1*d3273b5bSchristos /* $NetBSD: rd_priv.c,v 1.2 2017/01/28 21:31:49 christos Exp $ */
2ca1c9b0cSelric
3ca1c9b0cSelric /*
4ca1c9b0cSelric * Copyright (c) 1997-2007 Kungliga Tekniska Högskolan
5ca1c9b0cSelric * (Royal Institute of Technology, Stockholm, Sweden).
6ca1c9b0cSelric * All rights reserved.
7ca1c9b0cSelric *
8ca1c9b0cSelric * Redistribution and use in source and binary forms, with or without
9ca1c9b0cSelric * modification, are permitted provided that the following conditions
10ca1c9b0cSelric * are met:
11ca1c9b0cSelric *
12ca1c9b0cSelric * 1. Redistributions of source code must retain the above copyright
13ca1c9b0cSelric * notice, this list of conditions and the following disclaimer.
14ca1c9b0cSelric *
15ca1c9b0cSelric * 2. Redistributions in binary form must reproduce the above copyright
16ca1c9b0cSelric * notice, this list of conditions and the following disclaimer in the
17ca1c9b0cSelric * documentation and/or other materials provided with the distribution.
18ca1c9b0cSelric *
19ca1c9b0cSelric * 3. Neither the name of the Institute nor the names of its contributors
20ca1c9b0cSelric * may be used to endorse or promote products derived from this software
21ca1c9b0cSelric * without specific prior written permission.
22ca1c9b0cSelric *
23ca1c9b0cSelric * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ca1c9b0cSelric * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ca1c9b0cSelric * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ca1c9b0cSelric * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ca1c9b0cSelric * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ca1c9b0cSelric * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ca1c9b0cSelric * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ca1c9b0cSelric * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ca1c9b0cSelric * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ca1c9b0cSelric * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ca1c9b0cSelric * SUCH DAMAGE.
34ca1c9b0cSelric */
35ca1c9b0cSelric
36ca1c9b0cSelric #include "krb5_locl.h"
37ca1c9b0cSelric
38ca1c9b0cSelric KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rd_priv(krb5_context context,krb5_auth_context auth_context,const krb5_data * inbuf,krb5_data * outbuf,krb5_replay_data * outdata)39ca1c9b0cSelric krb5_rd_priv(krb5_context context,
40ca1c9b0cSelric krb5_auth_context auth_context,
41ca1c9b0cSelric const krb5_data *inbuf,
42ca1c9b0cSelric krb5_data *outbuf,
43ca1c9b0cSelric krb5_replay_data *outdata)
44ca1c9b0cSelric {
45ca1c9b0cSelric krb5_error_code ret;
46ca1c9b0cSelric KRB_PRIV priv;
47ca1c9b0cSelric EncKrbPrivPart part;
48ca1c9b0cSelric size_t len;
49ca1c9b0cSelric krb5_data plain;
50ca1c9b0cSelric krb5_keyblock *key;
51ca1c9b0cSelric krb5_crypto crypto;
52ca1c9b0cSelric
53ca1c9b0cSelric krb5_data_zero(outbuf);
54ca1c9b0cSelric
55ca1c9b0cSelric if ((auth_context->flags &
56ca1c9b0cSelric (KRB5_AUTH_CONTEXT_RET_TIME | KRB5_AUTH_CONTEXT_RET_SEQUENCE)))
57ca1c9b0cSelric {
58ca1c9b0cSelric if (outdata == NULL) {
59ca1c9b0cSelric krb5_clear_error_message (context);
60ca1c9b0cSelric return KRB5_RC_REQUIRED; /* XXX better error, MIT returns this */
61ca1c9b0cSelric }
62ca1c9b0cSelric /* if these fields are not present in the priv-part, silently
63ca1c9b0cSelric return zero */
64ca1c9b0cSelric memset(outdata, 0, sizeof(*outdata));
65ca1c9b0cSelric }
66ca1c9b0cSelric
67ca1c9b0cSelric memset(&priv, 0, sizeof(priv));
68ca1c9b0cSelric ret = decode_KRB_PRIV (inbuf->data, inbuf->length, &priv, &len);
69ca1c9b0cSelric if (ret) {
70ca1c9b0cSelric krb5_clear_error_message (context);
71ca1c9b0cSelric goto failure;
72ca1c9b0cSelric }
73ca1c9b0cSelric if (priv.pvno != 5) {
74ca1c9b0cSelric krb5_clear_error_message (context);
75ca1c9b0cSelric ret = KRB5KRB_AP_ERR_BADVERSION;
76ca1c9b0cSelric goto failure;
77ca1c9b0cSelric }
78ca1c9b0cSelric if (priv.msg_type != krb_priv) {
79ca1c9b0cSelric krb5_clear_error_message (context);
80ca1c9b0cSelric ret = KRB5KRB_AP_ERR_MSG_TYPE;
81ca1c9b0cSelric goto failure;
82ca1c9b0cSelric }
83ca1c9b0cSelric
84ca1c9b0cSelric if (auth_context->remote_subkey)
85ca1c9b0cSelric key = auth_context->remote_subkey;
86ca1c9b0cSelric else if (auth_context->local_subkey)
87ca1c9b0cSelric key = auth_context->local_subkey;
88ca1c9b0cSelric else
89ca1c9b0cSelric key = auth_context->keyblock;
90ca1c9b0cSelric
91ca1c9b0cSelric ret = krb5_crypto_init(context, key, 0, &crypto);
92ca1c9b0cSelric if (ret)
93ca1c9b0cSelric goto failure;
94ca1c9b0cSelric ret = krb5_decrypt_EncryptedData(context,
95ca1c9b0cSelric crypto,
96ca1c9b0cSelric KRB5_KU_KRB_PRIV,
97ca1c9b0cSelric &priv.enc_part,
98ca1c9b0cSelric &plain);
99ca1c9b0cSelric krb5_crypto_destroy(context, crypto);
100ca1c9b0cSelric if (ret)
101ca1c9b0cSelric goto failure;
102ca1c9b0cSelric
103ca1c9b0cSelric ret = decode_EncKrbPrivPart (plain.data, plain.length, &part, &len);
104ca1c9b0cSelric krb5_data_free (&plain);
105ca1c9b0cSelric if (ret) {
106ca1c9b0cSelric krb5_clear_error_message (context);
107ca1c9b0cSelric goto failure;
108ca1c9b0cSelric }
109ca1c9b0cSelric
110ca1c9b0cSelric /* check sender address */
111ca1c9b0cSelric
112ca1c9b0cSelric if (part.s_address
113ca1c9b0cSelric && auth_context->remote_address
114ca1c9b0cSelric && !krb5_address_compare (context,
115ca1c9b0cSelric auth_context->remote_address,
116ca1c9b0cSelric part.s_address)) {
117ca1c9b0cSelric krb5_clear_error_message (context);
118ca1c9b0cSelric ret = KRB5KRB_AP_ERR_BADADDR;
119ca1c9b0cSelric goto failure_part;
120ca1c9b0cSelric }
121ca1c9b0cSelric
122ca1c9b0cSelric /* check receiver address */
123ca1c9b0cSelric
124ca1c9b0cSelric if (part.r_address
125ca1c9b0cSelric && auth_context->local_address
126ca1c9b0cSelric && !krb5_address_compare (context,
127ca1c9b0cSelric auth_context->local_address,
128ca1c9b0cSelric part.r_address)) {
129ca1c9b0cSelric krb5_clear_error_message (context);
130ca1c9b0cSelric ret = KRB5KRB_AP_ERR_BADADDR;
131ca1c9b0cSelric goto failure_part;
132ca1c9b0cSelric }
133ca1c9b0cSelric
134ca1c9b0cSelric /* check timestamp */
135ca1c9b0cSelric if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_TIME) {
136ca1c9b0cSelric krb5_timestamp sec;
137ca1c9b0cSelric
138ca1c9b0cSelric krb5_timeofday (context, &sec);
139ca1c9b0cSelric if (part.timestamp == NULL ||
140ca1c9b0cSelric part.usec == NULL ||
141b9d004c6Schristos labs(*part.timestamp - sec) > context->max_skew) {
142ca1c9b0cSelric krb5_clear_error_message (context);
143ca1c9b0cSelric ret = KRB5KRB_AP_ERR_SKEW;
144ca1c9b0cSelric goto failure_part;
145ca1c9b0cSelric }
146ca1c9b0cSelric }
147ca1c9b0cSelric
148ca1c9b0cSelric /* XXX - check replay cache */
149ca1c9b0cSelric
150ca1c9b0cSelric /* check sequence number. since MIT krb5 cannot generate a sequence
151ca1c9b0cSelric number of zero but instead generates no sequence number, we accept that
152ca1c9b0cSelric */
153ca1c9b0cSelric
154ca1c9b0cSelric if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE) {
155ca1c9b0cSelric if ((part.seq_number == NULL
156ca1c9b0cSelric && auth_context->remote_seqnumber != 0)
157ca1c9b0cSelric || (part.seq_number != NULL
158ca1c9b0cSelric && *part.seq_number != auth_context->remote_seqnumber)) {
159ca1c9b0cSelric krb5_clear_error_message (context);
160ca1c9b0cSelric ret = KRB5KRB_AP_ERR_BADORDER;
161ca1c9b0cSelric goto failure_part;
162ca1c9b0cSelric }
163ca1c9b0cSelric auth_context->remote_seqnumber++;
164ca1c9b0cSelric }
165ca1c9b0cSelric
166ca1c9b0cSelric ret = krb5_data_copy (outbuf, part.user_data.data, part.user_data.length);
167ca1c9b0cSelric if (ret)
168ca1c9b0cSelric goto failure_part;
169ca1c9b0cSelric
170ca1c9b0cSelric if ((auth_context->flags &
171ca1c9b0cSelric (KRB5_AUTH_CONTEXT_RET_TIME | KRB5_AUTH_CONTEXT_RET_SEQUENCE))) {
172ca1c9b0cSelric if(part.timestamp)
173ca1c9b0cSelric outdata->timestamp = *part.timestamp;
174ca1c9b0cSelric if(part.usec)
175ca1c9b0cSelric outdata->usec = *part.usec;
176ca1c9b0cSelric if(part.seq_number)
177ca1c9b0cSelric outdata->seq = *part.seq_number;
178ca1c9b0cSelric }
179ca1c9b0cSelric
180ca1c9b0cSelric failure_part:
181ca1c9b0cSelric free_EncKrbPrivPart (&part);
182ca1c9b0cSelric
183ca1c9b0cSelric failure:
184ca1c9b0cSelric free_KRB_PRIV (&priv);
185ca1c9b0cSelric return ret;
186ca1c9b0cSelric }
187