xref: /minix3/crypto/external/bsd/heimdal/dist/lib/krb5/salt-des3.c (revision ebfedea0ce5bbe81e252ddf32d732e40fb633fae)
1*ebfedea0SLionel Sambuc /*	$NetBSD: salt-des3.c,v 1.1.1.1 2011/04/13 18:15:37 elric Exp $	*/
2*ebfedea0SLionel Sambuc 
3*ebfedea0SLionel Sambuc /*
4*ebfedea0SLionel Sambuc  * Copyright (c) 1997 - 2008 Kungliga Tekniska Högskolan
5*ebfedea0SLionel Sambuc  * (Royal Institute of Technology, Stockholm, Sweden).
6*ebfedea0SLionel Sambuc  * All rights reserved.
7*ebfedea0SLionel Sambuc  *
8*ebfedea0SLionel Sambuc  * Redistribution and use in source and binary forms, with or without
9*ebfedea0SLionel Sambuc  * modification, are permitted provided that the following conditions
10*ebfedea0SLionel Sambuc  * are met:
11*ebfedea0SLionel Sambuc  *
12*ebfedea0SLionel Sambuc  * 1. Redistributions of source code must retain the above copyright
13*ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer.
14*ebfedea0SLionel Sambuc  *
15*ebfedea0SLionel Sambuc  * 2. Redistributions in binary form must reproduce the above copyright
16*ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer in the
17*ebfedea0SLionel Sambuc  *    documentation and/or other materials provided with the distribution.
18*ebfedea0SLionel Sambuc  *
19*ebfedea0SLionel Sambuc  * 3. Neither the name of the Institute nor the names of its contributors
20*ebfedea0SLionel Sambuc  *    may be used to endorse or promote products derived from this software
21*ebfedea0SLionel Sambuc  *    without specific prior written permission.
22*ebfedea0SLionel Sambuc  *
23*ebfedea0SLionel Sambuc  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24*ebfedea0SLionel Sambuc  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25*ebfedea0SLionel Sambuc  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26*ebfedea0SLionel Sambuc  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27*ebfedea0SLionel Sambuc  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28*ebfedea0SLionel Sambuc  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29*ebfedea0SLionel Sambuc  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30*ebfedea0SLionel Sambuc  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31*ebfedea0SLionel Sambuc  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32*ebfedea0SLionel Sambuc  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33*ebfedea0SLionel Sambuc  * SUCH DAMAGE.
34*ebfedea0SLionel Sambuc  */
35*ebfedea0SLionel Sambuc 
36*ebfedea0SLionel Sambuc #include "krb5_locl.h"
37*ebfedea0SLionel Sambuc 
38*ebfedea0SLionel Sambuc #ifdef DES3_OLD_ENCTYPE
39*ebfedea0SLionel Sambuc static krb5_error_code
DES3_string_to_key(krb5_context context,krb5_enctype enctype,krb5_data password,krb5_salt salt,krb5_data opaque,krb5_keyblock * key)40*ebfedea0SLionel Sambuc DES3_string_to_key(krb5_context context,
41*ebfedea0SLionel Sambuc 		   krb5_enctype enctype,
42*ebfedea0SLionel Sambuc 		   krb5_data password,
43*ebfedea0SLionel Sambuc 		   krb5_salt salt,
44*ebfedea0SLionel Sambuc 		   krb5_data opaque,
45*ebfedea0SLionel Sambuc 		   krb5_keyblock *key)
46*ebfedea0SLionel Sambuc {
47*ebfedea0SLionel Sambuc     char *str;
48*ebfedea0SLionel Sambuc     size_t len;
49*ebfedea0SLionel Sambuc     unsigned char tmp[24];
50*ebfedea0SLionel Sambuc     DES_cblock keys[3];
51*ebfedea0SLionel Sambuc     krb5_error_code ret;
52*ebfedea0SLionel Sambuc 
53*ebfedea0SLionel Sambuc     len = password.length + salt.saltvalue.length;
54*ebfedea0SLionel Sambuc     str = malloc(len);
55*ebfedea0SLionel Sambuc     if(len != 0 && str == NULL) {
56*ebfedea0SLionel Sambuc 	krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
57*ebfedea0SLionel Sambuc 	return ENOMEM;
58*ebfedea0SLionel Sambuc     }
59*ebfedea0SLionel Sambuc     memcpy(str, password.data, password.length);
60*ebfedea0SLionel Sambuc     memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length);
61*ebfedea0SLionel Sambuc     {
62*ebfedea0SLionel Sambuc 	DES_cblock ivec;
63*ebfedea0SLionel Sambuc 	DES_key_schedule s[3];
64*ebfedea0SLionel Sambuc 	int i;
65*ebfedea0SLionel Sambuc 
66*ebfedea0SLionel Sambuc 	ret = _krb5_n_fold(str, len, tmp, 24);
67*ebfedea0SLionel Sambuc 	if (ret) {
68*ebfedea0SLionel Sambuc 	    memset(str, 0, len);
69*ebfedea0SLionel Sambuc 	    free(str);
70*ebfedea0SLionel Sambuc 	    krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
71*ebfedea0SLionel Sambuc 	    return ret;
72*ebfedea0SLionel Sambuc 	}
73*ebfedea0SLionel Sambuc 
74*ebfedea0SLionel Sambuc 	for(i = 0; i < 3; i++){
75*ebfedea0SLionel Sambuc 	    memcpy(keys + i, tmp + i * 8, sizeof(keys[i]));
76*ebfedea0SLionel Sambuc 	    DES_set_odd_parity(keys + i);
77*ebfedea0SLionel Sambuc 	    if(DES_is_weak_key(keys + i))
78*ebfedea0SLionel Sambuc 		_krb5_xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0");
79*ebfedea0SLionel Sambuc 	    DES_set_key_unchecked(keys + i, &s[i]);
80*ebfedea0SLionel Sambuc 	}
81*ebfedea0SLionel Sambuc 	memset(&ivec, 0, sizeof(ivec));
82*ebfedea0SLionel Sambuc 	DES_ede3_cbc_encrypt(tmp,
83*ebfedea0SLionel Sambuc 			     tmp, sizeof(tmp),
84*ebfedea0SLionel Sambuc 			     &s[0], &s[1], &s[2], &ivec, DES_ENCRYPT);
85*ebfedea0SLionel Sambuc 	memset(s, 0, sizeof(s));
86*ebfedea0SLionel Sambuc 	memset(&ivec, 0, sizeof(ivec));
87*ebfedea0SLionel Sambuc 	for(i = 0; i < 3; i++){
88*ebfedea0SLionel Sambuc 	    memcpy(keys + i, tmp + i * 8, sizeof(keys[i]));
89*ebfedea0SLionel Sambuc 	    DES_set_odd_parity(keys + i);
90*ebfedea0SLionel Sambuc 	    if(DES_is_weak_key(keys + i))
91*ebfedea0SLionel Sambuc 		_krb5_xor(keys + i, (const unsigned char*)"\0\0\0\0\0\0\0\xf0");
92*ebfedea0SLionel Sambuc 	}
93*ebfedea0SLionel Sambuc 	memset(tmp, 0, sizeof(tmp));
94*ebfedea0SLionel Sambuc     }
95*ebfedea0SLionel Sambuc     key->keytype = enctype;
96*ebfedea0SLionel Sambuc     krb5_data_copy(&key->keyvalue, keys, sizeof(keys));
97*ebfedea0SLionel Sambuc     memset(keys, 0, sizeof(keys));
98*ebfedea0SLionel Sambuc     memset(str, 0, len);
99*ebfedea0SLionel Sambuc     free(str);
100*ebfedea0SLionel Sambuc     return 0;
101*ebfedea0SLionel Sambuc }
102*ebfedea0SLionel Sambuc #endif
103*ebfedea0SLionel Sambuc 
104*ebfedea0SLionel Sambuc static krb5_error_code
DES3_string_to_key_derived(krb5_context context,krb5_enctype enctype,krb5_data password,krb5_salt salt,krb5_data opaque,krb5_keyblock * key)105*ebfedea0SLionel Sambuc DES3_string_to_key_derived(krb5_context context,
106*ebfedea0SLionel Sambuc 			   krb5_enctype enctype,
107*ebfedea0SLionel Sambuc 			   krb5_data password,
108*ebfedea0SLionel Sambuc 			   krb5_salt salt,
109*ebfedea0SLionel Sambuc 			   krb5_data opaque,
110*ebfedea0SLionel Sambuc 			   krb5_keyblock *key)
111*ebfedea0SLionel Sambuc {
112*ebfedea0SLionel Sambuc     krb5_error_code ret;
113*ebfedea0SLionel Sambuc     size_t len = password.length + salt.saltvalue.length;
114*ebfedea0SLionel Sambuc     char *s;
115*ebfedea0SLionel Sambuc 
116*ebfedea0SLionel Sambuc     s = malloc(len);
117*ebfedea0SLionel Sambuc     if(len != 0 && s == NULL) {
118*ebfedea0SLionel Sambuc 	krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
119*ebfedea0SLionel Sambuc 	return ENOMEM;
120*ebfedea0SLionel Sambuc     }
121*ebfedea0SLionel Sambuc     memcpy(s, password.data, password.length);
122*ebfedea0SLionel Sambuc     memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length);
123*ebfedea0SLionel Sambuc     ret = krb5_string_to_key_derived(context,
124*ebfedea0SLionel Sambuc 				     s,
125*ebfedea0SLionel Sambuc 				     len,
126*ebfedea0SLionel Sambuc 				     enctype,
127*ebfedea0SLionel Sambuc 				     key);
128*ebfedea0SLionel Sambuc     memset(s, 0, len);
129*ebfedea0SLionel Sambuc     free(s);
130*ebfedea0SLionel Sambuc     return ret;
131*ebfedea0SLionel Sambuc }
132*ebfedea0SLionel Sambuc 
133*ebfedea0SLionel Sambuc 
134*ebfedea0SLionel Sambuc #ifdef DES3_OLD_ENCTYPE
135*ebfedea0SLionel Sambuc struct salt_type _krb5_des3_salt[] = {
136*ebfedea0SLionel Sambuc     {
137*ebfedea0SLionel Sambuc 	KRB5_PW_SALT,
138*ebfedea0SLionel Sambuc 	"pw-salt",
139*ebfedea0SLionel Sambuc 	DES3_string_to_key
140*ebfedea0SLionel Sambuc     },
141*ebfedea0SLionel Sambuc     { 0 }
142*ebfedea0SLionel Sambuc };
143*ebfedea0SLionel Sambuc #endif
144*ebfedea0SLionel Sambuc 
145*ebfedea0SLionel Sambuc struct salt_type _krb5_des3_salt_derived[] = {
146*ebfedea0SLionel Sambuc     {
147*ebfedea0SLionel Sambuc 	KRB5_PW_SALT,
148*ebfedea0SLionel Sambuc 	"pw-salt",
149*ebfedea0SLionel Sambuc 	DES3_string_to_key_derived
150*ebfedea0SLionel Sambuc     },
151*ebfedea0SLionel Sambuc     { 0 }
152*ebfedea0SLionel Sambuc };
153