1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /* Kerberos 5 crypto library.
3  *
4  * Copyright (C) 2025 Red Hat, Inc. All Rights Reserved.
5  * Written by David Howells (dhowells@redhat.com)
6  */
7 
8 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
9 
10 #include <linux/module.h>
11 #include <linux/export.h>
12 #include <linux/kernel.h>
13 #include "internal.h"
14 
15 MODULE_DESCRIPTION("Kerberos 5 crypto");
16 MODULE_AUTHOR("Red Hat, Inc.");
17 MODULE_LICENSE("GPL");
18 
19 static const struct krb5_enctype *const krb5_supported_enctypes[] = {
20 	&krb5_aes128_cts_hmac_sha1_96,
21 	&krb5_aes256_cts_hmac_sha1_96,
22 	&krb5_aes128_cts_hmac_sha256_128,
23 	&krb5_aes256_cts_hmac_sha384_192,
24 	&krb5_camellia128_cts_cmac,
25 	&krb5_camellia256_cts_cmac,
26 };
27 
28 /**
29  * crypto_krb5_find_enctype - Find the handler for a Kerberos5 encryption type
30  * @enctype: The standard Kerberos encryption type number
31  *
32  * Look up a Kerberos encryption type by number.  If successful, returns a
33  * pointer to the type tables; returns NULL otherwise.
34  */
crypto_krb5_find_enctype(u32 enctype)35 const struct krb5_enctype *crypto_krb5_find_enctype(u32 enctype)
36 {
37 	const struct krb5_enctype *krb5;
38 	size_t i;
39 
40 	for (i = 0; i < ARRAY_SIZE(krb5_supported_enctypes); i++) {
41 		krb5 = krb5_supported_enctypes[i];
42 		if (krb5->etype == enctype)
43 			return krb5;
44 	}
45 
46 	return NULL;
47 }
48 EXPORT_SYMBOL(crypto_krb5_find_enctype);
49 
50 /**
51  * crypto_krb5_how_much_buffer - Work out how much buffer is required for an amount of data
52  * @krb5: The encoding to use.
53  * @mode: The mode in which to operated (checksum/encrypt)
54  * @data_size: How much data we want to allow for
55  * @_offset: Where to place the offset into the buffer
56  *
57  * Calculate how much buffer space is required to wrap a given amount of data.
58  * This allows for a confounder, padding and checksum as appropriate.  The
59  * amount of buffer required is returned and the offset into the buffer at
60  * which the data will start is placed in *_offset.
61  */
crypto_krb5_how_much_buffer(const struct krb5_enctype * krb5,enum krb5_crypto_mode mode,size_t data_size,size_t * _offset)62 size_t crypto_krb5_how_much_buffer(const struct krb5_enctype *krb5,
63 				   enum krb5_crypto_mode mode,
64 				   size_t data_size, size_t *_offset)
65 {
66 	switch (mode) {
67 	case KRB5_CHECKSUM_MODE:
68 		*_offset = krb5->cksum_len;
69 		return krb5->cksum_len + data_size;
70 
71 	case KRB5_ENCRYPT_MODE:
72 		*_offset = krb5->conf_len;
73 		return krb5->conf_len + data_size + krb5->cksum_len;
74 
75 	default:
76 		WARN_ON(1);
77 		*_offset = 0;
78 		return 0;
79 	}
80 }
81 EXPORT_SYMBOL(crypto_krb5_how_much_buffer);
82 
83 /**
84  * crypto_krb5_how_much_data - Work out how much data can fit in an amount of buffer
85  * @krb5: The encoding to use.
86  * @mode: The mode in which to operated (checksum/encrypt)
87  * @_buffer_size: How much buffer we want to allow for (may be reduced)
88  * @_offset: Where to place the offset into the buffer
89  *
90  * Calculate how much data can be fitted into given amount of buffer.  This
91  * allows for a confounder, padding and checksum as appropriate.  The amount of
92  * data that will fit is returned, the amount of buffer required is shrunk to
93  * allow for alignment and the offset into the buffer at which the data will
94  * start is placed in *_offset.
95  */
crypto_krb5_how_much_data(const struct krb5_enctype * krb5,enum krb5_crypto_mode mode,size_t * _buffer_size,size_t * _offset)96 size_t crypto_krb5_how_much_data(const struct krb5_enctype *krb5,
97 				 enum krb5_crypto_mode mode,
98 				 size_t *_buffer_size, size_t *_offset)
99 {
100 	size_t buffer_size = *_buffer_size, data_size;
101 
102 	switch (mode) {
103 	case KRB5_CHECKSUM_MODE:
104 		if (WARN_ON(buffer_size < krb5->cksum_len + 1))
105 			goto bad;
106 		*_offset = krb5->cksum_len;
107 		return buffer_size - krb5->cksum_len;
108 
109 	case KRB5_ENCRYPT_MODE:
110 		if (WARN_ON(buffer_size < krb5->conf_len + 1 + krb5->cksum_len))
111 			goto bad;
112 		data_size = buffer_size - krb5->cksum_len;
113 		*_offset = krb5->conf_len;
114 		return data_size - krb5->conf_len;
115 
116 	default:
117 		WARN_ON(1);
118 		goto bad;
119 	}
120 
121 bad:
122 	*_offset = 0;
123 	return 0;
124 }
125 EXPORT_SYMBOL(crypto_krb5_how_much_data);
126 
127 /**
128  * crypto_krb5_where_is_the_data - Find the data in a decrypted message
129  * @krb5: The encoding to use.
130  * @mode: Mode of operation
131  * @_offset: Offset of the secure blob in the buffer; updated to data offset.
132  * @_len: The length of the secure blob; updated to data length.
133  *
134  * Find the offset and size of the data in a secure message so that this
135  * information can be used in the metadata buffer which will get added to the
136  * digest by crypto_krb5_verify_mic().
137  */
crypto_krb5_where_is_the_data(const struct krb5_enctype * krb5,enum krb5_crypto_mode mode,size_t * _offset,size_t * _len)138 void crypto_krb5_where_is_the_data(const struct krb5_enctype *krb5,
139 				   enum krb5_crypto_mode mode,
140 				   size_t *_offset, size_t *_len)
141 {
142 	switch (mode) {
143 	case KRB5_CHECKSUM_MODE:
144 		*_offset += krb5->cksum_len;
145 		*_len -= krb5->cksum_len;
146 		return;
147 	case KRB5_ENCRYPT_MODE:
148 		*_offset += krb5->conf_len;
149 		*_len -= krb5->conf_len + krb5->cksum_len;
150 		return;
151 	default:
152 		WARN_ON_ONCE(1);
153 		return;
154 	}
155 }
156 EXPORT_SYMBOL(crypto_krb5_where_is_the_data);
157 
158 /*
159  * Prepare the encryption with derived key data.
160  */
krb5_prepare_encryption(const struct krb5_enctype * krb5,const struct krb5_buffer * keys,gfp_t gfp)161 struct crypto_aead *krb5_prepare_encryption(const struct krb5_enctype *krb5,
162 					    const struct krb5_buffer *keys,
163 					    gfp_t gfp)
164 {
165 	struct crypto_aead *ci = NULL;
166 	int ret = -ENOMEM;
167 
168 	ci = crypto_alloc_aead(krb5->encrypt_name, 0, 0);
169 	if (IS_ERR(ci)) {
170 		ret = PTR_ERR(ci);
171 		if (ret == -ENOENT)
172 			ret = -ENOPKG;
173 		goto err;
174 	}
175 
176 	ret = crypto_aead_setkey(ci, keys->data, keys->len);
177 	if (ret < 0) {
178 		pr_err("Couldn't set AEAD key %s: %d\n", krb5->encrypt_name, ret);
179 		goto err_ci;
180 	}
181 
182 	ret = crypto_aead_setauthsize(ci, krb5->cksum_len);
183 	if (ret < 0) {
184 		pr_err("Couldn't set AEAD authsize %s: %d\n", krb5->encrypt_name, ret);
185 		goto err_ci;
186 	}
187 
188 	return ci;
189 err_ci:
190 	crypto_free_aead(ci);
191 err:
192 	return ERR_PTR(ret);
193 }
194 
195 /**
196  * crypto_krb5_prepare_encryption - Prepare AEAD crypto object for encryption-mode
197  * @krb5: The encoding to use.
198  * @TK: The transport key to use.
199  * @usage: The usage constant for key derivation.
200  * @gfp: Allocation flags.
201  *
202  * Allocate a crypto object that does all the necessary crypto, key it and set
203  * its parameters and return the crypto handle to it.  This can then be used to
204  * dispatch encrypt and decrypt operations.
205  */
crypto_krb5_prepare_encryption(const struct krb5_enctype * krb5,const struct krb5_buffer * TK,u32 usage,gfp_t gfp)206 struct crypto_aead *crypto_krb5_prepare_encryption(const struct krb5_enctype *krb5,
207 						   const struct krb5_buffer *TK,
208 						   u32 usage, gfp_t gfp)
209 {
210 	struct crypto_aead *ci = NULL;
211 	struct krb5_buffer keys = {};
212 	int ret;
213 
214 	ret = krb5->profile->derive_encrypt_keys(krb5, TK, usage, &keys, gfp);
215 	if (ret < 0)
216 		goto err;
217 
218 	ci = krb5_prepare_encryption(krb5, &keys, gfp);
219 	if (IS_ERR(ci)) {
220 		ret = PTR_ERR(ci);
221 		goto err;
222 	}
223 
224 	kfree(keys.data);
225 	return ci;
226 err:
227 	kfree(keys.data);
228 	return ERR_PTR(ret);
229 }
230 EXPORT_SYMBOL(crypto_krb5_prepare_encryption);
231 
232 /*
233  * Prepare the checksum with derived key data.
234  */
krb5_prepare_checksum(const struct krb5_enctype * krb5,const struct krb5_buffer * Kc,gfp_t gfp)235 struct crypto_shash *krb5_prepare_checksum(const struct krb5_enctype *krb5,
236 					   const struct krb5_buffer *Kc,
237 					   gfp_t gfp)
238 {
239 	struct crypto_shash *ci = NULL;
240 	int ret = -ENOMEM;
241 
242 	ci = crypto_alloc_shash(krb5->cksum_name, 0, 0);
243 	if (IS_ERR(ci)) {
244 		ret = PTR_ERR(ci);
245 		if (ret == -ENOENT)
246 			ret = -ENOPKG;
247 		goto err;
248 	}
249 
250 	ret = crypto_shash_setkey(ci, Kc->data, Kc->len);
251 	if (ret < 0) {
252 		pr_err("Couldn't set shash key %s: %d\n", krb5->cksum_name, ret);
253 		goto err_ci;
254 	}
255 
256 	return ci;
257 err_ci:
258 	crypto_free_shash(ci);
259 err:
260 	return ERR_PTR(ret);
261 }
262 
263 /**
264  * crypto_krb5_prepare_checksum - Prepare AEAD crypto object for checksum-mode
265  * @krb5: The encoding to use.
266  * @TK: The transport key to use.
267  * @usage: The usage constant for key derivation.
268  * @gfp: Allocation flags.
269  *
270  * Allocate a crypto object that does all the necessary crypto, key it and set
271  * its parameters and return the crypto handle to it.  This can then be used to
272  * dispatch get_mic and verify_mic operations.
273  */
crypto_krb5_prepare_checksum(const struct krb5_enctype * krb5,const struct krb5_buffer * TK,u32 usage,gfp_t gfp)274 struct crypto_shash *crypto_krb5_prepare_checksum(const struct krb5_enctype *krb5,
275 						  const struct krb5_buffer *TK,
276 						  u32 usage, gfp_t gfp)
277 {
278 	struct crypto_shash *ci = NULL;
279 	struct krb5_buffer keys = {};
280 	int ret;
281 
282 	ret = krb5->profile->derive_checksum_key(krb5, TK, usage, &keys, gfp);
283 	if (ret < 0) {
284 		pr_err("get_Kc failed %d\n", ret);
285 		goto err;
286 	}
287 
288 	ci = krb5_prepare_checksum(krb5, &keys, gfp);
289 	if (IS_ERR(ci)) {
290 		ret = PTR_ERR(ci);
291 		goto err;
292 	}
293 
294 	kfree(keys.data);
295 	return ci;
296 err:
297 	kfree(keys.data);
298 	return ERR_PTR(ret);
299 }
300 EXPORT_SYMBOL(crypto_krb5_prepare_checksum);
301 
302 /**
303  * crypto_krb5_encrypt - Apply Kerberos encryption and integrity.
304  * @krb5: The encoding to use.
305  * @aead: The keyed crypto object to use.
306  * @sg: Scatterlist defining the crypto buffer.
307  * @nr_sg: The number of elements in @sg.
308  * @sg_len: The size of the buffer.
309  * @data_offset: The offset of the data in the @sg buffer.
310  * @data_len: The length of the data.
311  * @preconfounded: True if the confounder is already inserted.
312  *
313  * Using the specified Kerberos encoding, insert a confounder and padding as
314  * needed, encrypt this and the data in place and insert an integrity checksum
315  * into the buffer.
316  *
317  * The buffer must include space for the confounder, the checksum and any
318  * padding required.  The caller can preinsert the confounder into the buffer
319  * (for testing, for example).
320  *
321  * The resulting secured blob may be less than the size of the buffer.
322  *
323  * Returns the size of the secure blob if successful, -ENOMEM on an allocation
324  * failure, -EFAULT if there is insufficient space, -EMSGSIZE if the confounder
325  * is too short or the data is misaligned.  Other errors may also be returned
326  * from the crypto layer.
327  */
crypto_krb5_encrypt(const struct krb5_enctype * krb5,struct crypto_aead * aead,struct scatterlist * sg,unsigned int nr_sg,size_t sg_len,size_t data_offset,size_t data_len,bool preconfounded)328 ssize_t crypto_krb5_encrypt(const struct krb5_enctype *krb5,
329 			    struct crypto_aead *aead,
330 			    struct scatterlist *sg, unsigned int nr_sg,
331 			    size_t sg_len,
332 			    size_t data_offset, size_t data_len,
333 			    bool preconfounded)
334 {
335 	if (WARN_ON(data_offset > sg_len ||
336 		    data_len > sg_len ||
337 		    data_offset > sg_len - data_len))
338 		return -EMSGSIZE;
339 	return krb5->profile->encrypt(krb5, aead, sg, nr_sg, sg_len,
340 				      data_offset, data_len, preconfounded);
341 }
342 EXPORT_SYMBOL(crypto_krb5_encrypt);
343 
344 /**
345  * crypto_krb5_decrypt - Validate and remove Kerberos encryption and integrity.
346  * @krb5: The encoding to use.
347  * @aead: The keyed crypto object to use.
348  * @sg: Scatterlist defining the crypto buffer.
349  * @nr_sg: The number of elements in @sg.
350  * @_offset: Offset of the secure blob in the buffer; updated to data offset.
351  * @_len: The length of the secure blob; updated to data length.
352  *
353  * Using the specified Kerberos encoding, check and remove the integrity
354  * checksum and decrypt the secure region, stripping off the confounder.
355  *
356  * If successful, @_offset and @_len are updated to outline the region in which
357  * the data plus the trailing padding are stored.  The caller is responsible
358  * for working out how much padding there is and removing it.
359  *
360  * Returns the 0 if successful, -ENOMEM on an allocation failure; sets
361  * *_error_code and returns -EPROTO if the data cannot be parsed, or -EBADMSG
362  * if the integrity checksum doesn't match).  Other errors may also be returned
363  * from the crypto layer.
364  */
crypto_krb5_decrypt(const struct krb5_enctype * krb5,struct crypto_aead * aead,struct scatterlist * sg,unsigned int nr_sg,size_t * _offset,size_t * _len)365 int crypto_krb5_decrypt(const struct krb5_enctype *krb5,
366 			struct crypto_aead *aead,
367 			struct scatterlist *sg, unsigned int nr_sg,
368 			size_t *_offset, size_t *_len)
369 {
370 	return krb5->profile->decrypt(krb5, aead, sg, nr_sg, _offset, _len);
371 }
372 EXPORT_SYMBOL(crypto_krb5_decrypt);
373 
374 /**
375  * crypto_krb5_get_mic - Apply Kerberos integrity checksum.
376  * @krb5: The encoding to use.
377  * @shash: The keyed hash to use.
378  * @metadata: Metadata to add into the hash before adding the data.
379  * @sg: Scatterlist defining the crypto buffer.
380  * @nr_sg: The number of elements in @sg.
381  * @sg_len: The size of the buffer.
382  * @data_offset: The offset of the data in the @sg buffer.
383  * @data_len: The length of the data.
384  *
385  * Using the specified Kerberos encoding, calculate and insert an integrity
386  * checksum into the buffer.
387  *
388  * The buffer must include space for the checksum at the front.
389  *
390  * Returns the size of the secure blob if successful, -ENOMEM on an allocation
391  * failure, -EFAULT if there is insufficient space, -EMSGSIZE if the gap for
392  * the checksum is too short.  Other errors may also be returned from the
393  * crypto layer.
394  */
crypto_krb5_get_mic(const struct krb5_enctype * krb5,struct crypto_shash * shash,const struct krb5_buffer * metadata,struct scatterlist * sg,unsigned int nr_sg,size_t sg_len,size_t data_offset,size_t data_len)395 ssize_t crypto_krb5_get_mic(const struct krb5_enctype *krb5,
396 			    struct crypto_shash *shash,
397 			    const struct krb5_buffer *metadata,
398 			    struct scatterlist *sg, unsigned int nr_sg,
399 			    size_t sg_len,
400 			    size_t data_offset, size_t data_len)
401 {
402 	if (WARN_ON(data_offset > sg_len ||
403 		    data_len > sg_len ||
404 		    data_offset > sg_len - data_len))
405 		return -EMSGSIZE;
406 	return krb5->profile->get_mic(krb5, shash, metadata, sg, nr_sg, sg_len,
407 				      data_offset, data_len);
408 }
409 EXPORT_SYMBOL(crypto_krb5_get_mic);
410 
411 /**
412  * crypto_krb5_verify_mic - Validate and remove Kerberos integrity checksum.
413  * @krb5: The encoding to use.
414  * @shash: The keyed hash to use.
415  * @metadata: Metadata to add into the hash before adding the data.
416  * @sg: Scatterlist defining the crypto buffer.
417  * @nr_sg: The number of elements in @sg.
418  * @_offset: Offset of the secure blob in the buffer; updated to data offset.
419  * @_len: The length of the secure blob; updated to data length.
420  *
421  * Using the specified Kerberos encoding, check and remove the integrity
422  * checksum.
423  *
424  * If successful, @_offset and @_len are updated to outline the region in which
425  * the data is stored.
426  *
427  * Returns the 0 if successful, -ENOMEM on an allocation failure; sets
428  * *_error_code and returns -EPROTO if the data cannot be parsed, or -EBADMSG
429  * if the checksum doesn't match).  Other errors may also be returned from the
430  * crypto layer.
431  */
crypto_krb5_verify_mic(const struct krb5_enctype * krb5,struct crypto_shash * shash,const struct krb5_buffer * metadata,struct scatterlist * sg,unsigned int nr_sg,size_t * _offset,size_t * _len)432 int crypto_krb5_verify_mic(const struct krb5_enctype *krb5,
433 			   struct crypto_shash *shash,
434 			   const struct krb5_buffer *metadata,
435 			   struct scatterlist *sg, unsigned int nr_sg,
436 			   size_t *_offset, size_t *_len)
437 {
438 	return krb5->profile->verify_mic(krb5, shash, metadata, sg, nr_sg,
439 					 _offset, _len);
440 }
441 EXPORT_SYMBOL(crypto_krb5_verify_mic);
442 
crypto_krb5_init(void)443 static int __init crypto_krb5_init(void)
444 {
445 	return krb5_selftest();
446 }
447 module_init(crypto_krb5_init);
448 
crypto_krb5_exit(void)449 static void __exit crypto_krb5_exit(void)
450 {
451 }
452 module_exit(crypto_krb5_exit);
453