17c478bd9Sstevel@tonic-gate /*
2d7bec57cSShawn Emery * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
37c478bd9Sstevel@tonic-gate * Use is subject to license terms.
47c478bd9Sstevel@tonic-gate */
57c478bd9Sstevel@tonic-gate
67c478bd9Sstevel@tonic-gate /*
77c478bd9Sstevel@tonic-gate * lib/crypto/keyhash_provider/hmac_md5.c
87c478bd9Sstevel@tonic-gate *
97c478bd9Sstevel@tonic-gate (I don't know)
107c478bd9Sstevel@tonic-gate .
117c478bd9Sstevel@tonic-gate * Copyright2001 by the Massachusetts Institute of Technology.
127c478bd9Sstevel@tonic-gate * All Rights Reserved.
137c478bd9Sstevel@tonic-gate *
147c478bd9Sstevel@tonic-gate * Export of this software from the United States of America may
157c478bd9Sstevel@tonic-gate * require a specific license from the United States Government.
167c478bd9Sstevel@tonic-gate * It is the responsibility of any person or organization contemplating
177c478bd9Sstevel@tonic-gate * export to obtain such a license before exporting.
18*55fea89dSDan Cross *
197c478bd9Sstevel@tonic-gate * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
207c478bd9Sstevel@tonic-gate * distribute this software and its documentation for any purpose and
217c478bd9Sstevel@tonic-gate * without fee is hereby granted, provided that the above copyright
227c478bd9Sstevel@tonic-gate * notice appear in all copies and that both that copyright notice and
237c478bd9Sstevel@tonic-gate * this permission notice appear in supporting documentation, and that
247c478bd9Sstevel@tonic-gate * the name of M.I.T. not be used in advertising or publicity pertaining
257c478bd9Sstevel@tonic-gate * to distribution of the software without specific, written prior
267c478bd9Sstevel@tonic-gate * permission. Furthermore if you modify this software you must label
277c478bd9Sstevel@tonic-gate * your software as modified software and not distribute it in such a
287c478bd9Sstevel@tonic-gate * fashion that it might be confused with the original M.I.T. software.
297c478bd9Sstevel@tonic-gate * M.I.T. makes no representations about the suitability of
307c478bd9Sstevel@tonic-gate * this software for any purpose. It is provided "as is" without express
317c478bd9Sstevel@tonic-gate * or implied warranty.
32*55fea89dSDan Cross *
337c478bd9Sstevel@tonic-gate *
347c478bd9Sstevel@tonic-gate * Implementation of the Microsoft hmac-md5 checksum type.
357c478bd9Sstevel@tonic-gate * Implemented based on draft-brezak-win2k-krb-rc4-hmac-03
367c478bd9Sstevel@tonic-gate */
377c478bd9Sstevel@tonic-gate
38159d09a2SMark Phalan #include "k5-int.h"
39159d09a2SMark Phalan #include "keyhash_provider.h"
40159d09a2SMark Phalan #include "arcfour.h"
41159d09a2SMark Phalan #include "hash_provider.h"
427c478bd9Sstevel@tonic-gate
437c478bd9Sstevel@tonic-gate static krb5_error_code
k5_hmac_md5_hash(krb5_context context,const krb5_keyblock * key,krb5_keyusage usage,const krb5_data * iv,const krb5_data * input,krb5_data * output)447c478bd9Sstevel@tonic-gate k5_hmac_md5_hash (krb5_context context,
457c478bd9Sstevel@tonic-gate const krb5_keyblock *key, krb5_keyusage usage,
467c478bd9Sstevel@tonic-gate const krb5_data *iv,
477c478bd9Sstevel@tonic-gate const krb5_data *input, krb5_data *output)
487c478bd9Sstevel@tonic-gate {
497c478bd9Sstevel@tonic-gate krb5_keyusage ms_usage;
507c478bd9Sstevel@tonic-gate krb5_error_code ret;
517c478bd9Sstevel@tonic-gate krb5_keyblock ks;
527c478bd9Sstevel@tonic-gate krb5_data ds, ks_constant, md5tmp;
537c478bd9Sstevel@tonic-gate krb5_data hash_input[2];
547c478bd9Sstevel@tonic-gate char digest[MD5_CKSUM_LENGTH];
557c478bd9Sstevel@tonic-gate char t[4];
567c478bd9Sstevel@tonic-gate CK_MECHANISM mechanism;
577c478bd9Sstevel@tonic-gate CK_RV rv;
587c478bd9Sstevel@tonic-gate CK_ULONG hashlen;
597c478bd9Sstevel@tonic-gate
607c478bd9Sstevel@tonic-gate bzero(&ks, sizeof(krb5_keyblock));
61d7bec57cSShawn Emery
62d7bec57cSShawn Emery /*
63d7bec57cSShawn Emery * Solaris Kerberos: The digest length is that of MD5_CKSUM_LENGTH not the key
64d7bec57cSShawn Emery * length, as keys can be of varying lengths but should not affect the digest
65d7bec57cSShawn Emery * length. The signing key is the digest and therefore is also the same
66d7bec57cSShawn Emery * length, MD5_CKSUM_LENGTH.
67d7bec57cSShawn Emery */
68d7bec57cSShawn Emery ds.length = MD5_CKSUM_LENGTH;
69d7bec57cSShawn Emery ks.length = MD5_CKSUM_LENGTH;
707c478bd9Sstevel@tonic-gate ds.data = malloc(ds.length);
717c478bd9Sstevel@tonic-gate if (ds.data == NULL)
72159d09a2SMark Phalan return ENOMEM;
737c478bd9Sstevel@tonic-gate ks.contents = (void *) ds.data;
747c478bd9Sstevel@tonic-gate
757c478bd9Sstevel@tonic-gate ks_constant.data = "signaturekey";
767c478bd9Sstevel@tonic-gate ks_constant.length = strlen(ks_constant.data)+1; /* Including null*/
777c478bd9Sstevel@tonic-gate
78159d09a2SMark Phalan /* Solaris Kerberos */
797c478bd9Sstevel@tonic-gate ret = krb5_hmac(context, &krb5int_hash_md5, key, 1,
80159d09a2SMark Phalan &ks_constant, &ds);
817c478bd9Sstevel@tonic-gate if (ret)
827c478bd9Sstevel@tonic-gate goto cleanup;
837c478bd9Sstevel@tonic-gate
847c478bd9Sstevel@tonic-gate ms_usage = krb5int_arcfour_translate_usage (usage);
857c478bd9Sstevel@tonic-gate t[0] = (ms_usage) & 0xff;
867c478bd9Sstevel@tonic-gate t[1] = (ms_usage>>8) & 0xff;
877c478bd9Sstevel@tonic-gate t[2] = (ms_usage >>16) & 0xff;
887c478bd9Sstevel@tonic-gate t[3] = (ms_usage>>24) & 0XFF;
897c478bd9Sstevel@tonic-gate
90159d09a2SMark Phalan /* Solaris Kerberos */
917c478bd9Sstevel@tonic-gate mechanism.mechanism = CKM_MD5;
927c478bd9Sstevel@tonic-gate mechanism.pParameter = NULL_PTR;
937c478bd9Sstevel@tonic-gate mechanism.ulParameterLen = 0;
947c478bd9Sstevel@tonic-gate
957c478bd9Sstevel@tonic-gate if ((rv = C_DigestInit(krb_ctx_hSession(context), &mechanism)) != CKR_OK) {
967c478bd9Sstevel@tonic-gate KRB5_LOG(KRB5_ERR, "C_DigestInit failed in k5_md5_hmac_hash: "
977c478bd9Sstevel@tonic-gate "rv = 0x%x.", rv);
987c478bd9Sstevel@tonic-gate ret = PKCS_ERR;
997c478bd9Sstevel@tonic-gate goto cleanup;
1007c478bd9Sstevel@tonic-gate }
1017c478bd9Sstevel@tonic-gate if ((rv = C_DigestUpdate(krb_ctx_hSession(context),
1027c478bd9Sstevel@tonic-gate (CK_BYTE_PTR)t, (CK_ULONG)sizeof(t))) != CKR_OK) {
1037c478bd9Sstevel@tonic-gate KRB5_LOG(KRB5_ERR, "C_DigestUpdate failed in k5_md5_hmac_hash: "
1047c478bd9Sstevel@tonic-gate "rv = 0x%x", rv);
1057c478bd9Sstevel@tonic-gate ret = PKCS_ERR;
1067c478bd9Sstevel@tonic-gate goto cleanup;
1077c478bd9Sstevel@tonic-gate }
1087c478bd9Sstevel@tonic-gate if ((rv = C_DigestUpdate(krb_ctx_hSession(context),
1097c478bd9Sstevel@tonic-gate (CK_BYTE_PTR)input->data, (CK_ULONG)input->length)) != CKR_OK) {
1107c478bd9Sstevel@tonic-gate KRB5_LOG(KRB5_ERR, "C_DigestUpdate failed in k5_md5_hmac_hash: "
1117c478bd9Sstevel@tonic-gate "rv = 0x%x", rv);
1127c478bd9Sstevel@tonic-gate ret = PKCS_ERR;
1137c478bd9Sstevel@tonic-gate goto cleanup;
1147c478bd9Sstevel@tonic-gate }
1157c478bd9Sstevel@tonic-gate hashlen = MD5_CKSUM_LENGTH;
1167c478bd9Sstevel@tonic-gate if ((rv = C_DigestFinal(krb_ctx_hSession(context),
1177c478bd9Sstevel@tonic-gate (CK_BYTE_PTR)digest, (CK_ULONG_PTR)&hashlen)) != CKR_OK) {
1187c478bd9Sstevel@tonic-gate KRB5_LOG(KRB5_ERR, "C_DigestFinal failed in k5_md5_hmac_hash: "
1197c478bd9Sstevel@tonic-gate "rv = 0x%x", rv);
1207c478bd9Sstevel@tonic-gate ret = PKCS_ERR;
1217c478bd9Sstevel@tonic-gate goto cleanup;
1227c478bd9Sstevel@tonic-gate }
1237c478bd9Sstevel@tonic-gate
1247c478bd9Sstevel@tonic-gate md5tmp.data = digest;
1257c478bd9Sstevel@tonic-gate md5tmp.length = hashlen;
1267c478bd9Sstevel@tonic-gate
1277c478bd9Sstevel@tonic-gate ret = krb5_hmac (context, &krb5int_hash_md5, &ks, 1, &md5tmp, output);
1287c478bd9Sstevel@tonic-gate
1297c478bd9Sstevel@tonic-gate cleanup:
1307c478bd9Sstevel@tonic-gate bzero(ks.contents, ks.length);
1317c478bd9Sstevel@tonic-gate bzero(md5tmp.data, md5tmp.length);
1327c478bd9Sstevel@tonic-gate FREE (ks.contents, ks.length);
1337c478bd9Sstevel@tonic-gate return (ret);
1347c478bd9Sstevel@tonic-gate }
1357c478bd9Sstevel@tonic-gate
136*55fea89dSDan Cross
137159d09a2SMark Phalan
138159d09a2SMark Phalan const struct krb5_keyhash_provider krb5int_keyhash_hmac_md5 = {
139159d09a2SMark Phalan 16,
140159d09a2SMark Phalan k5_hmac_md5_hash,
141159d09a2SMark Phalan NULL /*checksum again*/
1427c478bd9Sstevel@tonic-gate };
1437c478bd9Sstevel@tonic-gate
144