xref: /netbsd-src/crypto/external/bsd/heimdal/dist/lib/krb5/rd_priv.c (revision d3273b5b76f5afaafe308cead5511dbb8df8c5e9)
1*d3273b5bSchristos /*	$NetBSD: rd_priv.c,v 1.2 2017/01/28 21:31:49 christos Exp $	*/
2ca1c9b0cSelric 
3ca1c9b0cSelric /*
4ca1c9b0cSelric  * Copyright (c) 1997-2007 Kungliga Tekniska Högskolan
5ca1c9b0cSelric  * (Royal Institute of Technology, Stockholm, Sweden).
6ca1c9b0cSelric  * All rights reserved.
7ca1c9b0cSelric  *
8ca1c9b0cSelric  * Redistribution and use in source and binary forms, with or without
9ca1c9b0cSelric  * modification, are permitted provided that the following conditions
10ca1c9b0cSelric  * are met:
11ca1c9b0cSelric  *
12ca1c9b0cSelric  * 1. Redistributions of source code must retain the above copyright
13ca1c9b0cSelric  *    notice, this list of conditions and the following disclaimer.
14ca1c9b0cSelric  *
15ca1c9b0cSelric  * 2. Redistributions in binary form must reproduce the above copyright
16ca1c9b0cSelric  *    notice, this list of conditions and the following disclaimer in the
17ca1c9b0cSelric  *    documentation and/or other materials provided with the distribution.
18ca1c9b0cSelric  *
19ca1c9b0cSelric  * 3. Neither the name of the Institute nor the names of its contributors
20ca1c9b0cSelric  *    may be used to endorse or promote products derived from this software
21ca1c9b0cSelric  *    without specific prior written permission.
22ca1c9b0cSelric  *
23ca1c9b0cSelric  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ca1c9b0cSelric  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ca1c9b0cSelric  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ca1c9b0cSelric  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ca1c9b0cSelric  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ca1c9b0cSelric  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ca1c9b0cSelric  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ca1c9b0cSelric  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ca1c9b0cSelric  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ca1c9b0cSelric  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ca1c9b0cSelric  * SUCH DAMAGE.
34ca1c9b0cSelric  */
35ca1c9b0cSelric 
36ca1c9b0cSelric #include "krb5_locl.h"
37ca1c9b0cSelric 
38ca1c9b0cSelric KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rd_priv(krb5_context context,krb5_auth_context auth_context,const krb5_data * inbuf,krb5_data * outbuf,krb5_replay_data * outdata)39ca1c9b0cSelric krb5_rd_priv(krb5_context context,
40ca1c9b0cSelric 	     krb5_auth_context auth_context,
41ca1c9b0cSelric 	     const krb5_data *inbuf,
42ca1c9b0cSelric 	     krb5_data *outbuf,
43ca1c9b0cSelric 	     krb5_replay_data *outdata)
44ca1c9b0cSelric {
45ca1c9b0cSelric     krb5_error_code ret;
46ca1c9b0cSelric     KRB_PRIV priv;
47ca1c9b0cSelric     EncKrbPrivPart part;
48ca1c9b0cSelric     size_t len;
49ca1c9b0cSelric     krb5_data plain;
50ca1c9b0cSelric     krb5_keyblock *key;
51ca1c9b0cSelric     krb5_crypto crypto;
52ca1c9b0cSelric 
53ca1c9b0cSelric     krb5_data_zero(outbuf);
54ca1c9b0cSelric 
55ca1c9b0cSelric     if ((auth_context->flags &
56ca1c9b0cSelric 	 (KRB5_AUTH_CONTEXT_RET_TIME | KRB5_AUTH_CONTEXT_RET_SEQUENCE)))
57ca1c9b0cSelric     {
58ca1c9b0cSelric 	if (outdata == NULL) {
59ca1c9b0cSelric 	    krb5_clear_error_message (context);
60ca1c9b0cSelric 	    return KRB5_RC_REQUIRED; /* XXX better error, MIT returns this */
61ca1c9b0cSelric 	}
62ca1c9b0cSelric 	/* if these fields are not present in the priv-part, silently
63ca1c9b0cSelric            return zero */
64ca1c9b0cSelric 	memset(outdata, 0, sizeof(*outdata));
65ca1c9b0cSelric     }
66ca1c9b0cSelric 
67ca1c9b0cSelric     memset(&priv, 0, sizeof(priv));
68ca1c9b0cSelric     ret = decode_KRB_PRIV (inbuf->data, inbuf->length, &priv, &len);
69ca1c9b0cSelric     if (ret) {
70ca1c9b0cSelric 	krb5_clear_error_message (context);
71ca1c9b0cSelric 	goto failure;
72ca1c9b0cSelric     }
73ca1c9b0cSelric     if (priv.pvno != 5) {
74ca1c9b0cSelric 	krb5_clear_error_message (context);
75ca1c9b0cSelric 	ret = KRB5KRB_AP_ERR_BADVERSION;
76ca1c9b0cSelric 	goto failure;
77ca1c9b0cSelric     }
78ca1c9b0cSelric     if (priv.msg_type != krb_priv) {
79ca1c9b0cSelric 	krb5_clear_error_message (context);
80ca1c9b0cSelric 	ret = KRB5KRB_AP_ERR_MSG_TYPE;
81ca1c9b0cSelric 	goto failure;
82ca1c9b0cSelric     }
83ca1c9b0cSelric 
84ca1c9b0cSelric     if (auth_context->remote_subkey)
85ca1c9b0cSelric 	key = auth_context->remote_subkey;
86ca1c9b0cSelric     else if (auth_context->local_subkey)
87ca1c9b0cSelric 	key = auth_context->local_subkey;
88ca1c9b0cSelric     else
89ca1c9b0cSelric 	key = auth_context->keyblock;
90ca1c9b0cSelric 
91ca1c9b0cSelric     ret = krb5_crypto_init(context, key, 0, &crypto);
92ca1c9b0cSelric     if (ret)
93ca1c9b0cSelric 	goto failure;
94ca1c9b0cSelric     ret = krb5_decrypt_EncryptedData(context,
95ca1c9b0cSelric 				     crypto,
96ca1c9b0cSelric 				     KRB5_KU_KRB_PRIV,
97ca1c9b0cSelric 				     &priv.enc_part,
98ca1c9b0cSelric 				     &plain);
99ca1c9b0cSelric     krb5_crypto_destroy(context, crypto);
100ca1c9b0cSelric     if (ret)
101ca1c9b0cSelric 	goto failure;
102ca1c9b0cSelric 
103ca1c9b0cSelric     ret = decode_EncKrbPrivPart (plain.data, plain.length, &part, &len);
104ca1c9b0cSelric     krb5_data_free (&plain);
105ca1c9b0cSelric     if (ret) {
106ca1c9b0cSelric 	krb5_clear_error_message (context);
107ca1c9b0cSelric 	goto failure;
108ca1c9b0cSelric     }
109ca1c9b0cSelric 
110ca1c9b0cSelric     /* check sender address */
111ca1c9b0cSelric 
112ca1c9b0cSelric     if (part.s_address
113ca1c9b0cSelric 	&& auth_context->remote_address
114ca1c9b0cSelric 	&& !krb5_address_compare (context,
115ca1c9b0cSelric 				  auth_context->remote_address,
116ca1c9b0cSelric 				  part.s_address)) {
117ca1c9b0cSelric 	krb5_clear_error_message (context);
118ca1c9b0cSelric 	ret = KRB5KRB_AP_ERR_BADADDR;
119ca1c9b0cSelric 	goto failure_part;
120ca1c9b0cSelric     }
121ca1c9b0cSelric 
122ca1c9b0cSelric     /* check receiver address */
123ca1c9b0cSelric 
124ca1c9b0cSelric     if (part.r_address
125ca1c9b0cSelric 	&& auth_context->local_address
126ca1c9b0cSelric 	&& !krb5_address_compare (context,
127ca1c9b0cSelric 				  auth_context->local_address,
128ca1c9b0cSelric 				  part.r_address)) {
129ca1c9b0cSelric 	krb5_clear_error_message (context);
130ca1c9b0cSelric 	ret = KRB5KRB_AP_ERR_BADADDR;
131ca1c9b0cSelric 	goto failure_part;
132ca1c9b0cSelric     }
133ca1c9b0cSelric 
134ca1c9b0cSelric     /* check timestamp */
135ca1c9b0cSelric     if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_TIME) {
136ca1c9b0cSelric 	krb5_timestamp sec;
137ca1c9b0cSelric 
138ca1c9b0cSelric 	krb5_timeofday (context, &sec);
139ca1c9b0cSelric 	if (part.timestamp == NULL ||
140ca1c9b0cSelric 	    part.usec      == NULL ||
141b9d004c6Schristos 	    labs(*part.timestamp - sec) > context->max_skew) {
142ca1c9b0cSelric 	    krb5_clear_error_message (context);
143ca1c9b0cSelric 	    ret = KRB5KRB_AP_ERR_SKEW;
144ca1c9b0cSelric 	    goto failure_part;
145ca1c9b0cSelric 	}
146ca1c9b0cSelric     }
147ca1c9b0cSelric 
148ca1c9b0cSelric     /* XXX - check replay cache */
149ca1c9b0cSelric 
150ca1c9b0cSelric     /* check sequence number. since MIT krb5 cannot generate a sequence
151ca1c9b0cSelric        number of zero but instead generates no sequence number, we accept that
152ca1c9b0cSelric     */
153ca1c9b0cSelric 
154ca1c9b0cSelric     if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE) {
155ca1c9b0cSelric 	if ((part.seq_number == NULL
156ca1c9b0cSelric 	     && auth_context->remote_seqnumber != 0)
157ca1c9b0cSelric 	    || (part.seq_number != NULL
158ca1c9b0cSelric 		&& *part.seq_number != auth_context->remote_seqnumber)) {
159ca1c9b0cSelric 	    krb5_clear_error_message (context);
160ca1c9b0cSelric 	    ret = KRB5KRB_AP_ERR_BADORDER;
161ca1c9b0cSelric 	    goto failure_part;
162ca1c9b0cSelric 	}
163ca1c9b0cSelric 	auth_context->remote_seqnumber++;
164ca1c9b0cSelric     }
165ca1c9b0cSelric 
166ca1c9b0cSelric     ret = krb5_data_copy (outbuf, part.user_data.data, part.user_data.length);
167ca1c9b0cSelric     if (ret)
168ca1c9b0cSelric 	goto failure_part;
169ca1c9b0cSelric 
170ca1c9b0cSelric     if ((auth_context->flags &
171ca1c9b0cSelric 	 (KRB5_AUTH_CONTEXT_RET_TIME | KRB5_AUTH_CONTEXT_RET_SEQUENCE))) {
172ca1c9b0cSelric 	if(part.timestamp)
173ca1c9b0cSelric 	    outdata->timestamp = *part.timestamp;
174ca1c9b0cSelric 	if(part.usec)
175ca1c9b0cSelric 	    outdata->usec = *part.usec;
176ca1c9b0cSelric 	if(part.seq_number)
177ca1c9b0cSelric 	    outdata->seq = *part.seq_number;
178ca1c9b0cSelric     }
179ca1c9b0cSelric 
180ca1c9b0cSelric   failure_part:
181ca1c9b0cSelric     free_EncKrbPrivPart (&part);
182ca1c9b0cSelric 
183ca1c9b0cSelric   failure:
184ca1c9b0cSelric     free_KRB_PRIV (&priv);
185ca1c9b0cSelric     return ret;
186ca1c9b0cSelric }
187