xref: /minix3/crypto/external/bsd/heimdal/dist/lib/krb5/keyblock.c (revision ebfedea0ce5bbe81e252ddf32d732e40fb633fae)
1*ebfedea0SLionel Sambuc /*	$NetBSD: keyblock.c,v 1.1.1.1 2011/04/13 18:15:34 elric Exp $	*/
2*ebfedea0SLionel Sambuc 
3*ebfedea0SLionel Sambuc /*
4*ebfedea0SLionel Sambuc  * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan
5*ebfedea0SLionel Sambuc  * (Royal Institute of Technology, Stockholm, Sweden).
6*ebfedea0SLionel Sambuc  * All rights reserved.
7*ebfedea0SLionel Sambuc  *
8*ebfedea0SLionel Sambuc  * Redistribution and use in source and binary forms, with or without
9*ebfedea0SLionel Sambuc  * modification, are permitted provided that the following conditions
10*ebfedea0SLionel Sambuc  * are met:
11*ebfedea0SLionel Sambuc  *
12*ebfedea0SLionel Sambuc  * 1. Redistributions of source code must retain the above copyright
13*ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer.
14*ebfedea0SLionel Sambuc  *
15*ebfedea0SLionel Sambuc  * 2. Redistributions in binary form must reproduce the above copyright
16*ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer in the
17*ebfedea0SLionel Sambuc  *    documentation and/or other materials provided with the distribution.
18*ebfedea0SLionel Sambuc  *
19*ebfedea0SLionel Sambuc  * 3. Neither the name of the Institute nor the names of its contributors
20*ebfedea0SLionel Sambuc  *    may be used to endorse or promote products derived from this software
21*ebfedea0SLionel Sambuc  *    without specific prior written permission.
22*ebfedea0SLionel Sambuc  *
23*ebfedea0SLionel Sambuc  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24*ebfedea0SLionel Sambuc  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25*ebfedea0SLionel Sambuc  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26*ebfedea0SLionel Sambuc  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27*ebfedea0SLionel Sambuc  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28*ebfedea0SLionel Sambuc  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29*ebfedea0SLionel Sambuc  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30*ebfedea0SLionel Sambuc  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31*ebfedea0SLionel Sambuc  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32*ebfedea0SLionel Sambuc  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33*ebfedea0SLionel Sambuc  * SUCH DAMAGE.
34*ebfedea0SLionel Sambuc  */
35*ebfedea0SLionel Sambuc 
36*ebfedea0SLionel Sambuc #include "krb5_locl.h"
37*ebfedea0SLionel Sambuc 
38*ebfedea0SLionel Sambuc /**
39*ebfedea0SLionel Sambuc  * Zero out a keyblock
40*ebfedea0SLionel Sambuc  *
41*ebfedea0SLionel Sambuc  * @param keyblock keyblock to zero out
42*ebfedea0SLionel Sambuc  *
43*ebfedea0SLionel Sambuc  * @ingroup krb5_crypto
44*ebfedea0SLionel Sambuc  */
45*ebfedea0SLionel Sambuc 
46*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION void KRB5_LIB_CALL
47*ebfedea0SLionel Sambuc krb5_keyblock_zero(krb5_keyblock *keyblock)
48*ebfedea0SLionel Sambuc {
49*ebfedea0SLionel Sambuc     keyblock->keytype = 0;
50*ebfedea0SLionel Sambuc     krb5_data_zero(&keyblock->keyvalue);
51*ebfedea0SLionel Sambuc }
52*ebfedea0SLionel Sambuc 
53*ebfedea0SLionel Sambuc /**
54*ebfedea0SLionel Sambuc  * Free a keyblock's content, also zero out the content of the keyblock.
55*ebfedea0SLionel Sambuc  *
56*ebfedea0SLionel Sambuc  * @param context a Kerberos 5 context
57*ebfedea0SLionel Sambuc  * @param keyblock keyblock content to free, NULL is valid argument
58*ebfedea0SLionel Sambuc  *
59*ebfedea0SLionel Sambuc  * @ingroup krb5_crypto
60*ebfedea0SLionel Sambuc  */
61*ebfedea0SLionel Sambuc 
62*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION void KRB5_LIB_CALL
63*ebfedea0SLionel Sambuc krb5_free_keyblock_contents(krb5_context context,
64*ebfedea0SLionel Sambuc 			    krb5_keyblock *keyblock)
65*ebfedea0SLionel Sambuc {
66*ebfedea0SLionel Sambuc     if(keyblock) {
67*ebfedea0SLionel Sambuc 	if (keyblock->keyvalue.data != NULL)
68*ebfedea0SLionel Sambuc 	    memset(keyblock->keyvalue.data, 0, keyblock->keyvalue.length);
69*ebfedea0SLionel Sambuc 	krb5_data_free (&keyblock->keyvalue);
70*ebfedea0SLionel Sambuc 	keyblock->keytype = ENCTYPE_NULL;
71*ebfedea0SLionel Sambuc     }
72*ebfedea0SLionel Sambuc }
73*ebfedea0SLionel Sambuc 
74*ebfedea0SLionel Sambuc /**
75*ebfedea0SLionel Sambuc  * Free a keyblock, also zero out the content of the keyblock, uses
76*ebfedea0SLionel Sambuc  * krb5_free_keyblock_contents() to free the content.
77*ebfedea0SLionel Sambuc  *
78*ebfedea0SLionel Sambuc  * @param context a Kerberos 5 context
79*ebfedea0SLionel Sambuc  * @param keyblock keyblock to free, NULL is valid argument
80*ebfedea0SLionel Sambuc  *
81*ebfedea0SLionel Sambuc  * @ingroup krb5_crypto
82*ebfedea0SLionel Sambuc  */
83*ebfedea0SLionel Sambuc 
84*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION void KRB5_LIB_CALL
85*ebfedea0SLionel Sambuc krb5_free_keyblock(krb5_context context,
86*ebfedea0SLionel Sambuc 		   krb5_keyblock *keyblock)
87*ebfedea0SLionel Sambuc {
88*ebfedea0SLionel Sambuc     if(keyblock){
89*ebfedea0SLionel Sambuc 	krb5_free_keyblock_contents(context, keyblock);
90*ebfedea0SLionel Sambuc 	free(keyblock);
91*ebfedea0SLionel Sambuc     }
92*ebfedea0SLionel Sambuc }
93*ebfedea0SLionel Sambuc 
94*ebfedea0SLionel Sambuc /**
95*ebfedea0SLionel Sambuc  * Copy a keyblock, free the output keyblock with
96*ebfedea0SLionel Sambuc  * krb5_free_keyblock_contents().
97*ebfedea0SLionel Sambuc  *
98*ebfedea0SLionel Sambuc  * @param context a Kerberos 5 context
99*ebfedea0SLionel Sambuc  * @param inblock the key to copy
100*ebfedea0SLionel Sambuc  * @param to the output key.
101*ebfedea0SLionel Sambuc  *
102*ebfedea0SLionel Sambuc  * @return 0 on success or a Kerberos 5 error code
103*ebfedea0SLionel Sambuc  *
104*ebfedea0SLionel Sambuc  * @ingroup krb5_crypto
105*ebfedea0SLionel Sambuc  */
106*ebfedea0SLionel Sambuc 
107*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
108*ebfedea0SLionel Sambuc krb5_copy_keyblock_contents (krb5_context context,
109*ebfedea0SLionel Sambuc 			     const krb5_keyblock *inblock,
110*ebfedea0SLionel Sambuc 			     krb5_keyblock *to)
111*ebfedea0SLionel Sambuc {
112*ebfedea0SLionel Sambuc     return copy_EncryptionKey(inblock, to);
113*ebfedea0SLionel Sambuc }
114*ebfedea0SLionel Sambuc 
115*ebfedea0SLionel Sambuc /**
116*ebfedea0SLionel Sambuc  * Copy a keyblock, free the output keyblock with
117*ebfedea0SLionel Sambuc  * krb5_free_keyblock().
118*ebfedea0SLionel Sambuc  *
119*ebfedea0SLionel Sambuc  * @param context a Kerberos 5 context
120*ebfedea0SLionel Sambuc  * @param inblock the key to copy
121*ebfedea0SLionel Sambuc  * @param to the output key.
122*ebfedea0SLionel Sambuc  *
123*ebfedea0SLionel Sambuc  * @return 0 on success or a Kerberos 5 error code
124*ebfedea0SLionel Sambuc  *
125*ebfedea0SLionel Sambuc  * @ingroup krb5_crypto
126*ebfedea0SLionel Sambuc  */
127*ebfedea0SLionel Sambuc 
128*ebfedea0SLionel Sambuc 
129*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
130*ebfedea0SLionel Sambuc krb5_copy_keyblock (krb5_context context,
131*ebfedea0SLionel Sambuc 		    const krb5_keyblock *inblock,
132*ebfedea0SLionel Sambuc 		    krb5_keyblock **to)
133*ebfedea0SLionel Sambuc {
134*ebfedea0SLionel Sambuc     krb5_error_code ret;
135*ebfedea0SLionel Sambuc     krb5_keyblock *k;
136*ebfedea0SLionel Sambuc 
137*ebfedea0SLionel Sambuc     *to = NULL;
138*ebfedea0SLionel Sambuc 
139*ebfedea0SLionel Sambuc     k = calloc (1, sizeof(*k));
140*ebfedea0SLionel Sambuc     if (k == NULL) {
141*ebfedea0SLionel Sambuc 	krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
142*ebfedea0SLionel Sambuc 	return ENOMEM;
143*ebfedea0SLionel Sambuc     }
144*ebfedea0SLionel Sambuc 
145*ebfedea0SLionel Sambuc     ret = krb5_copy_keyblock_contents (context, inblock, k);
146*ebfedea0SLionel Sambuc     if (ret) {
147*ebfedea0SLionel Sambuc       free(k);
148*ebfedea0SLionel Sambuc       return ret;
149*ebfedea0SLionel Sambuc     }
150*ebfedea0SLionel Sambuc     *to = k;
151*ebfedea0SLionel Sambuc     return 0;
152*ebfedea0SLionel Sambuc }
153*ebfedea0SLionel Sambuc 
154*ebfedea0SLionel Sambuc /**
155*ebfedea0SLionel Sambuc  * Get encryption type of a keyblock.
156*ebfedea0SLionel Sambuc  *
157*ebfedea0SLionel Sambuc  * @ingroup krb5_crypto
158*ebfedea0SLionel Sambuc  */
159*ebfedea0SLionel Sambuc 
160*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION krb5_enctype KRB5_LIB_CALL
161*ebfedea0SLionel Sambuc krb5_keyblock_get_enctype(const krb5_keyblock *block)
162*ebfedea0SLionel Sambuc {
163*ebfedea0SLionel Sambuc     return block->keytype;
164*ebfedea0SLionel Sambuc }
165*ebfedea0SLionel Sambuc 
166*ebfedea0SLionel Sambuc /**
167*ebfedea0SLionel Sambuc  * Fill in `key' with key data of type `enctype' from `data' of length
168*ebfedea0SLionel Sambuc  * `size'. Key should be freed using krb5_free_keyblock_contents().
169*ebfedea0SLionel Sambuc  *
170*ebfedea0SLionel Sambuc  * @return 0 on success or a Kerberos 5 error code
171*ebfedea0SLionel Sambuc  *
172*ebfedea0SLionel Sambuc  * @ingroup krb5_crypto
173*ebfedea0SLionel Sambuc  */
174*ebfedea0SLionel Sambuc 
175*ebfedea0SLionel Sambuc KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
176*ebfedea0SLionel Sambuc krb5_keyblock_init(krb5_context context,
177*ebfedea0SLionel Sambuc 		   krb5_enctype type,
178*ebfedea0SLionel Sambuc 		   const void *data,
179*ebfedea0SLionel Sambuc 		   size_t size,
180*ebfedea0SLionel Sambuc 		   krb5_keyblock *key)
181*ebfedea0SLionel Sambuc {
182*ebfedea0SLionel Sambuc     krb5_error_code ret;
183*ebfedea0SLionel Sambuc     size_t len;
184*ebfedea0SLionel Sambuc 
185*ebfedea0SLionel Sambuc     memset(key, 0, sizeof(*key));
186*ebfedea0SLionel Sambuc 
187*ebfedea0SLionel Sambuc     ret = krb5_enctype_keysize(context, type, &len);
188*ebfedea0SLionel Sambuc     if (ret)
189*ebfedea0SLionel Sambuc 	return ret;
190*ebfedea0SLionel Sambuc 
191*ebfedea0SLionel Sambuc     if (len != size) {
192*ebfedea0SLionel Sambuc 	krb5_set_error_message(context, KRB5_PROG_ETYPE_NOSUPP,
193*ebfedea0SLionel Sambuc 			       "Encryption key %d is %lu bytes "
194*ebfedea0SLionel Sambuc 			       "long, %lu was passed in",
195*ebfedea0SLionel Sambuc 			       type, (unsigned long)len, (unsigned long)size);
196*ebfedea0SLionel Sambuc 	return KRB5_PROG_ETYPE_NOSUPP;
197*ebfedea0SLionel Sambuc     }
198*ebfedea0SLionel Sambuc     ret = krb5_data_copy(&key->keyvalue, data, len);
199*ebfedea0SLionel Sambuc     if(ret) {
200*ebfedea0SLionel Sambuc 	krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
201*ebfedea0SLionel Sambuc 	return ret;
202*ebfedea0SLionel Sambuc     }
203*ebfedea0SLionel Sambuc     key->keytype = type;
204*ebfedea0SLionel Sambuc 
205*ebfedea0SLionel Sambuc     return 0;
206*ebfedea0SLionel Sambuc }
207