1718 lines
52 KiB
C
1718 lines
52 KiB
C
/**
|
|
* FreeRDP: A Remote Desktop Protocol Client
|
|
* Kerberos Auth Protocol
|
|
*
|
|
* Copyright 2015 ANSSI, Author Thomas Calderon
|
|
* Copyright 2017 Dorian Ducournau <dorian.ducournau@gmail.com>
|
|
* Copyright 2022 David Fort <contact@hardening-consulting.com>
|
|
* Copyright 2022 Isaac Klein <fifthdegree@protonmail.com>
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
#include <winpr/config.h>
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
|
|
#include <winpr/assert.h>
|
|
#include <winpr/crt.h>
|
|
#include <winpr/sspi.h>
|
|
#include <winpr/print.h>
|
|
#include <winpr/tchar.h>
|
|
#include <winpr/sysinfo.h>
|
|
#include <winpr/registry.h>
|
|
#include <winpr/endian.h>
|
|
|
|
#include "kerberos.h"
|
|
|
|
#ifdef WITH_GSSAPI_HEIMDAL
|
|
#include <krb5-protos.h>
|
|
#endif
|
|
|
|
#include "../sspi.h"
|
|
#include "../../log.h"
|
|
#define TAG WINPR_TAG("sspi.Kerberos")
|
|
|
|
#define KRB_TGT_REQ 16
|
|
#define KRB_TGT_REP 17
|
|
|
|
const SecPkgInfoA KERBEROS_SecPkgInfoA = {
|
|
0x000F3BBF, /* fCapabilities */
|
|
1, /* wVersion */
|
|
0x0010, /* wRPCID */
|
|
0x0000BB80, /* cbMaxToken : 48k bytes maximum for Windows Server 2012 */
|
|
"Kerberos", /* Name */
|
|
"Kerberos Security Package" /* Comment */
|
|
};
|
|
|
|
static WCHAR KERBEROS_SecPkgInfoW_Name[] = { 'K', 'e', 'r', 'b', 'e', 'r', 'o', 's', '\0' };
|
|
|
|
static WCHAR KERBEROS_SecPkgInfoW_Comment[] = { 'K', 'e', 'r', 'b', 'e', 'r', 'o', 's', ' ',
|
|
'S', 'e', 'c', 'u', 'r', 'i', 't', 'y', ' ',
|
|
'P', 'a', 'c', 'k', 'a', 'g', 'e', '\0' };
|
|
|
|
const SecPkgInfoW KERBEROS_SecPkgInfoW = {
|
|
0x000F3BBF, /* fCapabilities */
|
|
1, /* wVersion */
|
|
0x0010, /* wRPCID */
|
|
0x0000BB80, /* cbMaxToken : 48k bytes maximum for Windows Server 2012 */
|
|
KERBEROS_SecPkgInfoW_Name, /* Name */
|
|
KERBEROS_SecPkgInfoW_Comment /* Comment */
|
|
};
|
|
|
|
#ifdef WITH_GSSAPI
|
|
|
|
enum KERBEROS_STATE
|
|
{
|
|
KERBEROS_STATE_INITIAL,
|
|
KERBEROS_STATE_TGT_REQ,
|
|
KERBEROS_STATE_TGT_REP,
|
|
KERBEROS_STATE_AP_REQ,
|
|
KERBEROS_STATE_AP_REP,
|
|
KERBEROS_STATE_FINAL
|
|
};
|
|
|
|
struct s_KRB_CONTEXT
|
|
{
|
|
enum KERBEROS_STATE state;
|
|
krb5_context ctx;
|
|
krb5_auth_context auth_ctx;
|
|
BOOL acceptor;
|
|
uint32_t flags;
|
|
uint64_t local_seq;
|
|
uint64_t remote_seq;
|
|
krb5_key session_key;
|
|
krb5_key initiator_key;
|
|
krb5_key acceptor_key;
|
|
BOOL u2u;
|
|
};
|
|
|
|
typedef struct KRB_CREDENTIALS_st
|
|
{
|
|
char* kdc_url;
|
|
krb5_ccache ccache;
|
|
krb5_keytab keytab;
|
|
krb5_keytab client_keytab;
|
|
} KRB_CREDENTIALS;
|
|
|
|
static const WinPrAsn1_OID kerberos_OID = { 9, (void*)"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02" };
|
|
static const WinPrAsn1_OID kerberos_u2u_OID = { 10,
|
|
(void*)"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02\x03" };
|
|
|
|
static void kerberos_log_msg(krb5_context ctx, krb5_error_code code)
|
|
{
|
|
const char* msg = krb5_get_error_message(ctx, code);
|
|
WLog_ERR(TAG, msg);
|
|
krb5_free_error_message(ctx, msg);
|
|
}
|
|
|
|
static KRB_CONTEXT* kerberos_ContextNew(void)
|
|
{
|
|
KRB_CONTEXT* context;
|
|
|
|
context = (KRB_CONTEXT*)calloc(1, sizeof(KRB_CONTEXT));
|
|
if (!context)
|
|
return NULL;
|
|
|
|
return context;
|
|
}
|
|
|
|
static krb5_error_code krb5_prompter(krb5_context context, void* data, const char* name,
|
|
const char* banner, int num_prompts, krb5_prompt prompts[])
|
|
{
|
|
int i;
|
|
krb5_prompt_type* ptypes = krb5_get_prompt_types(context);
|
|
|
|
for (i = 0; i < num_prompts; i++)
|
|
{
|
|
if (ptypes &&
|
|
(ptypes[i] == KRB5_PROMPT_TYPE_PREAUTH || ptypes[i] == KRB5_PROMPT_TYPE_PASSWORD) &&
|
|
data)
|
|
{
|
|
prompts[i].reply->data = _strdup((const char*)data);
|
|
prompts[i].reply->length = strlen((const char*)data);
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static INLINE void kerberos_set_krb_opts(krb5_context ctx, krb5_get_init_creds_opt* gic_opt,
|
|
const SEC_WINPR_KERBEROS_SETTINGS* krb_settings)
|
|
{
|
|
if (krb_settings->lifeTime)
|
|
krb5_get_init_creds_opt_set_tkt_life(gic_opt, krb_settings->lifeTime);
|
|
if (krb_settings->renewLifeTime)
|
|
krb5_get_init_creds_opt_set_renew_life(gic_opt, krb_settings->renewLifeTime);
|
|
if (krb_settings->withPac)
|
|
krb5_get_init_creds_opt_set_pac_request(ctx, gic_opt, TRUE);
|
|
if (krb_settings->armorCache)
|
|
krb5_get_init_creds_opt_set_fast_ccache_name(ctx, gic_opt, krb_settings->armorCache);
|
|
if (krb_settings->pkinitX509Identity)
|
|
krb5_get_init_creds_opt_set_pa(ctx, gic_opt, "X509_user_identity",
|
|
krb_settings->pkinitX509Identity);
|
|
if (krb_settings->pkinitX509Anchors)
|
|
krb5_get_init_creds_opt_set_pa(ctx, gic_opt, "X509_anchors",
|
|
krb_settings->pkinitX509Anchors);
|
|
}
|
|
|
|
#endif /* WITH_GSSAPI */
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleA(
|
|
SEC_CHAR* pszPrincipal, SEC_CHAR* pszPackage, ULONG fCredentialUse, void* pvLogonID,
|
|
void* pAuthData, SEC_GET_KEY_FN pGetKeyFn, void* pvGetKeyArgument, PCredHandle phCredential,
|
|
PTimeStamp ptsExpiry)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
SEC_WINNT_AUTH_IDENTITY* identity = pAuthData;
|
|
SEC_WINPR_KERBEROS_SETTINGS* krb_settings = NULL;
|
|
KRB_CREDENTIALS* credentials = NULL;
|
|
krb5_error_code rv;
|
|
krb5_context ctx = NULL;
|
|
krb5_ccache ccache = NULL;
|
|
krb5_keytab keytab = NULL;
|
|
krb5_get_init_creds_opt* gic_opt = NULL;
|
|
krb5_deltat start_time = 0;
|
|
krb5_principal principal = NULL;
|
|
krb5_init_creds_context creds_ctx = NULL;
|
|
BOOL is_unicode = FALSE;
|
|
char* domain = NULL;
|
|
char* username = NULL;
|
|
char* password = NULL;
|
|
const char* fallback_ccache = "MEMORY:";
|
|
|
|
if (identity)
|
|
{
|
|
if (identity->Flags & SEC_WINNT_AUTH_IDENTITY_EXTENDED)
|
|
krb_settings = &((SEC_WINNT_AUTH_IDENTITY_WINPR*)identity)->kerberosSettings;
|
|
|
|
if (identity->Flags & SEC_WINNT_AUTH_IDENTITY_UNICODE)
|
|
{
|
|
is_unicode = TRUE;
|
|
ConvertFromUnicode(CP_UTF8, 0, (WCHAR*)identity->Domain, identity->DomainLength,
|
|
&domain, 0, NULL, NULL);
|
|
ConvertFromUnicode(CP_UTF8, 0, (WCHAR*)identity->User, identity->UserLength, &username,
|
|
0, NULL, NULL);
|
|
ConvertFromUnicode(CP_UTF8, 0, (WCHAR*)identity->Password, identity->PasswordLength,
|
|
&password, 0, NULL, NULL);
|
|
}
|
|
else
|
|
{
|
|
domain = (char*)identity->Domain;
|
|
username = (char*)identity->User;
|
|
password = (char*)identity->Password;
|
|
}
|
|
|
|
if (!pszPrincipal)
|
|
pszPrincipal = username;
|
|
}
|
|
|
|
if ((rv = krb5_init_context(&ctx)))
|
|
goto cleanup;
|
|
|
|
if (domain)
|
|
{
|
|
CharUpperA(domain);
|
|
/* Will use domain if realm is not specified in username */
|
|
if ((rv = krb5_set_default_realm(ctx, domain)))
|
|
goto cleanup;
|
|
}
|
|
|
|
if (pszPrincipal)
|
|
{
|
|
/* Find realm component if included and convert to uppercase */
|
|
char* p = strchr(pszPrincipal, '@');
|
|
CharUpperA(p);
|
|
|
|
if ((rv = krb5_parse_name(ctx, pszPrincipal, &principal)))
|
|
goto cleanup;
|
|
}
|
|
|
|
if (krb_settings && krb_settings->cache)
|
|
{
|
|
if ((rv = krb5_cc_set_default_name(ctx, krb_settings->cache)))
|
|
goto cleanup;
|
|
fallback_ccache = krb_settings->cache;
|
|
}
|
|
|
|
if (principal)
|
|
{
|
|
/* Use the default cache if it's initialized with the right principal */
|
|
if (krb5_cc_cache_match(ctx, principal, &ccache) == KRB5_CC_NOTFOUND)
|
|
{
|
|
if ((rv = krb5_cc_resolve(ctx, fallback_ccache, &ccache)))
|
|
goto cleanup;
|
|
if ((rv = krb5_cc_initialize(ctx, ccache, principal)))
|
|
goto cleanup;
|
|
}
|
|
}
|
|
else if (fCredentialUse & SECPKG_CRED_OUTBOUND)
|
|
{
|
|
/* Use the default cache with it's default principal */
|
|
if ((rv = krb5_cc_default(ctx, &ccache)))
|
|
goto cleanup;
|
|
if ((rv = krb5_cc_get_principal(ctx, ccache, &principal)))
|
|
goto cleanup;
|
|
}
|
|
else
|
|
{
|
|
if ((rv = krb5_cc_resolve(ctx, fallback_ccache, &ccache)))
|
|
goto cleanup;
|
|
}
|
|
|
|
if (krb_settings && krb_settings->keytab)
|
|
{
|
|
if ((rv = krb5_kt_resolve(ctx, krb_settings->keytab, &keytab)))
|
|
goto cleanup;
|
|
}
|
|
else
|
|
{
|
|
if (fCredentialUse & SECPKG_CRED_INBOUND)
|
|
if ((rv = krb5_kt_default(ctx, &keytab)))
|
|
goto cleanup;
|
|
}
|
|
|
|
/* Get initial credentials if required */
|
|
if (fCredentialUse & SECPKG_CRED_OUTBOUND)
|
|
{
|
|
if ((rv = krb5_get_init_creds_opt_alloc(ctx, &gic_opt)))
|
|
goto cleanup;
|
|
|
|
krb5_get_init_creds_opt_set_forwardable(gic_opt, 0);
|
|
krb5_get_init_creds_opt_set_proxiable(gic_opt, 0);
|
|
|
|
if (krb_settings)
|
|
{
|
|
if (krb_settings->startTime)
|
|
start_time = krb_settings->startTime;
|
|
kerberos_set_krb_opts(ctx, gic_opt, krb_settings);
|
|
}
|
|
|
|
#ifdef WITH_GSSAPI_MIT
|
|
krb5_get_init_creds_opt_set_out_ccache(ctx, gic_opt, ccache);
|
|
krb5_get_init_creds_opt_set_in_ccache(ctx, gic_opt, ccache);
|
|
#endif
|
|
|
|
if ((rv = krb5_init_creds_init(ctx, principal, krb5_prompter, password, start_time, gic_opt,
|
|
&creds_ctx)))
|
|
goto cleanup;
|
|
|
|
if ((rv = krb5_init_creds_get(ctx, creds_ctx)))
|
|
goto cleanup;
|
|
|
|
#ifdef WITH_GSSAPI_HEIMDAL
|
|
{
|
|
krb5_creds creds;
|
|
if ((rv = krb5_init_creds_get_creds(ctx, creds_ctx, &creds)))
|
|
goto cleanup;
|
|
if (rv = krb5_cc_store_cred(ctx, ccache, &creds))
|
|
goto cleanup;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
credentials = calloc(1, sizeof(KRB_CREDENTIALS));
|
|
if (!credentials)
|
|
goto cleanup;
|
|
credentials->ccache = ccache;
|
|
credentials->keytab = keytab;
|
|
|
|
cleanup:
|
|
|
|
if (rv)
|
|
kerberos_log_msg(ctx, rv);
|
|
|
|
if (is_unicode)
|
|
{
|
|
if (domain)
|
|
free(domain);
|
|
if (username)
|
|
free(username);
|
|
if (password)
|
|
free(password);
|
|
}
|
|
if (principal)
|
|
krb5_free_principal(ctx, principal);
|
|
if (creds_ctx)
|
|
krb5_init_creds_free(ctx, creds_ctx);
|
|
#ifdef HAVE_AT_LEAST_KRB_V1_13
|
|
if (gic_opt)
|
|
krb5_get_init_creds_opt_free(ctx, gic_opt);
|
|
#endif
|
|
if (ctx)
|
|
krb5_free_context(ctx);
|
|
|
|
/* If we managed to get credentials set the output */
|
|
if (credentials)
|
|
{
|
|
sspi_SecureHandleSetLowerPointer(phCredential, (void*)credentials);
|
|
sspi_SecureHandleSetUpperPointer(phCredential, (void*)KERBEROS_SSP_NAME);
|
|
return SEC_E_OK;
|
|
}
|
|
|
|
return SEC_E_NO_CREDENTIALS;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleW(
|
|
SEC_WCHAR* pszPrincipal, SEC_WCHAR* pszPackage, ULONG fCredentialUse, void* pvLogonID,
|
|
void* pAuthData, SEC_GET_KEY_FN pGetKeyFn, void* pvGetKeyArgument, PCredHandle phCredential,
|
|
PTimeStamp ptsExpiry)
|
|
{
|
|
SECURITY_STATUS status;
|
|
char* principal = NULL;
|
|
char* package = NULL;
|
|
|
|
if (pszPrincipal)
|
|
ConvertFromUnicode(CP_UTF8, 0, pszPrincipal, -1, &principal, 0, NULL, NULL);
|
|
if (pszPackage)
|
|
ConvertFromUnicode(CP_UTF8, 0, pszPackage, -1, &package, 0, NULL, NULL);
|
|
|
|
status =
|
|
kerberos_AcquireCredentialsHandleA(principal, package, fCredentialUse, pvLogonID, pAuthData,
|
|
pGetKeyFn, pvGetKeyArgument, phCredential, ptsExpiry);
|
|
|
|
if (principal)
|
|
free(principal);
|
|
if (package)
|
|
free(package);
|
|
|
|
return status;
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_FreeCredentialsHandle(PCredHandle phCredential)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
KRB_CREDENTIALS* credentials;
|
|
krb5_context ctx;
|
|
|
|
credentials = sspi_SecureHandleGetLowerPointer(phCredential);
|
|
if (!credentials)
|
|
return SEC_E_INVALID_HANDLE;
|
|
|
|
if (krb5_init_context(&ctx))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
free(credentials->kdc_url);
|
|
|
|
if (credentials->ccache)
|
|
krb5_cc_close(ctx, credentials->ccache);
|
|
if (credentials->keytab)
|
|
krb5_kt_close(ctx, credentials->keytab);
|
|
|
|
krb5_free_context(ctx);
|
|
|
|
free(credentials);
|
|
|
|
sspi_SecureHandleInvalidate(phCredential);
|
|
return SEC_E_OK;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesW(PCredHandle phCredential,
|
|
ULONG ulAttribute,
|
|
void* pBuffer)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
if (ulAttribute == SECPKG_CRED_ATTR_NAMES)
|
|
{
|
|
return SEC_E_OK;
|
|
}
|
|
|
|
WLog_ERR(TAG, "[%s]: TODO: Implement ulAttribute=%08" PRIx32, __FUNCTION__, ulAttribute);
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesA(PCredHandle phCredential,
|
|
ULONG ulAttribute,
|
|
void* pBuffer)
|
|
{
|
|
return kerberos_QueryCredentialsAttributesW(phCredential, ulAttribute, pBuffer);
|
|
}
|
|
|
|
#ifdef WITH_GSSAPI
|
|
|
|
static BOOL kerberos_mk_tgt_token(SecBuffer* buf, int msg_type, char* sname, char* host,
|
|
const krb5_data* ticket)
|
|
{
|
|
WinPrAsn1Encoder* enc;
|
|
WinPrAsn1_MemoryChunk data;
|
|
wStream s;
|
|
size_t len;
|
|
sspi_gss_data token;
|
|
BOOL ret = FALSE;
|
|
|
|
WINPR_ASSERT(buf);
|
|
|
|
if (msg_type != KRB_TGT_REQ && msg_type != KRB_TGT_REP)
|
|
return FALSE;
|
|
if (msg_type == KRB_TGT_REP && !ticket)
|
|
return FALSE;
|
|
|
|
enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER);
|
|
if (!enc)
|
|
return FALSE;
|
|
|
|
/* KERB-TGT-REQUEST (SEQUENCE) */
|
|
if (!WinPrAsn1EncSeqContainer(enc))
|
|
goto cleanup;
|
|
|
|
/* pvno [0] INTEGER */
|
|
if (!WinPrAsn1EncContextualInteger(enc, 0, 5))
|
|
goto cleanup;
|
|
|
|
/* msg-type [1] INTEGER */
|
|
if (!WinPrAsn1EncContextualInteger(enc, 1, msg_type))
|
|
goto cleanup;
|
|
|
|
if (msg_type == KRB_TGT_REQ && sname)
|
|
{
|
|
/* server-name [2] PrincipalName (SEQUENCE) */
|
|
if (!WinPrAsn1EncContextualSeqContainer(enc, 2))
|
|
goto cleanup;
|
|
|
|
/* name-type [0] INTEGER */
|
|
if (!WinPrAsn1EncContextualInteger(enc, 0, KRB5_NT_SRV_HST))
|
|
goto cleanup;
|
|
|
|
/* name-string [1] SEQUENCE OF GeneralString */
|
|
if (!WinPrAsn1EncContextualSeqContainer(enc, 1))
|
|
goto cleanup;
|
|
|
|
if (!WinPrAsn1EncGeneralString(enc, sname))
|
|
goto cleanup;
|
|
|
|
if (host && !WinPrAsn1EncGeneralString(enc, host))
|
|
goto cleanup;
|
|
|
|
if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc))
|
|
goto cleanup;
|
|
}
|
|
else if (msg_type == KRB_TGT_REP)
|
|
{
|
|
/* ticket [2] Ticket */
|
|
data.data = (BYTE*)ticket->data;
|
|
data.len = ticket->length;
|
|
if (!WinPrAsn1EncContextualRawContent(enc, 2, &data))
|
|
goto cleanup;
|
|
}
|
|
|
|
if (!WinPrAsn1EncEndContainer(enc))
|
|
goto cleanup;
|
|
|
|
if (!WinPrAsn1EncStreamSize(enc, &len) || len > buf->cbBuffer)
|
|
goto cleanup;
|
|
|
|
Stream_StaticInit(&s, buf->pvBuffer, len);
|
|
if (!WinPrAsn1EncToStream(enc, &s))
|
|
goto cleanup;
|
|
|
|
token.data = buf->pvBuffer;
|
|
token.length = (UINT)len;
|
|
if (sspi_gss_wrap_token(buf, &kerberos_u2u_OID,
|
|
msg_type == KRB_TGT_REQ ? TOK_ID_TGT_REQ : TOK_ID_TGT_REP, &token))
|
|
ret = TRUE;
|
|
|
|
cleanup:
|
|
WinPrAsn1Encoder_Free(&enc);
|
|
return ret;
|
|
}
|
|
|
|
static BOOL kerberos_rd_tgt_token(const sspi_gss_data* token, char** target, krb5_data* ticket)
|
|
{
|
|
WinPrAsn1Decoder dec, dec2;
|
|
BOOL error;
|
|
WinPrAsn1_tagId tag;
|
|
WinPrAsn1_INTEGER val;
|
|
size_t len;
|
|
wStream s;
|
|
char* buf = NULL;
|
|
char* str = NULL;
|
|
|
|
WINPR_ASSERT(token);
|
|
|
|
WinPrAsn1Decoder_InitMem(&dec, WINPR_ASN1_DER, (BYTE*)token->data, token->length);
|
|
|
|
/* KERB-TGT-REQUEST (SEQUENCE) */
|
|
if (!WinPrAsn1DecReadSequence(&dec, &dec2))
|
|
return FALSE;
|
|
dec = dec2;
|
|
|
|
/* pvno [0] INTEGER */
|
|
if (!WinPrAsn1DecReadContextualInteger(&dec, 0, &error, &val) || val != 5)
|
|
return FALSE;
|
|
|
|
/* msg-type [1] INTEGER */
|
|
if (!WinPrAsn1DecReadContextualInteger(&dec, 1, &error, &val))
|
|
return FALSE;
|
|
|
|
if (val == KRB_TGT_REQ)
|
|
{
|
|
if (!target)
|
|
return FALSE;
|
|
*target = NULL;
|
|
|
|
s = WinPrAsn1DecGetStream(&dec);
|
|
len = Stream_Length(&s);
|
|
if (len == 0)
|
|
return TRUE;
|
|
|
|
buf = malloc(len);
|
|
if (!buf)
|
|
return FALSE;
|
|
|
|
*buf = 0;
|
|
*target = buf;
|
|
|
|
if (!WinPrAsn1DecReadContextualTag(&dec, &tag, &dec2))
|
|
goto fail;
|
|
|
|
if (tag == 2)
|
|
{
|
|
WinPrAsn1Decoder seq;
|
|
/* server-name [2] PrincipalName (SEQUENCE) */
|
|
if (!WinPrAsn1DecReadSequence(&dec2, &seq))
|
|
goto fail;
|
|
|
|
/* name-type [0] INTEGER */
|
|
if (!WinPrAsn1DecReadContextualInteger(&seq, 0, &error, &val))
|
|
goto fail;
|
|
|
|
/* name-string [1] SEQUENCE OF GeneralString */
|
|
if (!WinPrAsn1DecReadContextualSequence(&seq, 1, &error, &dec2))
|
|
goto fail;
|
|
|
|
while (WinPrAsn1DecPeekTag(&dec2, &tag))
|
|
{
|
|
if (!WinPrAsn1DecReadGeneralString(&dec2, &str))
|
|
goto fail;
|
|
|
|
if (buf != *target)
|
|
*buf++ = '/';
|
|
buf = stpcpy(buf, str);
|
|
free(str);
|
|
}
|
|
|
|
if (!WinPrAsn1DecReadContextualTag(&dec, &tag, &dec2))
|
|
return TRUE;
|
|
}
|
|
|
|
/* realm [3] Realm */
|
|
if (tag != 3 || !WinPrAsn1DecReadGeneralString(&dec2, &str))
|
|
goto fail;
|
|
|
|
*buf++ = '@';
|
|
strcpy(buf, str);
|
|
return TRUE;
|
|
}
|
|
else if (val == KRB_TGT_REP)
|
|
{
|
|
if (!ticket)
|
|
return FALSE;
|
|
|
|
/* ticket [2] Ticket */
|
|
if (!WinPrAsn1DecReadContextualTag(&dec, &tag, &dec2) || tag != 2)
|
|
return FALSE;
|
|
|
|
s = WinPrAsn1DecGetStream(&dec2);
|
|
ticket->data = (char*)Stream_Buffer(&s);
|
|
ticket->length = Stream_Length(&s);
|
|
return TRUE;
|
|
}
|
|
else
|
|
return FALSE;
|
|
|
|
fail:
|
|
free(buf);
|
|
return FALSE;
|
|
}
|
|
|
|
#endif /* WITH_GSSAPI */
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextA(
|
|
PCredHandle phCredential, PCtxtHandle phContext, SEC_CHAR* pszTargetName, ULONG fContextReq,
|
|
ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2,
|
|
PCtxtHandle phNewContext, PSecBufferDesc pOutput, ULONG* pfContextAttr, PTimeStamp ptsExpiry)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
KRB_CREDENTIALS* credentials;
|
|
KRB_CONTEXT* context;
|
|
KRB_CONTEXT new_context = { 0 };
|
|
krb5_error_code rv;
|
|
PSecBuffer input_buffer = NULL;
|
|
PSecBuffer output_buffer = NULL;
|
|
char* sname = NULL;
|
|
char* host = NULL;
|
|
krb5_data input_token = { 0 };
|
|
krb5_data output_token = { 0 };
|
|
SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
|
|
WinPrAsn1_OID oid = { 0 };
|
|
uint16_t tok_id = 0;
|
|
krb5_ap_rep_enc_part* reply = NULL;
|
|
krb5_error* error = NULL;
|
|
krb5_flags ap_flags = AP_OPTS_USE_SUBKEY;
|
|
char cksum_contents[24] = { 0 };
|
|
krb5_data cksum = { 0, 24, cksum_contents };
|
|
krb5_creds in_creds = { 0 };
|
|
krb5_creds* creds = NULL;
|
|
|
|
credentials = sspi_SecureHandleGetLowerPointer(phCredential);
|
|
context = sspi_SecureHandleGetLowerPointer(phContext);
|
|
|
|
if (!credentials)
|
|
return SEC_E_NO_CREDENTIALS;
|
|
|
|
if (pInput)
|
|
input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
|
|
if (pOutput)
|
|
output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
|
|
|
|
if (fContextReq & ISC_REQ_MUTUAL_AUTH)
|
|
ap_flags |= AP_OPTS_MUTUAL_REQUIRED;
|
|
|
|
if (fContextReq & ISC_REQ_USE_SESSION_KEY)
|
|
ap_flags |= AP_OPTS_USE_SESSION_KEY;
|
|
|
|
if (!context)
|
|
{
|
|
context = &new_context;
|
|
|
|
if ((rv = krb5_init_context(&context->ctx)))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
if (fContextReq & ISC_REQ_USE_SESSION_KEY)
|
|
{
|
|
context->state = KERBEROS_STATE_TGT_REQ;
|
|
context->u2u = TRUE;
|
|
}
|
|
else
|
|
context->state = KERBEROS_STATE_AP_REQ;
|
|
}
|
|
else
|
|
{
|
|
if (!input_buffer || !sspi_gss_unwrap_token(input_buffer, &oid, &tok_id, &input_token))
|
|
goto bad_token;
|
|
if ((context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_u2u_OID)) ||
|
|
(!context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_OID)))
|
|
goto bad_token;
|
|
}
|
|
|
|
/* Split target name into service/hostname components */
|
|
if (pszTargetName)
|
|
{
|
|
sname = _strdup(pszTargetName);
|
|
if (!sname)
|
|
{
|
|
status = SEC_E_INSUFFICIENT_MEMORY;
|
|
goto cleanup;
|
|
}
|
|
host = strchr(sname, '/');
|
|
if (host)
|
|
*host++ = 0;
|
|
}
|
|
|
|
/* SSPI flags are compatible with GSS flags except INTEG_FLAG */
|
|
context->flags |= (fContextReq & 0x1F);
|
|
if (fContextReq & ISC_REQ_INTEGRITY && !(fContextReq & ISC_REQ_NO_INTEGRITY))
|
|
context->flags |= SSPI_GSS_C_INTEG_FLAG;
|
|
|
|
switch (context->state)
|
|
{
|
|
case KERBEROS_STATE_TGT_REQ:
|
|
|
|
if (!kerberos_mk_tgt_token(output_buffer, KRB_TGT_REQ, sname, host, NULL))
|
|
goto cleanup;
|
|
|
|
context->state = KERBEROS_STATE_TGT_REP;
|
|
|
|
break;
|
|
|
|
case KERBEROS_STATE_TGT_REP:
|
|
|
|
if (tok_id != TOK_ID_TGT_REP)
|
|
goto bad_token;
|
|
|
|
if (!kerberos_rd_tgt_token(&input_token, NULL, &in_creds.second_ticket))
|
|
goto bad_token;
|
|
|
|
/* Continue to AP-REQ */
|
|
|
|
case KERBEROS_STATE_AP_REQ:
|
|
|
|
/* Set auth_context options */
|
|
if ((rv = krb5_auth_con_init(context->ctx, &context->auth_ctx)))
|
|
goto cleanup;
|
|
if ((rv = krb5_auth_con_setflags(context->ctx, context->auth_ctx,
|
|
KRB5_AUTH_CONTEXT_DO_SEQUENCE |
|
|
KRB5_AUTH_CONTEXT_USE_SUBKEY)))
|
|
goto cleanup;
|
|
if ((rv = krb5_auth_con_set_req_cksumtype(context->ctx, context->auth_ctx,
|
|
GSS_CHECKSUM_TYPE)))
|
|
goto cleanup;
|
|
|
|
/* Write the checksum (channel binding and delegation not implemented) */
|
|
Data_Write_UINT32(cksum_contents, 16);
|
|
Data_Write_UINT32((cksum_contents + 20), context->flags);
|
|
|
|
/* Get a service ticket */
|
|
if ((rv = krb5_sname_to_principal(context->ctx, host, sname, KRB5_NT_SRV_HST,
|
|
&in_creds.server)))
|
|
goto cleanup;
|
|
|
|
if ((rv = krb5_cc_get_principal(context->ctx, credentials->ccache, &in_creds.client)))
|
|
goto cleanup;
|
|
|
|
if ((rv = krb5_get_credentials(context->ctx, context->u2u ? KRB5_GC_USER_USER : 0,
|
|
credentials->ccache, &in_creds, &creds)))
|
|
goto cleanup;
|
|
|
|
/* Make the AP_REQ message */
|
|
if ((rv = krb5_mk_req_extended(context->ctx, &context->auth_ctx, ap_flags, &cksum,
|
|
creds, &output_token)))
|
|
goto cleanup;
|
|
|
|
if (!sspi_gss_wrap_token(output_buffer,
|
|
context->u2u ? &kerberos_u2u_OID : &kerberos_OID,
|
|
TOK_ID_AP_REQ, &output_token))
|
|
goto cleanup;
|
|
|
|
if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
|
|
{
|
|
krb5_auth_con_getlocalseqnumber(context->ctx, context->auth_ctx,
|
|
(INT32*)&context->local_seq);
|
|
context->remote_seq ^= context->local_seq;
|
|
}
|
|
|
|
krb5_auth_con_getkey_k(context->ctx, context->auth_ctx, &context->session_key);
|
|
krb5_auth_con_getsendsubkey_k(context->ctx, context->auth_ctx, &context->initiator_key);
|
|
|
|
context->state = KERBEROS_STATE_AP_REP;
|
|
|
|
break;
|
|
|
|
case KERBEROS_STATE_AP_REP:
|
|
|
|
if (tok_id == TOK_ID_AP_REP)
|
|
{
|
|
if ((rv = krb5_rd_rep(context->ctx, context->auth_ctx, &input_token, &reply)))
|
|
goto cleanup;
|
|
krb5_free_ap_rep_enc_part(context->ctx, reply);
|
|
}
|
|
else if (tok_id == TOK_ID_ERROR)
|
|
{
|
|
if (!(rv = krb5_rd_error(context->ctx, &input_token, &error)))
|
|
{
|
|
WLog_ERR(TAG, "KRB_ERROR: %s", error->text.data);
|
|
krb5_free_error(context->ctx, error);
|
|
}
|
|
goto cleanup;
|
|
}
|
|
else
|
|
goto bad_token;
|
|
|
|
if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
|
|
krb5_auth_con_getremoteseqnumber(context->ctx, context->auth_ctx,
|
|
(INT32*)&context->remote_seq);
|
|
|
|
krb5_auth_con_getrecvsubkey_k(context->ctx, context->auth_ctx, &context->acceptor_key);
|
|
|
|
context->state = KERBEROS_STATE_FINAL;
|
|
|
|
break;
|
|
|
|
case KERBEROS_STATE_FINAL:
|
|
default:
|
|
WLog_ERR(TAG, "Kerberos in invalid state!");
|
|
goto cleanup;
|
|
}
|
|
|
|
/* On first call allocate a new context */
|
|
if (new_context.ctx)
|
|
{
|
|
context = kerberos_ContextNew();
|
|
if (!context)
|
|
{
|
|
status = SEC_E_INSUFFICIENT_MEMORY;
|
|
goto cleanup;
|
|
}
|
|
CopyMemory(context, &new_context, sizeof(KRB_CONTEXT));
|
|
}
|
|
|
|
if (context->state == KERBEROS_STATE_FINAL)
|
|
{
|
|
output_buffer->cbBuffer = 0;
|
|
status = SEC_E_OK;
|
|
}
|
|
else
|
|
status = SEC_I_CONTINUE_NEEDED;
|
|
|
|
sspi_SecureHandleSetLowerPointer(phNewContext, context);
|
|
sspi_SecureHandleSetUpperPointer(phNewContext, KERBEROS_SSP_NAME);
|
|
|
|
cleanup:
|
|
|
|
if (rv)
|
|
kerberos_log_msg(context->ctx, rv);
|
|
|
|
if (output_token.data)
|
|
krb5_free_data_contents(context->ctx, &output_token);
|
|
if (sname)
|
|
free(sname);
|
|
|
|
if (context == &new_context)
|
|
{
|
|
if (context->auth_ctx)
|
|
krb5_auth_con_free(context->ctx, context->auth_ctx);
|
|
if (context->ctx)
|
|
krb5_free_context(context->ctx);
|
|
}
|
|
|
|
return status;
|
|
|
|
bad_token:
|
|
status = SEC_E_INVALID_TOKEN;
|
|
goto cleanup;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif /* WITH_GSSAPI */
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextW(
|
|
PCredHandle phCredential, PCtxtHandle phContext, SEC_WCHAR* pszTargetName, ULONG fContextReq,
|
|
ULONG Reserved1, ULONG TargetDataRep, PSecBufferDesc pInput, ULONG Reserved2,
|
|
PCtxtHandle phNewContext, PSecBufferDesc pOutput, ULONG* pfContextAttr, PTimeStamp ptsExpiry)
|
|
{
|
|
SECURITY_STATUS status;
|
|
char* target_name = NULL;
|
|
|
|
if (pszTargetName)
|
|
ConvertFromUnicode(CP_UTF8, 0, pszTargetName, -1, &target_name, 0, NULL, NULL);
|
|
|
|
status = kerberos_InitializeSecurityContextA(phCredential, phContext, target_name, fContextReq,
|
|
Reserved1, TargetDataRep, pInput, Reserved2,
|
|
phNewContext, pOutput, pfContextAttr, ptsExpiry);
|
|
|
|
if (target_name)
|
|
free(target_name);
|
|
|
|
return status;
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_AcceptSecurityContext(
|
|
PCredHandle phCredential, PCtxtHandle phContext, PSecBufferDesc pInput, ULONG fContextReq,
|
|
ULONG TargetDataRep, PCtxtHandle phNewContext, PSecBufferDesc pOutput, ULONG* pfContextAttr,
|
|
PTimeStamp ptsExpity)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
KRB_CREDENTIALS* credentials;
|
|
KRB_CONTEXT* context;
|
|
KRB_CONTEXT new_context = { 0 };
|
|
PSecBuffer input_buffer;
|
|
PSecBuffer output_buffer = NULL;
|
|
WinPrAsn1_OID oid = { 0 };
|
|
uint16_t tok_id;
|
|
krb5_data input_token = { 0 };
|
|
krb5_data output_token = { 0 };
|
|
SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
|
|
krb5_error_code rv = 0;
|
|
krb5_flags ap_flags = 0;
|
|
krb5_authenticator* authenticator;
|
|
char* target = NULL;
|
|
char* sname = NULL;
|
|
char* realm = NULL;
|
|
krb5_kt_cursor cur;
|
|
krb5_keytab_entry entry = { 0 };
|
|
krb5_principal principal = NULL;
|
|
krb5_creds creds = { 0 };
|
|
|
|
context = sspi_SecureHandleGetLowerPointer(phContext);
|
|
credentials = sspi_SecureHandleGetLowerPointer(phCredential);
|
|
|
|
if (pInput)
|
|
input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
|
|
if (pOutput)
|
|
output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
|
|
|
|
if (!input_buffer)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
if (!sspi_gss_unwrap_token(input_buffer, &oid, &tok_id, &input_token))
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
if (!context)
|
|
{
|
|
context = &new_context;
|
|
|
|
if ((rv = krb5_init_context(&context->ctx)))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
if (sspi_gss_oid_compare(&oid, &kerberos_u2u_OID))
|
|
{
|
|
context->u2u = TRUE;
|
|
context->state = KERBEROS_STATE_TGT_REQ;
|
|
}
|
|
else if (sspi_gss_oid_compare(&oid, &kerberos_OID))
|
|
context->state = KERBEROS_STATE_AP_REQ;
|
|
else
|
|
goto bad_token;
|
|
}
|
|
else
|
|
{
|
|
if ((context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_u2u_OID)) ||
|
|
(!context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_OID)))
|
|
goto bad_token;
|
|
}
|
|
|
|
if (context->state == KERBEROS_STATE_TGT_REQ && tok_id == TOK_ID_TGT_REQ)
|
|
{
|
|
if (!kerberos_rd_tgt_token(&input_token, &target, NULL))
|
|
goto bad_token;
|
|
|
|
if (target)
|
|
{
|
|
if (*target != 0 && *target != '@')
|
|
sname = target;
|
|
realm = strchr(target, '@');
|
|
if (realm)
|
|
realm++;
|
|
}
|
|
|
|
if ((rv = krb5_parse_name_flags(context->ctx, sname ? sname : "",
|
|
KRB5_PRINCIPAL_PARSE_NO_REALM, &principal)))
|
|
goto cleanup;
|
|
|
|
if (realm)
|
|
if ((rv = krb5_set_principal_realm(context->ctx, principal, realm)))
|
|
goto cleanup;
|
|
|
|
if ((rv = krb5_kt_start_seq_get(context->ctx, credentials->keytab, &cur)))
|
|
goto cleanup;
|
|
|
|
while ((rv = krb5_kt_next_entry(context->ctx, credentials->keytab, &entry, &cur)) == 0)
|
|
{
|
|
if ((!sname ||
|
|
krb5_principal_compare_any_realm(context->ctx, principal, entry.principal)) &&
|
|
(!realm || krb5_realm_compare(context->ctx, principal, entry.principal)))
|
|
break;
|
|
krb5_free_keytab_entry_contents(context->ctx, &entry);
|
|
}
|
|
|
|
krb5_kt_end_seq_get(context->ctx, credentials->keytab, &cur);
|
|
|
|
if (!entry.principal)
|
|
goto cleanup;
|
|
|
|
/* Get the TGT */
|
|
if ((rv = krb5_get_init_creds_keytab(context->ctx, &creds, entry.principal,
|
|
credentials->keytab, 0, NULL, NULL)))
|
|
goto cleanup;
|
|
|
|
if (!kerberos_mk_tgt_token(output_buffer, KRB_TGT_REP, NULL, NULL, &creds.ticket))
|
|
goto cleanup;
|
|
|
|
if ((rv = krb5_auth_con_init(context->ctx, &context->auth_ctx)))
|
|
goto cleanup;
|
|
|
|
if ((rv = krb5_auth_con_setuseruserkey(context->ctx, context->auth_ctx, &creds.keyblock)))
|
|
goto cleanup;
|
|
|
|
context->state = KERBEROS_STATE_AP_REQ;
|
|
}
|
|
else if (context->state == KERBEROS_STATE_AP_REQ && tok_id == TOK_ID_AP_REQ)
|
|
{
|
|
if ((rv = krb5_rd_req(context->ctx, &context->auth_ctx, &input_token, NULL,
|
|
credentials->keytab, &ap_flags, NULL)))
|
|
goto cleanup;
|
|
|
|
krb5_auth_con_setflags(context->ctx, context->auth_ctx,
|
|
KRB5_AUTH_CONTEXT_DO_SEQUENCE | KRB5_AUTH_CONTEXT_USE_SUBKEY);
|
|
|
|
/* Retrieve and validate the checksum */
|
|
if ((rv = krb5_auth_con_getauthenticator(context->ctx, context->auth_ctx, &authenticator)))
|
|
goto cleanup;
|
|
if (!authenticator->checksum || authenticator->checksum->checksum_type != GSS_CHECKSUM_TYPE)
|
|
goto bad_token;
|
|
Data_Read_UINT32((authenticator->checksum->contents + 20), context->flags);
|
|
|
|
if (ap_flags & AP_OPTS_MUTUAL_REQUIRED && context->flags & SSPI_GSS_C_MUTUAL_FLAG)
|
|
{
|
|
if (!output_buffer)
|
|
goto bad_token;
|
|
if ((rv = krb5_mk_rep(context->ctx, context->auth_ctx, &output_token)))
|
|
goto cleanup;
|
|
if (!sspi_gss_wrap_token(output_buffer,
|
|
context->u2u ? &kerberos_u2u_OID : &kerberos_OID,
|
|
TOK_ID_AP_REP, &output_token))
|
|
goto cleanup;
|
|
}
|
|
else
|
|
{
|
|
output_buffer->cbBuffer = 0;
|
|
}
|
|
|
|
*pfContextAttr = context->flags & 0x1F;
|
|
if (context->flags & SSPI_GSS_C_INTEG_FLAG)
|
|
*pfContextAttr |= ASC_RET_INTEGRITY;
|
|
|
|
if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
|
|
{
|
|
krb5_auth_con_getlocalseqnumber(context->ctx, context->auth_ctx,
|
|
(INT32*)&context->local_seq);
|
|
krb5_auth_con_getremoteseqnumber(context->ctx, context->auth_ctx,
|
|
(INT32*)&context->remote_seq);
|
|
}
|
|
|
|
krb5_auth_con_getkey_k(context->ctx, context->auth_ctx, &context->session_key);
|
|
krb5_auth_con_getrecvsubkey_k(context->ctx, context->auth_ctx, &context->initiator_key);
|
|
krb5_auth_con_getsendsubkey_k(context->ctx, context->auth_ctx, &context->acceptor_key);
|
|
|
|
context->state = KERBEROS_STATE_FINAL;
|
|
}
|
|
else
|
|
goto bad_token;
|
|
|
|
/* On first call allocate new context */
|
|
if (new_context.ctx)
|
|
{
|
|
context = kerberos_ContextNew();
|
|
if (!context)
|
|
{
|
|
status = SEC_E_INSUFFICIENT_MEMORY;
|
|
goto cleanup;
|
|
}
|
|
CopyMemory(context, &new_context, sizeof(KRB_CONTEXT));
|
|
ZeroMemory(&new_context, sizeof(KRB_CONTEXT));
|
|
context->acceptor = TRUE;
|
|
}
|
|
|
|
if (context->state == KERBEROS_STATE_FINAL)
|
|
status = SEC_E_OK;
|
|
else
|
|
status = SEC_I_CONTINUE_NEEDED;
|
|
|
|
sspi_SecureHandleSetLowerPointer(phNewContext, context);
|
|
sspi_SecureHandleSetUpperPointer(phNewContext, KERBEROS_SSP_NAME);
|
|
|
|
cleanup:
|
|
|
|
if (rv)
|
|
kerberos_log_msg(context->ctx, rv);
|
|
|
|
if (output_token.data)
|
|
krb5_free_data_contents(context->ctx, &output_token);
|
|
if (entry.principal)
|
|
krb5_free_keytab_entry_contents(context->ctx, &entry);
|
|
|
|
if (new_context.auth_ctx)
|
|
krb5_auth_con_free(context->ctx, new_context.auth_ctx);
|
|
if (new_context.ctx)
|
|
krb5_free_context(new_context.ctx);
|
|
|
|
return status;
|
|
|
|
bad_token:
|
|
status = SEC_E_INVALID_TOKEN;
|
|
goto cleanup;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif /* WITH_GSSAPI */
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_DeleteSecurityContext(PCtxtHandle phContext)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
KRB_CONTEXT* context;
|
|
context = (KRB_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
|
|
|
|
if (!context)
|
|
return SEC_E_INVALID_HANDLE;
|
|
|
|
krb5_k_free_key(context->ctx, context->session_key);
|
|
krb5_k_free_key(context->ctx, context->initiator_key);
|
|
krb5_k_free_key(context->ctx, context->acceptor_key);
|
|
|
|
if (context->auth_ctx)
|
|
krb5_auth_con_free(context->ctx, context->auth_ctx);
|
|
|
|
krb5_free_context(context->ctx);
|
|
|
|
return SEC_E_OK;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesA(PCtxtHandle phContext,
|
|
ULONG ulAttribute, void* pBuffer)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
if (!phContext)
|
|
return SEC_E_INVALID_HANDLE;
|
|
|
|
if (!pBuffer)
|
|
return SEC_E_INSUFFICIENT_MEMORY;
|
|
|
|
if (ulAttribute == SECPKG_ATTR_SIZES)
|
|
{
|
|
UINT header, pad, trailer;
|
|
krb5_key key;
|
|
krb5_enctype enctype;
|
|
KRB_CONTEXT* context = (KRB_CONTEXT*)sspi_SecureHandleGetLowerPointer(phContext);
|
|
SecPkgContext_Sizes* ContextSizes = (SecPkgContext_Sizes*)pBuffer;
|
|
|
|
WINPR_ASSERT(context);
|
|
WINPR_ASSERT(context->ctx);
|
|
WINPR_ASSERT(context->auth_ctx);
|
|
|
|
/* The MaxTokenSize by default is 12,000 bytes. This has been the default value
|
|
* since Windows 2000 SP2 and still remains in Windows 7 and Windows 2008 R2.
|
|
* For Windows Server 2012, the default value of the MaxTokenSize registry
|
|
* entry is 48,000 bytes.*/
|
|
ContextSizes->cbMaxToken = KERBEROS_SecPkgInfoA.cbMaxToken;
|
|
ContextSizes->cbMaxSignature = 0;
|
|
ContextSizes->cbBlockSize = 1;
|
|
ContextSizes->cbSecurityTrailer = 0;
|
|
|
|
key = context->acceptor_key ? context->acceptor_key
|
|
: context->initiator_key ? context->initiator_key
|
|
: context->session_key;
|
|
enctype = krb5_k_key_enctype(context->ctx, key);
|
|
|
|
if (context->flags & ISC_REQ_CONFIDENTIALITY)
|
|
{
|
|
krb5_c_crypto_length(context->ctx, enctype, KRB5_CRYPTO_TYPE_HEADER, &header);
|
|
krb5_c_crypto_length(context->ctx, enctype, KRB5_CRYPTO_TYPE_PADDING, &pad);
|
|
krb5_c_crypto_length(context->ctx, enctype, KRB5_CRYPTO_TYPE_TRAILER, &trailer);
|
|
/* GSS header (= 16 bytes) + encrypted header = 32 bytes */
|
|
ContextSizes->cbSecurityTrailer = header + pad + trailer + 32;
|
|
}
|
|
if (context->flags & ISC_REQ_INTEGRITY)
|
|
krb5_c_crypto_length(context->ctx, enctype, KRB5_CRYPTO_TYPE_CHECKSUM,
|
|
&ContextSizes->cbMaxSignature);
|
|
|
|
return SEC_E_OK;
|
|
}
|
|
|
|
WLog_ERR(TAG, "[%s]: TODO: Implement ulAttribute=%08" PRIx32, __FUNCTION__, ulAttribute);
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesW(PCtxtHandle phContext,
|
|
ULONG ulAttribute, void* pBuffer)
|
|
{
|
|
return kerberos_QueryContextAttributesA(phContext, ulAttribute, pBuffer);
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_SetContextAttributesW(PCtxtHandle phContext,
|
|
ULONG ulAttribute, void* pBuffer,
|
|
ULONG cbBuffer)
|
|
{
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_SetContextAttributesA(PCtxtHandle phContext,
|
|
ULONG ulAttribute, void* pBuffer,
|
|
ULONG cbBuffer)
|
|
{
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesX(PCredHandle phCredential,
|
|
ULONG ulAttribute, void* pBuffer,
|
|
ULONG cbBuffer, BOOL unicode)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
KRB_CREDENTIALS* credentials;
|
|
|
|
if (!phCredential)
|
|
return SEC_E_INVALID_HANDLE;
|
|
|
|
credentials = sspi_SecureHandleGetLowerPointer(phCredential);
|
|
|
|
if (!credentials)
|
|
return SEC_E_INVALID_HANDLE;
|
|
|
|
if (!pBuffer)
|
|
return SEC_E_INSUFFICIENT_MEMORY;
|
|
|
|
if (ulAttribute == SECPKG_CRED_ATTR_KDC_URL)
|
|
{
|
|
if (credentials->kdc_url) {
|
|
free(credentials->kdc_url);
|
|
credentials->kdc_url = NULL;
|
|
}
|
|
|
|
if (unicode) {
|
|
SEC_WCHAR* KdcUrl = ((SecPkgCredentials_KdcUrlW*) pBuffer)->KdcUrl;
|
|
|
|
if (KdcUrl) {
|
|
ConvertFromUnicode(CP_UTF8, 0, (WCHAR*) KdcUrl, -1, &credentials->kdc_url, 0, NULL, NULL);
|
|
}
|
|
} else {
|
|
SEC_CHAR* KdcUrl = ((SecPkgCredentials_KdcUrlA*) pBuffer)->KdcUrl;
|
|
|
|
if (KdcUrl) {
|
|
credentials->kdc_url = _strdup(KdcUrl);
|
|
}
|
|
}
|
|
|
|
WLog_WARN(TAG, "Kerberos SSPI module does not support KDC URL injection yet: %s", credentials->kdc_url);
|
|
}
|
|
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesW(PCredHandle phCredential,
|
|
ULONG ulAttribute, void* pBuffer,
|
|
ULONG cbBuffer)
|
|
{
|
|
return kerberos_SetCredentialsAttributesX(phCredential, ulAttribute, pBuffer, cbBuffer, TRUE);
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesA(PCredHandle phCredential,
|
|
ULONG ulAttribute, void* pBuffer,
|
|
ULONG cbBuffer)
|
|
{
|
|
return kerberos_SetCredentialsAttributesX(phCredential, ulAttribute, pBuffer, cbBuffer, FALSE);
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_EncryptMessage(PCtxtHandle phContext, ULONG fQOP,
|
|
PSecBufferDesc pMessage,
|
|
ULONG MessageSeqNo)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
KRB_CONTEXT* context;
|
|
PSecBuffer sig_buffer, data_buffer;
|
|
char* header;
|
|
BYTE flags = 0;
|
|
krb5_key key;
|
|
krb5_keyusage usage;
|
|
krb5_crypto_iov encrypt_iov[] = { { KRB5_CRYPTO_TYPE_HEADER, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_DATA, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_DATA, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_PADDING, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_TRAILER, { 0 } } };
|
|
|
|
context = sspi_SecureHandleGetLowerPointer(phContext);
|
|
if (!context)
|
|
return SEC_E_INVALID_HANDLE;
|
|
|
|
if (!(context->flags & SSPI_GSS_C_CONF_FLAG))
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
|
|
sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
|
|
data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
|
|
|
|
if (!sig_buffer || !data_buffer)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
if (fQOP)
|
|
return SEC_E_QOP_NOT_SUPPORTED;
|
|
|
|
flags |= context->acceptor ? FLAG_SENDER_IS_ACCEPTOR : 0;
|
|
flags |= FLAG_WRAP_CONFIDENTIAL;
|
|
flags |= context->acceptor_key ? FLAG_ACCEPTOR_SUBKEY : 0;
|
|
|
|
key = context->acceptor_key ? context->acceptor_key
|
|
: context->initiator_key ? context->initiator_key
|
|
: context->session_key;
|
|
if (!key)
|
|
return SEC_E_INTERNAL_ERROR;
|
|
usage = context->acceptor ? KG_USAGE_ACCEPTOR_SEAL : KG_USAGE_INITIATOR_SEAL;
|
|
|
|
/* Set the lengths of the data (plaintext + header) */
|
|
encrypt_iov[1].data.length = data_buffer->cbBuffer;
|
|
encrypt_iov[2].data.length = 16;
|
|
|
|
/* Get the lengths of the header, trailer, and padding and ensure sig_buffer is large enough */
|
|
if (krb5_c_crypto_length_iov(context->ctx, krb5_k_key_enctype(context->ctx, key), encrypt_iov,
|
|
ARRAYSIZE(encrypt_iov)))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
if (sig_buffer->cbBuffer <
|
|
encrypt_iov[0].data.length + encrypt_iov[3].data.length + encrypt_iov[4].data.length + 32)
|
|
return SEC_E_INSUFFICIENT_MEMORY;
|
|
|
|
/* Set up the iov array in sig_buffer */
|
|
header = sig_buffer->pvBuffer;
|
|
encrypt_iov[2].data.data = header + 16;
|
|
encrypt_iov[3].data.data = encrypt_iov[2].data.data + encrypt_iov[2].data.length;
|
|
encrypt_iov[4].data.data = encrypt_iov[3].data.data + encrypt_iov[3].data.length;
|
|
encrypt_iov[0].data.data = encrypt_iov[4].data.data + encrypt_iov[4].data.length;
|
|
encrypt_iov[1].data.data = data_buffer->pvBuffer;
|
|
|
|
/* Write the GSS header with 0 in RRC */
|
|
Data_Write_UINT16_BE(header, TOK_ID_WRAP);
|
|
header[2] = flags;
|
|
header[3] = 0xFF;
|
|
Data_Write_UINT32(header + 4, 0);
|
|
Data_Write_UINT64_BE(header + 8, (context->local_seq + MessageSeqNo));
|
|
|
|
/* Copy header to be encrypted */
|
|
CopyMemory(encrypt_iov[2].data.data, header, 16);
|
|
|
|
/* Set the correct RRC */
|
|
Data_Write_UINT16_BE(header + 6, 16 + encrypt_iov[3].data.length + encrypt_iov[4].data.length);
|
|
|
|
if (krb5_k_encrypt_iov(context->ctx, key, usage, NULL, encrypt_iov, ARRAYSIZE(encrypt_iov)))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
return SEC_E_OK;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_DecryptMessage(PCtxtHandle phContext,
|
|
PSecBufferDesc pMessage,
|
|
ULONG MessageSeqNo, ULONG* pfQOP)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
KRB_CONTEXT* context;
|
|
PSecBuffer sig_buffer, data_buffer;
|
|
krb5_key key;
|
|
krb5_keyusage usage;
|
|
char* header;
|
|
uint16_t tok_id;
|
|
BYTE flags;
|
|
uint16_t ec;
|
|
uint16_t rrc;
|
|
uint64_t seq_no;
|
|
krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_HEADER, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_DATA, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_DATA, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_PADDING, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_TRAILER, { 0 } } };
|
|
|
|
context = sspi_SecureHandleGetLowerPointer(phContext);
|
|
if (!context)
|
|
return SEC_E_INVALID_HANDLE;
|
|
|
|
if (!(context->flags & SSPI_GSS_C_CONF_FLAG))
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
|
|
sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
|
|
data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
|
|
|
|
if (!sig_buffer || !data_buffer || sig_buffer->cbBuffer < 16)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
/* Read in header information */
|
|
header = sig_buffer->pvBuffer;
|
|
Data_Read_UINT16_BE(header, tok_id);
|
|
flags = header[2];
|
|
Data_Read_UINT16_BE((header + 4), ec);
|
|
Data_Read_UINT16_BE((header + 6), rrc);
|
|
Data_Read_UINT64_BE((header + 8), seq_no);
|
|
|
|
/* Check that the header is valid */
|
|
if (tok_id != TOK_ID_WRAP || (BYTE)header[3] != 0xFF)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
if ((flags & FLAG_SENDER_IS_ACCEPTOR) == context->acceptor)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
if (context->flags & ISC_REQ_SEQUENCE_DETECT && seq_no != context->remote_seq + MessageSeqNo)
|
|
return SEC_E_OUT_OF_SEQUENCE;
|
|
|
|
if (!(flags & FLAG_WRAP_CONFIDENTIAL))
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
/* We don't expect a trailer buffer; the encrypted header must be rotated */
|
|
if (rrc < 16)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
/* Find the proper key and key usage */
|
|
if (flags & FLAG_ACCEPTOR_SUBKEY)
|
|
key = context->acceptor_key;
|
|
else
|
|
key = context->initiator_key ? context->initiator_key : context->session_key;
|
|
if (!key)
|
|
return SEC_E_INTERNAL_ERROR;
|
|
usage = context->acceptor ? KG_USAGE_INITIATOR_SEAL : KG_USAGE_ACCEPTOR_SEAL;
|
|
|
|
/* Fill in the lengths of the iov array */
|
|
iov[1].data.length = data_buffer->cbBuffer;
|
|
iov[2].data.length = 16;
|
|
if (krb5_c_crypto_length_iov(context->ctx, krb5_k_key_enctype(context->ctx, key), iov,
|
|
ARRAYSIZE(iov)))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
/* We don't expect a trailer buffer; everything must be in sig_buffer */
|
|
if (rrc != 16 + iov[3].data.length + iov[4].data.length)
|
|
return SEC_E_INVALID_TOKEN;
|
|
if (sig_buffer->cbBuffer != 16 + rrc + iov[0].data.length)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
/* Locate the parts of the message */
|
|
iov[0].data.data = header + 16 + rrc + ec;
|
|
iov[1].data.data = data_buffer->pvBuffer;
|
|
iov[2].data.data = header + 16 + ec;
|
|
iov[3].data.data = iov[2].data.data + iov[2].data.length;
|
|
iov[4].data.data = iov[3].data.data + iov[3].data.length;
|
|
|
|
if (krb5_k_decrypt_iov(context->ctx, key, usage, NULL, iov, ARRAYSIZE(iov)))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
/* Validate the encrypted header */
|
|
Data_Write_UINT16_BE(iov[2].data.data + 4, ec);
|
|
Data_Write_UINT16_BE(iov[2].data.data + 6, rrc);
|
|
if (memcmp(iov[2].data.data, header, 16) != 0)
|
|
return SEC_E_MESSAGE_ALTERED;
|
|
|
|
*pfQOP = 0;
|
|
|
|
return SEC_E_OK;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_MakeSignature(PCtxtHandle phContext, ULONG fQOP,
|
|
PSecBufferDesc pMessage, ULONG MessageSeqNo)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
KRB_CONTEXT* context;
|
|
PSecBuffer sig_buffer, data_buffer;
|
|
krb5_key key;
|
|
krb5_keyusage usage;
|
|
char* header;
|
|
BYTE flags = 0;
|
|
krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_DATA, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_DATA, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_CHECKSUM, { 0 } } };
|
|
|
|
context = sspi_SecureHandleGetLowerPointer(phContext);
|
|
if (!context)
|
|
return SEC_E_INVALID_HANDLE;
|
|
|
|
if (!(context->flags & SSPI_GSS_C_INTEG_FLAG))
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
|
|
sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
|
|
data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
|
|
|
|
if (!sig_buffer || !data_buffer)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
flags |= context->acceptor ? FLAG_SENDER_IS_ACCEPTOR : 0;
|
|
flags |= context->acceptor_key ? FLAG_ACCEPTOR_SUBKEY : 0;
|
|
|
|
key = context->acceptor_key ? context->acceptor_key
|
|
: context->initiator_key ? context->initiator_key
|
|
: context->session_key;
|
|
if (!key)
|
|
return SEC_E_INTERNAL_ERROR;
|
|
usage = context->acceptor ? KG_USAGE_ACCEPTOR_SIGN : KG_USAGE_INITIATOR_SIGN;
|
|
|
|
/* Fill in the lengths of the iov array */
|
|
iov[0].data.length = data_buffer->cbBuffer;
|
|
iov[1].data.length = 16;
|
|
if (krb5_c_crypto_length_iov(context->ctx, krb5_k_key_enctype(context->ctx, key), iov,
|
|
ARRAYSIZE(iov)))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
/* Ensure the buffer is big enough */
|
|
if (sig_buffer->cbBuffer < iov[2].data.length + 16)
|
|
return SEC_E_INSUFFICIENT_MEMORY;
|
|
|
|
/* Write the header */
|
|
header = sig_buffer->pvBuffer;
|
|
Data_Write_UINT16_BE(header, TOK_ID_MIC);
|
|
header[2] = flags;
|
|
memset(header + 3, 0xFF, 5);
|
|
Data_Write_UINT64_BE(header + 8, (context->local_seq + MessageSeqNo));
|
|
|
|
/* Set up the iov array */
|
|
iov[0].data.data = data_buffer->pvBuffer;
|
|
iov[1].data.data = header;
|
|
iov[2].data.data = header + 16;
|
|
|
|
if (krb5_k_make_checksum_iov(context->ctx, 0, key, usage, iov, ARRAYSIZE(iov)))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
sig_buffer->cbBuffer = iov[2].data.length + 16;
|
|
|
|
return SEC_E_OK;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif
|
|
}
|
|
|
|
static SECURITY_STATUS SEC_ENTRY kerberos_VerifySignature(PCtxtHandle phContext,
|
|
PSecBufferDesc pMessage,
|
|
ULONG MessageSeqNo, ULONG* pfQOP)
|
|
{
|
|
#ifdef WITH_GSSAPI
|
|
KRB_CONTEXT* context;
|
|
PSecBuffer sig_buffer, data_buffer;
|
|
krb5_key key;
|
|
krb5_keyusage usage;
|
|
char* header;
|
|
BYTE flags;
|
|
uint16_t tok_id;
|
|
uint64_t seq_no;
|
|
krb5_boolean is_valid;
|
|
krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_DATA, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_DATA, { 0 } },
|
|
{ KRB5_CRYPTO_TYPE_CHECKSUM, { 0 } } };
|
|
BYTE cmp_filler[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
|
|
|
|
context = sspi_SecureHandleGetLowerPointer(phContext);
|
|
if (!context)
|
|
return SEC_E_INVALID_HANDLE;
|
|
|
|
if (!(context->flags & SSPI_GSS_C_INTEG_FLAG))
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
|
|
sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
|
|
data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
|
|
|
|
if (!sig_buffer || !data_buffer || sig_buffer->cbBuffer < 16)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
/* Read in header info */
|
|
header = sig_buffer->pvBuffer;
|
|
Data_Read_UINT16_BE(header, tok_id);
|
|
flags = header[2];
|
|
Data_Read_UINT64_BE((header + 8), seq_no);
|
|
|
|
/* Validate header */
|
|
if (tok_id != TOK_ID_MIC)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
if ((flags & FLAG_SENDER_IS_ACCEPTOR) == context->acceptor || flags & FLAG_WRAP_CONFIDENTIAL)
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
if (memcmp(header + 3, cmp_filler, sizeof(cmp_filler)))
|
|
return SEC_E_INVALID_TOKEN;
|
|
|
|
if (context->flags & ISC_REQ_SEQUENCE_DETECT && seq_no != context->remote_seq + MessageSeqNo)
|
|
return SEC_E_OUT_OF_SEQUENCE;
|
|
|
|
/* Find the proper key and usage */
|
|
if (flags & FLAG_ACCEPTOR_SUBKEY)
|
|
key = context->acceptor_key;
|
|
else
|
|
key = context->initiator_key ? context->initiator_key : context->session_key;
|
|
if (!key)
|
|
return SEC_E_INTERNAL_ERROR;
|
|
usage = context->acceptor ? KG_USAGE_INITIATOR_SIGN : KG_USAGE_ACCEPTOR_SIGN;
|
|
|
|
/* Fill in the iov array lengths */
|
|
iov[0].data.length = data_buffer->cbBuffer;
|
|
iov[1].data.length = 16;
|
|
if (krb5_c_crypto_length_iov(context->ctx, krb5_k_key_enctype(context->ctx, key), iov,
|
|
ARRAYSIZE(iov)))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
if (sig_buffer->cbBuffer != iov[2].data.length + 16)
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
/* Set up the iov array */
|
|
iov[0].data.data = data_buffer->pvBuffer;
|
|
iov[1].data.data = header;
|
|
iov[2].data.data = header + 16;
|
|
|
|
if (krb5_k_verify_checksum_iov(context->ctx, 0, key, usage, iov, ARRAYSIZE(iov), &is_valid))
|
|
return SEC_E_INTERNAL_ERROR;
|
|
|
|
if (!is_valid)
|
|
return SEC_E_MESSAGE_ALTERED;
|
|
|
|
return SEC_E_OK;
|
|
#else
|
|
return SEC_E_UNSUPPORTED_FUNCTION;
|
|
#endif
|
|
}
|
|
|
|
const SecurityFunctionTableA KERBEROS_SecurityFunctionTableA = {
|
|
3, /* dwVersion */
|
|
NULL, /* EnumerateSecurityPackages */
|
|
kerberos_QueryCredentialsAttributesA, /* QueryCredentialsAttributes */
|
|
kerberos_AcquireCredentialsHandleA, /* AcquireCredentialsHandle */
|
|
kerberos_FreeCredentialsHandle, /* FreeCredentialsHandle */
|
|
NULL, /* Reserved2 */
|
|
kerberos_InitializeSecurityContextA, /* InitializeSecurityContext */
|
|
kerberos_AcceptSecurityContext, /* AcceptSecurityContext */
|
|
NULL, /* CompleteAuthToken */
|
|
kerberos_DeleteSecurityContext, /* DeleteSecurityContext */
|
|
NULL, /* ApplyControlToken */
|
|
kerberos_QueryContextAttributesA, /* QueryContextAttributes */
|
|
NULL, /* ImpersonateSecurityContext */
|
|
NULL, /* RevertSecurityContext */
|
|
kerberos_MakeSignature, /* MakeSignature */
|
|
kerberos_VerifySignature, /* VerifySignature */
|
|
NULL, /* FreeContextBuffer */
|
|
NULL, /* QuerySecurityPackageInfo */
|
|
NULL, /* Reserved3 */
|
|
NULL, /* Reserved4 */
|
|
NULL, /* ExportSecurityContext */
|
|
NULL, /* ImportSecurityContext */
|
|
NULL, /* AddCredentials */
|
|
NULL, /* Reserved8 */
|
|
NULL, /* QuerySecurityContextToken */
|
|
kerberos_EncryptMessage, /* EncryptMessage */
|
|
kerberos_DecryptMessage, /* DecryptMessage */
|
|
kerberos_SetContextAttributesA, /* SetContextAttributes */
|
|
kerberos_SetCredentialsAttributesA, /* SetCredentialsAttributes */
|
|
};
|
|
|
|
const SecurityFunctionTableW KERBEROS_SecurityFunctionTableW = {
|
|
3, /* dwVersion */
|
|
NULL, /* EnumerateSecurityPackages */
|
|
kerberos_QueryCredentialsAttributesW, /* QueryCredentialsAttributes */
|
|
kerberos_AcquireCredentialsHandleW, /* AcquireCredentialsHandle */
|
|
kerberos_FreeCredentialsHandle, /* FreeCredentialsHandle */
|
|
NULL, /* Reserved2 */
|
|
kerberos_InitializeSecurityContextW, /* InitializeSecurityContext */
|
|
kerberos_AcceptSecurityContext, /* AcceptSecurityContext */
|
|
NULL, /* CompleteAuthToken */
|
|
kerberos_DeleteSecurityContext, /* DeleteSecurityContext */
|
|
NULL, /* ApplyControlToken */
|
|
kerberos_QueryContextAttributesW, /* QueryContextAttributes */
|
|
NULL, /* ImpersonateSecurityContext */
|
|
NULL, /* RevertSecurityContext */
|
|
kerberos_MakeSignature, /* MakeSignature */
|
|
kerberos_VerifySignature, /* VerifySignature */
|
|
NULL, /* FreeContextBuffer */
|
|
NULL, /* QuerySecurityPackageInfo */
|
|
NULL, /* Reserved3 */
|
|
NULL, /* Reserved4 */
|
|
NULL, /* ExportSecurityContext */
|
|
NULL, /* ImportSecurityContext */
|
|
NULL, /* AddCredentials */
|
|
NULL, /* Reserved8 */
|
|
NULL, /* QuerySecurityContextToken */
|
|
kerberos_EncryptMessage, /* EncryptMessage */
|
|
kerberos_DecryptMessage, /* DecryptMessage */
|
|
kerberos_SetContextAttributesW, /* SetContextAttributes */
|
|
kerberos_SetCredentialsAttributesW, /* SetCredentialsAttributes */
|
|
};
|