you must label 26 * your software as modified software and not distribute it in such a 27 * fashion that it might be confused with the original M.I.T. software. 28 * M.I.T. makes no representations about the suitability of 29 * this software for any purpose. It is provided "as is" without express 30 * or implied warranty. 31 * 32 */ 33 34 /* 35 * Copyright (C) 1998 by the FundsXpress, INC. 36 * 37 * All rights reserved. 38 * 39 * Export of this software from the United States of America may require 40 * a specific license from the United States Government. It is the 41 * responsibility of any person or organization contemplating export to 42 * obtain such a license before exporting. 43 * 44 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and 45 * distribute this software and its documentation for any purpose and 46 * without fee is hereby granted, provided that the above copyright 47 * notice appear in all copies and that both that copyright notice and 48 * this permission notice appear in supporting documentation, and that 49 * the name of FundsXpress. not be used in advertising or publicity pertaining 50 * to distribution of the software without specific, written prior 51 * permission. FundsXpress makes no representations about the suitability of 52 * this software for any purpose. It is provided "as is" without express 53 * or implied warranty. 54 * 55 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR 56 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED 57 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. 58 */ 59 60 #include "k5-int.h" 61 #include "krb5/adm.h" 62 #include <stdio.h> 63 #include <errno.h> 64 65 static int 66 get_key_data_kvno(context, count, data) 67 krb5_context context; 68 int count; 69 krb5_key_data * data; 70 { 71 int i, kvno; 72 /* Find last key version number */ 73 for (kvno = i = 0; i < count; i++) { 74 if (kvno < data[i].key_data_kvno) { 75 kvno = data[i].key_data_kvno; 76 } 77 } 78 return(kvno); 79 } 80 81 static void 82 cleanup_key_data(context, count, data) 83 krb5_context context; 84 int count; 85 krb5_key_data * data; 86 { 87 int i, j; 88 89 /* If data is NULL, count is always 0 */ 90 if (data == NULL) return; 91 92 for (i = 0; i < count; i++) { 93 for (j = 0; j < data[i].key_data_ver; j++) { 94 if (data[i].key_data_length[j]) { 95 free(data[i].key_data_contents[j]); 96 } 97 } 98 } 99 free(data); 100 } 101 102 static krb5_error_code 103 add_key_rnd(context, master_key, ks_tuple, ks_tuple_count, db_entry, kvno) 104 krb5_context context; 105 krb5_keyblock * master_key; 106 krb5_key_salt_tuple * ks_tuple; 107 int ks_tuple_count; 108 krb5_db_entry * db_entry; 109 int kvno; 110 { 111 krb5_principal krbtgt_princ; 112 krb5_keyblock key; 113 krb5_db_entry krbtgt_entry; 114 krb5_boolean more; 115 int max_kvno, one, i, j; 116 krb5_error_code retval; 117 118 retval = krb5_build_principal_ext(context, &krbtgt_princ, 119 db_entry->princ->realm.length, 120 db_entry->princ->realm.data, 121 KRB5_TGS_NAME_SIZE, 122 KRB5_TGS_NAME, 123 db_entry->princ->realm.length, 124 db_entry->princ->realm.data, 125 0); 126 if (retval) 127 return retval; 128 129 /* Get tgt from database */ 130 retval = krb5_db_get_principal(context, krbtgt_princ, &krbtgt_entry, 131 &one, &more); 132 krb5_free_principal(context, krbtgt_princ); /* don't need it anymore */ 133 if (retval) 134 return(retval); 135 if ((one > 1) || (more)) { 136 krb5_db_free_principal(context, &krbtgt_entry, one); 137 return KRB5KDC_ERR_PRINCIPAL_NOT_UNIQUE; 138 } 139 if (!one) 140 return KRB5_KDB_NOENTRY; 141 142 /* Get max kvno */ 143 for (max_kvno = j = 0; j < krbtgt_entry.n_key_data; j++) { 144 if (max_kvno < krbtgt_entry.key_data[j].key_data_kvno) { 145 max_kvno = krbtgt_entry.key_data[j].key_data_kvno; 146 } 147 } 148 149 for (i = 0; i < ks_tuple_count; i++) { 150 krb5_boolean similar; 151 152 similar = 0; 153 154 /* 155 * We could use krb5_keysalt_iterate to replace this loop, or use 156 * krb5_keysalt_is_present for the loop below, but we want to avoid 157 * circular library dependencies. 158 */ 159 for (j = 0; j < i; j++) { 160 if ((retval = krb5_c_enctype_compare(context, 161 ks_tuple[i].ks_enctype, 162 ks_tuple[j].ks_enctype, 163 &similar))) 164 return(retval); 165 166 if (similar) 167 break; 168 } 169 170 if (similar) 171 continue; 172 173 if ((retval = krb5_dbe_create_key_data(context, db_entry))) 174 goto add_key_rnd_err; 175 176 /* there used to be code here to extract the old key, and derive 177 a new key from it. Now that there's a unified prng, that isn't 178 necessary. */ 179 180 /* make new key */ 181 if ((retval = krb5_c_make_random_key(context, ks_tuple[i].ks_enctype, 182 &key))) 183 goto add_key_rnd_err; 184 185 retval = krb5_dbekd_encrypt_key_data(context, master_key, 186 &key, NULL, kvno, 187 &db_entry->key_data[db_entry->n_key_data-1]); 188 189 krb5_free_keyblock_contents(context, &key); 190 191 if (retval) 192 goto add_key_rnd_err; 193 } 194 195 add_key_rnd_err: 196 krb5_db_free_principal(context, &krbtgt_entry, one); 197 198 return(retval); 199 } 200 201 /* 202 * Change random key for a krb5_db_entry 203 * Assumes the max kvno 204 * 205 * As a side effect all old keys are nuked if keepold is false. 206 */ 207 krb5_error_code 208 krb5_dbe_crk(context, master_key, ks_tuple, ks_tuple_count, keepold, db_entry) 209 krb5_context context; 210 krb5_keyblock * master_key; 211 krb5_key_salt_tuple * ks_tuple; 212 int ks_tuple_count; 213 krb5_boolean keepold; 214 krb5_db_entry * db_entry; 215 { 216 int key_data_count; 217 int n_new_key_data; 218 krb5_key_data * key_data; 219 krb5_error_code retval; 220 int kvno; 221 int i; 222 223 /* First save the old keydata */ 224 kvno = get_key_data_kvno(context, db_entry->n_key_data, db_entry->key_data); 225 key_data_count = db_entry->n_key_data; 226 key_data = db_entry->key_data; 227 db_entry->key_data = NULL; 228 db_entry->n_key_data = 0; 229 230 /* increment the kvno */ 231 kvno++; 232 233 retval = add_key_rnd(context, master_key, ks_tuple, 234 ks_tuple_count, db_entry, kvno); 235 if (retval) { 236 cleanup_key_data(context, db_entry->n_key_data, db_entry->key_data); 237 db_entry->n_key_data = key_data_count; 238 db_entry->key_data = key_data; 239 } else if (keepold) { 240 n_new_key_data = db_entry->n_key_data; 241 for (i = 0; i < key_data_count; i++) { 242 retval = krb5_dbe_create_key_data(context, db_entry); 243 if (retval) { 244 cleanup_key_data(context, db_entry->n_key_data, 245 db_entry->key_data); 246 break; 247 } 248 db_entry->key_data[i+n_new_key_data] = key_data[i]; 249 memset(&key_data[i], 0, sizeof(krb5_key_data)); 250 } 251 } else { 252 cleanup_key_data(context, key_data_count, key_data); 253 } 254 return(retval); 255 } 256 257 /* 258 * Add random key for a krb5_db_entry 259 * Assumes the max kvno 260 * 261 * As a side effect all old keys older than the max kvno are nuked. 262 */ 263 krb5_error_code 264 krb5_dbe_ark(context, master_key, ks_tuple, ks_tuple_count, db_entry) 265 krb5_context context; 266 krb5_keyblock * master_key; 267 krb5_key_salt_tuple * ks_tuple; 268 int ks_tuple_count; 269 krb5_db_entry * db_entry; 270 { 271 int key_data_count; 272 krb5_key_data * key_data; 273 krb5_error_code retval; 274 int kvno; 275 int i; 276 277 /* First save the old keydata */ 278 kvno = get_key_data_kvno(context, db_entry->n_key_data, db_entry->key_data); 279 key_data_count = db_entry->n_key_data; 280 key_data = db_entry->key_data; 281 db_entry->key_data = NULL; 282 db_entry->n_key_data = 0; 283 284 /* increment the kvno */ 285 kvno++; 286 287 if ((retval = add_key_rnd(context, master_key, ks_tuple, 288 ks_tuple_count, db_entry, kvno))) { 289 cleanup_key_data(context, db_entry->n_key_data, db_entry->key_data); 290 db_entry->n_key_data = key_data_count; 291 db_entry->key_data = key_data; 292 } else { 293 /* Copy keys with key_data_kvno == kvno - 1 ( = old kvno ) */ 294 for (i = 0; i < key_data_count; i++) { 295 if (key_data[i].key_data_kvno == (kvno - 1)) { 296 if ((retval = krb5_dbe_create_key_data(context, db_entry))) { 297 cleanup_key_data(context, db_entry->n_key_data, 298 db_entry->key_data); 299 break; 300 } 301 /* We should decrypt/re-encrypt the data to use the same mkvno*/ 302 db_entry->key_data[db_entry->n_key_data - 1] = key_data[i]; 303 memset(&key_data[i], 0, sizeof(krb5_key_data)); 304 } 305 } 306 cleanup_key_data(context, key_data_count, key_data); 307 } 308 return(retval); 309 } 310 311 /* 312 * Add key_data for a krb5_db_entry 313 * If passwd is NULL the assumes that the caller wants a random password. 314 */ 315 static krb5_error_code 316 add_key_pwd(context, master_key, ks_tuple, ks_tuple_count, passwd, 317 db_entry, kvno) 318 krb5_context context; 319 krb5_keyblock * master_key; 320 krb5_key_salt_tuple * ks_tuple; 321 int ks_tuple_count; 322 char * passwd; 323 krb5_db_entry * db_entry; 324 int kvno; 325 { 326 krb5_error_code retval; 327 krb5_keysalt key_salt; 328 krb5_keyblock key; 329 krb5_data pwd; 330 int i, j; 331 332 retval = 0; 333 334 for (i = 0; i < ks_tuple_count; i++) { 335 krb5_boolean similar; 336 337 similar = 0; 338 339 /* 340 * We could use krb5_keysalt_iterate to replace this loop, or use 341 * krb5_keysalt_is_present for the loop below, but we want to avoid 342 * circular library dependencies. 343 */ 344 for (j = 0; j < i; j++) { 345 if ((retval = krb5_c_enctype_compare(context, 346 ks_tuple[i].ks_enctype, 347 ks_tuple[j].ks_enctype, 348 &similar))) 349 return(retval); 350 351 if (similar && 352 (ks_tuple[j].ks_salttype == ks_tuple[i].ks_salttype)) 353 break; 354 } 355 356 if (j < i) 357 continue; 358 359 if ((retval = krb5_dbe_create_key_data(context, db_entry))) 360 return(retval); 361 362 /* Convert password string to key using appropriate salt */ 363 switch (key_salt.type = ks_tuple[i].ks_salttype) { 364 case KRB5_KDB_SALTTYPE_ONLYREALM: { 365 krb5_data * saltdata; 366 if ((retval = krb5_copy_data(context, krb5_princ_realm(context, 367 db_entry->princ), &saltdata))) 368 return(retval); 369 370 key_salt.data = *saltdata; 371 krb5_xfree(saltdata); 372 } 373 break; 374 case KRB5_KDB_SALTTYPE_NOREALM: 375 if ((retval=krb5_principal2salt_norealm(context, db_entry->princ, 376 &key_salt.data))) 377 return(retval); 378 break; 379 case KRB5_KDB_SALTTYPE_NORMAL: 380 if ((retval = krb5_principal2salt(context, db_entry->princ, 381 &key_salt.data))) 382 return(retval); 383 break; 384 case KRB5_KDB_SALTTYPE_V4: 385 key_salt.data.length = 0; 386 key_salt.data.data = 0; 387 break; 388 case KRB5_KDB_SALTTYPE_AFS3: { 389 #if 0 390 krb5_data * saltdata; 391 if (retval = krb5_copy_data(context, krb5_princ_realm(context, 392 db_entry->princ), &saltdata)) 393 return(retval); 394 395 key_salt.data = *saltdata; 396 key_salt.data.length = SALT_TYPE_AFS_LENGTH; /*length actually used below...*/ 397 krb5_xfree(saltdata); 398 #else 399 /* Why do we do this? Well, the afs_mit_string_to_key needs to 400 use strlen, and the realm is not NULL terminated.... */ 401 unsigned int slen = 402 (*krb5_princ_realm(context,db_entry->princ)).length; 403 if(!(key_salt.data.data = (char *) malloc(slen+1))) 404 return ENOMEM; 405 key_salt.data.data[slen] = 0; 406 memcpy((char *)key_salt.data.data, 407 (char *)(*krb5_princ_realm(context,db_entry->princ)).data, 408 slen); 409 key_salt.data.length = SALT_TYPE_AFS_LENGTH; /*length actually used below...*/ 410 #endif 411 412 } 413 break; 414 default: 415 return(KRB5_KDB_BAD_SALTTYPE); 416 } 417 418 pwd.data = passwd; 419 pwd.length = strlen(passwd); 420 421 memset(&key, 0, sizeof (krb5_keyblock)); 422 423 if ((retval = krb5_c_string_to_key(context, ks_tuple[i].ks_enctype, 424 &pwd, &key_salt.data, &key))) { 425 if (key_salt.data.data) 426 free(key_salt.data.data); 427 return(retval); 428 } 429 430 if (key_salt.data.length == SALT_TYPE_AFS_LENGTH) 431 key_salt.data.length = 432 krb5_princ_realm(context, db_entry->princ)->length; 433 434 if ((retval = krb5_dbekd_encrypt_key_data(context, master_key, &key, 435 (const krb5_keysalt *)&key_salt, 436 kvno, &db_entry->key_data[db_entry->n_key_data-1]))) { 437 if (key_salt.data.data) 438 free(key_salt.data.data); 439 440 krb5_free_keyblock_contents(context, &key); 441 return(retval); 442 } 443 if (key_salt.data.data) 444 free(key_salt.data.data); 445 446 krb5_free_keyblock_contents(context, &key); 447 } 448 return(retval); 449 } 450 451 /* 452 * Change password for a krb5_db_entry 453 * Assumes the max kvno 454 * 455 * As a side effect all old keys are nuked if keepold is false. 456 */ 457 krb5_error_code 458 krb5_dbe_cpw(context, master_key, ks_tuple, ks_tuple_count, passwd, 459 new_kvno, keepold, db_entry) 460 krb5_context context; 461 krb5_keyblock * master_key; 462 krb5_key_salt_tuple * ks_tuple; 463 int ks_tuple_count; 464 char * passwd; 465 int new_kvno; 466 krb5_boolean keepold; 467 krb5_db_entry * db_entry; 468 { 469 int key_data_count; 470 int n_new_key_data; 471 krb5_key_data * key_data; 472 krb5_error_code retval; 473 int old_kvno; 474 int i; 475 476 /* First save the old keydata */ 477 old_kvno = get_key_data_kvno(context, db_entry->n_key_data, 478 db_entry->key_data); 479 key_data_count = db_entry->n_key_data; 480 key_data = db_entry->key_data; 481 db_entry->key_data = NULL; 482 db_entry->n_key_data = 0; 483 484 /* increment the kvno. if the requested kvno is too small, 485 increment the old kvno */ 486 if (new_kvno < old_kvno+1) 487 new_kvno = old_kvno+1; 488 489 retval = add_key_pwd(context, master_key, ks_tuple, ks_tuple_count, 490 passwd, db_entry, new_kvno); 491 if (retval) { 492 cleanup_key_data(context, db_entry->n_key_data, db_entry->key_data); 493 db_entry->n_key_data = key_data_count; 494 db_entry->key_data = key_data; 495 } else if (keepold) { 496 n_new_key_data = db_entry->n_key_data; 497 for (i = 0; i < key_data_count; i++) { 498 retval = krb5_dbe_create_key_data(context, db_entry); 499 if (retval) { 500 cleanup_key_data(context, db_entry->n_key_data, 501 db_entry->key_data); 502 break; 503 } 504 db_entry->key_data[i+n_new_key_data] = key_data[i]; 505 memset(&key_data[i], 0, sizeof(krb5_key_data)); 506 } 507 } else { 508 cleanup_key_data(context, key_data_count, key_data); 509 } 510 return(retval); 511 } 512 513 /* 514 * Add password for a krb5_db_entry 515 * Assumes the max kvno 516 * 517 * As a side effect all old keys older than the max kvno are nuked. 518 */ 519 krb5_error_code 520 krb5_dbe_apw(context, master_key, ks_tuple, ks_tuple_count, passwd, db_entry) 521 krb5_context context; 522 krb5_keyblock * master_key; 523 krb5_key_salt_tuple * ks_tuple; 524 int ks_tuple_count; 525 char * passwd; 526 krb5_db_entry * db_entry; 527 { 528 int key_data_count; 529 krb5_key_data * key_data; 530 krb5_error_code retval; 531 int old_kvno, new_kvno; 532 int i; 533 534 /* First save the old keydata */ 535 old_kvno = get_key_data_kvno(context, db_entry->n_key_data, 536 db_entry->key_data); 537 key_data_count = db_entry->n_key_data; 538 key_data = db_entry->key_data; 539 db_entry->key_data = NULL; 540 db_entry->n_key_data = 0; 541 542 /* increment the kvno */ 543 new_kvno = old_kvno+1; 544 545 if ((retval = add_key_pwd(context, master_key, ks_tuple, ks_tuple_count, 546 passwd, db_entry, new_kvno))) { 547 cleanup_key_data(context, db_entry->n_key_data, db_entry->key_data); 548 db_entry->n_key_data = key_data_count; 549 db_entry->key_data = key_data; 550 } else { 551 /* Copy keys with key_data_kvno == old_kvno */ 552 for (i = 0; i < key_data_count; i++) { 553 if (key_data[i].key_data_kvno == old_kvno) { 554 if ((retval = krb5_dbe_create_key_data(context, db_entry))) { 555 cleanup_key_data(context, db_entry->n_key_data, 556 db_entry->key_data); 557 break; 558 } 559 /* We should decrypt/re-encrypt the data to use the same mkvno*/ 560 db_entry->key_data[db_entry->n_key_data - 1] = key_data[i]; 561 memset(&key_data[i], 0, sizeof(krb5_key_data)); 562 } 563 } 564 cleanup_key_data(context, key_data_count, key_data); 565 } 566 return(retval); 567 } 568