xref: /freebsd/crypto/heimdal/lib/krb5/mk_safe.c (revision 6a068746777241722b2b32c5d0bc443a2a64d80b)
1b528cefcSMark Murray /*
2*ae771770SStanislav Sedov  * Copyright (c) 1997 - 2003 Kungliga Tekniska Högskolan
3b528cefcSMark Murray  * (Royal Institute of Technology, Stockholm, Sweden).
4b528cefcSMark Murray  * All rights reserved.
5b528cefcSMark Murray  *
6b528cefcSMark Murray  * Redistribution and use in source and binary forms, with or without
7b528cefcSMark Murray  * modification, are permitted provided that the following conditions
8b528cefcSMark Murray  * are met:
9b528cefcSMark Murray  *
10b528cefcSMark Murray  * 1. Redistributions of source code must retain the above copyright
11b528cefcSMark Murray  *    notice, this list of conditions and the following disclaimer.
12b528cefcSMark Murray  *
13b528cefcSMark Murray  * 2. Redistributions in binary form must reproduce the above copyright
14b528cefcSMark Murray  *    notice, this list of conditions and the following disclaimer in the
15b528cefcSMark Murray  *    documentation and/or other materials provided with the distribution.
16b528cefcSMark Murray  *
17b528cefcSMark Murray  * 3. Neither the name of the Institute nor the names of its contributors
18b528cefcSMark Murray  *    may be used to endorse or promote products derived from this software
19b528cefcSMark Murray  *    without specific prior written permission.
20b528cefcSMark Murray  *
21b528cefcSMark Murray  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22b528cefcSMark Murray  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23b528cefcSMark Murray  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24b528cefcSMark Murray  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25b528cefcSMark Murray  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26b528cefcSMark Murray  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27b528cefcSMark Murray  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28b528cefcSMark Murray  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29b528cefcSMark Murray  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30b528cefcSMark Murray  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31b528cefcSMark Murray  * SUCH DAMAGE.
32b528cefcSMark Murray  */
33b528cefcSMark Murray 
34*ae771770SStanislav Sedov #include "krb5_locl.h"
35b528cefcSMark Murray 
36*ae771770SStanislav Sedov KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_mk_safe(krb5_context context,krb5_auth_context auth_context,const krb5_data * userdata,krb5_data * outbuf,krb5_replay_data * outdata)37b528cefcSMark Murray krb5_mk_safe(krb5_context context,
38b528cefcSMark Murray 	     krb5_auth_context auth_context,
39b528cefcSMark Murray 	     const krb5_data *userdata,
40b528cefcSMark Murray 	     krb5_data *outbuf,
41c19800e8SDoug Rabson 	     krb5_replay_data *outdata)
42b528cefcSMark Murray {
43b528cefcSMark Murray     krb5_error_code ret;
44b528cefcSMark Murray     KRB_SAFE s;
45b528cefcSMark Murray     u_char *buf = NULL;
46b528cefcSMark Murray     size_t buf_size;
47*ae771770SStanislav Sedov     size_t len = 0;
48b528cefcSMark Murray     krb5_crypto crypto;
494137ff4cSJacques Vidrine     krb5_keyblock *key;
50c19800e8SDoug Rabson     krb5_replay_data rdata;
51c19800e8SDoug Rabson 
52c19800e8SDoug Rabson     if ((auth_context->flags &
53c19800e8SDoug Rabson 	 (KRB5_AUTH_CONTEXT_RET_TIME | KRB5_AUTH_CONTEXT_RET_SEQUENCE)) &&
54c19800e8SDoug Rabson 	outdata == NULL)
55c19800e8SDoug Rabson 	return KRB5_RC_REQUIRED; /* XXX better error, MIT returns this */
564137ff4cSJacques Vidrine 
574137ff4cSJacques Vidrine     if (auth_context->local_subkey)
584137ff4cSJacques Vidrine 	key = auth_context->local_subkey;
594137ff4cSJacques Vidrine     else if (auth_context->remote_subkey)
604137ff4cSJacques Vidrine 	key = auth_context->remote_subkey;
614137ff4cSJacques Vidrine     else
624137ff4cSJacques Vidrine 	key = auth_context->keyblock;
63b528cefcSMark Murray 
64b528cefcSMark Murray     s.pvno = 5;
65b528cefcSMark Murray     s.msg_type = krb_safe;
66b528cefcSMark Murray 
67c19800e8SDoug Rabson     memset(&rdata, 0, sizeof(rdata));
68b528cefcSMark Murray 
69c19800e8SDoug Rabson     s.safe_body.user_data = *userdata;
70c19800e8SDoug Rabson 
71c19800e8SDoug Rabson     krb5_us_timeofday (context, &rdata.timestamp, &rdata.usec);
72c19800e8SDoug Rabson 
73c19800e8SDoug Rabson     if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_TIME) {
74c19800e8SDoug Rabson 	s.safe_body.timestamp  = &rdata.timestamp;
75c19800e8SDoug Rabson 	s.safe_body.usec       = &rdata.usec;
76c19800e8SDoug Rabson     } else {
77c19800e8SDoug Rabson 	s.safe_body.timestamp  = NULL;
78c19800e8SDoug Rabson 	s.safe_body.usec       = NULL;
79c19800e8SDoug Rabson     }
80c19800e8SDoug Rabson 
81c19800e8SDoug Rabson     if (auth_context->flags & KRB5_AUTH_CONTEXT_RET_TIME) {
82c19800e8SDoug Rabson 	outdata->timestamp = rdata.timestamp;
83c19800e8SDoug Rabson 	outdata->usec = rdata.usec;
84c19800e8SDoug Rabson     }
85c19800e8SDoug Rabson 
86b528cefcSMark Murray     if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE) {
87c19800e8SDoug Rabson 	rdata.seq = auth_context->local_seqnumber;
88c19800e8SDoug Rabson 	s.safe_body.seq_number = &rdata.seq;
89b528cefcSMark Murray     } else
90b528cefcSMark Murray 	s.safe_body.seq_number = NULL;
91b528cefcSMark Murray 
92c19800e8SDoug Rabson     if (auth_context->flags & KRB5_AUTH_CONTEXT_RET_SEQUENCE)
93c19800e8SDoug Rabson 	outdata->seq = auth_context->local_seqnumber;
94c19800e8SDoug Rabson 
95b528cefcSMark Murray     s.safe_body.s_address = auth_context->local_address;
96b528cefcSMark Murray     s.safe_body.r_address = auth_context->remote_address;
97b528cefcSMark Murray 
98b528cefcSMark Murray     s.cksum.cksumtype       = 0;
99b528cefcSMark Murray     s.cksum.checksum.data   = NULL;
100b528cefcSMark Murray     s.cksum.checksum.length = 0;
101b528cefcSMark Murray 
1020cadf2f4SJacques Vidrine     ASN1_MALLOC_ENCODE(KRB_SAFE, buf, buf_size, &s, &len, ret);
1030cadf2f4SJacques Vidrine     if (ret)
1045e9cd1aeSAssar Westerlund 	return ret;
1050cadf2f4SJacques Vidrine     if(buf_size != len)
1060cadf2f4SJacques Vidrine 	krb5_abortx(context, "internal error in ASN.1 encoder");
1074137ff4cSJacques Vidrine     ret = krb5_crypto_init(context, key, 0, &crypto);
1085e9cd1aeSAssar Westerlund     if (ret) {
1095e9cd1aeSAssar Westerlund 	free (buf);
1105e9cd1aeSAssar Westerlund 	return ret;
1115e9cd1aeSAssar Westerlund     }
112b528cefcSMark Murray     ret = krb5_create_checksum(context,
113b528cefcSMark Murray 			       crypto,
114b528cefcSMark Murray 			       KRB5_KU_KRB_SAFE_CKSUM,
115adb0ddaeSAssar Westerlund 			       0,
1160cadf2f4SJacques Vidrine 			       buf,
117b528cefcSMark Murray 			       len,
118b528cefcSMark Murray 			       &s.cksum);
119b528cefcSMark Murray     krb5_crypto_destroy(context, crypto);
120b528cefcSMark Murray     if (ret) {
121b528cefcSMark Murray 	free (buf);
122b528cefcSMark Murray 	return ret;
123b528cefcSMark Murray     }
124b528cefcSMark Murray 
125adb0ddaeSAssar Westerlund     free(buf);
1260cadf2f4SJacques Vidrine     ASN1_MALLOC_ENCODE(KRB_SAFE, buf, buf_size, &s, &len, ret);
127b528cefcSMark Murray     free_Checksum (&s.cksum);
1280cadf2f4SJacques Vidrine     if(ret)
1290cadf2f4SJacques Vidrine 	return ret;
1300cadf2f4SJacques Vidrine     if(buf_size != len)
1310cadf2f4SJacques Vidrine 	krb5_abortx(context, "internal error in ASN.1 encoder");
132b528cefcSMark Murray 
133b528cefcSMark Murray     outbuf->length = len;
1340cadf2f4SJacques Vidrine     outbuf->data   = buf;
1355e9cd1aeSAssar Westerlund     if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE)
1365e9cd1aeSAssar Westerlund 	auth_context->local_seqnumber =
1375e9cd1aeSAssar Westerlund 	    (auth_context->local_seqnumber + 1) & 0xFFFFFFFF;
138b528cefcSMark Murray     return 0;
139b528cefcSMark Murray }
140