git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@4705 ec53bebd-3082-4978-b11e-865c3cabbd6b
		
			
				
	
	
		
			463 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			463 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * Copyright (c) 1997, 1998 Kungliga Tekniska Högskolan
 | 
						|
 * (Royal Institute of Technology, Stockholm, Sweden). 
 | 
						|
 * All rights reserved. 
 | 
						|
 *
 | 
						|
 * Redistribution and use in source and binary forms, with or without 
 | 
						|
 * modification, are permitted provided that the following conditions 
 | 
						|
 * are met: 
 | 
						|
 *
 | 
						|
 * 1. Redistributions of source code must retain the above copyright 
 | 
						|
 *    notice, this list of conditions and the following disclaimer. 
 | 
						|
 *
 | 
						|
 * 2. Redistributions in binary form must reproduce the above copyright 
 | 
						|
 *    notice, this list of conditions and the following disclaimer in the 
 | 
						|
 *    documentation and/or other materials provided with the distribution. 
 | 
						|
 *
 | 
						|
 * 3. All advertising materials mentioning features or use of this software 
 | 
						|
 *    must display the following acknowledgement: 
 | 
						|
 *      This product includes software developed by Kungliga Tekniska 
 | 
						|
 *      Högskolan and its contributors. 
 | 
						|
 *
 | 
						|
 * 4. Neither the name of the Institute nor the names of its contributors 
 | 
						|
 *    may be used to endorse or promote products derived from this software 
 | 
						|
 *    without specific prior written permission. 
 | 
						|
 *
 | 
						|
 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 
 | 
						|
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 
 | 
						|
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
 | 
						|
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 
 | 
						|
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 
 | 
						|
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 
 | 
						|
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 
 | 
						|
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 
 | 
						|
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 
 | 
						|
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 
 | 
						|
 * SUCH DAMAGE. 
 | 
						|
 */
 | 
						|
 | 
						|
#include <krb5_locl.h>
 | 
						|
 | 
						|
RCSID("$Id$");
 | 
						|
 | 
						|
/*
 | 
						|
 * Reverse 8 bytes
 | 
						|
 */
 | 
						|
 | 
						|
static void
 | 
						|
reverse (unsigned char *s)
 | 
						|
{
 | 
						|
     static const unsigned char tbl[] = {
 | 
						|
	  0x0,
 | 
						|
	  0x8,
 | 
						|
	  0x4,
 | 
						|
	  0xC,
 | 
						|
	  0x2,
 | 
						|
	  0xA,
 | 
						|
	  0x6,
 | 
						|
	  0xE,
 | 
						|
	  0x1,
 | 
						|
	  0x9,
 | 
						|
	  0x5,
 | 
						|
	  0xD,
 | 
						|
	  0x3,
 | 
						|
	  0xB,
 | 
						|
	  0x7,
 | 
						|
	  0xF
 | 
						|
     };
 | 
						|
 | 
						|
     char tmp;
 | 
						|
 | 
						|
#define REVONE(str, i, j) \
 | 
						|
do { tmp = str[i]; str[i] = str[j]; str[j] = tmp;} while(0)
 | 
						|
 | 
						|
     REVONE(s,0,7);
 | 
						|
     REVONE(s,1,6);
 | 
						|
     REVONE(s,2,5);
 | 
						|
     REVONE(s,3,4);
 | 
						|
#undef REVONE
 | 
						|
 | 
						|
#define REVTWO(q) \
 | 
						|
q = (tbl[q & 0x0F] << 4) | (tbl[q >> 4])
 | 
						|
 | 
						|
     REVTWO(s[0]);
 | 
						|
     REVTWO(s[1]);
 | 
						|
     REVTWO(s[2]);
 | 
						|
     REVTWO(s[3]);
 | 
						|
     REVTWO(s[4]);
 | 
						|
     REVTWO(s[5]);
 | 
						|
     REVTWO(s[6]);
 | 
						|
     REVTWO(s[7]);
 | 
						|
 | 
						|
#undef REVTWO
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * A = A xor B. A & B is 8 bytes.
 | 
						|
 */
 | 
						|
 | 
						|
static void
 | 
						|
xor (des_cblock *key, const unsigned char *b)
 | 
						|
{
 | 
						|
    unsigned char *a = (unsigned char*)key;
 | 
						|
    a[0] ^= b[0];
 | 
						|
    a[1] ^= b[1];
 | 
						|
    a[2] ^= b[2];
 | 
						|
    a[3] ^= b[3];
 | 
						|
    a[4] ^= b[4];
 | 
						|
    a[5] ^= b[5];
 | 
						|
    a[6] ^= b[6];
 | 
						|
    a[7] ^= b[7];
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Init a from b
 | 
						|
 */
 | 
						|
 | 
						|
static void
 | 
						|
init (unsigned char *a, const unsigned char *b)
 | 
						|
{
 | 
						|
     a[0] = b[0] << 1;
 | 
						|
     a[1] = b[1] << 1;
 | 
						|
     a[2] = b[2] << 1;
 | 
						|
     a[3] = b[3] << 1;
 | 
						|
     a[4] = b[4] << 1;
 | 
						|
     a[5] = b[5] << 1;
 | 
						|
     a[6] = b[6] << 1;
 | 
						|
     a[7] = b[7] << 1;
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
DES_string_to_key(const char *str, size_t len, des_cblock *key)
 | 
						|
{
 | 
						|
    /* could use des_string_to_key here, but then `str' must be zero
 | 
						|
       terminated, and the final weak-key check has to be added */
 | 
						|
    int even, i;
 | 
						|
    des_key_schedule sched;
 | 
						|
 | 
						|
    memset (key, 0, sizeof(des_cblock));
 | 
						|
 | 
						|
    even = 0;
 | 
						|
    for (i = 0; i < len; i += 8) {
 | 
						|
	unsigned char tmp[8];
 | 
						|
 | 
						|
	init (tmp, (const unsigned char*)(str + i));
 | 
						|
 | 
						|
	if (even) {
 | 
						|
	    reverse (tmp);
 | 
						|
	    init (tmp, tmp);
 | 
						|
	}
 | 
						|
	even = !even;
 | 
						|
	xor (key, tmp);
 | 
						|
    }
 | 
						|
    des_set_odd_parity (key);
 | 
						|
    des_set_key (key, sched);
 | 
						|
    des_cbc_cksum ((des_cblock *)str, key, len, sched, key);
 | 
						|
    des_set_odd_parity (key);
 | 
						|
    if (des_is_weak_key (key))
 | 
						|
	xor (key, (unsigned char*)"\0\0\0\0\0\0\0\xf0");
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
rr13(unsigned char *buf, size_t len)
 | 
						|
{
 | 
						|
    int i;
 | 
						|
    /* assert(len >= 3); */
 | 
						|
    unsigned a = buf[0], b = buf[len-1];
 | 
						|
#define F(A, B) ((((A) << 3) | ((B) >> 5)) & 0xff)
 | 
						|
    buf[0] = F(buf[len-2], buf[len-1]);
 | 
						|
    for(i = len - 3; i >= 1; i--)
 | 
						|
	buf[i + 2] = F(buf[i], buf[i+1]);
 | 
						|
    buf[2] = F(a, buf[1]);
 | 
						|
    buf[1] = F(b, a);
 | 
						|
#undef F
 | 
						|
}
 | 
						|
 | 
						|
/* Add `b' to `a', both beeing one's complement numbers. */
 | 
						|
static void
 | 
						|
add1(unsigned char *a, unsigned char *b, size_t len)
 | 
						|
{
 | 
						|
    int i;
 | 
						|
    int carry = 0;
 | 
						|
    for(i = len - 1; i >= 0; i--){
 | 
						|
	int x = a[i] + b[i] + carry;
 | 
						|
	carry = x > 0xff;
 | 
						|
	a[i] = x & 0xff;
 | 
						|
    }
 | 
						|
    for(i = len - 1; carry && i >= 0; i--){
 | 
						|
	int x = a[i] + carry;
 | 
						|
	carry = x > 0xff;
 | 
						|
	a[i] = carry & 0xff;
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
/* key should point to a buffer of at least size (24) bytes */
 | 
						|
static void
 | 
						|
fold(const unsigned char *str, size_t len, unsigned char *key)
 | 
						|
{
 | 
						|
    const int size = 24;
 | 
						|
    /* if len < size we need at most N * len bytes, ie < 2 * size;
 | 
						|
       if len > size we need at most 2 * len */
 | 
						|
    size_t maxlen = 2 * max(size, len);
 | 
						|
    size_t l = 0;
 | 
						|
    unsigned char *tmp = malloc(maxlen);
 | 
						|
    unsigned char *buf = malloc(len);
 | 
						|
    
 | 
						|
    memcpy(buf, str, len);
 | 
						|
    memset(key, 0, size);
 | 
						|
    do {
 | 
						|
	memcpy(tmp + l, buf, len);
 | 
						|
	l += len;
 | 
						|
	rr13(buf, len);
 | 
						|
	while(l >= size) {
 | 
						|
	    add1(key, tmp, size);
 | 
						|
	    l -= size;
 | 
						|
	    if(l == 0)
 | 
						|
		break;
 | 
						|
	    memmove(tmp, tmp + size, l);
 | 
						|
	}
 | 
						|
    } while(l != 0);
 | 
						|
    memset(buf, 0, len);
 | 
						|
    free(buf);
 | 
						|
    memset(tmp, 0, maxlen);
 | 
						|
    free(tmp);
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
DES3_string_to_key(const unsigned char *str, size_t len, des_cblock *keys)
 | 
						|
{
 | 
						|
    unsigned char tmp[24];
 | 
						|
    des_cblock ivec;
 | 
						|
    des_key_schedule s[3];
 | 
						|
    int i;
 | 
						|
 | 
						|
    fold(str, len, tmp);
 | 
						|
    for(i = 0; i < 3; i++){
 | 
						|
	memcpy(keys + i, tmp + 8 * i, 8);
 | 
						|
	des_set_odd_parity(keys + i);
 | 
						|
	if(des_is_weak_key(keys + i))
 | 
						|
	    xor(keys + i, (unsigned char*)"\0\0\0\0\0\0\0\xf0");
 | 
						|
	des_set_key(keys + i, s[i]);
 | 
						|
    }
 | 
						|
    memset(&ivec, 0, sizeof(ivec));
 | 
						|
    des_ede3_cbc_encrypt((void*)tmp, (void*)tmp, sizeof(tmp), 
 | 
						|
			 s[0], s[1], s[2], &ivec, 1);
 | 
						|
    memset(s, 0, sizeof(s));
 | 
						|
    for(i = 0; i < 3; i++){
 | 
						|
	memcpy(keys + i, tmp + 8 * i, 8);
 | 
						|
	des_set_odd_parity(keys + i);
 | 
						|
	if(des_is_weak_key(keys + i))
 | 
						|
	    xor(keys + i, (unsigned char*)"\0\0\0\0\0\0\0\xf0");
 | 
						|
    }
 | 
						|
    memset(tmp, 0, sizeof(tmp));
 | 
						|
}
 | 
						|
 | 
						|
/* This defines the Andrew string_to_key function.  It accepts a password
 | 
						|
 * string as input and converts its via a one-way encryption algorithm to a DES
 | 
						|
 * encryption key.  It is compatible with the original Andrew authentication
 | 
						|
 * service password database.
 | 
						|
 */
 | 
						|
 | 
						|
/*
 | 
						|
 * Short passwords, i.e 8 characters or less.
 | 
						|
 */
 | 
						|
static void
 | 
						|
afs_cmu_StringToKey (const char *pw, size_t pw_len, 
 | 
						|
		     const char *cell, size_t cell_len, 
 | 
						|
		     des_cblock *key)
 | 
						|
{
 | 
						|
    char  password[8+1];	/* crypt is limited to 8 chars anyway */
 | 
						|
    int   i;
 | 
						|
    
 | 
						|
    memset (password, 0, sizeof(password));
 | 
						|
 | 
						|
    if(cell_len > 8) cell_len = 8;
 | 
						|
    strncpy (password, cell, cell_len);
 | 
						|
 | 
						|
    if(pw_len > 8) pw_len = 8;
 | 
						|
    for (i=0; i < pw_len; i++)
 | 
						|
        password[i] ^= pw[i];
 | 
						|
 | 
						|
    for (i=0; i<8; i++)
 | 
						|
        if (password[i] == '\0') password[i] = 'X';
 | 
						|
 | 
						|
    /* crypt only considers the first 8 characters of password but for some
 | 
						|
       reason returns eleven characters of result (plus the two salt chars). */
 | 
						|
    strncpy((char *)key, (char *)crypt(password, "#~") + 2, sizeof(des_cblock));
 | 
						|
 | 
						|
    /* parity is inserted into the LSB so leftshift each byte up one bit.  This
 | 
						|
       allows ascii characters with a zero MSB to retain as much significance
 | 
						|
       as possible. */
 | 
						|
    {   char *keybytes = (char *)key;
 | 
						|
        unsigned int temp;
 | 
						|
 | 
						|
        for (i = 0; i < 8; i++) {
 | 
						|
            temp = (unsigned int) keybytes[i];
 | 
						|
            keybytes[i] = (unsigned char) (temp << 1);
 | 
						|
        }
 | 
						|
    }
 | 
						|
    des_fixup_key_parity (key);
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Long passwords, i.e 9 characters or more.
 | 
						|
 */
 | 
						|
static void
 | 
						|
afs_transarc_StringToKey (const char *pw, size_t pw_len,
 | 
						|
			  const char *cell, size_t cell_len,
 | 
						|
			  des_cblock *key)
 | 
						|
{
 | 
						|
    des_key_schedule schedule;
 | 
						|
    des_cblock temp_key;
 | 
						|
    des_cblock ivec;
 | 
						|
    char password[512];
 | 
						|
    size_t passlen;
 | 
						|
 | 
						|
    memcpy(password, pw, min(pw_len, sizeof(password)));
 | 
						|
    if(pw_len < sizeof(password))
 | 
						|
	memcpy(password + pw_len, cell, min(cell_len, 
 | 
						|
					    sizeof(password) - pw_len));
 | 
						|
    passlen = min(sizeof(password), pw_len + cell_len);
 | 
						|
    memcpy(&ivec, "kerberos", 8);
 | 
						|
    memcpy(&temp_key, "kerberos", 8);
 | 
						|
    des_fixup_key_parity (&temp_key);
 | 
						|
    des_key_sched (&temp_key, schedule);
 | 
						|
    des_cbc_cksum ((des_cblock *)password, &ivec, passlen, schedule, &ivec);
 | 
						|
 | 
						|
    memcpy(&temp_key, &ivec, 8);
 | 
						|
    des_fixup_key_parity (&temp_key);
 | 
						|
    des_key_sched (&temp_key, schedule);
 | 
						|
    des_cbc_cksum ((des_cblock *)password, key, passlen, schedule, &ivec);
 | 
						|
    memset(&schedule, 0, sizeof(schedule));
 | 
						|
    memset(&temp_key, 0, sizeof(temp_key));
 | 
						|
    memset(&ivec, 0, sizeof(ivec));
 | 
						|
    memset(password, 0, sizeof(password));
 | 
						|
 | 
						|
    des_fixup_key_parity (key);
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
AFS3_string_to_key(const char *pw, size_t pw_len,
 | 
						|
		   const char *cell, size_t cell_len,
 | 
						|
		   des_cblock *key)
 | 
						|
{
 | 
						|
    if(pw_len > 8)
 | 
						|
	afs_transarc_StringToKey (pw, pw_len, cell, cell_len, key);
 | 
						|
    else
 | 
						|
	afs_cmu_StringToKey (pw, pw_len, cell, cell_len, key);
 | 
						|
}
 | 
						|
 | 
						|
static void *
 | 
						|
get_str(const void *pw, size_t pw_len, const void *salt, size_t salt_len, 
 | 
						|
	size_t *ret_len)
 | 
						|
{
 | 
						|
    char *p;
 | 
						|
    size_t len = pw_len + salt_len;
 | 
						|
    len = (len + 7) & ~7;
 | 
						|
    p = calloc(len, 1);
 | 
						|
    if(p == NULL)
 | 
						|
	return NULL;
 | 
						|
    memcpy(p, pw, pw_len);
 | 
						|
    memcpy(p + pw_len, salt, salt_len);
 | 
						|
    *ret_len = len;
 | 
						|
    return p;
 | 
						|
}
 | 
						|
 | 
						|
static krb5_error_code
 | 
						|
string_to_key_internal (const unsigned char *str,
 | 
						|
			size_t str_len,
 | 
						|
			krb5_data *salt,
 | 
						|
			krb5_keytype ktype,
 | 
						|
			krb5_keyblock *key)
 | 
						|
{
 | 
						|
    size_t len;
 | 
						|
    unsigned char *s = NULL;
 | 
						|
    krb5_error_code ret;
 | 
						|
 | 
						|
    switch(ktype & KEYTYPE_KEYTYPE_MASK){
 | 
						|
    case KEYTYPE_DES:{
 | 
						|
	des_cblock tmpkey;
 | 
						|
	if(ktype & KEYTYPE_USE_AFS3_SALT)
 | 
						|
	    AFS3_string_to_key(str, str_len, salt->data, salt->length, &tmpkey);
 | 
						|
	else{
 | 
						|
	    s = get_str(str, str_len, salt->data, salt->length, &len);
 | 
						|
	    if(s == NULL)
 | 
						|
		return ENOMEM;
 | 
						|
	    DES_string_to_key(s, len, &tmpkey);
 | 
						|
	}
 | 
						|
	ret = krb5_data_copy(&key->keyvalue, tmpkey, sizeof(des_cblock));
 | 
						|
	memset(&tmpkey, 0, sizeof(tmpkey));
 | 
						|
	break;
 | 
						|
    }
 | 
						|
    case KEYTYPE_DES3:{
 | 
						|
	des_cblock keys[3];
 | 
						|
	s = get_str(str, str_len, salt->data, salt->length, &len);
 | 
						|
	if(s == NULL)
 | 
						|
	    return ENOMEM;
 | 
						|
	/* only des should pad to 8 */
 | 
						|
	DES3_string_to_key(s, str_len + salt->length, keys);
 | 
						|
	ret = krb5_data_copy(&key->keyvalue, keys, sizeof(keys));
 | 
						|
	memset(keys, 0, sizeof(keys));
 | 
						|
	break;
 | 
						|
    }
 | 
						|
    default:
 | 
						|
	ret = KRB5_PROG_KEYTYPE_NOSUPP;
 | 
						|
	break;
 | 
						|
    }
 | 
						|
    if(s){
 | 
						|
	memset(s, 0, len);
 | 
						|
	free(s);
 | 
						|
    }
 | 
						|
    if(ret)
 | 
						|
	return ret;
 | 
						|
    key->keytype = ktype & KEYTYPE_KEYTYPE_MASK;
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
krb5_error_code
 | 
						|
krb5_string_to_key (const char *str,
 | 
						|
		    krb5_data *salt,
 | 
						|
		    krb5_keytype ktype,
 | 
						|
		    krb5_keyblock *key)
 | 
						|
{
 | 
						|
    return string_to_key_internal ((const unsigned char *)str,
 | 
						|
				   strlen(str), salt, ktype, key);
 | 
						|
}
 | 
						|
 | 
						|
krb5_error_code
 | 
						|
krb5_string_to_key_data (krb5_data *str,
 | 
						|
			 krb5_data *salt,
 | 
						|
			 krb5_keytype ktype,
 | 
						|
			 krb5_keyblock *key)
 | 
						|
{
 | 
						|
    return string_to_key_internal (str->data, str->length, salt, ktype, key);
 | 
						|
}
 | 
						|
 | 
						|
krb5_error_code
 | 
						|
krb5_get_salt (krb5_principal princ,
 | 
						|
	       krb5_data *salt)
 | 
						|
{
 | 
						|
    size_t len;
 | 
						|
    int i;
 | 
						|
    krb5_error_code err;
 | 
						|
    char *p;
 | 
						|
     
 | 
						|
    len = strlen(princ->realm);
 | 
						|
    for (i = 0; i < princ->name.name_string.len; ++i)
 | 
						|
	len += strlen(princ->name.name_string.val[i]);
 | 
						|
    err = krb5_data_alloc (salt, len);
 | 
						|
    if (err)
 | 
						|
	return err;
 | 
						|
    p = salt->data;
 | 
						|
    strncpy (p, princ->realm, strlen(princ->realm));
 | 
						|
    p += strlen(princ->realm);
 | 
						|
    for (i = 0; i < princ->name.name_string.len; ++i) {
 | 
						|
	strncpy (p,
 | 
						|
		 princ->name.name_string.val[i],
 | 
						|
		 strlen(princ->name.name_string.val[i]));
 | 
						|
	p += strlen(princ->name.name_string.val[i]);
 | 
						|
    }
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 |