2 * Copyright (c) 1997 - 2003 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include "krb5_locl.h"
36 static krb5_error_code
37 add_auth_data(krb5_context context
,
38 AuthorizationData
*src
,
39 AuthorizationData
**dst
)
41 krb5_error_code ret
= 0;
45 (*dst
= calloc(1, sizeof(**dst
))) == NULL
)
46 return krb5_enomem(context
);
47 for (i
= 0; ret
== 0 && i
< src
->len
; i
++)
48 ret
= add_AuthorizationData(*dst
, &src
->val
[i
]);
52 static krb5_error_code
53 add_etypelist(krb5_context context
,
54 krb5_authdata
*auth_data
)
56 AuthorizationDataElement ade
;
62 ret
= _krb5_init_etype(context
, KRB5_PDU_NONE
,
63 &etypes
.len
, &etypes
.val
,
68 ASN1_MALLOC_ENCODE(EtypeList
, e
.data
, e
.length
, &etypes
, &len
, ret
);
70 free_EtypeList(&etypes
);
74 krb5_abortx(context
, "internal error in ASN.1 encoder");
75 free_EtypeList(&etypes
);
77 ade
.ad_type
= KRB5_AUTHDATA_GSS_API_ETYPE_NEGOTIATION
;
80 ret
= add_AuthorizationData(auth_data
, &ade
);
87 static krb5_error_code
88 add_ap_options(krb5_context context
,
89 krb5_boolean channel_bound
,
90 krb5_authdata
*auth_data
)
93 AuthorizationDataElement ade
;
94 krb5_boolean require_cb
;
95 uint8_t ap_options
[4];
97 require_cb
= krb5_config_get_bool_default(context
, NULL
, FALSE
,
99 "client_aware_channel_bindings",
108 ap_options
[0] = (KERB_AP_OPTIONS_CBT
>> 0 ) & 0xFF;
109 ap_options
[1] = (KERB_AP_OPTIONS_CBT
>> 8 ) & 0xFF;
110 ap_options
[2] = (KERB_AP_OPTIONS_CBT
>> 16) & 0xFF;
111 ap_options
[3] = (KERB_AP_OPTIONS_CBT
>> 24) & 0xFF;
113 ade
.ad_type
= KRB5_AUTHDATA_AP_OPTIONS
;
114 ade
.ad_data
.length
= sizeof(ap_options
);
115 ade
.ad_data
.data
= ap_options
;
117 ret
= add_AuthorizationData(auth_data
, &ade
);
122 static krb5_error_code
123 add_target_principal(krb5_context context
,
124 krb5_const_principal server
,
125 krb5_authdata
*auth_data
)
128 AuthorizationDataElement ade
;
132 if (server
== NULL
) {
136 ret
= krb5_unparse_name_flags(context
, server
,
137 KRB5_PRINCIPAL_UNPARSE_DISPLAY
,
147 ret
= wind_utf8ucs2_length(s
, &ucs2_len
);
149 krb5_set_error_message(context
, ret
, "Principal %s is not valid UTF-8", s
);
154 ucs2
= malloc(sizeof(ucs2
[0]) * ucs2_len
);
157 return krb5_enomem(context
);
160 ret
= wind_utf8ucs2(s
, ucs2
, &ucs2_len
);
163 krb5_set_error_message(context
, ret
, "Principal %s is not valid UTF-8", s
);
169 s2_len
= (ucs2_len
+ 1) * 2;
173 return krb5_enomem(context
);
177 ret
= wind_ucs2write(ucs2
, ucs2_len
,
178 &flags
, s2
, &s2_len
);
182 krb5_set_error_message(context
, ret
, "Failed to write to UCS-2 buffer");
187 * we do not want zero termination
189 s2_len
= ucs2_len
* 2;
192 ade
.ad_type
= KRB5_AUTHDATA_TARGET_PRINCIPAL
;
193 ade
.ad_data
.length
= s2_len
;
194 ade
.ad_data
.data
= s2
;
196 ret
= add_AuthorizationData(auth_data
, &ade
);
202 static krb5_error_code
203 make_ap_authdata(krb5_context context
,
204 krb5_boolean channel_bound
,
205 krb5_const_principal server
,
206 krb5_authdata
**auth_data
)
209 AuthorizationData ad
;
216 ret
= add_etypelist(context
, &ad
);
221 * Windows has a bug and only looks for first occurrence of AD-IF-RELEVANT
222 * in the AP authenticator when looking for AD-AP-OPTIONS. Make sure to
223 * bundle it together with etypes.
225 ret
= add_ap_options(context
, channel_bound
, &ad
);
227 free_AuthorizationData(&ad
);
231 ret
= add_target_principal(context
, server
, &ad
);
233 free_AuthorizationData(&ad
);
237 ASN1_MALLOC_ENCODE(AuthorizationData
, ir
.data
, ir
.length
, &ad
, &len
, ret
);
239 free_AuthorizationData(&ad
);
243 krb5_abortx(context
, "internal error in ASN.1 encoder");
245 ret
= _krb5_add_1auth_data(context
, KRB5_AUTHDATA_IF_RELEVANT
, &ir
, 1,
248 free_AuthorizationData(&ad
);
254 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
255 _krb5_build_authenticator (krb5_context context
,
256 krb5_auth_context auth_context
,
257 krb5_enctype enctype
,
260 krb5_boolean channel_bound
,
262 krb5_key_usage usage
)
271 memset(&auth
, 0, sizeof(auth
));
273 auth
.authenticator_vno
= 5;
274 ret
= copy_Realm(&cred
->client
->realm
, &auth
.crealm
);
277 ret
= copy_PrincipalName(&cred
->client
->name
, &auth
.cname
);
281 krb5_us_timeofday (context
, &auth
.ctime
, &auth
.cusec
);
283 ret
= krb5_auth_con_getlocalsubkey(context
, auth_context
, &auth
.subkey
);
287 if (auth_context
->flags
& KRB5_AUTH_CONTEXT_DO_SEQUENCE
) {
288 if(auth_context
->local_seqnumber
== 0)
289 krb5_generate_seq_number (context
,
291 &auth_context
->local_seqnumber
);
292 ALLOC(auth
.seq_number
, 1);
293 if(auth
.seq_number
== NULL
) {
294 ret
= krb5_enomem(context
);
297 *auth
.seq_number
= auth_context
->local_seqnumber
;
299 auth
.seq_number
= NULL
;
300 auth
.authorization_data
= NULL
;
303 ALLOC(auth
.cksum
, 1);
304 if (auth
.cksum
== NULL
) {
305 ret
= krb5_enomem(context
);
308 ret
= copy_Checksum(cksum
, auth
.cksum
);
312 if (auth
.cksum
->cksumtype
== CKSUMTYPE_GSSAPI
) {
314 * This is not GSS-API specific, we only enable it for
317 ret
= make_ap_authdata(context
,
320 &auth
.authorization_data
);
326 /* Copy other authz data from auth_context */
327 if (auth_context
->auth_data
) {
328 ret
= add_auth_data(context
, auth_context
->auth_data
, &auth
.authorization_data
);
333 /* XXX - Copy more to auth_context? */
335 auth_context
->authenticator
->ctime
= auth
.ctime
;
336 auth_context
->authenticator
->cusec
= auth
.cusec
;
338 ASN1_MALLOC_ENCODE(Authenticator
, buf
, buf_size
, &auth
, &len
, ret
);
342 krb5_abortx(context
, "internal error in ASN.1 encoder");
344 ret
= krb5_crypto_init(context
, &cred
->session
, enctype
, &crypto
);
347 ret
= krb5_encrypt (context
,
349 usage
/* KRB5_KU_AP_REQ_AUTH */,
353 krb5_crypto_destroy(context
, crypto
);
359 free_Authenticator (&auth
);