1*ebfedea0SLionel Sambuc /* $NetBSD: keyblock.c,v 1.1.1.1 2011/04/13 18:15:34 elric Exp $ */ 2*ebfedea0SLionel Sambuc 3*ebfedea0SLionel Sambuc /* 4*ebfedea0SLionel Sambuc * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan 5*ebfedea0SLionel Sambuc * (Royal Institute of Technology, Stockholm, Sweden). 6*ebfedea0SLionel Sambuc * All rights reserved. 7*ebfedea0SLionel Sambuc * 8*ebfedea0SLionel Sambuc * Redistribution and use in source and binary forms, with or without 9*ebfedea0SLionel Sambuc * modification, are permitted provided that the following conditions 10*ebfedea0SLionel Sambuc * are met: 11*ebfedea0SLionel Sambuc * 12*ebfedea0SLionel Sambuc * 1. Redistributions of source code must retain the above copyright 13*ebfedea0SLionel Sambuc * notice, this list of conditions and the following disclaimer. 14*ebfedea0SLionel Sambuc * 15*ebfedea0SLionel Sambuc * 2. Redistributions in binary form must reproduce the above copyright 16*ebfedea0SLionel Sambuc * notice, this list of conditions and the following disclaimer in the 17*ebfedea0SLionel Sambuc * documentation and/or other materials provided with the distribution. 18*ebfedea0SLionel Sambuc * 19*ebfedea0SLionel Sambuc * 3. Neither the name of the Institute nor the names of its contributors 20*ebfedea0SLionel Sambuc * may be used to endorse or promote products derived from this software 21*ebfedea0SLionel Sambuc * without specific prior written permission. 22*ebfedea0SLionel Sambuc * 23*ebfedea0SLionel Sambuc * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 24*ebfedea0SLionel Sambuc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25*ebfedea0SLionel Sambuc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26*ebfedea0SLionel Sambuc * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 27*ebfedea0SLionel Sambuc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28*ebfedea0SLionel Sambuc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29*ebfedea0SLionel Sambuc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30*ebfedea0SLionel Sambuc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31*ebfedea0SLionel Sambuc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32*ebfedea0SLionel Sambuc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33*ebfedea0SLionel Sambuc * SUCH DAMAGE. 34*ebfedea0SLionel Sambuc */ 35*ebfedea0SLionel Sambuc 36*ebfedea0SLionel Sambuc #include "krb5_locl.h" 37*ebfedea0SLionel Sambuc 38*ebfedea0SLionel Sambuc /** 39*ebfedea0SLionel Sambuc * Zero out a keyblock 40*ebfedea0SLionel Sambuc * 41*ebfedea0SLionel Sambuc * @param keyblock keyblock to zero out 42*ebfedea0SLionel Sambuc * 43*ebfedea0SLionel Sambuc * @ingroup krb5_crypto 44*ebfedea0SLionel Sambuc */ 45*ebfedea0SLionel Sambuc 46*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION void KRB5_LIB_CALL 47*ebfedea0SLionel Sambuc krb5_keyblock_zero(krb5_keyblock *keyblock) 48*ebfedea0SLionel Sambuc { 49*ebfedea0SLionel Sambuc keyblock->keytype = 0; 50*ebfedea0SLionel Sambuc krb5_data_zero(&keyblock->keyvalue); 51*ebfedea0SLionel Sambuc } 52*ebfedea0SLionel Sambuc 53*ebfedea0SLionel Sambuc /** 54*ebfedea0SLionel Sambuc * Free a keyblock's content, also zero out the content of the keyblock. 55*ebfedea0SLionel Sambuc * 56*ebfedea0SLionel Sambuc * @param context a Kerberos 5 context 57*ebfedea0SLionel Sambuc * @param keyblock keyblock content to free, NULL is valid argument 58*ebfedea0SLionel Sambuc * 59*ebfedea0SLionel Sambuc * @ingroup krb5_crypto 60*ebfedea0SLionel Sambuc */ 61*ebfedea0SLionel Sambuc 62*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION void KRB5_LIB_CALL 63*ebfedea0SLionel Sambuc krb5_free_keyblock_contents(krb5_context context, 64*ebfedea0SLionel Sambuc krb5_keyblock *keyblock) 65*ebfedea0SLionel Sambuc { 66*ebfedea0SLionel Sambuc if(keyblock) { 67*ebfedea0SLionel Sambuc if (keyblock->keyvalue.data != NULL) 68*ebfedea0SLionel Sambuc memset(keyblock->keyvalue.data, 0, keyblock->keyvalue.length); 69*ebfedea0SLionel Sambuc krb5_data_free (&keyblock->keyvalue); 70*ebfedea0SLionel Sambuc keyblock->keytype = ENCTYPE_NULL; 71*ebfedea0SLionel Sambuc } 72*ebfedea0SLionel Sambuc } 73*ebfedea0SLionel Sambuc 74*ebfedea0SLionel Sambuc /** 75*ebfedea0SLionel Sambuc * Free a keyblock, also zero out the content of the keyblock, uses 76*ebfedea0SLionel Sambuc * krb5_free_keyblock_contents() to free the content. 77*ebfedea0SLionel Sambuc * 78*ebfedea0SLionel Sambuc * @param context a Kerberos 5 context 79*ebfedea0SLionel Sambuc * @param keyblock keyblock to free, NULL is valid argument 80*ebfedea0SLionel Sambuc * 81*ebfedea0SLionel Sambuc * @ingroup krb5_crypto 82*ebfedea0SLionel Sambuc */ 83*ebfedea0SLionel Sambuc 84*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION void KRB5_LIB_CALL 85*ebfedea0SLionel Sambuc krb5_free_keyblock(krb5_context context, 86*ebfedea0SLionel Sambuc krb5_keyblock *keyblock) 87*ebfedea0SLionel Sambuc { 88*ebfedea0SLionel Sambuc if(keyblock){ 89*ebfedea0SLionel Sambuc krb5_free_keyblock_contents(context, keyblock); 90*ebfedea0SLionel Sambuc free(keyblock); 91*ebfedea0SLionel Sambuc } 92*ebfedea0SLionel Sambuc } 93*ebfedea0SLionel Sambuc 94*ebfedea0SLionel Sambuc /** 95*ebfedea0SLionel Sambuc * Copy a keyblock, free the output keyblock with 96*ebfedea0SLionel Sambuc * krb5_free_keyblock_contents(). 97*ebfedea0SLionel Sambuc * 98*ebfedea0SLionel Sambuc * @param context a Kerberos 5 context 99*ebfedea0SLionel Sambuc * @param inblock the key to copy 100*ebfedea0SLionel Sambuc * @param to the output key. 101*ebfedea0SLionel Sambuc * 102*ebfedea0SLionel Sambuc * @return 0 on success or a Kerberos 5 error code 103*ebfedea0SLionel Sambuc * 104*ebfedea0SLionel Sambuc * @ingroup krb5_crypto 105*ebfedea0SLionel Sambuc */ 106*ebfedea0SLionel Sambuc 107*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 108*ebfedea0SLionel Sambuc krb5_copy_keyblock_contents (krb5_context context, 109*ebfedea0SLionel Sambuc const krb5_keyblock *inblock, 110*ebfedea0SLionel Sambuc krb5_keyblock *to) 111*ebfedea0SLionel Sambuc { 112*ebfedea0SLionel Sambuc return copy_EncryptionKey(inblock, to); 113*ebfedea0SLionel Sambuc } 114*ebfedea0SLionel Sambuc 115*ebfedea0SLionel Sambuc /** 116*ebfedea0SLionel Sambuc * Copy a keyblock, free the output keyblock with 117*ebfedea0SLionel Sambuc * krb5_free_keyblock(). 118*ebfedea0SLionel Sambuc * 119*ebfedea0SLionel Sambuc * @param context a Kerberos 5 context 120*ebfedea0SLionel Sambuc * @param inblock the key to copy 121*ebfedea0SLionel Sambuc * @param to the output key. 122*ebfedea0SLionel Sambuc * 123*ebfedea0SLionel Sambuc * @return 0 on success or a Kerberos 5 error code 124*ebfedea0SLionel Sambuc * 125*ebfedea0SLionel Sambuc * @ingroup krb5_crypto 126*ebfedea0SLionel Sambuc */ 127*ebfedea0SLionel Sambuc 128*ebfedea0SLionel Sambuc 129*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 130*ebfedea0SLionel Sambuc krb5_copy_keyblock (krb5_context context, 131*ebfedea0SLionel Sambuc const krb5_keyblock *inblock, 132*ebfedea0SLionel Sambuc krb5_keyblock **to) 133*ebfedea0SLionel Sambuc { 134*ebfedea0SLionel Sambuc krb5_error_code ret; 135*ebfedea0SLionel Sambuc krb5_keyblock *k; 136*ebfedea0SLionel Sambuc 137*ebfedea0SLionel Sambuc *to = NULL; 138*ebfedea0SLionel Sambuc 139*ebfedea0SLionel Sambuc k = calloc (1, sizeof(*k)); 140*ebfedea0SLionel Sambuc if (k == NULL) { 141*ebfedea0SLionel Sambuc krb5_set_error_message(context, ENOMEM, "malloc: out of memory"); 142*ebfedea0SLionel Sambuc return ENOMEM; 143*ebfedea0SLionel Sambuc } 144*ebfedea0SLionel Sambuc 145*ebfedea0SLionel Sambuc ret = krb5_copy_keyblock_contents (context, inblock, k); 146*ebfedea0SLionel Sambuc if (ret) { 147*ebfedea0SLionel Sambuc free(k); 148*ebfedea0SLionel Sambuc return ret; 149*ebfedea0SLionel Sambuc } 150*ebfedea0SLionel Sambuc *to = k; 151*ebfedea0SLionel Sambuc return 0; 152*ebfedea0SLionel Sambuc } 153*ebfedea0SLionel Sambuc 154*ebfedea0SLionel Sambuc /** 155*ebfedea0SLionel Sambuc * Get encryption type of a keyblock. 156*ebfedea0SLionel Sambuc * 157*ebfedea0SLionel Sambuc * @ingroup krb5_crypto 158*ebfedea0SLionel Sambuc */ 159*ebfedea0SLionel Sambuc 160*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION krb5_enctype KRB5_LIB_CALL 161*ebfedea0SLionel Sambuc krb5_keyblock_get_enctype(const krb5_keyblock *block) 162*ebfedea0SLionel Sambuc { 163*ebfedea0SLionel Sambuc return block->keytype; 164*ebfedea0SLionel Sambuc } 165*ebfedea0SLionel Sambuc 166*ebfedea0SLionel Sambuc /** 167*ebfedea0SLionel Sambuc * Fill in `key' with key data of type `enctype' from `data' of length 168*ebfedea0SLionel Sambuc * `size'. Key should be freed using krb5_free_keyblock_contents(). 169*ebfedea0SLionel Sambuc * 170*ebfedea0SLionel Sambuc * @return 0 on success or a Kerberos 5 error code 171*ebfedea0SLionel Sambuc * 172*ebfedea0SLionel Sambuc * @ingroup krb5_crypto 173*ebfedea0SLionel Sambuc */ 174*ebfedea0SLionel Sambuc 175*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 176*ebfedea0SLionel Sambuc krb5_keyblock_init(krb5_context context, 177*ebfedea0SLionel Sambuc krb5_enctype type, 178*ebfedea0SLionel Sambuc const void *data, 179*ebfedea0SLionel Sambuc size_t size, 180*ebfedea0SLionel Sambuc krb5_keyblock *key) 181*ebfedea0SLionel Sambuc { 182*ebfedea0SLionel Sambuc krb5_error_code ret; 183*ebfedea0SLionel Sambuc size_t len; 184*ebfedea0SLionel Sambuc 185*ebfedea0SLionel Sambuc memset(key, 0, sizeof(*key)); 186*ebfedea0SLionel Sambuc 187*ebfedea0SLionel Sambuc ret = krb5_enctype_keysize(context, type, &len); 188*ebfedea0SLionel Sambuc if (ret) 189*ebfedea0SLionel Sambuc return ret; 190*ebfedea0SLionel Sambuc 191*ebfedea0SLionel Sambuc if (len != size) { 192*ebfedea0SLionel Sambuc krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP, 193*ebfedea0SLionel Sambuc "Encryption key %d is %lu bytes " 194*ebfedea0SLionel Sambuc "long, %lu was passed in", 195*ebfedea0SLionel Sambuc type, (unsigned long)len, (unsigned long)size); 196*ebfedea0SLionel Sambuc return KRB5_PROG_ETYPE_NOSUPP; 197*ebfedea0SLionel Sambuc } 198*ebfedea0SLionel Sambuc ret = krb5_data_copy(&key->keyvalue, data, len); 199*ebfedea0SLionel Sambuc if(ret) { 200*ebfedea0SLionel Sambuc krb5_set_error_message(context, ret, N_("malloc: out of memory", "")); 201*ebfedea0SLionel Sambuc return ret; 202*ebfedea0SLionel Sambuc } 203*ebfedea0SLionel Sambuc key->keytype = type; 204*ebfedea0SLionel Sambuc 205*ebfedea0SLionel Sambuc return 0; 206*ebfedea0SLionel Sambuc } 207