root/crypto/krb5/internal.h
/* SPDX-License-Identifier: GPL-2.0-or-later */
/* Kerberos5 crypto internals
 *
 * Copyright (C) 2025 Red Hat, Inc. All Rights Reserved.
 * Written by David Howells (dhowells@redhat.com)
 */

#include <linux/scatterlist.h>
#include <crypto/krb5.h>
#include <crypto/hash.h>
#include <crypto/skcipher.h>

/*
 * Profile used for key derivation and encryption.
 */
struct krb5_crypto_profile {
         /* Pseudo-random function */
        int (*calc_PRF)(const struct krb5_enctype *krb5,
                        const struct krb5_buffer *protocol_key,
                        const struct krb5_buffer *octet_string,
                        struct krb5_buffer *result,
                        gfp_t gfp);

        /* Checksum key derivation */
        int (*calc_Kc)(const struct krb5_enctype *krb5,
                       const struct krb5_buffer *TK,
                       const struct krb5_buffer *usage_constant,
                       struct krb5_buffer *Kc,
                       gfp_t gfp);

        /* Encryption key derivation */
        int (*calc_Ke)(const struct krb5_enctype *krb5,
                       const struct krb5_buffer *TK,
                       const struct krb5_buffer *usage_constant,
                       struct krb5_buffer *Ke,
                       gfp_t gfp);

         /* Integrity key derivation */
        int (*calc_Ki)(const struct krb5_enctype *krb5,
                       const struct krb5_buffer *TK,
                       const struct krb5_buffer *usage_constant,
                       struct krb5_buffer *Ki,
                       gfp_t gfp);

        /* Derive the keys needed for an encryption AEAD object. */
        int (*derive_encrypt_keys)(const struct krb5_enctype *krb5,
                                   const struct krb5_buffer *TK,
                                   unsigned int usage,
                                   struct krb5_buffer *setkey,
                                   gfp_t gfp);

        /* Directly load the keys needed for an encryption AEAD object. */
        int (*load_encrypt_keys)(const struct krb5_enctype *krb5,
                                 const struct krb5_buffer *Ke,
                                 const struct krb5_buffer *Ki,
                                 struct krb5_buffer *setkey,
                                 gfp_t gfp);

        /* Derive the key needed for a checksum hash object. */
        int (*derive_checksum_key)(const struct krb5_enctype *krb5,
                                   const struct krb5_buffer *TK,
                                   unsigned int usage,
                                   struct krb5_buffer *setkey,
                                   gfp_t gfp);

        /* Directly load the keys needed for a checksum hash object. */
        int (*load_checksum_key)(const struct krb5_enctype *krb5,
                                 const struct krb5_buffer *Kc,
                                 struct krb5_buffer *setkey,
                                 gfp_t gfp);

        /* Encrypt data in-place, inserting confounder and checksum. */
        ssize_t (*encrypt)(const struct krb5_enctype *krb5,
                           struct crypto_aead *aead,
                           struct scatterlist *sg, unsigned int nr_sg,
                           size_t sg_len,
                           size_t data_offset, size_t data_len,
                           bool preconfounded);

        /* Decrypt data in-place, removing confounder and checksum */
        int (*decrypt)(const struct krb5_enctype *krb5,
                       struct crypto_aead *aead,
                       struct scatterlist *sg, unsigned int nr_sg,
                       size_t *_offset, size_t *_len);

        /* Generate a MIC on part of a packet, inserting the checksum */
        ssize_t (*get_mic)(const struct krb5_enctype *krb5,
                           struct crypto_shash *shash,
                           const struct krb5_buffer *metadata,
                           struct scatterlist *sg, unsigned int nr_sg,
                           size_t sg_len,
                           size_t data_offset, size_t data_len);

        /* Verify the MIC on a piece of data, removing the checksum */
        int (*verify_mic)(const struct krb5_enctype *krb5,
                          struct crypto_shash *shash,
                          const struct krb5_buffer *metadata,
                          struct scatterlist *sg, unsigned int nr_sg,
                          size_t *_offset, size_t *_len);
};

/*
 * Crypto size/alignment rounding convenience macros.
 */
#define crypto_roundup(X) ((unsigned int)round_up((X), CRYPTO_MINALIGN))

#define krb5_aead_size(TFM) \
        crypto_roundup(sizeof(struct aead_request) + crypto_aead_reqsize(TFM))
#define krb5_aead_ivsize(TFM) \
        crypto_roundup(crypto_aead_ivsize(TFM))
#define krb5_shash_size(TFM) \
        crypto_roundup(sizeof(struct shash_desc) + crypto_shash_descsize(TFM))
#define krb5_digest_size(TFM) \
        crypto_roundup(crypto_shash_digestsize(TFM))
#define round16(x) (((x) + 15) & ~15)

/*
 * Self-testing data.
 */
struct krb5_prf_test {
        u32 etype;
        const char *name, *key, *octet, *prf;
};

struct krb5_key_test_one {
        u32 use;
        const char *key;
};

struct krb5_key_test {
        u32 etype;
        const char *name, *key;
        struct krb5_key_test_one Kc, Ke, Ki;
};

struct krb5_enc_test {
        u32 etype;
        u32 usage;
        const char *name, *plain, *conf, *K0, *Ke, *Ki, *ct;
};

struct krb5_mic_test {
        u32 etype;
        u32 usage;
        const char *name, *plain, *K0, *Kc, *mic;
};

/*
 * krb5_api.c
 */
struct crypto_aead *krb5_prepare_encryption(const struct krb5_enctype *krb5,
                                            const struct krb5_buffer *keys,
                                            gfp_t gfp);
struct crypto_shash *krb5_prepare_checksum(const struct krb5_enctype *krb5,
                                           const struct krb5_buffer *Kc,
                                           gfp_t gfp);

/*
 * krb5_kdf.c
 */
int krb5_derive_Kc(const struct krb5_enctype *krb5, const struct krb5_buffer *TK,
                   u32 usage, struct krb5_buffer *key, gfp_t gfp);
int krb5_derive_Ke(const struct krb5_enctype *krb5, const struct krb5_buffer *TK,
                   u32 usage, struct krb5_buffer *key, gfp_t gfp);
int krb5_derive_Ki(const struct krb5_enctype *krb5, const struct krb5_buffer *TK,
                   u32 usage, struct krb5_buffer *key, gfp_t gfp);

/*
 * rfc3961_simplified.c
 */
extern const struct krb5_crypto_profile rfc3961_simplified_profile;

int crypto_shash_update_sg(struct shash_desc *desc, struct scatterlist *sg,
                           size_t offset, size_t len);
int authenc_derive_encrypt_keys(const struct krb5_enctype *krb5,
                                const struct krb5_buffer *TK,
                                unsigned int usage,
                                struct krb5_buffer *setkey,
                                gfp_t gfp);
int authenc_load_encrypt_keys(const struct krb5_enctype *krb5,
                              const struct krb5_buffer *Ke,
                              const struct krb5_buffer *Ki,
                              struct krb5_buffer *setkey,
                              gfp_t gfp);
int rfc3961_derive_checksum_key(const struct krb5_enctype *krb5,
                                const struct krb5_buffer *TK,
                                unsigned int usage,
                                struct krb5_buffer *setkey,
                                gfp_t gfp);
int rfc3961_load_checksum_key(const struct krb5_enctype *krb5,
                              const struct krb5_buffer *Kc,
                              struct krb5_buffer *setkey,
                              gfp_t gfp);
ssize_t krb5_aead_encrypt(const struct krb5_enctype *krb5,
                          struct crypto_aead *aead,
                          struct scatterlist *sg, unsigned int nr_sg, size_t sg_len,
                          size_t data_offset, size_t data_len,
                          bool preconfounded);
int krb5_aead_decrypt(const struct krb5_enctype *krb5,
                      struct crypto_aead *aead,
                      struct scatterlist *sg, unsigned int nr_sg,
                      size_t *_offset, size_t *_len);
ssize_t rfc3961_get_mic(const struct krb5_enctype *krb5,
                        struct crypto_shash *shash,
                        const struct krb5_buffer *metadata,
                        struct scatterlist *sg, unsigned int nr_sg, size_t sg_len,
                        size_t data_offset, size_t data_len);
int rfc3961_verify_mic(const struct krb5_enctype *krb5,
                       struct crypto_shash *shash,
                       const struct krb5_buffer *metadata,
                       struct scatterlist *sg, unsigned int nr_sg,
                       size_t *_offset, size_t *_len);

/*
 * rfc3962_aes.c
 */
extern const struct krb5_enctype krb5_aes128_cts_hmac_sha1_96;
extern const struct krb5_enctype krb5_aes256_cts_hmac_sha1_96;

/*
 * rfc6803_camellia.c
 */
extern const struct krb5_enctype krb5_camellia128_cts_cmac;
extern const struct krb5_enctype krb5_camellia256_cts_cmac;

/*
 * rfc8009_aes2.c
 */
extern const struct krb5_enctype krb5_aes128_cts_hmac_sha256_128;
extern const struct krb5_enctype krb5_aes256_cts_hmac_sha384_192;

/*
 * selftest.c
 */
#ifdef CONFIG_CRYPTO_KRB5_SELFTESTS
int krb5_selftest(void);
#else
static inline int krb5_selftest(void) { return 0; }
#endif

/*
 * selftest_data.c
 */
extern const struct krb5_prf_test krb5_prf_tests[];
extern const struct krb5_key_test krb5_key_tests[];
extern const struct krb5_enc_test krb5_enc_tests[];
extern const struct krb5_mic_test krb5_mic_tests[];