xref: /minix3/crypto/external/bsd/heimdal/dist/lib/hdb/mkey.c (revision 0a6a1f1d05b60e214de2f05a7310ddd1f0e590e7)
1*0a6a1f1dSLionel Sambuc /*	$NetBSD: mkey.c,v 1.1.1.2 2014/04/24 12:45:28 pettai Exp $	*/
2ebfedea0SLionel Sambuc 
3ebfedea0SLionel Sambuc /*
4ebfedea0SLionel Sambuc  * Copyright (c) 2000 - 2004 Kungliga Tekniska Högskolan
5ebfedea0SLionel Sambuc  * (Royal Institute of Technology, Stockholm, Sweden).
6ebfedea0SLionel Sambuc  * All rights reserved.
7ebfedea0SLionel Sambuc  *
8ebfedea0SLionel Sambuc  * Redistribution and use in source and binary forms, with or without
9ebfedea0SLionel Sambuc  * modification, are permitted provided that the following conditions
10ebfedea0SLionel Sambuc  * are met:
11ebfedea0SLionel Sambuc  *
12ebfedea0SLionel Sambuc  * 1. Redistributions of source code must retain the above copyright
13ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer.
14ebfedea0SLionel Sambuc  *
15ebfedea0SLionel Sambuc  * 2. Redistributions in binary form must reproduce the above copyright
16ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer in the
17ebfedea0SLionel Sambuc  *    documentation and/or other materials provided with the distribution.
18ebfedea0SLionel Sambuc  *
19ebfedea0SLionel Sambuc  * 3. Neither the name of the Institute nor the names of its contributors
20ebfedea0SLionel Sambuc  *    may be used to endorse or promote products derived from this software
21ebfedea0SLionel Sambuc  *    without specific prior written permission.
22ebfedea0SLionel Sambuc  *
23ebfedea0SLionel Sambuc  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ebfedea0SLionel Sambuc  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ebfedea0SLionel Sambuc  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ebfedea0SLionel Sambuc  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ebfedea0SLionel Sambuc  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ebfedea0SLionel Sambuc  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ebfedea0SLionel Sambuc  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ebfedea0SLionel Sambuc  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ebfedea0SLionel Sambuc  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ebfedea0SLionel Sambuc  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ebfedea0SLionel Sambuc  * SUCH DAMAGE.
34ebfedea0SLionel Sambuc  */
35ebfedea0SLionel Sambuc 
36ebfedea0SLionel Sambuc #include "hdb_locl.h"
37ebfedea0SLionel Sambuc #ifndef O_BINARY
38ebfedea0SLionel Sambuc #define O_BINARY 0
39ebfedea0SLionel Sambuc #endif
40ebfedea0SLionel Sambuc 
41ebfedea0SLionel Sambuc struct hdb_master_key_data {
42ebfedea0SLionel Sambuc     krb5_keytab_entry keytab;
43ebfedea0SLionel Sambuc     krb5_crypto crypto;
44ebfedea0SLionel Sambuc     struct hdb_master_key_data *next;
45ebfedea0SLionel Sambuc };
46ebfedea0SLionel Sambuc 
47ebfedea0SLionel Sambuc void
hdb_free_master_key(krb5_context context,hdb_master_key mkey)48ebfedea0SLionel Sambuc hdb_free_master_key(krb5_context context, hdb_master_key mkey)
49ebfedea0SLionel Sambuc {
50ebfedea0SLionel Sambuc     struct hdb_master_key_data *ptr;
51ebfedea0SLionel Sambuc     while(mkey) {
52ebfedea0SLionel Sambuc 	krb5_kt_free_entry(context, &mkey->keytab);
53ebfedea0SLionel Sambuc 	if (mkey->crypto)
54ebfedea0SLionel Sambuc 	    krb5_crypto_destroy(context, mkey->crypto);
55ebfedea0SLionel Sambuc 	ptr = mkey;
56ebfedea0SLionel Sambuc 	mkey = mkey->next;
57ebfedea0SLionel Sambuc 	free(ptr);
58ebfedea0SLionel Sambuc     }
59ebfedea0SLionel Sambuc }
60ebfedea0SLionel Sambuc 
61ebfedea0SLionel Sambuc krb5_error_code
hdb_process_master_key(krb5_context context,int kvno,krb5_keyblock * key,krb5_enctype etype,hdb_master_key * mkey)62ebfedea0SLionel Sambuc hdb_process_master_key(krb5_context context,
63ebfedea0SLionel Sambuc 		       int kvno, krb5_keyblock *key, krb5_enctype etype,
64ebfedea0SLionel Sambuc 		       hdb_master_key *mkey)
65ebfedea0SLionel Sambuc {
66ebfedea0SLionel Sambuc     krb5_error_code ret;
67ebfedea0SLionel Sambuc 
68ebfedea0SLionel Sambuc     *mkey = calloc(1, sizeof(**mkey));
69ebfedea0SLionel Sambuc     if(*mkey == NULL) {
70ebfedea0SLionel Sambuc 	krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
71ebfedea0SLionel Sambuc 	return ENOMEM;
72ebfedea0SLionel Sambuc     }
73ebfedea0SLionel Sambuc     (*mkey)->keytab.vno = kvno;
74ebfedea0SLionel Sambuc     ret = krb5_parse_name(context, "K/M", &(*mkey)->keytab.principal);
75ebfedea0SLionel Sambuc     if(ret)
76ebfedea0SLionel Sambuc 	goto fail;
77ebfedea0SLionel Sambuc     ret = krb5_copy_keyblock_contents(context, key, &(*mkey)->keytab.keyblock);
78ebfedea0SLionel Sambuc     if(ret)
79ebfedea0SLionel Sambuc 	goto fail;
80ebfedea0SLionel Sambuc     if(etype != 0)
81ebfedea0SLionel Sambuc 	(*mkey)->keytab.keyblock.keytype = etype;
82ebfedea0SLionel Sambuc     (*mkey)->keytab.timestamp = time(NULL);
83ebfedea0SLionel Sambuc     ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto);
84ebfedea0SLionel Sambuc     if(ret)
85ebfedea0SLionel Sambuc 	goto fail;
86ebfedea0SLionel Sambuc     return 0;
87ebfedea0SLionel Sambuc  fail:
88ebfedea0SLionel Sambuc     hdb_free_master_key(context, *mkey);
89ebfedea0SLionel Sambuc     *mkey = NULL;
90ebfedea0SLionel Sambuc     return ret;
91ebfedea0SLionel Sambuc }
92ebfedea0SLionel Sambuc 
93ebfedea0SLionel Sambuc krb5_error_code
hdb_add_master_key(krb5_context context,krb5_keyblock * key,hdb_master_key * inout)94ebfedea0SLionel Sambuc hdb_add_master_key(krb5_context context, krb5_keyblock *key,
95ebfedea0SLionel Sambuc 		   hdb_master_key *inout)
96ebfedea0SLionel Sambuc {
97ebfedea0SLionel Sambuc     int vno = 0;
98ebfedea0SLionel Sambuc     hdb_master_key p;
99ebfedea0SLionel Sambuc     krb5_error_code ret;
100ebfedea0SLionel Sambuc 
101ebfedea0SLionel Sambuc     for(p = *inout; p; p = p->next)
102ebfedea0SLionel Sambuc 	vno = max(vno, p->keytab.vno);
103ebfedea0SLionel Sambuc     vno++;
104ebfedea0SLionel Sambuc     ret = hdb_process_master_key(context, vno, key, 0, &p);
105ebfedea0SLionel Sambuc     if(ret)
106ebfedea0SLionel Sambuc 	return ret;
107ebfedea0SLionel Sambuc     p->next = *inout;
108ebfedea0SLionel Sambuc     *inout = p;
109ebfedea0SLionel Sambuc     return 0;
110ebfedea0SLionel Sambuc }
111ebfedea0SLionel Sambuc 
112ebfedea0SLionel Sambuc static krb5_error_code
read_master_keytab(krb5_context context,const char * filename,hdb_master_key * mkey)113ebfedea0SLionel Sambuc read_master_keytab(krb5_context context, const char *filename,
114ebfedea0SLionel Sambuc 		   hdb_master_key *mkey)
115ebfedea0SLionel Sambuc {
116ebfedea0SLionel Sambuc     krb5_error_code ret;
117ebfedea0SLionel Sambuc     krb5_keytab id;
118ebfedea0SLionel Sambuc     krb5_kt_cursor cursor;
119ebfedea0SLionel Sambuc     krb5_keytab_entry entry;
120ebfedea0SLionel Sambuc     hdb_master_key p;
121ebfedea0SLionel Sambuc 
122ebfedea0SLionel Sambuc     ret = krb5_kt_resolve(context, filename, &id);
123ebfedea0SLionel Sambuc     if(ret)
124ebfedea0SLionel Sambuc 	return ret;
125ebfedea0SLionel Sambuc 
126ebfedea0SLionel Sambuc     ret = krb5_kt_start_seq_get(context, id, &cursor);
127ebfedea0SLionel Sambuc     if(ret)
128ebfedea0SLionel Sambuc 	goto out;
129ebfedea0SLionel Sambuc     *mkey = NULL;
130ebfedea0SLionel Sambuc     while(krb5_kt_next_entry(context, id, &entry, &cursor) == 0) {
131ebfedea0SLionel Sambuc 	p = calloc(1, sizeof(*p));
132ebfedea0SLionel Sambuc 	if(p == NULL) {
133ebfedea0SLionel Sambuc 	    krb5_kt_end_seq_get(context, id, &cursor);
134ebfedea0SLionel Sambuc 	    ret = ENOMEM;
135ebfedea0SLionel Sambuc 	    goto out;
136ebfedea0SLionel Sambuc 	}
137ebfedea0SLionel Sambuc 	p->keytab = entry;
138ebfedea0SLionel Sambuc 	ret = krb5_crypto_init(context, &p->keytab.keyblock, 0, &p->crypto);
139ebfedea0SLionel Sambuc 	p->next = *mkey;
140ebfedea0SLionel Sambuc 	*mkey = p;
141ebfedea0SLionel Sambuc     }
142ebfedea0SLionel Sambuc     krb5_kt_end_seq_get(context, id, &cursor);
143ebfedea0SLionel Sambuc   out:
144ebfedea0SLionel Sambuc     krb5_kt_close(context, id);
145ebfedea0SLionel Sambuc     return ret;
146ebfedea0SLionel Sambuc }
147ebfedea0SLionel Sambuc 
148ebfedea0SLionel Sambuc /* read a MIT master keyfile */
149ebfedea0SLionel Sambuc static krb5_error_code
read_master_mit(krb5_context context,const char * filename,int byteorder,hdb_master_key * mkey)150ebfedea0SLionel Sambuc read_master_mit(krb5_context context, const char *filename,
151ebfedea0SLionel Sambuc 		int byteorder, hdb_master_key *mkey)
152ebfedea0SLionel Sambuc {
153ebfedea0SLionel Sambuc     int fd;
154ebfedea0SLionel Sambuc     krb5_error_code ret;
155ebfedea0SLionel Sambuc     krb5_storage *sp;
156ebfedea0SLionel Sambuc     int16_t enctype;
157ebfedea0SLionel Sambuc     krb5_keyblock key;
158ebfedea0SLionel Sambuc 
159ebfedea0SLionel Sambuc     fd = open(filename, O_RDONLY | O_BINARY);
160ebfedea0SLionel Sambuc     if(fd < 0) {
161ebfedea0SLionel Sambuc 	int save_errno = errno;
162ebfedea0SLionel Sambuc 	krb5_set_error_message(context, save_errno, "failed to open %s: %s",
163ebfedea0SLionel Sambuc 			       filename, strerror(save_errno));
164ebfedea0SLionel Sambuc 	return save_errno;
165ebfedea0SLionel Sambuc     }
166ebfedea0SLionel Sambuc     sp = krb5_storage_from_fd(fd);
167ebfedea0SLionel Sambuc     if(sp == NULL) {
168ebfedea0SLionel Sambuc 	close(fd);
169ebfedea0SLionel Sambuc 	return errno;
170ebfedea0SLionel Sambuc     }
171ebfedea0SLionel Sambuc     krb5_storage_set_flags(sp, byteorder);
172ebfedea0SLionel Sambuc     /* could possibly use ret_keyblock here, but do it with more
173ebfedea0SLionel Sambuc        checks for now */
174ebfedea0SLionel Sambuc     {
175ebfedea0SLionel Sambuc 	ret = krb5_ret_int16(sp, &enctype);
176ebfedea0SLionel Sambuc 	if (ret)
177ebfedea0SLionel Sambuc 	    goto out;
178ebfedea0SLionel Sambuc 	ret = krb5_enctype_valid(context, enctype);
179ebfedea0SLionel Sambuc 	if (ret)
180ebfedea0SLionel Sambuc 	   goto out;
181ebfedea0SLionel Sambuc 	key.keytype = enctype;
182ebfedea0SLionel Sambuc 	ret = krb5_ret_data(sp, &key.keyvalue);
183ebfedea0SLionel Sambuc 	if(ret)
184ebfedea0SLionel Sambuc 	    goto out;
185ebfedea0SLionel Sambuc     }
186ebfedea0SLionel Sambuc     ret = hdb_process_master_key(context, 1, &key, 0, mkey);
187ebfedea0SLionel Sambuc     krb5_free_keyblock_contents(context, &key);
188ebfedea0SLionel Sambuc   out:
189ebfedea0SLionel Sambuc     krb5_storage_free(sp);
190ebfedea0SLionel Sambuc     close(fd);
191ebfedea0SLionel Sambuc     return ret;
192ebfedea0SLionel Sambuc }
193ebfedea0SLionel Sambuc 
194ebfedea0SLionel Sambuc /* read an old master key file */
195ebfedea0SLionel Sambuc static krb5_error_code
read_master_encryptionkey(krb5_context context,const char * filename,hdb_master_key * mkey)196ebfedea0SLionel Sambuc read_master_encryptionkey(krb5_context context, const char *filename,
197ebfedea0SLionel Sambuc 			  hdb_master_key *mkey)
198ebfedea0SLionel Sambuc {
199ebfedea0SLionel Sambuc     int fd;
200ebfedea0SLionel Sambuc     krb5_keyblock key;
201ebfedea0SLionel Sambuc     krb5_error_code ret;
202ebfedea0SLionel Sambuc     unsigned char buf[256];
203ebfedea0SLionel Sambuc     ssize_t len;
204ebfedea0SLionel Sambuc     size_t ret_len;
205ebfedea0SLionel Sambuc 
206ebfedea0SLionel Sambuc     fd = open(filename, O_RDONLY | O_BINARY);
207ebfedea0SLionel Sambuc     if(fd < 0) {
208ebfedea0SLionel Sambuc 	int save_errno = errno;
209ebfedea0SLionel Sambuc 	krb5_set_error_message(context, save_errno, "failed to open %s: %s",
210ebfedea0SLionel Sambuc 			      filename, strerror(save_errno));
211ebfedea0SLionel Sambuc 	return save_errno;
212ebfedea0SLionel Sambuc     }
213ebfedea0SLionel Sambuc 
214ebfedea0SLionel Sambuc     len = read(fd, buf, sizeof(buf));
215ebfedea0SLionel Sambuc     close(fd);
216ebfedea0SLionel Sambuc     if(len < 0) {
217ebfedea0SLionel Sambuc 	int save_errno = errno;
218ebfedea0SLionel Sambuc 	krb5_set_error_message(context, save_errno, "error reading %s: %s",
219ebfedea0SLionel Sambuc 			      filename, strerror(save_errno));
220ebfedea0SLionel Sambuc 	return save_errno;
221ebfedea0SLionel Sambuc     }
222ebfedea0SLionel Sambuc 
223ebfedea0SLionel Sambuc     ret = decode_EncryptionKey(buf, len, &key, &ret_len);
224ebfedea0SLionel Sambuc     memset(buf, 0, sizeof(buf));
225ebfedea0SLionel Sambuc     if(ret)
226ebfedea0SLionel Sambuc 	return ret;
227ebfedea0SLionel Sambuc 
228ebfedea0SLionel Sambuc     /* Originally, the keytype was just that, and later it got changed
229ebfedea0SLionel Sambuc        to des-cbc-md5, but we always used des in cfb64 mode. This
230ebfedea0SLionel Sambuc        should cover all cases, but will break if someone has hacked
231ebfedea0SLionel Sambuc        this code to really use des-cbc-md5 -- but then that's not my
232ebfedea0SLionel Sambuc        problem. */
233*0a6a1f1dSLionel Sambuc     if(key.keytype == ETYPE_DES_CBC_CRC || key.keytype == ETYPE_DES_CBC_MD5)
234ebfedea0SLionel Sambuc 	key.keytype = ETYPE_DES_CFB64_NONE;
235ebfedea0SLionel Sambuc 
236ebfedea0SLionel Sambuc     ret = hdb_process_master_key(context, 0, &key, 0, mkey);
237ebfedea0SLionel Sambuc     krb5_free_keyblock_contents(context, &key);
238ebfedea0SLionel Sambuc     return ret;
239ebfedea0SLionel Sambuc }
240ebfedea0SLionel Sambuc 
241ebfedea0SLionel Sambuc /* read a krb4 /.k style file */
242ebfedea0SLionel Sambuc static krb5_error_code
read_master_krb4(krb5_context context,const char * filename,hdb_master_key * mkey)243ebfedea0SLionel Sambuc read_master_krb4(krb5_context context, const char *filename,
244ebfedea0SLionel Sambuc 		 hdb_master_key *mkey)
245ebfedea0SLionel Sambuc {
246ebfedea0SLionel Sambuc     int fd;
247ebfedea0SLionel Sambuc     krb5_keyblock key;
248ebfedea0SLionel Sambuc     krb5_error_code ret;
249ebfedea0SLionel Sambuc     unsigned char buf[256];
250ebfedea0SLionel Sambuc     ssize_t len;
251ebfedea0SLionel Sambuc 
252ebfedea0SLionel Sambuc     fd = open(filename, O_RDONLY | O_BINARY);
253ebfedea0SLionel Sambuc     if(fd < 0) {
254ebfedea0SLionel Sambuc 	int save_errno = errno;
255ebfedea0SLionel Sambuc 	krb5_set_error_message(context, save_errno, "failed to open %s: %s",
256ebfedea0SLionel Sambuc 			       filename, strerror(save_errno));
257ebfedea0SLionel Sambuc 	return save_errno;
258ebfedea0SLionel Sambuc     }
259ebfedea0SLionel Sambuc 
260ebfedea0SLionel Sambuc     len = read(fd, buf, sizeof(buf));
261ebfedea0SLionel Sambuc     close(fd);
262ebfedea0SLionel Sambuc     if(len < 0) {
263ebfedea0SLionel Sambuc 	int save_errno = errno;
264ebfedea0SLionel Sambuc 	krb5_set_error_message(context, save_errno, "error reading %s: %s",
265ebfedea0SLionel Sambuc 			       filename, strerror(save_errno));
266ebfedea0SLionel Sambuc 	return save_errno;
267ebfedea0SLionel Sambuc     }
268ebfedea0SLionel Sambuc     if(len != 8) {
269ebfedea0SLionel Sambuc 	krb5_set_error_message(context, HEIM_ERR_EOF,
270ebfedea0SLionel Sambuc 			       "bad contents of %s", filename);
271ebfedea0SLionel Sambuc 	return HEIM_ERR_EOF; /* XXX file might be too large */
272ebfedea0SLionel Sambuc     }
273ebfedea0SLionel Sambuc 
274ebfedea0SLionel Sambuc     memset(&key, 0, sizeof(key));
275ebfedea0SLionel Sambuc     key.keytype = ETYPE_DES_PCBC_NONE;
276ebfedea0SLionel Sambuc     ret = krb5_data_copy(&key.keyvalue, buf, len);
277ebfedea0SLionel Sambuc     memset(buf, 0, sizeof(buf));
278ebfedea0SLionel Sambuc     if(ret)
279ebfedea0SLionel Sambuc 	return ret;
280ebfedea0SLionel Sambuc 
281ebfedea0SLionel Sambuc     ret = hdb_process_master_key(context, 0, &key, 0, mkey);
282ebfedea0SLionel Sambuc     krb5_free_keyblock_contents(context, &key);
283ebfedea0SLionel Sambuc     return ret;
284ebfedea0SLionel Sambuc }
285ebfedea0SLionel Sambuc 
286ebfedea0SLionel Sambuc krb5_error_code
hdb_read_master_key(krb5_context context,const char * filename,hdb_master_key * mkey)287ebfedea0SLionel Sambuc hdb_read_master_key(krb5_context context, const char *filename,
288ebfedea0SLionel Sambuc 		    hdb_master_key *mkey)
289ebfedea0SLionel Sambuc {
290ebfedea0SLionel Sambuc     FILE *f;
291ebfedea0SLionel Sambuc     unsigned char buf[16];
292ebfedea0SLionel Sambuc     krb5_error_code ret;
293ebfedea0SLionel Sambuc 
294ebfedea0SLionel Sambuc     off_t len;
295ebfedea0SLionel Sambuc 
296ebfedea0SLionel Sambuc     *mkey = NULL;
297ebfedea0SLionel Sambuc 
298ebfedea0SLionel Sambuc     if(filename == NULL)
299ebfedea0SLionel Sambuc 	filename = HDB_DB_DIR "/m-key";
300ebfedea0SLionel Sambuc 
301ebfedea0SLionel Sambuc     f = fopen(filename, "r");
302ebfedea0SLionel Sambuc     if(f == NULL) {
303ebfedea0SLionel Sambuc 	int save_errno = errno;
304ebfedea0SLionel Sambuc 	krb5_set_error_message(context, save_errno, "failed to open %s: %s",
305ebfedea0SLionel Sambuc 			       filename, strerror(save_errno));
306ebfedea0SLionel Sambuc 	return save_errno;
307ebfedea0SLionel Sambuc     }
308ebfedea0SLionel Sambuc 
309ebfedea0SLionel Sambuc     if(fread(buf, 1, 2, f) != 2) {
310ebfedea0SLionel Sambuc 	fclose(f);
311ebfedea0SLionel Sambuc 	krb5_set_error_message(context, HEIM_ERR_EOF, "end of file reading %s", filename);
312ebfedea0SLionel Sambuc 	return HEIM_ERR_EOF;
313ebfedea0SLionel Sambuc     }
314ebfedea0SLionel Sambuc 
315ebfedea0SLionel Sambuc     fseek(f, 0, SEEK_END);
316ebfedea0SLionel Sambuc     len = ftell(f);
317ebfedea0SLionel Sambuc 
318ebfedea0SLionel Sambuc     if(fclose(f) != 0)
319ebfedea0SLionel Sambuc 	return errno;
320ebfedea0SLionel Sambuc 
321ebfedea0SLionel Sambuc     if(len < 0)
322ebfedea0SLionel Sambuc 	return errno;
323ebfedea0SLionel Sambuc 
324ebfedea0SLionel Sambuc     if(len == 8) {
325ebfedea0SLionel Sambuc 	ret = read_master_krb4(context, filename, mkey);
326ebfedea0SLionel Sambuc     } else if(buf[0] == 0x30 && len <= 127 && buf[1] == len - 2) {
327ebfedea0SLionel Sambuc 	ret = read_master_encryptionkey(context, filename, mkey);
328ebfedea0SLionel Sambuc     } else if(buf[0] == 5 && buf[1] >= 1 && buf[1] <= 2) {
329ebfedea0SLionel Sambuc 	ret = read_master_keytab(context, filename, mkey);
330ebfedea0SLionel Sambuc     } else {
331ebfedea0SLionel Sambuc       /*
332ebfedea0SLionel Sambuc        * Check both LittleEndian and BigEndian since they key file
333ebfedea0SLionel Sambuc        * might be moved from a machine with diffrent byte order, or
334ebfedea0SLionel Sambuc        * its running on MacOS X that always uses BE master keys.
335ebfedea0SLionel Sambuc        */
336ebfedea0SLionel Sambuc       ret = read_master_mit(context, filename, KRB5_STORAGE_BYTEORDER_LE, mkey);
337ebfedea0SLionel Sambuc       if (ret)
338ebfedea0SLionel Sambuc           ret = read_master_mit(context, filename, KRB5_STORAGE_BYTEORDER_BE, mkey);
339ebfedea0SLionel Sambuc     }
340ebfedea0SLionel Sambuc     return ret;
341ebfedea0SLionel Sambuc }
342ebfedea0SLionel Sambuc 
343ebfedea0SLionel Sambuc krb5_error_code
hdb_write_master_key(krb5_context context,const char * filename,hdb_master_key mkey)344ebfedea0SLionel Sambuc hdb_write_master_key(krb5_context context, const char *filename,
345ebfedea0SLionel Sambuc 		     hdb_master_key mkey)
346ebfedea0SLionel Sambuc {
347ebfedea0SLionel Sambuc     krb5_error_code ret;
348ebfedea0SLionel Sambuc     hdb_master_key p;
349ebfedea0SLionel Sambuc     krb5_keytab kt;
350ebfedea0SLionel Sambuc 
351ebfedea0SLionel Sambuc     if(filename == NULL)
352ebfedea0SLionel Sambuc 	filename = HDB_DB_DIR "/m-key";
353ebfedea0SLionel Sambuc 
354ebfedea0SLionel Sambuc     ret = krb5_kt_resolve(context, filename, &kt);
355ebfedea0SLionel Sambuc     if(ret)
356ebfedea0SLionel Sambuc 	return ret;
357ebfedea0SLionel Sambuc 
358ebfedea0SLionel Sambuc     for(p = mkey; p; p = p->next) {
359ebfedea0SLionel Sambuc 	ret = krb5_kt_add_entry(context, kt, &p->keytab);
360ebfedea0SLionel Sambuc     }
361ebfedea0SLionel Sambuc 
362ebfedea0SLionel Sambuc     krb5_kt_close(context, kt);
363ebfedea0SLionel Sambuc 
364ebfedea0SLionel Sambuc     return ret;
365ebfedea0SLionel Sambuc }
366ebfedea0SLionel Sambuc 
367ebfedea0SLionel Sambuc hdb_master_key
_hdb_find_master_key(uint32_t * mkvno,hdb_master_key mkey)368ebfedea0SLionel Sambuc _hdb_find_master_key(uint32_t *mkvno, hdb_master_key mkey)
369ebfedea0SLionel Sambuc {
370ebfedea0SLionel Sambuc     hdb_master_key ret = NULL;
371ebfedea0SLionel Sambuc     while(mkey) {
372ebfedea0SLionel Sambuc 	if(ret == NULL && mkey->keytab.vno == 0)
373ebfedea0SLionel Sambuc 	    ret = mkey;
374ebfedea0SLionel Sambuc 	if(mkvno == NULL) {
375ebfedea0SLionel Sambuc 	    if(ret == NULL || mkey->keytab.vno > ret->keytab.vno)
376ebfedea0SLionel Sambuc 		ret = mkey;
377*0a6a1f1dSLionel Sambuc 	} else if((uint32_t)mkey->keytab.vno == *mkvno)
378ebfedea0SLionel Sambuc 	    return mkey;
379ebfedea0SLionel Sambuc 	mkey = mkey->next;
380ebfedea0SLionel Sambuc     }
381ebfedea0SLionel Sambuc     return ret;
382ebfedea0SLionel Sambuc }
383ebfedea0SLionel Sambuc 
384ebfedea0SLionel Sambuc int
_hdb_mkey_version(hdb_master_key mkey)385ebfedea0SLionel Sambuc _hdb_mkey_version(hdb_master_key mkey)
386ebfedea0SLionel Sambuc {
387ebfedea0SLionel Sambuc     return mkey->keytab.vno;
388ebfedea0SLionel Sambuc }
389ebfedea0SLionel Sambuc 
390ebfedea0SLionel Sambuc int
_hdb_mkey_decrypt(krb5_context context,hdb_master_key key,krb5_key_usage usage,void * ptr,size_t size,krb5_data * res)391ebfedea0SLionel Sambuc _hdb_mkey_decrypt(krb5_context context, hdb_master_key key,
392ebfedea0SLionel Sambuc 		  krb5_key_usage usage,
393ebfedea0SLionel Sambuc 		  void *ptr, size_t size, krb5_data *res)
394ebfedea0SLionel Sambuc {
395ebfedea0SLionel Sambuc     return krb5_decrypt(context, key->crypto, usage,
396ebfedea0SLionel Sambuc 			ptr, size, res);
397ebfedea0SLionel Sambuc }
398ebfedea0SLionel Sambuc 
399ebfedea0SLionel Sambuc int
_hdb_mkey_encrypt(krb5_context context,hdb_master_key key,krb5_key_usage usage,const void * ptr,size_t size,krb5_data * res)400ebfedea0SLionel Sambuc _hdb_mkey_encrypt(krb5_context context, hdb_master_key key,
401ebfedea0SLionel Sambuc 		  krb5_key_usage usage,
402ebfedea0SLionel Sambuc 		  const void *ptr, size_t size, krb5_data *res)
403ebfedea0SLionel Sambuc {
404ebfedea0SLionel Sambuc     return krb5_encrypt(context, key->crypto, usage,
405ebfedea0SLionel Sambuc 			ptr, size, res);
406ebfedea0SLionel Sambuc }
407ebfedea0SLionel Sambuc 
408ebfedea0SLionel Sambuc krb5_error_code
hdb_unseal_key_mkey(krb5_context context,Key * k,hdb_master_key mkey)409ebfedea0SLionel Sambuc hdb_unseal_key_mkey(krb5_context context, Key *k, hdb_master_key mkey)
410ebfedea0SLionel Sambuc {
411ebfedea0SLionel Sambuc 
412ebfedea0SLionel Sambuc     krb5_error_code ret;
413ebfedea0SLionel Sambuc     krb5_data res;
414ebfedea0SLionel Sambuc     size_t keysize;
415ebfedea0SLionel Sambuc 
416ebfedea0SLionel Sambuc     hdb_master_key key;
417ebfedea0SLionel Sambuc 
418ebfedea0SLionel Sambuc     if(k->mkvno == NULL)
419ebfedea0SLionel Sambuc 	return 0;
420ebfedea0SLionel Sambuc 
421ebfedea0SLionel Sambuc     key = _hdb_find_master_key(k->mkvno, mkey);
422ebfedea0SLionel Sambuc 
423ebfedea0SLionel Sambuc     if (key == NULL)
424ebfedea0SLionel Sambuc 	return HDB_ERR_NO_MKEY;
425ebfedea0SLionel Sambuc 
426ebfedea0SLionel Sambuc     ret = _hdb_mkey_decrypt(context, key, HDB_KU_MKEY,
427ebfedea0SLionel Sambuc 			    k->key.keyvalue.data,
428ebfedea0SLionel Sambuc 			    k->key.keyvalue.length,
429ebfedea0SLionel Sambuc 			    &res);
430ebfedea0SLionel Sambuc     if(ret == KRB5KRB_AP_ERR_BAD_INTEGRITY) {
431ebfedea0SLionel Sambuc 	/* try to decrypt with MIT key usage */
432ebfedea0SLionel Sambuc 	ret = _hdb_mkey_decrypt(context, key, 0,
433ebfedea0SLionel Sambuc 				k->key.keyvalue.data,
434ebfedea0SLionel Sambuc 				k->key.keyvalue.length,
435ebfedea0SLionel Sambuc 				&res);
436ebfedea0SLionel Sambuc     }
437ebfedea0SLionel Sambuc     if (ret)
438ebfedea0SLionel Sambuc 	return ret;
439ebfedea0SLionel Sambuc 
440ebfedea0SLionel Sambuc     /* fixup keylength if the key got padded when encrypting it */
441ebfedea0SLionel Sambuc     ret = krb5_enctype_keysize(context, k->key.keytype, &keysize);
442ebfedea0SLionel Sambuc     if (ret) {
443ebfedea0SLionel Sambuc 	krb5_data_free(&res);
444ebfedea0SLionel Sambuc 	return ret;
445ebfedea0SLionel Sambuc     }
446ebfedea0SLionel Sambuc     if (keysize > res.length) {
447ebfedea0SLionel Sambuc 	krb5_data_free(&res);
448ebfedea0SLionel Sambuc 	return KRB5_BAD_KEYSIZE;
449ebfedea0SLionel Sambuc     }
450ebfedea0SLionel Sambuc 
451ebfedea0SLionel Sambuc     memset(k->key.keyvalue.data, 0, k->key.keyvalue.length);
452ebfedea0SLionel Sambuc     free(k->key.keyvalue.data);
453ebfedea0SLionel Sambuc     k->key.keyvalue = res;
454ebfedea0SLionel Sambuc     k->key.keyvalue.length = keysize;
455ebfedea0SLionel Sambuc     free(k->mkvno);
456ebfedea0SLionel Sambuc     k->mkvno = NULL;
457ebfedea0SLionel Sambuc 
458ebfedea0SLionel Sambuc     return 0;
459ebfedea0SLionel Sambuc }
460ebfedea0SLionel Sambuc 
461ebfedea0SLionel Sambuc krb5_error_code
hdb_unseal_keys_mkey(krb5_context context,hdb_entry * ent,hdb_master_key mkey)462ebfedea0SLionel Sambuc hdb_unseal_keys_mkey(krb5_context context, hdb_entry *ent, hdb_master_key mkey)
463ebfedea0SLionel Sambuc {
464*0a6a1f1dSLionel Sambuc     size_t i;
465ebfedea0SLionel Sambuc 
466ebfedea0SLionel Sambuc     for(i = 0; i < ent->keys.len; i++){
467ebfedea0SLionel Sambuc 	krb5_error_code ret;
468ebfedea0SLionel Sambuc 
469ebfedea0SLionel Sambuc 	ret = hdb_unseal_key_mkey(context, &ent->keys.val[i], mkey);
470ebfedea0SLionel Sambuc 	if (ret)
471ebfedea0SLionel Sambuc 	    return ret;
472ebfedea0SLionel Sambuc     }
473ebfedea0SLionel Sambuc     return 0;
474ebfedea0SLionel Sambuc }
475ebfedea0SLionel Sambuc 
476ebfedea0SLionel Sambuc krb5_error_code
hdb_unseal_keys(krb5_context context,HDB * db,hdb_entry * ent)477ebfedea0SLionel Sambuc hdb_unseal_keys(krb5_context context, HDB *db, hdb_entry *ent)
478ebfedea0SLionel Sambuc {
479ebfedea0SLionel Sambuc     if (db->hdb_master_key_set == 0)
480ebfedea0SLionel Sambuc 	return 0;
481ebfedea0SLionel Sambuc     return hdb_unseal_keys_mkey(context, ent, db->hdb_master_key);
482ebfedea0SLionel Sambuc }
483ebfedea0SLionel Sambuc 
484ebfedea0SLionel Sambuc krb5_error_code
hdb_unseal_key(krb5_context context,HDB * db,Key * k)485ebfedea0SLionel Sambuc hdb_unseal_key(krb5_context context, HDB *db, Key *k)
486ebfedea0SLionel Sambuc {
487ebfedea0SLionel Sambuc     if (db->hdb_master_key_set == 0)
488ebfedea0SLionel Sambuc 	return 0;
489ebfedea0SLionel Sambuc     return hdb_unseal_key_mkey(context, k, db->hdb_master_key);
490ebfedea0SLionel Sambuc }
491ebfedea0SLionel Sambuc 
492ebfedea0SLionel Sambuc krb5_error_code
hdb_seal_key_mkey(krb5_context context,Key * k,hdb_master_key mkey)493ebfedea0SLionel Sambuc hdb_seal_key_mkey(krb5_context context, Key *k, hdb_master_key mkey)
494ebfedea0SLionel Sambuc {
495ebfedea0SLionel Sambuc     krb5_error_code ret;
496ebfedea0SLionel Sambuc     krb5_data res;
497ebfedea0SLionel Sambuc     hdb_master_key key;
498ebfedea0SLionel Sambuc 
499ebfedea0SLionel Sambuc     if(k->mkvno != NULL)
500ebfedea0SLionel Sambuc 	return 0;
501ebfedea0SLionel Sambuc 
502ebfedea0SLionel Sambuc     key = _hdb_find_master_key(k->mkvno, mkey);
503ebfedea0SLionel Sambuc 
504ebfedea0SLionel Sambuc     if (key == NULL)
505ebfedea0SLionel Sambuc 	return HDB_ERR_NO_MKEY;
506ebfedea0SLionel Sambuc 
507ebfedea0SLionel Sambuc     ret = _hdb_mkey_encrypt(context, key, HDB_KU_MKEY,
508ebfedea0SLionel Sambuc 			    k->key.keyvalue.data,
509ebfedea0SLionel Sambuc 			    k->key.keyvalue.length,
510ebfedea0SLionel Sambuc 			    &res);
511ebfedea0SLionel Sambuc     if (ret)
512ebfedea0SLionel Sambuc 	return ret;
513ebfedea0SLionel Sambuc 
514ebfedea0SLionel Sambuc     memset(k->key.keyvalue.data, 0, k->key.keyvalue.length);
515ebfedea0SLionel Sambuc     free(k->key.keyvalue.data);
516ebfedea0SLionel Sambuc     k->key.keyvalue = res;
517ebfedea0SLionel Sambuc 
518ebfedea0SLionel Sambuc     if (k->mkvno == NULL) {
519ebfedea0SLionel Sambuc 	k->mkvno = malloc(sizeof(*k->mkvno));
520ebfedea0SLionel Sambuc 	if (k->mkvno == NULL)
521ebfedea0SLionel Sambuc 	    return ENOMEM;
522ebfedea0SLionel Sambuc     }
523ebfedea0SLionel Sambuc     *k->mkvno = key->keytab.vno;
524ebfedea0SLionel Sambuc 
525ebfedea0SLionel Sambuc     return 0;
526ebfedea0SLionel Sambuc }
527ebfedea0SLionel Sambuc 
528ebfedea0SLionel Sambuc krb5_error_code
hdb_seal_keys_mkey(krb5_context context,hdb_entry * ent,hdb_master_key mkey)529ebfedea0SLionel Sambuc hdb_seal_keys_mkey(krb5_context context, hdb_entry *ent, hdb_master_key mkey)
530ebfedea0SLionel Sambuc {
531*0a6a1f1dSLionel Sambuc     size_t i;
532ebfedea0SLionel Sambuc     for(i = 0; i < ent->keys.len; i++){
533ebfedea0SLionel Sambuc 	krb5_error_code ret;
534ebfedea0SLionel Sambuc 
535ebfedea0SLionel Sambuc 	ret = hdb_seal_key_mkey(context, &ent->keys.val[i], mkey);
536ebfedea0SLionel Sambuc 	if (ret)
537ebfedea0SLionel Sambuc 	    return ret;
538ebfedea0SLionel Sambuc     }
539ebfedea0SLionel Sambuc     return 0;
540ebfedea0SLionel Sambuc }
541ebfedea0SLionel Sambuc 
542ebfedea0SLionel Sambuc krb5_error_code
hdb_seal_keys(krb5_context context,HDB * db,hdb_entry * ent)543ebfedea0SLionel Sambuc hdb_seal_keys(krb5_context context, HDB *db, hdb_entry *ent)
544ebfedea0SLionel Sambuc {
545ebfedea0SLionel Sambuc     if (db->hdb_master_key_set == 0)
546ebfedea0SLionel Sambuc 	return 0;
547ebfedea0SLionel Sambuc 
548ebfedea0SLionel Sambuc     return hdb_seal_keys_mkey(context, ent, db->hdb_master_key);
549ebfedea0SLionel Sambuc }
550ebfedea0SLionel Sambuc 
551ebfedea0SLionel Sambuc krb5_error_code
hdb_seal_key(krb5_context context,HDB * db,Key * k)552ebfedea0SLionel Sambuc hdb_seal_key(krb5_context context, HDB *db, Key *k)
553ebfedea0SLionel Sambuc {
554ebfedea0SLionel Sambuc     if (db->hdb_master_key_set == 0)
555ebfedea0SLionel Sambuc 	return 0;
556ebfedea0SLionel Sambuc 
557ebfedea0SLionel Sambuc     return hdb_seal_key_mkey(context, k, db->hdb_master_key);
558ebfedea0SLionel Sambuc }
559ebfedea0SLionel Sambuc 
560ebfedea0SLionel Sambuc krb5_error_code
hdb_set_master_key(krb5_context context,HDB * db,krb5_keyblock * key)561ebfedea0SLionel Sambuc hdb_set_master_key (krb5_context context,
562ebfedea0SLionel Sambuc 		    HDB *db,
563ebfedea0SLionel Sambuc 		    krb5_keyblock *key)
564ebfedea0SLionel Sambuc {
565ebfedea0SLionel Sambuc     krb5_error_code ret;
566ebfedea0SLionel Sambuc     hdb_master_key mkey;
567ebfedea0SLionel Sambuc 
568ebfedea0SLionel Sambuc     ret = hdb_process_master_key(context, 0, key, 0, &mkey);
569ebfedea0SLionel Sambuc     if (ret)
570ebfedea0SLionel Sambuc 	return ret;
571ebfedea0SLionel Sambuc     db->hdb_master_key = mkey;
572ebfedea0SLionel Sambuc #if 0 /* XXX - why? */
573ebfedea0SLionel Sambuc     des_set_random_generator_seed(key.keyvalue.data);
574ebfedea0SLionel Sambuc #endif
575ebfedea0SLionel Sambuc     db->hdb_master_key_set = 1;
576ebfedea0SLionel Sambuc     return 0;
577ebfedea0SLionel Sambuc }
578ebfedea0SLionel Sambuc 
579ebfedea0SLionel Sambuc krb5_error_code
hdb_set_master_keyfile(krb5_context context,HDB * db,const char * keyfile)580ebfedea0SLionel Sambuc hdb_set_master_keyfile (krb5_context context,
581ebfedea0SLionel Sambuc 			HDB *db,
582ebfedea0SLionel Sambuc 			const char *keyfile)
583ebfedea0SLionel Sambuc {
584ebfedea0SLionel Sambuc     hdb_master_key key;
585ebfedea0SLionel Sambuc     krb5_error_code ret;
586ebfedea0SLionel Sambuc 
587ebfedea0SLionel Sambuc     ret = hdb_read_master_key(context, keyfile, &key);
588ebfedea0SLionel Sambuc     if (ret) {
589ebfedea0SLionel Sambuc 	if (ret != ENOENT)
590ebfedea0SLionel Sambuc 	    return ret;
591ebfedea0SLionel Sambuc 	krb5_clear_error_message(context);
592ebfedea0SLionel Sambuc 	return 0;
593ebfedea0SLionel Sambuc     }
594ebfedea0SLionel Sambuc     db->hdb_master_key = key;
595ebfedea0SLionel Sambuc     db->hdb_master_key_set = 1;
596ebfedea0SLionel Sambuc     return ret;
597ebfedea0SLionel Sambuc }
598ebfedea0SLionel Sambuc 
599ebfedea0SLionel Sambuc krb5_error_code
hdb_clear_master_key(krb5_context context,HDB * db)600ebfedea0SLionel Sambuc hdb_clear_master_key (krb5_context context,
601ebfedea0SLionel Sambuc 		      HDB *db)
602ebfedea0SLionel Sambuc {
603ebfedea0SLionel Sambuc     if (db->hdb_master_key_set) {
604ebfedea0SLionel Sambuc 	hdb_free_master_key(context, db->hdb_master_key);
605ebfedea0SLionel Sambuc 	db->hdb_master_key_set = 0;
606ebfedea0SLionel Sambuc     }
607ebfedea0SLionel Sambuc     return 0;
608ebfedea0SLionel Sambuc }
609