The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/kgssapi/krb5/kcrypto.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
    3  *
    4  * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
    5  * Authors: Doug Rabson <dfr@rabson.org>
    6  * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org>
    7  *
    8  * Redistribution and use in source and binary forms, with or without
    9  * modification, are permitted provided that the following conditions
   10  * are met:
   11  * 1. Redistributions of source code must retain the above copyright
   12  *    notice, this list of conditions and the following disclaimer.
   13  * 2. Redistributions in binary form must reproduce the above copyright
   14  *    notice, this list of conditions and the following disclaimer in the
   15  *    documentation and/or other materials provided with the distribution.
   16  *
   17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
   18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
   21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   27  * SUCH DAMAGE.
   28  */
   29 
   30 #include <sys/cdefs.h>
   31 __FBSDID("$FreeBSD$");
   32 
   33 #include <sys/param.h>
   34 #include <sys/malloc.h>
   35 #include <sys/kobj.h>
   36 #include <sys/mbuf.h>
   37 #include <sys/sysctl.h>
   38 
   39 #include <kgssapi/gssapi.h>
   40 #include <kgssapi/gssapi_impl.h>
   41 
   42 #include "kcrypto.h"
   43 
   44 static struct krb5_encryption_class *krb5_encryption_classes[] = {
   45         &krb5_aes128_encryption_class,
   46         &krb5_aes256_encryption_class,
   47         NULL
   48 };
   49 
   50 struct krb5_encryption_class *
   51 krb5_find_encryption_class(int etype)
   52 {
   53         int i;
   54 
   55         for (i = 0; krb5_encryption_classes[i]; i++) {
   56                 if (krb5_encryption_classes[i]->ec_type == etype)
   57                         return (krb5_encryption_classes[i]);
   58         }
   59         return (NULL);
   60 }
   61 
   62 struct krb5_key_state *
   63 krb5_create_key(const struct krb5_encryption_class *ec)
   64 {
   65         struct krb5_key_state *ks;
   66 
   67         ks = malloc(sizeof(struct krb5_key_state), M_GSSAPI, M_WAITOK);
   68         ks->ks_class = ec;
   69         refcount_init(&ks->ks_refs, 1);
   70         ks->ks_key = malloc(ec->ec_keylen, M_GSSAPI, M_WAITOK);
   71         ec->ec_init(ks);
   72 
   73         return (ks);
   74 }
   75 
   76 void
   77 krb5_free_key(struct krb5_key_state *ks)
   78 {
   79 
   80         if (refcount_release(&ks->ks_refs)) {
   81                 ks->ks_class->ec_destroy(ks);
   82                 bzero(ks->ks_key, ks->ks_class->ec_keylen);
   83                 free(ks->ks_key, M_GSSAPI);
   84                 free(ks, M_GSSAPI);
   85         }
   86 }
   87 
   88 static size_t
   89 gcd(size_t a, size_t b)
   90 {
   91 
   92         if (b == 0)
   93                 return (a);
   94         return gcd(b, a % b);
   95 }
   96 
   97 static size_t
   98 lcm(size_t a, size_t b)
   99 {
  100         return ((a * b) / gcd(a, b));
  101 }
  102 
  103 /*
  104  * Rotate right 13 of a variable precision number in 'in', storing the
  105  * result in 'out'. The number is assumed to be big-endian in memory
  106  * representation.
  107  */
  108 static void
  109 krb5_rotate_right_13(uint8_t *out, uint8_t *in, size_t numlen)
  110 {
  111         uint32_t carry;
  112         size_t i;
  113 
  114         /*
  115          * Special case when numlen == 1. A rotate right 13 of a
  116          * single byte number changes to a rotate right 5.
  117          */
  118         if (numlen == 1) {
  119                 carry = in[0] >> 5;
  120                 out[0] = (in[0] << 3) | carry;
  121                 return;
  122         }
  123 
  124         carry = ((in[numlen - 2] & 31) << 8) | in[numlen - 1];
  125         for (i = 2; i < numlen; i++) {
  126                 out[i] = ((in[i - 2] & 31) << 3) | (in[i - 1] >> 5);
  127         }
  128         out[1] = ((carry & 31) << 3) | (in[0] >> 5);
  129         out[0] = carry >> 5;
  130 }
  131 
  132 /*
  133  * Add two variable precision numbers in big-endian representation
  134  * using ones-complement arithmetic.
  135  */
  136 static void
  137 krb5_ones_complement_add(uint8_t *out, const uint8_t *in, size_t len)
  138 {
  139         int n, i;
  140 
  141         /*
  142          * First calculate the 2s complement sum, remembering the
  143          * carry.
  144          */
  145         n = 0;
  146         for (i = len - 1; i >= 0; i--) {
  147                 n = out[i] + in[i] + n;
  148                 out[i] = n;
  149                 n >>= 8;
  150         }
  151         /*
  152          * Then add back the carry.
  153          */
  154         for (i = len - 1; n && i >= 0; i--) {
  155                 n = out[i] + n;
  156                 out[i] = n;
  157                 n >>= 8;
  158         }
  159 }
  160 
  161 static void
  162 krb5_n_fold(uint8_t *out, size_t outlen, const uint8_t *in, size_t inlen)
  163 {
  164         size_t tmplen;
  165         uint8_t *tmp;
  166         size_t i;
  167         uint8_t *p;
  168 
  169         tmplen = lcm(inlen, outlen);
  170         tmp = malloc(tmplen, M_GSSAPI, M_WAITOK);
  171 
  172         bcopy(in, tmp, inlen);
  173         for (i = inlen, p = tmp; i < tmplen; i += inlen, p += inlen) {
  174                 krb5_rotate_right_13(p + inlen, p, inlen);
  175         }
  176         bzero(out, outlen);
  177         for (i = 0, p = tmp; i < tmplen; i += outlen, p += outlen) {
  178                 krb5_ones_complement_add(out, p, outlen);
  179         }
  180         free(tmp, M_GSSAPI);
  181 }
  182 
  183 struct krb5_key_state *
  184 krb5_derive_key(struct krb5_key_state *inkey,
  185     void *constant, size_t constantlen)
  186 {
  187         struct krb5_key_state *dk;
  188         const struct krb5_encryption_class *ec = inkey->ks_class;
  189         uint8_t *folded;
  190         uint8_t *bytes, *p, *q;
  191         struct mbuf *m;
  192         int randomlen, i;
  193 
  194         /*
  195          * Expand the constant to blocklen bytes.
  196          */
  197         folded = malloc(ec->ec_blocklen, M_GSSAPI, M_WAITOK);
  198         krb5_n_fold(folded, ec->ec_blocklen, constant, constantlen);
  199 
  200         /*
  201          * Generate enough bytes for keybits rounded up to a multiple
  202          * of blocklen.
  203          */
  204         randomlen = roundup(ec->ec_keybits / 8, ec->ec_blocklen);
  205         bytes = malloc(randomlen, M_GSSAPI, M_WAITOK);
  206         MGET(m, M_WAITOK, MT_DATA);
  207         m->m_len = ec->ec_blocklen;
  208         for (i = 0, p = bytes, q = folded; i < randomlen;
  209              q = p, i += ec->ec_blocklen, p += ec->ec_blocklen) {
  210                 bcopy(q, m->m_data, ec->ec_blocklen);
  211                 krb5_encrypt(inkey, m, 0, ec->ec_blocklen, NULL, 0);
  212                 bcopy(m->m_data, p, ec->ec_blocklen);
  213         }
  214         m_free(m);
  215 
  216         dk = krb5_create_key(ec);
  217         krb5_random_to_key(dk, bytes);
  218 
  219         free(folded, M_GSSAPI);
  220         free(bytes, M_GSSAPI);
  221 
  222         return (dk);
  223 }
  224 
  225 static struct krb5_key_state *
  226 krb5_get_usage_key(struct krb5_key_state *basekey, int usage, int which)
  227 {
  228         const struct krb5_encryption_class *ec = basekey->ks_class;
  229 
  230         if (ec->ec_flags & EC_DERIVED_KEYS) {
  231                 uint8_t constant[5];
  232 
  233                 constant[0] = usage >> 24;
  234                 constant[1] = usage >> 16;
  235                 constant[2] = usage >> 8;
  236                 constant[3] = usage;
  237                 constant[4] = which;
  238                 return (krb5_derive_key(basekey, constant, 5));
  239         } else {
  240                 refcount_acquire(&basekey->ks_refs);
  241                 return (basekey);
  242         }
  243 }
  244 
  245 struct krb5_key_state *
  246 krb5_get_encryption_key(struct krb5_key_state *basekey, int usage)
  247 {
  248 
  249         return (krb5_get_usage_key(basekey, usage, 0xaa));
  250 }
  251 
  252 struct krb5_key_state *
  253 krb5_get_integrity_key(struct krb5_key_state *basekey, int usage)
  254 {
  255 
  256         return (krb5_get_usage_key(basekey, usage, 0x55));
  257 }
  258 
  259 struct krb5_key_state *
  260 krb5_get_checksum_key(struct krb5_key_state *basekey, int usage)
  261 {
  262 
  263         return (krb5_get_usage_key(basekey, usage, 0x99));
  264 }

Cache object: f3adc7de66262154f81566e28f9de948


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.