1 /* $NetBSD: mk_req_ext.c,v 1.1.1.1 2011/04/13 18:15:36 elric Exp $ */
4 * Copyright (c) 1997 - 2002 Kungliga Tekniska Högskolan
5 * (Royal Institute of Technology, Stockholm, Sweden).
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 #include "krb5_locl.h"
39 _krb5_mk_req_internal(krb5_context context
,
40 krb5_auth_context
*auth_context
,
41 const krb5_flags ap_req_options
,
45 krb5_key_usage checksum_usage
,
46 krb5_key_usage encrypt_usage
)
49 krb5_data authenticator
;
55 if(*auth_context
== NULL
)
56 ret
= krb5_auth_con_init(context
, auth_context
);
61 ret
= krb5_auth_con_init(context
, &ac
);
65 if(ac
->local_subkey
== NULL
&& (ap_req_options
& AP_OPTS_USE_SUBKEY
)) {
66 ret
= krb5_auth_con_generatelocalsubkey(context
,
73 krb5_free_keyblock(context
, ac
->keyblock
);
74 ret
= krb5_copy_keyblock(context
, &in_creds
->session
, &ac
->keyblock
);
78 /* it's unclear what type of checksum we can use. try the best one, except:
79 * a) if it's configured differently for the current realm, or
80 * b) if the session key is des-cbc-crc
84 if(ac
->keyblock
->keytype
== ETYPE_DES_CBC_CRC
) {
85 /* this is to make DCE secd (and older MIT kdcs?) happy */
86 ret
= krb5_create_checksum(context
,
93 } else if(ac
->keyblock
->keytype
== ETYPE_ARCFOUR_HMAC_MD5
||
94 ac
->keyblock
->keytype
== ETYPE_ARCFOUR_HMAC_MD5_56
||
95 ac
->keyblock
->keytype
== ETYPE_DES_CBC_MD4
||
96 ac
->keyblock
->keytype
== ETYPE_DES_CBC_MD5
) {
97 /* this is to make MS kdc happy */
98 ret
= krb5_create_checksum(context
,
108 ret
= krb5_crypto_init(context
, ac
->keyblock
, 0, &crypto
);
111 ret
= krb5_create_checksum(context
,
118 krb5_crypto_destroy(context
, crypto
);
128 ret
= _krb5_build_authenticator(context
,
130 ac
->keyblock
->keytype
,
136 free_Checksum (c_opt
);
140 ret
= krb5_build_ap_req (context
, ac
->keyblock
->keytype
,
141 in_creds
, ap_req_options
, authenticator
, outbuf
);
143 if(auth_context
== NULL
)
144 krb5_auth_con_free(context
, ac
);
148 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
149 krb5_mk_req_extended(krb5_context context
,
150 krb5_auth_context
*auth_context
,
151 const krb5_flags ap_req_options
,
153 krb5_creds
*in_creds
,
156 return _krb5_mk_req_internal (context
,
162 KRB5_KU_AP_REQ_AUTH_CKSUM
,
163 KRB5_KU_AP_REQ_AUTH
);