xref: /netbsd-src/crypto/external/bsd/heimdal/dist/lib/kadm5/randkey_c.c (revision d3273b5b76f5afaafe308cead5511dbb8df8c5e9)
1*d3273b5bSchristos /*	$NetBSD: randkey_c.c,v 1.2 2017/01/28 21:31:49 christos Exp $	*/
2ca1c9b0cSelric 
3ca1c9b0cSelric /*
4ca1c9b0cSelric  * Copyright (c) 1997 - 1999 Kungliga Tekniska Högskolan
5ca1c9b0cSelric  * (Royal Institute of Technology, Stockholm, Sweden).
6ca1c9b0cSelric  * All rights reserved.
7ca1c9b0cSelric  *
8ca1c9b0cSelric  * Redistribution and use in source and binary forms, with or without
9ca1c9b0cSelric  * modification, are permitted provided that the following conditions
10ca1c9b0cSelric  * are met:
11ca1c9b0cSelric  *
12ca1c9b0cSelric  * 1. Redistributions of source code must retain the above copyright
13ca1c9b0cSelric  *    notice, this list of conditions and the following disclaimer.
14ca1c9b0cSelric  *
15ca1c9b0cSelric  * 2. Redistributions in binary form must reproduce the above copyright
16ca1c9b0cSelric  *    notice, this list of conditions and the following disclaimer in the
17ca1c9b0cSelric  *    documentation and/or other materials provided with the distribution.
18ca1c9b0cSelric  *
19ca1c9b0cSelric  * 3. Neither the name of the Institute nor the names of its contributors
20ca1c9b0cSelric  *    may be used to endorse or promote products derived from this software
21ca1c9b0cSelric  *    without specific prior written permission.
22ca1c9b0cSelric  *
23ca1c9b0cSelric  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ca1c9b0cSelric  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ca1c9b0cSelric  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ca1c9b0cSelric  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ca1c9b0cSelric  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ca1c9b0cSelric  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ca1c9b0cSelric  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ca1c9b0cSelric  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ca1c9b0cSelric  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ca1c9b0cSelric  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ca1c9b0cSelric  * SUCH DAMAGE.
34ca1c9b0cSelric  */
35ca1c9b0cSelric 
36ca1c9b0cSelric #include "kadm5_locl.h"
37ca1c9b0cSelric 
38*d3273b5bSchristos __RCSID("$NetBSD: randkey_c.c,v 1.2 2017/01/28 21:31:49 christos Exp $");
39ca1c9b0cSelric 
40ca1c9b0cSelric kadm5_ret_t
kadm5_c_randkey_principal(void * server_handle,krb5_principal princ,krb5_boolean keepold,int n_ks_tuple,krb5_key_salt_tuple * ks_tuple,krb5_keyblock ** new_keys,int * n_keys)41ca1c9b0cSelric kadm5_c_randkey_principal(void *server_handle,
42ca1c9b0cSelric 			  krb5_principal princ,
43b9d004c6Schristos 			  krb5_boolean keepold,
44b9d004c6Schristos 			  int n_ks_tuple,
45b9d004c6Schristos 			  krb5_key_salt_tuple *ks_tuple,
46ca1c9b0cSelric 			  krb5_keyblock **new_keys,
47ca1c9b0cSelric 			  int *n_keys)
48ca1c9b0cSelric {
49ca1c9b0cSelric     kadm5_client_context *context = server_handle;
50ca1c9b0cSelric     kadm5_ret_t ret;
51ca1c9b0cSelric     krb5_storage *sp;
52b9d004c6Schristos     unsigned char buf[1536];
53ca1c9b0cSelric     int32_t tmp;
54b9d004c6Schristos     size_t i;
55ca1c9b0cSelric     krb5_data reply;
56ca1c9b0cSelric 
57ca1c9b0cSelric     ret = _kadm5_connect(server_handle);
58ca1c9b0cSelric     if(ret)
59ca1c9b0cSelric 	return ret;
60ca1c9b0cSelric 
61ca1c9b0cSelric     sp = krb5_storage_from_mem(buf, sizeof(buf));
62ca1c9b0cSelric     if (sp == NULL) {
63ca1c9b0cSelric 	krb5_clear_error_message(context->context);
64ca1c9b0cSelric 	return ENOMEM;
65ca1c9b0cSelric     }
66b9d004c6Schristos 
67b9d004c6Schristos     /*
68b9d004c6Schristos      * NOTE WELL: This message is extensible.  It currently consists of:
69b9d004c6Schristos      *
70b9d004c6Schristos      *  - opcode (kadm_randkey)
71b9d004c6Schristos      *  - principal name (princ)
72b9d004c6Schristos      *
73b9d004c6Schristos      * followed by optional items, each of which must be present if
74b9d004c6Schristos      * there are any items following them that are also present:
75b9d004c6Schristos      *
76b9d004c6Schristos      *  - keepold boolean (whether to delete old kvnos)
77b9d004c6Schristos      *  - number of key/salt type tuples
78b9d004c6Schristos      *  - array of {enctype, salttype}
79b9d004c6Schristos      *
80b9d004c6Schristos      * Eventually we may add:
81b9d004c6Schristos      *
82b9d004c6Schristos      *  - opaque string2key parameters (salt, rounds, ...)
83b9d004c6Schristos      */
84b9d004c6Schristos     ret = krb5_store_int32(sp, kadm_randkey);
85b9d004c6Schristos     if (ret == 0)
86b9d004c6Schristos         ret = krb5_store_principal(sp, princ);
87b9d004c6Schristos 
88b9d004c6Schristos     if (ret == 0 && (keepold == TRUE || n_ks_tuple > 0))
89b9d004c6Schristos 	ret = krb5_store_uint32(sp, keepold);
90b9d004c6Schristos     if (ret == 0 && n_ks_tuple > 0)
91b9d004c6Schristos 	ret = krb5_store_uint32(sp, n_ks_tuple);
92b9d004c6Schristos     for (i = 0; ret == 0 && i < n_ks_tuple; i++) {
93b9d004c6Schristos 	ret = krb5_store_int32(sp, ks_tuple[i].ks_enctype);
94b9d004c6Schristos         if (ret == 0)
95b9d004c6Schristos             krb5_store_int32(sp, ks_tuple[i].ks_salttype);
96b9d004c6Schristos     }
97b9d004c6Schristos     if (ret)
98b9d004c6Schristos         return ret;
99b9d004c6Schristos     /* Future extensions go here */
100b9d004c6Schristos 
101ca1c9b0cSelric     ret = _kadm5_client_send(context, sp);
102ca1c9b0cSelric     krb5_storage_free(sp);
103ca1c9b0cSelric     if (ret)
104ca1c9b0cSelric 	return ret;
105ca1c9b0cSelric     ret = _kadm5_client_recv(context, &reply);
106ca1c9b0cSelric     if(ret)
107ca1c9b0cSelric 	return ret;
108ca1c9b0cSelric     sp = krb5_storage_from_data(&reply);
109ca1c9b0cSelric     if (sp == NULL) {
110ca1c9b0cSelric 	krb5_clear_error_message(context->context);
111ca1c9b0cSelric 	krb5_data_free (&reply);
112ca1c9b0cSelric 	return ENOMEM;
113ca1c9b0cSelric     }
114ca1c9b0cSelric     krb5_clear_error_message(context->context);
115b9d004c6Schristos     ret = krb5_ret_int32(sp, &tmp);
116b9d004c6Schristos     if (ret == 0)
117ca1c9b0cSelric         ret = tmp;
118ca1c9b0cSelric     if (ret == 0){
119ca1c9b0cSelric 	krb5_keyblock *k;
120ca1c9b0cSelric 
121b9d004c6Schristos 	ret = krb5_ret_int32(sp, &tmp);
122b9d004c6Schristos         if (ret)
123b9d004c6Schristos             goto out;
124b9d004c6Schristos 	if (tmp < 0) {
125b9d004c6Schristos 	    ret = EOVERFLOW;
126b9d004c6Schristos 	    goto out;
127b9d004c6Schristos 	}
128b9d004c6Schristos 	k = calloc(tmp, sizeof(*k));
129ca1c9b0cSelric 	if (k == NULL) {
130ca1c9b0cSelric 	    ret = ENOMEM;
131ca1c9b0cSelric 	    goto out;
132ca1c9b0cSelric 	}
133b9d004c6Schristos 	for(i = 0; ret == 0 && i < tmp; i++)
134b9d004c6Schristos 	    ret = krb5_ret_keyblock(sp, &k[i]);
135b9d004c6Schristos 	if (ret == 0 && n_keys && new_keys) {
136ca1c9b0cSelric 	    *n_keys = tmp;
137ca1c9b0cSelric 	    *new_keys = k;
138b9d004c6Schristos 	} else {
139b9d004c6Schristos             krb5_free_keyblock_contents(context->context, &k[i]);
140b9d004c6Schristos             for (; i > 0; i--)
141b9d004c6Schristos                 krb5_free_keyblock_contents(context->context, &k[i - 1]);
142b9d004c6Schristos             free(k);
143b9d004c6Schristos         }
144ca1c9b0cSelric     }
145ca1c9b0cSelric out:
146ca1c9b0cSelric     krb5_storage_free(sp);
147ca1c9b0cSelric     krb5_data_free (&reply);
148ca1c9b0cSelric     return ret;
149ca1c9b0cSelric }
150