Blame src/lib/crypto/krb/enc_dk_cmac.c

Packit fd8b60
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
Packit fd8b60
/* lib/crypto/krb/enc_dk_cmac.c - Derived-key enctype functions using CMAC */
Packit fd8b60
/*
Packit fd8b60
 * Copyright 2008, 2009, 2010 by the Massachusetts Institute of Technology.
Packit fd8b60
 * All Rights Reserved.
Packit fd8b60
 *
Packit fd8b60
 * Export of this software from the United States of America may
Packit fd8b60
 *   require a specific license from the United States Government.
Packit fd8b60
 *   It is the responsibility of any person or organization contemplating
Packit fd8b60
 *   export to obtain such a license before exporting.
Packit fd8b60
 *
Packit fd8b60
 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
Packit fd8b60
 * distribute this software and its documentation for any purpose and
Packit fd8b60
 * without fee is hereby granted, provided that the above copyright
Packit fd8b60
 * notice appear in all copies and that both that copyright notice and
Packit fd8b60
 * this permission notice appear in supporting documentation, and that
Packit fd8b60
 * the name of M.I.T. not be used in advertising or publicity pertaining
Packit fd8b60
 * to distribution of the software without specific, written prior
Packit fd8b60
 * permission.  Furthermore if you modify this software you must label
Packit fd8b60
 * your software as modified software and not distribute it in such a
Packit fd8b60
 * fashion that it might be confused with the original M.I.T. software.
Packit fd8b60
 * M.I.T. makes no representations about the suitability of
Packit fd8b60
 * this software for any purpose.  It is provided "as is" without express
Packit fd8b60
 * or implied warranty.
Packit fd8b60
 */
Packit fd8b60
Packit fd8b60
Packit fd8b60
#include "crypto_int.h"
Packit fd8b60
Packit fd8b60
#define K5CLENGTH 5 /* 32 bit net byte order integer + one byte seed */
Packit fd8b60
Packit fd8b60
/* AEAD */
Packit fd8b60
Packit fd8b60
unsigned int
Packit fd8b60
krb5int_camellia_crypto_length(const struct krb5_keytypes *ktp,
Packit fd8b60
                               krb5_cryptotype type)
Packit fd8b60
{
Packit fd8b60
    switch (type) {
Packit fd8b60
    case KRB5_CRYPTO_TYPE_HEADER:
Packit fd8b60
        return ktp->enc->block_size;
Packit fd8b60
    case KRB5_CRYPTO_TYPE_PADDING:
Packit fd8b60
        return 0;
Packit fd8b60
    case KRB5_CRYPTO_TYPE_TRAILER:
Packit fd8b60
    case KRB5_CRYPTO_TYPE_CHECKSUM:
Packit fd8b60
        return ktp->enc->block_size;
Packit fd8b60
    default:
Packit fd8b60
        assert(0 && "bad type passed to krb5int_camellia_crypto_length");
Packit fd8b60
        return 0;
Packit fd8b60
    }
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
/* Derive encryption and integrity keys for CMAC-using enctypes. */
Packit fd8b60
static krb5_error_code
Packit fd8b60
derive_keys(const struct krb5_enc_provider *enc, krb5_key key,
Packit fd8b60
            krb5_keyusage usage, krb5_key *ke_out, krb5_key *ki_out)
Packit fd8b60
{
Packit fd8b60
    krb5_error_code ret;
Packit fd8b60
    unsigned char buf[K5CLENGTH];
Packit fd8b60
    krb5_data constant = make_data(buf, K5CLENGTH);
Packit fd8b60
    krb5_key ke, ki;
Packit fd8b60
Packit fd8b60
    *ke_out = *ki_out = NULL;
Packit fd8b60
Packit fd8b60
    /* Derive the encryption key. */
Packit fd8b60
    store_32_be(usage, buf);
Packit fd8b60
    buf[4] = 0xAA;
Packit fd8b60
    ret = krb5int_derive_key(enc, NULL, key, &ke, &constant,
Packit fd8b60
                             DERIVE_SP800_108_CMAC);
Packit fd8b60
    if (ret != 0)
Packit fd8b60
        return ret;
Packit fd8b60
Packit fd8b60
    /* Derive the integrity key. */
Packit fd8b60
    buf[4] = 0x55;
Packit fd8b60
    ret = krb5int_derive_key(enc, NULL, key, &ki, &constant,
Packit fd8b60
                             DERIVE_SP800_108_CMAC);
Packit fd8b60
    if (ret != 0) {
Packit fd8b60
        krb5_k_free_key(NULL, ke);
Packit fd8b60
        return ret;
Packit fd8b60
    }
Packit fd8b60
Packit fd8b60
    *ke_out = ke;
Packit fd8b60
    *ki_out = ki;
Packit fd8b60
    return 0;
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
krb5_error_code
Packit fd8b60
krb5int_dk_cmac_encrypt(const struct krb5_keytypes *ktp, krb5_key key,
Packit fd8b60
                        krb5_keyusage usage, const krb5_data *ivec,
Packit fd8b60
                        krb5_crypto_iov *data, size_t num_data)
Packit fd8b60
{
Packit fd8b60
    const struct krb5_enc_provider *enc = ktp->enc;
Packit fd8b60
    krb5_error_code ret;
Packit fd8b60
    krb5_crypto_iov *header, *trailer, *padding;
Packit fd8b60
    krb5_key ke = NULL, ki = NULL;
Packit fd8b60
Packit fd8b60
    /* E(Confounder | Plaintext | Pad) | Checksum */
Packit fd8b60
Packit fd8b60
    /* Validate header and trailer lengths, and zero out padding length. */
Packit fd8b60
    header = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_HEADER);
Packit fd8b60
    if (header == NULL || header->data.length < enc->block_size)
Packit fd8b60
        return KRB5_BAD_MSIZE;
Packit fd8b60
    trailer = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_TRAILER);
Packit fd8b60
    if (trailer == NULL || trailer->data.length < enc->block_size)
Packit fd8b60
        return KRB5_BAD_MSIZE;
Packit fd8b60
    padding = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_PADDING);
Packit fd8b60
    if (padding != NULL)
Packit fd8b60
        padding->data.length = 0;
Packit fd8b60
Packit fd8b60
    /* Derive the encryption and integrity keys. */
Packit fd8b60
    ret = derive_keys(enc, key, usage, &ke, &ki;;
Packit fd8b60
    if (ret != 0)
Packit fd8b60
        goto cleanup;
Packit fd8b60
Packit fd8b60
    /* Generate confounder. */
Packit fd8b60
    header->data.length = enc->block_size;
Packit fd8b60
    ret = krb5_c_random_make_octets(NULL, &header->data);
Packit fd8b60
    if (ret != 0)
Packit fd8b60
        goto cleanup;
Packit fd8b60
Packit fd8b60
    /* Checksum the plaintext. */
Packit fd8b60
    ret = krb5int_cmac_checksum(enc, ki, data, num_data, &trailer->data);
Packit fd8b60
    if (ret != 0)
Packit fd8b60
        goto cleanup;
Packit fd8b60
Packit fd8b60
    /* Encrypt the plaintext (header | data | padding) */
Packit fd8b60
    ret = enc->encrypt(ke, ivec, data, num_data);
Packit fd8b60
    if (ret != 0)
Packit fd8b60
        goto cleanup;
Packit fd8b60
Packit fd8b60
cleanup:
Packit fd8b60
    krb5_k_free_key(NULL, ke);
Packit fd8b60
    krb5_k_free_key(NULL, ki);
Packit fd8b60
    return ret;
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
krb5_error_code
Packit fd8b60
krb5int_dk_cmac_decrypt(const struct krb5_keytypes *ktp, krb5_key key,
Packit fd8b60
                        krb5_keyusage usage, const krb5_data *ivec,
Packit fd8b60
                        krb5_crypto_iov *data, size_t num_data)
Packit fd8b60
{
Packit fd8b60
    const struct krb5_enc_provider *enc = ktp->enc;
Packit fd8b60
    krb5_error_code ret;
Packit fd8b60
    krb5_crypto_iov *header, *trailer;
Packit fd8b60
    krb5_data cksum = empty_data();
Packit fd8b60
    krb5_key ke = NULL, ki = NULL;
Packit fd8b60
Packit fd8b60
    /* E(Confounder | Plaintext | Pad) | Checksum */
Packit fd8b60
Packit fd8b60
    /* Validate header and trailer lengths. */
Packit fd8b60
    header = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_HEADER);
Packit fd8b60
    if (header == NULL || header->data.length != enc->block_size)
Packit fd8b60
        return KRB5_BAD_MSIZE;
Packit fd8b60
    trailer = krb5int_c_locate_iov(data, num_data, KRB5_CRYPTO_TYPE_TRAILER);
Packit fd8b60
    if (trailer == NULL || trailer->data.length != enc->block_size)
Packit fd8b60
        return KRB5_BAD_MSIZE;
Packit fd8b60
Packit fd8b60
    /* Derive the encryption and integrity keys. */
Packit fd8b60
    ret = derive_keys(enc, key, usage, &ke, &ki;;
Packit fd8b60
    if (ret != 0)
Packit fd8b60
        goto cleanup;
Packit fd8b60
Packit fd8b60
    /* Decrypt the plaintext (header | data | padding). */
Packit fd8b60
    ret = enc->decrypt(ke, ivec, data, num_data);
Packit fd8b60
    if (ret != 0)
Packit fd8b60
        goto cleanup;
Packit fd8b60
Packit fd8b60
    /* Verify the hash. */
Packit fd8b60
    ret = alloc_data(&cksum, enc->block_size);
Packit fd8b60
    if (ret != 0)
Packit fd8b60
        goto cleanup;
Packit fd8b60
    ret = krb5int_cmac_checksum(enc, ki, data, num_data, &cksum);
Packit fd8b60
    if (ret != 0)
Packit fd8b60
        goto cleanup;
Packit fd8b60
    if (k5_bcmp(cksum.data, trailer->data.data, enc->block_size) != 0)
Packit fd8b60
        ret = KRB5KRB_AP_ERR_BAD_INTEGRITY;
Packit fd8b60
Packit fd8b60
cleanup:
Packit fd8b60
    krb5_k_free_key(NULL, ke);
Packit fd8b60
    krb5_k_free_key(NULL, ki);
Packit fd8b60
    zapfree(cksum.data, cksum.length);
Packit fd8b60
    return ret;
Packit fd8b60
}