FreeRDP/winpr/libwinpr/sspi/Kerberos/kerberos.c

808 lines
22 KiB
C
Raw Normal View History

2017-05-11 19:51:45 +03:00
/**
* FreeRDP: A Remote Desktop Protocol Client
* Kerberos Auth Protocol
*
* Copyright 2015 ANSSI, Author Thomas Calderon
* Copyright 2017 Dorian Ducournau <dorian.ducournau@gmail.com>
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
2017-05-11 19:51:45 +03:00
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <fcntl.h>
#include <winpr/crt.h>
#include <winpr/sspi.h>
#include <winpr/print.h>
#include <winpr/sysinfo.h>
#include <winpr/registry.h>
#include "kerberos.h"
#ifdef WITH_GSSAPI_HEIMDAL
#include <krb5-protos.h>
#endif
2017-05-11 19:51:45 +03:00
#include "../sspi.h"
#include "../../log.h"
#define TAG WINPR_TAG("sspi.Kerberos")
struct _KRB_CONTEXT
{
CtxtHandle context;
SSPI_CREDENTIALS* credentials;
SEC_WINNT_AUTH_IDENTITY identity;
/* GSSAPI */
UINT32 major_status;
UINT32 minor_status;
UINT32 actual_time;
sspi_gss_cred_id_t cred;
sspi_gss_ctx_id_t gss_ctx;
sspi_gss_name_t target_name;
};
static const char* KRB_PACKAGE_NAME = "Kerberos";
const SecPkgInfoA KERBEROS_SecPkgInfoA =
{
0x000F3BBF, /* fCapabilities */
1, /* wVersion */
0x0010, /* wRPCID */
0x0000BB80, /* cbMaxToken : 48k bytes maximum for Windows Server 2012 */
"Kerberos", /* Name */
"Kerberos Security Package" /* Comment */
};
static const WCHAR KERBEROS_SecPkgInfoW_Name[] = { 'K', 'e', 'r', 'b', 'e', 'r', 'o', 's', '\0' };
static const WCHAR KERBEROS_SecPkgInfoW_Comment[] =
{
'K', 'e', 'r', 'b', 'e', 'r', 'o', 's', ' ',
'S', 'e', 'c', 'u', 'r', 'i', 't', 'y', ' ',
'P', 'a', 'c', 'k', 'a', 'g', 'e', '\0'
};
const SecPkgInfoW KERBEROS_SecPkgInfoW =
{
0x000F3BBF, /* fCapabilities */
1, /* wVersion */
0x0010, /* wRPCID */
0x0000BB80, /* cbMaxToken : 48k bytes maximum for Windows Server 2012 */
KERBEROS_SecPkgInfoW_Name, /* Name */
KERBEROS_SecPkgInfoW_Comment /* Comment */
};
2017-05-11 19:51:45 +03:00
static sspi_gss_OID_desc g_SSPI_GSS_C_SPNEGO_KRB5 = { 9, (void*) "\x2a\x86\x48\x86\xf7\x12\x01\x02\x02" };
static sspi_gss_OID SSPI_GSS_C_SPNEGO_KRB5 = &g_SSPI_GSS_C_SPNEGO_KRB5;
2017-05-11 19:51:45 +03:00
static KRB_CONTEXT* kerberos_ContextNew(void)
2017-05-11 19:51:45 +03:00
{
KRB_CONTEXT* context;
context = (KRB_CONTEXT*) calloc(1, sizeof(KRB_CONTEXT));
if (!context)
return NULL;
context->minor_status = 0;
context->major_status = 0;
context->gss_ctx = SSPI_GSS_C_NO_CONTEXT;
context->cred = SSPI_GSS_C_NO_CREDENTIAL;
return context;
}
static void kerberos_ContextFree(KRB_CONTEXT* context)
2017-05-11 19:51:45 +03:00
{
UINT32 minor_status;
if (!context)
return;
if (context->target_name)
{
sspi_gss_release_name(&minor_status, &context->target_name);
context->target_name = NULL;
}
if (context->gss_ctx)
{
sspi_gss_delete_sec_context(&minor_status, &context->gss_ctx, SSPI_GSS_C_NO_BUFFER);
context->gss_ctx = SSPI_GSS_C_NO_CONTEXT;
}
free(context);
}
static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleW(SEC_WCHAR* pszPrincipal,
2017-05-11 19:51:45 +03:00
SEC_WCHAR* pszPackage,
ULONG fCredentialUse, void* pvLogonID, void* pAuthData,
SEC_GET_KEY_FN pGetKeyFn, void* pvGetKeyArgument,
PCredHandle phCredential, PTimeStamp ptsExpiry)
{
return SEC_E_OK;
}
static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleA(SEC_CHAR* pszPrincipal,
2017-05-11 19:51:45 +03:00
SEC_CHAR* pszPackage,
ULONG fCredentialUse, void* pvLogonID, void* pAuthData,
SEC_GET_KEY_FN pGetKeyFn, void* pvGetKeyArgument,
PCredHandle phCredential, PTimeStamp ptsExpiry)
{
return SEC_E_OK;
}
static SECURITY_STATUS SEC_ENTRY kerberos_FreeCredentialsHandle(PCredHandle phCredential)
2017-05-11 19:51:45 +03:00
{
SSPI_CREDENTIALS* credentials;
if (!phCredential)
return SEC_E_INVALID_HANDLE;
credentials = (SSPI_CREDENTIALS*) sspi_SecureHandleGetLowerPointer(phCredential);
if (!credentials)
return SEC_E_INVALID_HANDLE;
sspi_CredentialsFree(credentials);
return SEC_E_OK;
}
static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesW(PCredHandle phCredential,
2017-05-11 19:51:45 +03:00
ULONG ulAttribute, void* pBuffer)
{
if (ulAttribute == SECPKG_CRED_ATTR_NAMES)
{
return SEC_E_OK;
}
return SEC_E_UNSUPPORTED_FUNCTION;
}
static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesA(PCredHandle phCredential,
2017-05-11 19:51:45 +03:00
ULONG ulAttribute, void* pBuffer)
{
return kerberos_QueryCredentialsAttributesW(phCredential, ulAttribute, pBuffer);
}
static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextW(PCredHandle phCredential,
2017-05-11 19:51:45 +03:00
PCtxtHandle phContext,
SEC_WCHAR* pszTargetName, ULONG fContextReq, ULONG Reserved1,
ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2,
PCtxtHandle phNewContext, PSecBufferDesc pOutput,
ULONG* pfContextAttr, PTimeStamp ptsExpiry)
{
return SEC_E_UNSUPPORTED_FUNCTION;
}
static int kerberos_SetContextServicePrincipalNameA(KRB_CONTEXT* context,
SEC_CHAR* ServicePrincipalName)
2017-05-11 19:51:45 +03:00
{
char* p;
UINT32 major_status;
UINT32 minor_status;
char* gss_name = NULL;
sspi_gss_buffer_desc name_buffer;
if (!ServicePrincipalName)
{
context->target_name = NULL;
return 1;
}
/* GSSAPI expects a SPN of type <service>@FQDN, let's construct it */
gss_name = _strdup(ServicePrincipalName);
if (!gss_name)
return -1;
p = strchr(gss_name, '/');
if (p)
*p = '@';
name_buffer.value = gss_name;
name_buffer.length = strlen(gss_name) + 1;
major_status = sspi_gss_import_name(&minor_status, &name_buffer,
SSPI_GSS_C_NT_HOSTBASED_SERVICE, &(context->target_name));
free(gss_name);
if (SSPI_GSS_ERROR(major_status))
{
WLog_ERR(TAG, "error: gss_import_name failed");
return -1;
}
return 1;
}
#ifdef WITH_GSSAPI
static krb5_error_code KRB5_CALLCONV
2017-05-11 19:51:45 +03:00
acquire_cred(krb5_context ctx, krb5_principal client, const char* password)
{
krb5_error_code ret;
krb5_creds creds;
krb5_deltat starttime = 0;
krb5_get_init_creds_opt* options = NULL;
krb5_ccache ccache;
krb5_init_creds_context init_ctx = NULL;
/* Get default ccache */
if ((ret = krb5_cc_default(ctx, &ccache)))
{
WLog_ERR(TAG, "error while getting default ccache");
goto cleanup;
}
if ((ret = krb5_cc_initialize(ctx, ccache, client)))
{
WLog_ERR(TAG, "error: could not initialize ccache");
goto cleanup;
}
memset(&creds, 0, sizeof(creds));
if ((ret = krb5_get_init_creds_opt_alloc(ctx, &options)))
{
WLog_ERR(TAG, "error while allocating options");
goto cleanup;
}
/* Set default options */
krb5_get_init_creds_opt_set_forwardable(options, 0);
krb5_get_init_creds_opt_set_proxiable(options, 0);
#ifdef WITH_GSSAPI_MIT
2017-05-11 19:51:45 +03:00
/* for MIT we specify ccache output using an option */
if ((ret = krb5_get_init_creds_opt_set_out_ccache(ctx, options, ccache)))
{
WLog_ERR(TAG, "error while setting ccache output");
goto cleanup;
}
2017-05-11 19:51:45 +03:00
#endif
if ((ret = krb5_init_creds_init(ctx, client, NULL, NULL, starttime, options, &init_ctx)))
{
WLog_ERR(TAG, "error krb5_init_creds_init failed");
goto cleanup;
}
if ((ret = krb5_init_creds_set_password(ctx, init_ctx, password)))
{
WLog_ERR(TAG, "error krb5_init_creds_set_password failed");
goto cleanup;
}
/* Get credentials */
if ((ret = krb5_init_creds_get(ctx, init_ctx)))
{
WLog_ERR(TAG, "error while getting credentials");
goto cleanup;
}
/* Retrieve credentials */
if ((ret = krb5_init_creds_get_creds(ctx, init_ctx, &creds)))
{
WLog_ERR(TAG, "error while retrieving credentials");
goto cleanup;
}
#ifdef WITH_GSSAPI_HEIMDAL
2017-05-11 19:51:45 +03:00
/* For Heimdal, we use this function to store credentials */
if ((ret = krb5_init_creds_store(ctx, init_ctx, ccache)))
{
WLog_ERR(TAG, "error while storing credentials");
goto cleanup;
}
#endif
2017-05-11 19:51:45 +03:00
cleanup:
krb5_free_cred_contents(ctx, &creds);
#ifdef HAVE_AT_LEAST_KRB_V1_13
/* MIT Kerberos version 1.13 at minimum.
* For releases 1.12 and previous, krb5_get_init_creds_opt structure
* is freed in krb5_init_creds_free() */
2017-05-11 19:51:45 +03:00
if (options)
krb5_get_init_creds_opt_free(ctx, options);
#endif
2017-05-11 19:51:45 +03:00
if (init_ctx)
krb5_init_creds_free(ctx, init_ctx);
if (ccache)
krb5_cc_close(ctx, ccache);
return ret;
}
static int init_creds(LPCWSTR username, size_t username_len, LPCWSTR password, size_t password_len)
2017-05-11 19:51:45 +03:00
{
krb5_error_code ret = 0;
krb5_context ctx = NULL;
krb5_principal principal = NULL;
char* krb_name = NULL;
char* lusername = NULL;
char* lrealm = NULL;
char* lpassword = NULL;
int flags = 0;
char* pstr = NULL;
2017-05-11 19:51:45 +03:00
size_t krb_name_len = 0;
size_t lrealm_len = 0;
size_t lusername_len = 0;
int status = 0;
status = ConvertFromUnicode(CP_UTF8, 0, username,
username_len, &lusername, 0, NULL, NULL);
if (status <= 0)
{
WLog_ERR(TAG, "Failed to convert username");
goto cleanup;
}
status = ConvertFromUnicode(CP_UTF8, 0, password,
password_len, &lpassword, 0, NULL, NULL);
if (status <= 0)
{
WLog_ERR(TAG, "Failed to convert password");
goto cleanup;
}
/* Could call krb5_init_secure_context, but it disallows user overrides */
ret = krb5_init_context(&ctx);
if (ret)
{
WLog_ERR(TAG, "error: while initializing Kerberos 5 library");
goto cleanup;
}
ret = krb5_get_default_realm(ctx, &lrealm);
if (ret)
{
WLog_WARN(TAG, "could not get Kerberos default realm");
goto cleanup;
}
lrealm_len = strlen(lrealm);
lusername_len = strlen(lusername);
krb_name_len = lusername_len + lrealm_len + 1; // +1 for '@'
krb_name = calloc(krb_name_len + 1, sizeof(char));
if (!krb_name)
{
WLog_ERR(TAG, "could not allocate memory for string rep of principal\n");
ret = -1;
goto cleanup;
}
/* Set buffer */
_snprintf(krb_name, krb_name_len + 1, "%s@%s", lusername, lrealm);
#ifdef WITH_DEBUG_NLA
WLog_DBG(TAG, "copied string is %s\n", krb_name);
#endif
pstr = strchr(lusername, '@');
if (pstr != NULL)
flags = KRB5_PRINCIPAL_PARSE_ENTERPRISE;
/* Use the specified principal name. */
ret = krb5_parse_name_flags(ctx, krb_name, flags,
&principal);
2017-05-11 19:51:45 +03:00
if (ret)
{
WLog_ERR(TAG, "could not convert %s to principal", krb_name);
goto cleanup;
}
ret = acquire_cred(ctx, principal, lpassword);
if (ret)
{
WLog_ERR(TAG, "Kerberos credentials not found and could not be acquired");
goto cleanup;
}
cleanup:
free(lusername);
free(lpassword);
if (krb_name)
free(krb_name);
if (lrealm)
krb5_free_default_realm(ctx, lrealm);
if (principal)
krb5_free_principal(ctx, principal);
if (ctx)
krb5_free_context(ctx);
return ret;
}
#endif
static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextA(PCredHandle phCredential,
2017-05-11 19:51:45 +03:00
PCtxtHandle phContext,
SEC_CHAR* pszTargetName, ULONG fContextReq, ULONG Reserved1,
ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2,
PCtxtHandle phNewContext, PSecBufferDesc pOutput,
ULONG* pfContextAttr, PTimeStamp ptsExpiry)
{
KRB_CONTEXT* context;
SSPI_CREDENTIALS* credentials;
PSecBuffer input_buffer = NULL;
PSecBuffer output_buffer = NULL;
2018-02-13 13:00:56 +03:00
sspi_gss_buffer_desc input_tok = { 0 };
sspi_gss_buffer_desc output_tok = { 0 };
2017-05-11 19:51:45 +03:00
sspi_gss_OID actual_mech;
sspi_gss_OID desired_mech;
UINT32 actual_services;
input_tok.length = 0;
output_tok.length = 0;
desired_mech = SSPI_GSS_C_SPNEGO_KRB5;
context = (KRB_CONTEXT*) sspi_SecureHandleGetLowerPointer(phContext);
if (!context)
{
context = kerberos_ContextNew();
if (!context)
return SEC_E_INSUFFICIENT_MEMORY;
credentials = (SSPI_CREDENTIALS*) sspi_SecureHandleGetLowerPointer(phCredential);
context->credentials = credentials;
if (kerberos_SetContextServicePrincipalNameA(context, pszTargetName) < 0)
2017-07-18 12:38:59 +03:00
{
kerberos_ContextFree(context);
2017-05-11 19:51:45 +03:00
return SEC_E_INTERNAL_ERROR;
2017-07-18 12:38:59 +03:00
}
2017-05-11 19:51:45 +03:00
sspi_SecureHandleSetLowerPointer(phNewContext, context);
sspi_SecureHandleSetUpperPointer(phNewContext, (void*) KRB_PACKAGE_NAME);
}
if (!pInput)
{
#if defined(WITH_GSSAPI)
context->major_status = sspi_gss_init_sec_context(&(context->minor_status),
context->cred, &(context->gss_ctx), context->target_name,
desired_mech, SSPI_GSS_C_MUTUAL_FLAG | SSPI_GSS_C_DELEG_FLAG,
SSPI_GSS_C_INDEFINITE, SSPI_GSS_C_NO_CHANNEL_BINDINGS,
&input_tok, &actual_mech, &output_tok, &actual_services, &(context->actual_time));
if (SSPI_GSS_ERROR(context->major_status))
{
/* GSSAPI failed because we do not have credentials */
if (context->major_status & SSPI_GSS_S_NO_CRED)
{
/* Then let's try to acquire credentials using login and password,
* and only those two, means not with a smartcard.
* If we use smartcard-logon, the credentials have already
* been acquired by pkinit process. If not, returned error previously.
*/
if (init_creds(context->credentials->identity.User,
context->credentials->identity.UserLength,
context->credentials->identity.Password,
context->credentials->identity.PasswordLength))
return SEC_E_NO_CREDENTIALS;
WLog_INFO(TAG, "Authenticated to Kerberos v5 via login/password");
2017-05-11 19:51:45 +03:00
/* retry GSSAPI call */
context->major_status = sspi_gss_init_sec_context(&(context->minor_status),
context->cred, &(context->gss_ctx), context->target_name,
desired_mech, SSPI_GSS_C_MUTUAL_FLAG | SSPI_GSS_C_DELEG_FLAG,
SSPI_GSS_C_INDEFINITE, SSPI_GSS_C_NO_CHANNEL_BINDINGS,
&input_tok, &actual_mech, &output_tok, &actual_services, &(context->actual_time));
if (SSPI_GSS_ERROR(context->major_status))
{
/* We can't use Kerberos */
WLog_ERR(TAG, "Init GSS security context failed : can't use Kerberos");
2017-05-11 19:51:45 +03:00
return SEC_E_INTERNAL_ERROR;
}
}
}
#endif
if (context->major_status & SSPI_GSS_S_CONTINUE_NEEDED)
{
if (output_tok.length != 0)
{
if (!pOutput)
return SEC_E_INVALID_TOKEN;
if (pOutput->cBuffers < 1)
return SEC_E_INVALID_TOKEN;
output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
if (!output_buffer)
return SEC_E_INVALID_TOKEN;
if (output_buffer->cbBuffer < 1)
return SEC_E_INVALID_TOKEN;
CopyMemory(output_buffer->pvBuffer, output_tok.value, output_tok.length);
output_buffer->cbBuffer = output_tok.length;
sspi_gss_release_buffer(&(context->minor_status), &output_tok);
return SEC_I_CONTINUE_NEEDED;
}
}
}
else
{
input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
if (!input_buffer)
return SEC_E_INVALID_TOKEN;
if (input_buffer->cbBuffer < 1)
return SEC_E_INVALID_TOKEN;
input_tok.value = input_buffer->pvBuffer;
input_tok.length = input_buffer->cbBuffer;
context->major_status = sspi_gss_init_sec_context(&(context->minor_status),
context->cred, &(context->gss_ctx), context->target_name,
desired_mech, SSPI_GSS_C_MUTUAL_FLAG | SSPI_GSS_C_DELEG_FLAG,
SSPI_GSS_C_INDEFINITE, SSPI_GSS_C_NO_CHANNEL_BINDINGS,
&input_tok, &actual_mech, &output_tok, &actual_services, &(context->actual_time));
if (SSPI_GSS_ERROR(context->major_status))
return SEC_E_INTERNAL_ERROR;
if (output_tok.length == 0)
{
/* Free output_buffer to detect second call in NLA */
output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
sspi_SecBufferFree(output_buffer);
return SEC_E_OK;
}
else
{
return SEC_E_INTERNAL_ERROR;
}
}
return SEC_E_INTERNAL_ERROR;
}
static SECURITY_STATUS SEC_ENTRY kerberos_DeleteSecurityContext(PCtxtHandle phContext)
2017-05-11 19:51:45 +03:00
{
KRB_CONTEXT* context;
context = (KRB_CONTEXT*) sspi_SecureHandleGetLowerPointer(phContext);
if (!context)
return SEC_E_INVALID_HANDLE;
kerberos_ContextFree(context);
return SEC_E_OK;
}
static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesW(PCtxtHandle phContext,
ULONG ulAttribute,
2017-05-11 19:51:45 +03:00
void* pBuffer)
{
return SEC_E_OK;
}
static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesA(PCtxtHandle phContext,
ULONG ulAttribute,
2017-05-11 19:51:45 +03:00
void* pBuffer)
{
if (!phContext)
return SEC_E_INVALID_HANDLE;
if (!pBuffer)
return SEC_E_INSUFFICIENT_MEMORY;
if (ulAttribute == SECPKG_ATTR_SIZES)
{
SecPkgContext_Sizes* ContextSizes = (SecPkgContext_Sizes*) pBuffer;
/* The MaxTokenSize by default is 12,000 bytes. This has been the default value
* since Windows 2000 SP2 and still remains in Windows 7 and Windows 2008 R2.
* For Windows Server 2012, the default value of the MaxTokenSize registry
* entry is 48,000 bytes.*/
ContextSizes->cbMaxToken = KERBEROS_SecPkgInfoA.cbMaxToken;
ContextSizes->cbMaxSignature = 0; /* means verify not supported */
ContextSizes->cbBlockSize = 0; /* padding not used */
ContextSizes->cbSecurityTrailer = 60; /* gss_wrap adds additional 60 bytes for encrypt message */
return SEC_E_OK;
}
return SEC_E_UNSUPPORTED_FUNCTION;
}
static SECURITY_STATUS SEC_ENTRY kerberos_EncryptMessage(PCtxtHandle phContext, ULONG fQOP,
2017-05-11 19:51:45 +03:00
PSecBufferDesc pMessage, ULONG MessageSeqNo)
{
int index;
int conf_state;
UINT32 major_status;
UINT32 minor_status;
KRB_CONTEXT* context;
sspi_gss_buffer_desc input;
sspi_gss_buffer_desc output;
PSecBuffer data_buffer = NULL;
context = (KRB_CONTEXT*) sspi_SecureHandleGetLowerPointer(phContext);
if (!context)
return SEC_E_INVALID_HANDLE;
for (index = 0; index < (int) pMessage->cBuffers; index++)
{
if (pMessage->pBuffers[index].BufferType == SECBUFFER_DATA)
data_buffer = &pMessage->pBuffers[index];
}
if (!data_buffer)
return SEC_E_INVALID_TOKEN;
input.value = data_buffer->pvBuffer;
input.length = data_buffer->cbBuffer;
major_status = sspi_gss_wrap(&minor_status, context->gss_ctx, TRUE,
SSPI_GSS_C_QOP_DEFAULT, &input, &conf_state, &output);
if (SSPI_GSS_ERROR(major_status))
return SEC_E_INTERNAL_ERROR;
if (conf_state == 0)
{
WLog_ERR(TAG, "error: gss_wrap confidentiality was not applied");
sspi_gss_release_buffer(&minor_status, &output);
return SEC_E_INTERNAL_ERROR;
}
CopyMemory(data_buffer->pvBuffer, output.value, output.length);
sspi_gss_release_buffer(&minor_status, &output);
return SEC_E_OK;
}
static SECURITY_STATUS SEC_ENTRY kerberos_DecryptMessage(PCtxtHandle phContext,
2017-05-11 19:51:45 +03:00
PSecBufferDesc pMessage, ULONG MessageSeqNo, ULONG* pfQOP)
{
int index;
int conf_state;
UINT32 major_status;
UINT32 minor_status;
KRB_CONTEXT* context;
sspi_gss_buffer_desc input_data;
sspi_gss_buffer_desc output;
PSecBuffer data_buffer_to_unwrap = NULL;
context = (KRB_CONTEXT*) sspi_SecureHandleGetLowerPointer(phContext);
if (!context)
return SEC_E_INVALID_HANDLE;
for (index = 0; index < (int) pMessage->cBuffers; index++)
{
if (pMessage->pBuffers[index].BufferType == SECBUFFER_DATA)
data_buffer_to_unwrap = &pMessage->pBuffers[index];
}
if (!data_buffer_to_unwrap)
return SEC_E_INVALID_TOKEN;
/* unwrap encrypted TLS key AND its signature */
input_data.value = data_buffer_to_unwrap->pvBuffer;
input_data.length = data_buffer_to_unwrap->cbBuffer;
major_status = sspi_gss_unwrap(&minor_status, context->gss_ctx, &input_data, &output, &conf_state,
NULL);
if (SSPI_GSS_ERROR(major_status))
return SEC_E_INTERNAL_ERROR;
if (conf_state == 0)
{
WLog_ERR(TAG, "error: gss_unwrap confidentiality was not applied");
sspi_gss_release_buffer(&minor_status, &output);
return SEC_E_INTERNAL_ERROR;
}
CopyMemory(data_buffer_to_unwrap->pvBuffer, output.value, output.length);
sspi_gss_release_buffer(&minor_status, &output);
return SEC_E_OK;
}
static SECURITY_STATUS SEC_ENTRY kerberos_MakeSignature(PCtxtHandle phContext,
2017-05-11 19:51:45 +03:00
ULONG fQOP, PSecBufferDesc pMessage, ULONG MessageSeqNo)
{
return SEC_E_OK;
}
static SECURITY_STATUS SEC_ENTRY kerberos_VerifySignature(PCtxtHandle phContext,
2017-05-11 19:51:45 +03:00
PSecBufferDesc pMessage, ULONG MessageSeqNo, ULONG* pfQOP)
{
return SEC_E_OK;
}
const SecurityFunctionTableA KERBEROS_SecurityFunctionTableA =
{
1, /* dwVersion */
NULL, /* EnumerateSecurityPackages */
kerberos_QueryCredentialsAttributesA, /* QueryCredentialsAttributes */
kerberos_AcquireCredentialsHandleA, /* AcquireCredentialsHandle */
kerberos_FreeCredentialsHandle, /* FreeCredentialsHandle */
NULL, /* Reserved2 */
kerberos_InitializeSecurityContextA, /* InitializeSecurityContext */
NULL, /* AcceptSecurityContext */
NULL, /* CompleteAuthToken */
kerberos_DeleteSecurityContext, /* DeleteSecurityContext */
NULL, /* ApplyControlToken */
kerberos_QueryContextAttributesA, /* QueryContextAttributes */
NULL, /* ImpersonateSecurityContext */
NULL, /* RevertSecurityContext */
kerberos_MakeSignature, /* MakeSignature */
kerberos_VerifySignature, /* VerifySignature */
NULL, /* FreeContextBuffer */
NULL, /* QuerySecurityPackageInfo */
NULL, /* Reserved3 */
NULL, /* Reserved4 */
NULL, /* ExportSecurityContext */
NULL, /* ImportSecurityContext */
NULL, /* AddCredentials */
NULL, /* Reserved8 */
NULL, /* QuerySecurityContextToken */
kerberos_EncryptMessage, /* EncryptMessage */
kerberos_DecryptMessage, /* DecryptMessage */
NULL, /* SetContextAttributes */
};
const SecurityFunctionTableW KERBEROS_SecurityFunctionTableW =
{
1, /* dwVersion */
NULL, /* EnumerateSecurityPackages */
kerberos_QueryCredentialsAttributesW, /* QueryCredentialsAttributes */
kerberos_AcquireCredentialsHandleW, /* AcquireCredentialsHandle */
kerberos_FreeCredentialsHandle, /* FreeCredentialsHandle */
NULL, /* Reserved2 */
kerberos_InitializeSecurityContextW, /* InitializeSecurityContext */
NULL, /* AcceptSecurityContext */
NULL, /* CompleteAuthToken */
kerberos_DeleteSecurityContext, /* DeleteSecurityContext */
NULL, /* ApplyControlToken */
kerberos_QueryContextAttributesW, /* QueryContextAttributes */
NULL, /* ImpersonateSecurityContext */
NULL, /* RevertSecurityContext */
kerberos_MakeSignature, /* MakeSignature */
kerberos_VerifySignature, /* VerifySignature */
NULL, /* FreeContextBuffer */
NULL, /* QuerySecurityPackageInfo */
NULL, /* Reserved3 */
NULL, /* Reserved4 */
NULL, /* ExportSecurityContext */
NULL, /* ImportSecurityContext */
NULL, /* AddCredentials */
NULL, /* Reserved8 */
NULL, /* QuerySecurityContextToken */
kerberos_EncryptMessage, /* EncryptMessage */
kerberos_DecryptMessage, /* DecryptMessage */
NULL, /* SetContextAttributes */
};