|
Packit |
fd8b60 |
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
|
|
Packit |
fd8b60 |
/* lib/crypto/krb/enc_dk_cmac.c - Derived-key enctype functions using CMAC */
|
|
Packit |
fd8b60 |
/*
|
|
Packit |
fd8b60 |
* Copyright 2008, 2009, 2010 by the Massachusetts Institute of Technology.
|
|
Packit |
fd8b60 |
* All Rights Reserved.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* Export of this software from the United States of America may
|
|
Packit |
fd8b60 |
* require a specific license from the United States Government.
|
|
Packit |
fd8b60 |
* It is the responsibility of any person or organization contemplating
|
|
Packit |
fd8b60 |
* export to obtain such a license before exporting.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
|
|
Packit |
fd8b60 |
* distribute this software and its documentation for any purpose and
|
|
Packit |
fd8b60 |
* without fee is hereby granted, provided that the above copyright
|
|
Packit |
fd8b60 |
* notice appear in all copies and that both that copyright notice and
|
|
Packit |
fd8b60 |
* this permission notice appear in supporting documentation, and that
|
|
Packit |
fd8b60 |
* the name of M.I.T. not be used in advertising or publicity pertaining
|
|
Packit |
fd8b60 |
* to distribution of the software without specific, written prior
|
|
Packit |
fd8b60 |
* permission. Furthermore if you modify this software you must label
|
|
Packit |
fd8b60 |
* your software as modified software and not distribute it in such a
|
|
Packit |
fd8b60 |
* fashion that it might be confused with the original M.I.T. software.
|
|
Packit |
fd8b60 |
* M.I.T. makes no representations about the suitability of
|
|
Packit |
fd8b60 |
* this software for any purpose. It is provided "as is" without express
|
|
Packit |
fd8b60 |
* or implied warranty.
|
|
Packit |
fd8b60 |
*/
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
#include "crypto_int.h"
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
#define K5CLENGTH 5 /* 32 bit net byte order integer + one byte seed */
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* AEAD */
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
unsigned int
|
|
Packit |
fd8b60 |
krb5int_camellia_crypto_length(const struct krb5_keytypes *ktp,
|
|
Packit |
fd8b60 |
krb5_cryptotype type)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
switch (type) {
|
|
Packit |
fd8b60 |
case KRB5_CRYPTO_TYPE_HEADER:
|
|
Packit |
fd8b60 |
return ktp->enc->block_size;
|
|
Packit |
fd8b60 |
case KRB5_CRYPTO_TYPE_PADDING:
|
|
Packit |
fd8b60 |
return 0;
|
|
Packit |
fd8b60 |
case KRB5_CRYPTO_TYPE_TRAILER:
|
|
Packit |
fd8b60 |
case KRB5_CRYPTO_TYPE_CHECKSUM:
|
|
Packit |
fd8b60 |
return ktp->enc->block_size;
|
|
Packit |
fd8b60 |
default:
|
|
Packit |
fd8b60 |
assert(0 && "bad type passed to krb5int_camellia_crypto_length");
|
|
Packit |
fd8b60 |
return 0;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Derive encryption and integrity keys for CMAC-using enctypes. */
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
derive_keys(const struct krb5_enc_provider *enc, krb5_key key,
|
|
Packit |
fd8b60 |
krb5_keyusage usage, krb5_key *ke_out, krb5_key *ki_out)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
krb5_error_code ret;
|
|
Packit |
fd8b60 |
unsigned char buf[K5CLENGTH];
|
|
Packit |
fd8b60 |
krb5_data constant = make_data(buf, K5CLENGTH);
|
|
Packit |
fd8b60 |
krb5_key ke, ki;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
*ke_out = *ki_out = NULL;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Derive the encryption key. */
|
|
Packit |
fd8b60 |
store_32_be(usage, buf);
|
|
Packit |
fd8b60 |
buf[4] = 0xAA;
|
|
Packit |
fd8b60 |
ret = krb5int_derive_key(enc, NULL, key, &ke, &constant,
|
|
Packit |
fd8b60 |
DERIVE_SP800_108_CMAC);
|
|
Packit |
fd8b60 |
if (ret != 0)
|
|
Packit |
fd8b60 |
return ret;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Derive the integrity key. */
|
|
Packit |
fd8b60 |
buf[4] = 0x55;
|
|
Packit |
fd8b60 |
ret = krb5int_derive_key(enc, NULL, key, &ki, &constant,
|
|
Packit |
fd8b60 |
DERIVE_SP800_108_CMAC);
|
|
Packit |
fd8b60 |
if (ret != 0) {
|
|
Packit |
fd8b60 |
krb5_k_free_key(NULL, ke);
|
|
Packit |
fd8b60 |
return ret;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
*ke_out = ke;
|
|
Packit |
fd8b60 |
*ki_out = ki;
|
|
Packit |
fd8b60 |
return 0;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
krb5_error_code
|
|
Packit |
fd8b60 |
krb5int_dk_cmac_encrypt(const struct krb5_keytypes *ktp, krb5_key key,
|
|
Packit |
fd8b60 |
krb5_keyusage usage, const krb5_data *ivec,
|
|
Packit |
fd8b60 |
krb5_crypto_iov *data, size_t num_data)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
const struct krb5_enc_provider *enc = ktp->enc;
|
|
Packit |
fd8b60 |
krb5_error_code ret;
|
|
Packit |
fd8b60 |
krb5_crypto_iov *header, *trailer, *padding;
|
|
Packit |
fd8b60 |
krb5_key ke = NULL, ki = NULL;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* E(Confounder | Plaintext | Pad) | Checksum */
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Validate header and trailer lengths, and zero out padding length. */
|
|
Packit |
fd8b60 |
header = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_HEADER);
|
|
Packit |
fd8b60 |
if (header == NULL || header->data.length < enc->block_size)
|
|
Packit |
fd8b60 |
return KRB5_BAD_MSIZE;
|
|
Packit |
fd8b60 |
trailer = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_TRAILER);
|
|
Packit |
fd8b60 |
if (trailer == NULL || trailer->data.length < enc->block_size)
|
|
Packit |
fd8b60 |
return KRB5_BAD_MSIZE;
|
|
Packit |
fd8b60 |
padding = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_PADDING);
|
|
Packit |
fd8b60 |
if (padding != NULL)
|
|
Packit |
fd8b60 |
padding->data.length = 0;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Derive the encryption and integrity keys. */
|
|
Packit |
fd8b60 |
ret = derive_keys(enc, key, usage, &ke, &ki;;
|
|
Packit |
fd8b60 |
if (ret != 0)
|
|
Packit |
fd8b60 |
goto cleanup;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Generate confounder. */
|
|
Packit |
fd8b60 |
header->data.length = enc->block_size;
|
|
Packit |
fd8b60 |
ret = krb5_c_random_make_octets(NULL, &header->data);
|
|
Packit |
fd8b60 |
if (ret != 0)
|
|
Packit |
fd8b60 |
goto cleanup;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Checksum the plaintext. */
|
|
Packit |
fd8b60 |
ret = krb5int_cmac_checksum(enc, ki, data, num_data, &trailer->data);
|
|
Packit |
fd8b60 |
if (ret != 0)
|
|
Packit |
fd8b60 |
goto cleanup;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Encrypt the plaintext (header | data | padding) */
|
|
Packit |
fd8b60 |
ret = enc->encrypt(ke, ivec, data, num_data);
|
|
Packit |
fd8b60 |
if (ret != 0)
|
|
Packit |
fd8b60 |
goto cleanup;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
cleanup:
|
|
Packit |
fd8b60 |
krb5_k_free_key(NULL, ke);
|
|
Packit |
fd8b60 |
krb5_k_free_key(NULL, ki);
|
|
Packit |
fd8b60 |
return ret;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
krb5_error_code
|
|
Packit |
fd8b60 |
krb5int_dk_cmac_decrypt(const struct krb5_keytypes *ktp, krb5_key key,
|
|
Packit |
fd8b60 |
krb5_keyusage usage, const krb5_data *ivec,
|
|
Packit |
fd8b60 |
krb5_crypto_iov *data, size_t num_data)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
const struct krb5_enc_provider *enc = ktp->enc;
|
|
Packit |
fd8b60 |
krb5_error_code ret;
|
|
Packit |
fd8b60 |
krb5_crypto_iov *header, *trailer;
|
|
Packit |
fd8b60 |
krb5_data cksum = empty_data();
|
|
Packit |
fd8b60 |
krb5_key ke = NULL, ki = NULL;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* E(Confounder | Plaintext | Pad) | Checksum */
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Validate header and trailer lengths. */
|
|
Packit |
fd8b60 |
header = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_HEADER);
|
|
Packit |
fd8b60 |
if (header == NULL || header->data.length != enc->block_size)
|
|
Packit |
fd8b60 |
return KRB5_BAD_MSIZE;
|
|
Packit |
fd8b60 |
trailer = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_TRAILER);
|
|
Packit |
fd8b60 |
if (trailer == NULL || trailer->data.length != enc->block_size)
|
|
Packit |
fd8b60 |
return KRB5_BAD_MSIZE;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Derive the encryption and integrity keys. */
|
|
Packit |
fd8b60 |
ret = derive_keys(enc, key, usage, &ke, &ki;;
|
|
Packit |
fd8b60 |
if (ret != 0)
|
|
Packit |
fd8b60 |
goto cleanup;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Decrypt the plaintext (header | data | padding). */
|
|
Packit |
fd8b60 |
ret = enc->decrypt(ke, ivec, data, num_data);
|
|
Packit |
fd8b60 |
if (ret != 0)
|
|
Packit |
fd8b60 |
goto cleanup;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Verify the hash. */
|
|
Packit |
fd8b60 |
ret = alloc_data(&cksum, enc->block_size);
|
|
Packit |
fd8b60 |
if (ret != 0)
|
|
Packit |
fd8b60 |
goto cleanup;
|
|
Packit |
fd8b60 |
ret = krb5int_cmac_checksum(enc, ki, data, num_data, &cksum);
|
|
Packit |
fd8b60 |
if (ret != 0)
|
|
Packit |
fd8b60 |
goto cleanup;
|
|
Packit |
fd8b60 |
if (k5_bcmp(cksum.data, trailer->data.data, enc->block_size) != 0)
|
|
Packit |
fd8b60 |
ret = KRB5KRB_AP_ERR_BAD_INTEGRITY;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
cleanup:
|
|
Packit |
fd8b60 |
krb5_k_free_key(NULL, ke);
|
|
Packit |
fd8b60 |
krb5_k_free_key(NULL, ki);
|
|
Packit |
fd8b60 |
zapfree(cksum.data, cksum.length);
|
|
Packit |
fd8b60 |
return ret;
|
|
Packit |
fd8b60 |
}
|