1/* $NetBSD: generate_subkey.c,v 1.2 2017/01/28 21:31:49 christos Exp $ */ 2 3/* 4 * Copyright (c) 1997 - 2001 Kungliga Tekniska H��gskolan 5 * (Royal Institute of Technology, Stockholm, Sweden). 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * 3. Neither the name of the Institute nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36#include "krb5_locl.h" 37 38/** 39 * Generate subkey, from keyblock 40 * 41 * @param context kerberos context 42 * @param key session key 43 * @param etype encryption type of subkey, if ETYPE_NULL, use key's enctype 44 * @param subkey returned new, free with krb5_free_keyblock(). 45 * 46 * @return 0 on success or a Kerberos 5 error code 47 * 48* @ingroup krb5_crypto 49 */ 50 51KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 52krb5_generate_subkey_extended(krb5_context context, 53 const krb5_keyblock *key, 54 krb5_enctype etype, 55 krb5_keyblock **subkey) 56{ 57 krb5_error_code ret; 58 59 ALLOC(*subkey, 1); 60 if (*subkey == NULL) 61 return krb5_enomem(context); 62 63 if (etype == (krb5_enctype)ETYPE_NULL) 64 etype = key->keytype; /* use session key etype */ 65 66 /* XXX should we use the session key as input to the RF? */ 67 ret = krb5_generate_random_keyblock(context, etype, *subkey); 68 if (ret != 0) { 69 free(*subkey); 70 *subkey = NULL; 71 } 72 73 return ret; 74} 75 76