1/* 2 * Copyright (c) 1997 - 2008 Kungliga Tekniska Högskolan 3 * (Royal Institute of Technology, Stockholm, Sweden). 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * 3. Neither the name of the Institute nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34#ifndef HEIMDAL_SMALLER 35#define DES3_OLD_ENCTYPE 1 36#endif 37 38struct _krb5_key_data { 39 krb5_keyblock *key; 40 krb5_data *schedule; 41}; 42 43struct _krb5_key_usage; 44 45/* 46 * Locking rules for krb5_crypto are the following: 47 * 48 * all data are immutable once the lock is dropped 49 * 50 * When adding a setting up a new usage or keydata or the assosiated 51 * schedule the lock must be held, after the data is initialized, it 52 * can be assumed to be valid until krb5_crypto_destroy() 53 * 54 * Changing the values of keys are thus not allowed after 55 * krb5_crypto_init() have completed. 56 */ 57 58struct krb5_crypto_data { 59 struct _krb5_encryption_type *et; 60 struct _krb5_key_data key; 61 int num_key_usage; 62 struct _krb5_key_usage **key_usage; 63 HEIMDAL_MUTEX mutex; 64}; 65 66#define CRYPTO_ETYPE(C) ((C)->et->type) 67 68/* bits for `flags' below */ 69#define F_KEYED 1 /* checksum is keyed */ 70#define F_CPROOF 2 /* checksum is collision proof */ 71#define F_DERIVED 4 /* uses derived keys */ 72#define F_VARIANT 8 /* uses `variant' keys (6.4.3) */ 73#define F_PSEUDO 16 /* not a real protocol type */ 74#define F_SPECIAL 32 /* backwards */ 75#define F_DISABLED 64 /* enctype/checksum disabled */ 76#define F_WEAK 128 /* enctype is considered weak */ 77 78struct salt_type { 79 krb5_salttype type; 80 const char *name; 81 krb5_error_code (*string_to_key)(krb5_context, krb5_enctype, krb5_data, 82 krb5_salt, krb5_data, krb5_keyblock*); 83}; 84 85struct _krb5_key_type { 86 krb5_enctype type; 87 const char *name; 88 size_t bits; 89 size_t size; 90 size_t schedule_size; 91 void (*random_key)(krb5_context, krb5_keyblock*); 92 void (*schedule)(krb5_context, struct _krb5_key_type *, struct _krb5_key_data *); 93 struct salt_type *string_to_key; 94 void (*random_to_key)(krb5_context, krb5_keyblock*, const void*, size_t); 95 void (*cleanup)(krb5_context, struct _krb5_key_data *); 96 const EVP_CIPHER *(*evp)(void); 97}; 98 99struct _krb5_checksum_type { 100 krb5_cksumtype type; 101 const char *name; 102 size_t blocksize; 103 size_t checksumsize; 104 unsigned flags; 105 krb5_error_code (*checksum)(krb5_context context, 106 struct _krb5_key_data *key, 107 const void *buf, size_t len, 108 unsigned usage, 109 Checksum *csum); 110 krb5_error_code (*verify)(krb5_context context, 111 struct _krb5_key_data *key, 112 const void *buf, size_t len, 113 unsigned usage, 114 Checksum *csum); 115}; 116 117struct _krb5_encryption_type { 118 krb5_enctype type; 119 const char *name; 120 size_t blocksize; 121 size_t padsize; 122 size_t confoundersize; 123 struct _krb5_key_type *keytype; 124 struct _krb5_checksum_type *checksum; 125 struct _krb5_checksum_type *keyed_checksum; 126 unsigned flags; 127 krb5_error_code (*encrypt)(krb5_context context, 128 struct _krb5_key_data *key, 129 void *data, size_t len, 130 krb5_boolean encryptp, 131 int usage, 132 void *ivec); 133 size_t prf_length; 134 krb5_error_code (*prf)(krb5_context, 135 krb5_crypto, const krb5_data *, krb5_data *); 136}; 137 138#define ENCRYPTION_USAGE(U) (((U) << 8) | 0xAA) 139#define INTEGRITY_USAGE(U) (((U) << 8) | 0x55) 140#define CHECKSUM_USAGE(U) (((U) << 8) | 0x99) 141 142/* Checksums */ 143 144extern struct _krb5_checksum_type _krb5_checksum_none; 145extern struct _krb5_checksum_type _krb5_checksum_crc32; 146extern struct _krb5_checksum_type _krb5_checksum_rsa_md4; 147extern struct _krb5_checksum_type _krb5_checksum_rsa_md4_des; 148extern struct _krb5_checksum_type _krb5_checksum_rsa_md5_des; 149extern struct _krb5_checksum_type _krb5_checksum_rsa_md5_des3; 150extern struct _krb5_checksum_type _krb5_checksum_rsa_md5; 151extern struct _krb5_checksum_type _krb5_checksum_hmac_sha1_des3; 152extern struct _krb5_checksum_type _krb5_checksum_hmac_sha1_aes128; 153extern struct _krb5_checksum_type _krb5_checksum_hmac_sha1_aes256; 154extern struct _krb5_checksum_type _krb5_checksum_hmac_md5; 155extern struct _krb5_checksum_type _krb5_checksum_sha1; 156 157extern struct _krb5_checksum_type *_krb5_checksum_types[]; 158extern int _krb5_num_checksums; 159 160/* Salts */ 161 162extern struct salt_type _krb5_AES_salt[]; 163extern struct salt_type _krb5_arcfour_salt[]; 164extern struct salt_type _krb5_des_salt[]; 165extern struct salt_type _krb5_des3_salt[]; 166extern struct salt_type _krb5_des3_salt_derived[]; 167 168/* Encryption types */ 169 170extern struct _krb5_encryption_type _krb5_enctype_aes256_cts_hmac_sha1; 171extern struct _krb5_encryption_type _krb5_enctype_aes128_cts_hmac_sha1; 172extern struct _krb5_encryption_type _krb5_enctype_des3_cbc_sha1; 173extern struct _krb5_encryption_type _krb5_enctype_des3_cbc_md5; 174extern struct _krb5_encryption_type _krb5_enctype_des3_cbc_none; 175extern struct _krb5_encryption_type _krb5_enctype_arcfour_hmac_md5; 176extern struct _krb5_encryption_type _krb5_enctype_des_cbc_md5; 177extern struct _krb5_encryption_type _krb5_enctype_old_des3_cbc_sha1; 178extern struct _krb5_encryption_type _krb5_enctype_des_cbc_crc; 179extern struct _krb5_encryption_type _krb5_enctype_des_cbc_md4; 180extern struct _krb5_encryption_type _krb5_enctype_des_cbc_md5; 181extern struct _krb5_encryption_type _krb5_enctype_des_cbc_none; 182extern struct _krb5_encryption_type _krb5_enctype_des_cfb64_none; 183extern struct _krb5_encryption_type _krb5_enctype_des_pcbc_none; 184extern struct _krb5_encryption_type _krb5_enctype_null; 185 186extern struct _krb5_encryption_type *_krb5_etypes[]; 187extern int _krb5_num_etypes; 188 189/* Interface to the EVP crypto layer provided by hcrypto */ 190struct _krb5_evp_schedule { 191 EVP_CIPHER_CTX ectx; 192 EVP_CIPHER_CTX dctx; 193}; 194 195struct _krb5_etypes_deprected { 196 krb5_enctype type; 197 const char *name; 198}; 199 200extern struct _krb5_etypes_deprected _krb5_deprecated_etypes[]; 201extern int _krb5_num_deprecated_etypes; 202