1*0a6a1f1dSLionel Sambuc /* $NetBSD: mkey.c,v 1.1.1.2 2014/04/24 12:45:28 pettai Exp $ */
2ebfedea0SLionel Sambuc
3ebfedea0SLionel Sambuc /*
4ebfedea0SLionel Sambuc * Copyright (c) 2000 - 2004 Kungliga Tekniska Högskolan
5ebfedea0SLionel Sambuc * (Royal Institute of Technology, Stockholm, Sweden).
6ebfedea0SLionel Sambuc * All rights reserved.
7ebfedea0SLionel Sambuc *
8ebfedea0SLionel Sambuc * Redistribution and use in source and binary forms, with or without
9ebfedea0SLionel Sambuc * modification, are permitted provided that the following conditions
10ebfedea0SLionel Sambuc * are met:
11ebfedea0SLionel Sambuc *
12ebfedea0SLionel Sambuc * 1. Redistributions of source code must retain the above copyright
13ebfedea0SLionel Sambuc * notice, this list of conditions and the following disclaimer.
14ebfedea0SLionel Sambuc *
15ebfedea0SLionel Sambuc * 2. Redistributions in binary form must reproduce the above copyright
16ebfedea0SLionel Sambuc * notice, this list of conditions and the following disclaimer in the
17ebfedea0SLionel Sambuc * documentation and/or other materials provided with the distribution.
18ebfedea0SLionel Sambuc *
19ebfedea0SLionel Sambuc * 3. Neither the name of the Institute nor the names of its contributors
20ebfedea0SLionel Sambuc * may be used to endorse or promote products derived from this software
21ebfedea0SLionel Sambuc * without specific prior written permission.
22ebfedea0SLionel Sambuc *
23ebfedea0SLionel Sambuc * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ebfedea0SLionel Sambuc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ebfedea0SLionel Sambuc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ebfedea0SLionel Sambuc * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ebfedea0SLionel Sambuc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ebfedea0SLionel Sambuc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ebfedea0SLionel Sambuc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ebfedea0SLionel Sambuc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ebfedea0SLionel Sambuc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ebfedea0SLionel Sambuc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ebfedea0SLionel Sambuc * SUCH DAMAGE.
34ebfedea0SLionel Sambuc */
35ebfedea0SLionel Sambuc
36ebfedea0SLionel Sambuc #include "hdb_locl.h"
37ebfedea0SLionel Sambuc #ifndef O_BINARY
38ebfedea0SLionel Sambuc #define O_BINARY 0
39ebfedea0SLionel Sambuc #endif
40ebfedea0SLionel Sambuc
41ebfedea0SLionel Sambuc struct hdb_master_key_data {
42ebfedea0SLionel Sambuc krb5_keytab_entry keytab;
43ebfedea0SLionel Sambuc krb5_crypto crypto;
44ebfedea0SLionel Sambuc struct hdb_master_key_data *next;
45ebfedea0SLionel Sambuc };
46ebfedea0SLionel Sambuc
47ebfedea0SLionel Sambuc void
hdb_free_master_key(krb5_context context,hdb_master_key mkey)48ebfedea0SLionel Sambuc hdb_free_master_key(krb5_context context, hdb_master_key mkey)
49ebfedea0SLionel Sambuc {
50ebfedea0SLionel Sambuc struct hdb_master_key_data *ptr;
51ebfedea0SLionel Sambuc while(mkey) {
52ebfedea0SLionel Sambuc krb5_kt_free_entry(context, &mkey->keytab);
53ebfedea0SLionel Sambuc if (mkey->crypto)
54ebfedea0SLionel Sambuc krb5_crypto_destroy(context, mkey->crypto);
55ebfedea0SLionel Sambuc ptr = mkey;
56ebfedea0SLionel Sambuc mkey = mkey->next;
57ebfedea0SLionel Sambuc free(ptr);
58ebfedea0SLionel Sambuc }
59ebfedea0SLionel Sambuc }
60ebfedea0SLionel Sambuc
61ebfedea0SLionel Sambuc krb5_error_code
hdb_process_master_key(krb5_context context,int kvno,krb5_keyblock * key,krb5_enctype etype,hdb_master_key * mkey)62ebfedea0SLionel Sambuc hdb_process_master_key(krb5_context context,
63ebfedea0SLionel Sambuc int kvno, krb5_keyblock *key, krb5_enctype etype,
64ebfedea0SLionel Sambuc hdb_master_key *mkey)
65ebfedea0SLionel Sambuc {
66ebfedea0SLionel Sambuc krb5_error_code ret;
67ebfedea0SLionel Sambuc
68ebfedea0SLionel Sambuc *mkey = calloc(1, sizeof(**mkey));
69ebfedea0SLionel Sambuc if(*mkey == NULL) {
70ebfedea0SLionel Sambuc krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
71ebfedea0SLionel Sambuc return ENOMEM;
72ebfedea0SLionel Sambuc }
73ebfedea0SLionel Sambuc (*mkey)->keytab.vno = kvno;
74ebfedea0SLionel Sambuc ret = krb5_parse_name(context, "K/M", &(*mkey)->keytab.principal);
75ebfedea0SLionel Sambuc if(ret)
76ebfedea0SLionel Sambuc goto fail;
77ebfedea0SLionel Sambuc ret = krb5_copy_keyblock_contents(context, key, &(*mkey)->keytab.keyblock);
78ebfedea0SLionel Sambuc if(ret)
79ebfedea0SLionel Sambuc goto fail;
80ebfedea0SLionel Sambuc if(etype != 0)
81ebfedea0SLionel Sambuc (*mkey)->keytab.keyblock.keytype = etype;
82ebfedea0SLionel Sambuc (*mkey)->keytab.timestamp = time(NULL);
83ebfedea0SLionel Sambuc ret = krb5_crypto_init(context, key, etype, &(*mkey)->crypto);
84ebfedea0SLionel Sambuc if(ret)
85ebfedea0SLionel Sambuc goto fail;
86ebfedea0SLionel Sambuc return 0;
87ebfedea0SLionel Sambuc fail:
88ebfedea0SLionel Sambuc hdb_free_master_key(context, *mkey);
89ebfedea0SLionel Sambuc *mkey = NULL;
90ebfedea0SLionel Sambuc return ret;
91ebfedea0SLionel Sambuc }
92ebfedea0SLionel Sambuc
93ebfedea0SLionel Sambuc krb5_error_code
hdb_add_master_key(krb5_context context,krb5_keyblock * key,hdb_master_key * inout)94ebfedea0SLionel Sambuc hdb_add_master_key(krb5_context context, krb5_keyblock *key,
95ebfedea0SLionel Sambuc hdb_master_key *inout)
96ebfedea0SLionel Sambuc {
97ebfedea0SLionel Sambuc int vno = 0;
98ebfedea0SLionel Sambuc hdb_master_key p;
99ebfedea0SLionel Sambuc krb5_error_code ret;
100ebfedea0SLionel Sambuc
101ebfedea0SLionel Sambuc for(p = *inout; p; p = p->next)
102ebfedea0SLionel Sambuc vno = max(vno, p->keytab.vno);
103ebfedea0SLionel Sambuc vno++;
104ebfedea0SLionel Sambuc ret = hdb_process_master_key(context, vno, key, 0, &p);
105ebfedea0SLionel Sambuc if(ret)
106ebfedea0SLionel Sambuc return ret;
107ebfedea0SLionel Sambuc p->next = *inout;
108ebfedea0SLionel Sambuc *inout = p;
109ebfedea0SLionel Sambuc return 0;
110ebfedea0SLionel Sambuc }
111ebfedea0SLionel Sambuc
112ebfedea0SLionel Sambuc static krb5_error_code
read_master_keytab(krb5_context context,const char * filename,hdb_master_key * mkey)113ebfedea0SLionel Sambuc read_master_keytab(krb5_context context, const char *filename,
114ebfedea0SLionel Sambuc hdb_master_key *mkey)
115ebfedea0SLionel Sambuc {
116ebfedea0SLionel Sambuc krb5_error_code ret;
117ebfedea0SLionel Sambuc krb5_keytab id;
118ebfedea0SLionel Sambuc krb5_kt_cursor cursor;
119ebfedea0SLionel Sambuc krb5_keytab_entry entry;
120ebfedea0SLionel Sambuc hdb_master_key p;
121ebfedea0SLionel Sambuc
122ebfedea0SLionel Sambuc ret = krb5_kt_resolve(context, filename, &id);
123ebfedea0SLionel Sambuc if(ret)
124ebfedea0SLionel Sambuc return ret;
125ebfedea0SLionel Sambuc
126ebfedea0SLionel Sambuc ret = krb5_kt_start_seq_get(context, id, &cursor);
127ebfedea0SLionel Sambuc if(ret)
128ebfedea0SLionel Sambuc goto out;
129ebfedea0SLionel Sambuc *mkey = NULL;
130ebfedea0SLionel Sambuc while(krb5_kt_next_entry(context, id, &entry, &cursor) == 0) {
131ebfedea0SLionel Sambuc p = calloc(1, sizeof(*p));
132ebfedea0SLionel Sambuc if(p == NULL) {
133ebfedea0SLionel Sambuc krb5_kt_end_seq_get(context, id, &cursor);
134ebfedea0SLionel Sambuc ret = ENOMEM;
135ebfedea0SLionel Sambuc goto out;
136ebfedea0SLionel Sambuc }
137ebfedea0SLionel Sambuc p->keytab = entry;
138ebfedea0SLionel Sambuc ret = krb5_crypto_init(context, &p->keytab.keyblock, 0, &p->crypto);
139ebfedea0SLionel Sambuc p->next = *mkey;
140ebfedea0SLionel Sambuc *mkey = p;
141ebfedea0SLionel Sambuc }
142ebfedea0SLionel Sambuc krb5_kt_end_seq_get(context, id, &cursor);
143ebfedea0SLionel Sambuc out:
144ebfedea0SLionel Sambuc krb5_kt_close(context, id);
145ebfedea0SLionel Sambuc return ret;
146ebfedea0SLionel Sambuc }
147ebfedea0SLionel Sambuc
148ebfedea0SLionel Sambuc /* read a MIT master keyfile */
149ebfedea0SLionel Sambuc static krb5_error_code
read_master_mit(krb5_context context,const char * filename,int byteorder,hdb_master_key * mkey)150ebfedea0SLionel Sambuc read_master_mit(krb5_context context, const char *filename,
151ebfedea0SLionel Sambuc int byteorder, hdb_master_key *mkey)
152ebfedea0SLionel Sambuc {
153ebfedea0SLionel Sambuc int fd;
154ebfedea0SLionel Sambuc krb5_error_code ret;
155ebfedea0SLionel Sambuc krb5_storage *sp;
156ebfedea0SLionel Sambuc int16_t enctype;
157ebfedea0SLionel Sambuc krb5_keyblock key;
158ebfedea0SLionel Sambuc
159ebfedea0SLionel Sambuc fd = open(filename, O_RDONLY | O_BINARY);
160ebfedea0SLionel Sambuc if(fd < 0) {
161ebfedea0SLionel Sambuc int save_errno = errno;
162ebfedea0SLionel Sambuc krb5_set_error_message(context, save_errno, "failed to open %s: %s",
163ebfedea0SLionel Sambuc filename, strerror(save_errno));
164ebfedea0SLionel Sambuc return save_errno;
165ebfedea0SLionel Sambuc }
166ebfedea0SLionel Sambuc sp = krb5_storage_from_fd(fd);
167ebfedea0SLionel Sambuc if(sp == NULL) {
168ebfedea0SLionel Sambuc close(fd);
169ebfedea0SLionel Sambuc return errno;
170ebfedea0SLionel Sambuc }
171ebfedea0SLionel Sambuc krb5_storage_set_flags(sp, byteorder);
172ebfedea0SLionel Sambuc /* could possibly use ret_keyblock here, but do it with more
173ebfedea0SLionel Sambuc checks for now */
174ebfedea0SLionel Sambuc {
175ebfedea0SLionel Sambuc ret = krb5_ret_int16(sp, &enctype);
176ebfedea0SLionel Sambuc if (ret)
177ebfedea0SLionel Sambuc goto out;
178ebfedea0SLionel Sambuc ret = krb5_enctype_valid(context, enctype);
179ebfedea0SLionel Sambuc if (ret)
180ebfedea0SLionel Sambuc goto out;
181ebfedea0SLionel Sambuc key.keytype = enctype;
182ebfedea0SLionel Sambuc ret = krb5_ret_data(sp, &key.keyvalue);
183ebfedea0SLionel Sambuc if(ret)
184ebfedea0SLionel Sambuc goto out;
185ebfedea0SLionel Sambuc }
186ebfedea0SLionel Sambuc ret = hdb_process_master_key(context, 1, &key, 0, mkey);
187ebfedea0SLionel Sambuc krb5_free_keyblock_contents(context, &key);
188ebfedea0SLionel Sambuc out:
189ebfedea0SLionel Sambuc krb5_storage_free(sp);
190ebfedea0SLionel Sambuc close(fd);
191ebfedea0SLionel Sambuc return ret;
192ebfedea0SLionel Sambuc }
193ebfedea0SLionel Sambuc
194ebfedea0SLionel Sambuc /* read an old master key file */
195ebfedea0SLionel Sambuc static krb5_error_code
read_master_encryptionkey(krb5_context context,const char * filename,hdb_master_key * mkey)196ebfedea0SLionel Sambuc read_master_encryptionkey(krb5_context context, const char *filename,
197ebfedea0SLionel Sambuc hdb_master_key *mkey)
198ebfedea0SLionel Sambuc {
199ebfedea0SLionel Sambuc int fd;
200ebfedea0SLionel Sambuc krb5_keyblock key;
201ebfedea0SLionel Sambuc krb5_error_code ret;
202ebfedea0SLionel Sambuc unsigned char buf[256];
203ebfedea0SLionel Sambuc ssize_t len;
204ebfedea0SLionel Sambuc size_t ret_len;
205ebfedea0SLionel Sambuc
206ebfedea0SLionel Sambuc fd = open(filename, O_RDONLY | O_BINARY);
207ebfedea0SLionel Sambuc if(fd < 0) {
208ebfedea0SLionel Sambuc int save_errno = errno;
209ebfedea0SLionel Sambuc krb5_set_error_message(context, save_errno, "failed to open %s: %s",
210ebfedea0SLionel Sambuc filename, strerror(save_errno));
211ebfedea0SLionel Sambuc return save_errno;
212ebfedea0SLionel Sambuc }
213ebfedea0SLionel Sambuc
214ebfedea0SLionel Sambuc len = read(fd, buf, sizeof(buf));
215ebfedea0SLionel Sambuc close(fd);
216ebfedea0SLionel Sambuc if(len < 0) {
217ebfedea0SLionel Sambuc int save_errno = errno;
218ebfedea0SLionel Sambuc krb5_set_error_message(context, save_errno, "error reading %s: %s",
219ebfedea0SLionel Sambuc filename, strerror(save_errno));
220ebfedea0SLionel Sambuc return save_errno;
221ebfedea0SLionel Sambuc }
222ebfedea0SLionel Sambuc
223ebfedea0SLionel Sambuc ret = decode_EncryptionKey(buf, len, &key, &ret_len);
224ebfedea0SLionel Sambuc memset(buf, 0, sizeof(buf));
225ebfedea0SLionel Sambuc if(ret)
226ebfedea0SLionel Sambuc return ret;
227ebfedea0SLionel Sambuc
228ebfedea0SLionel Sambuc /* Originally, the keytype was just that, and later it got changed
229ebfedea0SLionel Sambuc to des-cbc-md5, but we always used des in cfb64 mode. This
230ebfedea0SLionel Sambuc should cover all cases, but will break if someone has hacked
231ebfedea0SLionel Sambuc this code to really use des-cbc-md5 -- but then that's not my
232ebfedea0SLionel Sambuc problem. */
233*0a6a1f1dSLionel Sambuc if(key.keytype == ETYPE_DES_CBC_CRC || key.keytype == ETYPE_DES_CBC_MD5)
234ebfedea0SLionel Sambuc key.keytype = ETYPE_DES_CFB64_NONE;
235ebfedea0SLionel Sambuc
236ebfedea0SLionel Sambuc ret = hdb_process_master_key(context, 0, &key, 0, mkey);
237ebfedea0SLionel Sambuc krb5_free_keyblock_contents(context, &key);
238ebfedea0SLionel Sambuc return ret;
239ebfedea0SLionel Sambuc }
240ebfedea0SLionel Sambuc
241ebfedea0SLionel Sambuc /* read a krb4 /.k style file */
242ebfedea0SLionel Sambuc static krb5_error_code
read_master_krb4(krb5_context context,const char * filename,hdb_master_key * mkey)243ebfedea0SLionel Sambuc read_master_krb4(krb5_context context, const char *filename,
244ebfedea0SLionel Sambuc hdb_master_key *mkey)
245ebfedea0SLionel Sambuc {
246ebfedea0SLionel Sambuc int fd;
247ebfedea0SLionel Sambuc krb5_keyblock key;
248ebfedea0SLionel Sambuc krb5_error_code ret;
249ebfedea0SLionel Sambuc unsigned char buf[256];
250ebfedea0SLionel Sambuc ssize_t len;
251ebfedea0SLionel Sambuc
252ebfedea0SLionel Sambuc fd = open(filename, O_RDONLY | O_BINARY);
253ebfedea0SLionel Sambuc if(fd < 0) {
254ebfedea0SLionel Sambuc int save_errno = errno;
255ebfedea0SLionel Sambuc krb5_set_error_message(context, save_errno, "failed to open %s: %s",
256ebfedea0SLionel Sambuc filename, strerror(save_errno));
257ebfedea0SLionel Sambuc return save_errno;
258ebfedea0SLionel Sambuc }
259ebfedea0SLionel Sambuc
260ebfedea0SLionel Sambuc len = read(fd, buf, sizeof(buf));
261ebfedea0SLionel Sambuc close(fd);
262ebfedea0SLionel Sambuc if(len < 0) {
263ebfedea0SLionel Sambuc int save_errno = errno;
264ebfedea0SLionel Sambuc krb5_set_error_message(context, save_errno, "error reading %s: %s",
265ebfedea0SLionel Sambuc filename, strerror(save_errno));
266ebfedea0SLionel Sambuc return save_errno;
267ebfedea0SLionel Sambuc }
268ebfedea0SLionel Sambuc if(len != 8) {
269ebfedea0SLionel Sambuc krb5_set_error_message(context, HEIM_ERR_EOF,
270ebfedea0SLionel Sambuc "bad contents of %s", filename);
271ebfedea0SLionel Sambuc return HEIM_ERR_EOF; /* XXX file might be too large */
272ebfedea0SLionel Sambuc }
273ebfedea0SLionel Sambuc
274ebfedea0SLionel Sambuc memset(&key, 0, sizeof(key));
275ebfedea0SLionel Sambuc key.keytype = ETYPE_DES_PCBC_NONE;
276ebfedea0SLionel Sambuc ret = krb5_data_copy(&key.keyvalue, buf, len);
277ebfedea0SLionel Sambuc memset(buf, 0, sizeof(buf));
278ebfedea0SLionel Sambuc if(ret)
279ebfedea0SLionel Sambuc return ret;
280ebfedea0SLionel Sambuc
281ebfedea0SLionel Sambuc ret = hdb_process_master_key(context, 0, &key, 0, mkey);
282ebfedea0SLionel Sambuc krb5_free_keyblock_contents(context, &key);
283ebfedea0SLionel Sambuc return ret;
284ebfedea0SLionel Sambuc }
285ebfedea0SLionel Sambuc
286ebfedea0SLionel Sambuc krb5_error_code
hdb_read_master_key(krb5_context context,const char * filename,hdb_master_key * mkey)287ebfedea0SLionel Sambuc hdb_read_master_key(krb5_context context, const char *filename,
288ebfedea0SLionel Sambuc hdb_master_key *mkey)
289ebfedea0SLionel Sambuc {
290ebfedea0SLionel Sambuc FILE *f;
291ebfedea0SLionel Sambuc unsigned char buf[16];
292ebfedea0SLionel Sambuc krb5_error_code ret;
293ebfedea0SLionel Sambuc
294ebfedea0SLionel Sambuc off_t len;
295ebfedea0SLionel Sambuc
296ebfedea0SLionel Sambuc *mkey = NULL;
297ebfedea0SLionel Sambuc
298ebfedea0SLionel Sambuc if(filename == NULL)
299ebfedea0SLionel Sambuc filename = HDB_DB_DIR "/m-key";
300ebfedea0SLionel Sambuc
301ebfedea0SLionel Sambuc f = fopen(filename, "r");
302ebfedea0SLionel Sambuc if(f == NULL) {
303ebfedea0SLionel Sambuc int save_errno = errno;
304ebfedea0SLionel Sambuc krb5_set_error_message(context, save_errno, "failed to open %s: %s",
305ebfedea0SLionel Sambuc filename, strerror(save_errno));
306ebfedea0SLionel Sambuc return save_errno;
307ebfedea0SLionel Sambuc }
308ebfedea0SLionel Sambuc
309ebfedea0SLionel Sambuc if(fread(buf, 1, 2, f) != 2) {
310ebfedea0SLionel Sambuc fclose(f);
311ebfedea0SLionel Sambuc krb5_set_error_message(context, HEIM_ERR_EOF, "end of file reading %s", filename);
312ebfedea0SLionel Sambuc return HEIM_ERR_EOF;
313ebfedea0SLionel Sambuc }
314ebfedea0SLionel Sambuc
315ebfedea0SLionel Sambuc fseek(f, 0, SEEK_END);
316ebfedea0SLionel Sambuc len = ftell(f);
317ebfedea0SLionel Sambuc
318ebfedea0SLionel Sambuc if(fclose(f) != 0)
319ebfedea0SLionel Sambuc return errno;
320ebfedea0SLionel Sambuc
321ebfedea0SLionel Sambuc if(len < 0)
322ebfedea0SLionel Sambuc return errno;
323ebfedea0SLionel Sambuc
324ebfedea0SLionel Sambuc if(len == 8) {
325ebfedea0SLionel Sambuc ret = read_master_krb4(context, filename, mkey);
326ebfedea0SLionel Sambuc } else if(buf[0] == 0x30 && len <= 127 && buf[1] == len - 2) {
327ebfedea0SLionel Sambuc ret = read_master_encryptionkey(context, filename, mkey);
328ebfedea0SLionel Sambuc } else if(buf[0] == 5 && buf[1] >= 1 && buf[1] <= 2) {
329ebfedea0SLionel Sambuc ret = read_master_keytab(context, filename, mkey);
330ebfedea0SLionel Sambuc } else {
331ebfedea0SLionel Sambuc /*
332ebfedea0SLionel Sambuc * Check both LittleEndian and BigEndian since they key file
333ebfedea0SLionel Sambuc * might be moved from a machine with diffrent byte order, or
334ebfedea0SLionel Sambuc * its running on MacOS X that always uses BE master keys.
335ebfedea0SLionel Sambuc */
336ebfedea0SLionel Sambuc ret = read_master_mit(context, filename, KRB5_STORAGE_BYTEORDER_LE, mkey);
337ebfedea0SLionel Sambuc if (ret)
338ebfedea0SLionel Sambuc ret = read_master_mit(context, filename, KRB5_STORAGE_BYTEORDER_BE, mkey);
339ebfedea0SLionel Sambuc }
340ebfedea0SLionel Sambuc return ret;
341ebfedea0SLionel Sambuc }
342ebfedea0SLionel Sambuc
343ebfedea0SLionel Sambuc krb5_error_code
hdb_write_master_key(krb5_context context,const char * filename,hdb_master_key mkey)344ebfedea0SLionel Sambuc hdb_write_master_key(krb5_context context, const char *filename,
345ebfedea0SLionel Sambuc hdb_master_key mkey)
346ebfedea0SLionel Sambuc {
347ebfedea0SLionel Sambuc krb5_error_code ret;
348ebfedea0SLionel Sambuc hdb_master_key p;
349ebfedea0SLionel Sambuc krb5_keytab kt;
350ebfedea0SLionel Sambuc
351ebfedea0SLionel Sambuc if(filename == NULL)
352ebfedea0SLionel Sambuc filename = HDB_DB_DIR "/m-key";
353ebfedea0SLionel Sambuc
354ebfedea0SLionel Sambuc ret = krb5_kt_resolve(context, filename, &kt);
355ebfedea0SLionel Sambuc if(ret)
356ebfedea0SLionel Sambuc return ret;
357ebfedea0SLionel Sambuc
358ebfedea0SLionel Sambuc for(p = mkey; p; p = p->next) {
359ebfedea0SLionel Sambuc ret = krb5_kt_add_entry(context, kt, &p->keytab);
360ebfedea0SLionel Sambuc }
361ebfedea0SLionel Sambuc
362ebfedea0SLionel Sambuc krb5_kt_close(context, kt);
363ebfedea0SLionel Sambuc
364ebfedea0SLionel Sambuc return ret;
365ebfedea0SLionel Sambuc }
366ebfedea0SLionel Sambuc
367ebfedea0SLionel Sambuc hdb_master_key
_hdb_find_master_key(uint32_t * mkvno,hdb_master_key mkey)368ebfedea0SLionel Sambuc _hdb_find_master_key(uint32_t *mkvno, hdb_master_key mkey)
369ebfedea0SLionel Sambuc {
370ebfedea0SLionel Sambuc hdb_master_key ret = NULL;
371ebfedea0SLionel Sambuc while(mkey) {
372ebfedea0SLionel Sambuc if(ret == NULL && mkey->keytab.vno == 0)
373ebfedea0SLionel Sambuc ret = mkey;
374ebfedea0SLionel Sambuc if(mkvno == NULL) {
375ebfedea0SLionel Sambuc if(ret == NULL || mkey->keytab.vno > ret->keytab.vno)
376ebfedea0SLionel Sambuc ret = mkey;
377*0a6a1f1dSLionel Sambuc } else if((uint32_t)mkey->keytab.vno == *mkvno)
378ebfedea0SLionel Sambuc return mkey;
379ebfedea0SLionel Sambuc mkey = mkey->next;
380ebfedea0SLionel Sambuc }
381ebfedea0SLionel Sambuc return ret;
382ebfedea0SLionel Sambuc }
383ebfedea0SLionel Sambuc
384ebfedea0SLionel Sambuc int
_hdb_mkey_version(hdb_master_key mkey)385ebfedea0SLionel Sambuc _hdb_mkey_version(hdb_master_key mkey)
386ebfedea0SLionel Sambuc {
387ebfedea0SLionel Sambuc return mkey->keytab.vno;
388ebfedea0SLionel Sambuc }
389ebfedea0SLionel Sambuc
390ebfedea0SLionel Sambuc int
_hdb_mkey_decrypt(krb5_context context,hdb_master_key key,krb5_key_usage usage,void * ptr,size_t size,krb5_data * res)391ebfedea0SLionel Sambuc _hdb_mkey_decrypt(krb5_context context, hdb_master_key key,
392ebfedea0SLionel Sambuc krb5_key_usage usage,
393ebfedea0SLionel Sambuc void *ptr, size_t size, krb5_data *res)
394ebfedea0SLionel Sambuc {
395ebfedea0SLionel Sambuc return krb5_decrypt(context, key->crypto, usage,
396ebfedea0SLionel Sambuc ptr, size, res);
397ebfedea0SLionel Sambuc }
398ebfedea0SLionel Sambuc
399ebfedea0SLionel Sambuc int
_hdb_mkey_encrypt(krb5_context context,hdb_master_key key,krb5_key_usage usage,const void * ptr,size_t size,krb5_data * res)400ebfedea0SLionel Sambuc _hdb_mkey_encrypt(krb5_context context, hdb_master_key key,
401ebfedea0SLionel Sambuc krb5_key_usage usage,
402ebfedea0SLionel Sambuc const void *ptr, size_t size, krb5_data *res)
403ebfedea0SLionel Sambuc {
404ebfedea0SLionel Sambuc return krb5_encrypt(context, key->crypto, usage,
405ebfedea0SLionel Sambuc ptr, size, res);
406ebfedea0SLionel Sambuc }
407ebfedea0SLionel Sambuc
408ebfedea0SLionel Sambuc krb5_error_code
hdb_unseal_key_mkey(krb5_context context,Key * k,hdb_master_key mkey)409ebfedea0SLionel Sambuc hdb_unseal_key_mkey(krb5_context context, Key *k, hdb_master_key mkey)
410ebfedea0SLionel Sambuc {
411ebfedea0SLionel Sambuc
412ebfedea0SLionel Sambuc krb5_error_code ret;
413ebfedea0SLionel Sambuc krb5_data res;
414ebfedea0SLionel Sambuc size_t keysize;
415ebfedea0SLionel Sambuc
416ebfedea0SLionel Sambuc hdb_master_key key;
417ebfedea0SLionel Sambuc
418ebfedea0SLionel Sambuc if(k->mkvno == NULL)
419ebfedea0SLionel Sambuc return 0;
420ebfedea0SLionel Sambuc
421ebfedea0SLionel Sambuc key = _hdb_find_master_key(k->mkvno, mkey);
422ebfedea0SLionel Sambuc
423ebfedea0SLionel Sambuc if (key == NULL)
424ebfedea0SLionel Sambuc return HDB_ERR_NO_MKEY;
425ebfedea0SLionel Sambuc
426ebfedea0SLionel Sambuc ret = _hdb_mkey_decrypt(context, key, HDB_KU_MKEY,
427ebfedea0SLionel Sambuc k->key.keyvalue.data,
428ebfedea0SLionel Sambuc k->key.keyvalue.length,
429ebfedea0SLionel Sambuc &res);
430ebfedea0SLionel Sambuc if(ret == KRB5KRB_AP_ERR_BAD_INTEGRITY) {
431ebfedea0SLionel Sambuc /* try to decrypt with MIT key usage */
432ebfedea0SLionel Sambuc ret = _hdb_mkey_decrypt(context, key, 0,
433ebfedea0SLionel Sambuc k->key.keyvalue.data,
434ebfedea0SLionel Sambuc k->key.keyvalue.length,
435ebfedea0SLionel Sambuc &res);
436ebfedea0SLionel Sambuc }
437ebfedea0SLionel Sambuc if (ret)
438ebfedea0SLionel Sambuc return ret;
439ebfedea0SLionel Sambuc
440ebfedea0SLionel Sambuc /* fixup keylength if the key got padded when encrypting it */
441ebfedea0SLionel Sambuc ret = krb5_enctype_keysize(context, k->key.keytype, &keysize);
442ebfedea0SLionel Sambuc if (ret) {
443ebfedea0SLionel Sambuc krb5_data_free(&res);
444ebfedea0SLionel Sambuc return ret;
445ebfedea0SLionel Sambuc }
446ebfedea0SLionel Sambuc if (keysize > res.length) {
447ebfedea0SLionel Sambuc krb5_data_free(&res);
448ebfedea0SLionel Sambuc return KRB5_BAD_KEYSIZE;
449ebfedea0SLionel Sambuc }
450ebfedea0SLionel Sambuc
451ebfedea0SLionel Sambuc memset(k->key.keyvalue.data, 0, k->key.keyvalue.length);
452ebfedea0SLionel Sambuc free(k->key.keyvalue.data);
453ebfedea0SLionel Sambuc k->key.keyvalue = res;
454ebfedea0SLionel Sambuc k->key.keyvalue.length = keysize;
455ebfedea0SLionel Sambuc free(k->mkvno);
456ebfedea0SLionel Sambuc k->mkvno = NULL;
457ebfedea0SLionel Sambuc
458ebfedea0SLionel Sambuc return 0;
459ebfedea0SLionel Sambuc }
460ebfedea0SLionel Sambuc
461ebfedea0SLionel Sambuc krb5_error_code
hdb_unseal_keys_mkey(krb5_context context,hdb_entry * ent,hdb_master_key mkey)462ebfedea0SLionel Sambuc hdb_unseal_keys_mkey(krb5_context context, hdb_entry *ent, hdb_master_key mkey)
463ebfedea0SLionel Sambuc {
464*0a6a1f1dSLionel Sambuc size_t i;
465ebfedea0SLionel Sambuc
466ebfedea0SLionel Sambuc for(i = 0; i < ent->keys.len; i++){
467ebfedea0SLionel Sambuc krb5_error_code ret;
468ebfedea0SLionel Sambuc
469ebfedea0SLionel Sambuc ret = hdb_unseal_key_mkey(context, &ent->keys.val[i], mkey);
470ebfedea0SLionel Sambuc if (ret)
471ebfedea0SLionel Sambuc return ret;
472ebfedea0SLionel Sambuc }
473ebfedea0SLionel Sambuc return 0;
474ebfedea0SLionel Sambuc }
475ebfedea0SLionel Sambuc
476ebfedea0SLionel Sambuc krb5_error_code
hdb_unseal_keys(krb5_context context,HDB * db,hdb_entry * ent)477ebfedea0SLionel Sambuc hdb_unseal_keys(krb5_context context, HDB *db, hdb_entry *ent)
478ebfedea0SLionel Sambuc {
479ebfedea0SLionel Sambuc if (db->hdb_master_key_set == 0)
480ebfedea0SLionel Sambuc return 0;
481ebfedea0SLionel Sambuc return hdb_unseal_keys_mkey(context, ent, db->hdb_master_key);
482ebfedea0SLionel Sambuc }
483ebfedea0SLionel Sambuc
484ebfedea0SLionel Sambuc krb5_error_code
hdb_unseal_key(krb5_context context,HDB * db,Key * k)485ebfedea0SLionel Sambuc hdb_unseal_key(krb5_context context, HDB *db, Key *k)
486ebfedea0SLionel Sambuc {
487ebfedea0SLionel Sambuc if (db->hdb_master_key_set == 0)
488ebfedea0SLionel Sambuc return 0;
489ebfedea0SLionel Sambuc return hdb_unseal_key_mkey(context, k, db->hdb_master_key);
490ebfedea0SLionel Sambuc }
491ebfedea0SLionel Sambuc
492ebfedea0SLionel Sambuc krb5_error_code
hdb_seal_key_mkey(krb5_context context,Key * k,hdb_master_key mkey)493ebfedea0SLionel Sambuc hdb_seal_key_mkey(krb5_context context, Key *k, hdb_master_key mkey)
494ebfedea0SLionel Sambuc {
495ebfedea0SLionel Sambuc krb5_error_code ret;
496ebfedea0SLionel Sambuc krb5_data res;
497ebfedea0SLionel Sambuc hdb_master_key key;
498ebfedea0SLionel Sambuc
499ebfedea0SLionel Sambuc if(k->mkvno != NULL)
500ebfedea0SLionel Sambuc return 0;
501ebfedea0SLionel Sambuc
502ebfedea0SLionel Sambuc key = _hdb_find_master_key(k->mkvno, mkey);
503ebfedea0SLionel Sambuc
504ebfedea0SLionel Sambuc if (key == NULL)
505ebfedea0SLionel Sambuc return HDB_ERR_NO_MKEY;
506ebfedea0SLionel Sambuc
507ebfedea0SLionel Sambuc ret = _hdb_mkey_encrypt(context, key, HDB_KU_MKEY,
508ebfedea0SLionel Sambuc k->key.keyvalue.data,
509ebfedea0SLionel Sambuc k->key.keyvalue.length,
510ebfedea0SLionel Sambuc &res);
511ebfedea0SLionel Sambuc if (ret)
512ebfedea0SLionel Sambuc return ret;
513ebfedea0SLionel Sambuc
514ebfedea0SLionel Sambuc memset(k->key.keyvalue.data, 0, k->key.keyvalue.length);
515ebfedea0SLionel Sambuc free(k->key.keyvalue.data);
516ebfedea0SLionel Sambuc k->key.keyvalue = res;
517ebfedea0SLionel Sambuc
518ebfedea0SLionel Sambuc if (k->mkvno == NULL) {
519ebfedea0SLionel Sambuc k->mkvno = malloc(sizeof(*k->mkvno));
520ebfedea0SLionel Sambuc if (k->mkvno == NULL)
521ebfedea0SLionel Sambuc return ENOMEM;
522ebfedea0SLionel Sambuc }
523ebfedea0SLionel Sambuc *k->mkvno = key->keytab.vno;
524ebfedea0SLionel Sambuc
525ebfedea0SLionel Sambuc return 0;
526ebfedea0SLionel Sambuc }
527ebfedea0SLionel Sambuc
528ebfedea0SLionel Sambuc krb5_error_code
hdb_seal_keys_mkey(krb5_context context,hdb_entry * ent,hdb_master_key mkey)529ebfedea0SLionel Sambuc hdb_seal_keys_mkey(krb5_context context, hdb_entry *ent, hdb_master_key mkey)
530ebfedea0SLionel Sambuc {
531*0a6a1f1dSLionel Sambuc size_t i;
532ebfedea0SLionel Sambuc for(i = 0; i < ent->keys.len; i++){
533ebfedea0SLionel Sambuc krb5_error_code ret;
534ebfedea0SLionel Sambuc
535ebfedea0SLionel Sambuc ret = hdb_seal_key_mkey(context, &ent->keys.val[i], mkey);
536ebfedea0SLionel Sambuc if (ret)
537ebfedea0SLionel Sambuc return ret;
538ebfedea0SLionel Sambuc }
539ebfedea0SLionel Sambuc return 0;
540ebfedea0SLionel Sambuc }
541ebfedea0SLionel Sambuc
542ebfedea0SLionel Sambuc krb5_error_code
hdb_seal_keys(krb5_context context,HDB * db,hdb_entry * ent)543ebfedea0SLionel Sambuc hdb_seal_keys(krb5_context context, HDB *db, hdb_entry *ent)
544ebfedea0SLionel Sambuc {
545ebfedea0SLionel Sambuc if (db->hdb_master_key_set == 0)
546ebfedea0SLionel Sambuc return 0;
547ebfedea0SLionel Sambuc
548ebfedea0SLionel Sambuc return hdb_seal_keys_mkey(context, ent, db->hdb_master_key);
549ebfedea0SLionel Sambuc }
550ebfedea0SLionel Sambuc
551ebfedea0SLionel Sambuc krb5_error_code
hdb_seal_key(krb5_context context,HDB * db,Key * k)552ebfedea0SLionel Sambuc hdb_seal_key(krb5_context context, HDB *db, Key *k)
553ebfedea0SLionel Sambuc {
554ebfedea0SLionel Sambuc if (db->hdb_master_key_set == 0)
555ebfedea0SLionel Sambuc return 0;
556ebfedea0SLionel Sambuc
557ebfedea0SLionel Sambuc return hdb_seal_key_mkey(context, k, db->hdb_master_key);
558ebfedea0SLionel Sambuc }
559ebfedea0SLionel Sambuc
560ebfedea0SLionel Sambuc krb5_error_code
hdb_set_master_key(krb5_context context,HDB * db,krb5_keyblock * key)561ebfedea0SLionel Sambuc hdb_set_master_key (krb5_context context,
562ebfedea0SLionel Sambuc HDB *db,
563ebfedea0SLionel Sambuc krb5_keyblock *key)
564ebfedea0SLionel Sambuc {
565ebfedea0SLionel Sambuc krb5_error_code ret;
566ebfedea0SLionel Sambuc hdb_master_key mkey;
567ebfedea0SLionel Sambuc
568ebfedea0SLionel Sambuc ret = hdb_process_master_key(context, 0, key, 0, &mkey);
569ebfedea0SLionel Sambuc if (ret)
570ebfedea0SLionel Sambuc return ret;
571ebfedea0SLionel Sambuc db->hdb_master_key = mkey;
572ebfedea0SLionel Sambuc #if 0 /* XXX - why? */
573ebfedea0SLionel Sambuc des_set_random_generator_seed(key.keyvalue.data);
574ebfedea0SLionel Sambuc #endif
575ebfedea0SLionel Sambuc db->hdb_master_key_set = 1;
576ebfedea0SLionel Sambuc return 0;
577ebfedea0SLionel Sambuc }
578ebfedea0SLionel Sambuc
579ebfedea0SLionel Sambuc krb5_error_code
hdb_set_master_keyfile(krb5_context context,HDB * db,const char * keyfile)580ebfedea0SLionel Sambuc hdb_set_master_keyfile (krb5_context context,
581ebfedea0SLionel Sambuc HDB *db,
582ebfedea0SLionel Sambuc const char *keyfile)
583ebfedea0SLionel Sambuc {
584ebfedea0SLionel Sambuc hdb_master_key key;
585ebfedea0SLionel Sambuc krb5_error_code ret;
586ebfedea0SLionel Sambuc
587ebfedea0SLionel Sambuc ret = hdb_read_master_key(context, keyfile, &key);
588ebfedea0SLionel Sambuc if (ret) {
589ebfedea0SLionel Sambuc if (ret != ENOENT)
590ebfedea0SLionel Sambuc return ret;
591ebfedea0SLionel Sambuc krb5_clear_error_message(context);
592ebfedea0SLionel Sambuc return 0;
593ebfedea0SLionel Sambuc }
594ebfedea0SLionel Sambuc db->hdb_master_key = key;
595ebfedea0SLionel Sambuc db->hdb_master_key_set = 1;
596ebfedea0SLionel Sambuc return ret;
597ebfedea0SLionel Sambuc }
598ebfedea0SLionel Sambuc
599ebfedea0SLionel Sambuc krb5_error_code
hdb_clear_master_key(krb5_context context,HDB * db)600ebfedea0SLionel Sambuc hdb_clear_master_key (krb5_context context,
601ebfedea0SLionel Sambuc HDB *db)
602ebfedea0SLionel Sambuc {
603ebfedea0SLionel Sambuc if (db->hdb_master_key_set) {
604ebfedea0SLionel Sambuc hdb_free_master_key(context, db->hdb_master_key);
605ebfedea0SLionel Sambuc db->hdb_master_key_set = 0;
606ebfedea0SLionel Sambuc }
607ebfedea0SLionel Sambuc return 0;
608ebfedea0SLionel Sambuc }
609