|  | // SPDX-License-Identifier: GPL-2.0-or-later | 
|  | /* Kerberos key derivation. | 
|  | * | 
|  | * Copyright (C) 2025 Red Hat, Inc. All Rights Reserved. | 
|  | * Written by David Howells (dhowells@redhat.com) | 
|  | */ | 
|  |  | 
|  | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt | 
|  |  | 
|  | #include <linux/export.h> | 
|  | #include <linux/slab.h> | 
|  | #include <crypto/skcipher.h> | 
|  | #include <crypto/hash.h> | 
|  | #include "internal.h" | 
|  |  | 
|  | /** | 
|  | * crypto_krb5_calc_PRFplus - Calculate PRF+ [RFC4402] | 
|  | * @krb5: The encryption type to use | 
|  | * @K: The protocol key for the pseudo-random function | 
|  | * @L: The length of the output | 
|  | * @S: The input octet string | 
|  | * @result: Result buffer, sized to krb5->prf_len | 
|  | * @gfp: Allocation restrictions | 
|  | * | 
|  | * Calculate the kerberos pseudo-random function, PRF+() by the following | 
|  | * method: | 
|  | * | 
|  | *      PRF+(K, L, S) = truncate(L, T1 || T2 || .. || Tn) | 
|  | *      Tn = PRF(K, n || S) | 
|  | *      [rfc4402 sec 2] | 
|  | */ | 
|  | int crypto_krb5_calc_PRFplus(const struct krb5_enctype *krb5, | 
|  | const struct krb5_buffer *K, | 
|  | unsigned int L, | 
|  | const struct krb5_buffer *S, | 
|  | struct krb5_buffer *result, | 
|  | gfp_t gfp) | 
|  | { | 
|  | struct krb5_buffer T_series, Tn, n_S; | 
|  | void *buffer; | 
|  | int ret, n = 1; | 
|  |  | 
|  | Tn.len = krb5->prf_len; | 
|  | T_series.len = 0; | 
|  | n_S.len = 4 + S->len; | 
|  |  | 
|  | buffer = kzalloc(round16(L + Tn.len) + round16(n_S.len), gfp); | 
|  | if (!buffer) | 
|  | return -ENOMEM; | 
|  |  | 
|  | T_series.data = buffer; | 
|  | n_S.data = buffer + round16(L + Tn.len); | 
|  | memcpy(n_S.data + 4, S->data, S->len); | 
|  |  | 
|  | while (T_series.len < L) { | 
|  | *(__be32 *)(n_S.data) = htonl(n); | 
|  | Tn.data = T_series.data + Tn.len * (n - 1); | 
|  | ret = krb5->profile->calc_PRF(krb5, K, &n_S, &Tn, gfp); | 
|  | if (ret < 0) | 
|  | goto err; | 
|  | T_series.len += Tn.len; | 
|  | n++; | 
|  | } | 
|  |  | 
|  | /* Truncate to L */ | 
|  | memcpy(result->data, T_series.data, L); | 
|  | ret = 0; | 
|  |  | 
|  | err: | 
|  | kfree_sensitive(buffer); | 
|  | return ret; | 
|  | } | 
|  | EXPORT_SYMBOL(crypto_krb5_calc_PRFplus); | 
|  |  | 
|  | /** | 
|  | * krb5_derive_Kc - Derive key Kc and install into a hash | 
|  | * @krb5: The encryption type to use | 
|  | * @TK: The base key | 
|  | * @usage: The key usage number | 
|  | * @key: Prepped buffer to store the key into | 
|  | * @gfp: Allocation restrictions | 
|  | * | 
|  | * Derive the Kerberos Kc checksumming key.  The key is stored into the | 
|  | * prepared buffer. | 
|  | */ | 
|  | int krb5_derive_Kc(const struct krb5_enctype *krb5, const struct krb5_buffer *TK, | 
|  | u32 usage, struct krb5_buffer *key, gfp_t gfp) | 
|  | { | 
|  | u8 buf[5] __aligned(CRYPTO_MINALIGN); | 
|  | struct krb5_buffer usage_constant = { .len = 5, .data = buf }; | 
|  |  | 
|  | *(__be32 *)buf = cpu_to_be32(usage); | 
|  | buf[4] = KEY_USAGE_SEED_CHECKSUM; | 
|  |  | 
|  | key->len = krb5->Kc_len; | 
|  | return krb5->profile->calc_Kc(krb5, TK, &usage_constant, key, gfp); | 
|  | } | 
|  |  | 
|  | /** | 
|  | * krb5_derive_Ke - Derive key Ke and install into an skcipher | 
|  | * @krb5: The encryption type to use | 
|  | * @TK: The base key | 
|  | * @usage: The key usage number | 
|  | * @key: Prepped buffer to store the key into | 
|  | * @gfp: Allocation restrictions | 
|  | * | 
|  | * Derive the Kerberos Ke encryption key.  The key is stored into the prepared | 
|  | * buffer. | 
|  | */ | 
|  | int krb5_derive_Ke(const struct krb5_enctype *krb5, const struct krb5_buffer *TK, | 
|  | u32 usage, struct krb5_buffer *key, gfp_t gfp) | 
|  | { | 
|  | u8 buf[5] __aligned(CRYPTO_MINALIGN); | 
|  | struct krb5_buffer usage_constant = { .len = 5, .data = buf }; | 
|  |  | 
|  | *(__be32 *)buf = cpu_to_be32(usage); | 
|  | buf[4] = KEY_USAGE_SEED_ENCRYPTION; | 
|  |  | 
|  | key->len = krb5->Ke_len; | 
|  | return krb5->profile->calc_Ke(krb5, TK, &usage_constant, key, gfp); | 
|  | } | 
|  |  | 
|  | /** | 
|  | * krb5_derive_Ki - Derive key Ki and install into a hash | 
|  | * @krb5: The encryption type to use | 
|  | * @TK: The base key | 
|  | * @usage: The key usage number | 
|  | * @key: Prepped buffer to store the key into | 
|  | * @gfp: Allocation restrictions | 
|  | * | 
|  | * Derive the Kerberos Ki integrity checksum key.  The key is stored into the | 
|  | * prepared buffer. | 
|  | */ | 
|  | int krb5_derive_Ki(const struct krb5_enctype *krb5, const struct krb5_buffer *TK, | 
|  | u32 usage, struct krb5_buffer *key, gfp_t gfp) | 
|  | { | 
|  | u8 buf[5] __aligned(CRYPTO_MINALIGN); | 
|  | struct krb5_buffer usage_constant = { .len = 5, .data = buf }; | 
|  |  | 
|  | *(__be32 *)buf = cpu_to_be32(usage); | 
|  | buf[4] = KEY_USAGE_SEED_INTEGRITY; | 
|  |  | 
|  | key->len = krb5->Ki_len; | 
|  | return krb5->profile->calc_Ki(krb5, TK, &usage_constant, key, gfp); | 
|  | } |